@device-management-toolkit/wsman-messages 5.9.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +29 -0
- package/WSMan.d.ts +217 -0
- package/WSMan.js +395 -0
- package/WSMan.js.map +1 -0
- package/amt/actions.d.ts +112 -0
- package/amt/actions.js +118 -0
- package/amt/actions.js.map +1 -0
- package/amt/classes.d.ts +33 -0
- package/amt/classes.js +38 -0
- package/amt/classes.js.map +1 -0
- package/amt/index.d.ts +12 -0
- package/amt/index.js +17 -0
- package/amt/index.js.map +1 -0
- package/amt/messages.d.ts +466 -0
- package/amt/messages.js +819 -0
- package/amt/messages.js.map +1 -0
- package/amt/messages.test.d.ts +5 -0
- package/amt/messages.test.js +1091 -0
- package/amt/messages.test.js.map +1 -0
- package/amt/methods.d.ts +42 -0
- package/amt/methods.js +47 -0
- package/amt/methods.js.map +1 -0
- package/amt/models.d.ts +329 -0
- package/amt/models.js +7 -0
- package/amt/models.js.map +1 -0
- package/amt/types.d.ts +206 -0
- package/amt/types.js +7 -0
- package/amt/types.js.map +1 -0
- package/cim/actions.d.ts +9 -0
- package/cim/actions.js +14 -0
- package/cim/actions.js.map +1 -0
- package/cim/classes.d.ts +27 -0
- package/cim/classes.js +32 -0
- package/cim/classes.js.map +1 -0
- package/cim/index.d.ts +12 -0
- package/cim/index.js +16 -0
- package/cim/index.js.map +1 -0
- package/cim/messages.d.ts +136 -0
- package/cim/messages.js +215 -0
- package/cim/messages.js.map +1 -0
- package/cim/messages.test.d.ts +5 -0
- package/cim/messages.test.js +408 -0
- package/cim/messages.test.js.map +1 -0
- package/cim/methods.d.ts +15 -0
- package/cim/methods.js +20 -0
- package/cim/methods.js.map +1 -0
- package/cim/models.d.ts +376 -0
- package/cim/models.js +7 -0
- package/cim/models.js.map +1 -0
- package/cim/types.d.ts +296 -0
- package/cim/types.js +7 -0
- package/cim/types.js.map +1 -0
- package/dist +42 -0
- package/index.d.ts +9 -0
- package/index.js +49 -0
- package/index.js.map +1 -0
- package/ips/actions.d.ts +15 -0
- package/ips/actions.js +20 -0
- package/ips/actions.js.map +1 -0
- package/ips/classes.d.ts +12 -0
- package/ips/classes.js +17 -0
- package/ips/classes.js.map +1 -0
- package/ips/index.d.ts +12 -0
- package/ips/index.js +16 -0
- package/ips/index.js.map +1 -0
- package/ips/messages.d.ts +117 -0
- package/ips/messages.js +210 -0
- package/ips/messages.js.map +1 -0
- package/ips/messages.test.d.ts +5 -0
- package/ips/messages.test.js +206 -0
- package/ips/messages.test.js.map +1 -0
- package/ips/methods.d.ts +21 -0
- package/ips/methods.js +26 -0
- package/ips/methods.js.map +1 -0
- package/ips/models.d.ts +59 -0
- package/ips/models.js +7 -0
- package/ips/models.js.map +1 -0
- package/ips/types.d.ts +58 -0
- package/ips/types.js +7 -0
- package/ips/types.js.map +1 -0
- package/models/common.d.ts +104 -0
- package/models/common.js +7 -0
- package/models/common.js.map +1 -0
- package/models/index.d.ts +6 -0
- package/models/index.js +43 -0
- package/models/index.js.map +1 -0
- package/package.json +41 -0
- package/wsman.test.d.ts +5 -0
- package/wsman.test.js +479 -0
- package/wsman.test.js.map +1 -0
package/amt/actions.d.ts
ADDED
|
@@ -0,0 +1,112 @@
|
|
|
1
|
+
/*********************************************************************
|
|
2
|
+
* Copyright (c) Intel Corporation 2021
|
|
3
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
**********************************************************************/
|
|
5
|
+
export declare enum Actions {
|
|
6
|
+
READ_RECORDS = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog/ReadRecords",
|
|
7
|
+
ADD_TRUSTED_ROOT_CERTIFICATE = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/AddTrustedRootCertificate",
|
|
8
|
+
ADD_KEY = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/AddKey",
|
|
9
|
+
ADD_CERTIFICATE = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/AddCertificate",
|
|
10
|
+
GENERATE_KEY_PAIR = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/GenerateKeyPair",
|
|
11
|
+
ADD_MPS = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_RemoteAccessService/AddMpServer",
|
|
12
|
+
ADD_REMOTE_ACCESS_POLICY_RULE = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_RemoteAccessService/AddRemoteAccessPolicyRule",
|
|
13
|
+
SET_BOOT_CONFIG_ROLE = "http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_BootService/SetBootConfigRole",
|
|
14
|
+
GET_RECORDS = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_MessageLog/GetRecords",
|
|
15
|
+
POSITION_TO_FIRST_RECORD = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_MessageLog/PositionToFirstRecord",
|
|
16
|
+
COMMIT_CHANGES = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/CommitChanges",
|
|
17
|
+
UNPROVISION = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/Unprovision",
|
|
18
|
+
SET_MEBX_PASSWORD = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/SetMEBxPassword",
|
|
19
|
+
GET_UUID = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/GetUuid",
|
|
20
|
+
SET_ADMIN_ACL_ENTRY_EX = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/SetAdminAclEntryEx",
|
|
21
|
+
ADD_USER_ACL_ENTRY_EX = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/AddUserAclEntryEx",
|
|
22
|
+
GET_LOW_ACCURACY_TIME_SYNCH = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_TimeSynchronizationService/GetLowAccuracyTimeSynch",
|
|
23
|
+
SET_HIGH_ACCURACY_TIME_SYNCH = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_TimeSynchronizationService/SetHighAccuracyTimeSynch",
|
|
24
|
+
ADD_WIFI_SETTINGS = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_WiFiPortConfigurationService/AddWiFiSettings",
|
|
25
|
+
ADD_ALARM = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AlarmClockService/AddAlarm",
|
|
26
|
+
GENERATE_PKCS10_REQUEST_EX = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/GeneratePKCS10RequestEx",
|
|
27
|
+
GET_CREDENTIAL_CACHE_STATE = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_KerberosSettingData/GetCredentialCacheState",
|
|
28
|
+
SET_CREDENTIAL_CACHE_STATE = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_KerberosSettingData/SetCredentialCacheState",
|
|
29
|
+
ENUMERATE_USER_ACL_ENTRIES = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/EnumerateUserAclEntries",
|
|
30
|
+
GET_USER_ACL_ENTRY_EX = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetUserAclEntryEx",
|
|
31
|
+
UPDATE_USER_ACL_ENTRY_EX = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/UpdateUserAclEntryEx",
|
|
32
|
+
REMOVE_USER_ACL_ENTRY = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/RemoveUserAclEntry",
|
|
33
|
+
GET_ADMIN_ACL_ENTRY = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAdminAclEntry",
|
|
34
|
+
GET_ADMIN_ACL_ENTRY_STATUS = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAdminAclEntryStatus",
|
|
35
|
+
GET_ADMIN_NET_ACL_ENTRY_STATUS = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAdminNetAclEntryStatus",
|
|
36
|
+
SET_ACL_ENABLED_STATE = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/SetAclEnabledState",
|
|
37
|
+
GET_ACL_ENABLED_STATE = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAclEnabledState"
|
|
38
|
+
}
|
|
39
|
+
export declare enum Realms {
|
|
40
|
+
/**
|
|
41
|
+
* Manages security control data, such as Access Control Lists, Kerberos parameters, and Transport Layer Security. This permission is required for both user creation and management mechanism. Manages power saving options and power packages. Performs the functions required for Intel AMT setup and configuration. Configures local network options. These are usually configured with a DHCP server, but can be configured directly using this interface.
|
|
42
|
+
*/
|
|
43
|
+
ADMINISTRATION = 3,
|
|
44
|
+
/**
|
|
45
|
+
* Used by an application designed to run on the local platform to report that it is running and to send heartbeats periodically.
|
|
46
|
+
*/
|
|
47
|
+
AGENT_PRESENCE_LOCAL = 9,
|
|
48
|
+
/**
|
|
49
|
+
* Used to register Local Agent applications and to specify the behavior of Intel AMT when an application is running or stops running unexpectedly.
|
|
50
|
+
*/
|
|
51
|
+
AGENT_PRESENCE_REMOTE = 10,
|
|
52
|
+
/**
|
|
53
|
+
* Configures the Audit Log.
|
|
54
|
+
*/
|
|
55
|
+
AUDIT_LOG = 20,
|
|
56
|
+
/**
|
|
57
|
+
* Used to define filters, counters, and policies to monitor incoming and outgoing network traffic and to block traffic when a suspicious condition is detected.
|
|
58
|
+
*/
|
|
59
|
+
CIRCUIT_BREAKER = 11,
|
|
60
|
+
/**
|
|
61
|
+
* DEPRECATED. Not supported starting CSME release 18.0. Returns settings associated with NAC/NAP posture.
|
|
62
|
+
*/
|
|
63
|
+
ENDPOINT_ACCESS_CONTROL = 17,
|
|
64
|
+
/**
|
|
65
|
+
* DEPRECATED. Not supported starting CSME release 18.0. Configures and enables the NAC/NAP posture. Note: Beginning in Intel AMT Release 9.0 NAC is no longer supported.
|
|
66
|
+
*/
|
|
67
|
+
ENDPOINT_ACCESS_CONTROL_ADMIN = 18,
|
|
68
|
+
/**
|
|
69
|
+
* Controls access for reading the Intel AMT event log.
|
|
70
|
+
*/
|
|
71
|
+
EVENT_LOG_READER = 19,
|
|
72
|
+
/**
|
|
73
|
+
* Allows configuring hardware and software events to generate alerts and to send them to a remote console and/or log them locally.
|
|
74
|
+
*/
|
|
75
|
+
EVENT_MANAGER = 7,
|
|
76
|
+
/**
|
|
77
|
+
* Returns general setting and status information. With this interface, it is possible to give a user permission to read parameters related to other interfaces without giving permission to change the parameters.
|
|
78
|
+
*/
|
|
79
|
+
GENERAL_INFO = 13,
|
|
80
|
+
/**
|
|
81
|
+
* Used to retrieve information about the hardware inventory of the platform.
|
|
82
|
+
*/
|
|
83
|
+
HARDWARE_ASSET = 4,
|
|
84
|
+
/**
|
|
85
|
+
* Provides alerts to a user on the local interface. Used by User Notification Service to communicate with Intel AMT.
|
|
86
|
+
*/
|
|
87
|
+
LOCAL_APPS = 24,
|
|
88
|
+
/**
|
|
89
|
+
* Used to set the clock in the Intel AMT device and synchronize it to network time. Can be assigned to a separate user who has limited administrative privileges.
|
|
90
|
+
*/
|
|
91
|
+
NETWORK_TIME = 12,
|
|
92
|
+
/**
|
|
93
|
+
* Enables and disables the redirection capability and retrieves the redirection log. The redirection interface itself is a separate proprietary interface.
|
|
94
|
+
*/
|
|
95
|
+
REDIRECTION = 2,
|
|
96
|
+
/**
|
|
97
|
+
* Enables powering a platform up or down remotely. Used in conjunction with the Redirection capability to boot remotely.
|
|
98
|
+
*/
|
|
99
|
+
REMOTE_CONTROL = 5,
|
|
100
|
+
/**
|
|
101
|
+
* Used to access, configure, manage, write to and read from non-volatile user storage.
|
|
102
|
+
*/
|
|
103
|
+
STORAGE = 6,
|
|
104
|
+
/**
|
|
105
|
+
* Used to configure the global parameters that govern the allocation and use of non-volatile storage.
|
|
106
|
+
*/
|
|
107
|
+
STORAGE_ADMIN = 8,
|
|
108
|
+
/**
|
|
109
|
+
* Users can control the properties of their own ACL entries.
|
|
110
|
+
*/
|
|
111
|
+
USER_ACCESS_CONTROL = 21
|
|
112
|
+
}
|
package/amt/actions.js
ADDED
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/*********************************************************************
|
|
3
|
+
* Copyright (c) Intel Corporation 2021
|
|
4
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
5
|
+
**********************************************************************/
|
|
6
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
7
|
+
exports.Realms = exports.Actions = void 0;
|
|
8
|
+
var Actions;
|
|
9
|
+
(function (Actions) {
|
|
10
|
+
Actions["READ_RECORDS"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuditLog/ReadRecords";
|
|
11
|
+
Actions["ADD_TRUSTED_ROOT_CERTIFICATE"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/AddTrustedRootCertificate";
|
|
12
|
+
Actions["ADD_KEY"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/AddKey";
|
|
13
|
+
Actions["ADD_CERTIFICATE"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/AddCertificate";
|
|
14
|
+
Actions["GENERATE_KEY_PAIR"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/GenerateKeyPair";
|
|
15
|
+
Actions["ADD_MPS"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_RemoteAccessService/AddMpServer";
|
|
16
|
+
Actions["ADD_REMOTE_ACCESS_POLICY_RULE"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_RemoteAccessService/AddRemoteAccessPolicyRule";
|
|
17
|
+
Actions["SET_BOOT_CONFIG_ROLE"] = "http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_BootService/SetBootConfigRole";
|
|
18
|
+
Actions["GET_RECORDS"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_MessageLog/GetRecords";
|
|
19
|
+
Actions["POSITION_TO_FIRST_RECORD"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_MessageLog/PositionToFirstRecord";
|
|
20
|
+
Actions["COMMIT_CHANGES"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/CommitChanges";
|
|
21
|
+
Actions["UNPROVISION"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/Unprovision";
|
|
22
|
+
Actions["SET_MEBX_PASSWORD"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/SetMEBxPassword";
|
|
23
|
+
Actions["GET_UUID"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SetupAndConfigurationService/GetUuid";
|
|
24
|
+
Actions["SET_ADMIN_ACL_ENTRY_EX"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/SetAdminAclEntryEx";
|
|
25
|
+
Actions["ADD_USER_ACL_ENTRY_EX"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/AddUserAclEntryEx";
|
|
26
|
+
Actions["GET_LOW_ACCURACY_TIME_SYNCH"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_TimeSynchronizationService/GetLowAccuracyTimeSynch";
|
|
27
|
+
Actions["SET_HIGH_ACCURACY_TIME_SYNCH"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_TimeSynchronizationService/SetHighAccuracyTimeSynch";
|
|
28
|
+
Actions["ADD_WIFI_SETTINGS"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_WiFiPortConfigurationService/AddWiFiSettings";
|
|
29
|
+
Actions["ADD_ALARM"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AlarmClockService/AddAlarm";
|
|
30
|
+
Actions["GENERATE_PKCS10_REQUEST_EX"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_PublicKeyManagementService/GeneratePKCS10RequestEx";
|
|
31
|
+
Actions["GET_CREDENTIAL_CACHE_STATE"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_KerberosSettingData/GetCredentialCacheState";
|
|
32
|
+
Actions["SET_CREDENTIAL_CACHE_STATE"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_KerberosSettingData/SetCredentialCacheState";
|
|
33
|
+
Actions["ENUMERATE_USER_ACL_ENTRIES"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/EnumerateUserAclEntries";
|
|
34
|
+
Actions["GET_USER_ACL_ENTRY_EX"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetUserAclEntryEx";
|
|
35
|
+
Actions["UPDATE_USER_ACL_ENTRY_EX"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/UpdateUserAclEntryEx";
|
|
36
|
+
Actions["REMOVE_USER_ACL_ENTRY"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/RemoveUserAclEntry";
|
|
37
|
+
Actions["GET_ADMIN_ACL_ENTRY"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAdminAclEntry";
|
|
38
|
+
Actions["GET_ADMIN_ACL_ENTRY_STATUS"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAdminAclEntryStatus";
|
|
39
|
+
Actions["GET_ADMIN_NET_ACL_ENTRY_STATUS"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAdminNetAclEntryStatus";
|
|
40
|
+
Actions["SET_ACL_ENABLED_STATE"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/SetAclEnabledState";
|
|
41
|
+
Actions["GET_ACL_ENABLED_STATE"] = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AuthorizationService/GetAclEnabledState";
|
|
42
|
+
})(Actions || (exports.Actions = Actions = {}));
|
|
43
|
+
var Realms;
|
|
44
|
+
(function (Realms) {
|
|
45
|
+
/**
|
|
46
|
+
* Manages security control data, such as Access Control Lists, Kerberos parameters, and Transport Layer Security. This permission is required for both user creation and management mechanism. Manages power saving options and power packages. Performs the functions required for Intel AMT setup and configuration. Configures local network options. These are usually configured with a DHCP server, but can be configured directly using this interface.
|
|
47
|
+
*/
|
|
48
|
+
Realms[Realms["ADMINISTRATION"] = 3] = "ADMINISTRATION";
|
|
49
|
+
/**
|
|
50
|
+
* Used by an application designed to run on the local platform to report that it is running and to send heartbeats periodically.
|
|
51
|
+
*/
|
|
52
|
+
Realms[Realms["AGENT_PRESENCE_LOCAL"] = 9] = "AGENT_PRESENCE_LOCAL";
|
|
53
|
+
/**
|
|
54
|
+
* Used to register Local Agent applications and to specify the behavior of Intel AMT when an application is running or stops running unexpectedly.
|
|
55
|
+
*/
|
|
56
|
+
Realms[Realms["AGENT_PRESENCE_REMOTE"] = 10] = "AGENT_PRESENCE_REMOTE";
|
|
57
|
+
/**
|
|
58
|
+
* Configures the Audit Log.
|
|
59
|
+
*/
|
|
60
|
+
Realms[Realms["AUDIT_LOG"] = 20] = "AUDIT_LOG";
|
|
61
|
+
/**
|
|
62
|
+
* Used to define filters, counters, and policies to monitor incoming and outgoing network traffic and to block traffic when a suspicious condition is detected.
|
|
63
|
+
*/
|
|
64
|
+
Realms[Realms["CIRCUIT_BREAKER"] = 11] = "CIRCUIT_BREAKER";
|
|
65
|
+
/**
|
|
66
|
+
* DEPRECATED. Not supported starting CSME release 18.0. Returns settings associated with NAC/NAP posture.
|
|
67
|
+
*/
|
|
68
|
+
Realms[Realms["ENDPOINT_ACCESS_CONTROL"] = 17] = "ENDPOINT_ACCESS_CONTROL";
|
|
69
|
+
/**
|
|
70
|
+
* DEPRECATED. Not supported starting CSME release 18.0. Configures and enables the NAC/NAP posture. Note: Beginning in Intel AMT Release 9.0 NAC is no longer supported.
|
|
71
|
+
*/
|
|
72
|
+
Realms[Realms["ENDPOINT_ACCESS_CONTROL_ADMIN"] = 18] = "ENDPOINT_ACCESS_CONTROL_ADMIN";
|
|
73
|
+
/**
|
|
74
|
+
* Controls access for reading the Intel AMT event log.
|
|
75
|
+
*/
|
|
76
|
+
Realms[Realms["EVENT_LOG_READER"] = 19] = "EVENT_LOG_READER";
|
|
77
|
+
/**
|
|
78
|
+
* Allows configuring hardware and software events to generate alerts and to send them to a remote console and/or log them locally.
|
|
79
|
+
*/
|
|
80
|
+
Realms[Realms["EVENT_MANAGER"] = 7] = "EVENT_MANAGER";
|
|
81
|
+
/**
|
|
82
|
+
* Returns general setting and status information. With this interface, it is possible to give a user permission to read parameters related to other interfaces without giving permission to change the parameters.
|
|
83
|
+
*/
|
|
84
|
+
Realms[Realms["GENERAL_INFO"] = 13] = "GENERAL_INFO";
|
|
85
|
+
/**
|
|
86
|
+
* Used to retrieve information about the hardware inventory of the platform.
|
|
87
|
+
*/
|
|
88
|
+
Realms[Realms["HARDWARE_ASSET"] = 4] = "HARDWARE_ASSET";
|
|
89
|
+
/**
|
|
90
|
+
* Provides alerts to a user on the local interface. Used by User Notification Service to communicate with Intel AMT.
|
|
91
|
+
*/
|
|
92
|
+
Realms[Realms["LOCAL_APPS"] = 24] = "LOCAL_APPS";
|
|
93
|
+
/**
|
|
94
|
+
* Used to set the clock in the Intel AMT device and synchronize it to network time. Can be assigned to a separate user who has limited administrative privileges.
|
|
95
|
+
*/
|
|
96
|
+
Realms[Realms["NETWORK_TIME"] = 12] = "NETWORK_TIME";
|
|
97
|
+
/**
|
|
98
|
+
* Enables and disables the redirection capability and retrieves the redirection log. The redirection interface itself is a separate proprietary interface.
|
|
99
|
+
*/
|
|
100
|
+
Realms[Realms["REDIRECTION"] = 2] = "REDIRECTION";
|
|
101
|
+
/**
|
|
102
|
+
* Enables powering a platform up or down remotely. Used in conjunction with the Redirection capability to boot remotely.
|
|
103
|
+
*/
|
|
104
|
+
Realms[Realms["REMOTE_CONTROL"] = 5] = "REMOTE_CONTROL";
|
|
105
|
+
/**
|
|
106
|
+
* Used to access, configure, manage, write to and read from non-volatile user storage.
|
|
107
|
+
*/
|
|
108
|
+
Realms[Realms["STORAGE"] = 6] = "STORAGE";
|
|
109
|
+
/**
|
|
110
|
+
* Used to configure the global parameters that govern the allocation and use of non-volatile storage.
|
|
111
|
+
*/
|
|
112
|
+
Realms[Realms["STORAGE_ADMIN"] = 8] = "STORAGE_ADMIN";
|
|
113
|
+
/**
|
|
114
|
+
* Users can control the properties of their own ACL entries.
|
|
115
|
+
*/
|
|
116
|
+
Realms[Realms["USER_ACCESS_CONTROL"] = 21] = "USER_ACCESS_CONTROL";
|
|
117
|
+
})(Realms || (exports.Realms = Realms = {}));
|
|
118
|
+
//# sourceMappingURL=actions.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"actions.js","sourceRoot":"","sources":["../../src/amt/actions.ts"],"names":[],"mappings":";AAAA;;;wEAGwE;;;AAExE,IAAY,OAiCX;AAjCD,WAAY,OAAO;IACjB,+FAAoF,CAAA;IACpF,+IAAoI,CAAA;IACpI,uGAA4F,CAAA;IAC5F,uHAA4G,CAAA;IAC5G,0HAA+G,CAAA;IAC/G,qGAA0F,CAAA;IAC1F,yIAA8H,CAAA;IAC9H,uHAA4G,CAAA;IAC5G,+FAAoF,CAAA;IACpF,uHAA4G,CAAA;IAC5G,uHAA4G,CAAA;IAC5G,kHAAuG,CAAA;IACvG,4HAAiH,CAAA;IACjH,2GAAgG,CAAA;IAChG,4HAAiH,CAAA;IACjH,0HAA+G,CAAA;IAC/G,4IAAiI,CAAA;IACjI,8IAAmI,CAAA;IACnI,4HAAiH,CAAA;IACjH,kGAAuF,CAAA;IACvF,2IAAgI,CAAA;IAChI,oIAAyH,CAAA;IACzH,oIAAyH,CAAA;IACzH,qIAA0H,CAAA;IAC1H,0HAA+G,CAAA;IAC/G,gIAAqH,CAAA;IACrH,2HAAgH,CAAA;IAChH,uHAA4G,CAAA;IAC5G,oIAAyH,CAAA;IACzH,2IAAgI,CAAA;IAChI,2HAAgH,CAAA;IAChH,2HAAgH,CAAA;AAClH,CAAC,EAjCW,OAAO,uBAAP,OAAO,QAiClB;AAED,IAAY,MAyEX;AAzED,WAAY,MAAM;IAChB;;OAEG;IACH,uDAAkB,CAAA;IAClB;;OAEG;IACH,mEAAwB,CAAA;IACxB;;OAEG;IACH,sEAA0B,CAAA;IAC1B;;OAEG;IACH,8CAAc,CAAA;IACd;;OAEG;IACH,0DAAoB,CAAA;IACpB;;OAEG;IACH,0EAA4B,CAAA;IAC5B;;OAEG;IACH,sFAAkC,CAAA;IAClC;;OAEG;IACH,4DAAqB,CAAA;IACrB;;OAEG;IACH,qDAAiB,CAAA;IACjB;;OAEG;IACH,oDAAiB,CAAA;IACjB;;OAEG;IACH,uDAAkB,CAAA;IAClB;;OAEG;IACH,gDAAe,CAAA;IACf;;OAEG;IACH,oDAAiB,CAAA;IACjB;;OAEG;IACH,iDAAe,CAAA;IACf;;OAEG;IACH,uDAAkB,CAAA;IAClB;;OAEG;IACH,yCAAW,CAAA;IACX;;OAEG;IACH,qDAAiB,CAAA;IACjB;;OAEG;IACH,kEAAwB,CAAA;AAC1B,CAAC,EAzEW,MAAM,sBAAN,MAAM,QAyEjB"}
|
package/amt/classes.d.ts
ADDED
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
/*********************************************************************
|
|
2
|
+
* Copyright (c) Intel Corporation 2021
|
|
3
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
**********************************************************************/
|
|
5
|
+
export declare enum Classes {
|
|
6
|
+
AUDIT_LOG = "AMT_AuditLog",
|
|
7
|
+
REDIRECTION_SERVICE = "AMT_RedirectionService",
|
|
8
|
+
SETUP_AND_CONFIGURATION_SERVICE = "AMT_SetupAndConfigurationService",
|
|
9
|
+
GENERAL_SETTINGS = "AMT_GeneralSettings",
|
|
10
|
+
ETHERNET_PORT_SETTINGS = "AMT_EthernetPortSettings",
|
|
11
|
+
REMOTE_ACCESS_POLICY_RULE = "AMT_RemoteAccessPolicyRule",
|
|
12
|
+
MANAGEMENT_PRESENCE_REMOTE_SAP = "AMT_ManagementPresenceRemoteSAP",
|
|
13
|
+
PUBLIC_KEY_CERTIFICATE = "AMT_PublicKeyCertificate",
|
|
14
|
+
ENVIRONMENT_DETECTION_SETTING_DATA = "AMT_EnvironmentDetectionSettingData",
|
|
15
|
+
PUBLIC_KEY_MANAGEMENT_SERVICE = "AMT_PublicKeyManagementService",
|
|
16
|
+
REMOTE_ACCESS_SERVICE = "AMT_RemoteAccessService",
|
|
17
|
+
USER_INITIATED_CONNECTION_SERVICE = "AMT_UserInitiatedConnectionService",
|
|
18
|
+
BOOT_SETTING_DATA = "AMT_BootSettingData",
|
|
19
|
+
BOOT_CAPABILITIES = "AMT_BootCapabilities",
|
|
20
|
+
MESSAGE_LOG = "AMT_MessageLog",
|
|
21
|
+
AUTHORIZATION_SERVICE = "AMT_AuthorizationService",
|
|
22
|
+
TIME_SYNCHRONIZATION_SERVICE = "AMT_TimeSynchronizationService",
|
|
23
|
+
WIFI_PORT_CONFIGURATION_SERVICE = "AMT_WiFiPortConfigurationService",
|
|
24
|
+
TLS_CREDENTIAL_CONTEXT = "AMT_TLSCredentialContext",
|
|
25
|
+
PUBLIC_PRIVATE_KEY_PAIR = "AMT_PublicPrivateKeyPair",
|
|
26
|
+
TLS_SETTING_DATA = "AMT_TLSSettingData",
|
|
27
|
+
REMOTE_ACCESS_POLICY_APPLIES_TO_MPS = "AMT_RemoteAccessPolicyAppliesToMPS",
|
|
28
|
+
ALARM_CLOCK_SERVICE = "AMT_AlarmClockService",
|
|
29
|
+
IEEE8021X_CREDENTIAL_CONTEXT = "AMT_8021xCredentialContext",
|
|
30
|
+
IEEE8021X_PROFILE = "AMT_8021XProfile",
|
|
31
|
+
KERBEROS_SETTING_DATA = "AMT_KerberosSettingData",
|
|
32
|
+
MPS_USERNAME_PASSWORD = "AMT_MPSUsernamePassword"
|
|
33
|
+
}
|
package/amt/classes.js
ADDED
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/*********************************************************************
|
|
3
|
+
* Copyright (c) Intel Corporation 2021
|
|
4
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
5
|
+
**********************************************************************/
|
|
6
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
7
|
+
exports.Classes = void 0;
|
|
8
|
+
var Classes;
|
|
9
|
+
(function (Classes) {
|
|
10
|
+
Classes["AUDIT_LOG"] = "AMT_AuditLog";
|
|
11
|
+
Classes["REDIRECTION_SERVICE"] = "AMT_RedirectionService";
|
|
12
|
+
Classes["SETUP_AND_CONFIGURATION_SERVICE"] = "AMT_SetupAndConfigurationService";
|
|
13
|
+
Classes["GENERAL_SETTINGS"] = "AMT_GeneralSettings";
|
|
14
|
+
Classes["ETHERNET_PORT_SETTINGS"] = "AMT_EthernetPortSettings";
|
|
15
|
+
Classes["REMOTE_ACCESS_POLICY_RULE"] = "AMT_RemoteAccessPolicyRule";
|
|
16
|
+
Classes["MANAGEMENT_PRESENCE_REMOTE_SAP"] = "AMT_ManagementPresenceRemoteSAP";
|
|
17
|
+
Classes["PUBLIC_KEY_CERTIFICATE"] = "AMT_PublicKeyCertificate";
|
|
18
|
+
Classes["ENVIRONMENT_DETECTION_SETTING_DATA"] = "AMT_EnvironmentDetectionSettingData";
|
|
19
|
+
Classes["PUBLIC_KEY_MANAGEMENT_SERVICE"] = "AMT_PublicKeyManagementService";
|
|
20
|
+
Classes["REMOTE_ACCESS_SERVICE"] = "AMT_RemoteAccessService";
|
|
21
|
+
Classes["USER_INITIATED_CONNECTION_SERVICE"] = "AMT_UserInitiatedConnectionService";
|
|
22
|
+
Classes["BOOT_SETTING_DATA"] = "AMT_BootSettingData";
|
|
23
|
+
Classes["BOOT_CAPABILITIES"] = "AMT_BootCapabilities";
|
|
24
|
+
Classes["MESSAGE_LOG"] = "AMT_MessageLog";
|
|
25
|
+
Classes["AUTHORIZATION_SERVICE"] = "AMT_AuthorizationService";
|
|
26
|
+
Classes["TIME_SYNCHRONIZATION_SERVICE"] = "AMT_TimeSynchronizationService";
|
|
27
|
+
Classes["WIFI_PORT_CONFIGURATION_SERVICE"] = "AMT_WiFiPortConfigurationService";
|
|
28
|
+
Classes["TLS_CREDENTIAL_CONTEXT"] = "AMT_TLSCredentialContext";
|
|
29
|
+
Classes["PUBLIC_PRIVATE_KEY_PAIR"] = "AMT_PublicPrivateKeyPair";
|
|
30
|
+
Classes["TLS_SETTING_DATA"] = "AMT_TLSSettingData";
|
|
31
|
+
Classes["REMOTE_ACCESS_POLICY_APPLIES_TO_MPS"] = "AMT_RemoteAccessPolicyAppliesToMPS";
|
|
32
|
+
Classes["ALARM_CLOCK_SERVICE"] = "AMT_AlarmClockService";
|
|
33
|
+
Classes["IEEE8021X_CREDENTIAL_CONTEXT"] = "AMT_8021xCredentialContext";
|
|
34
|
+
Classes["IEEE8021X_PROFILE"] = "AMT_8021XProfile";
|
|
35
|
+
Classes["KERBEROS_SETTING_DATA"] = "AMT_KerberosSettingData";
|
|
36
|
+
Classes["MPS_USERNAME_PASSWORD"] = "AMT_MPSUsernamePassword";
|
|
37
|
+
})(Classes || (exports.Classes = Classes = {}));
|
|
38
|
+
//# sourceMappingURL=classes.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"classes.js","sourceRoot":"","sources":["../../src/amt/classes.ts"],"names":[],"mappings":";AAAA;;;wEAGwE;;;AAExE,IAAY,OA4BX;AA5BD,WAAY,OAAO;IACjB,qCAA0B,CAAA;IAC1B,yDAA8C,CAAA;IAC9C,+EAAoE,CAAA;IACpE,mDAAwC,CAAA;IACxC,8DAAmD,CAAA;IACnD,mEAAwD,CAAA;IACxD,6EAAkE,CAAA;IAClE,8DAAmD,CAAA;IACnD,qFAA0E,CAAA;IAC1E,2EAAgE,CAAA;IAChE,4DAAiD,CAAA;IACjD,mFAAwE,CAAA;IACxE,oDAAyC,CAAA;IACzC,qDAA0C,CAAA;IAC1C,yCAA8B,CAAA;IAC9B,6DAAkD,CAAA;IAClD,0EAA+D,CAAA;IAC/D,+EAAoE,CAAA;IACpE,8DAAmD,CAAA;IACnD,+DAAoD,CAAA;IACpD,kDAAuC,CAAA;IACvC,qFAA0E,CAAA;IAC1E,wDAA6C,CAAA;IAC7C,sEAA2D,CAAA;IAC3D,iDAAsC,CAAA;IACtC,4DAAiD,CAAA;IACjD,4DAAiD,CAAA;AACnD,CAAC,EA5BW,OAAO,uBAAP,OAAO,QA4BlB"}
|
package/amt/index.d.ts
ADDED
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
/*********************************************************************
|
|
2
|
+
* Copyright (c) Intel Corporation 2021
|
|
3
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
**********************************************************************/
|
|
5
|
+
import { Actions, Realms } from './actions';
|
|
6
|
+
import { Classes } from './classes';
|
|
7
|
+
import { Messages } from './messages';
|
|
8
|
+
import { Methods } from './methods';
|
|
9
|
+
import type { Models } from './models';
|
|
10
|
+
import type { Types } from './types';
|
|
11
|
+
export { Methods, Actions, Classes, Messages, Realms };
|
|
12
|
+
export type { Types, Models };
|
package/amt/index.js
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/*********************************************************************
|
|
3
|
+
* Copyright (c) Intel Corporation 2021
|
|
4
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
5
|
+
**********************************************************************/
|
|
6
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
7
|
+
exports.Realms = exports.Messages = exports.Classes = exports.Actions = exports.Methods = void 0;
|
|
8
|
+
const actions_1 = require("./actions");
|
|
9
|
+
Object.defineProperty(exports, "Actions", { enumerable: true, get: function () { return actions_1.Actions; } });
|
|
10
|
+
Object.defineProperty(exports, "Realms", { enumerable: true, get: function () { return actions_1.Realms; } });
|
|
11
|
+
const classes_1 = require("./classes");
|
|
12
|
+
Object.defineProperty(exports, "Classes", { enumerable: true, get: function () { return classes_1.Classes; } });
|
|
13
|
+
const messages_1 = require("./messages");
|
|
14
|
+
Object.defineProperty(exports, "Messages", { enumerable: true, get: function () { return messages_1.Messages; } });
|
|
15
|
+
const methods_1 = require("./methods");
|
|
16
|
+
Object.defineProperty(exports, "Methods", { enumerable: true, get: function () { return methods_1.Methods; } });
|
|
17
|
+
//# sourceMappingURL=index.js.map
|
package/amt/index.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/amt/index.ts"],"names":[],"mappings":";AAAA;;;wEAGwE;;;AAExE,uCAA2C;AAMzB,wFANT,iBAAO,OAMS;AAAqB,uFAN5B,gBAAM,OAM4B;AALpD,uCAAmC;AAKR,wFALlB,iBAAO,OAKkB;AAJlC,yCAAqC;AAID,yFAJ3B,mBAAQ,OAI2B;AAH5C,uCAAmC;AAG1B,wFAHA,iBAAO,OAGA"}
|