@azure/arm-policyinsights 6.0.0-beta.2 → 6.0.0-beta.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -1
- package/LICENSE +1 -1
- package/README.md +1 -1
- package/dist/index.js +1809 -831
- package/dist/index.js.map +1 -1
- package/dist/index.min.js +1 -1
- package/dist/index.min.js.map +1 -1
- package/dist-esm/samples-dev/attestationsCreateOrUpdateAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/attestationsCreateOrUpdateAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsCreateOrUpdateAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/attestationsCreateOrUpdateAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsCreateOrUpdateAtSubscriptionSample.js +13 -4
- package/dist-esm/samples-dev/attestationsCreateOrUpdateAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsDeleteAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/attestationsDeleteAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsDeleteAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/attestationsDeleteAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsDeleteAtSubscriptionSample.js +10 -2
- package/dist-esm/samples-dev/attestationsDeleteAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsGetAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/attestationsGetAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsGetAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/attestationsGetAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsGetAtSubscriptionSample.js +10 -2
- package/dist-esm/samples-dev/attestationsGetAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsListForResourceGroupSample.js +15 -6
- package/dist-esm/samples-dev/attestationsListForResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsListForResourceSample.js +13 -4
- package/dist-esm/samples-dev/attestationsListForResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/attestationsListForSubscriptionSample.js +13 -4
- package/dist-esm/samples-dev/attestationsListForSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForPolicyDefinitionSample.d.ts +2 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForPolicyDefinitionSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForPolicyDefinitionSample.js +39 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForPolicyDefinitionSample.js.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.d.ts +2 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js +40 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupSample.d.ts +2 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupSample.js +64 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceGroupSample.js.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceSample.d.ts +2 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceSample.js +131 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForResourceSample.js.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionLevelPolicyAssignmentSample.d.ts +2 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionLevelPolicyAssignmentSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionLevelPolicyAssignmentSample.js +39 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionLevelPolicyAssignmentSample.js.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionSample.d.ts +2 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionSample.js +62 -0
- package/dist-esm/samples-dev/componentPolicyStatesListQueryResultsForSubscriptionSample.js.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.js +11 -3
- package/dist-esm/samples-dev/operationsListSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForManagementGroupSample.js +13 -4
- package/dist-esm/samples-dev/policyEventsListQueryResultsForManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForPolicyDefinitionSample.js +13 -4
- package/dist-esm/samples-dev/policyEventsListQueryResultsForPolicyDefinitionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForPolicySetDefinitionSample.js +13 -4
- package/dist-esm/samples-dev/policyEventsListQueryResultsForPolicySetDefinitionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js +15 -6
- package/dist-esm/samples-dev/policyEventsListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForResourceGroupSample.js +15 -6
- package/dist-esm/samples-dev/policyEventsListQueryResultsForResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForResourceSample.js +28 -14
- package/dist-esm/samples-dev/policyEventsListQueryResultsForResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForSubscriptionLevelPolicyAssignmentSample.js +13 -4
- package/dist-esm/samples-dev/policyEventsListQueryResultsForSubscriptionLevelPolicyAssignmentSample.js.map +1 -1
- package/dist-esm/samples-dev/policyEventsListQueryResultsForSubscriptionSample.js +28 -14
- package/dist-esm/samples-dev/policyEventsListQueryResultsForSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyMetadataGetResourceSample.js +10 -2
- package/dist-esm/samples-dev/policyMetadataGetResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/policyMetadataListSample.js +13 -4
- package/dist-esm/samples-dev/policyMetadataListSample.js.map +1 -1
- package/dist-esm/samples-dev/policyRestrictionsCheckAtManagementGroupScopeSample.js +10 -2
- package/dist-esm/samples-dev/policyRestrictionsCheckAtManagementGroupScopeSample.js.map +1 -1
- package/dist-esm/samples-dev/policyRestrictionsCheckAtResourceGroupScopeSample.js +11 -3
- package/dist-esm/samples-dev/policyRestrictionsCheckAtResourceGroupScopeSample.js.map +1 -1
- package/dist-esm/samples-dev/policyRestrictionsCheckAtSubscriptionScopeSample.js +10 -2
- package/dist-esm/samples-dev/policyRestrictionsCheckAtSubscriptionScopeSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForManagementGroupSample.js +13 -4
- package/dist-esm/samples-dev/policyStatesListQueryResultsForManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForPolicyDefinitionSample.js +13 -4
- package/dist-esm/samples-dev/policyStatesListQueryResultsForPolicyDefinitionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForPolicySetDefinitionSample.js +13 -4
- package/dist-esm/samples-dev/policyStatesListQueryResultsForPolicySetDefinitionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js +15 -6
- package/dist-esm/samples-dev/policyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForResourceGroupSample.js +15 -6
- package/dist-esm/samples-dev/policyStatesListQueryResultsForResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForResourceSample.js +31 -16
- package/dist-esm/samples-dev/policyStatesListQueryResultsForResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForSubscriptionLevelPolicyAssignmentSample.js +13 -4
- package/dist-esm/samples-dev/policyStatesListQueryResultsForSubscriptionLevelPolicyAssignmentSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesListQueryResultsForSubscriptionSample.js +28 -14
- package/dist-esm/samples-dev/policyStatesListQueryResultsForSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForManagementGroupSample.js +10 -2
- package/dist-esm/samples-dev/policyStatesSummarizeForManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForPolicyDefinitionSample.js +10 -2
- package/dist-esm/samples-dev/policyStatesSummarizeForPolicyDefinitionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForPolicySetDefinitionSample.js +10 -2
- package/dist-esm/samples-dev/policyStatesSummarizeForPolicySetDefinitionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForResourceGroupLevelPolicyAssignmentSample.js +11 -3
- package/dist-esm/samples-dev/policyStatesSummarizeForResourceGroupLevelPolicyAssignmentSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/policyStatesSummarizeForResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForResourceSample.js +10 -2
- package/dist-esm/samples-dev/policyStatesSummarizeForResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForSubscriptionLevelPolicyAssignmentSample.js +10 -2
- package/dist-esm/samples-dev/policyStatesSummarizeForSubscriptionLevelPolicyAssignmentSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesSummarizeForSubscriptionSample.js +13 -4
- package/dist-esm/samples-dev/policyStatesSummarizeForSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesTriggerResourceGroupEvaluationSample.js +11 -3
- package/dist-esm/samples-dev/policyStatesTriggerResourceGroupEvaluationSample.js.map +1 -1
- package/dist-esm/samples-dev/policyStatesTriggerSubscriptionEvaluationSample.js +10 -2
- package/dist-esm/samples-dev/policyStatesTriggerSubscriptionEvaluationSample.js.map +1 -1
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForManagementGroupSample.js +13 -4
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForResourceGroupSample.js +15 -6
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForResourceSample.js +13 -4
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForSubscriptionSample.js +13 -4
- package/dist-esm/samples-dev/policyTrackedResourcesListQueryResultsForSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCancelAtManagementGroupSample.js +10 -2
- package/dist-esm/samples-dev/remediationsCancelAtManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCancelAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/remediationsCancelAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCancelAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/remediationsCancelAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCancelAtSubscriptionSample.js +10 -2
- package/dist-esm/samples-dev/remediationsCancelAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtManagementGroupSample.js +10 -2
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtSubscriptionSample.js +13 -4
- package/dist-esm/samples-dev/remediationsCreateOrUpdateAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsDeleteAtManagementGroupSample.js +10 -2
- package/dist-esm/samples-dev/remediationsDeleteAtManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsDeleteAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/remediationsDeleteAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsDeleteAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/remediationsDeleteAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsDeleteAtSubscriptionSample.js +10 -2
- package/dist-esm/samples-dev/remediationsDeleteAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsGetAtManagementGroupSample.js +10 -2
- package/dist-esm/samples-dev/remediationsGetAtManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsGetAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/remediationsGetAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsGetAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/remediationsGetAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsGetAtSubscriptionSample.js +10 -2
- package/dist-esm/samples-dev/remediationsGetAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListDeploymentsAtManagementGroupSample.js +10 -2
- package/dist-esm/samples-dev/remediationsListDeploymentsAtManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListDeploymentsAtResourceGroupSample.js +11 -3
- package/dist-esm/samples-dev/remediationsListDeploymentsAtResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListDeploymentsAtResourceSample.js +10 -2
- package/dist-esm/samples-dev/remediationsListDeploymentsAtResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListDeploymentsAtSubscriptionSample.js +10 -2
- package/dist-esm/samples-dev/remediationsListDeploymentsAtSubscriptionSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListForManagementGroupSample.js +13 -4
- package/dist-esm/samples-dev/remediationsListForManagementGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListForResourceGroupSample.js +15 -6
- package/dist-esm/samples-dev/remediationsListForResourceGroupSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListForResourceSample.js +13 -4
- package/dist-esm/samples-dev/remediationsListForResourceSample.js.map +1 -1
- package/dist-esm/samples-dev/remediationsListForSubscriptionSample.js +13 -4
- package/dist-esm/samples-dev/remediationsListForSubscriptionSample.js.map +1 -1
- package/dist-esm/src/index.d.ts +1 -0
- package/dist-esm/src/index.d.ts.map +1 -1
- package/dist-esm/src/index.js +1 -0
- package/dist-esm/src/index.js.map +1 -1
- package/dist-esm/src/models/index.d.ts +377 -94
- package/dist-esm/src/models/index.d.ts.map +1 -1
- package/dist-esm/src/models/index.js +6 -0
- package/dist-esm/src/models/index.js.map +1 -1
- package/dist-esm/src/models/mappers.d.ts +7 -3
- package/dist-esm/src/models/mappers.d.ts.map +1 -1
- package/dist-esm/src/models/mappers.js +446 -82
- package/dist-esm/src/models/mappers.js.map +1 -1
- package/dist-esm/src/models/parameters.d.ts +13 -1
- package/dist-esm/src/models/parameters.d.ts.map +1 -1
- package/dist-esm/src/models/parameters.js +127 -1
- package/dist-esm/src/models/parameters.js.map +1 -1
- package/dist-esm/src/operations/attestations.d.ts.map +1 -1
- package/dist-esm/src/operations/attestations.js +67 -36
- package/dist-esm/src/operations/attestations.js.map +1 -1
- package/dist-esm/src/operations/componentPolicyStates.d.ts +66 -0
- package/dist-esm/src/operations/componentPolicyStates.d.ts.map +1 -0
- package/dist-esm/src/operations/componentPolicyStates.js +292 -0
- package/dist-esm/src/operations/componentPolicyStates.js.map +1 -0
- package/dist-esm/src/operations/index.d.ts +2 -1
- package/dist-esm/src/operations/index.d.ts.map +1 -1
- package/dist-esm/src/operations/index.js +2 -1
- package/dist-esm/src/operations/index.js.map +1 -1
- package/dist-esm/src/operations/operations.js +1 -1
- package/dist-esm/src/operations/policyEvents.d.ts.map +1 -1
- package/dist-esm/src/operations/policyEvents.js +153 -153
- package/dist-esm/src/operations/policyEvents.js.map +1 -1
- package/dist-esm/src/operations/policyMetadataOperations.d.ts.map +1 -1
- package/dist-esm/src/operations/policyMetadataOperations.js +19 -8
- package/dist-esm/src/operations/policyMetadataOperations.js.map +1 -1
- package/dist-esm/src/operations/policyStates.d.ts.map +1 -1
- package/dist-esm/src/operations/policyStates.js +161 -161
- package/dist-esm/src/operations/policyStates.js.map +1 -1
- package/dist-esm/src/operations/policyTrackedResources.d.ts.map +1 -1
- package/dist-esm/src/operations/policyTrackedResources.js +73 -32
- package/dist-esm/src/operations/policyTrackedResources.js.map +1 -1
- package/dist-esm/src/operations/remediations.d.ts.map +1 -1
- package/dist-esm/src/operations/remediations.js +145 -64
- package/dist-esm/src/operations/remediations.js.map +1 -1
- package/dist-esm/src/operationsInterfaces/componentPolicyStates.d.ts +58 -0
- package/dist-esm/src/operationsInterfaces/componentPolicyStates.d.ts.map +1 -0
- package/dist-esm/src/operationsInterfaces/componentPolicyStates.js +9 -0
- package/dist-esm/src/operationsInterfaces/componentPolicyStates.js.map +1 -0
- package/dist-esm/src/operationsInterfaces/index.d.ts +2 -1
- package/dist-esm/src/operationsInterfaces/index.d.ts.map +1 -1
- package/dist-esm/src/operationsInterfaces/index.js +2 -1
- package/dist-esm/src/operationsInterfaces/index.js.map +1 -1
- package/dist-esm/src/pagingHelper.d.ts +13 -0
- package/dist-esm/src/pagingHelper.d.ts.map +1 -0
- package/dist-esm/src/pagingHelper.js +32 -0
- package/dist-esm/src/pagingHelper.js.map +1 -0
- package/dist-esm/src/policyInsightsClient.d.ts +3 -2
- package/dist-esm/src/policyInsightsClient.d.ts.map +1 -1
- package/dist-esm/src/policyInsightsClient.js +7 -9
- package/dist-esm/src/policyInsightsClient.js.map +1 -1
- package/package.json +5 -4
- package/review/arm-policyinsights.api.md +170 -32
- package/src/index.ts +1 -0
- package/src/models/index.ts +438 -163
- package/src/models/mappers.ts +453 -85
- package/src/models/parameters.ts +139 -1
- package/src/operations/attestations.ts +78 -40
- package/src/operations/componentPolicyStates.ts +376 -0
- package/src/operations/index.ts +2 -1
- package/src/operations/operations.ts +1 -1
- package/src/operations/policyEvents.ts +215 -199
- package/src/operations/policyMetadataOperations.ts +22 -10
- package/src/operations/policyStates.ts +224 -208
- package/src/operations/policyTrackedResources.ts +100 -51
- package/src/operations/remediations.ts +186 -88
- package/src/operationsInterfaces/componentPolicyStates.ts +113 -0
- package/src/operationsInterfaces/index.ts +2 -1
- package/src/pagingHelper.ts +39 -0
- package/src/policyInsightsClient.ts +13 -10
- package/types/arm-policyinsights.d.ts +433 -65
- package/types/tsdoc-metadata.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyMetadataListSample.js","sourceRoot":"","sources":["../../samples-dev/policyMetadataListSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyMetadataListSample.js","sourceRoot":"","sources":["../../samples-dev/policyMetadataListSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,sCAAsC;;;QACnD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,wBAAwB,CAAC,IAAI,EAAE,CAAA,IAAA;gBAAlD,IAAI,IAAI,WAAA,CAAA;gBACjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,4DAA4D;;;QACzE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,GAAG,GAAG,CAAC,CAAC;QACd,MAAM,OAAO,GAAqC,EAAE,YAAY,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC;QACjF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,wBAAwB,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA,IAAA;gBAAzD,IAAI,IAAI,WAAA,CAAA;gBACjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,sCAAsC,EAAE,CAAC;QACzC,4DAA4D,EAAE,CAAC;IACjE,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Checks what restrictions Azure Policy will place on resources within a management group.
|
|
15
17
|
*
|
|
@@ -18,7 +20,8 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
18
20
|
*/
|
|
19
21
|
function checkPolicyRestrictionsAtManagementGroupScope() {
|
|
20
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
21
|
-
const subscriptionId = "
|
|
23
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"00000000-0000-0000-0000-000000000000";
|
|
22
25
|
const managementGroupId = "financeMg";
|
|
23
26
|
const parameters = {
|
|
24
27
|
pendingFields: [{ field: "type" }]
|
|
@@ -29,5 +32,10 @@ function checkPolicyRestrictionsAtManagementGroupScope() {
|
|
|
29
32
|
console.log(result);
|
|
30
33
|
});
|
|
31
34
|
}
|
|
32
|
-
|
|
35
|
+
function main() {
|
|
36
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
37
|
+
checkPolicyRestrictionsAtManagementGroupScope();
|
|
38
|
+
});
|
|
39
|
+
}
|
|
40
|
+
main().catch(console.error);
|
|
33
41
|
//# sourceMappingURL=policyRestrictionsCheckAtManagementGroupScopeSample.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyRestrictionsCheckAtManagementGroupScopeSample.js","sourceRoot":"","sources":["../../samples-dev/policyRestrictionsCheckAtManagementGroupScopeSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyRestrictionsCheckAtManagementGroupScopeSample.js","sourceRoot":"","sources":["../../samples-dev/policyRestrictionsCheckAtManagementGroupScopeSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,6CAA6C;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GAAG,WAAW,CAAC;QACtC,MAAM,UAAU,GAA4C;YAC1D,aAAa,EAAE,CAAC,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;SACnC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,2BAA2B,CACxE,iBAAiB,EACjB,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Checks what restrictions Azure Policy will place on a resource within a resource group. Use this when the resource group the resource will be created in is already known.
|
|
15
17
|
*
|
|
@@ -18,8 +20,9 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
18
20
|
*/
|
|
19
21
|
function checkPolicyRestrictionsAtResourceGroupScope() {
|
|
20
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
21
|
-
const subscriptionId = "
|
|
22
|
-
|
|
23
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"35ee058e-5fa0-414c-8145-3ebb8d09b6e2";
|
|
25
|
+
const resourceGroupName = process.env["POLICYINSIGHTS_RESOURCE_GROUP"] || "vmRg";
|
|
23
26
|
const parameters = {
|
|
24
27
|
pendingFields: [
|
|
25
28
|
{ field: "name", values: ["myVMName"] },
|
|
@@ -43,5 +46,10 @@ function checkPolicyRestrictionsAtResourceGroupScope() {
|
|
|
43
46
|
console.log(result);
|
|
44
47
|
});
|
|
45
48
|
}
|
|
46
|
-
|
|
49
|
+
function main() {
|
|
50
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
51
|
+
checkPolicyRestrictionsAtResourceGroupScope();
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
main().catch(console.error);
|
|
47
55
|
//# sourceMappingURL=policyRestrictionsCheckAtResourceGroupScopeSample.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyRestrictionsCheckAtResourceGroupScopeSample.js","sourceRoot":"","sources":["../../samples-dev/policyRestrictionsCheckAtResourceGroupScopeSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyRestrictionsCheckAtResourceGroupScopeSample.js","sourceRoot":"","sources":["../../samples-dev/policyRestrictionsCheckAtResourceGroupScopeSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,2CAA2C;;QACxD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,IAAI,MAAM,CAAC;QACzD,MAAM,UAAU,GAA6B;YAC3C,aAAa,EAAE;gBACb,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC,UAAU,CAAC,EAAE;gBACvC;oBACE,KAAK,EAAE,UAAU;oBACjB,MAAM,EAAE,CAAC,QAAQ,EAAE,QAAQ,EAAE,SAAS,EAAE,YAAY,CAAC;iBACtD;gBACD,EAAE,KAAK,EAAE,MAAM,EAAE;aAClB;YACD,eAAe,EAAE;gBACf,UAAU,EAAE,YAAY;gBACxB,eAAe,EAAE;oBACf,IAAI,EAAE,mCAAmC;oBACzC,UAAU,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE;iBACjC;aACF;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,yBAAyB,CACtE,iBAAiB,EACjB,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,2CAA2C,EAAE,CAAC;IAChD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Checks what restrictions Azure Policy will place on a resource within a subscription.
|
|
15
17
|
*
|
|
@@ -18,7 +20,8 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
18
20
|
*/
|
|
19
21
|
function checkPolicyRestrictionsAtSubscriptionScope() {
|
|
20
22
|
return __awaiter(this, void 0, void 0, function* () {
|
|
21
|
-
const subscriptionId = "
|
|
23
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"35ee058e-5fa0-414c-8145-3ebb8d09b6e2";
|
|
22
25
|
const parameters = {
|
|
23
26
|
pendingFields: [
|
|
24
27
|
{ field: "name", values: ["myVMName"] },
|
|
@@ -42,5 +45,10 @@ function checkPolicyRestrictionsAtSubscriptionScope() {
|
|
|
42
45
|
console.log(result);
|
|
43
46
|
});
|
|
44
47
|
}
|
|
45
|
-
|
|
48
|
+
function main() {
|
|
49
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
50
|
+
checkPolicyRestrictionsAtSubscriptionScope();
|
|
51
|
+
});
|
|
52
|
+
}
|
|
53
|
+
main().catch(console.error);
|
|
46
54
|
//# sourceMappingURL=policyRestrictionsCheckAtSubscriptionScopeSample.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyRestrictionsCheckAtSubscriptionScopeSample.js","sourceRoot":"","sources":["../../samples-dev/policyRestrictionsCheckAtSubscriptionScopeSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyRestrictionsCheckAtSubscriptionScopeSample.js","sourceRoot":"","sources":["../../samples-dev/policyRestrictionsCheckAtSubscriptionScopeSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,0CAA0C;;QACvD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,UAAU,GAA6B;YAC3C,aAAa,EAAE;gBACb,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC,UAAU,CAAC,EAAE;gBACvC;oBACE,KAAK,EAAE,UAAU;oBACjB,MAAM,EAAE,CAAC,QAAQ,EAAE,QAAQ,EAAE,SAAS,EAAE,YAAY,CAAC;iBACtD;gBACD,EAAE,KAAK,EAAE,MAAM,EAAE;aAClB;YACD,eAAe,EAAE;gBACf,UAAU,EAAE,YAAY;gBACxB,eAAe,EAAE;oBACf,IAAI,EAAE,mCAAmC;oBACzC,UAAU,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE;iBACjC;aACF;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,wBAAwB,CACrE,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,0CAA0C,EAAE,CAAC;IAC/C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __asyncValues, __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Queries policy states for the resources under the management group.
|
|
15
17
|
*
|
|
@@ -19,7 +21,8 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
19
21
|
function queryLatestAtManagementGroupScope() {
|
|
20
22
|
var e_1, _a;
|
|
21
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
22
|
-
const subscriptionId = "
|
|
24
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
23
26
|
const policyStatesResource = "latest";
|
|
24
27
|
const managementGroupName = "myManagementGroup";
|
|
25
28
|
const credential = new DefaultAzureCredential();
|
|
@@ -41,7 +44,6 @@ function queryLatestAtManagementGroupScope() {
|
|
|
41
44
|
console.log(resArray);
|
|
42
45
|
});
|
|
43
46
|
}
|
|
44
|
-
queryLatestAtManagementGroupScope().catch(console.error);
|
|
45
47
|
/**
|
|
46
48
|
* This sample demonstrates how to Queries policy states for the resources under the management group.
|
|
47
49
|
*
|
|
@@ -51,7 +53,8 @@ queryLatestAtManagementGroupScope().catch(console.error);
|
|
|
51
53
|
function queryLatestAtManagementGroupScopeWithNextLink() {
|
|
52
54
|
var e_2, _a;
|
|
53
55
|
return __awaiter(this, void 0, void 0, function* () {
|
|
54
|
-
const subscriptionId = "
|
|
56
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
57
|
+
"00000000-0000-0000-0000-000000000000";
|
|
55
58
|
const policyStatesResource = "latest";
|
|
56
59
|
const managementGroupName = "myManagementGroup";
|
|
57
60
|
const skipToken = "WpmWfBSvPhkAK6QD";
|
|
@@ -77,5 +80,11 @@ function queryLatestAtManagementGroupScopeWithNextLink() {
|
|
|
77
80
|
console.log(resArray);
|
|
78
81
|
});
|
|
79
82
|
}
|
|
80
|
-
|
|
83
|
+
function main() {
|
|
84
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
85
|
+
queryLatestAtManagementGroupScope();
|
|
86
|
+
queryLatestAtManagementGroupScopeWithNextLink();
|
|
87
|
+
});
|
|
88
|
+
}
|
|
89
|
+
main().catch(console.error);
|
|
81
90
|
//# sourceMappingURL=policyStatesListQueryResultsForManagementGroupSample.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyStatesListQueryResultsForManagementGroupSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForManagementGroupSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyStatesListQueryResultsForManagementGroupSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForManagementGroupSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,iCAAiC;;;QAC9C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,mBAAmB,GAAG,mBAAmB,CAAC;QAChD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,kCAAkC,CAC3E,oBAAoB,EACpB,mBAAmB,CACpB,CAAA,IAAA;gBAHU,IAAI,IAAI,WAAA,CAAA;gBAIjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,6CAA6C;;;QAC1D,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,mBAAmB,GAAG,mBAAmB,CAAC;QAChD,MAAM,SAAS,GAAG,kBAAkB,CAAC;QACrC,MAAM,OAAO,GAAiE;YAC5E,YAAY,EAAE,EAAE,SAAS,EAAE,SAAS,EAAE;SACvC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,kCAAkC,CAC3E,oBAAoB,EACpB,mBAAmB,EACnB,OAAO,CACR,CAAA,IAAA;gBAJU,IAAI,IAAI,WAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,iCAAiC,EAAE,CAAC;QACpC,6CAA6C,EAAE,CAAC;IAClD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __asyncValues, __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Queries policy states for the subscription level policy definition.
|
|
15
17
|
*
|
|
@@ -19,7 +21,8 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
19
21
|
function queryLatestAtSubscriptionLevelPolicyDefinitionScope() {
|
|
20
22
|
var e_1, _a;
|
|
21
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
22
|
-
const subscriptionId = "
|
|
24
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
23
26
|
const policyStatesResource = "latest";
|
|
24
27
|
const policyDefinitionName = "24813039-7534-408a-9842-eb99f45721b1";
|
|
25
28
|
const credential = new DefaultAzureCredential();
|
|
@@ -41,7 +44,6 @@ function queryLatestAtSubscriptionLevelPolicyDefinitionScope() {
|
|
|
41
44
|
console.log(resArray);
|
|
42
45
|
});
|
|
43
46
|
}
|
|
44
|
-
queryLatestAtSubscriptionLevelPolicyDefinitionScope().catch(console.error);
|
|
45
47
|
/**
|
|
46
48
|
* This sample demonstrates how to Queries policy states for the subscription level policy definition.
|
|
47
49
|
*
|
|
@@ -51,7 +53,8 @@ queryLatestAtSubscriptionLevelPolicyDefinitionScope().catch(console.error);
|
|
|
51
53
|
function queryLatestAtSubscriptionLevelPolicyDefinitionScopeWithNextLink() {
|
|
52
54
|
var e_2, _a;
|
|
53
55
|
return __awaiter(this, void 0, void 0, function* () {
|
|
54
|
-
const subscriptionId = "
|
|
56
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
57
|
+
"00000000-0000-0000-0000-000000000000";
|
|
55
58
|
const policyStatesResource = "latest";
|
|
56
59
|
const policyDefinitionName = "24813039-7534-408a-9842-eb99f45721b1";
|
|
57
60
|
const skipToken = "WpmWfBSvPhkAK6QD";
|
|
@@ -77,5 +80,11 @@ function queryLatestAtSubscriptionLevelPolicyDefinitionScopeWithNextLink() {
|
|
|
77
80
|
console.log(resArray);
|
|
78
81
|
});
|
|
79
82
|
}
|
|
80
|
-
|
|
83
|
+
function main() {
|
|
84
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
85
|
+
queryLatestAtSubscriptionLevelPolicyDefinitionScope();
|
|
86
|
+
queryLatestAtSubscriptionLevelPolicyDefinitionScopeWithNextLink();
|
|
87
|
+
});
|
|
88
|
+
}
|
|
89
|
+
main().catch(console.error);
|
|
81
90
|
//# sourceMappingURL=policyStatesListQueryResultsForPolicyDefinitionSample.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyStatesListQueryResultsForPolicyDefinitionSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForPolicyDefinitionSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyStatesListQueryResultsForPolicyDefinitionSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForPolicyDefinitionSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,mDAAmD;;;QAChE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,oBAAoB,GAAG,sCAAsC,CAAC;QACpE,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,mCAAmC,CAC5E,oBAAoB,EACpB,cAAc,EACd,oBAAoB,CACrB,CAAA,IAAA;gBAJU,IAAI,IAAI,WAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,+DAA+D;;;QAC5E,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,oBAAoB,GAAG,sCAAsC,CAAC;QACpE,MAAM,SAAS,GAAG,kBAAkB,CAAC;QACrC,MAAM,OAAO,GAAkE;YAC7E,YAAY,EAAE,EAAE,SAAS,EAAE,SAAS,EAAE;SACvC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,mCAAmC,CAC5E,oBAAoB,EACpB,cAAc,EACd,oBAAoB,EACpB,OAAO,CACR,CAAA,IAAA;gBALU,IAAI,IAAI,WAAA,CAAA;gBAMjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,mDAAmD,EAAE,CAAC;QACtD,+DAA+D,EAAE,CAAC;IACpE,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __asyncValues, __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Queries policy states for the subscription level policy set definition.
|
|
15
17
|
*
|
|
@@ -19,7 +21,8 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
19
21
|
function queryLatestAtSubscriptionLevelPolicySetDefinitionScope() {
|
|
20
22
|
var e_1, _a;
|
|
21
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
22
|
-
const subscriptionId = "
|
|
24
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
23
26
|
const policyStatesResource = "latest";
|
|
24
27
|
const policySetDefinitionName = "3e3807c1-65c9-49e0-a406-82d8ae3e338c";
|
|
25
28
|
const credential = new DefaultAzureCredential();
|
|
@@ -41,7 +44,6 @@ function queryLatestAtSubscriptionLevelPolicySetDefinitionScope() {
|
|
|
41
44
|
console.log(resArray);
|
|
42
45
|
});
|
|
43
46
|
}
|
|
44
|
-
queryLatestAtSubscriptionLevelPolicySetDefinitionScope().catch(console.error);
|
|
45
47
|
/**
|
|
46
48
|
* This sample demonstrates how to Queries policy states for the subscription level policy set definition.
|
|
47
49
|
*
|
|
@@ -51,7 +53,8 @@ queryLatestAtSubscriptionLevelPolicySetDefinitionScope().catch(console.error);
|
|
|
51
53
|
function queryLatestAtSubscriptionLevelPolicySetDefinitionScopeWithNextLink() {
|
|
52
54
|
var e_2, _a;
|
|
53
55
|
return __awaiter(this, void 0, void 0, function* () {
|
|
54
|
-
const subscriptionId = "
|
|
56
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
57
|
+
"00000000-0000-0000-0000-000000000000";
|
|
55
58
|
const policyStatesResource = "latest";
|
|
56
59
|
const policySetDefinitionName = "3e3807c1-65c9-49e0-a406-82d8ae3e338c";
|
|
57
60
|
const skipToken = "WpmWfBSvPhkAK6QD";
|
|
@@ -77,5 +80,11 @@ function queryLatestAtSubscriptionLevelPolicySetDefinitionScopeWithNextLink() {
|
|
|
77
80
|
console.log(resArray);
|
|
78
81
|
});
|
|
79
82
|
}
|
|
80
|
-
|
|
83
|
+
function main() {
|
|
84
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
85
|
+
queryLatestAtSubscriptionLevelPolicySetDefinitionScope();
|
|
86
|
+
queryLatestAtSubscriptionLevelPolicySetDefinitionScopeWithNextLink();
|
|
87
|
+
});
|
|
88
|
+
}
|
|
89
|
+
main().catch(console.error);
|
|
81
90
|
//# sourceMappingURL=policyStatesListQueryResultsForPolicySetDefinitionSample.js.map
|
package/dist-esm/samples-dev/policyStatesListQueryResultsForPolicySetDefinitionSample.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyStatesListQueryResultsForPolicySetDefinitionSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForPolicySetDefinitionSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyStatesListQueryResultsForPolicySetDefinitionSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForPolicySetDefinitionSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,sDAAsD;;;QACnE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,uBAAuB,GAAG,sCAAsC,CAAC;QACvE,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,sCAAsC,CAC/E,oBAAoB,EACpB,cAAc,EACd,uBAAuB,CACxB,CAAA,IAAA;gBAJU,IAAI,IAAI,WAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,kEAAkE;;;QAC/E,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,uBAAuB,GAAG,sCAAsC,CAAC;QACvE,MAAM,SAAS,GAAG,kBAAkB,CAAC;QACrC,MAAM,OAAO,GAAqE;YAChF,YAAY,EAAE,EAAE,SAAS,EAAE,SAAS,EAAE;SACvC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,sCAAsC,CAC/E,oBAAoB,EACpB,cAAc,EACd,uBAAuB,EACvB,OAAO,CACR,CAAA,IAAA;gBALU,IAAI,IAAI,WAAA,CAAA;gBAMjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,sDAAsD,EAAE,CAAC;QACzD,kEAAkE,EAAE,CAAC;IACvE,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __asyncValues, __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Queries policy states for the resource group level policy assignment.
|
|
15
17
|
*
|
|
@@ -19,9 +21,10 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
19
21
|
function queryLatestAtResourceGroupLevelPolicyAssignmentScope() {
|
|
20
22
|
var e_1, _a;
|
|
21
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
22
|
-
const subscriptionId = "
|
|
24
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
23
26
|
const policyStatesResource = "latest";
|
|
24
|
-
const resourceGroupName = "myResourceGroup";
|
|
27
|
+
const resourceGroupName = process.env["POLICYINSIGHTS_RESOURCE_GROUP"] || "myResourceGroup";
|
|
25
28
|
const policyAssignmentName = "myPolicyAssignment";
|
|
26
29
|
const credential = new DefaultAzureCredential();
|
|
27
30
|
const client = new PolicyInsightsClient(credential, subscriptionId);
|
|
@@ -42,7 +45,6 @@ function queryLatestAtResourceGroupLevelPolicyAssignmentScope() {
|
|
|
42
45
|
console.log(resArray);
|
|
43
46
|
});
|
|
44
47
|
}
|
|
45
|
-
queryLatestAtResourceGroupLevelPolicyAssignmentScope().catch(console.error);
|
|
46
48
|
/**
|
|
47
49
|
* This sample demonstrates how to Queries policy states for the resource group level policy assignment.
|
|
48
50
|
*
|
|
@@ -52,9 +54,10 @@ queryLatestAtResourceGroupLevelPolicyAssignmentScope().catch(console.error);
|
|
|
52
54
|
function queryLatestAtResourceGroupLevelPolicyAssignmentScopeWithNextLink() {
|
|
53
55
|
var e_2, _a;
|
|
54
56
|
return __awaiter(this, void 0, void 0, function* () {
|
|
55
|
-
const subscriptionId = "
|
|
57
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
58
|
+
"00000000-0000-0000-0000-000000000000";
|
|
56
59
|
const policyStatesResource = "latest";
|
|
57
|
-
const resourceGroupName = "myResourceGroup";
|
|
60
|
+
const resourceGroupName = process.env["POLICYINSIGHTS_RESOURCE_GROUP"] || "myResourceGroup";
|
|
58
61
|
const policyAssignmentName = "myPolicyAssignment";
|
|
59
62
|
const skipToken = "WpmWfBSvPhkAK6QD";
|
|
60
63
|
const options = {
|
|
@@ -79,5 +82,11 @@ function queryLatestAtResourceGroupLevelPolicyAssignmentScopeWithNextLink() {
|
|
|
79
82
|
console.log(resArray);
|
|
80
83
|
});
|
|
81
84
|
}
|
|
82
|
-
|
|
85
|
+
function main() {
|
|
86
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
87
|
+
queryLatestAtResourceGroupLevelPolicyAssignmentScope();
|
|
88
|
+
queryLatestAtResourceGroupLevelPolicyAssignmentScopeWithNextLink();
|
|
89
|
+
});
|
|
90
|
+
}
|
|
91
|
+
main().catch(console.error);
|
|
83
92
|
//# sourceMappingURL=policyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForResourceGroupLevelPolicyAssignmentSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oDAAoD;;;QACjE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,IAAI,iBAAiB,CAAC;QACpE,MAAM,oBAAoB,GAAG,oBAAoB,CAAC;QAClD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,qDAAqD,CAC9F,oBAAoB,EACpB,cAAc,EACd,iBAAiB,EACjB,oBAAoB,CACrB,CAAA,IAAA;gBALU,IAAI,IAAI,WAAA,CAAA;gBAMjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,gEAAgE;;;QAC7E,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,IAAI,iBAAiB,CAAC;QACpE,MAAM,oBAAoB,GAAG,oBAAoB,CAAC;QAClD,MAAM,SAAS,GAAG,kBAAkB,CAAC;QACrC,MAAM,OAAO,GAAoF;YAC/F,YAAY,EAAE,EAAE,SAAS,EAAE,SAAS,EAAE;SACvC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,qDAAqD,CAC9F,oBAAoB,EACpB,cAAc,EACd,iBAAiB,EACjB,oBAAoB,EACpB,OAAO,CACR,CAAA,IAAA;gBANU,IAAI,IAAI,WAAA,CAAA;gBAOjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,oDAAoD,EAAE,CAAC;QACvD,gEAAgE,EAAE,CAAC;IACrE,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __asyncValues, __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Queries policy states for the resources under the resource group.
|
|
15
17
|
*
|
|
@@ -19,9 +21,10 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
19
21
|
function queryLatestAtResourceGroupScope() {
|
|
20
22
|
var e_1, _a;
|
|
21
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
22
|
-
const subscriptionId = "
|
|
24
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
23
26
|
const policyStatesResource = "latest";
|
|
24
|
-
const resourceGroupName = "myResourceGroup";
|
|
27
|
+
const resourceGroupName = process.env["POLICYINSIGHTS_RESOURCE_GROUP"] || "myResourceGroup";
|
|
25
28
|
const credential = new DefaultAzureCredential();
|
|
26
29
|
const client = new PolicyInsightsClient(credential, subscriptionId);
|
|
27
30
|
const resArray = new Array();
|
|
@@ -41,7 +44,6 @@ function queryLatestAtResourceGroupScope() {
|
|
|
41
44
|
console.log(resArray);
|
|
42
45
|
});
|
|
43
46
|
}
|
|
44
|
-
queryLatestAtResourceGroupScope().catch(console.error);
|
|
45
47
|
/**
|
|
46
48
|
* This sample demonstrates how to Queries policy states for the resources under the resource group.
|
|
47
49
|
*
|
|
@@ -51,9 +53,10 @@ queryLatestAtResourceGroupScope().catch(console.error);
|
|
|
51
53
|
function queryLatestAtResourceGroupScopeWithNextLink() {
|
|
52
54
|
var e_2, _a;
|
|
53
55
|
return __awaiter(this, void 0, void 0, function* () {
|
|
54
|
-
const subscriptionId = "
|
|
56
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
57
|
+
"00000000-0000-0000-0000-000000000000";
|
|
55
58
|
const policyStatesResource = "latest";
|
|
56
|
-
const resourceGroupName = "myResourceGroup";
|
|
59
|
+
const resourceGroupName = process.env["POLICYINSIGHTS_RESOURCE_GROUP"] || "myResourceGroup";
|
|
57
60
|
const skipToken = "WpmWfBSvPhkAK6QD";
|
|
58
61
|
const options = {
|
|
59
62
|
queryOptions: { skipToken: skipToken }
|
|
@@ -77,5 +80,11 @@ function queryLatestAtResourceGroupScopeWithNextLink() {
|
|
|
77
80
|
console.log(resArray);
|
|
78
81
|
});
|
|
79
82
|
}
|
|
80
|
-
|
|
83
|
+
function main() {
|
|
84
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
85
|
+
queryLatestAtResourceGroupScope();
|
|
86
|
+
queryLatestAtResourceGroupScopeWithNextLink();
|
|
87
|
+
});
|
|
88
|
+
}
|
|
89
|
+
main().catch(console.error);
|
|
81
90
|
//# sourceMappingURL=policyStatesListQueryResultsForResourceGroupSample.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policyStatesListQueryResultsForResourceGroupSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForResourceGroupSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"policyStatesListQueryResultsForResourceGroupSample.js","sourceRoot":"","sources":["../../samples-dev/policyStatesListQueryResultsForResourceGroupSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,oBAAoB,EACrB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,+BAA+B;;;QAC5C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,IAAI,iBAAiB,CAAC;QACpE,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,gCAAgC,CACzE,oBAAoB,EACpB,cAAc,EACd,iBAAiB,CAClB,CAAA,IAAA;gBAJU,IAAI,IAAI,WAAA,CAAA;gBAKjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED;;;;;GAKG;AACH,SAAe,2CAA2C;;;QACxD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC;YAC7C,sCAAsC,CAAC;QACzC,MAAM,oBAAoB,GAAG,QAAQ,CAAC;QACtC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,IAAI,iBAAiB,CAAC;QACpE,MAAM,SAAS,GAAG,kBAAkB,CAAC;QACrC,MAAM,OAAO,GAA+D;YAC1E,YAAY,EAAE,EAAE,SAAS,EAAE,SAAS,EAAE;SACvC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACpE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,YAAY,CAAC,gCAAgC,CACzE,oBAAoB,EACpB,cAAc,EACd,iBAAiB,EACjB,OAAO,CACR,CAAA,IAAA;gBALU,IAAI,IAAI,WAAA,CAAA;gBAMjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,+BAA+B,EAAE,CAAC;QAClC,2CAA2C,EAAE,CAAC;IAChD,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -10,6 +10,8 @@ import { __asyncValues, __awaiter } from "tslib";
|
|
|
10
10
|
// Licensed under the MIT License.
|
|
11
11
|
import { PolicyInsightsClient } from "@azure/arm-policyinsights";
|
|
12
12
|
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
13
15
|
/**
|
|
14
16
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
15
17
|
*
|
|
@@ -19,7 +21,8 @@ import { DefaultAzureCredential } from "@azure/identity";
|
|
|
19
21
|
function queryAllPolicyStatesAtNestedResourceScope() {
|
|
20
22
|
var e_1, _a;
|
|
21
23
|
return __awaiter(this, void 0, void 0, function* () {
|
|
22
|
-
const subscriptionId = "
|
|
24
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
25
|
+
"00000000-0000-0000-0000-000000000000";
|
|
23
26
|
const policyStatesResource = "default";
|
|
24
27
|
const resourceId = "subscriptions/fff10b27-fff3-fff5-fff8-fffbe01e86a5/resourceGroups/myResourceGroup/providers/Microsoft.ServiceFabric/clusters/myCluster/applications/myApplication";
|
|
25
28
|
const credential = new DefaultAzureCredential();
|
|
@@ -41,7 +44,6 @@ function queryAllPolicyStatesAtNestedResourceScope() {
|
|
|
41
44
|
console.log(resArray);
|
|
42
45
|
});
|
|
43
46
|
}
|
|
44
|
-
queryAllPolicyStatesAtNestedResourceScope().catch(console.error);
|
|
45
47
|
/**
|
|
46
48
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
47
49
|
*
|
|
@@ -51,7 +53,8 @@ queryAllPolicyStatesAtNestedResourceScope().catch(console.error);
|
|
|
51
53
|
function queryAllPolicyStatesAtResourceScope() {
|
|
52
54
|
var e_2, _a;
|
|
53
55
|
return __awaiter(this, void 0, void 0, function* () {
|
|
54
|
-
const subscriptionId = "
|
|
56
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
57
|
+
"00000000-0000-0000-0000-000000000000";
|
|
55
58
|
const policyStatesResource = "default";
|
|
56
59
|
const resourceId = "subscriptions/fff10b27-fff3-fff5-fff8-fffbe01e86a5/resourceGroups/myResourceGroup/providers/Microsoft.ClassicCompute/domainNames/myDomainName";
|
|
57
60
|
const credential = new DefaultAzureCredential();
|
|
@@ -73,7 +76,6 @@ function queryAllPolicyStatesAtResourceScope() {
|
|
|
73
76
|
console.log(resArray);
|
|
74
77
|
});
|
|
75
78
|
}
|
|
76
|
-
queryAllPolicyStatesAtResourceScope().catch(console.error);
|
|
77
79
|
/**
|
|
78
80
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
79
81
|
*
|
|
@@ -83,7 +85,8 @@ queryAllPolicyStatesAtResourceScope().catch(console.error);
|
|
|
83
85
|
function queryAllPolicyStatesAtResourceScopeAndExpandPolicyEvaluationDetails() {
|
|
84
86
|
var e_3, _a;
|
|
85
87
|
return __awaiter(this, void 0, void 0, function* () {
|
|
86
|
-
const subscriptionId = "
|
|
88
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
89
|
+
"00000000-0000-0000-0000-000000000000";
|
|
87
90
|
const policyStatesResource = "latest";
|
|
88
91
|
const resourceId = "subscriptions/fff10b27-fff3-fff5-fff8-fffbe01e86a5/resourceGroups/myResourceGroup/providers/Microsoft.ClassicCompute/domainNames/myDomainName";
|
|
89
92
|
const expand = "PolicyEvaluationDetails";
|
|
@@ -109,7 +112,6 @@ function queryAllPolicyStatesAtResourceScopeAndExpandPolicyEvaluationDetails() {
|
|
|
109
112
|
console.log(resArray);
|
|
110
113
|
});
|
|
111
114
|
}
|
|
112
|
-
queryAllPolicyStatesAtResourceScopeAndExpandPolicyEvaluationDetails().catch(console.error);
|
|
113
115
|
/**
|
|
114
116
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
115
117
|
*
|
|
@@ -119,7 +121,8 @@ queryAllPolicyStatesAtResourceScopeAndExpandPolicyEvaluationDetails().catch(cons
|
|
|
119
121
|
function queryAllPolicyStatesAtResourceScopeWithNextLink() {
|
|
120
122
|
var e_4, _a;
|
|
121
123
|
return __awaiter(this, void 0, void 0, function* () {
|
|
122
|
-
const subscriptionId = "
|
|
124
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
125
|
+
"00000000-0000-0000-0000-000000000000";
|
|
123
126
|
const policyStatesResource = "default";
|
|
124
127
|
const resourceId = "subscriptions/fff10b27-fff3-fff5-fff8-fffbe01e86a5/resourceGroups/myResourceGroup/providers/Microsoft.ClassicCompute/domainNames/myDomainName";
|
|
125
128
|
const skipToken = "WpmWfBSvPhkAK6QD";
|
|
@@ -145,7 +148,6 @@ function queryAllPolicyStatesAtResourceScopeWithNextLink() {
|
|
|
145
148
|
console.log(resArray);
|
|
146
149
|
});
|
|
147
150
|
}
|
|
148
|
-
queryAllPolicyStatesAtResourceScopeWithNextLink().catch(console.error);
|
|
149
151
|
/**
|
|
150
152
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
151
153
|
*
|
|
@@ -155,7 +157,8 @@ queryAllPolicyStatesAtResourceScopeWithNextLink().catch(console.error);
|
|
|
155
157
|
function queryAllPolicyStatesAtSubscriptionLevelNestedResourceScope() {
|
|
156
158
|
var e_5, _a;
|
|
157
159
|
return __awaiter(this, void 0, void 0, function* () {
|
|
158
|
-
const subscriptionId = "
|
|
160
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
161
|
+
"00000000-0000-0000-0000-000000000000";
|
|
159
162
|
const policyStatesResource = "default";
|
|
160
163
|
const resourceId = "subscriptions/fff10b27-fff3-fff5-fff8-fffbe01e86a5/providers/Microsoft.SomeNamespace/someResourceType/someResource/someNestedResourceType/someNestedResource";
|
|
161
164
|
const credential = new DefaultAzureCredential();
|
|
@@ -177,7 +180,6 @@ function queryAllPolicyStatesAtSubscriptionLevelNestedResourceScope() {
|
|
|
177
180
|
console.log(resArray);
|
|
178
181
|
});
|
|
179
182
|
}
|
|
180
|
-
queryAllPolicyStatesAtSubscriptionLevelNestedResourceScope().catch(console.error);
|
|
181
183
|
/**
|
|
182
184
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
183
185
|
*
|
|
@@ -187,7 +189,8 @@ queryAllPolicyStatesAtSubscriptionLevelNestedResourceScope().catch(console.error
|
|
|
187
189
|
function queryAllPolicyStatesAtSubscriptionLevelResourceScope() {
|
|
188
190
|
var e_6, _a;
|
|
189
191
|
return __awaiter(this, void 0, void 0, function* () {
|
|
190
|
-
const subscriptionId = "
|
|
192
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
193
|
+
"00000000-0000-0000-0000-000000000000";
|
|
191
194
|
const policyStatesResource = "default";
|
|
192
195
|
const resourceId = "subscriptions/fff10b27-fff3-fff5-fff8-fffbe01e86a5/providers/Microsoft.SomeNamespace/someResourceType/someResourceName";
|
|
193
196
|
const credential = new DefaultAzureCredential();
|
|
@@ -209,7 +212,6 @@ function queryAllPolicyStatesAtSubscriptionLevelResourceScope() {
|
|
|
209
212
|
console.log(resArray);
|
|
210
213
|
});
|
|
211
214
|
}
|
|
212
|
-
queryAllPolicyStatesAtSubscriptionLevelResourceScope().catch(console.error);
|
|
213
215
|
/**
|
|
214
216
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
215
217
|
*
|
|
@@ -219,7 +221,8 @@ queryAllPolicyStatesAtSubscriptionLevelResourceScope().catch(console.error);
|
|
|
219
221
|
function queryComponentPolicyComplianceStateAtResourceScopeFilteredByGivenAssignment() {
|
|
220
222
|
var e_7, _a;
|
|
221
223
|
return __awaiter(this, void 0, void 0, function* () {
|
|
222
|
-
const subscriptionId = "
|
|
224
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
225
|
+
"00000000-0000-0000-0000-000000000000";
|
|
223
226
|
const policyStatesResource = "latest";
|
|
224
227
|
const resourceId = "subscriptions/e78961ba-36fe-4739-9212-e3031b4c8db7/resourceGroups/myResourceGroup/providers/Microsoft.KeyVault/Vaults/myKVName";
|
|
225
228
|
const filter = "policyAssignmentId eq '/subscriptions/e78961ba-36fe-4739-9212-e3031b4c8db7/providers/microsoft.authorization/policyassignments/560050f83dbb4a24974323f8'";
|
|
@@ -246,7 +249,6 @@ function queryComponentPolicyComplianceStateAtResourceScopeFilteredByGivenAssign
|
|
|
246
249
|
console.log(resArray);
|
|
247
250
|
});
|
|
248
251
|
}
|
|
249
|
-
queryComponentPolicyComplianceStateAtResourceScopeFilteredByGivenAssignment().catch(console.error);
|
|
250
252
|
/**
|
|
251
253
|
* This sample demonstrates how to Queries policy states for the resource.
|
|
252
254
|
*
|
|
@@ -256,7 +258,8 @@ queryComponentPolicyComplianceStateAtResourceScopeFilteredByGivenAssignment().ca
|
|
|
256
258
|
function queryComponentPolicyComplianceStateCountGroupedByStateTypeAtResourceScopeFilteredByGivenAssignment() {
|
|
257
259
|
var e_8, _a;
|
|
258
260
|
return __awaiter(this, void 0, void 0, function* () {
|
|
259
|
-
const subscriptionId = "
|
|
261
|
+
const subscriptionId = process.env["POLICYINSIGHTS_SUBSCRIPTION_ID"] ||
|
|
262
|
+
"00000000-0000-0000-0000-000000000000";
|
|
260
263
|
const policyStatesResource = "latest";
|
|
261
264
|
const resourceId = "subscriptions/e78961ba-36fe-4739-9212-e3031b4c8db7/resourceGroups/myResourceGroup/providers/Microsoft.KeyVault/Vaults/myKVName";
|
|
262
265
|
const filter = "policyAssignmentId eq '/subscriptions/e78961ba-36fe-4739-9212-e3031b4c8db7/providers/microsoft.authorization/policyassignments/560050f83dbb4a24974323f8'";
|
|
@@ -283,5 +286,17 @@ function queryComponentPolicyComplianceStateCountGroupedByStateTypeAtResourceSco
|
|
|
283
286
|
console.log(resArray);
|
|
284
287
|
});
|
|
285
288
|
}
|
|
286
|
-
|
|
289
|
+
function main() {
|
|
290
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
291
|
+
queryAllPolicyStatesAtNestedResourceScope();
|
|
292
|
+
queryAllPolicyStatesAtResourceScope();
|
|
293
|
+
queryAllPolicyStatesAtResourceScopeAndExpandPolicyEvaluationDetails();
|
|
294
|
+
queryAllPolicyStatesAtResourceScopeWithNextLink();
|
|
295
|
+
queryAllPolicyStatesAtSubscriptionLevelNestedResourceScope();
|
|
296
|
+
queryAllPolicyStatesAtSubscriptionLevelResourceScope();
|
|
297
|
+
queryComponentPolicyComplianceStateAtResourceScopeFilteredByGivenAssignment();
|
|
298
|
+
queryComponentPolicyComplianceStateCountGroupedByStateTypeAtResourceScopeFilteredByGivenAssignment();
|
|
299
|
+
});
|
|
300
|
+
}
|
|
301
|
+
main().catch(console.error);
|
|
287
302
|
//# sourceMappingURL=policyStatesListQueryResultsForResourceSample.js.map
|