@azure/arm-iotfirmwaredefense 1.0.0-beta.1 → 1.0.1-alpha.20240329.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +13 -3
- package/LICENSE +1 -1
- package/README.md +2 -2
- package/dist/index.js +2280 -2198
- package/dist/index.js.map +1 -1
- package/dist/index.min.js +1 -1
- package/dist/index.min.js.map +1 -1
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCryptoKeyListSample.js → binaryHardeningListByFirmwareSample.js} +23 -34
- package/dist-esm/samples-dev/binaryHardeningListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCveListSample.js → cryptoCertificatesListByFirmwareSample.js} +25 -37
- package/dist-esm/samples-dev/cryptoCertificatesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListGenerateCryptoCertificateListSample.js → cryptoKeysListByFirmwareSample.js} +23 -34
- package/dist-esm/samples-dev/cryptoKeysListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/cvesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresCreateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresCreateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareCreateSample.js → firmwaresCreateSample.js} +20 -18
- package/dist-esm/samples-dev/firmwaresCreateSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareDeleteSample.js → firmwaresDeleteSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateDownloadUrlSample.js → firmwaresGenerateDownloadUrlSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGenerateDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateFilesystemDownloadUrlSample.js → firmwaresGenerateFilesystemDownloadUrlSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGetSample.js → firmwaresGetSample.js} +9 -9
- package/dist-esm/samples-dev/firmwaresGetSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareListByWorkspaceSample.js → firmwaresListByWorkspaceSample.js} +13 -23
- package/dist-esm/samples-dev/firmwaresListByWorkspaceSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwaresUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareUpdateSample.js → firmwaresUpdateSample.js} +20 -18
- package/dist-esm/samples-dev/firmwaresUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.js +8 -18
- package/dist-esm/samples-dev/operationsListSample.js.map +1 -1
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/passwordHashesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/sbomComponentsListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/summariesGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/summariesGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/{firmwareGenerateSummarySample.js → summariesGetSample.js} +23 -23
- package/dist-esm/samples-dev/summariesGetSample.js.map +1 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts +2 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.js +92 -0
- package/dist-esm/samples-dev/summariesListByFirmwareSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesCreateSample.js +5 -4
- package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesDeleteSample.js +2 -2
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +4 -4
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesGetSample.js +2 -2
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +8 -18
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +8 -18
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/workspacesUpdateSample.js +4 -4
- package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -1
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +11 -4
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -1
- package/dist-esm/src/ioTFirmwareDefenseClient.js +19 -12
- package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -1
- package/dist-esm/src/models/index.d.ts +516 -602
- package/dist-esm/src/models/index.d.ts.map +1 -1
- package/dist-esm/src/models/index.js +40 -92
- package/dist-esm/src/models/index.js.map +1 -1
- package/dist-esm/src/models/mappers.d.ts +45 -25
- package/dist-esm/src/models/mappers.d.ts.map +1 -1
- package/dist-esm/src/models/mappers.js +1120 -1036
- package/dist-esm/src/models/mappers.js.map +1 -1
- package/dist-esm/src/models/parameters.d.ts +3 -2
- package/dist-esm/src/models/parameters.d.ts.map +1 -1
- package/dist-esm/src/models/parameters.js +56 -49
- package/dist-esm/src/models/parameters.js.map +1 -1
- package/dist-esm/src/operations/binaryHardening.d.ts +41 -0
- package/dist-esm/src/operations/binaryHardening.d.ts.map +1 -0
- package/dist-esm/src/operations/binaryHardening.js +155 -0
- package/dist-esm/src/operations/binaryHardening.js.map +1 -0
- package/dist-esm/src/operations/cryptoCertificates.d.ts +41 -0
- package/dist-esm/src/operations/cryptoCertificates.d.ts.map +1 -0
- package/dist-esm/src/operations/cryptoCertificates.js +155 -0
- package/dist-esm/src/operations/cryptoCertificates.js.map +1 -0
- package/dist-esm/src/operations/cryptoKeys.d.ts +41 -0
- package/dist-esm/src/operations/cryptoKeys.d.ts.map +1 -0
- package/dist-esm/src/operations/cryptoKeys.js +155 -0
- package/dist-esm/src/operations/cryptoKeys.js.map +1 -0
- package/dist-esm/src/operations/cves.d.ts +41 -0
- package/dist-esm/src/operations/cves.d.ts.map +1 -0
- package/dist-esm/src/operations/cves.js +155 -0
- package/dist-esm/src/operations/cves.js.map +1 -0
- package/dist-esm/src/operations/firmwares.d.ts +88 -0
- package/dist-esm/src/operations/firmwares.d.ts.map +1 -0
- package/dist-esm/src/operations/firmwares.js +350 -0
- package/dist-esm/src/operations/firmwares.js.map +1 -0
- package/dist-esm/src/operations/index.d.ts +9 -2
- package/dist-esm/src/operations/index.d.ts.map +1 -1
- package/dist-esm/src/operations/index.js +9 -2
- package/dist-esm/src/operations/index.js.map +1 -1
- package/dist-esm/src/operations/operations.js +12 -17
- package/dist-esm/src/operations/operations.js.map +1 -1
- package/dist-esm/src/operations/passwordHashes.d.ts +41 -0
- package/dist-esm/src/operations/passwordHashes.d.ts.map +1 -0
- package/dist-esm/src/operations/passwordHashes.js +155 -0
- package/dist-esm/src/operations/passwordHashes.js.map +1 -0
- package/dist-esm/src/operations/sbomComponents.d.ts +41 -0
- package/dist-esm/src/operations/sbomComponents.d.ts.map +1 -0
- package/dist-esm/src/operations/sbomComponents.js +155 -0
- package/dist-esm/src/operations/sbomComponents.js.map +1 -0
- package/dist-esm/src/operations/summaries.d.ts +52 -0
- package/dist-esm/src/operations/summaries.d.ts.map +1 -0
- package/dist-esm/src/operations/summaries.js +191 -0
- package/dist-esm/src/operations/summaries.js.map +1 -0
- package/dist-esm/src/operations/workspaces.js +52 -66
- package/dist-esm/src/operations/workspaces.js.map +1 -1
- package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/binaryHardening.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/{firmwareOperations.js → binaryHardening.js} +1 -1
- package/dist-esm/src/operationsInterfaces/binaryHardening.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.js +9 -0
- package/dist-esm/src/operationsInterfaces/cryptoCertificates.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.js +9 -0
- package/dist-esm/src/operationsInterfaces/cryptoKeys.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/cves.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/cves.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/cves.js +9 -0
- package/dist-esm/src/operationsInterfaces/cves.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwares.d.ts +63 -0
- package/dist-esm/src/operationsInterfaces/firmwares.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwares.js +9 -0
- package/dist-esm/src/operationsInterfaces/firmwares.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts +9 -2
- package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
- package/dist-esm/src/operationsInterfaces/index.js +9 -2
- package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
- package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.js +9 -0
- package/dist-esm/src/operationsInterfaces/passwordHashes.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts +14 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.js +9 -0
- package/dist-esm/src/operationsInterfaces/sbomComponents.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/summaries.d.ts +24 -0
- package/dist-esm/src/operationsInterfaces/summaries.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/summaries.js +9 -0
- package/dist-esm/src/operationsInterfaces/summaries.js.map +1 -0
- package/dist-esm/src/pagingHelper.js.map +1 -1
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +7 -17
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -1
- package/package.json +16 -21
- package/review/arm-iotfirmwaredefense.api.md +329 -330
- package/src/ioTFirmwareDefenseClient.ts +53 -24
- package/src/models/index.ts +566 -646
- package/src/models/mappers.ts +1190 -1036
- package/src/models/parameters.ts +59 -51
- package/src/operations/binaryHardening.ts +216 -0
- package/src/operations/cryptoCertificates.ts +216 -0
- package/src/operations/cryptoKeys.ts +216 -0
- package/src/operations/cves.ts +216 -0
- package/src/operations/firmwares.ts +469 -0
- package/src/operations/index.ts +9 -2
- package/src/operations/operations.ts +16 -16
- package/src/operations/passwordHashes.ts +216 -0
- package/src/operations/sbomComponents.ts +216 -0
- package/src/operations/summaries.ts +265 -0
- package/src/operations/workspaces.ts +81 -92
- package/src/operationsInterfaces/binaryHardening.ts +31 -0
- package/src/operationsInterfaces/cryptoCertificates.ts +31 -0
- package/src/operationsInterfaces/cryptoKeys.ts +31 -0
- package/src/operationsInterfaces/cves.ts +28 -0
- package/src/operationsInterfaces/firmwares.ts +123 -0
- package/src/operationsInterfaces/index.ts +9 -2
- package/src/operationsInterfaces/operations.ts +1 -1
- package/src/operationsInterfaces/passwordHashes.ts +31 -0
- package/src/operationsInterfaces/sbomComponents.ts +31 -0
- package/src/operationsInterfaces/summaries.ts +50 -0
- package/src/operationsInterfaces/workspaces.ts +8 -8
- package/src/pagingHelper.ts +1 -1
- package/types/arm-iotfirmwaredefense.d.ts +573 -675
- package/types/tsdoc-metadata.json +1 -1
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareCreateSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareDeleteSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +0 -61
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +0 -61
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +0 -62
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareGetSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareGetSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js +0 -104
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js +0 -104
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +0 -104
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +0 -1
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +0 -2
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +0 -1
- package/dist-esm/samples-dev/firmwareUpdateSample.js.map +0 -1
- package/dist-esm/src/operations/firmwareOperations.d.ts +0 -313
- package/dist-esm/src/operations/firmwareOperations.d.ts.map +0 -1
- package/dist-esm/src/operations/firmwareOperations.js +0 -1393
- package/dist-esm/src/operations/firmwareOperations.js.map +0 -1
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +0 -169
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +0 -1
- package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +0 -1
- package/rollup.config.js +0 -122
- package/src/operations/firmwareOperations.ts +0 -1892
- package/src/operationsInterfaces/firmwareOperations.ts +0 -320
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"binaryHardeningListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/binaryHardeningListByFirmwareSample.ts"],"names":[],"mappings":""}
|
|
@@ -13,33 +13,28 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
15
15
|
/**
|
|
16
|
-
* This sample demonstrates how to
|
|
16
|
+
* This sample demonstrates how to Lists binary hardening analysis results of a firmware.
|
|
17
17
|
*
|
|
18
|
-
* @summary
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
18
|
+
* @summary Lists binary hardening analysis results of a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function binaryHardeningListByFirmwareMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
23
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
24
24
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
-
"
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
26
26
|
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
27
|
const workspaceName = "default";
|
|
28
|
-
const firmwareId = "
|
|
28
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
29
29
|
const credential = new DefaultAzureCredential();
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
31
|
const resArray = new Array();
|
|
32
32
|
try {
|
|
33
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.binaryHardening.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
34
34
|
_c = _f.value;
|
|
35
35
|
_d = false;
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
resArray.push(item);
|
|
39
|
-
}
|
|
40
|
-
finally {
|
|
41
|
-
_d = true;
|
|
42
|
-
}
|
|
36
|
+
let item = _c;
|
|
37
|
+
resArray.push(item);
|
|
43
38
|
}
|
|
44
39
|
}
|
|
45
40
|
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
@@ -53,34 +48,28 @@ function firmwareListGenerateCryptoKeyListMaximumSetGen() {
|
|
|
53
48
|
});
|
|
54
49
|
}
|
|
55
50
|
/**
|
|
56
|
-
* This sample demonstrates how to
|
|
51
|
+
* This sample demonstrates how to Lists binary hardening analysis results of a firmware.
|
|
57
52
|
*
|
|
58
|
-
* @summary
|
|
59
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
53
|
+
* @summary Lists binary hardening analysis results of a firmware.
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MinimumSet_Gen.json
|
|
60
55
|
*/
|
|
61
|
-
function
|
|
56
|
+
function binaryHardeningListByFirmwareMinimumSetGen() {
|
|
62
57
|
var _a, e_2, _b, _c;
|
|
63
58
|
return __awaiter(this, void 0, void 0, function* () {
|
|
64
59
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
65
|
-
"
|
|
66
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
67
|
-
|
|
68
|
-
const
|
|
69
|
-
const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
|
|
60
|
+
"00000000-0000-0000-0000-000000000000";
|
|
61
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
62
|
+
const workspaceName = "default";
|
|
63
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
70
64
|
const credential = new DefaultAzureCredential();
|
|
71
65
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
72
66
|
const resArray = new Array();
|
|
73
67
|
try {
|
|
74
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.binaryHardening.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
75
69
|
_c = _f.value;
|
|
76
70
|
_d = false;
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
resArray.push(item);
|
|
80
|
-
}
|
|
81
|
-
finally {
|
|
82
|
-
_d = true;
|
|
83
|
-
}
|
|
71
|
+
let item = _c;
|
|
72
|
+
resArray.push(item);
|
|
84
73
|
}
|
|
85
74
|
}
|
|
86
75
|
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
@@ -95,9 +84,9 @@ function firmwareListGenerateCryptoKeyListMinimumSetGen() {
|
|
|
95
84
|
}
|
|
96
85
|
function main() {
|
|
97
86
|
return __awaiter(this, void 0, void 0, function* () {
|
|
98
|
-
|
|
99
|
-
|
|
87
|
+
binaryHardeningListByFirmwareMaximumSetGen();
|
|
88
|
+
binaryHardeningListByFirmwareMinimumSetGen();
|
|
100
89
|
});
|
|
101
90
|
}
|
|
102
91
|
main().catch(console.error);
|
|
103
|
-
//# sourceMappingURL=
|
|
92
|
+
//# sourceMappingURL=binaryHardeningListByFirmwareSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"binaryHardeningListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/binaryHardeningListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,0CAA0C;;;QACvD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,eAAe,CAAC,cAAc,CAC1D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,0CAA0C;;;QACvD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,eAAe,CAAC,cAAc,CAC1D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,0CAA0C,EAAE,CAAC;QAC7C,0CAA0C,EAAE,CAAC;IAC/C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cryptoCertificatesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cryptoCertificatesListByFirmwareSample.ts"],"names":[],"mappings":""}
|
|
@@ -13,34 +13,28 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
15
15
|
/**
|
|
16
|
-
* This sample demonstrates how to
|
|
16
|
+
* This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware.
|
|
17
17
|
*
|
|
18
|
-
* @summary
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
18
|
+
* @summary Lists cryptographic certificate analysis results found in a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function cryptoCertificatesListByFirmwareMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
23
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
24
24
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
-
"
|
|
26
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
27
|
-
|
|
28
|
-
const
|
|
29
|
-
const firmwareId = "umrkdttp";
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
|
+
const workspaceName = "default";
|
|
28
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
30
29
|
const credential = new DefaultAzureCredential();
|
|
31
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
32
31
|
const resArray = new Array();
|
|
33
32
|
try {
|
|
34
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.cryptoCertificates.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
35
34
|
_c = _f.value;
|
|
36
35
|
_d = false;
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
resArray.push(item);
|
|
40
|
-
}
|
|
41
|
-
finally {
|
|
42
|
-
_d = true;
|
|
43
|
-
}
|
|
36
|
+
let item = _c;
|
|
37
|
+
resArray.push(item);
|
|
44
38
|
}
|
|
45
39
|
}
|
|
46
40
|
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
@@ -54,34 +48,28 @@ function firmwareListGenerateCveListMaximumSetGen() {
|
|
|
54
48
|
});
|
|
55
49
|
}
|
|
56
50
|
/**
|
|
57
|
-
* This sample demonstrates how to
|
|
51
|
+
* This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware.
|
|
58
52
|
*
|
|
59
|
-
* @summary
|
|
60
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
53
|
+
* @summary Lists cryptographic certificate analysis results found in a firmware.
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MinimumSet_Gen.json
|
|
61
55
|
*/
|
|
62
|
-
function
|
|
56
|
+
function cryptoCertificatesListByFirmwareMinimumSetGen() {
|
|
63
57
|
var _a, e_2, _b, _c;
|
|
64
58
|
return __awaiter(this, void 0, void 0, function* () {
|
|
65
59
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
66
|
-
"
|
|
67
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
68
|
-
|
|
69
|
-
const
|
|
70
|
-
const firmwareId = "umrkdttp";
|
|
60
|
+
"00000000-0000-0000-0000-000000000000";
|
|
61
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
62
|
+
const workspaceName = "default";
|
|
63
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
71
64
|
const credential = new DefaultAzureCredential();
|
|
72
65
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
73
66
|
const resArray = new Array();
|
|
74
67
|
try {
|
|
75
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.cryptoCertificates.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
76
69
|
_c = _f.value;
|
|
77
70
|
_d = false;
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
resArray.push(item);
|
|
81
|
-
}
|
|
82
|
-
finally {
|
|
83
|
-
_d = true;
|
|
84
|
-
}
|
|
71
|
+
let item = _c;
|
|
72
|
+
resArray.push(item);
|
|
85
73
|
}
|
|
86
74
|
}
|
|
87
75
|
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
@@ -96,9 +84,9 @@ function firmwareListGenerateCveListMinimumSetGen() {
|
|
|
96
84
|
}
|
|
97
85
|
function main() {
|
|
98
86
|
return __awaiter(this, void 0, void 0, function* () {
|
|
99
|
-
|
|
100
|
-
|
|
87
|
+
cryptoCertificatesListByFirmwareMaximumSetGen();
|
|
88
|
+
cryptoCertificatesListByFirmwareMinimumSetGen();
|
|
101
89
|
});
|
|
102
90
|
}
|
|
103
91
|
main().catch(console.error);
|
|
104
|
-
//# sourceMappingURL=
|
|
92
|
+
//# sourceMappingURL=cryptoCertificatesListByFirmwareSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cryptoCertificatesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cryptoCertificatesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,cAAc,CAC7D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,cAAc,CAC7D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;QAChD,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cryptoKeysListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cryptoKeysListByFirmwareSample.ts"],"names":[],"mappings":""}
|
|
@@ -13,33 +13,28 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
15
15
|
/**
|
|
16
|
-
* This sample demonstrates how to
|
|
16
|
+
* This sample demonstrates how to Lists cryptographic key analysis results found in a firmware.
|
|
17
17
|
*
|
|
18
|
-
* @summary
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
18
|
+
* @summary Lists cryptographic key analysis results found in a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function cryptoKeysListByFirmwareMaximumSetGen() {
|
|
22
22
|
var _a, e_1, _b, _c;
|
|
23
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
24
24
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
-
"
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
26
26
|
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
27
|
const workspaceName = "default";
|
|
28
|
-
const firmwareId = "
|
|
28
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
29
29
|
const credential = new DefaultAzureCredential();
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
31
|
const resArray = new Array();
|
|
32
32
|
try {
|
|
33
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.cryptoKeys.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
34
34
|
_c = _f.value;
|
|
35
35
|
_d = false;
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
resArray.push(item);
|
|
39
|
-
}
|
|
40
|
-
finally {
|
|
41
|
-
_d = true;
|
|
42
|
-
}
|
|
36
|
+
let item = _c;
|
|
37
|
+
resArray.push(item);
|
|
43
38
|
}
|
|
44
39
|
}
|
|
45
40
|
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
@@ -53,34 +48,28 @@ function firmwareListGenerateCryptoCertificateListMaximumSetGen() {
|
|
|
53
48
|
});
|
|
54
49
|
}
|
|
55
50
|
/**
|
|
56
|
-
* This sample demonstrates how to
|
|
51
|
+
* This sample demonstrates how to Lists cryptographic key analysis results found in a firmware.
|
|
57
52
|
*
|
|
58
|
-
* @summary
|
|
59
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
53
|
+
* @summary Lists cryptographic key analysis results found in a firmware.
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MinimumSet_Gen.json
|
|
60
55
|
*/
|
|
61
|
-
function
|
|
56
|
+
function cryptoKeysListByFirmwareMinimumSetGen() {
|
|
62
57
|
var _a, e_2, _b, _c;
|
|
63
58
|
return __awaiter(this, void 0, void 0, function* () {
|
|
64
59
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
65
|
-
"
|
|
66
|
-
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
67
|
-
|
|
68
|
-
const
|
|
69
|
-
const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
|
|
60
|
+
"00000000-0000-0000-0000-000000000000";
|
|
61
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
62
|
+
const workspaceName = "default";
|
|
63
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
70
64
|
const credential = new DefaultAzureCredential();
|
|
71
65
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
72
66
|
const resArray = new Array();
|
|
73
67
|
try {
|
|
74
|
-
for (var _d = true, _e = __asyncValues(client.
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.cryptoKeys.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
75
69
|
_c = _f.value;
|
|
76
70
|
_d = false;
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
resArray.push(item);
|
|
80
|
-
}
|
|
81
|
-
finally {
|
|
82
|
-
_d = true;
|
|
83
|
-
}
|
|
71
|
+
let item = _c;
|
|
72
|
+
resArray.push(item);
|
|
84
73
|
}
|
|
85
74
|
}
|
|
86
75
|
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
@@ -95,9 +84,9 @@ function firmwareListGenerateCryptoCertificateListMinimumSetGen() {
|
|
|
95
84
|
}
|
|
96
85
|
function main() {
|
|
97
86
|
return __awaiter(this, void 0, void 0, function* () {
|
|
98
|
-
|
|
99
|
-
|
|
87
|
+
cryptoKeysListByFirmwareMaximumSetGen();
|
|
88
|
+
cryptoKeysListByFirmwareMinimumSetGen();
|
|
100
89
|
});
|
|
101
90
|
}
|
|
102
91
|
main().catch(console.error);
|
|
103
|
-
//# sourceMappingURL=
|
|
92
|
+
//# sourceMappingURL=cryptoKeysListByFirmwareSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cryptoKeysListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cryptoKeysListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,UAAU,CAAC,cAAc,CACrD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,qCAAqC;;;QAClD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,UAAU,CAAC,cAAc,CACrD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,qCAAqC,EAAE,CAAC;QACxC,qCAAqC,EAAE,CAAC;IAC1C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cvesListByFirmwareSample.d.ts","sourceRoot":"","sources":["../../samples-dev/cvesListByFirmwareSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,92 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to Lists CVE analysis results of a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary Lists CVE analysis results of a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function cvesListByFirmwareMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
|
+
const workspaceName = "default";
|
|
28
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const resArray = new Array();
|
|
32
|
+
try {
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
34
|
+
_c = _f.value;
|
|
35
|
+
_d = false;
|
|
36
|
+
let item = _c;
|
|
37
|
+
resArray.push(item);
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
41
|
+
finally {
|
|
42
|
+
try {
|
|
43
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
44
|
+
}
|
|
45
|
+
finally { if (e_1) throw e_1.error; }
|
|
46
|
+
}
|
|
47
|
+
console.log(resArray);
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
/**
|
|
51
|
+
* This sample demonstrates how to Lists CVE analysis results of a firmware.
|
|
52
|
+
*
|
|
53
|
+
* @summary Lists CVE analysis results of a firmware.
|
|
54
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MinimumSet_Gen.json
|
|
55
|
+
*/
|
|
56
|
+
function cvesListByFirmwareMinimumSetGen() {
|
|
57
|
+
var _a, e_2, _b, _c;
|
|
58
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
59
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
60
|
+
"00000000-0000-0000-0000-000000000000";
|
|
61
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
62
|
+
const workspaceName = "default";
|
|
63
|
+
const firmwareId = "109a9886-50bf-85a8-9d75-000000000000";
|
|
64
|
+
const credential = new DefaultAzureCredential();
|
|
65
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
66
|
+
const resArray = new Array();
|
|
67
|
+
try {
|
|
68
|
+
for (var _d = true, _e = __asyncValues(client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a; _d = true) {
|
|
69
|
+
_c = _f.value;
|
|
70
|
+
_d = false;
|
|
71
|
+
let item = _c;
|
|
72
|
+
resArray.push(item);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
76
|
+
finally {
|
|
77
|
+
try {
|
|
78
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
79
|
+
}
|
|
80
|
+
finally { if (e_2) throw e_2.error; }
|
|
81
|
+
}
|
|
82
|
+
console.log(resArray);
|
|
83
|
+
});
|
|
84
|
+
}
|
|
85
|
+
function main() {
|
|
86
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
87
|
+
cvesListByFirmwareMaximumSetGen();
|
|
88
|
+
cvesListByFirmwareMinimumSetGen();
|
|
89
|
+
});
|
|
90
|
+
}
|
|
91
|
+
main().catch(console.error);
|
|
92
|
+
//# sourceMappingURL=cvesListByFirmwareSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cvesListByFirmwareSample.js","sourceRoot":"","sources":["../../samples-dev/cvesListByFirmwareSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,+BAA+B;;;QAC5C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,IAAI,CAAC,cAAc,CAC/C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,+BAA+B;;;QAC5C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,IAAI,CAAC,cAAc,CAC/C,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA,sDAAE,CAAC;gBAJmB,cAItB;gBAJsB,WAItB;gBAJU,IAAI,IAAI,KAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACtB,CAAC;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,+BAA+B,EAAE,CAAC;QAClC,+BAA+B,EAAE,CAAC;IACpC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresCreateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresCreateSample.ts"],"names":[],"mappings":""}
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
import { __awaiter } from "tslib";
|
|
9
9
|
// Copyright (c) Microsoft Corporation.
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
|
-
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
11
|
+
import { IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
13
|
import * as dotenv from "dotenv";
|
|
14
14
|
dotenv.config();
|
|
@@ -16,9 +16,9 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to create a firmware.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to create a firmware.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function firmwaresCreateMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
23
23
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
24
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -27,18 +27,20 @@ function firmwareCreateMaximumSetGen() {
|
|
|
27
27
|
const workspaceName = "A7";
|
|
28
28
|
const firmwareId = "umrkdttp";
|
|
29
29
|
const firmware = {
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
30
|
+
properties: {
|
|
31
|
+
description: "uz",
|
|
32
|
+
fileName: "wresexxulcdsdd",
|
|
33
|
+
fileSize: 17,
|
|
34
|
+
model: "f",
|
|
35
|
+
status: "Pending",
|
|
36
|
+
statusMessages: [{ message: "ulvhmhokezathzzauiitu" }],
|
|
37
|
+
vendor: "vycmdhgtmepcptyoubztiuudpkcpd",
|
|
38
|
+
version: "s",
|
|
39
|
+
},
|
|
38
40
|
};
|
|
39
41
|
const credential = new DefaultAzureCredential();
|
|
40
42
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
41
|
-
const result = yield client.
|
|
43
|
+
const result = yield client.firmwares.create(resourceGroupName, workspaceName, firmwareId, firmware);
|
|
42
44
|
console.log(result);
|
|
43
45
|
});
|
|
44
46
|
}
|
|
@@ -46,9 +48,9 @@ function firmwareCreateMaximumSetGen() {
|
|
|
46
48
|
* This sample demonstrates how to The operation to create a firmware.
|
|
47
49
|
*
|
|
48
50
|
* @summary The operation to create a firmware.
|
|
49
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
51
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MinimumSet_Gen.json
|
|
50
52
|
*/
|
|
51
|
-
function
|
|
53
|
+
function firmwaresCreateMinimumSetGen() {
|
|
52
54
|
return __awaiter(this, void 0, void 0, function* () {
|
|
53
55
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
54
56
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -59,15 +61,15 @@ function firmwareCreateMinimumSetGen() {
|
|
|
59
61
|
const firmware = {};
|
|
60
62
|
const credential = new DefaultAzureCredential();
|
|
61
63
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
62
|
-
const result = yield client.
|
|
64
|
+
const result = yield client.firmwares.create(resourceGroupName, workspaceName, firmwareId, firmware);
|
|
63
65
|
console.log(result);
|
|
64
66
|
});
|
|
65
67
|
}
|
|
66
68
|
function main() {
|
|
67
69
|
return __awaiter(this, void 0, void 0, function* () {
|
|
68
|
-
|
|
69
|
-
|
|
70
|
+
firmwaresCreateMaximumSetGen();
|
|
71
|
+
firmwaresCreateMinimumSetGen();
|
|
70
72
|
});
|
|
71
73
|
}
|
|
72
74
|
main().catch(console.error);
|
|
73
|
-
//# sourceMappingURL=
|
|
75
|
+
//# sourceMappingURL=firmwaresCreateSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresCreateSample.js","sourceRoot":"","sources":["../../samples-dev/firmwaresCreateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,GACzB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa;YACzB,UAAU,EAAE;gBACV,WAAW,EAAE,IAAI;gBACjB,QAAQ,EAAE,gBAAgB;gBAC1B,QAAQ,EAAE,EAAE;gBACZ,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,SAAS;gBACjB,cAAc,EAAE,CAAC,EAAE,OAAO,EAAE,uBAAuB,EAAE,CAAC;gBACtD,MAAM,EAAE,+BAA+B;gBACvC,OAAO,EAAE,GAAG;aACb;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,4BAA4B;;QACzC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,QAAQ,GAAa,EAAE,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,CAC1C,iBAAiB,EACjB,aAAa,EACb,UAAU,EACV,QAAQ,CACT,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,4BAA4B,EAAE,CAAC;QAC/B,4BAA4B,EAAE,CAAC;IACjC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwaresDeleteSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwaresDeleteSample.ts"],"names":[],"mappings":""}
|
|
@@ -16,9 +16,9 @@ dotenv.config();
|
|
|
16
16
|
* This sample demonstrates how to The operation to delete a firmware.
|
|
17
17
|
*
|
|
18
18
|
* @summary The operation to delete a firmware.
|
|
19
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function firmwaresDeleteMaximumSetGen() {
|
|
22
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
23
23
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
24
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -28,7 +28,7 @@ function firmwareDeleteMaximumSetGen() {
|
|
|
28
28
|
const firmwareId = "umrkdttp";
|
|
29
29
|
const credential = new DefaultAzureCredential();
|
|
30
30
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
-
const result = yield client.
|
|
31
|
+
const result = yield client.firmwares.delete(resourceGroupName, workspaceName, firmwareId);
|
|
32
32
|
console.log(result);
|
|
33
33
|
});
|
|
34
34
|
}
|
|
@@ -36,9 +36,9 @@ function firmwareDeleteMaximumSetGen() {
|
|
|
36
36
|
* This sample demonstrates how to The operation to delete a firmware.
|
|
37
37
|
*
|
|
38
38
|
* @summary The operation to delete a firmware.
|
|
39
|
-
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MinimumSet_Gen.json
|
|
40
40
|
*/
|
|
41
|
-
function
|
|
41
|
+
function firmwaresDeleteMinimumSetGen() {
|
|
42
42
|
return __awaiter(this, void 0, void 0, function* () {
|
|
43
43
|
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
44
|
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
@@ -48,15 +48,15 @@ function firmwareDeleteMinimumSetGen() {
|
|
|
48
48
|
const firmwareId = "umrkdttp";
|
|
49
49
|
const credential = new DefaultAzureCredential();
|
|
50
50
|
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
-
const result = yield client.
|
|
51
|
+
const result = yield client.firmwares.delete(resourceGroupName, workspaceName, firmwareId);
|
|
52
52
|
console.log(result);
|
|
53
53
|
});
|
|
54
54
|
}
|
|
55
55
|
function main() {
|
|
56
56
|
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
-
|
|
58
|
-
|
|
57
|
+
firmwaresDeleteMaximumSetGen();
|
|
58
|
+
firmwaresDeleteMinimumSetGen();
|
|
59
59
|
});
|
|
60
60
|
}
|
|
61
61
|
main().catch(console.error);
|
|
62
|
-
//# sourceMappingURL=
|
|
62
|
+
//# sourceMappingURL=firmwaresDeleteSample.js.map
|