@azure/arm-iotfirmwaredefense 1.0.0-alpha.20240307.1 → 1.0.0-alpha.20240322.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (278) hide show
  1. package/CHANGELOG.md +2 -12
  2. package/LICENSE +1 -1
  3. package/README.md +2 -2
  4. package/dist/index.js +2254 -2121
  5. package/dist/index.js.map +1 -1
  6. package/dist/index.min.js +1 -1
  7. package/dist/index.min.js.map +1 -1
  8. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts +2 -0
  9. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts.map +1 -0
  10. package/dist-esm/samples-dev/{firmwareListGenerateCryptoKeyListSample.js → binaryHardeningListByFirmwareSample.js} +19 -20
  11. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.js.map +1 -0
  12. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts +2 -0
  13. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts.map +1 -0
  14. package/dist-esm/samples-dev/{firmwareListGenerateComponentListSample.js → cryptoCertificatesListByFirmwareSample.js} +21 -23
  15. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.js.map +1 -0
  16. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts +2 -0
  17. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts.map +1 -0
  18. package/dist-esm/samples-dev/{firmwareListGenerateCryptoCertificateListSample.js → cryptoKeysListByFirmwareSample.js} +19 -20
  19. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.js.map +1 -0
  20. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts +2 -0
  21. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts.map +1 -0
  22. package/dist-esm/samples-dev/{firmwareListGenerateCveListSample.js → cvesListByFirmwareSample.js} +21 -23
  23. package/dist-esm/samples-dev/cvesListByFirmwareSample.js.map +1 -0
  24. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts +2 -0
  25. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts.map +1 -0
  26. package/dist-esm/samples-dev/{firmwareCreateSample.js → firmwaresCreateSample.js} +20 -18
  27. package/dist-esm/samples-dev/firmwaresCreateSample.js.map +1 -0
  28. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts +2 -0
  29. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts.map +1 -0
  30. package/dist-esm/samples-dev/{firmwareDeleteSample.js → firmwaresDeleteSample.js} +9 -9
  31. package/dist-esm/samples-dev/firmwaresDeleteSample.js.map +1 -0
  32. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts +2 -0
  33. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts.map +1 -0
  34. package/dist-esm/samples-dev/{firmwareGenerateDownloadUrlSample.js → firmwaresGenerateDownloadUrlSample.js} +9 -9
  35. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.js.map +1 -0
  36. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts +2 -0
  37. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
  38. package/dist-esm/samples-dev/{firmwareGenerateFilesystemDownloadUrlSample.js → firmwaresGenerateFilesystemDownloadUrlSample.js} +9 -9
  39. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.js.map +1 -0
  40. package/dist-esm/samples-dev/firmwaresGetSample.d.ts +2 -0
  41. package/dist-esm/samples-dev/firmwaresGetSample.d.ts.map +1 -0
  42. package/dist-esm/samples-dev/{firmwareGetSample.js → firmwaresGetSample.js} +9 -9
  43. package/dist-esm/samples-dev/firmwaresGetSample.js.map +1 -0
  44. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts +2 -0
  45. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts.map +1 -0
  46. package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js} +9 -9
  47. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.js.map +1 -0
  48. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts +2 -0
  49. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts.map +1 -0
  50. package/dist-esm/samples-dev/{firmwareUpdateSample.js → firmwaresUpdateSample.js} +20 -18
  51. package/dist-esm/samples-dev/firmwaresUpdateSample.js.map +1 -0
  52. package/dist-esm/samples-dev/operationsListSample.js +2 -2
  53. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts +2 -0
  54. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts.map +1 -0
  55. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js +92 -0
  56. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js.map +1 -0
  57. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts +2 -0
  58. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts.map +1 -0
  59. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js +92 -0
  60. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js.map +1 -0
  61. package/dist-esm/samples-dev/summariesGetSample.d.ts +2 -0
  62. package/dist-esm/samples-dev/summariesGetSample.d.ts.map +1 -0
  63. package/dist-esm/samples-dev/{firmwareGenerateSummarySample.js → summariesGetSample.js} +23 -23
  64. package/dist-esm/samples-dev/summariesGetSample.js.map +1 -0
  65. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts +2 -0
  66. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts.map +1 -0
  67. package/dist-esm/samples-dev/{firmwareListGenerateBinaryHardeningListSample.js → summariesListByFirmwareSample.js} +21 -23
  68. package/dist-esm/samples-dev/summariesListByFirmwareSample.js.map +1 -0
  69. package/dist-esm/samples-dev/workspacesCreateSample.js +5 -4
  70. package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -1
  71. package/dist-esm/samples-dev/workspacesDeleteSample.js +2 -2
  72. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +4 -4
  73. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -1
  74. package/dist-esm/samples-dev/workspacesGetSample.js +2 -2
  75. package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +2 -2
  76. package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +2 -2
  77. package/dist-esm/samples-dev/workspacesUpdateSample.js +4 -4
  78. package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -1
  79. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +11 -4
  80. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -1
  81. package/dist-esm/src/ioTFirmwareDefenseClient.js +19 -12
  82. package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -1
  83. package/dist-esm/src/models/index.d.ts +516 -602
  84. package/dist-esm/src/models/index.d.ts.map +1 -1
  85. package/dist-esm/src/models/index.js +40 -92
  86. package/dist-esm/src/models/index.js.map +1 -1
  87. package/dist-esm/src/models/mappers.d.ts +45 -25
  88. package/dist-esm/src/models/mappers.d.ts.map +1 -1
  89. package/dist-esm/src/models/mappers.js +1120 -1036
  90. package/dist-esm/src/models/mappers.js.map +1 -1
  91. package/dist-esm/src/models/parameters.d.ts +3 -2
  92. package/dist-esm/src/models/parameters.d.ts.map +1 -1
  93. package/dist-esm/src/models/parameters.js +56 -49
  94. package/dist-esm/src/models/parameters.js.map +1 -1
  95. package/dist-esm/src/operations/binaryHardening.d.ts +41 -0
  96. package/dist-esm/src/operations/binaryHardening.d.ts.map +1 -0
  97. package/dist-esm/src/operations/binaryHardening.js +155 -0
  98. package/dist-esm/src/operations/binaryHardening.js.map +1 -0
  99. package/dist-esm/src/operations/cryptoCertificates.d.ts +41 -0
  100. package/dist-esm/src/operations/cryptoCertificates.d.ts.map +1 -0
  101. package/dist-esm/src/operations/cryptoCertificates.js +155 -0
  102. package/dist-esm/src/operations/cryptoCertificates.js.map +1 -0
  103. package/dist-esm/src/operations/cryptoKeys.d.ts +41 -0
  104. package/dist-esm/src/operations/cryptoKeys.d.ts.map +1 -0
  105. package/dist-esm/src/operations/cryptoKeys.js +155 -0
  106. package/dist-esm/src/operations/cryptoKeys.js.map +1 -0
  107. package/dist-esm/src/operations/cves.d.ts +41 -0
  108. package/dist-esm/src/operations/cves.d.ts.map +1 -0
  109. package/dist-esm/src/operations/cves.js +155 -0
  110. package/dist-esm/src/operations/cves.js.map +1 -0
  111. package/dist-esm/src/operations/firmwares.d.ts +88 -0
  112. package/dist-esm/src/operations/firmwares.d.ts.map +1 -0
  113. package/dist-esm/src/operations/firmwares.js +350 -0
  114. package/dist-esm/src/operations/firmwares.js.map +1 -0
  115. package/dist-esm/src/operations/index.d.ts +9 -2
  116. package/dist-esm/src/operations/index.d.ts.map +1 -1
  117. package/dist-esm/src/operations/index.js +9 -2
  118. package/dist-esm/src/operations/index.js.map +1 -1
  119. package/dist-esm/src/operations/operations.js +9 -9
  120. package/dist-esm/src/operations/passwordHashes.d.ts +41 -0
  121. package/dist-esm/src/operations/passwordHashes.d.ts.map +1 -0
  122. package/dist-esm/src/operations/passwordHashes.js +155 -0
  123. package/dist-esm/src/operations/passwordHashes.js.map +1 -0
  124. package/dist-esm/src/operations/sbomComponents.d.ts +41 -0
  125. package/dist-esm/src/operations/sbomComponents.d.ts.map +1 -0
  126. package/dist-esm/src/operations/sbomComponents.js +155 -0
  127. package/dist-esm/src/operations/sbomComponents.js.map +1 -0
  128. package/dist-esm/src/operations/summaries.d.ts +52 -0
  129. package/dist-esm/src/operations/summaries.d.ts.map +1 -0
  130. package/dist-esm/src/operations/summaries.js +191 -0
  131. package/dist-esm/src/operations/summaries.js.map +1 -0
  132. package/dist-esm/src/operations/workspaces.js +46 -50
  133. package/dist-esm/src/operations/workspaces.js.map +1 -1
  134. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts +14 -0
  135. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts.map +1 -0
  136. package/dist-esm/src/operationsInterfaces/{firmwareOperations.js → binaryHardening.js} +1 -1
  137. package/dist-esm/src/operationsInterfaces/binaryHardening.js.map +1 -0
  138. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts +14 -0
  139. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts.map +1 -0
  140. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js +9 -0
  141. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js.map +1 -0
  142. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts +14 -0
  143. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts.map +1 -0
  144. package/dist-esm/src/operationsInterfaces/cryptoKeys.js +9 -0
  145. package/dist-esm/src/operationsInterfaces/cryptoKeys.js.map +1 -0
  146. package/dist-esm/src/operationsInterfaces/cves.d.ts +14 -0
  147. package/dist-esm/src/operationsInterfaces/cves.d.ts.map +1 -0
  148. package/dist-esm/src/operationsInterfaces/cves.js +9 -0
  149. package/dist-esm/src/operationsInterfaces/cves.js.map +1 -0
  150. package/dist-esm/src/operationsInterfaces/firmwares.d.ts +63 -0
  151. package/dist-esm/src/operationsInterfaces/firmwares.d.ts.map +1 -0
  152. package/dist-esm/src/operationsInterfaces/firmwares.js +9 -0
  153. package/dist-esm/src/operationsInterfaces/firmwares.js.map +1 -0
  154. package/dist-esm/src/operationsInterfaces/index.d.ts +9 -2
  155. package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
  156. package/dist-esm/src/operationsInterfaces/index.js +9 -2
  157. package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
  158. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts +14 -0
  159. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts.map +1 -0
  160. package/dist-esm/src/operationsInterfaces/passwordHashes.js +9 -0
  161. package/dist-esm/src/operationsInterfaces/passwordHashes.js.map +1 -0
  162. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts +14 -0
  163. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts.map +1 -0
  164. package/dist-esm/src/operationsInterfaces/sbomComponents.js +9 -0
  165. package/dist-esm/src/operationsInterfaces/sbomComponents.js.map +1 -0
  166. package/dist-esm/src/operationsInterfaces/summaries.d.ts +24 -0
  167. package/dist-esm/src/operationsInterfaces/summaries.d.ts.map +1 -0
  168. package/dist-esm/src/operationsInterfaces/summaries.js +9 -0
  169. package/dist-esm/src/operationsInterfaces/summaries.js.map +1 -0
  170. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +1 -1
  171. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -1
  172. package/package.json +8 -8
  173. package/review/arm-iotfirmwaredefense.api.md +329 -330
  174. package/src/ioTFirmwareDefenseClient.ts +53 -24
  175. package/src/models/index.ts +566 -646
  176. package/src/models/mappers.ts +1190 -1036
  177. package/src/models/parameters.ts +59 -51
  178. package/src/operations/binaryHardening.ts +216 -0
  179. package/src/operations/cryptoCertificates.ts +216 -0
  180. package/src/operations/cryptoKeys.ts +216 -0
  181. package/src/operations/cves.ts +216 -0
  182. package/src/operations/firmwares.ts +469 -0
  183. package/src/operations/index.ts +9 -2
  184. package/src/operations/operations.ts +16 -16
  185. package/src/operations/passwordHashes.ts +216 -0
  186. package/src/operations/sbomComponents.ts +216 -0
  187. package/src/operations/summaries.ts +265 -0
  188. package/src/operations/workspaces.ts +81 -92
  189. package/src/operationsInterfaces/binaryHardening.ts +31 -0
  190. package/src/operationsInterfaces/cryptoCertificates.ts +31 -0
  191. package/src/operationsInterfaces/cryptoKeys.ts +31 -0
  192. package/src/operationsInterfaces/cves.ts +28 -0
  193. package/src/operationsInterfaces/firmwares.ts +123 -0
  194. package/src/operationsInterfaces/index.ts +9 -2
  195. package/src/operationsInterfaces/operations.ts +1 -1
  196. package/src/operationsInterfaces/passwordHashes.ts +31 -0
  197. package/src/operationsInterfaces/sbomComponents.ts +31 -0
  198. package/src/operationsInterfaces/summaries.ts +50 -0
  199. package/src/operationsInterfaces/workspaces.ts +8 -8
  200. package/src/pagingHelper.ts +1 -1
  201. package/types/arm-iotfirmwaredefense.d.ts +573 -675
  202. package/types/tsdoc-metadata.json +1 -1
  203. package/dist-esm/samples-dev/firmwareCreateSample.d.ts +0 -2
  204. package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +0 -1
  205. package/dist-esm/samples-dev/firmwareCreateSample.js.map +0 -1
  206. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +0 -2
  207. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +0 -1
  208. package/dist-esm/samples-dev/firmwareDeleteSample.js.map +0 -1
  209. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +0 -2
  210. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +0 -1
  211. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +0 -62
  212. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +0 -1
  213. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +0 -2
  214. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +0 -1
  215. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +0 -62
  216. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +0 -1
  217. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +0 -2
  218. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +0 -1
  219. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +0 -62
  220. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +0 -1
  221. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +0 -2
  222. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +0 -1
  223. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +0 -61
  224. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +0 -1
  225. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +0 -2
  226. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +0 -1
  227. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +0 -61
  228. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +0 -1
  229. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +0 -2
  230. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +0 -1
  231. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +0 -62
  232. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +0 -1
  233. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +0 -2
  234. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +0 -1
  235. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +0 -1
  236. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +0 -2
  237. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +0 -1
  238. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +0 -1
  239. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +0 -2
  240. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +0 -1
  241. package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +0 -1
  242. package/dist-esm/samples-dev/firmwareGetSample.d.ts +0 -2
  243. package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +0 -1
  244. package/dist-esm/samples-dev/firmwareGetSample.js.map +0 -1
  245. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +0 -2
  246. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +0 -1
  247. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +0 -1
  248. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +0 -2
  249. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +0 -1
  250. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +0 -1
  251. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +0 -2
  252. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +0 -1
  253. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +0 -1
  254. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +0 -2
  255. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +0 -1
  256. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +0 -1
  257. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +0 -2
  258. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +0 -1
  259. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +0 -1
  260. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +0 -2
  261. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +0 -1
  262. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +0 -1
  263. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +0 -2
  264. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +0 -1
  265. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +0 -94
  266. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +0 -1
  267. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +0 -2
  268. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +0 -1
  269. package/dist-esm/samples-dev/firmwareUpdateSample.js.map +0 -1
  270. package/dist-esm/src/operations/firmwareOperations.d.ts +0 -313
  271. package/dist-esm/src/operations/firmwareOperations.d.ts.map +0 -1
  272. package/dist-esm/src/operations/firmwareOperations.js +0 -1358
  273. package/dist-esm/src/operations/firmwareOperations.js.map +0 -1
  274. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +0 -169
  275. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +0 -1
  276. package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +0 -1
  277. package/src/operations/firmwareOperations.ts +0 -1892
  278. package/src/operationsInterfaces/firmwareOperations.ts +0 -320
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to The operation to a url for file download.
17
17
  *
18
18
  * @summary The operation to a url for file download.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MaximumSet_Gen.json
20
20
  */
21
- function firmwareGenerateDownloadUrlMaximumSetGen() {
21
+ function firmwaresGenerateDownloadUrlMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -28,7 +28,7 @@ function firmwareGenerateDownloadUrlMaximumSetGen() {
28
28
  const firmwareId = "umrkdttp";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
31
+ const result = yield client.firmwares.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
32
32
  console.log(result);
33
33
  });
34
34
  }
@@ -36,9 +36,9 @@ function firmwareGenerateDownloadUrlMaximumSetGen() {
36
36
  * This sample demonstrates how to The operation to a url for file download.
37
37
  *
38
38
  * @summary The operation to a url for file download.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MinimumSet_Gen.json
39
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MinimumSet_Gen.json
40
40
  */
41
- function firmwareGenerateDownloadUrlMinimumSetGen() {
41
+ function firmwaresGenerateDownloadUrlMinimumSetGen() {
42
42
  return __awaiter(this, void 0, void 0, function* () {
43
43
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
44
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -48,15 +48,15 @@ function firmwareGenerateDownloadUrlMinimumSetGen() {
48
48
  const firmwareId = "umrkdttp";
49
49
  const credential = new DefaultAzureCredential();
50
50
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
51
+ const result = yield client.firmwares.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
52
52
  console.log(result);
53
53
  });
54
54
  }
55
55
  function main() {
56
56
  return __awaiter(this, void 0, void 0, function* () {
57
- firmwareGenerateDownloadUrlMaximumSetGen();
58
- firmwareGenerateDownloadUrlMinimumSetGen();
57
+ firmwaresGenerateDownloadUrlMaximumSetGen();
58
+ firmwaresGenerateDownloadUrlMinimumSetGen();
59
59
  });
60
60
  }
61
61
  main().catch(console.error);
62
- //# sourceMappingURL=firmwareGenerateDownloadUrlSample.js.map
62
+ //# sourceMappingURL=firmwaresGenerateDownloadUrlSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresGenerateDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresGenerateDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yCAAyC;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,mBAAmB,CACvD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,yCAAyC;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,mBAAmB,CACvD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,yCAAyC,EAAE,CAAC;QAC5C,yCAAyC,EAAE,CAAC;IAC9C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresGenerateFilesystemDownloadUrlSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":""}
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to The operation to a url for tar file download.
17
17
  *
18
18
  * @summary The operation to a url for tar file download.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json
20
20
  */
21
- function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() {
21
+ function firmwaresGenerateFilesystemDownloadUrlMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -28,7 +28,7 @@ function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() {
28
28
  const firmwareId = "umrkdttp";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
31
+ const result = yield client.firmwares.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
32
32
  console.log(result);
33
33
  });
34
34
  }
@@ -36,9 +36,9 @@ function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() {
36
36
  * This sample demonstrates how to The operation to a url for tar file download.
37
37
  *
38
38
  * @summary The operation to a url for tar file download.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json
39
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json
40
40
  */
41
- function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() {
41
+ function firmwaresGenerateFilesystemDownloadUrlMinimumSetGen() {
42
42
  return __awaiter(this, void 0, void 0, function* () {
43
43
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
44
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -48,15 +48,15 @@ function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() {
48
48
  const firmwareId = "umrkdttp";
49
49
  const credential = new DefaultAzureCredential();
50
50
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
51
+ const result = yield client.firmwares.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
52
52
  console.log(result);
53
53
  });
54
54
  }
55
55
  function main() {
56
56
  return __awaiter(this, void 0, void 0, function* () {
57
- firmwareGenerateFilesystemDownloadUrlMaximumSetGen();
58
- firmwareGenerateFilesystemDownloadUrlMinimumSetGen();
57
+ firmwaresGenerateFilesystemDownloadUrlMaximumSetGen();
58
+ firmwaresGenerateFilesystemDownloadUrlMinimumSetGen();
59
59
  });
60
60
  }
61
61
  main().catch(console.error);
62
- //# sourceMappingURL=firmwareGenerateFilesystemDownloadUrlSample.js.map
62
+ //# sourceMappingURL=firmwaresGenerateFilesystemDownloadUrlSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresGenerateFilesystemDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,6BAA6B,CACjE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,6BAA6B,CACjE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,mDAAmD,EAAE,CAAC;QACtD,mDAAmD,EAAE,CAAC;IACxD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresGetSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresGetSample.ts"],"names":[],"mappings":""}
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to Get firmware.
17
17
  *
18
18
  * @summary Get firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MaximumSet_Gen.json
20
20
  */
21
- function firmwareGetMaximumSetGen() {
21
+ function firmwaresGetMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -28,7 +28,7 @@ function firmwareGetMaximumSetGen() {
28
28
  const firmwareId = "umrkdttp";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.get(resourceGroupName, workspaceName, firmwareId);
31
+ const result = yield client.firmwares.get(resourceGroupName, workspaceName, firmwareId);
32
32
  console.log(result);
33
33
  });
34
34
  }
@@ -36,9 +36,9 @@ function firmwareGetMaximumSetGen() {
36
36
  * This sample demonstrates how to Get firmware.
37
37
  *
38
38
  * @summary Get firmware.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MinimumSet_Gen.json
39
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MinimumSet_Gen.json
40
40
  */
41
- function firmwareGetMinimumSetGen() {
41
+ function firmwaresGetMinimumSetGen() {
42
42
  return __awaiter(this, void 0, void 0, function* () {
43
43
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
44
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -48,15 +48,15 @@ function firmwareGetMinimumSetGen() {
48
48
  const firmwareId = "umrkdttp";
49
49
  const credential = new DefaultAzureCredential();
50
50
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.get(resourceGroupName, workspaceName, firmwareId);
51
+ const result = yield client.firmwares.get(resourceGroupName, workspaceName, firmwareId);
52
52
  console.log(result);
53
53
  });
54
54
  }
55
55
  function main() {
56
56
  return __awaiter(this, void 0, void 0, function* () {
57
- firmwareGetMaximumSetGen();
58
- firmwareGetMinimumSetGen();
57
+ firmwaresGetMaximumSetGen();
58
+ firmwaresGetMinimumSetGen();
59
59
  });
60
60
  }
61
61
  main().catch(console.error);
62
- //# sourceMappingURL=firmwareGetSample.js.map
62
+ //# sourceMappingURL=firmwaresGetSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresGetSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresGetSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yBAAyB;;QACtC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,GAAG,CACvC,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,yBAAyB;;QACtC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,GAAG,CACvC,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,yBAAyB,EAAE,CAAC;QAC5B,yBAAyB,EAAE,CAAC;IAC9B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresListByWorkspaceSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresListByWorkspaceSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresListByWorkspaceSample.ts"],"names":[],"mappings":""}
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to Lists all of firmwares inside a workspace.
17
17
  *
18
18
  * @summary Lists all of firmwares inside a workspace.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListByWorkspaceMaximumSetGen() {
21
+ function firmwaresListByWorkspaceMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
@@ -30,7 +30,7 @@ function firmwareListByWorkspaceMaximumSetGen() {
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
31
  const resArray = new Array();
32
32
  try {
33
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
33
+ for (var _d = true, _e = __asyncValues(client.firmwares.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
34
  _c = _f.value;
35
35
  _d = false;
36
36
  let item = _c;
@@ -51,9 +51,9 @@ function firmwareListByWorkspaceMaximumSetGen() {
51
51
  * This sample demonstrates how to Lists all of firmwares inside a workspace.
52
52
  *
53
53
  * @summary Lists all of firmwares inside a workspace.
54
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MinimumSet_Gen.json
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MinimumSet_Gen.json
55
55
  */
56
- function firmwareListByWorkspaceMinimumSetGen() {
56
+ function firmwaresListByWorkspaceMinimumSetGen() {
57
57
  var _a, e_2, _b, _c;
58
58
  return __awaiter(this, void 0, void 0, function* () {
59
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
@@ -65,7 +65,7 @@ function firmwareListByWorkspaceMinimumSetGen() {
65
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
66
66
  const resArray = new Array();
67
67
  try {
68
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
68
+ for (var _d = true, _e = __asyncValues(client.firmwares.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
69
69
  _c = _f.value;
70
70
  _d = false;
71
71
  let item = _c;
@@ -84,9 +84,9 @@ function firmwareListByWorkspaceMinimumSetGen() {
84
84
  }
85
85
  function main() {
86
86
  return __awaiter(this, void 0, void 0, function* () {
87
- firmwareListByWorkspaceMaximumSetGen();
88
- firmwareListByWorkspaceMinimumSetGen();
87
+ firmwaresListByWorkspaceMaximumSetGen();
88
+ firmwaresListByWorkspaceMinimumSetGen();
89
89
  });
90
90
  }
91
91
  main().catch(console.error);
92
- //# sourceMappingURL=firmwareListByWorkspaceSample.js.map
92
+ //# sourceMappingURL=firmwaresListByWorkspaceSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresListByWorkspaceSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresListByWorkspaceSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,SAAS,CAAC,eAAe,CACrD,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA,sDAAE,CAAC;gBAHmB,cAGtB;gBAHsB,WAGtB;gBAHU,IAAI,IAAI,KAAA,CAAA;gBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,SAAS,CAAC,eAAe,CACrD,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA,sDAAE,CAAC;gBAHmB,cAGtB;gBAHsB,WAGtB;gBAHU,IAAI,IAAI,KAAA,CAAA;gBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,qCAAqC,EAAE,CAAC;QACxC,qCAAqC,EAAE,CAAC;IAC1C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresUpdateSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresUpdateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresUpdateSample.ts"],"names":[],"mappings":""}
@@ -8,7 +8,7 @@
8
8
  import { __awaiter } from "tslib";
9
9
  // Copyright (c) Microsoft Corporation.
10
10
  // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
11
+ import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
12
12
  import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to The operation to update firmware.
17
17
  *
18
18
  * @summary The operation to update firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MaximumSet_Gen.json
20
20
  */
21
- function firmwareUpdateMaximumSetGen() {
21
+ function firmwaresUpdateMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -27,18 +27,20 @@ function firmwareUpdateMaximumSetGen() {
27
27
  const workspaceName = "A7";
28
28
  const firmwareId = "umrkdttp";
29
29
  const firmware = {
30
- description: "uz",
31
- fileName: "wresexxulcdsdd",
32
- fileSize: 17,
33
- model: "f",
34
- status: "Pending",
35
- statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
36
- vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
37
- version: "s"
30
+ properties: {
31
+ description: "uz",
32
+ fileName: "wresexxulcdsdd",
33
+ fileSize: 17,
34
+ model: "f",
35
+ status: "Pending",
36
+ statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
37
+ vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
38
+ version: "s",
39
+ },
38
40
  };
39
41
  const credential = new DefaultAzureCredential();
40
42
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
41
- const result = yield client.firmwareOperations.update(resourceGroupName, workspaceName, firmwareId, firmware);
43
+ const result = yield client.firmwares.update(resourceGroupName, workspaceName, firmwareId, firmware);
42
44
  console.log(result);
43
45
  });
44
46
  }
@@ -46,9 +48,9 @@ function firmwareUpdateMaximumSetGen() {
46
48
  * This sample demonstrates how to The operation to update firmware.
47
49
  *
48
50
  * @summary The operation to update firmware.
49
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MinimumSet_Gen.json
51
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MinimumSet_Gen.json
50
52
  */
51
- function firmwareUpdateMinimumSetGen() {
53
+ function firmwaresUpdateMinimumSetGen() {
52
54
  return __awaiter(this, void 0, void 0, function* () {
53
55
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
54
56
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -59,15 +61,15 @@ function firmwareUpdateMinimumSetGen() {
59
61
  const firmware = {};
60
62
  const credential = new DefaultAzureCredential();
61
63
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
62
- const result = yield client.firmwareOperations.update(resourceGroupName, workspaceName, firmwareId, firmware);
64
+ const result = yield client.firmwares.update(resourceGroupName, workspaceName, firmwareId, firmware);
63
65
  console.log(result);
64
66
  });
65
67
  }
66
68
  function main() {
67
69
  return __awaiter(this, void 0, void 0, function* () {
68
- firmwareUpdateMaximumSetGen();
69
- firmwareUpdateMinimumSetGen();
70
+ firmwaresUpdateMaximumSetGen();
71
+ firmwaresUpdateMinimumSetGen();
70
72
  });
71
73
  }
72
74
  main().catch(console.error);
73
- //# sourceMappingURL=firmwareUpdateSample.js.map
75
+ //# sourceMappingURL=firmwaresUpdateSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAA6B;YACzC,UAAU,EAAE;gBACV,WAAW,EAAE,IAAI;gBACjB,QAAQ,EAAE,gBAAgB;gBAC1B,QAAQ,EAAE,EAAE;gBACZ,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,SAAS;gBACjB,cAAc,EAAE,CAAC,EAAE,OAAO,EAAE,uBAAuB,EAAE,CAAC;gBACtD,MAAM,EAAE,+BAA+B;gBACvC,OAAO,EAAE,GAAG;aACb;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAA6B,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,4BAA4B,EAAE,CAAC;QAC/B,4BAA4B,EAAE,CAAC;IACjC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -16,7 +16,7 @@ dotenv.config();
16
16
  * This sample demonstrates how to Lists the operations for this resource provider
17
17
  *
18
18
  * @summary Lists the operations for this resource provider
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MaximumSet_Gen.json
20
20
  */
21
21
  function operationsListMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
@@ -48,7 +48,7 @@ function operationsListMaximumSetGen() {
48
48
  * This sample demonstrates how to Lists the operations for this resource provider
49
49
  *
50
50
  * @summary Lists the operations for this resource provider
51
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MinimumSet_Gen.json
51
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MinimumSet_Gen.json
52
52
  */
53
53
  function operationsListMinimumSetGen() {
54
54
  var _a, e_2, _b, _c;
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=passwordHashesListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"passwordHashesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/passwordHashesListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,92 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __asyncValues, __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Lists password hash analysis results of a firmware.
17
+ *
18
+ * @summary Lists password hash analysis results of a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MaximumSet_Gen.json
20
+ */
21
+ function passwordHashesListByFirmwareMaximumSetGen() {
22
+ var _a, e_1, _b, _c;
23
+ return __awaiter(this, void 0, void 0, function* () {
24
+ const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
+ "00000000-0000-0000-0000-000000000000";
26
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
+ const workspaceName = "default";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
29
+ const credential = new DefaultAzureCredential();
30
+ const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
+ const resArray = new Array();
32
+ try {
33
+ for (var _d = true, _e = __asyncValues(client.passwordHashes.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
+ _c = _f.value;
35
+ _d = false;
36
+ let item = _c;
37
+ resArray.push(item);
38
+ }
39
+ }
40
+ catch (e_1_1) { e_1 = { error: e_1_1 }; }
41
+ finally {
42
+ try {
43
+ if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
44
+ }
45
+ finally { if (e_1) throw e_1.error; }
46
+ }
47
+ console.log(resArray);
48
+ });
49
+ }
50
+ /**
51
+ * This sample demonstrates how to Lists password hash analysis results of a firmware.
52
+ *
53
+ * @summary Lists password hash analysis results of a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MinimumSet_Gen.json
55
+ */
56
+ function passwordHashesListByFirmwareMinimumSetGen() {
57
+ var _a, e_2, _b, _c;
58
+ return __awaiter(this, void 0, void 0, function* () {
59
+ const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
64
+ const credential = new DefaultAzureCredential();
65
+ const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
66
+ const resArray = new Array();
67
+ try {
68
+ for (var _d = true, _e = __asyncValues(client.passwordHashes.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
69
+ _c = _f.value;
70
+ _d = false;
71
+ let item = _c;
72
+ resArray.push(item);
73
+ }
74
+ }
75
+ catch (e_2_1) { e_2 = { error: e_2_1 }; }
76
+ finally {
77
+ try {
78
+ if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
79
+ }
80
+ finally { if (e_2) throw e_2.error; }
81
+ }
82
+ console.log(resArray);
83
+ });
84
+ }
85
+ function main() {
86
+ return __awaiter(this, void 0, void 0, function* () {
87
+ passwordHashesListByFirmwareMaximumSetGen();
88
+ passwordHashesListByFirmwareMinimumSetGen();
89
+ });
90
+ }
91
+ main().catch(console.error);
92
+ //# sourceMappingURL=passwordHashesListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"passwordHashesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/passwordHashesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,yCAAyC,EAAE,CAAC;QAC5C,yCAAyC,EAAE,CAAC;IAC9C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=sbomComponentsListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"sbomComponentsListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/sbomComponentsListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,92 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __asyncValues, __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Lists SBOM analysis results of a firmware.
17
+ *
18
+ * @summary Lists SBOM analysis results of a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MaximumSet_Gen.json
20
+ */
21
+ function sbomComponentsListByFirmwareMaximumSetGen() {
22
+ var _a, e_1, _b, _c;
23
+ return __awaiter(this, void 0, void 0, function* () {
24
+ const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
+ "00000000-0000-0000-0000-000000000000";
26
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
+ const workspaceName = "default";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
29
+ const credential = new DefaultAzureCredential();
30
+ const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
+ const resArray = new Array();
32
+ try {
33
+ for (var _d = true, _e = __asyncValues(client.sbomComponents.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
+ _c = _f.value;
35
+ _d = false;
36
+ let item = _c;
37
+ resArray.push(item);
38
+ }
39
+ }
40
+ catch (e_1_1) { e_1 = { error: e_1_1 }; }
41
+ finally {
42
+ try {
43
+ if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
44
+ }
45
+ finally { if (e_1) throw e_1.error; }
46
+ }
47
+ console.log(resArray);
48
+ });
49
+ }
50
+ /**
51
+ * This sample demonstrates how to Lists SBOM analysis results of a firmware.
52
+ *
53
+ * @summary Lists SBOM analysis results of a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MinimumSet_Gen.json
55
+ */
56
+ function sbomComponentsListByFirmwareMinimumSetGen() {
57
+ var _a, e_2, _b, _c;
58
+ return __awaiter(this, void 0, void 0, function* () {
59
+ const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
64
+ const credential = new DefaultAzureCredential();
65
+ const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
66
+ const resArray = new Array();
67
+ try {
68
+ for (var _d = true, _e = __asyncValues(client.sbomComponents.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
69
+ _c = _f.value;
70
+ _d = false;
71
+ let item = _c;
72
+ resArray.push(item);
73
+ }
74
+ }
75
+ catch (e_2_1) { e_2 = { error: e_2_1 }; }
76
+ finally {
77
+ try {
78
+ if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
79
+ }
80
+ finally { if (e_2) throw e_2.error; }
81
+ }
82
+ console.log(resArray);
83
+ });
84
+ }
85
+ function main() {
86
+ return __awaiter(this, void 0, void 0, function* () {
87
+ sbomComponentsListByFirmwareMaximumSetGen();
88
+ sbomComponentsListByFirmwareMinimumSetGen();
89
+ });
90
+ }
91
+ main().catch(console.error);
92
+ //# sourceMappingURL=sbomComponentsListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"sbomComponentsListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/sbomComponentsListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,yCAAyC,EAAE,CAAC;QAC5C,yCAAyC,EAAE,CAAC;IAC9C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=summariesGetSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"summariesGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/summariesGetSample.ts"],"names":[],"mappings":""}