@azure/arm-iotfirmwaredefense 1.0.0-beta.1 → 1.0.1-alpha.20240329.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (286) hide show
  1. package/CHANGELOG.md +13 -3
  2. package/LICENSE +1 -1
  3. package/README.md +2 -2
  4. package/dist/index.js +2280 -2198
  5. package/dist/index.js.map +1 -1
  6. package/dist/index.min.js +1 -1
  7. package/dist/index.min.js.map +1 -1
  8. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts +2 -0
  9. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts.map +1 -0
  10. package/dist-esm/samples-dev/{firmwareListGenerateCryptoKeyListSample.js → binaryHardeningListByFirmwareSample.js} +23 -34
  11. package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.js.map +1 -0
  12. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts +2 -0
  13. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts.map +1 -0
  14. package/dist-esm/samples-dev/{firmwareListGenerateCveListSample.js → cryptoCertificatesListByFirmwareSample.js} +25 -37
  15. package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.js.map +1 -0
  16. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts +2 -0
  17. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts.map +1 -0
  18. package/dist-esm/samples-dev/{firmwareListGenerateCryptoCertificateListSample.js → cryptoKeysListByFirmwareSample.js} +23 -34
  19. package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.js.map +1 -0
  20. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts +2 -0
  21. package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts.map +1 -0
  22. package/dist-esm/samples-dev/cvesListByFirmwareSample.js +92 -0
  23. package/dist-esm/samples-dev/cvesListByFirmwareSample.js.map +1 -0
  24. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts +2 -0
  25. package/dist-esm/samples-dev/firmwaresCreateSample.d.ts.map +1 -0
  26. package/dist-esm/samples-dev/{firmwareCreateSample.js → firmwaresCreateSample.js} +20 -18
  27. package/dist-esm/samples-dev/firmwaresCreateSample.js.map +1 -0
  28. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts +2 -0
  29. package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts.map +1 -0
  30. package/dist-esm/samples-dev/{firmwareDeleteSample.js → firmwaresDeleteSample.js} +9 -9
  31. package/dist-esm/samples-dev/firmwaresDeleteSample.js.map +1 -0
  32. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts +2 -0
  33. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts.map +1 -0
  34. package/dist-esm/samples-dev/{firmwareGenerateDownloadUrlSample.js → firmwaresGenerateDownloadUrlSample.js} +9 -9
  35. package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.js.map +1 -0
  36. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts +2 -0
  37. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
  38. package/dist-esm/samples-dev/{firmwareGenerateFilesystemDownloadUrlSample.js → firmwaresGenerateFilesystemDownloadUrlSample.js} +9 -9
  39. package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.js.map +1 -0
  40. package/dist-esm/samples-dev/firmwaresGetSample.d.ts +2 -0
  41. package/dist-esm/samples-dev/firmwaresGetSample.d.ts.map +1 -0
  42. package/dist-esm/samples-dev/{firmwareGetSample.js → firmwaresGetSample.js} +9 -9
  43. package/dist-esm/samples-dev/firmwaresGetSample.js.map +1 -0
  44. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts +2 -0
  45. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts.map +1 -0
  46. package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js} +13 -23
  47. package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.js.map +1 -0
  48. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts +2 -0
  49. package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts.map +1 -0
  50. package/dist-esm/samples-dev/{firmwareUpdateSample.js → firmwaresUpdateSample.js} +20 -18
  51. package/dist-esm/samples-dev/firmwaresUpdateSample.js.map +1 -0
  52. package/dist-esm/samples-dev/operationsListSample.js +8 -18
  53. package/dist-esm/samples-dev/operationsListSample.js.map +1 -1
  54. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts +2 -0
  55. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts.map +1 -0
  56. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js +92 -0
  57. package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js.map +1 -0
  58. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts +2 -0
  59. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts.map +1 -0
  60. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js +92 -0
  61. package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js.map +1 -0
  62. package/dist-esm/samples-dev/summariesGetSample.d.ts +2 -0
  63. package/dist-esm/samples-dev/summariesGetSample.d.ts.map +1 -0
  64. package/dist-esm/samples-dev/{firmwareGenerateSummarySample.js → summariesGetSample.js} +23 -23
  65. package/dist-esm/samples-dev/summariesGetSample.js.map +1 -0
  66. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts +2 -0
  67. package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts.map +1 -0
  68. package/dist-esm/samples-dev/summariesListByFirmwareSample.js +92 -0
  69. package/dist-esm/samples-dev/summariesListByFirmwareSample.js.map +1 -0
  70. package/dist-esm/samples-dev/workspacesCreateSample.js +5 -4
  71. package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -1
  72. package/dist-esm/samples-dev/workspacesDeleteSample.js +2 -2
  73. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +4 -4
  74. package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -1
  75. package/dist-esm/samples-dev/workspacesGetSample.js +2 -2
  76. package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +8 -18
  77. package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js.map +1 -1
  78. package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +8 -18
  79. package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js.map +1 -1
  80. package/dist-esm/samples-dev/workspacesUpdateSample.js +4 -4
  81. package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -1
  82. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +11 -4
  83. package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -1
  84. package/dist-esm/src/ioTFirmwareDefenseClient.js +19 -12
  85. package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -1
  86. package/dist-esm/src/models/index.d.ts +516 -602
  87. package/dist-esm/src/models/index.d.ts.map +1 -1
  88. package/dist-esm/src/models/index.js +40 -92
  89. package/dist-esm/src/models/index.js.map +1 -1
  90. package/dist-esm/src/models/mappers.d.ts +45 -25
  91. package/dist-esm/src/models/mappers.d.ts.map +1 -1
  92. package/dist-esm/src/models/mappers.js +1120 -1036
  93. package/dist-esm/src/models/mappers.js.map +1 -1
  94. package/dist-esm/src/models/parameters.d.ts +3 -2
  95. package/dist-esm/src/models/parameters.d.ts.map +1 -1
  96. package/dist-esm/src/models/parameters.js +56 -49
  97. package/dist-esm/src/models/parameters.js.map +1 -1
  98. package/dist-esm/src/operations/binaryHardening.d.ts +41 -0
  99. package/dist-esm/src/operations/binaryHardening.d.ts.map +1 -0
  100. package/dist-esm/src/operations/binaryHardening.js +155 -0
  101. package/dist-esm/src/operations/binaryHardening.js.map +1 -0
  102. package/dist-esm/src/operations/cryptoCertificates.d.ts +41 -0
  103. package/dist-esm/src/operations/cryptoCertificates.d.ts.map +1 -0
  104. package/dist-esm/src/operations/cryptoCertificates.js +155 -0
  105. package/dist-esm/src/operations/cryptoCertificates.js.map +1 -0
  106. package/dist-esm/src/operations/cryptoKeys.d.ts +41 -0
  107. package/dist-esm/src/operations/cryptoKeys.d.ts.map +1 -0
  108. package/dist-esm/src/operations/cryptoKeys.js +155 -0
  109. package/dist-esm/src/operations/cryptoKeys.js.map +1 -0
  110. package/dist-esm/src/operations/cves.d.ts +41 -0
  111. package/dist-esm/src/operations/cves.d.ts.map +1 -0
  112. package/dist-esm/src/operations/cves.js +155 -0
  113. package/dist-esm/src/operations/cves.js.map +1 -0
  114. package/dist-esm/src/operations/firmwares.d.ts +88 -0
  115. package/dist-esm/src/operations/firmwares.d.ts.map +1 -0
  116. package/dist-esm/src/operations/firmwares.js +350 -0
  117. package/dist-esm/src/operations/firmwares.js.map +1 -0
  118. package/dist-esm/src/operations/index.d.ts +9 -2
  119. package/dist-esm/src/operations/index.d.ts.map +1 -1
  120. package/dist-esm/src/operations/index.js +9 -2
  121. package/dist-esm/src/operations/index.js.map +1 -1
  122. package/dist-esm/src/operations/operations.js +12 -17
  123. package/dist-esm/src/operations/operations.js.map +1 -1
  124. package/dist-esm/src/operations/passwordHashes.d.ts +41 -0
  125. package/dist-esm/src/operations/passwordHashes.d.ts.map +1 -0
  126. package/dist-esm/src/operations/passwordHashes.js +155 -0
  127. package/dist-esm/src/operations/passwordHashes.js.map +1 -0
  128. package/dist-esm/src/operations/sbomComponents.d.ts +41 -0
  129. package/dist-esm/src/operations/sbomComponents.d.ts.map +1 -0
  130. package/dist-esm/src/operations/sbomComponents.js +155 -0
  131. package/dist-esm/src/operations/sbomComponents.js.map +1 -0
  132. package/dist-esm/src/operations/summaries.d.ts +52 -0
  133. package/dist-esm/src/operations/summaries.d.ts.map +1 -0
  134. package/dist-esm/src/operations/summaries.js +191 -0
  135. package/dist-esm/src/operations/summaries.js.map +1 -0
  136. package/dist-esm/src/operations/workspaces.js +52 -66
  137. package/dist-esm/src/operations/workspaces.js.map +1 -1
  138. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts +14 -0
  139. package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts.map +1 -0
  140. package/dist-esm/src/operationsInterfaces/{firmwareOperations.js → binaryHardening.js} +1 -1
  141. package/dist-esm/src/operationsInterfaces/binaryHardening.js.map +1 -0
  142. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts +14 -0
  143. package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts.map +1 -0
  144. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js +9 -0
  145. package/dist-esm/src/operationsInterfaces/cryptoCertificates.js.map +1 -0
  146. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts +14 -0
  147. package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts.map +1 -0
  148. package/dist-esm/src/operationsInterfaces/cryptoKeys.js +9 -0
  149. package/dist-esm/src/operationsInterfaces/cryptoKeys.js.map +1 -0
  150. package/dist-esm/src/operationsInterfaces/cves.d.ts +14 -0
  151. package/dist-esm/src/operationsInterfaces/cves.d.ts.map +1 -0
  152. package/dist-esm/src/operationsInterfaces/cves.js +9 -0
  153. package/dist-esm/src/operationsInterfaces/cves.js.map +1 -0
  154. package/dist-esm/src/operationsInterfaces/firmwares.d.ts +63 -0
  155. package/dist-esm/src/operationsInterfaces/firmwares.d.ts.map +1 -0
  156. package/dist-esm/src/operationsInterfaces/firmwares.js +9 -0
  157. package/dist-esm/src/operationsInterfaces/firmwares.js.map +1 -0
  158. package/dist-esm/src/operationsInterfaces/index.d.ts +9 -2
  159. package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
  160. package/dist-esm/src/operationsInterfaces/index.js +9 -2
  161. package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
  162. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts +14 -0
  163. package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts.map +1 -0
  164. package/dist-esm/src/operationsInterfaces/passwordHashes.js +9 -0
  165. package/dist-esm/src/operationsInterfaces/passwordHashes.js.map +1 -0
  166. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts +14 -0
  167. package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts.map +1 -0
  168. package/dist-esm/src/operationsInterfaces/sbomComponents.js +9 -0
  169. package/dist-esm/src/operationsInterfaces/sbomComponents.js.map +1 -0
  170. package/dist-esm/src/operationsInterfaces/summaries.d.ts +24 -0
  171. package/dist-esm/src/operationsInterfaces/summaries.d.ts.map +1 -0
  172. package/dist-esm/src/operationsInterfaces/summaries.js +9 -0
  173. package/dist-esm/src/operationsInterfaces/summaries.js.map +1 -0
  174. package/dist-esm/src/pagingHelper.js.map +1 -1
  175. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +7 -17
  176. package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -1
  177. package/package.json +16 -21
  178. package/review/arm-iotfirmwaredefense.api.md +329 -330
  179. package/src/ioTFirmwareDefenseClient.ts +53 -24
  180. package/src/models/index.ts +566 -646
  181. package/src/models/mappers.ts +1190 -1036
  182. package/src/models/parameters.ts +59 -51
  183. package/src/operations/binaryHardening.ts +216 -0
  184. package/src/operations/cryptoCertificates.ts +216 -0
  185. package/src/operations/cryptoKeys.ts +216 -0
  186. package/src/operations/cves.ts +216 -0
  187. package/src/operations/firmwares.ts +469 -0
  188. package/src/operations/index.ts +9 -2
  189. package/src/operations/operations.ts +16 -16
  190. package/src/operations/passwordHashes.ts +216 -0
  191. package/src/operations/sbomComponents.ts +216 -0
  192. package/src/operations/summaries.ts +265 -0
  193. package/src/operations/workspaces.ts +81 -92
  194. package/src/operationsInterfaces/binaryHardening.ts +31 -0
  195. package/src/operationsInterfaces/cryptoCertificates.ts +31 -0
  196. package/src/operationsInterfaces/cryptoKeys.ts +31 -0
  197. package/src/operationsInterfaces/cves.ts +28 -0
  198. package/src/operationsInterfaces/firmwares.ts +123 -0
  199. package/src/operationsInterfaces/index.ts +9 -2
  200. package/src/operationsInterfaces/operations.ts +1 -1
  201. package/src/operationsInterfaces/passwordHashes.ts +31 -0
  202. package/src/operationsInterfaces/sbomComponents.ts +31 -0
  203. package/src/operationsInterfaces/summaries.ts +50 -0
  204. package/src/operationsInterfaces/workspaces.ts +8 -8
  205. package/src/pagingHelper.ts +1 -1
  206. package/types/arm-iotfirmwaredefense.d.ts +573 -675
  207. package/types/tsdoc-metadata.json +1 -1
  208. package/dist-esm/samples-dev/firmwareCreateSample.d.ts +0 -2
  209. package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +0 -1
  210. package/dist-esm/samples-dev/firmwareCreateSample.js.map +0 -1
  211. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +0 -2
  212. package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +0 -1
  213. package/dist-esm/samples-dev/firmwareDeleteSample.js.map +0 -1
  214. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +0 -2
  215. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +0 -1
  216. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +0 -62
  217. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +0 -1
  218. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +0 -2
  219. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +0 -1
  220. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +0 -62
  221. package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +0 -1
  222. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +0 -2
  223. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +0 -1
  224. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +0 -62
  225. package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +0 -1
  226. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +0 -2
  227. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +0 -1
  228. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +0 -61
  229. package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +0 -1
  230. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +0 -2
  231. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +0 -1
  232. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +0 -61
  233. package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +0 -1
  234. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +0 -2
  235. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +0 -1
  236. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +0 -62
  237. package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +0 -1
  238. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +0 -2
  239. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +0 -1
  240. package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +0 -1
  241. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +0 -2
  242. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +0 -1
  243. package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +0 -1
  244. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +0 -2
  245. package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +0 -1
  246. package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +0 -1
  247. package/dist-esm/samples-dev/firmwareGetSample.d.ts +0 -2
  248. package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +0 -1
  249. package/dist-esm/samples-dev/firmwareGetSample.js.map +0 -1
  250. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +0 -2
  251. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +0 -1
  252. package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +0 -1
  253. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +0 -2
  254. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +0 -1
  255. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js +0 -104
  256. package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +0 -1
  257. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +0 -2
  258. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +0 -1
  259. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js +0 -104
  260. package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +0 -1
  261. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +0 -2
  262. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +0 -1
  263. package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +0 -1
  264. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +0 -2
  265. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +0 -1
  266. package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +0 -1
  267. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +0 -2
  268. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +0 -1
  269. package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +0 -1
  270. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +0 -2
  271. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +0 -1
  272. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +0 -104
  273. package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +0 -1
  274. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +0 -2
  275. package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +0 -1
  276. package/dist-esm/samples-dev/firmwareUpdateSample.js.map +0 -1
  277. package/dist-esm/src/operations/firmwareOperations.d.ts +0 -313
  278. package/dist-esm/src/operations/firmwareOperations.d.ts.map +0 -1
  279. package/dist-esm/src/operations/firmwareOperations.js +0 -1393
  280. package/dist-esm/src/operations/firmwareOperations.js.map +0 -1
  281. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +0 -169
  282. package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +0 -1
  283. package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +0 -1
  284. package/rollup.config.js +0 -122
  285. package/src/operations/firmwareOperations.ts +0 -1892
  286. package/src/operationsInterfaces/firmwareOperations.ts +0 -320
@@ -5,7 +5,7 @@
5
5
  "toolPackages": [
6
6
  {
7
7
  "packageName": "@microsoft/api-extractor",
8
- "packageVersion": "7.36.2"
8
+ "packageVersion": "7.43.0"
9
9
  }
10
10
  ]
11
11
  }
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareCreateSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareCreateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareCreateSample.ts"],"names":[],"mappings":""}
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareCreateSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareCreateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,2BAA2B;;QACxC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa;YACzB,WAAW,EAAE,IAAI;YACjB,QAAQ,EAAE,gBAAgB;YAC1B,QAAQ,EAAE,EAAE;YACZ,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,SAAS;YACjB,cAAc,EAAE,CAAC,EAAE,OAAO,EAAE,uBAAuB,EAAE,CAAC;YACtD,MAAM,EAAE,+BAA+B;YACvC,OAAO,EAAE,GAAG;SACb,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,MAAM,CACnD,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,2BAA2B;;QACxC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa,EAAE,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,MAAM,CACnD,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,2BAA2B,EAAE,CAAC;QAC9B,2BAA2B,EAAE,CAAC;IAChC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareDeleteSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareDeleteSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareDeleteSample.ts"],"names":[],"mappings":""}
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareDeleteSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareDeleteSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,2BAA2B;;QACxC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,MAAM,CACnD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,2BAA2B;;QACxC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,MAAM,CACnD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,2BAA2B,EAAE,CAAC;QAC9B,2BAA2B,EAAE,CAAC;IAChC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateBinaryHardeningDetailsSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateBinaryHardeningDetailsSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateBinaryHardeningDetailsSample.ts"],"names":[],"mappings":""}
@@ -1,62 +0,0 @@
1
- /*
2
- * Copyright (c) Microsoft Corporation.
3
- * Licensed under the MIT License.
4
- *
5
- * Code generated by Microsoft (R) AutoRest Code Generator.
6
- * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
- */
8
- import { __awaiter } from "tslib";
9
- // Copyright (c) Microsoft Corporation.
10
- // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
- import { DefaultAzureCredential } from "@azure/identity";
13
- import * as dotenv from "dotenv";
14
- dotenv.config();
15
- /**
16
- * This sample demonstrates how to The operation to get binary hardening details for a firmware.
17
- *
18
- * @summary The operation to get binary hardening details for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MaximumSet_Gen.json
20
- */
21
- function firmwareGenerateBinaryHardeningDetailsMaximumSetGen() {
22
- return __awaiter(this, void 0, void 0, function* () {
23
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
25
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
26
- "rgworkspaces-firmwares";
27
- const workspaceName = "A7";
28
- const firmwareId = "umrkdttp";
29
- const credential = new DefaultAzureCredential();
30
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.generateBinaryHardeningDetails(resourceGroupName, workspaceName, firmwareId);
32
- console.log(result);
33
- });
34
- }
35
- /**
36
- * This sample demonstrates how to The operation to get binary hardening details for a firmware.
37
- *
38
- * @summary The operation to get binary hardening details for a firmware.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MinimumSet_Gen.json
40
- */
41
- function firmwareGenerateBinaryHardeningDetailsMinimumSetGen() {
42
- return __awaiter(this, void 0, void 0, function* () {
43
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
45
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
46
- "rgworkspaces-firmwares";
47
- const workspaceName = "A7";
48
- const firmwareId = "umrkdttp";
49
- const credential = new DefaultAzureCredential();
50
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.generateBinaryHardeningDetails(resourceGroupName, workspaceName, firmwareId);
52
- console.log(result);
53
- });
54
- }
55
- function main() {
56
- return __awaiter(this, void 0, void 0, function* () {
57
- firmwareGenerateBinaryHardeningDetailsMaximumSetGen();
58
- firmwareGenerateBinaryHardeningDetailsMinimumSetGen();
59
- });
60
- }
61
- main().catch(console.error);
62
- //# sourceMappingURL=firmwareGenerateBinaryHardeningDetailsSample.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateBinaryHardeningDetailsSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateBinaryHardeningDetailsSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,8BAA8B,CAC3E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,8BAA8B,CAC3E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,mDAAmD,EAAE,CAAC;QACtD,mDAAmD,EAAE,CAAC;IACxD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateBinaryHardeningSummarySample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateBinaryHardeningSummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateBinaryHardeningSummarySample.ts"],"names":[],"mappings":""}
@@ -1,62 +0,0 @@
1
- /*
2
- * Copyright (c) Microsoft Corporation.
3
- * Licensed under the MIT License.
4
- *
5
- * Code generated by Microsoft (R) AutoRest Code Generator.
6
- * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
- */
8
- import { __awaiter } from "tslib";
9
- // Copyright (c) Microsoft Corporation.
10
- // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
- import { DefaultAzureCredential } from "@azure/identity";
13
- import * as dotenv from "dotenv";
14
- dotenv.config();
15
- /**
16
- * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware.
17
- *
18
- * @summary The operation to list the binary hardening summary percentages for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MaximumSet_Gen.json
20
- */
21
- function firmwareGenerateBinaryHardeningSummaryMaximumSetGen() {
22
- return __awaiter(this, void 0, void 0, function* () {
23
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
25
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
26
- "rgworkspaces-firmwares";
27
- const workspaceName = "A7";
28
- const firmwareId = "umrkdttp";
29
- const credential = new DefaultAzureCredential();
30
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.generateBinaryHardeningSummary(resourceGroupName, workspaceName, firmwareId);
32
- console.log(result);
33
- });
34
- }
35
- /**
36
- * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware.
37
- *
38
- * @summary The operation to list the binary hardening summary percentages for a firmware.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MinimumSet_Gen.json
40
- */
41
- function firmwareGenerateBinaryHardeningSummaryMinimumSetGen() {
42
- return __awaiter(this, void 0, void 0, function* () {
43
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
45
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
46
- "rgworkspaces-firmwares";
47
- const workspaceName = "A7";
48
- const firmwareId = "umrkdttp";
49
- const credential = new DefaultAzureCredential();
50
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.generateBinaryHardeningSummary(resourceGroupName, workspaceName, firmwareId);
52
- console.log(result);
53
- });
54
- }
55
- function main() {
56
- return __awaiter(this, void 0, void 0, function* () {
57
- firmwareGenerateBinaryHardeningSummaryMaximumSetGen();
58
- firmwareGenerateBinaryHardeningSummaryMinimumSetGen();
59
- });
60
- }
61
- main().catch(console.error);
62
- //# sourceMappingURL=firmwareGenerateBinaryHardeningSummarySample.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateBinaryHardeningSummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateBinaryHardeningSummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,8BAA8B,CAC3E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,mDAAmD;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,8BAA8B,CAC3E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,mDAAmD,EAAE,CAAC;QACtD,mDAAmD,EAAE,CAAC;IACxD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateComponentDetailsSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateComponentDetailsSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateComponentDetailsSample.ts"],"names":[],"mappings":""}
@@ -1,62 +0,0 @@
1
- /*
2
- * Copyright (c) Microsoft Corporation.
3
- * Licensed under the MIT License.
4
- *
5
- * Code generated by Microsoft (R) AutoRest Code Generator.
6
- * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
- */
8
- import { __awaiter } from "tslib";
9
- // Copyright (c) Microsoft Corporation.
10
- // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
- import { DefaultAzureCredential } from "@azure/identity";
13
- import * as dotenv from "dotenv";
14
- dotenv.config();
15
- /**
16
- * This sample demonstrates how to The operation to get component details for a firmware.
17
- *
18
- * @summary The operation to get component details for a firmware.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MaximumSet_Gen.json
20
- */
21
- function firmwareGenerateComponentDetailsMaximumSetGen() {
22
- return __awaiter(this, void 0, void 0, function* () {
23
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
25
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
26
- "rgworkspaces-firmwares";
27
- const workspaceName = "A7";
28
- const firmwareId = "umrkdttp";
29
- const credential = new DefaultAzureCredential();
30
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.generateComponentDetails(resourceGroupName, workspaceName, firmwareId);
32
- console.log(result);
33
- });
34
- }
35
- /**
36
- * This sample demonstrates how to The operation to get component details for a firmware.
37
- *
38
- * @summary The operation to get component details for a firmware.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MinimumSet_Gen.json
40
- */
41
- function firmwareGenerateComponentDetailsMinimumSetGen() {
42
- return __awaiter(this, void 0, void 0, function* () {
43
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
45
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
46
- "rgworkspaces-firmwares";
47
- const workspaceName = "A7";
48
- const firmwareId = "umrkdttp";
49
- const credential = new DefaultAzureCredential();
50
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.generateComponentDetails(resourceGroupName, workspaceName, firmwareId);
52
- console.log(result);
53
- });
54
- }
55
- function main() {
56
- return __awaiter(this, void 0, void 0, function* () {
57
- firmwareGenerateComponentDetailsMaximumSetGen();
58
- firmwareGenerateComponentDetailsMinimumSetGen();
59
- });
60
- }
61
- main().catch(console.error);
62
- //# sourceMappingURL=firmwareGenerateComponentDetailsSample.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateComponentDetailsSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateComponentDetailsSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;QAChD,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateCryptoCertificateSummarySample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateCryptoCertificateSummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoCertificateSummarySample.ts"],"names":[],"mappings":""}
@@ -1,61 +0,0 @@
1
- /*
2
- * Copyright (c) Microsoft Corporation.
3
- * Licensed under the MIT License.
4
- *
5
- * Code generated by Microsoft (R) AutoRest Code Generator.
6
- * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
- */
8
- import { __awaiter } from "tslib";
9
- // Copyright (c) Microsoft Corporation.
10
- // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
- import { DefaultAzureCredential } from "@azure/identity";
13
- import * as dotenv from "dotenv";
14
- dotenv.config();
15
- /**
16
- * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
17
- *
18
- * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MaximumSet_Gen.json
20
- */
21
- function firmwareGenerateCryptoCertificateSummaryMaximumSetGen() {
22
- return __awaiter(this, void 0, void 0, function* () {
23
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
25
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
26
- const workspaceName = "default";
27
- const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
28
- const credential = new DefaultAzureCredential();
29
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
30
- const result = yield client.firmwareOperations.generateCryptoCertificateSummary(resourceGroupName, workspaceName, firmwareId);
31
- console.log(result);
32
- });
33
- }
34
- /**
35
- * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
36
- *
37
- * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
38
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MinimumSet_Gen.json
39
- */
40
- function firmwareGenerateCryptoCertificateSummaryMinimumSetGen() {
41
- return __awaiter(this, void 0, void 0, function* () {
42
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
43
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
44
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
45
- "rgworkspaces-firmwares";
46
- const workspaceName = "j5QE_";
47
- const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
48
- const credential = new DefaultAzureCredential();
49
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
50
- const result = yield client.firmwareOperations.generateCryptoCertificateSummary(resourceGroupName, workspaceName, firmwareId);
51
- console.log(result);
52
- });
53
- }
54
- function main() {
55
- return __awaiter(this, void 0, void 0, function* () {
56
- firmwareGenerateCryptoCertificateSummaryMaximumSetGen();
57
- firmwareGenerateCryptoCertificateSummaryMinimumSetGen();
58
- });
59
- }
60
- main().catch(console.error);
61
- //# sourceMappingURL=firmwareGenerateCryptoCertificateSummarySample.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateCryptoCertificateSummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoCertificateSummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qDAAqD;;QAClE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,gCAAgC,CAC7E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,qDAAqD;;QAClE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,MAAM,UAAU,GAAG,6BAA6B,CAAC;QACjD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,gCAAgC,CAC7E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,qDAAqD,EAAE,CAAC;QACxD,qDAAqD,EAAE,CAAC;IAC1D,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateCryptoKeySummarySample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateCryptoKeySummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoKeySummarySample.ts"],"names":[],"mappings":""}
@@ -1,61 +0,0 @@
1
- /*
2
- * Copyright (c) Microsoft Corporation.
3
- * Licensed under the MIT License.
4
- *
5
- * Code generated by Microsoft (R) AutoRest Code Generator.
6
- * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
- */
8
- import { __awaiter } from "tslib";
9
- // Copyright (c) Microsoft Corporation.
10
- // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
- import { DefaultAzureCredential } from "@azure/identity";
13
- import * as dotenv from "dotenv";
14
- dotenv.config();
15
- /**
16
- * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
17
- *
18
- * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MaximumSet_Gen.json
20
- */
21
- function firmwareGenerateCryptoKeySummaryMaximumSetGen() {
22
- return __awaiter(this, void 0, void 0, function* () {
23
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
25
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
26
- const workspaceName = "default";
27
- const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
28
- const credential = new DefaultAzureCredential();
29
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
30
- const result = yield client.firmwareOperations.generateCryptoKeySummary(resourceGroupName, workspaceName, firmwareId);
31
- console.log(result);
32
- });
33
- }
34
- /**
35
- * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
36
- *
37
- * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
38
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MinimumSet_Gen.json
39
- */
40
- function firmwareGenerateCryptoKeySummaryMinimumSetGen() {
41
- return __awaiter(this, void 0, void 0, function* () {
42
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
43
- "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
44
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
45
- "rgworkspaces-firmwares";
46
- const workspaceName = "j5QE_";
47
- const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
48
- const credential = new DefaultAzureCredential();
49
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
50
- const result = yield client.firmwareOperations.generateCryptoKeySummary(resourceGroupName, workspaceName, firmwareId);
51
- console.log(result);
52
- });
53
- }
54
- function main() {
55
- return __awaiter(this, void 0, void 0, function* () {
56
- firmwareGenerateCryptoKeySummaryMaximumSetGen();
57
- firmwareGenerateCryptoKeySummaryMinimumSetGen();
58
- });
59
- }
60
- main().catch(console.error);
61
- //# sourceMappingURL=firmwareGenerateCryptoKeySummarySample.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateCryptoKeySummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoKeySummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,MAAM,UAAU,GAAG,6BAA6B,CAAC;QACjD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;QAChD,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateCveSummarySample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateCveSummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCveSummarySample.ts"],"names":[],"mappings":""}
@@ -1,62 +0,0 @@
1
- /*
2
- * Copyright (c) Microsoft Corporation.
3
- * Licensed under the MIT License.
4
- *
5
- * Code generated by Microsoft (R) AutoRest Code Generator.
6
- * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
- */
8
- import { __awaiter } from "tslib";
9
- // Copyright (c) Microsoft Corporation.
10
- // Licensed under the MIT License.
11
- import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
12
- import { DefaultAzureCredential } from "@azure/identity";
13
- import * as dotenv from "dotenv";
14
- dotenv.config();
15
- /**
16
- * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image.
17
- *
18
- * @summary The operation to provide a high level summary of the CVEs reported for the firmware image.
19
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MaximumSet_Gen.json
20
- */
21
- function firmwareGenerateCveSummaryMaximumSetGen() {
22
- return __awaiter(this, void 0, void 0, function* () {
23
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
24
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
25
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
26
- "rgworkspaces-firmwares";
27
- const workspaceName = "A7";
28
- const firmwareId = "umrkdttp";
29
- const credential = new DefaultAzureCredential();
30
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
31
- const result = yield client.firmwareOperations.generateCveSummary(resourceGroupName, workspaceName, firmwareId);
32
- console.log(result);
33
- });
34
- }
35
- /**
36
- * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image.
37
- *
38
- * @summary The operation to provide a high level summary of the CVEs reported for the firmware image.
39
- * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MinimumSet_Gen.json
40
- */
41
- function firmwareGenerateCveSummaryMinimumSetGen() {
42
- return __awaiter(this, void 0, void 0, function* () {
43
- const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
44
- "685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
45
- const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
46
- "rgworkspaces-firmwares";
47
- const workspaceName = "A7";
48
- const firmwareId = "umrkdttp";
49
- const credential = new DefaultAzureCredential();
50
- const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
51
- const result = yield client.firmwareOperations.generateCveSummary(resourceGroupName, workspaceName, firmwareId);
52
- console.log(result);
53
- });
54
- }
55
- function main() {
56
- return __awaiter(this, void 0, void 0, function* () {
57
- firmwareGenerateCveSummaryMaximumSetGen();
58
- firmwareGenerateCveSummaryMinimumSetGen();
59
- });
60
- }
61
- main().catch(console.error);
62
- //# sourceMappingURL=firmwareGenerateCveSummarySample.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateCveSummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCveSummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,uCAAuC;;QACpD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,kBAAkB,CAC/D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,uCAAuC;;QACpD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,kBAAkB,CAC/D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,uCAAuC,EAAE,CAAC;QAC1C,uCAAuC,EAAE,CAAC;IAC5C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateDownloadUrlSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateDownloadUrlSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateDownloadUrlSample.ts"],"names":[],"mappings":""}
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,wCAAwC;;QACrD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,mBAAmB,CAChE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,wCAAwC;;QACrD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,mBAAmB,CAChE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,wCAAwC,EAAE,CAAC;QAC3C,wCAAwC,EAAE,CAAC;IAC7C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateFilesystemDownloadUrlSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateFilesystemDownloadUrlSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":""}
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateFilesystemDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,kDAAkD;;QAC/D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,6BAA6B,CAC1E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,kDAAkD;;QAC/D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,6BAA6B,CAC1E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,kDAAkD,EAAE,CAAC;QACrD,kDAAkD,EAAE,CAAC;IACvD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGenerateSummarySample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateSummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateSummarySample.ts"],"names":[],"mappings":""}
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGenerateSummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateSummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oCAAoC;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC5D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,oCAAoC;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC5D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,oCAAoC,EAAE,CAAC;QACvC,oCAAoC,EAAE,CAAC;IACzC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareGetSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGetSample.ts"],"names":[],"mappings":""}
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareGetSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGetSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,wBAAwB;;QACrC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,GAAG,CAChD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,wBAAwB;;QACrC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,GAAG,CAChD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,wBAAwB,EAAE,CAAC;QAC3B,wBAAwB,EAAE,CAAC;IAC7B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareListByWorkspaceSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareListByWorkspaceSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListByWorkspaceSample.ts"],"names":[],"mappings":""}
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareListByWorkspaceSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareListByWorkspaceSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oCAAoC;;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC9D,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA;gBAHsB,cAGtB;gBAHsB,WAGtB;;oBAHU,IAAI,IAAI,KAAA,CAAA;oBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,oCAAoC;;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC9D,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA;gBAHsB,cAGtB;gBAHsB,WAGtB;;oBAHU,IAAI,IAAI,KAAA,CAAA;oBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,oCAAoC,EAAE,CAAC;QACvC,oCAAoC,EAAE,CAAC;IACzC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=firmwareListGenerateBinaryHardeningListSample.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"firmwareListGenerateBinaryHardeningListSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateBinaryHardeningListSample.ts"],"names":[],"mappings":""}