@azure/arm-iotfirmwaredefense 1.0.0-alpha.20240307.1 → 1.0.0-alpha.20240322.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +2 -12
- package/LICENSE +1 -1
- package/README.md +2 -2
- package/dist/index.js +2254 -2121
- package/dist/index.js.map +1 -1
- package/dist/index.min.js +1 -1
- package/dist/index.min.js.map +1 -1
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCryptoKeyListSample.js → binaryHardeningListByFirmwareSample.js} +19 -20
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateComponentListSample.js → cryptoCertificatesListByFirmwareSample.js} +21 -23
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCryptoCertificateListSample.js → cryptoKeysListByFirmwareSample.js} +19 -20
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCveListSample.js → cvesListByFirmwareSample.js} +21 -23
- package/dist-esm/samples-dev/cvesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresCreateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresCreateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareCreateSample.js → firmwaresCreateSample.js} +20 -18
- package/dist-esm/samples-dev/firmwaresCreateSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareDeleteSample.js → firmwaresDeleteSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateDownloadUrlSample.js → firmwaresGenerateDownloadUrlSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateFilesystemDownloadUrlSample.js → firmwaresGenerateFilesystemDownloadUrlSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGetSample.js → firmwaresGetSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGetSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareUpdateSample.js → firmwaresUpdateSample.js} +20 -18
- package/dist-esm/samples-dev/firmwaresUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.js +2 -2
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/summariesGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/summariesGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateSummarySample.js → summariesGetSample.js} +23 -23
- package/dist-esm/samples-dev/summariesGetSample.js.map +1 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateBinaryHardeningListSample.js → summariesListByFirmwareSample.js} +21 -23
- package/dist-esm/samples-dev/summariesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesCreateSample.js +5 -4
- package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesDeleteSample.js +2 -2
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +4 -4
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesGetSample.js +2 -2
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +2 -2
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +2 -2
- package/dist-esm/samples-dev/workspacesUpdateSample.js +4 -4
- package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -1
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +11 -4
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -1
- package/dist-esm/src/ioTFirmwareDefenseClient.js +19 -12
- package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -1
- package/dist-esm/src/models/index.d.ts +516 -602
- package/dist-esm/src/models/index.d.ts.map +1 -1
- package/dist-esm/src/models/index.js +40 -92
- package/dist-esm/src/models/index.js.map +1 -1
- package/dist-esm/src/models/mappers.d.ts +45 -25
- package/dist-esm/src/models/mappers.d.ts.map +1 -1
- package/dist-esm/src/models/mappers.js +1120 -1036
- package/dist-esm/src/models/mappers.js.map +1 -1
- package/dist-esm/src/models/parameters.d.ts +3 -2
- package/dist-esm/src/models/parameters.d.ts.map +1 -1
- package/dist-esm/src/models/parameters.js +56 -49
- package/dist-esm/src/models/parameters.js.map +1 -1
- package/dist-esm/src/operations/binaryHardening.d.ts +41 -0
- package/dist-esm/src/operations/binaryHardening.d.ts.map +1 -0
- package/dist-esm/src/operations/binaryHardening.js +155 -0
- package/dist-esm/src/operations/binaryHardening.js.map +1 -0
- package/dist-esm/src/operations/cryptoCertificates.d.ts +41 -0
- package/dist-esm/src/operations/cryptoCertificates.d.ts.map +1 -0
- package/dist-esm/src/operations/cryptoCertificates.js +155 -0
- package/dist-esm/src/operations/cryptoCertificates.js.map +1 -0
- package/dist-esm/src/operations/cryptoKeys.d.ts +41 -0
- package/dist-esm/src/operations/cryptoKeys.d.ts.map +1 -0
- package/dist-esm/src/operations/cryptoKeys.js +155 -0
- package/dist-esm/src/operations/cryptoKeys.js.map +1 -0
- package/dist-esm/src/operations/cves.d.ts +41 -0
- package/dist-esm/src/operations/cves.d.ts.map +1 -0
- package/dist-esm/src/operations/cves.js +155 -0
- package/dist-esm/src/operations/cves.js.map +1 -0
- package/dist-esm/src/operations/firmwares.d.ts +88 -0
- package/dist-esm/src/operations/firmwares.d.ts.map +1 -0
- package/dist-esm/src/operations/firmwares.js +350 -0
- package/dist-esm/src/operations/firmwares.js.map +1 -0
- package/dist-esm/src/operations/index.d.ts +9 -2
- package/dist-esm/src/operations/index.d.ts.map +1 -1
- package/dist-esm/src/operations/index.js +9 -2
- package/dist-esm/src/operations/index.js.map +1 -1
- package/dist-esm/src/operations/operations.js +9 -9
- package/dist-esm/src/operations/passwordHashes.d.ts +41 -0
- package/dist-esm/src/operations/passwordHashes.d.ts.map +1 -0
- package/dist-esm/src/operations/passwordHashes.js +155 -0
- package/dist-esm/src/operations/passwordHashes.js.map +1 -0
- package/dist-esm/src/operations/sbomComponents.d.ts +41 -0
- package/dist-esm/src/operations/sbomComponents.d.ts.map +1 -0
- package/dist-esm/src/operations/sbomComponents.js +155 -0
- package/dist-esm/src/operations/sbomComponents.js.map +1 -0
- package/dist-esm/src/operations/summaries.d.ts +52 -0
- package/dist-esm/src/operations/summaries.d.ts.map +1 -0
- package/dist-esm/src/operations/summaries.js +191 -0
- package/dist-esm/src/operations/summaries.js.map +1 -0
- package/dist-esm/src/operations/workspaces.js +46 -50
- package/dist-esm/src/operations/workspaces.js.map +1 -1
- package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/{firmwareOperations.js → binaryHardening.js} +1 -1
- package/dist-esm/src/operationsInterfaces/binaryHardening.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.js +9 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.js +9 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cves.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cves.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cves.js +9 -0
- package/dist-esm/src/operationsInterfaces/cves.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwares.d.ts +63 -0
- package/dist-esm/src/operationsInterfaces/firmwares.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwares.js +9 -0
- package/dist-esm/src/operationsInterfaces/firmwares.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts +9 -2
- package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
- package/dist-esm/src/operationsInterfaces/index.js +9 -2
- package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
- package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.js +9 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.js +9 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/summaries.d.ts +24 -0
- package/dist-esm/src/operationsInterfaces/summaries.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/summaries.js +9 -0
- package/dist-esm/src/operationsInterfaces/summaries.js.map +1 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +1 -1
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -1
- package/package.json +8 -8
- package/review/arm-iotfirmwaredefense.api.md +329 -330
- package/src/ioTFirmwareDefenseClient.ts +53 -24
- package/src/models/index.ts +566 -646
- package/src/models/mappers.ts +1190 -1036
- package/src/models/parameters.ts +59 -51
- package/src/operations/binaryHardening.ts +216 -0
- package/src/operations/cryptoCertificates.ts +216 -0
- package/src/operations/cryptoKeys.ts +216 -0
- package/src/operations/cves.ts +216 -0
- package/src/operations/firmwares.ts +469 -0
- package/src/operations/index.ts +9 -2
- package/src/operations/operations.ts +16 -16
- package/src/operations/passwordHashes.ts +216 -0
- package/src/operations/sbomComponents.ts +216 -0
- package/src/operations/summaries.ts +265 -0
- package/src/operations/workspaces.ts +81 -92
- package/src/operationsInterfaces/binaryHardening.ts +31 -0
- package/src/operationsInterfaces/cryptoCertificates.ts +31 -0
- package/src/operationsInterfaces/cryptoKeys.ts +31 -0
- package/src/operationsInterfaces/cves.ts +28 -0
- package/src/operationsInterfaces/firmwares.ts +123 -0
- package/src/operationsInterfaces/index.ts +9 -2
- package/src/operationsInterfaces/operations.ts +1 -1
- package/src/operationsInterfaces/passwordHashes.ts +31 -0
- package/src/operationsInterfaces/sbomComponents.ts +31 -0
- package/src/operationsInterfaces/summaries.ts +50 -0
- package/src/operationsInterfaces/workspaces.ts +8 -8
- package/src/pagingHelper.ts +1 -1
- package/types/arm-iotfirmwaredefense.d.ts +573 -675
- package/types/tsdoc-metadata.json +1 -1
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareCreateSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareDeleteSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +0 -61
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +0 -61
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGetSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGetSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +0 -94
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareUpdateSample.js.map +0 -1
- package/dist-esm/src/operations/firmwareOperations.d.ts +0 -313
- package/dist-esm/src/operations/firmwareOperations.d.ts.map +0 -1
- package/dist-esm/src/operations/firmwareOperations.js +0 -1358
- package/dist-esm/src/operations/firmwareOperations.js.map +0 -1
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +0 -169
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +0 -1
- package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +0 -1
- package/src/operations/firmwareOperations.ts +0 -1892
- package/src/operationsInterfaces/firmwareOperations.ts +0 -320
|
@@ -16,9 +16,9 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to a url for file download.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to a url for file download.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function firmwaresGenerateDownloadUrlMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
23
23
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
24
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -28,7 +28,7 @@ function firmwareGenerateDownloadUrlMaximumSetGen() {
|
|
|
28
28
|
const firmwareId = "umrkdttp";
|
|
29
29
|
const credential = new DefaultAzureCredential();
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
-
const result = yield client.
|
|
31
|
+
const result = yield client.firmwares.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
32
32
|
console.log(result);
|
|
33
33
|
});
|
|
34
34
|
}
|
|
@@ -36,9 +36,9 @@ function firmwareGenerateDownloadUrlMaximumSetGen() {
|
|
|
36
36
|
* This sample demonstrates how to The operation to a url for file download.
|
|
37
37
|
*
|
|
38
38
|
* @summary The operation to a url for file download.
|
|
39
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MinimumSet_Gen.json
|
|
40
40
|
*/
|
|
41
|
-
function
|
|
41
|
+
function firmwaresGenerateDownloadUrlMinimumSetGen() {
|
|
42
42
|
return __awaiter(this, void 0, void 0, function* () {
|
|
43
43
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
44
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -48,15 +48,15 @@ function firmwareGenerateDownloadUrlMinimumSetGen() {
|
|
|
48
48
|
const firmwareId = "umrkdttp";
|
|
49
49
|
const credential = new DefaultAzureCredential();
|
|
50
50
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
-
const result = yield client.
|
|
51
|
+
const result = yield client.firmwares.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
52
52
|
console.log(result);
|
|
53
53
|
});
|
|
54
54
|
}
|
|
55
55
|
function main() {
|
|
56
56
|
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
-
|
|
58
|
-
|
|
57
|
+
firmwaresGenerateDownloadUrlMaximumSetGen();
|
|
58
|
+
firmwaresGenerateDownloadUrlMinimumSetGen();
|
|
59
59
|
});
|
|
60
60
|
}
|
|
61
61
|
main().catch(console.error);
|
|
62
|
-
//# sourceMappingURL=
|
|
62
|
+
//# sourceMappingURL=firmwaresGenerateDownloadUrlSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresGenerateDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresGenerateDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yCAAyC;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,mBAAmB,CACvD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,yCAAyC;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,mBAAmB,CACvD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,yCAAyC,EAAE,CAAC;QAC5C,yCAAyC,EAAE,CAAC;IAC9C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresGenerateFilesystemDownloadUrlSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":""}
|
|
@@ -16,9 +16,9 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to a url for tar file download.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to a url for tar file download.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function firmwaresGenerateFilesystemDownloadUrlMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
23
23
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
24
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -28,7 +28,7 @@ function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() {
|
|
|
28
28
|
const firmwareId = "umrkdttp";
|
|
29
29
|
const credential = new DefaultAzureCredential();
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
-
const result = yield client.
|
|
31
|
+
const result = yield client.firmwares.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
32
32
|
console.log(result);
|
|
33
33
|
});
|
|
34
34
|
}
|
|
@@ -36,9 +36,9 @@ function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() {
|
|
|
36
36
|
* This sample demonstrates how to The operation to a url for tar file download.
|
|
37
37
|
*
|
|
38
38
|
* @summary The operation to a url for tar file download.
|
|
39
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json
|
|
40
40
|
*/
|
|
41
|
-
function
|
|
41
|
+
function firmwaresGenerateFilesystemDownloadUrlMinimumSetGen() {
|
|
42
42
|
return __awaiter(this, void 0, void 0, function* () {
|
|
43
43
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
44
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -48,15 +48,15 @@ function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() {
|
|
|
48
48
|
const firmwareId = "umrkdttp";
|
|
49
49
|
const credential = new DefaultAzureCredential();
|
|
50
50
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
-
const result = yield client.
|
|
51
|
+
const result = yield client.firmwares.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
52
52
|
console.log(result);
|
|
53
53
|
});
|
|
54
54
|
}
|
|
55
55
|
function main() {
|
|
56
56
|
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
-
|
|
58
|
-
|
|
57
|
+
firmwaresGenerateFilesystemDownloadUrlMaximumSetGen();
|
|
58
|
+
firmwaresGenerateFilesystemDownloadUrlMinimumSetGen();
|
|
59
59
|
});
|
|
60
60
|
}
|
|
61
61
|
main().catch(console.error);
|
|
62
|
-
//# sourceMappingURL=
|
|
62
|
+
//# sourceMappingURL=firmwaresGenerateFilesystemDownloadUrlSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresGenerateFilesystemDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,6BAA6B,CACjE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,6BAA6B,CACjE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,mDAAmD,EAAE,CAAC;QACtD,mDAAmD,EAAE,CAAC;IACxD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresGetSample.ts"],"names":[],"mappings":""}
|
|
@@ -16,9 +16,9 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to Get firmware.
|
|
17
17
|
*
|
|
18
18
|
* @summary Get firmware.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function firmwaresGetMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
23
23
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
24
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -28,7 +28,7 @@ function firmwareGetMaximumSetGen() {
|
|
|
28
28
|
const firmwareId = "umrkdttp";
|
|
29
29
|
const credential = new DefaultAzureCredential();
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
-
const result = yield client.
|
|
31
|
+
const result = yield client.firmwares.get(resourceGroupName, workspaceName, firmwareId);
|
|
32
32
|
console.log(result);
|
|
33
33
|
});
|
|
34
34
|
}
|
|
@@ -36,9 +36,9 @@ function firmwareGetMaximumSetGen() {
|
|
|
36
36
|
* This sample demonstrates how to Get firmware.
|
|
37
37
|
*
|
|
38
38
|
* @summary Get firmware.
|
|
39
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MinimumSet_Gen.json
|
|
40
40
|
*/
|
|
41
|
-
function
|
|
41
|
+
function firmwaresGetMinimumSetGen() {
|
|
42
42
|
return __awaiter(this, void 0, void 0, function* () {
|
|
43
43
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
44
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -48,15 +48,15 @@ function firmwareGetMinimumSetGen() {
|
|
|
48
48
|
const firmwareId = "umrkdttp";
|
|
49
49
|
const credential = new DefaultAzureCredential();
|
|
50
50
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
-
const result = yield client.
|
|
51
|
+
const result = yield client.firmwares.get(resourceGroupName, workspaceName, firmwareId);
|
|
52
52
|
console.log(result);
|
|
53
53
|
});
|
|
54
54
|
}
|
|
55
55
|
function main() {
|
|
56
56
|
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
-
|
|
58
|
-
|
|
57
|
+
firmwaresGetMaximumSetGen();
|
|
58
|
+
firmwaresGetMinimumSetGen();
|
|
59
59
|
});
|
|
60
60
|
}
|
|
61
61
|
main().catch(console.error);
|
|
62
|
-
//# sourceMappingURL=
|
|
62
|
+
//# sourceMappingURL=firmwaresGetSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresGetSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresGetSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yBAAyB;;QACtC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,GAAG,CACvC,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,yBAAyB;;QACtC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,GAAG,CACvC,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,yBAAyB,EAAE,CAAC;QAC5B,yBAAyB,EAAE,CAAC;IAC9B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresListByWorkspaceSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresListByWorkspaceSample.ts"],"names":[],"mappings":""}
|
package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js}
RENAMED
|
@@ -16,9 +16,9 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to Lists all of firmwares inside a workspace.
|
|
17
17
|
*
|
|
18
18
|
* @summary Lists all of firmwares inside a workspace.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function firmwaresListByWorkspaceMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
23
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
24
24
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
@@ -30,7 +30,7 @@ function firmwareListByWorkspaceMaximumSetGen() {
|
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
31
|
const resArray = new Array();
|
|
32
32
|
try {
|
|
33
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.firmwares.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
34
34
|
_c = _f.value;
|
|
35
35
|
_d = false;
|
|
36
36
|
let item = _c;
|
|
@@ -51,9 +51,9 @@ function firmwareListByWorkspaceMaximumSetGen() {
|
|
|
51
51
|
* This sample demonstrates how to Lists all of firmwares inside a workspace.
|
|
52
52
|
*
|
|
53
53
|
* @summary Lists all of firmwares inside a workspace.
|
|
54
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MinimumSet_Gen.json
|
|
55
55
|
*/
|
|
56
|
-
function
|
|
56
|
+
function firmwaresListByWorkspaceMinimumSetGen() {
|
|
57
57
|
var _a, e_2, _b, _c;
|
|
58
58
|
return __awaiter(this, void 0, void 0, function* () {
|
|
59
59
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
@@ -65,7 +65,7 @@ function firmwareListByWorkspaceMinimumSetGen() {
|
|
|
65
65
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
66
66
|
const resArray = new Array();
|
|
67
67
|
try {
|
|
68
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.firmwares.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
69
69
|
_c = _f.value;
|
|
70
70
|
_d = false;
|
|
71
71
|
let item = _c;
|
|
@@ -84,9 +84,9 @@ function firmwareListByWorkspaceMinimumSetGen() {
|
|
|
84
84
|
}
|
|
85
85
|
function main() {
|
|
86
86
|
return __awaiter(this, void 0, void 0, function* () {
|
|
87
|
-
|
|
88
|
-
|
|
87
|
+
firmwaresListByWorkspaceMaximumSetGen();
|
|
88
|
+
firmwaresListByWorkspaceMinimumSetGen();
|
|
89
89
|
});
|
|
90
90
|
}
|
|
91
91
|
main().catch(console.error);
|
|
92
|
-
//# sourceMappingURL=
|
|
92
|
+
//# sourceMappingURL=firmwaresListByWorkspaceSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresListByWorkspaceSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresListByWorkspaceSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,SAAS,CAAC,eAAe,CACrD,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA,sDAAE,CAAC;gBAHmB,cAGtB;gBAHsB,WAGtB;gBAHU,IAAI,IAAI,KAAA,CAAA;gBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,SAAS,CAAC,eAAe,CACrD,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA,sDAAE,CAAC;gBAHmB,cAGtB;gBAHsB,WAGtB;gBAHU,IAAI,IAAI,KAAA,CAAA;gBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,qCAAqC,EAAE,CAAC;QACxC,qCAAqC,EAAE,CAAC;IAC1C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresUpdateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresUpdateSample.ts"],"names":[],"mappings":""}
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
import { __awaiter } from "tslib";
|
|
9
9
|
// Copyright (c) Microsoft Corporation.
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
|
-
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
11
|
+
import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
@@ -16,9 +16,9 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to update firmware.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to update firmware.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function firmwaresUpdateMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
23
23
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
24
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -27,18 +27,20 @@ function firmwareUpdateMaximumSetGen() {
|
|
|
27
27
|
const workspaceName = "A7";
|
|
28
28
|
const firmwareId = "umrkdttp";
|
|
29
29
|
const firmware = {
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
30
|
+
properties: {
|
|
31
|
+
description: "uz",
|
|
32
|
+
fileName: "wresexxulcdsdd",
|
|
33
|
+
fileSize: 17,
|
|
34
|
+
model: "f",
|
|
35
|
+
status: "Pending",
|
|
36
|
+
statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
|
|
37
|
+
vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
|
|
38
|
+
version: "s",
|
|
39
|
+
},
|
|
38
40
|
};
|
|
39
41
|
const credential = new DefaultAzureCredential();
|
|
40
42
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
41
|
-
const result = yield client.
|
|
43
|
+
const result = yield client.firmwares.update(resourceGroupName, workspaceName, firmwareId, firmware);
|
|
42
44
|
console.log(result);
|
|
43
45
|
});
|
|
44
46
|
}
|
|
@@ -46,9 +48,9 @@ function firmwareUpdateMaximumSetGen() {
|
|
|
46
48
|
* This sample demonstrates how to The operation to update firmware.
|
|
47
49
|
*
|
|
48
50
|
* @summary The operation to update firmware.
|
|
49
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
51
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MinimumSet_Gen.json
|
|
50
52
|
*/
|
|
51
|
-
function
|
|
53
|
+
function firmwaresUpdateMinimumSetGen() {
|
|
52
54
|
return __awaiter(this, void 0, void 0, function* () {
|
|
53
55
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
54
56
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -59,15 +61,15 @@ function firmwareUpdateMinimumSetGen() {
|
|
|
59
61
|
const firmware = {};
|
|
60
62
|
const credential = new DefaultAzureCredential();
|
|
61
63
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
62
|
-
const result = yield client.
|
|
64
|
+
const result = yield client.firmwares.update(resourceGroupName, workspaceName, firmwareId, firmware);
|
|
63
65
|
console.log(result);
|
|
64
66
|
});
|
|
65
67
|
}
|
|
66
68
|
function main() {
|
|
67
69
|
return __awaiter(this, void 0, void 0, function* () {
|
|
68
|
-
|
|
69
|
-
|
|
70
|
+
firmwaresUpdateMaximumSetGen();
|
|
71
|
+
firmwaresUpdateMinimumSetGen();
|
|
70
72
|
});
|
|
71
73
|
}
|
|
72
74
|
main().catch(console.error);
|
|
73
|
-
//# sourceMappingURL=
|
|
75
|
+
//# sourceMappingURL=firmwaresUpdateSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAA6B;YACzC,UAAU,EAAE;gBACV,WAAW,EAAE,IAAI;gBACjB,QAAQ,EAAE,gBAAgB;gBAC1B,QAAQ,EAAE,EAAE;gBACZ,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,SAAS;gBACjB,cAAc,EAAE,CAAC,EAAE,OAAO,EAAE,uBAAuB,EAAE,CAAC;gBACtD,MAAM,EAAE,+BAA+B;gBACvC,OAAO,EAAE,GAAG;aACb;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAA6B,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,4BAA4B,EAAE,CAAC;QAC/B,4BAA4B,EAAE,CAAC;IACjC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to Lists the operations for this resource provider
|
|
17
17
|
*
|
|
18
18
|
* @summary Lists the operations for this resource provider
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function operationsListMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
@@ -48,7 +48,7 @@ function operationsListMaximumSetGen() {
|
|
|
48
48
|
* This sample demonstrates how to Lists the operations for this resource provider
|
|
49
49
|
*
|
|
50
50
|
* @summary Lists the operations for this resource provider
|
|
51
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
51
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MinimumSet_Gen.json
|
|
52
52
|
*/
|
|
53
53
|
function operationsListMinimumSetGen() {
|
|
54
54
|
var _a, e_2, _b, _c;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"passwordHashesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/passwordHashesListByFirmwareSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,92 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to Lists password hash analysis results of a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary Lists password hash analysis results of a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function passwordHashesListByFirmwareMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
|
+
const workspaceName = "default";
|
|
28
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const resArray = new Array();
|
|
32
|
+
try {
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.passwordHashes.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
34
|
+
_c = _f.value;
|
|
35
|
+
_d = false;
|
|
36
|
+
let item = _c;
|
|
37
|
+
resArray.push(item);
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
41
|
+
finally {
|
|
42
|
+
try {
|
|
43
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
44
|
+
}
|
|
45
|
+
finally { if (e_1) throw e_1.error; }
|
|
46
|
+
}
|
|
47
|
+
console.log(resArray);
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
/**
|
|
51
|
+
* This sample demonstrates how to Lists password hash analysis results of a firmware.
|
|
52
|
+
*
|
|
53
|
+
* @summary Lists password hash analysis results of a firmware.
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MinimumSet_Gen.json
|
|
55
|
+
*/
|
|
56
|
+
function passwordHashesListByFirmwareMinimumSetGen() {
|
|
57
|
+
var _a, e_2, _b, _c;
|
|
58
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
59
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
60
|
+
"00000000-0000-0000-0000-000000000000";
|
|
61
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
62
|
+
const workspaceName = "default";
|
|
63
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
64
|
+
const credential = new DefaultAzureCredential();
|
|
65
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
66
|
+
const resArray = new Array();
|
|
67
|
+
try {
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.passwordHashes.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
69
|
+
_c = _f.value;
|
|
70
|
+
_d = false;
|
|
71
|
+
let item = _c;
|
|
72
|
+
resArray.push(item);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
76
|
+
finally {
|
|
77
|
+
try {
|
|
78
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
79
|
+
}
|
|
80
|
+
finally { if (e_2) throw e_2.error; }
|
|
81
|
+
}
|
|
82
|
+
console.log(resArray);
|
|
83
|
+
});
|
|
84
|
+
}
|
|
85
|
+
function main() {
|
|
86
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
87
|
+
passwordHashesListByFirmwareMaximumSetGen();
|
|
88
|
+
passwordHashesListByFirmwareMinimumSetGen();
|
|
89
|
+
});
|
|
90
|
+
}
|
|
91
|
+
main().catch(console.error);
|
|
92
|
+
//# sourceMappingURL=passwordHashesListByFirmwareSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"passwordHashesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/passwordHashesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,yCAAyC,EAAE,CAAC;QAC5C,yCAAyC,EAAE,CAAC;IAC9C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"sbomComponentsListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/sbomComponentsListByFirmwareSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,92 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to Lists SBOM analysis results of a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary Lists SBOM analysis results of a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function sbomComponentsListByFirmwareMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
|
+
const workspaceName = "default";
|
|
28
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const resArray = new Array();
|
|
32
|
+
try {
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.sbomComponents.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
34
|
+
_c = _f.value;
|
|
35
|
+
_d = false;
|
|
36
|
+
let item = _c;
|
|
37
|
+
resArray.push(item);
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
41
|
+
finally {
|
|
42
|
+
try {
|
|
43
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
44
|
+
}
|
|
45
|
+
finally { if (e_1) throw e_1.error; }
|
|
46
|
+
}
|
|
47
|
+
console.log(resArray);
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
/**
|
|
51
|
+
* This sample demonstrates how to Lists SBOM analysis results of a firmware.
|
|
52
|
+
*
|
|
53
|
+
* @summary Lists SBOM analysis results of a firmware.
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MinimumSet_Gen.json
|
|
55
|
+
*/
|
|
56
|
+
function sbomComponentsListByFirmwareMinimumSetGen() {
|
|
57
|
+
var _a, e_2, _b, _c;
|
|
58
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
59
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
60
|
+
"00000000-0000-0000-0000-000000000000";
|
|
61
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
62
|
+
const workspaceName = "default";
|
|
63
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
64
|
+
const credential = new DefaultAzureCredential();
|
|
65
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
66
|
+
const resArray = new Array();
|
|
67
|
+
try {
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.sbomComponents.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
69
|
+
_c = _f.value;
|
|
70
|
+
_d = false;
|
|
71
|
+
let item = _c;
|
|
72
|
+
resArray.push(item);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
76
|
+
finally {
|
|
77
|
+
try {
|
|
78
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
79
|
+
}
|
|
80
|
+
finally { if (e_2) throw e_2.error; }
|
|
81
|
+
}
|
|
82
|
+
console.log(resArray);
|
|
83
|
+
});
|
|
84
|
+
}
|
|
85
|
+
function main() {
|
|
86
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
87
|
+
sbomComponentsListByFirmwareMaximumSetGen();
|
|
88
|
+
sbomComponentsListByFirmwareMinimumSetGen();
|
|
89
|
+
});
|
|
90
|
+
}
|
|
91
|
+
main().catch(console.error);
|
|
92
|
+
//# sourceMappingURL=sbomComponentsListByFirmwareSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"sbomComponentsListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/sbomComponentsListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,yCAAyC;;;QACtD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,cAAc,CAAC,cAAc,CACzD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,yCAAyC,EAAE,CAAC;QAC5C,yCAAyC,EAAE,CAAC;IAC9C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"summariesGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/summariesGetSample.ts"],"names":[],"mappings":""}
|