@azure/arm-iotfirmwaredefense 1.0.0-beta.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +5 -0
- package/LICENSE +21 -0
- package/README.md +109 -0
- package/dist/index.js +4045 -0
- package/dist/index.js.map +1 -0
- package/dist/index.min.js +1 -0
- package/dist/index.min.js.map +1 -0
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareCreateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareCreateSample.js +73 -0
- package/dist-esm/samples-dev/firmwareCreateSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.js +62 -0
- package/dist-esm/samples-dev/firmwareDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateBinaryHardeningSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateComponentDetailsSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js +61 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoCertificateSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js +61 -0
- package/dist-esm/samples-dev/firmwareGenerateCryptoKeySummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateCveSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.js +62 -0
- package/dist-esm/samples-dev/firmwareGenerateSummarySample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareGetSample.js +62 -0
- package/dist-esm/samples-dev/firmwareGetSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js +102 -0
- package/dist-esm/samples-dev/firmwareListByWorkspaceSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGenerateBinaryHardeningListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGenerateComponentListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js +103 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoCertificateListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js +103 -0
- package/dist-esm/samples-dev/firmwareListGenerateCryptoKeyListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGenerateCveListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js +104 -0
- package/dist-esm/samples-dev/firmwareListGeneratePasswordHashListSample.js.map +1 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.js +73 -0
- package/dist-esm/samples-dev/firmwareUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.d.ts +2 -0
- package/dist-esm/samples-dev/operationsListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.js +96 -0
- package/dist-esm/samples-dev/operationsListSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesCreateSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesCreateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesCreateSample.js +63 -0
- package/dist-esm/samples-dev/workspacesCreateSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.js +58 -0
- package/dist-esm/samples-dev/workspacesDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js +62 -0
- package/dist-esm/samples-dev/workspacesGenerateUploadUrlSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesGetSample.js +58 -0
- package/dist-esm/samples-dev/workspacesGetSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js +98 -0
- package/dist-esm/samples-dev/workspacesListByResourceGroupSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js +96 -0
- package/dist-esm/samples-dev/workspacesListBySubscriptionSample.js.map +1 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.js +60 -0
- package/dist-esm/samples-dev/workspacesUpdateSample.js.map +1 -0
- package/dist-esm/src/index.d.ts +6 -0
- package/dist-esm/src/index.d.ts.map +1 -0
- package/dist-esm/src/index.js +13 -0
- package/dist-esm/src/index.js.map +1 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts +22 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.d.ts.map +1 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.js +102 -0
- package/dist-esm/src/ioTFirmwareDefenseClient.js.map +1 -0
- package/dist-esm/src/models/index.d.ts +1049 -0
- package/dist-esm/src/models/index.d.ts.map +1 -0
- package/dist-esm/src/models/index.js +142 -0
- package/dist-esm/src/models/index.js.map +1 -0
- package/dist-esm/src/models/mappers.d.ts +41 -0
- package/dist-esm/src/models/mappers.d.ts.map +1 -0
- package/dist-esm/src/models/mappers.js +1618 -0
- package/dist-esm/src/models/mappers.js.map +1 -0
- package/dist-esm/src/models/parameters.d.ts +16 -0
- package/dist-esm/src/models/parameters.d.ts.map +1 -0
- package/dist-esm/src/models/parameters.js +134 -0
- package/dist-esm/src/models/parameters.js.map +1 -0
- package/dist-esm/src/operations/firmwareOperations.d.ts +313 -0
- package/dist-esm/src/operations/firmwareOperations.d.ts.map +1 -0
- package/dist-esm/src/operations/firmwareOperations.js +1393 -0
- package/dist-esm/src/operations/firmwareOperations.js.map +1 -0
- package/dist-esm/src/operations/index.d.ts +4 -0
- package/dist-esm/src/operations/index.d.ts.map +1 -0
- package/dist-esm/src/operations/index.js +11 -0
- package/dist-esm/src/operations/index.js.map +1 -0
- package/dist-esm/src/operations/operations.d.ts +32 -0
- package/dist-esm/src/operations/operations.d.ts.map +1 -0
- package/dist-esm/src/operations/operations.js +138 -0
- package/dist-esm/src/operations/operations.js.map +1 -0
- package/dist-esm/src/operations/workspaces.d.ts +91 -0
- package/dist-esm/src/operations/workspaces.d.ts.map +1 -0
- package/dist-esm/src/operations/workspaces.js +431 -0
- package/dist-esm/src/operations/workspaces.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts +169 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.js +9 -0
- package/dist-esm/src/operationsInterfaces/firmwareOperations.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts +4 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.js +11 -0
- package/dist-esm/src/operationsInterfaces/index.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/operations.d.ts +11 -0
- package/dist-esm/src/operationsInterfaces/operations.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/operations.js +9 -0
- package/dist-esm/src/operationsInterfaces/operations.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/workspaces.d.ts +55 -0
- package/dist-esm/src/operationsInterfaces/workspaces.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/workspaces.js +9 -0
- package/dist-esm/src/operationsInterfaces/workspaces.js.map +1 -0
- package/dist-esm/src/pagingHelper.d.ts +13 -0
- package/dist-esm/src/pagingHelper.d.ts.map +1 -0
- package/dist-esm/src/pagingHelper.js +32 -0
- package/dist-esm/src/pagingHelper.js.map +1 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.d.ts +4 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.d.ts.map +1 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js +120 -0
- package/dist-esm/test/iotfirmwaredefense_operations_test.spec.js.map +1 -0
- package/package.json +121 -0
- package/review/arm-iotfirmwaredefense.api.md +820 -0
- package/rollup.config.js +122 -0
- package/src/index.ts +13 -0
- package/src/ioTFirmwareDefenseClient.ts +152 -0
- package/src/models/index.ts +1198 -0
- package/src/models/mappers.ts +1678 -0
- package/src/models/parameters.ts +159 -0
- package/src/operations/firmwareOperations.ts +1892 -0
- package/src/operations/index.ts +11 -0
- package/src/operations/operations.ts +149 -0
- package/src/operations/workspaces.ts +527 -0
- package/src/operationsInterfaces/firmwareOperations.ts +320 -0
- package/src/operationsInterfaces/index.ts +11 -0
- package/src/operationsInterfaces/operations.ts +22 -0
- package/src/operationsInterfaces/workspaces.ts +107 -0
- package/src/pagingHelper.ts +39 -0
- package/tsconfig.json +33 -0
- package/types/arm-iotfirmwaredefense.d.ts +1453 -0
- package/types/tsdoc-metadata.json +11 -0
|
@@ -0,0 +1,102 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to Lists all of firmwares inside a workspace.
|
|
17
|
+
*
|
|
18
|
+
* @summary Lists all of firmwares inside a workspace.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareListByWorkspaceMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
27
|
+
"rgworkspaces-firmwares";
|
|
28
|
+
const workspaceName = "A7";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const resArray = new Array();
|
|
32
|
+
try {
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
34
|
+
_c = _f.value;
|
|
35
|
+
_d = false;
|
|
36
|
+
try {
|
|
37
|
+
let item = _c;
|
|
38
|
+
resArray.push(item);
|
|
39
|
+
}
|
|
40
|
+
finally {
|
|
41
|
+
_d = true;
|
|
42
|
+
}
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
46
|
+
finally {
|
|
47
|
+
try {
|
|
48
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
49
|
+
}
|
|
50
|
+
finally { if (e_1) throw e_1.error; }
|
|
51
|
+
}
|
|
52
|
+
console.log(resArray);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* This sample demonstrates how to Lists all of firmwares inside a workspace.
|
|
57
|
+
*
|
|
58
|
+
* @summary Lists all of firmwares inside a workspace.
|
|
59
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MinimumSet_Gen.json
|
|
60
|
+
*/
|
|
61
|
+
function firmwareListByWorkspaceMinimumSetGen() {
|
|
62
|
+
var _a, e_2, _b, _c;
|
|
63
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
64
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
65
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
66
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
67
|
+
"rgworkspaces-firmwares";
|
|
68
|
+
const workspaceName = "A7";
|
|
69
|
+
const credential = new DefaultAzureCredential();
|
|
70
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
71
|
+
const resArray = new Array();
|
|
72
|
+
try {
|
|
73
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listByWorkspace(resourceGroupName, workspaceName)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
74
|
+
_c = _f.value;
|
|
75
|
+
_d = false;
|
|
76
|
+
try {
|
|
77
|
+
let item = _c;
|
|
78
|
+
resArray.push(item);
|
|
79
|
+
}
|
|
80
|
+
finally {
|
|
81
|
+
_d = true;
|
|
82
|
+
}
|
|
83
|
+
}
|
|
84
|
+
}
|
|
85
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
86
|
+
finally {
|
|
87
|
+
try {
|
|
88
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
89
|
+
}
|
|
90
|
+
finally { if (e_2) throw e_2.error; }
|
|
91
|
+
}
|
|
92
|
+
console.log(resArray);
|
|
93
|
+
});
|
|
94
|
+
}
|
|
95
|
+
function main() {
|
|
96
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
97
|
+
firmwareListByWorkspaceMaximumSetGen();
|
|
98
|
+
firmwareListByWorkspaceMinimumSetGen();
|
|
99
|
+
});
|
|
100
|
+
}
|
|
101
|
+
main().catch(console.error);
|
|
102
|
+
//# sourceMappingURL=firmwareListByWorkspaceSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListByWorkspaceSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareListByWorkspaceSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oCAAoC;;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC9D,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA;gBAHsB,cAGtB;gBAHsB,WAGtB;;oBAHU,IAAI,IAAI,KAAA,CAAA;oBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,oCAAoC;;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAC9D,iBAAiB,EACjB,aAAa,CACd,CAAA,IAAA;gBAHsB,cAGtB;gBAHsB,WAGtB;;oBAHU,IAAI,IAAI,KAAA,CAAA;oBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,oCAAoC,EAAE,CAAC;QACvC,oCAAoC,EAAE,CAAC;IACzC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateBinaryHardeningListSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateBinaryHardeningListSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,104 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to list all binary hardening result for a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to list all binary hardening result for a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareListGenerateBinaryHardeningListMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
27
|
+
"rgworkspaces-firmwares";
|
|
28
|
+
const workspaceName = "A7";
|
|
29
|
+
const firmwareId = "umrkdttp";
|
|
30
|
+
const credential = new DefaultAzureCredential();
|
|
31
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
32
|
+
const resArray = new Array();
|
|
33
|
+
try {
|
|
34
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateBinaryHardeningList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
35
|
+
_c = _f.value;
|
|
36
|
+
_d = false;
|
|
37
|
+
try {
|
|
38
|
+
let item = _c;
|
|
39
|
+
resArray.push(item);
|
|
40
|
+
}
|
|
41
|
+
finally {
|
|
42
|
+
_d = true;
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
47
|
+
finally {
|
|
48
|
+
try {
|
|
49
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
50
|
+
}
|
|
51
|
+
finally { if (e_1) throw e_1.error; }
|
|
52
|
+
}
|
|
53
|
+
console.log(resArray);
|
|
54
|
+
});
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* This sample demonstrates how to The operation to list all binary hardening result for a firmware.
|
|
58
|
+
*
|
|
59
|
+
* @summary The operation to list all binary hardening result for a firmware.
|
|
60
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MinimumSet_Gen.json
|
|
61
|
+
*/
|
|
62
|
+
function firmwareListGenerateBinaryHardeningListMinimumSetGen() {
|
|
63
|
+
var _a, e_2, _b, _c;
|
|
64
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
65
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
66
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
67
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
68
|
+
"rgworkspaces-firmwares";
|
|
69
|
+
const workspaceName = "A7";
|
|
70
|
+
const firmwareId = "umrkdttp";
|
|
71
|
+
const credential = new DefaultAzureCredential();
|
|
72
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
73
|
+
const resArray = new Array();
|
|
74
|
+
try {
|
|
75
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateBinaryHardeningList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
76
|
+
_c = _f.value;
|
|
77
|
+
_d = false;
|
|
78
|
+
try {
|
|
79
|
+
let item = _c;
|
|
80
|
+
resArray.push(item);
|
|
81
|
+
}
|
|
82
|
+
finally {
|
|
83
|
+
_d = true;
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
88
|
+
finally {
|
|
89
|
+
try {
|
|
90
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
91
|
+
}
|
|
92
|
+
finally { if (e_2) throw e_2.error; }
|
|
93
|
+
}
|
|
94
|
+
console.log(resArray);
|
|
95
|
+
});
|
|
96
|
+
}
|
|
97
|
+
function main() {
|
|
98
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
99
|
+
firmwareListGenerateBinaryHardeningListMaximumSetGen();
|
|
100
|
+
firmwareListGenerateBinaryHardeningListMinimumSetGen();
|
|
101
|
+
});
|
|
102
|
+
}
|
|
103
|
+
main().catch(console.error);
|
|
104
|
+
//# sourceMappingURL=firmwareListGenerateBinaryHardeningListSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateBinaryHardeningListSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateBinaryHardeningListSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oDAAoD;;;QACjE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,+BAA+B,CAC9E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,oDAAoD;;;QACjE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,+BAA+B,CAC9E,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,oDAAoD,EAAE,CAAC;QACvD,oDAAoD,EAAE,CAAC;IACzD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateComponentListSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateComponentListSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,104 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to list all components result for a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to list all components result for a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareListGenerateComponentListMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
27
|
+
"rgworkspaces-firmwares";
|
|
28
|
+
const workspaceName = "A7";
|
|
29
|
+
const firmwareId = "umrkdttp";
|
|
30
|
+
const credential = new DefaultAzureCredential();
|
|
31
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
32
|
+
const resArray = new Array();
|
|
33
|
+
try {
|
|
34
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateComponentList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
35
|
+
_c = _f.value;
|
|
36
|
+
_d = false;
|
|
37
|
+
try {
|
|
38
|
+
let item = _c;
|
|
39
|
+
resArray.push(item);
|
|
40
|
+
}
|
|
41
|
+
finally {
|
|
42
|
+
_d = true;
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
47
|
+
finally {
|
|
48
|
+
try {
|
|
49
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
50
|
+
}
|
|
51
|
+
finally { if (e_1) throw e_1.error; }
|
|
52
|
+
}
|
|
53
|
+
console.log(resArray);
|
|
54
|
+
});
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* This sample demonstrates how to The operation to list all components result for a firmware.
|
|
58
|
+
*
|
|
59
|
+
* @summary The operation to list all components result for a firmware.
|
|
60
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MinimumSet_Gen.json
|
|
61
|
+
*/
|
|
62
|
+
function firmwareListGenerateComponentListMinimumSetGen() {
|
|
63
|
+
var _a, e_2, _b, _c;
|
|
64
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
65
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
66
|
+
"685C0C6F-9867-4B1C-A534-AA3A05B54BCE";
|
|
67
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
68
|
+
"rgworkspaces-firmwares";
|
|
69
|
+
const workspaceName = "A7";
|
|
70
|
+
const firmwareId = "umrkdttp";
|
|
71
|
+
const credential = new DefaultAzureCredential();
|
|
72
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
73
|
+
const resArray = new Array();
|
|
74
|
+
try {
|
|
75
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateComponentList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
76
|
+
_c = _f.value;
|
|
77
|
+
_d = false;
|
|
78
|
+
try {
|
|
79
|
+
let item = _c;
|
|
80
|
+
resArray.push(item);
|
|
81
|
+
}
|
|
82
|
+
finally {
|
|
83
|
+
_d = true;
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
88
|
+
finally {
|
|
89
|
+
try {
|
|
90
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
91
|
+
}
|
|
92
|
+
finally { if (e_2) throw e_2.error; }
|
|
93
|
+
}
|
|
94
|
+
console.log(resArray);
|
|
95
|
+
});
|
|
96
|
+
}
|
|
97
|
+
function main() {
|
|
98
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
99
|
+
firmwareListGenerateComponentListMaximumSetGen();
|
|
100
|
+
firmwareListGenerateComponentListMinimumSetGen();
|
|
101
|
+
});
|
|
102
|
+
}
|
|
103
|
+
main().catch(console.error);
|
|
104
|
+
//# sourceMappingURL=firmwareListGenerateComponentListSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateComponentListSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateComponentListSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,8CAA8C;;;QAC3D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,yBAAyB,CACxE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,8CAA8C;;;QAC3D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC;QAC3B,MAAM,UAAU,GAAG,UAAU,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,yBAAyB,CACxE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,8CAA8C,EAAE,CAAC;QACjD,8CAA8C,EAAE,CAAC;IACnD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateCryptoCertificateListSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateCryptoCertificateListSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,103 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to list all crypto certificates for a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to list all crypto certificates for a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareListGenerateCryptoCertificateListMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
|
+
const workspaceName = "default";
|
|
28
|
+
const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const resArray = new Array();
|
|
32
|
+
try {
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoCertificateList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
34
|
+
_c = _f.value;
|
|
35
|
+
_d = false;
|
|
36
|
+
try {
|
|
37
|
+
let item = _c;
|
|
38
|
+
resArray.push(item);
|
|
39
|
+
}
|
|
40
|
+
finally {
|
|
41
|
+
_d = true;
|
|
42
|
+
}
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
46
|
+
finally {
|
|
47
|
+
try {
|
|
48
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
49
|
+
}
|
|
50
|
+
finally { if (e_1) throw e_1.error; }
|
|
51
|
+
}
|
|
52
|
+
console.log(resArray);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* This sample demonstrates how to The operation to list all crypto certificates for a firmware.
|
|
57
|
+
*
|
|
58
|
+
* @summary The operation to list all crypto certificates for a firmware.
|
|
59
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MinimumSet_Gen.json
|
|
60
|
+
*/
|
|
61
|
+
function firmwareListGenerateCryptoCertificateListMinimumSetGen() {
|
|
62
|
+
var _a, e_2, _b, _c;
|
|
63
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
64
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
65
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
66
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
67
|
+
"rgworkspaces-firmwares";
|
|
68
|
+
const workspaceName = "j5QE_";
|
|
69
|
+
const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
|
|
70
|
+
const credential = new DefaultAzureCredential();
|
|
71
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
72
|
+
const resArray = new Array();
|
|
73
|
+
try {
|
|
74
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoCertificateList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
75
|
+
_c = _f.value;
|
|
76
|
+
_d = false;
|
|
77
|
+
try {
|
|
78
|
+
let item = _c;
|
|
79
|
+
resArray.push(item);
|
|
80
|
+
}
|
|
81
|
+
finally {
|
|
82
|
+
_d = true;
|
|
83
|
+
}
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
87
|
+
finally {
|
|
88
|
+
try {
|
|
89
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
90
|
+
}
|
|
91
|
+
finally { if (e_2) throw e_2.error; }
|
|
92
|
+
}
|
|
93
|
+
console.log(resArray);
|
|
94
|
+
});
|
|
95
|
+
}
|
|
96
|
+
function main() {
|
|
97
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
98
|
+
firmwareListGenerateCryptoCertificateListMaximumSetGen();
|
|
99
|
+
firmwareListGenerateCryptoCertificateListMinimumSetGen();
|
|
100
|
+
});
|
|
101
|
+
}
|
|
102
|
+
main().catch(console.error);
|
|
103
|
+
//# sourceMappingURL=firmwareListGenerateCryptoCertificateListSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateCryptoCertificateListSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateCryptoCertificateListSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,sDAAsD;;;QACnE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,iCAAiC,CAChF,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,sDAAsD;;;QACnE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,MAAM,UAAU,GAAG,6BAA6B,CAAC;QACjD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,iCAAiC,CAChF,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,sDAAsD,EAAE,CAAC;QACzD,sDAAsD,EAAE,CAAC;IAC3D,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateCryptoKeyListSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateCryptoKeyListSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,103 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __asyncValues, __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to The operation to list all crypto keys for a firmware.
|
|
17
|
+
*
|
|
18
|
+
* @summary The operation to list all crypto keys for a firmware.
|
|
19
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json
|
|
20
|
+
*/
|
|
21
|
+
function firmwareListGenerateCryptoKeyListMaximumSetGen() {
|
|
22
|
+
var _a, e_1, _b, _c;
|
|
23
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
24
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
26
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG";
|
|
27
|
+
const workspaceName = "default";
|
|
28
|
+
const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD";
|
|
29
|
+
const credential = new DefaultAzureCredential();
|
|
30
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
31
|
+
const resArray = new Array();
|
|
32
|
+
try {
|
|
33
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoKeyList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
34
|
+
_c = _f.value;
|
|
35
|
+
_d = false;
|
|
36
|
+
try {
|
|
37
|
+
let item = _c;
|
|
38
|
+
resArray.push(item);
|
|
39
|
+
}
|
|
40
|
+
finally {
|
|
41
|
+
_d = true;
|
|
42
|
+
}
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
catch (e_1_1) { e_1 = { error: e_1_1 }; }
|
|
46
|
+
finally {
|
|
47
|
+
try {
|
|
48
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
49
|
+
}
|
|
50
|
+
finally { if (e_1) throw e_1.error; }
|
|
51
|
+
}
|
|
52
|
+
console.log(resArray);
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* This sample demonstrates how to The operation to list all crypto keys for a firmware.
|
|
57
|
+
*
|
|
58
|
+
* @summary The operation to list all crypto keys for a firmware.
|
|
59
|
+
* x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MinimumSet_Gen.json
|
|
60
|
+
*/
|
|
61
|
+
function firmwareListGenerateCryptoKeyListMinimumSetGen() {
|
|
62
|
+
var _a, e_2, _b, _c;
|
|
63
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
64
|
+
const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] ||
|
|
65
|
+
"C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA";
|
|
66
|
+
const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] ||
|
|
67
|
+
"rgworkspaces-firmwares";
|
|
68
|
+
const workspaceName = "j5QE_";
|
|
69
|
+
const firmwareId = "wujtpcgypfpqseyrsebolarkspy";
|
|
70
|
+
const credential = new DefaultAzureCredential();
|
|
71
|
+
const client = new IoTFirmwareDefenseClient(credential, subscriptionId);
|
|
72
|
+
const resArray = new Array();
|
|
73
|
+
try {
|
|
74
|
+
for (var _d = true, _e = __asyncValues(client.firmwareOperations.listGenerateCryptoKeyList(resourceGroupName, workspaceName, firmwareId)), _f; _f = yield _e.next(), _a = _f.done, !_a;) {
|
|
75
|
+
_c = _f.value;
|
|
76
|
+
_d = false;
|
|
77
|
+
try {
|
|
78
|
+
let item = _c;
|
|
79
|
+
resArray.push(item);
|
|
80
|
+
}
|
|
81
|
+
finally {
|
|
82
|
+
_d = true;
|
|
83
|
+
}
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
catch (e_2_1) { e_2 = { error: e_2_1 }; }
|
|
87
|
+
finally {
|
|
88
|
+
try {
|
|
89
|
+
if (!_d && !_a && (_b = _e.return)) yield _b.call(_e);
|
|
90
|
+
}
|
|
91
|
+
finally { if (e_2) throw e_2.error; }
|
|
92
|
+
}
|
|
93
|
+
console.log(resArray);
|
|
94
|
+
});
|
|
95
|
+
}
|
|
96
|
+
function main() {
|
|
97
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
98
|
+
firmwareListGenerateCryptoKeyListMaximumSetGen();
|
|
99
|
+
firmwareListGenerateCryptoKeyListMinimumSetGen();
|
|
100
|
+
});
|
|
101
|
+
}
|
|
102
|
+
main().catch(console.error);
|
|
103
|
+
//# sourceMappingURL=firmwareListGenerateCryptoKeyListSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateCryptoKeyListSample.js","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateCryptoKeyListSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,8CAA8C;;;QAC3D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,IAAI,oBAAoB,CAAC;QAC3E,MAAM,aAAa,GAAG,SAAS,CAAC;QAChC,MAAM,UAAU,GAAG,sCAAsC,CAAC;QAC1D,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,yBAAyB,CACxE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,8CAA8C;;;QAC3D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC;YACjD,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC;YAChD,wBAAwB,CAAC;QAC3B,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,MAAM,UAAU,GAAG,6BAA6B,CAAC;QACjD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,eAAA,KAAA,cAAA,MAAM,CAAC,kBAAkB,CAAC,yBAAyB,CACxE,iBAAiB,EACjB,aAAa,EACb,UAAU,CACX,CAAA,IAAA;gBAJsB,cAItB;gBAJsB,WAItB;;oBAJU,IAAI,IAAI,KAAA,CAAA;oBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;;;;;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,8CAA8C,EAAE,CAAC;QACjD,8CAA8C,EAAE,CAAC;IACnD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"firmwareListGenerateCveListSample.d.ts","sourceRoot":"","sources":["../../samples-dev/firmwareListGenerateCveListSample.ts"],"names":[],"mappings":""}
|