@azure/arm-iotfirmwaredefense 1.0.0-alpha.20240307.1 → 1.0.0-alpha.20240322.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (278) hide show
  1. package/CHANGELOG.md +2 -12
  2. package/LICENSE +1 -1
  3. package/README.md +2 -2
  4. package/dist/index.js +2254 -2121
  5. package/dist/index.js.map +1 -1
  6. package/dist/index.min.js +1 -1
  7. package/dist/index.min.js.map +1 -1
  8. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts +2 -0
  9. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts.map +1 -0
  10. package/dist-esm/samples-dev/{firmwareListGenerateCryptoKeyListSample.js → binaryHardeningListByFirmwareSample.js} +19 -20
  11. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.js.map +1 -0
  12. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts +2 -0
  13. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts.map +1 -0
  14. package/dist-esm/samples-dev/{firmwareListGenerateComponentListSample.js → cryptoCertificatesListByFirmwareSample.js} +21 -23
  15. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.js.map +1 -0
  16. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts +2 -0
  17. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts.map +1 -0
  18. package/dist-esm/samples-dev/{firmwareListGenerateCryptoCertificateListSample.js → cryptoKeysListByFirmwareSample.js} +19 -20
  19. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.js.map +1 -0
  20. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts +2 -0
  21. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts.map +1 -0
  22. package/dist-esm/samples-dev/{firmwareListGenerateCveListSample.js → cvesListByFirmwareSample.js} +21 -23
  23. package/dist-esm/samples-dev/cvesListByFirmwareSample.js.map +1 -0
  24. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts +2 -0
  25. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts.map +1 -0
  26. package/dist-esm/samples-dev/{firmwareCreateSample.js → firmwaresCreateSample.js} +20 -18
  27. package/dist-esm/samples-dev/firmwaresCreateSample.js.map +1 -0
  28. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts +2 -0
  29. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts.map +1 -0
  30. package/dist-esm/samples-dev/{firmwareDeleteSample.js → firmwaresDeleteSample.js} +9 -9
  31. package/dist-esm/samples-dev/firmwaresDeleteSample.js.map +1 -0
  32. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts +2 -0
  33. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts.map +1 -0
  34. package/dist-esm/samples-dev/{firmwareGenerateDownloadUrlSample.js → firmwaresGenerateDownloadUrlSample.js} +9 -9
  35. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.js.map +1 -0
  36. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts +2 -0
  37. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
  38. package/dist-esm/samples-dev/{firmwareGenerateFilesystemDownloadUrlSample.js → firmwaresGenerateFilesystemDownloadUrlSample.js} +9 -9
  39. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.js.map +1 -0
  40. package/dist-esm/samples-dev/firmwaresGetSample.d.ts +2 -0
  41. package/dist-esm/samples-dev/firmwaresGetSample.d.ts.map +1 -0
  42. package/dist-esm/samples-dev/{firmwareGetSample.js → firmwaresGetSample.js} +9 -9
  43. package/dist-esm/samples-dev/firmwaresGetSample.js.map +1 -0
  44. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts +2 -0
  45. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts.map +1 -0
  46. package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js} +9 -9
  47. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.js.map +1 -0
  48. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts +2 -0
  49. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts.map +1 -0
  50. package/dist-esm/samples-dev/{firmwareUpdateSample.js → firmwaresUpdateSample.js} +20 -18
  51. package/dist-esm/samples-dev/firmwaresUpdateSample.js.map +1 -0
  52. package/dist-esm/samples-dev/operationsListSample.js +2 -2
  53. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts +2 -0
  54. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts.map +1 -0
  55. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js +92 -0
  56. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js.map +1 -0
  57. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts +2 -0
  58. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts.map +1 -0
  59. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js +92 -0
  60. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js.map +1 -0
  61. package/dist-esm/samples-dev/summariesGetSample.d.ts +2 -0
  62. package/dist-esm/samples-dev/summariesGetSample.d.ts.map +1 -0
  63. package/dist-esm/samples-dev/{firmwareGenerateSummarySample.js → summariesGetSample.js} +23 -23
  64. package/dist-esm/samples-dev/summariesGetSample.js.map +1 -0
  65. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts +2 -0
  66. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts.map +1 -0
  67. package/dist-esm/samples-dev/{firmwareListGenerateBinaryHardeningListSample.js → summariesListByFirmwareSample.js} +21 -23
  68. package/dist-esm/samples-dev/summariesListByFirmwareSample.js.map +1 -0
  69. package/dist-esm/samples-dev/workspacesCreateSample.js +5 -4
  70. package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -1
  71. package/dist-esm/samples-dev/workspacesDeleteSample.js +2 -2
  72. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +4 -4
  73. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -1
  74. package/dist-esm/samples-dev/workspacesGetSample.js +2 -2
  75. package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +2 -2
  76. package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +2 -2
  77. package/dist-esm/samples-dev/workspacesUpdateSample.js +4 -4
  78. package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -1
  79. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +11 -4
  80. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -1
  81. package/dist-esm/src/ioTFirmwareDefenseClient.js +19 -12
  82. package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -1
  83. package/dist-esm/src/models/index.d.ts +516 -602
  84. package/dist-esm/src/models/index.d.ts.map +1 -1
  85. package/dist-esm/src/models/index.js +40 -92
  86. package/dist-esm/src/models/index.js.map +1 -1
  87. package/dist-esm/src/models/mappers.d.ts +45 -25
  88. package/dist-esm/src/models/mappers.d.ts.map +1 -1
  89. package/dist-esm/src/models/mappers.js +1120 -1036
  90. package/dist-esm/src/models/mappers.js.map +1 -1
  91. package/dist-esm/src/models/parameters.d.ts +3 -2
  92. package/dist-esm/src/models/parameters.d.ts.map +1 -1
  93. package/dist-esm/src/models/parameters.js +56 -49
  94. package/dist-esm/src/models/parameters.js.map +1 -1
  95. package/dist-esm/src/operations/binaryHardening.d.ts +41 -0
  96. package/dist-esm/src/operations/binaryHardening.d.ts.map +1 -0
  97. package/dist-esm/src/operations/binaryHardening.js +155 -0
  98. package/dist-esm/src/operations/binaryHardening.js.map +1 -0
  99. package/dist-esm/src/operations/cryptoCertificates.d.ts +41 -0
  100. package/dist-esm/src/operations/cryptoCertificates.d.ts.map +1 -0
  101. package/dist-esm/src/operations/cryptoCertificates.js +155 -0
  102. package/dist-esm/src/operations/cryptoCertificates.js.map +1 -0
  103. package/dist-esm/src/operations/cryptoKeys.d.ts +41 -0
  104. package/dist-esm/src/operations/cryptoKeys.d.ts.map +1 -0
  105. package/dist-esm/src/operations/cryptoKeys.js +155 -0
  106. package/dist-esm/src/operations/cryptoKeys.js.map +1 -0
  107. package/dist-esm/src/operations/cves.d.ts +41 -0
  108. package/dist-esm/src/operations/cves.d.ts.map +1 -0
  109. package/dist-esm/src/operations/cves.js +155 -0
  110. package/dist-esm/src/operations/cves.js.map +1 -0
  111. package/dist-esm/src/operations/firmwares.d.ts +88 -0
  112. package/dist-esm/src/operations/firmwares.d.ts.map +1 -0
  113. package/dist-esm/src/operations/firmwares.js +350 -0
  114. package/dist-esm/src/operations/firmwares.js.map +1 -0
  115. package/dist-esm/src/operations/index.d.ts +9 -2
  116. package/dist-esm/src/operations/index.d.ts.map +1 -1
  117. package/dist-esm/src/operations/index.js +9 -2
  118. package/dist-esm/src/operations/index.js.map +1 -1
  119. package/dist-esm/src/operations/operations.js +9 -9
  120. package/dist-esm/src/operations/passwordHashes.d.ts +41 -0
  121. package/dist-esm/src/operations/passwordHashes.d.ts.map +1 -0
  122. package/dist-esm/src/operations/passwordHashes.js +155 -0
  123. package/dist-esm/src/operations/passwordHashes.js.map +1 -0
  124. package/dist-esm/src/operations/sbomComponents.d.ts +41 -0
  125. package/dist-esm/src/operations/sbomComponents.d.ts.map +1 -0
  126. package/dist-esm/src/operations/sbomComponents.js +155 -0
  127. package/dist-esm/src/operations/sbomComponents.js.map +1 -0
  128. package/dist-esm/src/operations/summaries.d.ts +52 -0
  129. package/dist-esm/src/operations/summaries.d.ts.map +1 -0
  130. package/dist-esm/src/operations/summaries.js +191 -0
  131. package/dist-esm/src/operations/summaries.js.map +1 -0
  132. package/dist-esm/src/operations/workspaces.js +46 -50
  133. package/dist-esm/src/operations/workspaces.js.map +1 -1
  134. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts +14 -0
  135. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts.map +1 -0
  136. package/dist-esm/src/operationsInterfaces/{firmwareOperations.js → binaryHardening.js} +1 -1
  137. package/dist-esm/src/operationsInterfaces/binaryHardening.js.map +1 -0
  138. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts +14 -0
  139. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts.map +1 -0
  140. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js +9 -0
  141. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js.map +1 -0
  142. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts +14 -0
  143. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts.map +1 -0
  144. package/dist-esm/src/operationsInterfaces/cryptoKeys.js +9 -0
  145. package/dist-esm/src/operationsInterfaces/cryptoKeys.js.map +1 -0
  146. package/dist-esm/src/operationsInterfaces/cves.d.ts +14 -0
  147. package/dist-esm/src/operationsInterfaces/cves.d.ts.map +1 -0
  148. package/dist-esm/src/operationsInterfaces/cves.js +9 -0
  149. package/dist-esm/src/operationsInterfaces/cves.js.map +1 -0
  150. package/dist-esm/src/operationsInterfaces/firmwares.d.ts +63 -0
  151. package/dist-esm/src/operationsInterfaces/firmwares.d.ts.map +1 -0
  152. package/dist-esm/src/operationsInterfaces/firmwares.js +9 -0
  153. package/dist-esm/src/operationsInterfaces/firmwares.js.map +1 -0
  154. package/dist-esm/src/operationsInterfaces/index.d.ts +9 -2
  155. package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
  156. package/dist-esm/src/operationsInterfaces/index.js +9 -2
  157. package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
  158. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts +14 -0
  159. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts.map +1 -0
  160. package/dist-esm/src/operationsInterfaces/passwordHashes.js +9 -0
  161. package/dist-esm/src/operationsInterfaces/passwordHashes.js.map +1 -0
  162. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts +14 -0
  163. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts.map +1 -0
  164. package/dist-esm/src/operationsInterfaces/sbomComponents.js +9 -0
  165. package/dist-esm/src/operationsInterfaces/sbomComponents.js.map +1 -0
  166. package/dist-esm/src/operationsInterfaces/summaries.d.ts +24 -0
  167. package/dist-esm/src/operationsInterfaces/summaries.d.ts.map +1 -0
  168. package/dist-esm/src/operationsInterfaces/summaries.js +9 -0
  169. package/dist-esm/src/operationsInterfaces/summaries.js.map +1 -0
  170. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +1 -1
  171. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -1
  172. package/package.json +8 -8
  173. package/review/arm-iotfirmwaredefense.api.md +329 -330
  174. package/src/ioTFirmwareDefenseClient.ts +53 -24
  175. package/src/models/index.ts +566 -646
  176. package/src/models/mappers.ts +1190 -1036
  177. package/src/models/parameters.ts +59 -51
  178. package/src/operations/binaryHardening.ts +216 -0
  179. package/src/operations/cryptoCertificates.ts +216 -0
  180. package/src/operations/cryptoKeys.ts +216 -0
  181. package/src/operations/cves.ts +216 -0
  182. package/src/operations/firmwares.ts +469 -0
  183. package/src/operations/index.ts +9 -2
  184. package/src/operations/operations.ts +16 -16
  185. package/src/operations/passwordHashes.ts +216 -0
  186. package/src/operations/sbomComponents.ts +216 -0
  187. package/src/operations/summaries.ts +265 -0
  188. package/src/operations/workspaces.ts +81 -92
  189. package/src/operationsInterfaces/binaryHardening.ts +31 -0
  190. package/src/operationsInterfaces/cryptoCertificates.ts +31 -0
  191. package/src/operationsInterfaces/cryptoKeys.ts +31 -0
  192. package/src/operationsInterfaces/cves.ts +28 -0
  193. package/src/operationsInterfaces/firmwares.ts +123 -0
  194. package/src/operationsInterfaces/index.ts +9 -2
  195. package/src/operationsInterfaces/operations.ts +1 -1
  196. package/src/operationsInterfaces/passwordHashes.ts +31 -0
  197. package/src/operationsInterfaces/sbomComponents.ts +31 -0
  198. package/src/operationsInterfaces/summaries.ts +50 -0
  199. package/src/operationsInterfaces/workspaces.ts +8 -8
  200. package/src/pagingHelper.ts +1 -1
  201. package/types/arm-iotfirmwaredefense.d.ts +573 -675
  202. package/types/tsdoc-metadata.json +1 -1
  203. package/dist-esm/samples-dev/firmwareCreateSample.d.ts +0 -2
  204. package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +0 -1
  205. package/dist-esm/samples-dev/firmwareCreateSample.js.map +0 -1
  206. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +0 -2
  207. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +0 -1
  208. package/dist-esm/samples-dev/firmwareDeleteSample.js.map +0 -1
  209. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +0 -2
  210. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +0 -1
  211. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +0 -62
  212. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +0 -1
  213. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +0 -2
  214. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +0 -1
  215. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +0 -62
  216. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +0 -1
  217. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +0 -2
  218. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +0 -1
  219. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +0 -62
  220. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +0 -1
  221. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +0 -2
  222. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +0 -1
  223. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +0 -61
  224. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +0 -1
  225. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +0 -2
  226. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +0 -1
  227. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +0 -61
  228. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +0 -1
  229. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +0 -2
  230. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +0 -1
  231. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +0 -62
  232. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +0 -1
  233. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +0 -2
  234. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +0 -1
  235. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +0 -1
  236. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +0 -2
  237. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +0 -1
  238. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +0 -1
  239. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +0 -2
  240. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +0 -1
  241. package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +0 -1
  242. package/dist-esm/samples-dev/firmwareGetSample.d.ts +0 -2
  243. package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +0 -1
  244. package/dist-esm/samples-dev/firmwareGetSample.js.map +0 -1
  245. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +0 -2
  246. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +0 -1
  247. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +0 -1
  248. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +0 -2
  249. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +0 -1
  250. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +0 -1
  251. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +0 -2
  252. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +0 -1
  253. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +0 -1
  254. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +0 -2
  255. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +0 -1
  256. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +0 -1
  257. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +0 -2
  258. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +0 -1
  259. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +0 -1
  260. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +0 -2
  261. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +0 -1
  262. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +0 -1
  263. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +0 -2
  264. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +0 -1
  265. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +0 -94
  266. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +0 -1
  267. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +0 -2
  268. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +0 -1
  269. package/dist-esm/samples-dev/firmwareUpdateSample.js.map +0 -1
  270. package/dist-esm/src/operations/firmwareOperations.d.ts +0 -313
  271. package/dist-esm/src/operations/firmwareOperations.d.ts.map +0 -1
  272. package/dist-esm/src/operations/firmwareOperations.js +0 -1358
  273. package/dist-esm/src/operations/firmwareOperations.js.map +0 -1
  274. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +0 -169
  275. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +0 -1
  276. package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +0 -1
  277. package/src/operations/firmwareOperations.ts +0 -1892
  278. package/src/operationsInterfaces/firmwareOperations.ts +0 -320
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=binaryHardeningListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"binaryHardeningListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/binaryHardeningListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -13,24 +13,24 @@ import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
15
15
  /**
16
- * This sample demonstrates how to The operation to list all crypto keys for a firmware.
16
+ * This sample demonstrates how to Lists binary hardening analysis results of a firmware.
17
17
  *
18
- * @summary The operation to list all crypto keys for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json
18
+ * @summary Lists binary hardening analysis results of a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListGenerateCryptoKeyListMaximumSetGen() {
21
+ function binaryHardeningListByFirmwareMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
25
+ "00000000-0000-0000-0000-000000000000";
26
26
  const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
27
  const workspaceName = "default";
28
- const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
31
  const resArray = new Array();
32
32
  try {
33
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoKeyList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
33
+ for (var _d = true, _e = __asyncValues(client.binaryHardening.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
34
  _c = _f.value;
35
35
  _d = false;
36
36
  let item = _c;
@@ -48,25 +48,24 @@ function firmwareListGenerateCryptoKeyListMaximumSetGen() {
48
48
  });
49
49
  }
50
50
  /**
51
- * This sample demonstrates how to The operation to list all crypto keys for a firmware.
51
+ * This sample demonstrates how to Lists binary hardening analysis results of a firmware.
52
52
  *
53
- * @summary The operation to list all crypto keys for a firmware.
54
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MinimumSet_Gen.json
53
+ * @summary Lists binary hardening analysis results of a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MinimumSet_Gen.json
55
55
  */
56
- function firmwareListGenerateCryptoKeyListMinimumSetGen() {
56
+ function binaryHardeningListByFirmwareMinimumSetGen() {
57
57
  var _a, e_2, _b, _c;
58
58
  return __awaiter(this, void 0, void 0, function* () {
59
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
60
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
61
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
62
- "rgworkspaces-firmwares";
63
- const workspaceName = "j5QE_";
64
- const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
65
64
  const credential = new DefaultAzureCredential();
66
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
67
66
  const resArray = new Array();
68
67
  try {
69
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoKeyList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
68
+ for (var _d = true, _e = __asyncValues(client.binaryHardening.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
70
69
  _c = _f.value;
71
70
  _d = false;
72
71
  let item = _c;
@@ -85,9 +84,9 @@ function firmwareListGenerateCryptoKeyListMinimumSetGen() {
85
84
  }
86
85
  function main() {
87
86
  return __awaiter(this, void 0, void 0, function* () {
88
- firmwareListGenerateCryptoKeyListMaximumSetGen();
89
- firmwareListGenerateCryptoKeyListMinimumSetGen();
87
+ binaryHardeningListByFirmwareMaximumSetGen();
88
+ binaryHardeningListByFirmwareMinimumSetGen();
90
89
  });
91
90
  }
92
91
  main().catch(console.error);
93
- //# sourceMappingURL=firmwareListGenerateCryptoKeyListSample.js.map
92
+ //# sourceMappingURL=binaryHardeningListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"binaryHardeningListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/binaryHardeningListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,0CAA0C;;;QACvD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,eAAe,CAAC,cAAc,CAC1D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,0CAA0C;;;QACvD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,eAAe,CAAC,cAAc,CAC1D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,0CAA0C,EAAE,CAAC;QAC7C,0CAA0C,EAAE,CAAC;IAC/C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=cryptoCertificatesListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoCertificatesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cryptoCertificatesListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -13,25 +13,24 @@ import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
15
15
  /**
16
- * This sample demonstrates how to The operation to list all components result for a firmware.
16
+ * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware.
17
17
  *
18
- * @summary The operation to list all components result for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MaximumSet_Gen.json
18
+ * @summary Lists cryptographic certificate analysis results found in a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListGenerateComponentListMaximumSetGen() {
21
+ function cryptoCertificatesListByFirmwareMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
26
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
27
- "rgworkspaces-firmwares";
28
- const workspaceName = "A7";
29
- const firmwareId = "umrkdttp";
25
+ "00000000-0000-0000-0000-000000000000";
26
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
+ const workspaceName = "default";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
30
29
  const credential = new DefaultAzureCredential();
31
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
32
31
  const resArray = new Array();
33
32
  try {
34
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateComponentList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
33
+ for (var _d = true, _e = __asyncValues(client.cryptoCertificates.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
35
34
  _c = _f.value;
36
35
  _d = false;
37
36
  let item = _c;
@@ -49,25 +48,24 @@ function firmwareListGenerateComponentListMaximumSetGen() {
49
48
  });
50
49
  }
51
50
  /**
52
- * This sample demonstrates how to The operation to list all components result for a firmware.
51
+ * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware.
53
52
  *
54
- * @summary The operation to list all components result for a firmware.
55
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MinimumSet_Gen.json
53
+ * @summary Lists cryptographic certificate analysis results found in a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MinimumSet_Gen.json
56
55
  */
57
- function firmwareListGenerateComponentListMinimumSetGen() {
56
+ function cryptoCertificatesListByFirmwareMinimumSetGen() {
58
57
  var _a, e_2, _b, _c;
59
58
  return __awaiter(this, void 0, void 0, function* () {
60
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
61
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
62
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
63
- "rgworkspaces-firmwares";
64
- const workspaceName = "A7";
65
- const firmwareId = "umrkdttp";
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
66
64
  const credential = new DefaultAzureCredential();
67
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
68
66
  const resArray = new Array();
69
67
  try {
70
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateComponentList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
68
+ for (var _d = true, _e = __asyncValues(client.cryptoCertificates.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
71
69
  _c = _f.value;
72
70
  _d = false;
73
71
  let item = _c;
@@ -86,9 +84,9 @@ function firmwareListGenerateComponentListMinimumSetGen() {
86
84
  }
87
85
  function main() {
88
86
  return __awaiter(this, void 0, void 0, function* () {
89
- firmwareListGenerateComponentListMaximumSetGen();
90
- firmwareListGenerateComponentListMinimumSetGen();
87
+ cryptoCertificatesListByFirmwareMaximumSetGen();
88
+ cryptoCertificatesListByFirmwareMinimumSetGen();
91
89
  });
92
90
  }
93
91
  main().catch(console.error);
94
- //# sourceMappingURL=firmwareListGenerateComponentListSample.js.map
92
+ //# sourceMappingURL=cryptoCertificatesListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoCertificatesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cryptoCertificatesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,cAAc,CAC7D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,cAAc,CAC7D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;QAChD,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=cryptoKeysListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoKeysListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cryptoKeysListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -13,24 +13,24 @@ import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
15
15
  /**
16
- * This sample demonstrates how to The operation to list all crypto certificates for a firmware.
16
+ * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware.
17
17
  *
18
- * @summary The operation to list all crypto certificates for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json
18
+ * @summary Lists cryptographic key analysis results found in a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListGenerateCryptoCertificateListMaximumSetGen() {
21
+ function cryptoKeysListByFirmwareMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
25
+ "00000000-0000-0000-0000-000000000000";
26
26
  const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
27
  const workspaceName = "default";
28
- const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
31
  const resArray = new Array();
32
32
  try {
33
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoCertificateList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
33
+ for (var _d = true, _e = __asyncValues(client.cryptoKeys.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
34
  _c = _f.value;
35
35
  _d = false;
36
36
  let item = _c;
@@ -48,25 +48,24 @@ function firmwareListGenerateCryptoCertificateListMaximumSetGen() {
48
48
  });
49
49
  }
50
50
  /**
51
- * This sample demonstrates how to The operation to list all crypto certificates for a firmware.
51
+ * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware.
52
52
  *
53
- * @summary The operation to list all crypto certificates for a firmware.
54
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MinimumSet_Gen.json
53
+ * @summary Lists cryptographic key analysis results found in a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MinimumSet_Gen.json
55
55
  */
56
- function firmwareListGenerateCryptoCertificateListMinimumSetGen() {
56
+ function cryptoKeysListByFirmwareMinimumSetGen() {
57
57
  var _a, e_2, _b, _c;
58
58
  return __awaiter(this, void 0, void 0, function* () {
59
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
60
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
61
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
62
- "rgworkspaces-firmwares";
63
- const workspaceName = "j5QE_";
64
- const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
65
64
  const credential = new DefaultAzureCredential();
66
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
67
66
  const resArray = new Array();
68
67
  try {
69
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoCertificateList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
68
+ for (var _d = true, _e = __asyncValues(client.cryptoKeys.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
70
69
  _c = _f.value;
71
70
  _d = false;
72
71
  let item = _c;
@@ -85,9 +84,9 @@ function firmwareListGenerateCryptoCertificateListMinimumSetGen() {
85
84
  }
86
85
  function main() {
87
86
  return __awaiter(this, void 0, void 0, function* () {
88
- firmwareListGenerateCryptoCertificateListMaximumSetGen();
89
- firmwareListGenerateCryptoCertificateListMinimumSetGen();
87
+ cryptoKeysListByFirmwareMaximumSetGen();
88
+ cryptoKeysListByFirmwareMinimumSetGen();
90
89
  });
91
90
  }
92
91
  main().catch(console.error);
93
- //# sourceMappingURL=firmwareListGenerateCryptoCertificateListSample.js.map
92
+ //# sourceMappingURL=cryptoKeysListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoKeysListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cryptoKeysListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,UAAU,CAAC,cAAc,CACrD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,UAAU,CAAC,cAAc,CACrD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,qCAAqC,EAAE,CAAC;QACxC,qCAAqC,EAAE,CAAC;IAC1C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=cvesListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cvesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cvesListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -13,25 +13,24 @@ import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
15
15
  /**
16
- * This sample demonstrates how to The operation to list all cve results for a firmware.
16
+ * This sample demonstrates how to Lists CVE analysis results of a firmware.
17
17
  *
18
- * @summary The operation to list all cve results for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MaximumSet_Gen.json
18
+ * @summary Lists CVE analysis results of a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListGenerateCveListMaximumSetGen() {
21
+ function cvesListByFirmwareMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
26
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
27
- "rgworkspaces-firmwares";
28
- const workspaceName = "A7";
29
- const firmwareId = "umrkdttp";
25
+ "00000000-0000-0000-0000-000000000000";
26
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
+ const workspaceName = "default";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
30
29
  const credential = new DefaultAzureCredential();
31
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
32
31
  const resArray = new Array();
33
32
  try {
34
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCveList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
33
+ for (var _d = true, _e = __asyncValues(client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
35
34
  _c = _f.value;
36
35
  _d = false;
37
36
  let item = _c;
@@ -49,25 +48,24 @@ function firmwareListGenerateCveListMaximumSetGen() {
49
48
  });
50
49
  }
51
50
  /**
52
- * This sample demonstrates how to The operation to list all cve results for a firmware.
51
+ * This sample demonstrates how to Lists CVE analysis results of a firmware.
53
52
  *
54
- * @summary The operation to list all cve results for a firmware.
55
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MinimumSet_Gen.json
53
+ * @summary Lists CVE analysis results of a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MinimumSet_Gen.json
56
55
  */
57
- function firmwareListGenerateCveListMinimumSetGen() {
56
+ function cvesListByFirmwareMinimumSetGen() {
58
57
  var _a, e_2, _b, _c;
59
58
  return __awaiter(this, void 0, void 0, function* () {
60
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
61
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
62
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
63
- "rgworkspaces-firmwares";
64
- const workspaceName = "A7";
65
- const firmwareId = "umrkdttp";
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
66
64
  const credential = new DefaultAzureCredential();
67
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
68
66
  const resArray = new Array();
69
67
  try {
70
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCveList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
68
+ for (var _d = true, _e = __asyncValues(client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
71
69
  _c = _f.value;
72
70
  _d = false;
73
71
  let item = _c;
@@ -86,9 +84,9 @@ function firmwareListGenerateCveListMinimumSetGen() {
86
84
  }
87
85
  function main() {
88
86
  return __awaiter(this, void 0, void 0, function* () {
89
- firmwareListGenerateCveListMaximumSetGen();
90
- firmwareListGenerateCveListMinimumSetGen();
87
+ cvesListByFirmwareMaximumSetGen();
88
+ cvesListByFirmwareMinimumSetGen();
91
89
  });
92
90
  }
93
91
  main().catch(console.error);
94
- //# sourceMappingURL=firmwareListGenerateCveListSample.js.map
92
+ //# sourceMappingURL=cvesListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cvesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cvesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,+BAA+B;;;QAC5C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,IAAI,CAAC,cAAc,CAC/C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,+BAA+B;;;QAC5C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,IAAI,CAAC,cAAc,CAC/C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,+BAA+B,EAAE,CAAC;QAClC,+BAA+B,EAAE,CAAC;IACpC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresCreateSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresCreateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresCreateSample.ts"],"names":[],"mappings":""}
@@ -8,7 +8,7 @@
8
8
  import { __awaiter } from "tslib";
9
9
  // Copyright (c) Microsoft Corporation.
10
10
  // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
11
+ import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
12
12
  import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to The operation to create a firmware.
17
17
  *
18
18
  * @summary The operation to create a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json
20
20
  */
21
- function firmwareCreateMaximumSetGen() {
21
+ function firmwaresCreateMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -27,18 +27,20 @@ function firmwareCreateMaximumSetGen() {
27
27
  const workspaceName = "A7";
28
28
  const firmwareId = "umrkdttp";
29
29
  const firmware = {
30
- description: "uz",
31
- fileName: "wresexxulcdsdd",
32
- fileSize: 17,
33
- model: "f",
34
- status: "Pending",
35
- statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
36
- vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
37
- version: "s"
30
+ properties: {
31
+ description: "uz",
32
+ fileName: "wresexxulcdsdd",
33
+ fileSize: 17,
34
+ model: "f",
35
+ status: "Pending",
36
+ statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
37
+ vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
38
+ version: "s",
39
+ },
38
40
  };
39
41
  const credential = new DefaultAzureCredential();
40
42
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
41
- const result = yield client.firmwareOperations.create(resourceGroupName, workspaceName, firmwareId, firmware);
43
+ const result = yield client.firmwares.create(resourceGroupName, workspaceName, firmwareId, firmware);
42
44
  console.log(result);
43
45
  });
44
46
  }
@@ -46,9 +48,9 @@ function firmwareCreateMaximumSetGen() {
46
48
  * This sample demonstrates how to The operation to create a firmware.
47
49
  *
48
50
  * @summary The operation to create a firmware.
49
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MinimumSet_Gen.json
51
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MinimumSet_Gen.json
50
52
  */
51
- function firmwareCreateMinimumSetGen() {
53
+ function firmwaresCreateMinimumSetGen() {
52
54
  return __awaiter(this, void 0, void 0, function* () {
53
55
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
54
56
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -59,15 +61,15 @@ function firmwareCreateMinimumSetGen() {
59
61
  const firmware = {};
60
62
  const credential = new DefaultAzureCredential();
61
63
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
62
- const result = yield client.firmwareOperations.create(resourceGroupName, workspaceName, firmwareId, firmware);
64
+ const result = yield client.firmwares.create(resourceGroupName, workspaceName, firmwareId, firmware);
63
65
  console.log(result);
64
66
  });
65
67
  }
66
68
  function main() {
67
69
  return __awaiter(this, void 0, void 0, function* () {
68
- firmwareCreateMaximumSetGen();
69
- firmwareCreateMinimumSetGen();
70
+ firmwaresCreateMaximumSetGen();
71
+ firmwaresCreateMinimumSetGen();
70
72
  });
71
73
  }
72
74
  main().catch(console.error);
73
- //# sourceMappingURL=firmwareCreateSample.js.map
75
+ //# sourceMappingURL=firmwaresCreateSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresCreateSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresCreateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa;YACzB,UAAU,EAAE;gBACV,WAAW,EAAE,IAAI;gBACjB,QAAQ,EAAE,gBAAgB;gBAC1B,QAAQ,EAAE,EAAE;gBACZ,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,SAAS;gBACjB,cAAc,EAAE,CAAC,EAAE,OAAO,EAAE,uBAAuB,EAAE,CAAC;gBACtD,MAAM,EAAE,+BAA+B;gBACvC,OAAO,EAAE,GAAG;aACb;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa,EAAE,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,4BAA4B,EAAE,CAAC;QAC/B,4BAA4B,EAAE,CAAC;IACjC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresDeleteSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresDeleteSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresDeleteSample.ts"],"names":[],"mappings":""}
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to The operation to delete a firmware.
17
17
  *
18
18
  * @summary The operation to delete a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json
20
20
  */
21
- function firmwareDeleteMaximumSetGen() {
21
+ function firmwaresDeleteMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -28,7 +28,7 @@ function firmwareDeleteMaximumSetGen() {
28
28
  const firmwareId = "umrkdttp";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.delete(resourceGroupName, workspaceName, firmwareId);
31
+ const result = yield client.firmwares.delete(resourceGroupName, workspaceName, firmwareId);
32
32
  console.log(result);
33
33
  });
34
34
  }
@@ -36,9 +36,9 @@ function firmwareDeleteMaximumSetGen() {
36
36
  * This sample demonstrates how to The operation to delete a firmware.
37
37
  *
38
38
  * @summary The operation to delete a firmware.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MinimumSet_Gen.json
39
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MinimumSet_Gen.json
40
40
  */
41
- function firmwareDeleteMinimumSetGen() {
41
+ function firmwaresDeleteMinimumSetGen() {
42
42
  return __awaiter(this, void 0, void 0, function* () {
43
43
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
44
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -48,15 +48,15 @@ function firmwareDeleteMinimumSetGen() {
48
48
  const firmwareId = "umrkdttp";
49
49
  const credential = new DefaultAzureCredential();
50
50
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.delete(resourceGroupName, workspaceName, firmwareId);
51
+ const result = yield client.firmwares.delete(resourceGroupName, workspaceName, firmwareId);
52
52
  console.log(result);
53
53
  });
54
54
  }
55
55
  function main() {
56
56
  return __awaiter(this, void 0, void 0, function* () {
57
- firmwareDeleteMaximumSetGen();
58
- firmwareDeleteMinimumSetGen();
57
+ firmwaresDeleteMaximumSetGen();
58
+ firmwaresDeleteMinimumSetGen();
59
59
  });
60
60
  }
61
61
  main().catch(console.error);
62
- //# sourceMappingURL=firmwareDeleteSample.js.map
62
+ //# sourceMappingURL=firmwaresDeleteSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresDeleteSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresDeleteSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,4BAA4B,EAAE,CAAC;QAC/B,4BAA4B,EAAE,CAAC;IACjC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresGenerateDownloadUrlSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresGenerateDownloadUrlSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresGenerateDownloadUrlSample.ts"],"names":[],"mappings":""}