@azure/arm-iotfirmwaredefense 1.0.0-beta.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +5 -0
- package/LICENSE +21 -0
- package/README.md +109 -0
- package/dist/index.js +4045 -0
- package/dist/index.js.map +1 -0
- package/dist/index.min.js +1 -0
- package/dist/index.min.js.map +1 -0
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareCreateSample.js +73 -0
- package/dist-esm/samples-dev/firmwareCreateSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.js +62 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +61 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +61 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGetSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGetSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js +102 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js +103 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js +103 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.js +73 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.d.ts +2 -0
- package/dist-esm/samples-dev/operationsListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.js +96 -0
- package/dist-esm/samples-dev/operationsListSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesCreateSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesCreateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesCreateSample.js +63 -0
- package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.js +58 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +62 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesGetSample.js +58 -0
- package/dist-esm/samples-dev/workspacesGetSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +98 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +96 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.js +60 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -0
- package/dist-esm/src/index.d.ts +6 -0
- package/dist-esm/src/index.d.ts.map +1 -0
- package/dist-esm/src/index.js +13 -0
- package/dist-esm/src/index.js.map +1 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +22 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.js +102 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -0
- package/dist-esm/src/models/index.d.ts +1049 -0
- package/dist-esm/src/models/index.d.ts.map +1 -0
- package/dist-esm/src/models/index.js +142 -0
- package/dist-esm/src/models/index.js.map +1 -0
- package/dist-esm/src/models/mappers.d.ts +41 -0
- package/dist-esm/src/models/mappers.d.ts.map +1 -0
- package/dist-esm/src/models/mappers.js +1618 -0
- package/dist-esm/src/models/mappers.js.map +1 -0
- package/dist-esm/src/models/parameters.d.ts +16 -0
- package/dist-esm/src/models/parameters.d.ts.map +1 -0
- package/dist-esm/src/models/parameters.js +134 -0
- package/dist-esm/src/models/parameters.js.map +1 -0
- package/dist-esm/src/operations/firmwareOperations.d.ts +313 -0
- package/dist-esm/src/operations/firmwareOperations.d.ts.map +1 -0
- package/dist-esm/src/operations/firmwareOperations.js +1393 -0
- package/dist-esm/src/operations/firmwareOperations.js.map +1 -0
- package/dist-esm/src/operations/index.d.ts +4 -0
- package/dist-esm/src/operations/index.d.ts.map +1 -0
- package/dist-esm/src/operations/index.js +11 -0
- package/dist-esm/src/operations/index.js.map +1 -0
- package/dist-esm/src/operations/operations.d.ts +32 -0
- package/dist-esm/src/operations/operations.d.ts.map +1 -0
- package/dist-esm/src/operations/operations.js +138 -0
- package/dist-esm/src/operations/operations.js.map +1 -0
- package/dist-esm/src/operations/workspaces.d.ts +91 -0
- package/dist-esm/src/operations/workspaces.d.ts.map +1 -0
- package/dist-esm/src/operations/workspaces.js +431 -0
- package/dist-esm/src/operations/workspaces.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +169 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.js +9 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts +4 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.js +11 -0
- package/dist-esm/src/operationsInterfaces/index.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/operations.d.ts +11 -0
- package/dist-esm/src/operationsInterfaces/operations.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/operations.js +9 -0
- package/dist-esm/src/operationsInterfaces/operations.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/workspaces.d.ts +55 -0
- package/dist-esm/src/operationsInterfaces/workspaces.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/workspaces.js +9 -0
- package/dist-esm/src/operationsInterfaces/workspaces.js.map +1 -0
- package/dist-esm/src/pagingHelper.d.ts +13 -0
- package/dist-esm/src/pagingHelper.d.ts.map +1 -0
- package/dist-esm/src/pagingHelper.js +32 -0
- package/dist-esm/src/pagingHelper.js.map +1 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.d.ts +4 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.d.ts.map +1 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +120 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -0
- package/package.json +121 -0
- package/review/arm-iotfirmwaredefense.api.md +820 -0
- package/rollup.config.js +122 -0
- package/src/index.ts +13 -0
- package/src/ioTFirmwareDefenseClient.ts +152 -0
- package/src/models/index.ts +1198 -0
- package/src/models/mappers.ts +1678 -0
- package/src/models/parameters.ts +159 -0
- package/src/operations/firmwareOperations.ts +1892 -0
- package/src/operations/index.ts +11 -0
- package/src/operations/operations.ts +149 -0
- package/src/operations/workspaces.ts +527 -0
- package/src/operationsInterfaces/firmwareOperations.ts +320 -0
- package/src/operationsInterfaces/index.ts +11 -0
- package/src/operationsInterfaces/operations.ts +22 -0
- package/src/operationsInterfaces/workspaces.ts +107 -0
- package/src/pagingHelper.ts +39 -0
- package/tsconfig.json +33 -0
- package/types/arm-iotfirmwaredefense.d.ts +1453 -0
- package/types/tsdoc-metadata.json +11 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateComponentDetailsSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateComponentDetailsSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to get component details for a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to get component details for a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGenerateComponentDetailsMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
26
|
+
"rgworkspaces-firmwares";
|
|
27
|
+
const workspaceName = "A7";
|
|
28
|
+
const firmwareId = "umrkdttp";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const result = yield client.firmwareOperations.generateComponentDetails(resourceGroupName, workspaceName, firmwareId);
|
|
32
|
+
console.log(result);
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* This sample demonstrates how to The operation to get component details for a firmware.
|
|
37
|
+
*
|
|
38
|
+
* @summary The operation to get component details for a firmware.
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MinimumSet_Gen.json
|
|
40
|
+
*/
|
|
41
|
+
function firmwareGenerateComponentDetailsMinimumSetGen() {
|
|
42
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
45
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
46
|
+
"rgworkspaces-firmwares";
|
|
47
|
+
const workspaceName = "A7";
|
|
48
|
+
const firmwareId = "umrkdttp";
|
|
49
|
+
const credential = new DefaultAzureCredential();
|
|
50
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
+
const result = yield client.firmwareOperations.generateComponentDetails(resourceGroupName, workspaceName, firmwareId);
|
|
52
|
+
console.log(result);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
function main() {
|
|
56
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
+
firmwareGenerateComponentDetailsMaximumSetGen();
|
|
58
|
+
firmwareGenerateComponentDetailsMinimumSetGen();
|
|
59
|
+
});
|
|
60
|
+
}
|
|
61
|
+
main().catch(console.error);
|
|
62
|
+
//# sourceMappingURL=firmwareGenerateComponentDetailsSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateComponentDetailsSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateComponentDetailsSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;QAChD,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateCryptoCertificateSummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoCertificateSummarySample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGenerateCryptoCertificateSummaryMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
26
|
+
const workspaceName = "default";
|
|
27
|
+
const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
|
|
28
|
+
const credential = new DefaultAzureCredential();
|
|
29
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
30
|
+
const result = yield client.firmwareOperations.generateCryptoCertificateSummary(resourceGroupName, workspaceName, firmwareId);
|
|
31
|
+
console.log(result);
|
|
32
|
+
});
|
|
33
|
+
}
|
|
34
|
+
/**
|
|
35
|
+
* This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
|
|
36
|
+
*
|
|
37
|
+
* @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image.
|
|
38
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MinimumSet_Gen.json
|
|
39
|
+
*/
|
|
40
|
+
function firmwareGenerateCryptoCertificateSummaryMinimumSetGen() {
|
|
41
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
42
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
43
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
44
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
45
|
+
"rgworkspaces-firmwares";
|
|
46
|
+
const workspaceName = "j5QE_";
|
|
47
|
+
const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
|
|
48
|
+
const credential = new DefaultAzureCredential();
|
|
49
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
50
|
+
const result = yield client.firmwareOperations.generateCryptoCertificateSummary(resourceGroupName, workspaceName, firmwareId);
|
|
51
|
+
console.log(result);
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
function main() {
|
|
55
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
56
|
+
firmwareGenerateCryptoCertificateSummaryMaximumSetGen();
|
|
57
|
+
firmwareGenerateCryptoCertificateSummaryMinimumSetGen();
|
|
58
|
+
});
|
|
59
|
+
}
|
|
60
|
+
main().catch(console.error);
|
|
61
|
+
//# sourceMappingURL=firmwareGenerateCryptoCertificateSummarySample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateCryptoCertificateSummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoCertificateSummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qDAAqD;;QAClE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,gCAAgC,CAC7E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,qDAAqD;;QAClE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,MAAM,UAAU,GAAG,6BAA6B,CAAC;QACjD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,gCAAgC,CAC7E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,qDAAqD,EAAE,CAAC;QACxD,qDAAqD,EAAE,CAAC;IAC1D,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateCryptoKeySummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoKeySummarySample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGenerateCryptoKeySummaryMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
26
|
+
const workspaceName = "default";
|
|
27
|
+
const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
|
|
28
|
+
const credential = new DefaultAzureCredential();
|
|
29
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
30
|
+
const result = yield client.firmwareOperations.generateCryptoKeySummary(resourceGroupName, workspaceName, firmwareId);
|
|
31
|
+
console.log(result);
|
|
32
|
+
});
|
|
33
|
+
}
|
|
34
|
+
/**
|
|
35
|
+
* This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
|
|
36
|
+
*
|
|
37
|
+
* @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image.
|
|
38
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MinimumSet_Gen.json
|
|
39
|
+
*/
|
|
40
|
+
function firmwareGenerateCryptoKeySummaryMinimumSetGen() {
|
|
41
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
42
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
43
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
44
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
45
|
+
"rgworkspaces-firmwares";
|
|
46
|
+
const workspaceName = "j5QE_";
|
|
47
|
+
const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
|
|
48
|
+
const credential = new DefaultAzureCredential();
|
|
49
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
50
|
+
const result = yield client.firmwareOperations.generateCryptoKeySummary(resourceGroupName, workspaceName, firmwareId);
|
|
51
|
+
console.log(result);
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
function main() {
|
|
55
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
56
|
+
firmwareGenerateCryptoKeySummaryMaximumSetGen();
|
|
57
|
+
firmwareGenerateCryptoKeySummaryMinimumSetGen();
|
|
58
|
+
});
|
|
59
|
+
}
|
|
60
|
+
main().catch(console.error);
|
|
61
|
+
//# sourceMappingURL=firmwareGenerateCryptoKeySummarySample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateCryptoKeySummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCryptoKeySummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,MAAM,UAAU,GAAG,6BAA6B,CAAC;QACjD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;QAChD,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateCveSummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCveSummarySample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to provide a high level summary of the CVEs reported for the firmware image.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGenerateCveSummaryMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
26
|
+
"rgworkspaces-firmwares";
|
|
27
|
+
const workspaceName = "A7";
|
|
28
|
+
const firmwareId = "umrkdttp";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const result = yield client.firmwareOperations.generateCveSummary(resourceGroupName, workspaceName, firmwareId);
|
|
32
|
+
console.log(result);
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image.
|
|
37
|
+
*
|
|
38
|
+
* @summary The operation to provide a high level summary of the CVEs reported for the firmware image.
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MinimumSet_Gen.json
|
|
40
|
+
*/
|
|
41
|
+
function firmwareGenerateCveSummaryMinimumSetGen() {
|
|
42
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
45
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
46
|
+
"rgworkspaces-firmwares";
|
|
47
|
+
const workspaceName = "A7";
|
|
48
|
+
const firmwareId = "umrkdttp";
|
|
49
|
+
const credential = new DefaultAzureCredential();
|
|
50
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
+
const result = yield client.firmwareOperations.generateCveSummary(resourceGroupName, workspaceName, firmwareId);
|
|
52
|
+
console.log(result);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
function main() {
|
|
56
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
+
firmwareGenerateCveSummaryMaximumSetGen();
|
|
58
|
+
firmwareGenerateCveSummaryMinimumSetGen();
|
|
59
|
+
});
|
|
60
|
+
}
|
|
61
|
+
main().catch(console.error);
|
|
62
|
+
//# sourceMappingURL=firmwareGenerateCveSummarySample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateCveSummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateCveSummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,uCAAuC;;QACpD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,kBAAkB,CAC/D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,uCAAuC;;QACpD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,kBAAkB,CAC/D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,uCAAuC,EAAE,CAAC;QAC1C,uCAAuC,EAAE,CAAC;IAC5C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateDownloadUrlSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateDownloadUrlSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to a url for file download.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to a url for file download.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGenerateDownloadUrlMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
26
|
+
"rgworkspaces-firmwares";
|
|
27
|
+
const workspaceName = "A7";
|
|
28
|
+
const firmwareId = "umrkdttp";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const result = yield client.firmwareOperations.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
32
|
+
console.log(result);
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* This sample demonstrates how to The operation to a url for file download.
|
|
37
|
+
*
|
|
38
|
+
* @summary The operation to a url for file download.
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MinimumSet_Gen.json
|
|
40
|
+
*/
|
|
41
|
+
function firmwareGenerateDownloadUrlMinimumSetGen() {
|
|
42
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
45
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
46
|
+
"rgworkspaces-firmwares";
|
|
47
|
+
const workspaceName = "A7";
|
|
48
|
+
const firmwareId = "umrkdttp";
|
|
49
|
+
const credential = new DefaultAzureCredential();
|
|
50
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
+
const result = yield client.firmwareOperations.generateDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
52
|
+
console.log(result);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
function main() {
|
|
56
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
+
firmwareGenerateDownloadUrlMaximumSetGen();
|
|
58
|
+
firmwareGenerateDownloadUrlMinimumSetGen();
|
|
59
|
+
});
|
|
60
|
+
}
|
|
61
|
+
main().catch(console.error);
|
|
62
|
+
//# sourceMappingURL=firmwareGenerateDownloadUrlSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,wCAAwC;;QACrD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,mBAAmB,CAChE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,wCAAwC;;QACrD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,mBAAmB,CAChE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,wCAAwC,EAAE,CAAC;QAC3C,wCAAwC,EAAE,CAAC;IAC7C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateFilesystemDownloadUrlSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to a url for tar file download.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to a url for tar file download.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
26
|
+
"rgworkspaces-firmwares";
|
|
27
|
+
const workspaceName = "A7";
|
|
28
|
+
const firmwareId = "umrkdttp";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const result = yield client.firmwareOperations.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
32
|
+
console.log(result);
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* This sample demonstrates how to The operation to a url for tar file download.
|
|
37
|
+
*
|
|
38
|
+
* @summary The operation to a url for tar file download.
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json
|
|
40
|
+
*/
|
|
41
|
+
function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() {
|
|
42
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
45
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
46
|
+
"rgworkspaces-firmwares";
|
|
47
|
+
const workspaceName = "A7";
|
|
48
|
+
const firmwareId = "umrkdttp";
|
|
49
|
+
const credential = new DefaultAzureCredential();
|
|
50
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
+
const result = yield client.firmwareOperations.generateFilesystemDownloadUrl(resourceGroupName, workspaceName, firmwareId);
|
|
52
|
+
console.log(result);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
function main() {
|
|
56
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
+
firmwareGenerateFilesystemDownloadUrlMaximumSetGen();
|
|
58
|
+
firmwareGenerateFilesystemDownloadUrlMinimumSetGen();
|
|
59
|
+
});
|
|
60
|
+
}
|
|
61
|
+
main().catch(console.error);
|
|
62
|
+
//# sourceMappingURL=firmwareGenerateFilesystemDownloadUrlSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateFilesystemDownloadUrlSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateFilesystemDownloadUrlSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,kDAAkD;;QAC/D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,6BAA6B,CAC1E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,kDAAkD;;QAC/D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,6BAA6B,CAC1E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,kDAAkD,EAAE,CAAC;QACrD,kDAAkD,EAAE,CAAC;IACvD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateSummarySample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateSummarySample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to get a scan summary.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to get a scan summary.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGenerateSummaryMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
26
|
+
"rgworkspaces-firmwares";
|
|
27
|
+
const workspaceName = "A7";
|
|
28
|
+
const firmwareId = "umrkdttp";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const result = yield client.firmwareOperations.generateSummary(resourceGroupName, workspaceName, firmwareId);
|
|
32
|
+
console.log(result);
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* This sample demonstrates how to The operation to get a scan summary.
|
|
37
|
+
*
|
|
38
|
+
* @summary The operation to get a scan summary.
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MinimumSet_Gen.json
|
|
40
|
+
*/
|
|
41
|
+
function firmwareGenerateSummaryMinimumSetGen() {
|
|
42
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
45
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
46
|
+
"rgworkspaces-firmwares";
|
|
47
|
+
const workspaceName = "A7";
|
|
48
|
+
const firmwareId = "umrkdttp";
|
|
49
|
+
const credential = new DefaultAzureCredential();
|
|
50
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
+
const result = yield client.firmwareOperations.generateSummary(resourceGroupName, workspaceName, firmwareId);
|
|
52
|
+
console.log(result);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
function main() {
|
|
56
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
+
firmwareGenerateSummaryMaximumSetGen();
|
|
58
|
+
firmwareGenerateSummaryMinimumSetGen();
|
|
59
|
+
});
|
|
60
|
+
}
|
|
61
|
+
main().catch(console.error);
|
|
62
|
+
//# sourceMappingURL=firmwareGenerateSummarySample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGenerateSummarySample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGenerateSummarySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oCAAoC;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC5D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,oCAAoC;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC5D,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,oCAAoC,EAAE,CAAC;QACvC,oCAAoC,EAAE,CAAC;IACzC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareGetSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to Get firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary Get firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareGetMaximumSetGen() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
25
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
26
|
+
"rgworkspaces-firmwares";
|
|
27
|
+
const workspaceName = "A7";
|
|
28
|
+
const firmwareId = "umrkdttp";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const result = yield client.firmwareOperations.get(resourceGroupName, workspaceName, firmwareId);
|
|
32
|
+
console.log(result);
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* This sample demonstrates how to Get firmware.
|
|
37
|
+
*
|
|
38
|
+
* @summary Get firmware.
|
|
39
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MinimumSet_Gen.json
|
|
40
|
+
*/
|
|
41
|
+
function firmwareGetMinimumSetGen() {
|
|
42
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
44
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
45
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
46
|
+
"rgworkspaces-firmwares";
|
|
47
|
+
const workspaceName = "A7";
|
|
48
|
+
const firmwareId = "umrkdttp";
|
|
49
|
+
const credential = new DefaultAzureCredential();
|
|
50
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
51
|
+
const result = yield client.firmwareOperations.get(resourceGroupName, workspaceName, firmwareId);
|
|
52
|
+
console.log(result);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
function main() {
|
|
56
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
+
firmwareGetMaximumSetGen();
|
|
58
|
+
firmwareGetMinimumSetGen();
|
|
59
|
+
});
|
|
60
|
+
}
|
|
61
|
+
main().catch(console.error);
|
|
62
|
+
//# sourceMappingURL=firmwareGetSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareGetSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareGetSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,wBAAwB;;QACrC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,GAAG,CAChD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED;;;;;GAKG;AACH,SAAe,wBAAwB;;QACrC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,GAAG,CAChD,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,wBAAwB,EAAE,CAAC;QAC3B,wBAAwB,EAAE,CAAC;IAC7B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListByWorkspaceSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListByWorkspaceSample.ts"],"names":[],"mappings":""}
|