@azure/arm-iotfirmwaredefense 1.0.0-beta.1 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (286) hide show
  1. package/CHANGELOG.md +2 -2
  2. package/LICENSE +1 -1
  3. package/README.md +2 -2
  4. package/dist/index.js +2280 -2198
  5. package/dist/index.js.map +1 -1
  6. package/dist/index.min.js +1 -1
  7. package/dist/index.min.js.map +1 -1
  8. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts +2 -0
  9. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts.map +1 -0
  10. package/dist-esm/samples-dev/{firmwareListGenerateCryptoKeyListSample.js → binaryHardeningListByFirmwareSample.js} +23 -34
  11. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.js.map +1 -0
  12. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts +2 -0
  13. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts.map +1 -0
  14. package/dist-esm/samples-dev/{firmwareListGenerateCveListSample.js → cryptoCertificatesListByFirmwareSample.js} +25 -37
  15. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.js.map +1 -0
  16. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts +2 -0
  17. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts.map +1 -0
  18. package/dist-esm/samples-dev/{firmwareListGenerateCryptoCertificateListSample.js → cryptoKeysListByFirmwareSample.js} +23 -34
  19. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.js.map +1 -0
  20. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts +2 -0
  21. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts.map +1 -0
  22. package/dist-esm/samples-dev/cvesListByFirmwareSample.js +92 -0
  23. package/dist-esm/samples-dev/cvesListByFirmwareSample.js.map +1 -0
  24. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts +2 -0
  25. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts.map +1 -0
  26. package/dist-esm/samples-dev/{firmwareCreateSample.js → firmwaresCreateSample.js} +20 -18
  27. package/dist-esm/samples-dev/firmwaresCreateSample.js.map +1 -0
  28. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts +2 -0
  29. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts.map +1 -0
  30. package/dist-esm/samples-dev/{firmwareDeleteSample.js → firmwaresDeleteSample.js} +9 -9
  31. package/dist-esm/samples-dev/firmwaresDeleteSample.js.map +1 -0
  32. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts +2 -0
  33. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts.map +1 -0
  34. package/dist-esm/samples-dev/{firmwareGenerateDownloadUrlSample.js → firmwaresGenerateDownloadUrlSample.js} +9 -9
  35. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.js.map +1 -0
  36. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts +2 -0
  37. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
  38. package/dist-esm/samples-dev/{firmwareGenerateFilesystemDownloadUrlSample.js → firmwaresGenerateFilesystemDownloadUrlSample.js} +9 -9
  39. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.js.map +1 -0
  40. package/dist-esm/samples-dev/firmwaresGetSample.d.ts +2 -0
  41. package/dist-esm/samples-dev/firmwaresGetSample.d.ts.map +1 -0
  42. package/dist-esm/samples-dev/{firmwareGetSample.js → firmwaresGetSample.js} +9 -9
  43. package/dist-esm/samples-dev/firmwaresGetSample.js.map +1 -0
  44. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts +2 -0
  45. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts.map +1 -0
  46. package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js} +13 -23
  47. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.js.map +1 -0
  48. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts +2 -0
  49. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts.map +1 -0
  50. package/dist-esm/samples-dev/{firmwareUpdateSample.js → firmwaresUpdateSample.js} +20 -18
  51. package/dist-esm/samples-dev/firmwaresUpdateSample.js.map +1 -0
  52. package/dist-esm/samples-dev/operationsListSample.js +8 -18
  53. package/dist-esm/samples-dev/operationsListSample.js.map +1 -1
  54. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts +2 -0
  55. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts.map +1 -0
  56. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js +92 -0
  57. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js.map +1 -0
  58. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts +2 -0
  59. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts.map +1 -0
  60. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js +92 -0
  61. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js.map +1 -0
  62. package/dist-esm/samples-dev/summariesGetSample.d.ts +2 -0
  63. package/dist-esm/samples-dev/summariesGetSample.d.ts.map +1 -0
  64. package/dist-esm/samples-dev/{firmwareGenerateSummarySample.js → summariesGetSample.js} +23 -23
  65. package/dist-esm/samples-dev/summariesGetSample.js.map +1 -0
  66. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts +2 -0
  67. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts.map +1 -0
  68. package/dist-esm/samples-dev/summariesListByFirmwareSample.js +92 -0
  69. package/dist-esm/samples-dev/summariesListByFirmwareSample.js.map +1 -0
  70. package/dist-esm/samples-dev/workspacesCreateSample.js +5 -4
  71. package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -1
  72. package/dist-esm/samples-dev/workspacesDeleteSample.js +2 -2
  73. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +4 -4
  74. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -1
  75. package/dist-esm/samples-dev/workspacesGetSample.js +2 -2
  76. package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +8 -18
  77. package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js.map +1 -1
  78. package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +8 -18
  79. package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js.map +1 -1
  80. package/dist-esm/samples-dev/workspacesUpdateSample.js +4 -4
  81. package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -1
  82. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +11 -4
  83. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -1
  84. package/dist-esm/src/ioTFirmwareDefenseClient.js +19 -12
  85. package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -1
  86. package/dist-esm/src/models/index.d.ts +516 -602
  87. package/dist-esm/src/models/index.d.ts.map +1 -1
  88. package/dist-esm/src/models/index.js +40 -92
  89. package/dist-esm/src/models/index.js.map +1 -1
  90. package/dist-esm/src/models/mappers.d.ts +45 -25
  91. package/dist-esm/src/models/mappers.d.ts.map +1 -1
  92. package/dist-esm/src/models/mappers.js +1120 -1036
  93. package/dist-esm/src/models/mappers.js.map +1 -1
  94. package/dist-esm/src/models/parameters.d.ts +3 -2
  95. package/dist-esm/src/models/parameters.d.ts.map +1 -1
  96. package/dist-esm/src/models/parameters.js +56 -49
  97. package/dist-esm/src/models/parameters.js.map +1 -1
  98. package/dist-esm/src/operations/binaryHardening.d.ts +41 -0
  99. package/dist-esm/src/operations/binaryHardening.d.ts.map +1 -0
  100. package/dist-esm/src/operations/binaryHardening.js +155 -0
  101. package/dist-esm/src/operations/binaryHardening.js.map +1 -0
  102. package/dist-esm/src/operations/cryptoCertificates.d.ts +41 -0
  103. package/dist-esm/src/operations/cryptoCertificates.d.ts.map +1 -0
  104. package/dist-esm/src/operations/cryptoCertificates.js +155 -0
  105. package/dist-esm/src/operations/cryptoCertificates.js.map +1 -0
  106. package/dist-esm/src/operations/cryptoKeys.d.ts +41 -0
  107. package/dist-esm/src/operations/cryptoKeys.d.ts.map +1 -0
  108. package/dist-esm/src/operations/cryptoKeys.js +155 -0
  109. package/dist-esm/src/operations/cryptoKeys.js.map +1 -0
  110. package/dist-esm/src/operations/cves.d.ts +41 -0
  111. package/dist-esm/src/operations/cves.d.ts.map +1 -0
  112. package/dist-esm/src/operations/cves.js +155 -0
  113. package/dist-esm/src/operations/cves.js.map +1 -0
  114. package/dist-esm/src/operations/firmwares.d.ts +88 -0
  115. package/dist-esm/src/operations/firmwares.d.ts.map +1 -0
  116. package/dist-esm/src/operations/firmwares.js +350 -0
  117. package/dist-esm/src/operations/firmwares.js.map +1 -0
  118. package/dist-esm/src/operations/index.d.ts +9 -2
  119. package/dist-esm/src/operations/index.d.ts.map +1 -1
  120. package/dist-esm/src/operations/index.js +9 -2
  121. package/dist-esm/src/operations/index.js.map +1 -1
  122. package/dist-esm/src/operations/operations.js +12 -17
  123. package/dist-esm/src/operations/operations.js.map +1 -1
  124. package/dist-esm/src/operations/passwordHashes.d.ts +41 -0
  125. package/dist-esm/src/operations/passwordHashes.d.ts.map +1 -0
  126. package/dist-esm/src/operations/passwordHashes.js +155 -0
  127. package/dist-esm/src/operations/passwordHashes.js.map +1 -0
  128. package/dist-esm/src/operations/sbomComponents.d.ts +41 -0
  129. package/dist-esm/src/operations/sbomComponents.d.ts.map +1 -0
  130. package/dist-esm/src/operations/sbomComponents.js +155 -0
  131. package/dist-esm/src/operations/sbomComponents.js.map +1 -0
  132. package/dist-esm/src/operations/summaries.d.ts +52 -0
  133. package/dist-esm/src/operations/summaries.d.ts.map +1 -0
  134. package/dist-esm/src/operations/summaries.js +191 -0
  135. package/dist-esm/src/operations/summaries.js.map +1 -0
  136. package/dist-esm/src/operations/workspaces.js +52 -66
  137. package/dist-esm/src/operations/workspaces.js.map +1 -1
  138. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts +14 -0
  139. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts.map +1 -0
  140. package/dist-esm/src/operationsInterfaces/{firmwareOperations.js → binaryHardening.js} +1 -1
  141. package/dist-esm/src/operationsInterfaces/binaryHardening.js.map +1 -0
  142. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts +14 -0
  143. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts.map +1 -0
  144. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js +9 -0
  145. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js.map +1 -0
  146. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts +14 -0
  147. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts.map +1 -0
  148. package/dist-esm/src/operationsInterfaces/cryptoKeys.js +9 -0
  149. package/dist-esm/src/operationsInterfaces/cryptoKeys.js.map +1 -0
  150. package/dist-esm/src/operationsInterfaces/cves.d.ts +14 -0
  151. package/dist-esm/src/operationsInterfaces/cves.d.ts.map +1 -0
  152. package/dist-esm/src/operationsInterfaces/cves.js +9 -0
  153. package/dist-esm/src/operationsInterfaces/cves.js.map +1 -0
  154. package/dist-esm/src/operationsInterfaces/firmwares.d.ts +63 -0
  155. package/dist-esm/src/operationsInterfaces/firmwares.d.ts.map +1 -0
  156. package/dist-esm/src/operationsInterfaces/firmwares.js +9 -0
  157. package/dist-esm/src/operationsInterfaces/firmwares.js.map +1 -0
  158. package/dist-esm/src/operationsInterfaces/index.d.ts +9 -2
  159. package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
  160. package/dist-esm/src/operationsInterfaces/index.js +9 -2
  161. package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
  162. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts +14 -0
  163. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts.map +1 -0
  164. package/dist-esm/src/operationsInterfaces/passwordHashes.js +9 -0
  165. package/dist-esm/src/operationsInterfaces/passwordHashes.js.map +1 -0
  166. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts +14 -0
  167. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts.map +1 -0
  168. package/dist-esm/src/operationsInterfaces/sbomComponents.js +9 -0
  169. package/dist-esm/src/operationsInterfaces/sbomComponents.js.map +1 -0
  170. package/dist-esm/src/operationsInterfaces/summaries.d.ts +24 -0
  171. package/dist-esm/src/operationsInterfaces/summaries.d.ts.map +1 -0
  172. package/dist-esm/src/operationsInterfaces/summaries.js +9 -0
  173. package/dist-esm/src/operationsInterfaces/summaries.js.map +1 -0
  174. package/dist-esm/src/pagingHelper.js.map +1 -1
  175. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +7 -17
  176. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -1
  177. package/package.json +15 -20
  178. package/review/arm-iotfirmwaredefense.api.md +329 -330
  179. package/src/ioTFirmwareDefenseClient.ts +53 -24
  180. package/src/models/index.ts +566 -646
  181. package/src/models/mappers.ts +1190 -1036
  182. package/src/models/parameters.ts +59 -51
  183. package/src/operations/binaryHardening.ts +216 -0
  184. package/src/operations/cryptoCertificates.ts +216 -0
  185. package/src/operations/cryptoKeys.ts +216 -0
  186. package/src/operations/cves.ts +216 -0
  187. package/src/operations/firmwares.ts +469 -0
  188. package/src/operations/index.ts +9 -2
  189. package/src/operations/operations.ts +16 -16
  190. package/src/operations/passwordHashes.ts +216 -0
  191. package/src/operations/sbomComponents.ts +216 -0
  192. package/src/operations/summaries.ts +265 -0
  193. package/src/operations/workspaces.ts +81 -92
  194. package/src/operationsInterfaces/binaryHardening.ts +31 -0
  195. package/src/operationsInterfaces/cryptoCertificates.ts +31 -0
  196. package/src/operationsInterfaces/cryptoKeys.ts +31 -0
  197. package/src/operationsInterfaces/cves.ts +28 -0
  198. package/src/operationsInterfaces/firmwares.ts +123 -0
  199. package/src/operationsInterfaces/index.ts +9 -2
  200. package/src/operationsInterfaces/operations.ts +1 -1
  201. package/src/operationsInterfaces/passwordHashes.ts +31 -0
  202. package/src/operationsInterfaces/sbomComponents.ts +31 -0
  203. package/src/operationsInterfaces/summaries.ts +50 -0
  204. package/src/operationsInterfaces/workspaces.ts +8 -8
  205. package/src/pagingHelper.ts +1 -1
  206. package/types/arm-iotfirmwaredefense.d.ts +573 -675
  207. package/types/tsdoc-metadata.json +1 -1
  208. package/dist-esm/samples-dev/firmwareCreateSample.d.ts +0 -2
  209. package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +0 -1
  210. package/dist-esm/samples-dev/firmwareCreateSample.js.map +0 -1
  211. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +0 -2
  212. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +0 -1
  213. package/dist-esm/samples-dev/firmwareDeleteSample.js.map +0 -1
  214. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +0 -2
  215. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +0 -1
  216. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +0 -62
  217. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +0 -1
  218. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +0 -2
  219. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +0 -1
  220. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +0 -62
  221. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +0 -1
  222. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +0 -2
  223. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +0 -1
  224. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +0 -62
  225. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +0 -1
  226. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +0 -2
  227. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +0 -1
  228. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +0 -61
  229. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +0 -1
  230. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +0 -2
  231. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +0 -1
  232. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +0 -61
  233. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +0 -1
  234. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +0 -2
  235. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +0 -1
  236. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +0 -62
  237. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +0 -1
  238. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +0 -2
  239. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +0 -1
  240. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +0 -1
  241. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +0 -2
  242. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +0 -1
  243. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +0 -1
  244. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +0 -2
  245. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +0 -1
  246. package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +0 -1
  247. package/dist-esm/samples-dev/firmwareGetSample.d.ts +0 -2
  248. package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +0 -1
  249. package/dist-esm/samples-dev/firmwareGetSample.js.map +0 -1
  250. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +0 -2
  251. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +0 -1
  252. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +0 -1
  253. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +0 -2
  254. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +0 -1
  255. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js +0 -104
  256. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +0 -1
  257. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +0 -2
  258. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +0 -1
  259. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js +0 -104
  260. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +0 -1
  261. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +0 -2
  262. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +0 -1
  263. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +0 -1
  264. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +0 -2
  265. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +0 -1
  266. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +0 -1
  267. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +0 -2
  268. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +0 -1
  269. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +0 -1
  270. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +0 -2
  271. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +0 -1
  272. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +0 -104
  273. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +0 -1
  274. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +0 -2
  275. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +0 -1
  276. package/dist-esm/samples-dev/firmwareUpdateSample.js.map +0 -1
  277. package/dist-esm/src/operations/firmwareOperations.d.ts +0 -313
  278. package/dist-esm/src/operations/firmwareOperations.d.ts.map +0 -1
  279. package/dist-esm/src/operations/firmwareOperations.js +0 -1393
  280. package/dist-esm/src/operations/firmwareOperations.js.map +0 -1
  281. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +0 -169
  282. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +0 -1
  283. package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +0 -1
  284. package/rollup.config.js +0 -122
  285. package/src/operations/firmwareOperations.ts +0 -1892
  286. package/src/operationsInterfaces/firmwareOperations.ts +0 -320
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=binaryHardeningListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"binaryHardeningListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/binaryHardeningListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -13,33 +13,28 @@ import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
15
15
  /**
16
- * This sample demonstrates how to The operation to list all crypto keys for a firmware.
16
+ * This sample demonstrates how to Lists binary hardening analysis results of a firmware.
17
17
  *
18
- * @summary The operation to list all crypto keys for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json
18
+ * @summary Lists binary hardening analysis results of a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListGenerateCryptoKeyListMaximumSetGen() {
21
+ function binaryHardeningListByFirmwareMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
25
+ "00000000-0000-0000-0000-000000000000";
26
26
  const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
27
  const workspaceName = "default";
28
- const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
31
  const resArray = new Array();
32
32
  try {
33
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoKeyList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
33
+ for (var _d = true, _e = __asyncValues(client.binaryHardening.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
34
  _c = _f.value;
35
35
  _d = false;
36
- try {
37
- let item = _c;
38
- resArray.push(item);
39
- }
40
- finally {
41
- _d = true;
42
- }
36
+ let item = _c;
37
+ resArray.push(item);
43
38
  }
44
39
  }
45
40
  catch (e_1_1) { e_1 = { error: e_1_1 }; }
@@ -53,34 +48,28 @@ function firmwareListGenerateCryptoKeyListMaximumSetGen() {
53
48
  });
54
49
  }
55
50
  /**
56
- * This sample demonstrates how to The operation to list all crypto keys for a firmware.
51
+ * This sample demonstrates how to Lists binary hardening analysis results of a firmware.
57
52
  *
58
- * @summary The operation to list all crypto keys for a firmware.
59
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MinimumSet_Gen.json
53
+ * @summary Lists binary hardening analysis results of a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MinimumSet_Gen.json
60
55
  */
61
- function firmwareListGenerateCryptoKeyListMinimumSetGen() {
56
+ function binaryHardeningListByFirmwareMinimumSetGen() {
62
57
  var _a, e_2, _b, _c;
63
58
  return __awaiter(this, void 0, void 0, function* () {
64
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
65
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
66
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
67
- "rgworkspaces-firmwares";
68
- const workspaceName = "j5QE_";
69
- const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
70
64
  const credential = new DefaultAzureCredential();
71
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
72
66
  const resArray = new Array();
73
67
  try {
74
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoKeyList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
68
+ for (var _d = true, _e = __asyncValues(client.binaryHardening.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
75
69
  _c = _f.value;
76
70
  _d = false;
77
- try {
78
- let item = _c;
79
- resArray.push(item);
80
- }
81
- finally {
82
- _d = true;
83
- }
71
+ let item = _c;
72
+ resArray.push(item);
84
73
  }
85
74
  }
86
75
  catch (e_2_1) { e_2 = { error: e_2_1 }; }
@@ -95,9 +84,9 @@ function firmwareListGenerateCryptoKeyListMinimumSetGen() {
95
84
  }
96
85
  function main() {
97
86
  return __awaiter(this, void 0, void 0, function* () {
98
- firmwareListGenerateCryptoKeyListMaximumSetGen();
99
- firmwareListGenerateCryptoKeyListMinimumSetGen();
87
+ binaryHardeningListByFirmwareMaximumSetGen();
88
+ binaryHardeningListByFirmwareMinimumSetGen();
100
89
  });
101
90
  }
102
91
  main().catch(console.error);
103
- //# sourceMappingURL=firmwareListGenerateCryptoKeyListSample.js.map
92
+ //# sourceMappingURL=binaryHardeningListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"binaryHardeningListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/binaryHardeningListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,0CAA0C;;;QACvD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,eAAe,CAAC,cAAc,CAC1D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,0CAA0C;;;QACvD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,eAAe,CAAC,cAAc,CAC1D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,0CAA0C,EAAE,CAAC;QAC7C,0CAA0C,EAAE,CAAC;IAC/C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=cryptoCertificatesListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoCertificatesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cryptoCertificatesListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -13,34 +13,28 @@ import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
15
15
  /**
16
- * This sample demonstrates how to The operation to list all cve results for a firmware.
16
+ * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware.
17
17
  *
18
- * @summary The operation to list all cve results for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MaximumSet_Gen.json
18
+ * @summary Lists cryptographic certificate analysis results found in a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListGenerateCveListMaximumSetGen() {
21
+ function cryptoCertificatesListByFirmwareMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
26
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
27
- "rgworkspaces-firmwares";
28
- const workspaceName = "A7";
29
- const firmwareId = "umrkdttp";
25
+ "00000000-0000-0000-0000-000000000000";
26
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
+ const workspaceName = "default";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
30
29
  const credential = new DefaultAzureCredential();
31
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
32
31
  const resArray = new Array();
33
32
  try {
34
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCveList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
33
+ for (var _d = true, _e = __asyncValues(client.cryptoCertificates.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
35
34
  _c = _f.value;
36
35
  _d = false;
37
- try {
38
- let item = _c;
39
- resArray.push(item);
40
- }
41
- finally {
42
- _d = true;
43
- }
36
+ let item = _c;
37
+ resArray.push(item);
44
38
  }
45
39
  }
46
40
  catch (e_1_1) { e_1 = { error: e_1_1 }; }
@@ -54,34 +48,28 @@ function firmwareListGenerateCveListMaximumSetGen() {
54
48
  });
55
49
  }
56
50
  /**
57
- * This sample demonstrates how to The operation to list all cve results for a firmware.
51
+ * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware.
58
52
  *
59
- * @summary The operation to list all cve results for a firmware.
60
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MinimumSet_Gen.json
53
+ * @summary Lists cryptographic certificate analysis results found in a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MinimumSet_Gen.json
61
55
  */
62
- function firmwareListGenerateCveListMinimumSetGen() {
56
+ function cryptoCertificatesListByFirmwareMinimumSetGen() {
63
57
  var _a, e_2, _b, _c;
64
58
  return __awaiter(this, void 0, void 0, function* () {
65
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
66
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
67
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
68
- "rgworkspaces-firmwares";
69
- const workspaceName = "A7";
70
- const firmwareId = "umrkdttp";
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
71
64
  const credential = new DefaultAzureCredential();
72
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
73
66
  const resArray = new Array();
74
67
  try {
75
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCveList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
68
+ for (var _d = true, _e = __asyncValues(client.cryptoCertificates.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
76
69
  _c = _f.value;
77
70
  _d = false;
78
- try {
79
- let item = _c;
80
- resArray.push(item);
81
- }
82
- finally {
83
- _d = true;
84
- }
71
+ let item = _c;
72
+ resArray.push(item);
85
73
  }
86
74
  }
87
75
  catch (e_2_1) { e_2 = { error: e_2_1 }; }
@@ -96,9 +84,9 @@ function firmwareListGenerateCveListMinimumSetGen() {
96
84
  }
97
85
  function main() {
98
86
  return __awaiter(this, void 0, void 0, function* () {
99
- firmwareListGenerateCveListMaximumSetGen();
100
- firmwareListGenerateCveListMinimumSetGen();
87
+ cryptoCertificatesListByFirmwareMaximumSetGen();
88
+ cryptoCertificatesListByFirmwareMinimumSetGen();
101
89
  });
102
90
  }
103
91
  main().catch(console.error);
104
- //# sourceMappingURL=firmwareListGenerateCveListSample.js.map
92
+ //# sourceMappingURL=cryptoCertificatesListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoCertificatesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cryptoCertificatesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,cAAc,CAC7D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,cAAc,CAC7D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;QAChD,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=cryptoKeysListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoKeysListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cryptoKeysListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -13,33 +13,28 @@ import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
15
15
  /**
16
- * This sample demonstrates how to The operation to list all crypto certificates for a firmware.
16
+ * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware.
17
17
  *
18
- * @summary The operation to list all crypto certificates for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json
18
+ * @summary Lists cryptographic key analysis results found in a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json
20
20
  */
21
- function firmwareListGenerateCryptoCertificateListMaximumSetGen() {
21
+ function cryptoKeysListByFirmwareMaximumSetGen() {
22
22
  var _a, e_1, _b, _c;
23
23
  return __awaiter(this, void 0, void 0, function* () {
24
24
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
25
+ "00000000-0000-0000-0000-000000000000";
26
26
  const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
27
  const workspaceName = "default";
28
- const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
31
  const resArray = new Array();
32
32
  try {
33
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoCertificateList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
33
+ for (var _d = true, _e = __asyncValues(client.cryptoKeys.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
34
  _c = _f.value;
35
35
  _d = false;
36
- try {
37
- let item = _c;
38
- resArray.push(item);
39
- }
40
- finally {
41
- _d = true;
42
- }
36
+ let item = _c;
37
+ resArray.push(item);
43
38
  }
44
39
  }
45
40
  catch (e_1_1) { e_1 = { error: e_1_1 }; }
@@ -53,34 +48,28 @@ function firmwareListGenerateCryptoCertificateListMaximumSetGen() {
53
48
  });
54
49
  }
55
50
  /**
56
- * This sample demonstrates how to The operation to list all crypto certificates for a firmware.
51
+ * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware.
57
52
  *
58
- * @summary The operation to list all crypto certificates for a firmware.
59
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MinimumSet_Gen.json
53
+ * @summary Lists cryptographic key analysis results found in a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MinimumSet_Gen.json
60
55
  */
61
- function firmwareListGenerateCryptoCertificateListMinimumSetGen() {
56
+ function cryptoKeysListByFirmwareMinimumSetGen() {
62
57
  var _a, e_2, _b, _c;
63
58
  return __awaiter(this, void 0, void 0, function* () {
64
59
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
65
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
66
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
67
- "rgworkspaces-firmwares";
68
- const workspaceName = "j5QE_";
69
- const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
70
64
  const credential = new DefaultAzureCredential();
71
65
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
72
66
  const resArray = new Array();
73
67
  try {
74
- for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoCertificateList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
68
+ for (var _d = true, _e = __asyncValues(client.cryptoKeys.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
75
69
  _c = _f.value;
76
70
  _d = false;
77
- try {
78
- let item = _c;
79
- resArray.push(item);
80
- }
81
- finally {
82
- _d = true;
83
- }
71
+ let item = _c;
72
+ resArray.push(item);
84
73
  }
85
74
  }
86
75
  catch (e_2_1) { e_2 = { error: e_2_1 }; }
@@ -95,9 +84,9 @@ function firmwareListGenerateCryptoCertificateListMinimumSetGen() {
95
84
  }
96
85
  function main() {
97
86
  return __awaiter(this, void 0, void 0, function* () {
98
- firmwareListGenerateCryptoCertificateListMaximumSetGen();
99
- firmwareListGenerateCryptoCertificateListMinimumSetGen();
87
+ cryptoKeysListByFirmwareMaximumSetGen();
88
+ cryptoKeysListByFirmwareMinimumSetGen();
100
89
  });
101
90
  }
102
91
  main().catch(console.error);
103
- //# sourceMappingURL=firmwareListGenerateCryptoCertificateListSample.js.map
92
+ //# sourceMappingURL=cryptoKeysListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cryptoKeysListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cryptoKeysListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,UAAU,CAAC,cAAc,CACrD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,UAAU,CAAC,cAAc,CACrD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,qCAAqC,EAAE,CAAC;QACxC,qCAAqC,EAAE,CAAC;IAC1C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=cvesListByFirmwareSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cvesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cvesListByFirmwareSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,92 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __asyncValues, __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Lists CVE analysis results of a firmware.
17
+ *
18
+ * @summary Lists CVE analysis results of a firmware.
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json
20
+ */
21
+ function cvesListByFirmwareMaximumSetGen() {
22
+ var _a, e_1, _b, _c;
23
+ return __awaiter(this, void 0, void 0, function* () {
24
+ const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
25
+ "00000000-0000-0000-0000-000000000000";
26
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
27
+ const workspaceName = "default";
28
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
29
+ const credential = new DefaultAzureCredential();
30
+ const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
+ const resArray = new Array();
32
+ try {
33
+ for (var _d = true, _e = __asyncValues(client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
34
+ _c = _f.value;
35
+ _d = false;
36
+ let item = _c;
37
+ resArray.push(item);
38
+ }
39
+ }
40
+ catch (e_1_1) { e_1 = { error: e_1_1 }; }
41
+ finally {
42
+ try {
43
+ if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
44
+ }
45
+ finally { if (e_1) throw e_1.error; }
46
+ }
47
+ console.log(resArray);
48
+ });
49
+ }
50
+ /**
51
+ * This sample demonstrates how to Lists CVE analysis results of a firmware.
52
+ *
53
+ * @summary Lists CVE analysis results of a firmware.
54
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MinimumSet_Gen.json
55
+ */
56
+ function cvesListByFirmwareMinimumSetGen() {
57
+ var _a, e_2, _b, _c;
58
+ return __awaiter(this, void 0, void 0, function* () {
59
+ const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
60
+ "00000000-0000-0000-0000-000000000000";
61
+ const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
62
+ const workspaceName = "default";
63
+ const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
64
+ const credential = new DefaultAzureCredential();
65
+ const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
66
+ const resArray = new Array();
67
+ try {
68
+ for (var _d = true, _e = __asyncValues(client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
69
+ _c = _f.value;
70
+ _d = false;
71
+ let item = _c;
72
+ resArray.push(item);
73
+ }
74
+ }
75
+ catch (e_2_1) { e_2 = { error: e_2_1 }; }
76
+ finally {
77
+ try {
78
+ if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
79
+ }
80
+ finally { if (e_2) throw e_2.error; }
81
+ }
82
+ console.log(resArray);
83
+ });
84
+ }
85
+ function main() {
86
+ return __awaiter(this, void 0, void 0, function* () {
87
+ cvesListByFirmwareMaximumSetGen();
88
+ cvesListByFirmwareMinimumSetGen();
89
+ });
90
+ }
91
+ main().catch(console.error);
92
+ //# sourceMappingURL=cvesListByFirmwareSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cvesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cvesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,+BAA+B;;;QAC5C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,IAAI,CAAC,cAAc,CAC/C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,+BAA+B;;;QAC5C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,IAAI,CAAC,cAAc,CAC/C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,+BAA+B,EAAE,CAAC;QAClC,+BAA+B,EAAE,CAAC;IACpC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresCreateSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresCreateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresCreateSample.ts"],"names":[],"mappings":""}
@@ -8,7 +8,7 @@
8
8
  import { __awaiter } from "tslib";
9
9
  // Copyright (c) Microsoft Corporation.
10
10
  // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
11
+ import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
12
12
  import { DefaultAzureCredential } from "@azure/identity";
13
13
  import * as dotenv from "dotenv";
14
14
  dotenv.config();
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to The operation to create a firmware.
17
17
  *
18
18
  * @summary The operation to create a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json
20
20
  */
21
- function firmwareCreateMaximumSetGen() {
21
+ function firmwaresCreateMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -27,18 +27,20 @@ function firmwareCreateMaximumSetGen() {
27
27
  const workspaceName = "A7";
28
28
  const firmwareId = "umrkdttp";
29
29
  const firmware = {
30
- description: "uz",
31
- fileName: "wresexxulcdsdd",
32
- fileSize: 17,
33
- model: "f",
34
- status: "Pending",
35
- statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
36
- vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
37
- version: "s"
30
+ properties: {
31
+ description: "uz",
32
+ fileName: "wresexxulcdsdd",
33
+ fileSize: 17,
34
+ model: "f",
35
+ status: "Pending",
36
+ statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
37
+ vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
38
+ version: "s",
39
+ },
38
40
  };
39
41
  const credential = new DefaultAzureCredential();
40
42
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
41
- const result = yield client.firmwareOperations.create(resourceGroupName, workspaceName, firmwareId, firmware);
43
+ const result = yield client.firmwares.create(resourceGroupName, workspaceName, firmwareId, firmware);
42
44
  console.log(result);
43
45
  });
44
46
  }
@@ -46,9 +48,9 @@ function firmwareCreateMaximumSetGen() {
46
48
  * This sample demonstrates how to The operation to create a firmware.
47
49
  *
48
50
  * @summary The operation to create a firmware.
49
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MinimumSet_Gen.json
51
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MinimumSet_Gen.json
50
52
  */
51
- function firmwareCreateMinimumSetGen() {
53
+ function firmwaresCreateMinimumSetGen() {
52
54
  return __awaiter(this, void 0, void 0, function* () {
53
55
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
54
56
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -59,15 +61,15 @@ function firmwareCreateMinimumSetGen() {
59
61
  const firmware = {};
60
62
  const credential = new DefaultAzureCredential();
61
63
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
62
- const result = yield client.firmwareOperations.create(resourceGroupName, workspaceName, firmwareId, firmware);
64
+ const result = yield client.firmwares.create(resourceGroupName, workspaceName, firmwareId, firmware);
63
65
  console.log(result);
64
66
  });
65
67
  }
66
68
  function main() {
67
69
  return __awaiter(this, void 0, void 0, function* () {
68
- firmwareCreateMaximumSetGen();
69
- firmwareCreateMinimumSetGen();
70
+ firmwaresCreateMaximumSetGen();
71
+ firmwaresCreateMinimumSetGen();
70
72
  });
71
73
  }
72
74
  main().catch(console.error);
73
- //# sourceMappingURL=firmwareCreateSample.js.map
75
+ //# sourceMappingURL=firmwaresCreateSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresCreateSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresCreateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa;YACzB,UAAU,EAAE;gBACV,WAAW,EAAE,IAAI;gBACjB,QAAQ,EAAE,gBAAgB;gBAC1B,QAAQ,EAAE,EAAE;gBACZ,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,SAAS;gBACjB,cAAc,EAAE,CAAC,EAAE,OAAO,EAAE,uBAAuB,EAAE,CAAC;gBACtD,MAAM,EAAE,+BAA+B;gBACvC,OAAO,EAAE,GAAG;aACb;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa,EAAE,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,4BAA4B,EAAE,CAAC;QAC/B,4BAA4B,EAAE,CAAC;IACjC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=firmwaresDeleteSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"firmwaresDeleteSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresDeleteSample.ts"],"names":[],"mappings":""}
@@ -16,9 +16,9 @@ dotenv.config();
16
16
  * This sample demonstrates how to The operation to delete a firmware.
17
17
  *
18
18
  * @summary The operation to delete a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MaximumSet_Gen.json
19
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json
20
20
  */
21
- function firmwareDeleteMaximumSetGen() {
21
+ function firmwaresDeleteMaximumSetGen() {
22
22
  return __awaiter(this, void 0, void 0, function* () {
23
23
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
24
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -28,7 +28,7 @@ function firmwareDeleteMaximumSetGen() {
28
28
  const firmwareId = "umrkdttp";
29
29
  const credential = new DefaultAzureCredential();
30
30
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.delete(resourceGroupName, workspaceName, firmwareId);
31
+ const result = yield client.firmwares.delete(resourceGroupName, workspaceName, firmwareId);
32
32
  console.log(result);
33
33
  });
34
34
  }
@@ -36,9 +36,9 @@ function firmwareDeleteMaximumSetGen() {
36
36
  * This sample demonstrates how to The operation to delete a firmware.
37
37
  *
38
38
  * @summary The operation to delete a firmware.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MinimumSet_Gen.json
39
+ * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MinimumSet_Gen.json
40
40
  */
41
- function firmwareDeleteMinimumSetGen() {
41
+ function firmwaresDeleteMinimumSetGen() {
42
42
  return __awaiter(this, void 0, void 0, function* () {
43
43
  const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
44
  "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
@@ -48,15 +48,15 @@ function firmwareDeleteMinimumSetGen() {
48
48
  const firmwareId = "umrkdttp";
49
49
  const credential = new DefaultAzureCredential();
50
50
  const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.delete(resourceGroupName, workspaceName, firmwareId);
51
+ const result = yield client.firmwares.delete(resourceGroupName, workspaceName, firmwareId);
52
52
  console.log(result);
53
53
  });
54
54
  }
55
55
  function main() {
56
56
  return __awaiter(this, void 0, void 0, function* () {
57
- firmwareDeleteMaximumSetGen();
58
- firmwareDeleteMinimumSetGen();
57
+ firmwaresDeleteMaximumSetGen();
58
+ firmwaresDeleteMinimumSetGen();
59
59
  });
60
60
  }
61
61
  main().catch(console.error);
62
- //# sourceMappingURL=firmwareDeleteSample.js.map
62
+ //# sourceMappingURL=firmwaresDeleteSample.js.map