@azure/arm-iotfirmwaredefense 1.0.0-alpha.20240312.1 → 1.0.0-alpha.20240322.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +2 -12
- package/LICENSE +1 -1
- package/README.md +2 -2
- package/dist/index.js +2254 -2121
- package/dist/index.js.map +1 -1
- package/dist/index.min.js +1 -1
- package/dist/index.min.js.map +1 -1
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCryptoKeyListSample.js → binaryHardeningListByFirmwareSample.js} +19 -20
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateComponentListSample.js → cryptoCertificatesListByFirmwareSample.js} +21 -23
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCryptoCertificateListSample.js → cryptoKeysListByFirmwareSample.js} +19 -20
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCveListSample.js → cvesListByFirmwareSample.js} +21 -23
- package/dist-esm/samples-dev/cvesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresCreateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresCreateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareCreateSample.js → firmwaresCreateSample.js} +20 -18
- package/dist-esm/samples-dev/firmwaresCreateSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareDeleteSample.js → firmwaresDeleteSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateDownloadUrlSample.js → firmwaresGenerateDownloadUrlSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateFilesystemDownloadUrlSample.js → firmwaresGenerateFilesystemDownloadUrlSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGetSample.js → firmwaresGetSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGetSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareUpdateSample.js → firmwaresUpdateSample.js} +20 -18
- package/dist-esm/samples-dev/firmwaresUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.js +2 -2
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/summariesGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/summariesGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateSummarySample.js → summariesGetSample.js} +23 -23
- package/dist-esm/samples-dev/summariesGetSample.js.map +1 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateBinaryHardeningListSample.js → summariesListByFirmwareSample.js} +21 -23
- package/dist-esm/samples-dev/summariesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesCreateSample.js +5 -4
- package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesDeleteSample.js +2 -2
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +4 -4
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesGetSample.js +2 -2
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +2 -2
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +2 -2
- package/dist-esm/samples-dev/workspacesUpdateSample.js +4 -4
- package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -1
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +11 -4
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -1
- package/dist-esm/src/ioTFirmwareDefenseClient.js +19 -12
- package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -1
- package/dist-esm/src/models/index.d.ts +516 -602
- package/dist-esm/src/models/index.d.ts.map +1 -1
- package/dist-esm/src/models/index.js +40 -92
- package/dist-esm/src/models/index.js.map +1 -1
- package/dist-esm/src/models/mappers.d.ts +45 -25
- package/dist-esm/src/models/mappers.d.ts.map +1 -1
- package/dist-esm/src/models/mappers.js +1120 -1036
- package/dist-esm/src/models/mappers.js.map +1 -1
- package/dist-esm/src/models/parameters.d.ts +3 -2
- package/dist-esm/src/models/parameters.d.ts.map +1 -1
- package/dist-esm/src/models/parameters.js +56 -49
- package/dist-esm/src/models/parameters.js.map +1 -1
- package/dist-esm/src/operations/binaryHardening.d.ts +41 -0
- package/dist-esm/src/operations/binaryHardening.d.ts.map +1 -0
- package/dist-esm/src/operations/binaryHardening.js +155 -0
- package/dist-esm/src/operations/binaryHardening.js.map +1 -0
- package/dist-esm/src/operations/cryptoCertificates.d.ts +41 -0
- package/dist-esm/src/operations/cryptoCertificates.d.ts.map +1 -0
- package/dist-esm/src/operations/cryptoCertificates.js +155 -0
- package/dist-esm/src/operations/cryptoCertificates.js.map +1 -0
- package/dist-esm/src/operations/cryptoKeys.d.ts +41 -0
- package/dist-esm/src/operations/cryptoKeys.d.ts.map +1 -0
- package/dist-esm/src/operations/cryptoKeys.js +155 -0
- package/dist-esm/src/operations/cryptoKeys.js.map +1 -0
- package/dist-esm/src/operations/cves.d.ts +41 -0
- package/dist-esm/src/operations/cves.d.ts.map +1 -0
- package/dist-esm/src/operations/cves.js +155 -0
- package/dist-esm/src/operations/cves.js.map +1 -0
- package/dist-esm/src/operations/firmwares.d.ts +88 -0
- package/dist-esm/src/operations/firmwares.d.ts.map +1 -0
- package/dist-esm/src/operations/firmwares.js +350 -0
- package/dist-esm/src/operations/firmwares.js.map +1 -0
- package/dist-esm/src/operations/index.d.ts +9 -2
- package/dist-esm/src/operations/index.d.ts.map +1 -1
- package/dist-esm/src/operations/index.js +9 -2
- package/dist-esm/src/operations/index.js.map +1 -1
- package/dist-esm/src/operations/operations.js +9 -9
- package/dist-esm/src/operations/passwordHashes.d.ts +41 -0
- package/dist-esm/src/operations/passwordHashes.d.ts.map +1 -0
- package/dist-esm/src/operations/passwordHashes.js +155 -0
- package/dist-esm/src/operations/passwordHashes.js.map +1 -0
- package/dist-esm/src/operations/sbomComponents.d.ts +41 -0
- package/dist-esm/src/operations/sbomComponents.d.ts.map +1 -0
- package/dist-esm/src/operations/sbomComponents.js +155 -0
- package/dist-esm/src/operations/sbomComponents.js.map +1 -0
- package/dist-esm/src/operations/summaries.d.ts +52 -0
- package/dist-esm/src/operations/summaries.d.ts.map +1 -0
- package/dist-esm/src/operations/summaries.js +191 -0
- package/dist-esm/src/operations/summaries.js.map +1 -0
- package/dist-esm/src/operations/workspaces.js +46 -50
- package/dist-esm/src/operations/workspaces.js.map +1 -1
- package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/{firmwareOperations.js → binaryHardening.js} +1 -1
- package/dist-esm/src/operationsInterfaces/binaryHardening.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.js +9 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.js +9 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cves.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cves.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cves.js +9 -0
- package/dist-esm/src/operationsInterfaces/cves.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwares.d.ts +63 -0
- package/dist-esm/src/operationsInterfaces/firmwares.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwares.js +9 -0
- package/dist-esm/src/operationsInterfaces/firmwares.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts +9 -2
- package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
- package/dist-esm/src/operationsInterfaces/index.js +9 -2
- package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
- package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.js +9 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.js +9 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/summaries.d.ts +24 -0
- package/dist-esm/src/operationsInterfaces/summaries.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/summaries.js +9 -0
- package/dist-esm/src/operationsInterfaces/summaries.js.map +1 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +1 -1
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -1
- package/package.json +8 -8
- package/review/arm-iotfirmwaredefense.api.md +329 -330
- package/src/ioTFirmwareDefenseClient.ts +53 -24
- package/src/models/index.ts +566 -646
- package/src/models/mappers.ts +1190 -1036
- package/src/models/parameters.ts +59 -51
- package/src/operations/binaryHardening.ts +216 -0
- package/src/operations/cryptoCertificates.ts +216 -0
- package/src/operations/cryptoKeys.ts +216 -0
- package/src/operations/cves.ts +216 -0
- package/src/operations/firmwares.ts +469 -0
- package/src/operations/index.ts +9 -2
- package/src/operations/operations.ts +16 -16
- package/src/operations/passwordHashes.ts +216 -0
- package/src/operations/sbomComponents.ts +216 -0
- package/src/operations/summaries.ts +265 -0
- package/src/operations/workspaces.ts +81 -92
- package/src/operationsInterfaces/binaryHardening.ts +31 -0
- package/src/operationsInterfaces/cryptoCertificates.ts +31 -0
- package/src/operationsInterfaces/cryptoKeys.ts +31 -0
- package/src/operationsInterfaces/cves.ts +28 -0
- package/src/operationsInterfaces/firmwares.ts +123 -0
- package/src/operationsInterfaces/index.ts +9 -2
- package/src/operationsInterfaces/operations.ts +1 -1
- package/src/operationsInterfaces/passwordHashes.ts +31 -0
- package/src/operationsInterfaces/sbomComponents.ts +31 -0
- package/src/operationsInterfaces/summaries.ts +50 -0
- package/src/operationsInterfaces/workspaces.ts +8 -8
- package/src/pagingHelper.ts +1 -1
- package/types/arm-iotfirmwaredefense.d.ts +573 -675
- package/types/tsdoc-metadata.json +1 -1
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareCreateSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareDeleteSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +0 -61
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +0 -61
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGetSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGetSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +0 -94
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareUpdateSample.js.map +0 -1
- package/dist-esm/src/operations/firmwareOperations.d.ts +0 -313
- package/dist-esm/src/operations/firmwareOperations.d.ts.map +0 -1
- package/dist-esm/src/operations/firmwareOperations.js +0 -1358
- package/dist-esm/src/operations/firmwareOperations.js.map +0 -1
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +0 -169
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +0 -1
- package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +0 -1
- package/src/operations/firmwareOperations.ts +0 -1892
- package/src/operationsInterfaces/firmwareOperations.ts +0 -320
|
@@ -13,50 +13,50 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
15
15
|
/**
|
|
16
|
-
* This sample demonstrates how to
|
|
16
|
+
* This sample demonstrates how to Get an analysis result summary of a firmware by name.
|
|
17
17
|
*
|
|
18
|
-
* @summary
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
18
|
+
* @summary Get an analysis result summary of a firmware by name.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function summariesGetMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
23
23
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
-
"
|
|
25
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
26
|
-
|
|
27
|
-
const
|
|
28
|
-
const
|
|
24
|
+
"00000000-0000-0000-0000-000000000000";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
26
|
+
const workspaceName = "default";
|
|
27
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
28
|
+
const summaryName = "Firmware";
|
|
29
29
|
const credential = new DefaultAzureCredential();
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
-
const result = yield client.
|
|
31
|
+
const result = yield client.summaries.get(resourceGroupName, workspaceName, firmwareId, summaryName);
|
|
32
32
|
console.log(result);
|
|
33
33
|
});
|
|
34
34
|
}
|
|
35
35
|
/**
|
|
36
|
-
* This sample demonstrates how to
|
|
36
|
+
* This sample demonstrates how to Get an analysis result summary of a firmware by name.
|
|
37
37
|
*
|
|
38
|
-
* @summary
|
|
39
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
38
|
+
* @summary Get an analysis result summary of a firmware by name.
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MinimumSet_Gen.json
|
|
40
40
|
*/
|
|
41
|
-
function
|
|
41
|
+
function summariesGetMinimumSetGen() {
|
|
42
42
|
return __awaiter(this, void 0, void 0, function* () {
|
|
43
43
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
|
-
"
|
|
45
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
46
|
-
|
|
47
|
-
const
|
|
48
|
-
const
|
|
44
|
+
"00000000-0000-0000-0000-000000000000";
|
|
45
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
46
|
+
const workspaceName = "default";
|
|
47
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
48
|
+
const summaryName = "Firmware";
|
|
49
49
|
const credential = new DefaultAzureCredential();
|
|
50
50
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
-
const result = yield client.
|
|
51
|
+
const result = yield client.summaries.get(resourceGroupName, workspaceName, firmwareId, summaryName);
|
|
52
52
|
console.log(result);
|
|
53
53
|
});
|
|
54
54
|
}
|
|
55
55
|
function main() {
|
|
56
56
|
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
-
|
|
58
|
-
|
|
57
|
+
summariesGetMaximumSetGen();
|
|
58
|
+
summariesGetMinimumSetGen();
|
|
59
59
|
});
|
|
60
60
|
}
|
|
61
61
|
main().catch(console.error);
|
|
62
|
-
//# sourceMappingURL=
|
|
62
|
+
//# sourceMappingURL=summariesGetSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"summariesGetSample.js","sourceRoot":"","sources":["../../samples-dev/summariesGetSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yBAAyB;;QACtC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,WAAW,GAAG,UAAU,CAAC;QAC/B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,GAAG,CACvC,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,WAAW,CACZ,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,yBAAyB;;QACtC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,WAAW,GAAG,UAAU,CAAC;QAC/B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,GAAG,CACvC,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,WAAW,CACZ,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,yBAAyB,EAAE,CAAC;QAC5B,yBAAyB,EAAE,CAAC;IAC9B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"summariesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/summariesListByFirmwareSample.ts"],"names":[],"mappings":""}
|
|
@@ -13,25 +13,24 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
15
15
|
/**
|
|
16
|
-
* This sample demonstrates how to
|
|
16
|
+
* This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name.
|
|
17
17
|
*
|
|
18
|
-
* @summary
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
18
|
+
* @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function summariesListByFirmwareMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
23
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
24
24
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
-
"
|
|
26
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
27
|
-
|
|
28
|
-
const
|
|
29
|
-
const firmwareId = "umrkdttp";
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
|
+
const workspaceName = "default";
|
|
28
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
30
29
|
const credential = new DefaultAzureCredential();
|
|
31
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
32
31
|
const resArray = new Array();
|
|
33
32
|
try {
|
|
34
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.summaries.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
35
34
|
_c = _f.value;
|
|
36
35
|
_d = false;
|
|
37
36
|
let item = _c;
|
|
@@ -49,25 +48,24 @@ function firmwareListGenerateBinaryHardeningListMaximumSetGen() {
|
|
|
49
48
|
});
|
|
50
49
|
}
|
|
51
50
|
/**
|
|
52
|
-
* This sample demonstrates how to
|
|
51
|
+
* This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name.
|
|
53
52
|
*
|
|
54
|
-
* @summary
|
|
55
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
53
|
+
* @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name.
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MinimumSet_Gen.json
|
|
56
55
|
*/
|
|
57
|
-
function
|
|
56
|
+
function summariesListByFirmwareMinimumSetGen() {
|
|
58
57
|
var _a, e_2, _b, _c;
|
|
59
58
|
return __awaiter(this, void 0, void 0, function* () {
|
|
60
59
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
61
|
-
"
|
|
62
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
63
|
-
|
|
64
|
-
const
|
|
65
|
-
const firmwareId = "umrkdttp";
|
|
60
|
+
"00000000-0000-0000-0000-000000000000";
|
|
61
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
62
|
+
const workspaceName = "default";
|
|
63
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
66
64
|
const credential = new DefaultAzureCredential();
|
|
67
65
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
68
66
|
const resArray = new Array();
|
|
69
67
|
try {
|
|
70
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.summaries.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
71
69
|
_c = _f.value;
|
|
72
70
|
_d = false;
|
|
73
71
|
let item = _c;
|
|
@@ -86,9 +84,9 @@ function firmwareListGenerateBinaryHardeningListMinimumSetGen() {
|
|
|
86
84
|
}
|
|
87
85
|
function main() {
|
|
88
86
|
return __awaiter(this, void 0, void 0, function* () {
|
|
89
|
-
|
|
90
|
-
|
|
87
|
+
summariesListByFirmwareMaximumSetGen();
|
|
88
|
+
summariesListByFirmwareMinimumSetGen();
|
|
91
89
|
});
|
|
92
90
|
}
|
|
93
91
|
main().catch(console.error);
|
|
94
|
-
//# sourceMappingURL=
|
|
92
|
+
//# sourceMappingURL=summariesListByFirmwareSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"summariesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/summariesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oCAAoC;;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,SAAS,CAAC,cAAc,CACpD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,oCAAoC;;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,SAAS,CAAC,cAAc,CACpD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,oCAAoC,EAAE,CAAC;QACvC,oCAAoC,EAAE,CAAC;IACzC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
import { __awaiter } from "tslib";
|
|
9
9
|
// Copyright (c) Microsoft Corporation.
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
|
-
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
11
|
+
import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to create or update a firmware analysis workspace.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to create or update a firmware analysis workspace.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function workspacesCreateMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -26,7 +26,8 @@ function workspacesCreateMaximumSetGen() {
|
|
|
26
26
|
const workspaceName = "E___-3";
|
|
27
27
|
const workspace = {
|
|
28
28
|
location: "jjwbseilitjgdrhbvvkwviqj",
|
|
29
|
-
|
|
29
|
+
properties: {},
|
|
30
|
+
tags: { key450: "rzqqumbpfsbibnpirsm" },
|
|
30
31
|
};
|
|
31
32
|
const credential = new DefaultAzureCredential();
|
|
32
33
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
@@ -38,7 +39,7 @@ function workspacesCreateMaximumSetGen() {
|
|
|
38
39
|
* This sample demonstrates how to The operation to create or update a firmware analysis workspace.
|
|
39
40
|
*
|
|
40
41
|
* @summary The operation to create or update a firmware analysis workspace.
|
|
41
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
42
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MinimumSet_Gen.json
|
|
42
43
|
*/
|
|
43
44
|
function workspacesCreateMinimumSetGen() {
|
|
44
45
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"workspacesCreateSample.js","sourceRoot":"","sources":["../../samples-dev/workspacesCreateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,
|
|
1
|
+
{"version":3,"file":"workspacesCreateSample.js","sourceRoot":"","sources":["../../samples-dev/workspacesCreateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6BAA6B;;QAC1C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,cAAc,CAAC;QACrE,MAAM,aAAa,GAAG,QAAQ,CAAC;QAC/B,MAAM,SAAS,GAAc;YAC3B,QAAQ,EAAE,0BAA0B;YACpC,UAAU,EAAE,EAAE;YACd,IAAI,EAAE,EAAE,MAAM,EAAE,qBAAqB,EAAE;SACxC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,UAAU,CAAC,MAAM,CAC3C,iBAAiB,EACjB,aAAa,EACb,SAAS,CACV,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,6BAA6B;;QAC1C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,cAAc,CAAC;QACrE,MAAM,aAAa,GAAG,QAAQ,CAAC;QAC/B,MAAM,SAAS,GAAc,EAAE,QAAQ,EAAE,0BAA0B,EAAE,CAAC;QACtE,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,UAAU,CAAC,MAAM,CAC3C,iBAAiB,EACjB,aAAa,EACb,SAAS,CACV,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,6BAA6B,EAAE,CAAC;QAChC,6BAA6B,EAAE,CAAC;IAClC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to delete a firmware analysis workspace.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to delete a firmware analysis workspace.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function workspacesDeleteMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -34,7 +34,7 @@ function workspacesDeleteMaximumSetGen() {
|
|
|
34
34
|
* This sample demonstrates how to The operation to delete a firmware analysis workspace.
|
|
35
35
|
*
|
|
36
36
|
* @summary The operation to delete a firmware analysis workspace.
|
|
37
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
37
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MinimumSet_Gen.json
|
|
38
38
|
*/
|
|
39
39
|
function workspacesDeleteMinimumSetGen() {
|
|
40
40
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
import { __awaiter } from "tslib";
|
|
9
9
|
// Copyright (c) Microsoft Corporation.
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
|
-
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
11
|
+
import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to get a url for file upload.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to get a url for file upload.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function workspacesGenerateUploadUrlMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -25,7 +25,7 @@ function workspacesGenerateUploadUrlMaximumSetGen() {
|
|
|
25
25
|
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces";
|
|
26
26
|
const workspaceName = "E___-3";
|
|
27
27
|
const generateUploadUrl = {
|
|
28
|
-
firmwareId: "ytsfprbywi"
|
|
28
|
+
firmwareId: "ytsfprbywi",
|
|
29
29
|
};
|
|
30
30
|
const credential = new DefaultAzureCredential();
|
|
31
31
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
@@ -37,7 +37,7 @@ function workspacesGenerateUploadUrlMaximumSetGen() {
|
|
|
37
37
|
* This sample demonstrates how to The operation to get a url for file upload.
|
|
38
38
|
*
|
|
39
39
|
* @summary The operation to get a url for file upload.
|
|
40
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
40
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MinimumSet_Gen.json
|
|
41
41
|
*/
|
|
42
42
|
function workspacesGenerateUploadUrlMinimumSetGen() {
|
|
43
43
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"workspacesGenerateUploadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/workspacesGenerateUploadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,
|
|
1
|
+
{"version":3,"file":"workspacesGenerateUploadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/workspacesGenerateUploadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,wCAAwC;;QACrD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,cAAc,CAAC;QACrE,MAAM,aAAa,GAAG,QAAQ,CAAC;QAC/B,MAAM,iBAAiB,GAA6B;YAClD,UAAU,EAAE,YAAY;SACzB,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,UAAU,CAAC,iBAAiB,CACtD,iBAAiB,EACjB,aAAa,EACb,iBAAiB,CAClB,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,wCAAwC;;QACrD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,cAAc,CAAC;QACrE,MAAM,aAAa,GAAG,QAAQ,CAAC;QAC/B,MAAM,iBAAiB,GAA6B,EAAE,CAAC;QACvD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,UAAU,CAAC,iBAAiB,CACtD,iBAAiB,EACjB,aAAa,EACb,iBAAiB,CAClB,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,wCAAwC,EAAE,CAAC;QAC3C,wCAAwC,EAAE,CAAC;IAC7C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to Get firmware analysis workspace.
|
|
17
17
|
*
|
|
18
18
|
* @summary Get firmware analysis workspace.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function workspacesGetMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -34,7 +34,7 @@ function workspacesGetMaximumSetGen() {
|
|
|
34
34
|
* This sample demonstrates how to Get firmware analysis workspace.
|
|
35
35
|
*
|
|
36
36
|
* @summary Get firmware analysis workspace.
|
|
37
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
37
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MinimumSet_Gen.json
|
|
38
38
|
*/
|
|
39
39
|
function workspacesGetMinimumSetGen() {
|
|
40
40
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group.
|
|
17
17
|
*
|
|
18
18
|
* @summary Lists all of the firmware analysis workspaces in the specified resource group.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function workspacesListByResourceGroupMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
@@ -49,7 +49,7 @@ function workspacesListByResourceGroupMaximumSetGen() {
|
|
|
49
49
|
* This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group.
|
|
50
50
|
*
|
|
51
51
|
* @summary Lists all of the firmware analysis workspaces in the specified resource group.
|
|
52
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
52
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MinimumSet_Gen.json
|
|
53
53
|
*/
|
|
54
54
|
function workspacesListByResourceGroupMinimumSetGen() {
|
|
55
55
|
var _a, e_2, _b, _c;
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription.
|
|
17
17
|
*
|
|
18
18
|
* @summary Lists all of the firmware analysis workspaces in the specified subscription.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function workspacesListBySubscriptionMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
@@ -48,7 +48,7 @@ function workspacesListBySubscriptionMaximumSetGen() {
|
|
|
48
48
|
* This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription.
|
|
49
49
|
*
|
|
50
50
|
* @summary Lists all of the firmware analysis workspaces in the specified subscription.
|
|
51
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
51
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MinimumSet_Gen.json
|
|
52
52
|
*/
|
|
53
53
|
function workspacesListBySubscriptionMinimumSetGen() {
|
|
54
54
|
var _a, e_2, _b, _c;
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
import { __awaiter } from "tslib";
|
|
9
9
|
// Copyright (c) Microsoft Corporation.
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
|
-
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
11
|
+
import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
@@ -16,7 +16,7 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to update a firmware analysis workspaces.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to update a firmware analysis workspaces.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
21
|
function workspacesUpdateMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -24,7 +24,7 @@ function workspacesUpdateMaximumSetGen() {
|
|
|
24
24
|
"5443A01A-5242-4950-AC1A-2DD362180254";
|
|
25
25
|
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces";
|
|
26
26
|
const workspaceName = "E___-3";
|
|
27
|
-
const workspace = {};
|
|
27
|
+
const workspace = { properties: {} };
|
|
28
28
|
const credential = new DefaultAzureCredential();
|
|
29
29
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
30
30
|
const result = yield client.workspaces.update(resourceGroupName, workspaceName, workspace);
|
|
@@ -35,7 +35,7 @@ function workspacesUpdateMaximumSetGen() {
|
|
|
35
35
|
* This sample demonstrates how to The operation to update a firmware analysis workspaces.
|
|
36
36
|
*
|
|
37
37
|
* @summary The operation to update a firmware analysis workspaces.
|
|
38
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
38
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MinimumSet_Gen.json
|
|
39
39
|
*/
|
|
40
40
|
function workspacesUpdateMinimumSetGen() {
|
|
41
41
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"workspacesUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/workspacesUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,
|
|
1
|
+
{"version":3,"file":"workspacesUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/workspacesUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6BAA6B;;QAC1C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,cAAc,CAAC;QACrE,MAAM,aAAa,GAAG,QAAQ,CAAC;QAC/B,MAAM,SAAS,GAA8B,EAAE,UAAU,EAAE,EAAE,EAAE,CAAC;QAChE,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,UAAU,CAAC,MAAM,CAC3C,iBAAiB,EACjB,aAAa,EACb,SAAS,CACV,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,6BAA6B;;QAC1C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,cAAc,CAAC;QACrE,MAAM,aAAa,GAAG,QAAQ,CAAC;QAC/B,MAAM,SAAS,GAA8B,EAAE,CAAC;QAChD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,UAAU,CAAC,MAAM,CAC3C,iBAAiB,EACjB,aAAa,EACb,SAAS,CACV,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,6BAA6B,EAAE,CAAC;QAChC,6BAA6B,EAAE,CAAC;IAClC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import * as coreClient from "@azure/core-client";
|
|
2
2
|
import * as coreAuth from "@azure/core-auth";
|
|
3
|
-
import {
|
|
3
|
+
import { BinaryHardening, CryptoCertificates, CryptoKeys, Cves, Firmwares, Operations, PasswordHashes, SbomComponents, Summaries, Workspaces } from "./operationsInterfaces";
|
|
4
4
|
import { IoTFirmwareDefenseClientOptionalParams } from "./models";
|
|
5
5
|
export declare class IoTFirmwareDefenseClient extends coreClient.ServiceClient {
|
|
6
6
|
$host: string;
|
|
@@ -9,14 +9,21 @@ export declare class IoTFirmwareDefenseClient extends coreClient.ServiceClient {
|
|
|
9
9
|
/**
|
|
10
10
|
* Initializes a new instance of the IoTFirmwareDefenseClient class.
|
|
11
11
|
* @param credentials Subscription credentials which uniquely identify client subscription.
|
|
12
|
-
* @param subscriptionId The ID of the target subscription.
|
|
12
|
+
* @param subscriptionId The ID of the target subscription. The value must be an UUID.
|
|
13
13
|
* @param options The parameter options
|
|
14
14
|
*/
|
|
15
15
|
constructor(credentials: coreAuth.TokenCredential, subscriptionId: string, options?: IoTFirmwareDefenseClientOptionalParams);
|
|
16
16
|
/** A function that adds a policy that sets the api-version (or equivalent) to reflect the library version. */
|
|
17
17
|
private addCustomApiVersionPolicy;
|
|
18
|
-
|
|
19
|
-
|
|
18
|
+
binaryHardening: BinaryHardening;
|
|
19
|
+
cryptoCertificates: CryptoCertificates;
|
|
20
|
+
cryptoKeys: CryptoKeys;
|
|
21
|
+
cves: Cves;
|
|
22
|
+
firmwares: Firmwares;
|
|
20
23
|
operations: Operations;
|
|
24
|
+
passwordHashes: PasswordHashes;
|
|
25
|
+
sbomComponents: SbomComponents;
|
|
26
|
+
summaries: Summaries;
|
|
27
|
+
workspaces: Workspaces;
|
|
21
28
|
}
|
|
22
29
|
//# sourceMappingURL=ioTFirmwareDefenseClient.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ioTFirmwareDefenseClient.d.ts","sourceRoot":"","sources":["../../src/ioTFirmwareDefenseClient.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AAOjD,OAAO,KAAK,QAAQ,MAAM,kBAAkB,CAAC;
|
|
1
|
+
{"version":3,"file":"ioTFirmwareDefenseClient.d.ts","sourceRoot":"","sources":["../../src/ioTFirmwareDefenseClient.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AAOjD,OAAO,KAAK,QAAQ,MAAM,kBAAkB,CAAC;AAa7C,OAAO,EACL,eAAe,EACf,kBAAkB,EAClB,UAAU,EACV,IAAI,EACJ,SAAS,EACT,UAAU,EACV,cAAc,EACd,cAAc,EACd,SAAS,EACT,UAAU,EACX,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,sCAAsC,EAAE,MAAM,UAAU,CAAC;AAElE,qBAAa,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IACpE,KAAK,EAAE,MAAM,CAAC;IACd,cAAc,EAAE,MAAM,CAAC;IACvB,UAAU,EAAE,MAAM,CAAC;IAEnB;;;;;OAKG;gBAED,WAAW,EAAE,QAAQ,CAAC,eAAe,EACrC,cAAc,EAAE,MAAM,EACtB,OAAO,CAAC,EAAE,sCAAsC;IAsFlD,8GAA8G;IAC9G,OAAO,CAAC,yBAAyB;IA2BjC,eAAe,EAAE,eAAe,CAAC;IACjC,kBAAkB,EAAE,kBAAkB,CAAC;IACvC,UAAU,EAAE,UAAU,CAAC;IACvB,IAAI,EAAE,IAAI,CAAC;IACX,SAAS,EAAE,SAAS,CAAC;IACrB,UAAU,EAAE,UAAU,CAAC;IACvB,cAAc,EAAE,cAAc,CAAC;IAC/B,cAAc,EAAE,cAAc,CAAC;IAC/B,SAAS,EAAE,SAAS,CAAC;IACrB,UAAU,EAAE,UAAU,CAAC;CACxB"}
|
|
@@ -8,12 +8,12 @@
|
|
|
8
8
|
import { __awaiter } from "tslib";
|
|
9
9
|
import * as coreClient from "@azure/core-client";
|
|
10
10
|
import * as coreRestPipeline from "@azure/core-rest-pipeline";
|
|
11
|
-
import {
|
|
11
|
+
import { BinaryHardeningImpl, CryptoCertificatesImpl, CryptoKeysImpl, CvesImpl, FirmwaresImpl, OperationsImpl, PasswordHashesImpl, SbomComponentsImpl, SummariesImpl, WorkspacesImpl, } from "./operations";
|
|
12
12
|
export class IoTFirmwareDefenseClient extends coreClient.ServiceClient {
|
|
13
13
|
/**
|
|
14
14
|
* Initializes a new instance of the IoTFirmwareDefenseClient class.
|
|
15
15
|
* @param credentials Subscription credentials which uniquely identify client subscription.
|
|
16
|
-
* @param subscriptionId The ID of the target subscription.
|
|
16
|
+
* @param subscriptionId The ID of the target subscription. The value must be an UUID.
|
|
17
17
|
* @param options The parameter options
|
|
18
18
|
*/
|
|
19
19
|
constructor(credentials, subscriptionId, options) {
|
|
@@ -30,14 +30,14 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient {
|
|
|
30
30
|
}
|
|
31
31
|
const defaults = {
|
|
32
32
|
requestContentType: "application/json; charset=utf-8",
|
|
33
|
-
credential: credentials
|
|
33
|
+
credential: credentials,
|
|
34
34
|
};
|
|
35
|
-
const packageDetails = `azsdk-js-arm-iotfirmwaredefense/1.0.0
|
|
35
|
+
const packageDetails = `azsdk-js-arm-iotfirmwaredefense/1.0.0`;
|
|
36
36
|
const userAgentPrefix = options.userAgentOptions && options.userAgentOptions.userAgentPrefix
|
|
37
37
|
? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}`
|
|
38
38
|
: `${packageDetails}`;
|
|
39
39
|
const optionsWithDefaults = Object.assign(Object.assign(Object.assign({}, defaults), options), { userAgentOptions: {
|
|
40
|
-
userAgentPrefix
|
|
40
|
+
userAgentPrefix,
|
|
41
41
|
}, endpoint: (_b = (_a = options.endpoint) !== null && _a !== void 0 ? _a : options.baseUri) !== null && _b !== void 0 ? _b : "https://management.azure.com" });
|
|
42
42
|
super(optionsWithDefaults);
|
|
43
43
|
let bearerTokenAuthenticationPolicyFound = false;
|
|
@@ -51,24 +51,31 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient {
|
|
|
51
51
|
options.pipeline.getOrderedPolicies().length == 0 ||
|
|
52
52
|
!bearerTokenAuthenticationPolicyFound) {
|
|
53
53
|
this.pipeline.removePolicy({
|
|
54
|
-
name: coreRestPipeline.bearerTokenAuthenticationPolicyName
|
|
54
|
+
name: coreRestPipeline.bearerTokenAuthenticationPolicyName,
|
|
55
55
|
});
|
|
56
56
|
this.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
|
|
57
57
|
credential: credentials,
|
|
58
58
|
scopes: (_c = optionsWithDefaults.credentialScopes) !== null && _c !== void 0 ? _c : `${optionsWithDefaults.endpoint}/.default`,
|
|
59
59
|
challengeCallbacks: {
|
|
60
|
-
authorizeRequestOnChallenge: coreClient.authorizeRequestOnClaimChallenge
|
|
61
|
-
}
|
|
60
|
+
authorizeRequestOnChallenge: coreClient.authorizeRequestOnClaimChallenge,
|
|
61
|
+
},
|
|
62
62
|
}));
|
|
63
63
|
}
|
|
64
64
|
// Parameter assignments
|
|
65
65
|
this.subscriptionId = subscriptionId;
|
|
66
66
|
// Assigning values to Constant parameters
|
|
67
67
|
this.$host = options.$host || "https://management.azure.com";
|
|
68
|
-
this.apiVersion = options.apiVersion || "
|
|
69
|
-
this.
|
|
70
|
-
this.
|
|
68
|
+
this.apiVersion = options.apiVersion || "2024-01-10";
|
|
69
|
+
this.binaryHardening = new BinaryHardeningImpl(this);
|
|
70
|
+
this.cryptoCertificates = new CryptoCertificatesImpl(this);
|
|
71
|
+
this.cryptoKeys = new CryptoKeysImpl(this);
|
|
72
|
+
this.cves = new CvesImpl(this);
|
|
73
|
+
this.firmwares = new FirmwaresImpl(this);
|
|
71
74
|
this.operations = new OperationsImpl(this);
|
|
75
|
+
this.passwordHashes = new PasswordHashesImpl(this);
|
|
76
|
+
this.sbomComponents = new SbomComponentsImpl(this);
|
|
77
|
+
this.summaries = new SummariesImpl(this);
|
|
78
|
+
this.workspaces = new WorkspacesImpl(this);
|
|
72
79
|
this.addCustomApiVersionPolicy(options.apiVersion);
|
|
73
80
|
}
|
|
74
81
|
/** A function that adds a policy that sets the api-version (or equivalent) to reflect the library version. */
|
|
@@ -94,7 +101,7 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient {
|
|
|
94
101
|
}
|
|
95
102
|
return next(request);
|
|
96
103
|
});
|
|
97
|
-
}
|
|
104
|
+
},
|
|
98
105
|
};
|
|
99
106
|
this.pipeline.addPolicy(apiVersionPolicy);
|
|
100
107
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ioTFirmwareDefenseClient.js","sourceRoot":"","sources":["../../src/ioTFirmwareDefenseClient.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,gBAAgB,MAAM,2BAA2B,CAAC;AAO9D,OAAO,EACL,sBAAsB,EACtB,cAAc,EACd,cAAc,
|
|
1
|
+
{"version":3,"file":"ioTFirmwareDefenseClient.js","sourceRoot":"","sources":["../../src/ioTFirmwareDefenseClient.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,gBAAgB,MAAM,2BAA2B,CAAC;AAO9D,OAAO,EACL,mBAAmB,EACnB,sBAAsB,EACtB,cAAc,EACd,QAAQ,EACR,aAAa,EACb,cAAc,EACd,kBAAkB,EAClB,kBAAkB,EAClB,aAAa,EACb,cAAc,GACf,MAAM,cAAc,CAAC;AAetB,MAAM,OAAO,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IAKpE;;;;;OAKG;IACH,YACE,WAAqC,EACrC,cAAsB,EACtB,OAAgD;;QAEhD,IAAI,WAAW,KAAK,SAAS,EAAE,CAAC;YAC9B,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,cAAc,KAAK,SAAS,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;QACrD,CAAC;QAED,0CAA0C;QAC1C,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG,EAAE,CAAC;QACf,CAAC;QACD,MAAM,QAAQ,GAA2C;YACvD,kBAAkB,EAAE,iCAAiC;YACrD,UAAU,EAAE,WAAW;SACxB,CAAC;QAEF,MAAM,cAAc,GAAG,uCAAuC,CAAC;QAC/D,MAAM,eAAe,GACnB,OAAO,CAAC,gBAAgB,IAAI,OAAO,CAAC,gBAAgB,CAAC,eAAe;YAClE,CAAC,CAAC,GAAG,OAAO,CAAC,gBAAgB,CAAC,eAAe,IAAI,cAAc,EAAE;YACjE,CAAC,CAAC,GAAG,cAAc,EAAE,CAAC;QAE1B,MAAM,mBAAmB,iDACpB,QAAQ,GACR,OAAO,KACV,gBAAgB,EAAE;gBAChB,eAAe;aAChB,EACD,QAAQ,EACN,MAAA,MAAA,OAAO,CAAC,QAAQ,mCAAI,OAAO,CAAC,OAAO,mCAAI,8BAA8B,GACxE,CAAC;QACF,KAAK,CAAC,mBAAmB,CAAC,CAAC;QAE3B,IAAI,oCAAoC,GAAY,KAAK,CAAC;QAC1D,IAAI,CAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,QAAQ,KAAI,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1E,MAAM,gBAAgB,GACpB,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;YACxC,oCAAoC,GAAG,gBAAgB,CAAC,IAAI,CAC1D,CAAC,cAAc,EAAE,EAAE,CACjB,cAAc,CAAC,IAAI;gBACnB,gBAAgB,CAAC,mCAAmC,CACvD,CAAC;QACJ,CAAC;QACD,IACE,CAAC,OAAO;YACR,CAAC,OAAO,CAAC,QAAQ;YACjB,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC,MAAM,IAAI,CAAC;YACjD,CAAC,oCAAoC,EACrC,CAAC;YACD,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC;gBACzB,IAAI,EAAE,gBAAgB,CAAC,mCAAmC;aAC3D,CAAC,CAAC;YACH,IAAI,CAAC,QAAQ,CAAC,SAAS,CACrB,gBAAgB,CAAC,+BAA+B,CAAC;gBAC/C,UAAU,EAAE,WAAW;gBACvB,MAAM,EACJ,MAAA,mBAAmB,CAAC,gBAAgB,mCACpC,GAAG,mBAAmB,CAAC,QAAQ,WAAW;gBAC5C,kBAAkB,EAAE;oBAClB,2BAA2B,EACzB,UAAU,CAAC,gCAAgC;iBAC9C;aACF,CAAC,CACH,CAAC;QACJ,CAAC;QACD,wBAAwB;QACxB,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QAErC,0CAA0C;QAC1C,IAAI,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,IAAI,8BAA8B,CAAC;QAC7D,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,IAAI,YAAY,CAAC;QACrD,IAAI,CAAC,eAAe,GAAG,IAAI,mBAAmB,CAAC,IAAI,CAAC,CAAC;QACrD,IAAI,CAAC,kBAAkB,GAAG,IAAI,sBAAsB,CAAC,IAAI,CAAC,CAAC;QAC3D,IAAI,CAAC,UAAU,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC3C,IAAI,CAAC,IAAI,GAAG,IAAI,QAAQ,CAAC,IAAI,CAAC,CAAC;QAC/B,IAAI,CAAC,SAAS,GAAG,IAAI,aAAa,CAAC,IAAI,CAAC,CAAC;QACzC,IAAI,CAAC,UAAU,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC3C,IAAI,CAAC,cAAc,GAAG,IAAI,kBAAkB,CAAC,IAAI,CAAC,CAAC;QACnD,IAAI,CAAC,cAAc,GAAG,IAAI,kBAAkB,CAAC,IAAI,CAAC,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,IAAI,aAAa,CAAC,IAAI,CAAC,CAAC;QACzC,IAAI,CAAC,UAAU,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC3C,IAAI,CAAC,yBAAyB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;IACrD,CAAC;IAED,8GAA8G;IACtG,yBAAyB,CAAC,UAAmB;QACnD,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO;QACT,CAAC;QACD,MAAM,gBAAgB,GAAG;YACvB,IAAI,EAAE,wBAAwB;YACxB,WAAW,CACf,OAAwB,EACxB,IAAiB;;oBAEjB,MAAM,KAAK,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBACrC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;wBACrB,MAAM,SAAS,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;4BACjD,IAAI,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;gCACrC,OAAO,cAAc,GAAG,UAAU,CAAC;4BACrC,CAAC;iCAAM,CAAC;gCACN,OAAO,IAAI,CAAC;4BACd,CAAC;wBACH,CAAC,CAAC,CAAC;wBACH,OAAO,CAAC,GAAG,GAAG,KAAK,CAAC,CAAC,CAAC,GAAG,GAAG,GAAG,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;oBACrD,CAAC;oBACD,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC;gBACvB,CAAC;aAAA;SACF,CAAC;QACF,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;IAC5C,CAAC;CAYF"}
|