diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.format.ps1xml b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.format.ps1xml
index 1d5a76ec45c6..fcd09b05fbae 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.format.ps1xml
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.format.ps1xml
@@ -2,45 +2,45 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningFeatures
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.AzureResourceManagerCommonTypesSkuUpdate
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningFeatures#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.AzureResourceManagerCommonTypesSkuUpdate#Multiple
-
+
-
+
-
+
-
+
-
+
- Canary
+ Capacity
- Nx
+ Family
- Pie
+ Name
- Relro
+ Size
- Stripped
+ Tier
@@ -48,21 +48,45 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningListResult
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningFeatures
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningListResult#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningFeatures#Multiple
-
+
+
+
+
+
+
+
+
+
+
+
+
+
- NextLink
+ Canary
+
+
+ NoExecute
+
+
+ PositionIndependentExecutable
+
+
+ RelocationReadOnly
+
+
+ Stripped
@@ -127,6 +151,28 @@
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningResourceListResult
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningResourceListResult#Multiple
+
+
+
+
+
+
+
+
+
+
+
+ NextLink
+
+
+
+
+
+
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.BinaryHardeningResult
@@ -135,17 +181,20 @@
-
+
-
+
-
+
+
+
+
@@ -157,17 +206,20 @@
- Architecture
+ BinaryHardeningId
- BinaryHardeningId
+ ExecutableArchitecture
- Class
+ ExecutableClass
FilePath
+
+ ProvisioningState
+
Rpath
@@ -186,23 +238,26 @@
+
+
+
-
+
-
+
-
+
-
+
-
+
@@ -211,23 +266,26 @@
+
+ ProvisioningState
+
SummaryType
- Canary
+ NotExecutableStackCount
- Nx
+ PositionIndependentExecutableCount
- Pie
+ RelocationReadOnlyCount
- Relro
+ StackCanaryCount
- Stripped
+ StrippedBinaryCount
TotalFile
@@ -244,6 +302,18 @@
+
+
+
+
+
+
+
+
+
+
+
+
@@ -272,16 +342,7 @@
-
-
-
-
-
-
-
-
-
-
+
@@ -293,6 +354,18 @@
+
+ CertificateKeyAlgorithm
+
+
+ CertificateKeySize
+
+
+ CertificateName
+
+
+ CertificateRole
+
CryptoCertId
@@ -321,16 +394,7 @@
IssuedDate
- KeyAlgorithm
-
-
- KeySize
-
-
- Name
-
-
- Role
+ ProvisioningState
SerialNumber
@@ -389,28 +453,6 @@
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoCertificateListResult
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoCertificateListResult#Multiple
-
-
-
-
-
-
-
-
-
-
-
- NextLink
-
-
-
-
-
-
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoCertificateResource
@@ -469,6 +511,28 @@
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoCertificateResourceListResult
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoCertificateResourceListResult#Multiple
+
+
+
+
+
+
+
+
+
+
+
+ NextLink
+
+
+
+
+
+
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoCertificateSummaryResource
@@ -476,57 +540,63 @@
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+ ProvisioningState
+
SummaryType
- Expired
+ ExpiredCertificateCount
- ExpiringSoon
+ ExpiringSoonCertificateCount
- PairedKey
+ PairedKeyCount
- SelfSigned
+ SelfSignedCertificateCount
- ShortKeySize
+ ShortKeySizeCount
- TotalCertificate
+ TotalCertificateCount
- WeakSignature
+ WeakSignatureCount
@@ -547,10 +617,13 @@
-
+
-
+
+
+
+
@@ -563,32 +636,13 @@
KeyAlgorithm
- KeySize
+ KeyType
- KeyType
+ ProvisioningState
-
-
-
-
-
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoKeyListResult
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoKeyListResult#Multiple
-
-
-
-
-
-
-
-
-
-
- NextLink
+ Size
@@ -653,6 +707,28 @@
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoKeyResourceListResult
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoKeyResourceListResult#Multiple
+
+
+
+
+
+
+
+
+
+
+
+ NextLink
+
+
+
+
+
+
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CryptoKeySummaryResource
@@ -660,45 +736,51 @@
+
+
+
-
+
-
+
-
+
-
+
-
+
+
+ ProvisioningState
+
SummaryType
- PairedKey
+ PairedKeyCount
- PrivateKey
+ PrivateKeyCount
- PublicKey
+ PublicKeyCount
- ShortKeySize
+ ShortKeySizeCount
- TotalKey
+ TotalKeyCount
@@ -767,28 +849,6 @@
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CveListResult
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CveListResult#Multiple
-
-
-
-
-
-
-
-
-
-
-
- NextLink
-
-
-
-
-
-
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CveResource
@@ -847,6 +907,28 @@
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CveResourceListResult
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CveResourceListResult#Multiple
+
+
+
+
+
+
+
+
+
+
+
+ NextLink
+
+
+
+
+
+
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CveResult
@@ -854,9 +936,21 @@
+
+
+
+
+
+
+
+
+
+
+
+
@@ -873,18 +967,36 @@
-
+
-
+
+
+
+
+
+
+
+
+ ComponentId
+
+
+ ComponentName
+
+
+ ComponentVersion
+
CveId
+
+ CveName
+
CvssScore
@@ -901,7 +1013,13 @@
Description
- Name
+ EffectiveCvssScore
+
+
+ EffectiveCvssVersion
+
+
+ ProvisioningState
Severity
@@ -918,45 +1036,79 @@
+
+
+
-
+
-
+
-
+
-
+
-
+
+
+ ProvisioningState
+
SummaryType
- Critical
+ CriticalCveCount
- High
+ HighCveCount
- Low
+ LowCveCount
- Medium
+ MediumCveCount
- Unknown
+ UnknownCveCount
+
+
+
+
+
+
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CvssScore
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.CvssScore#Multiple
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Score
+
+
+ Version
@@ -1071,6 +1223,9 @@
+
+
+
@@ -1078,7 +1233,7 @@
-
+
@@ -1090,6 +1245,9 @@
FirmwareId
+
+ Name
+
ResourceGroupName
@@ -1097,7 +1255,7 @@
SubscriptionId
- SummaryName
+ SummaryType
WorkspaceName
@@ -1108,9 +1266,9 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.FirmwareList
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.FirmwareListResult
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.FirmwareList#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.FirmwareListResult#Multiple
@@ -1200,6 +1358,9 @@
+
+
+
@@ -1228,6 +1389,9 @@
+
+ ProvisioningState
+
SummaryType
@@ -1400,6 +1564,9 @@
+
+
+
@@ -1422,6 +1589,9 @@
Hash
+
+ ProvisioningState
+
Salt
@@ -1434,9 +1604,67 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashListResult
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashResource
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashResource#Multiple
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Name
+
+
+ SystemDataCreatedAt
+
+
+ SystemDataCreatedBy
+
+
+ SystemDataCreatedByType
+
+
+ SystemDataLastModifiedAt
+
+
+ SystemDataLastModifiedBy
+
+
+ SystemDataLastModifiedByType
+
+
+
+
+
+
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashResourceListResult
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashListResult#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashResourceListResult#Multiple
@@ -1456,9 +1684,9 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashResource
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.ProxyResource
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.PasswordHashResource#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.ProxyResource#Multiple
@@ -1551,6 +1779,9 @@
+
+
+
@@ -1568,29 +1799,10 @@
License
- Version
+ ProvisioningState
-
-
-
-
-
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SbomComponentListResult
-
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SbomComponentListResult#Multiple
-
-
-
-
-
-
-
-
-
-
- NextLink
+ Version
@@ -1656,27 +1868,67 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.StatusMessage
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SbomComponentResourceListResult
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.StatusMessage#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SbomComponentResourceListResult#Multiple
-
+
+
+
+
+
+
+ NextLink
+
+
+
+
+
+
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.Sku
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.Sku#Multiple
+
+
+
-
+
+
+
+
+
+
+
+
+
+
+
+
+
- ErrorCode
+ Capacity
- Message
+ Family
+
+
+ Name
+
+
+ Size
+
+
+ Tier
@@ -1684,21 +1936,27 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SummaryListResult
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.StatusMessage
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SummaryListResult#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.StatusMessage#Multiple
-
+
+
+
+
- NextLink
+ ErrorCode
+
+
+ Message
@@ -1769,6 +2027,28 @@
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SummaryResourceListResult
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SummaryResourceListResult#Multiple
+
+
+
+
+
+
+
+
+
+
+
+ NextLink
+
+
+
+
+
+
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.SummaryResourceProperties
@@ -1776,6 +2056,9 @@
+
+
+
@@ -1783,6 +2066,9 @@
+
+ ProvisioningState
+
SummaryType
@@ -1951,6 +2237,126 @@
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.UsageMetric
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.UsageMetric#Multiple
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Name
+
+
+ SystemDataCreatedAt
+
+
+ SystemDataCreatedBy
+
+
+ SystemDataCreatedByType
+
+
+ SystemDataLastModifiedAt
+
+
+ SystemDataLastModifiedBy
+
+
+ SystemDataLastModifiedByType
+
+
+ ResourceGroupName
+
+
+
+
+
+
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.UsageMetricListResult
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.UsageMetricListResult#Multiple
+
+
+
+
+
+
+
+
+
+
+
+ NextLink
+
+
+
+
+
+
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.UsageMetricProperties
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.UsageMetricProperties#Multiple
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ MonthlyFirmwareUploadCount
+
+
+ ProvisioningState
+
+
+ TotalFirmwareCount
+
+
+
+
+
+
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.Workspace
@@ -2022,9 +2428,9 @@
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.WorkspaceList
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.WorkspaceListResult
- Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.WorkspaceList#Multiple
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.WorkspaceListResult#Multiple
@@ -2065,5 +2471,27 @@
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.WorkspaceUpdateTags
+
+ Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.WorkspaceUpdateTags#Multiple
+
+
+
+
+
+
+
+
+
+
+
+ Item
+
+
+
+
+
+
\ No newline at end of file
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.psd1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.psd1
index 7cfc7e3ff254..ec83eb55f5a9 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.psd1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Az.FirmwareAnalysis.psd1
@@ -1,7 +1,7 @@
@{
GUID = 'e097ff3f-acb2-48da-86fe-937d86006ea5'
RootModule = './Az.FirmwareAnalysis.psm1'
- ModuleVersion = '0.1.0'
+ ModuleVersion = '0.2.0'
CompatiblePSEditions = 'Core', 'Desktop'
Author = 'Microsoft Corporation'
CompanyName = 'Microsoft Corporation'
@@ -11,7 +11,7 @@
DotNetFrameworkVersion = '4.7.2'
RequiredAssemblies = './bin/Az.FirmwareAnalysis.private.dll'
FormatsToProcess = './Az.FirmwareAnalysis.format.ps1xml'
- FunctionsToExport = 'Get-AzFirmwareAnalysisBinaryHardening', 'Get-AzFirmwareAnalysisCryptoCertificate', 'Get-AzFirmwareAnalysisCryptoKey', 'Get-AzFirmwareAnalysisCve', 'Get-AzFirmwareAnalysisFirmware', 'Get-AzFirmwareAnalysisPasswordHash', 'Get-AzFirmwareAnalysisSbomComponent', 'Get-AzFirmwareAnalysisSummary', 'Get-AzFirmwareAnalysisWorkspace', 'New-AzFirmwareAnalysisFirmware', 'New-AzFirmwareAnalysisWorkspace', 'New-AzFirmwareAnalysisWorkspaceUploadUrl', 'Remove-AzFirmwareAnalysisFirmware', 'Remove-AzFirmwareAnalysisWorkspace', 'Update-AzFirmwareAnalysisFirmware', 'Update-AzFirmwareAnalysisWorkspace'
+ FunctionsToExport = 'Get-AzFirmwareAnalysisBinaryHardening', 'Get-AzFirmwareAnalysisCryptoCertificate', 'Get-AzFirmwareAnalysisCryptoKey', 'Get-AzFirmwareAnalysisCve', 'Get-AzFirmwareAnalysisFirmware', 'Get-AzFirmwareAnalysisPasswordHash', 'Get-AzFirmwareAnalysisSbomComponent', 'Get-AzFirmwareAnalysisSummary', 'Get-AzFirmwareAnalysisUsageMetric', 'Get-AzFirmwareAnalysisWorkspace', 'New-AzFirmwareAnalysisFirmware', 'New-AzFirmwareAnalysisWorkspace', 'New-AzFirmwareAnalysisWorkspaceUploadUrl', 'Remove-AzFirmwareAnalysisFirmware', 'Remove-AzFirmwareAnalysisWorkspace', 'Update-AzFirmwareAnalysisFirmware', 'Update-AzFirmwareAnalysisWorkspace'
PrivateData = @{
PSData = @{
Tags = 'Azure', 'ResourceManager', 'ARM', 'PSModule', 'FirmwareAnalysis'
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Properties/AssemblyInfo.cs b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Properties/AssemblyInfo.cs
index b1c05ff618c3..3753964097f2 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Properties/AssemblyInfo.cs
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/Properties/AssemblyInfo.cs
@@ -1,28 +1,27 @@
-// ----------------------------------------------------------------------------------
-//
-// Copyright Microsoft Corporation
-// Licensed under the Apache License, Version 2.0 (the "License");
+// Copyright (c) Microsoft Corporation. All rights reserved.
+// Licensed under the Apache License, Version 2.0 (the ""License"");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
// http://www.apache.org/licenses/LICENSE-2.0
// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
+// distributed under the License is distributed on an ""AS IS"" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
-// ----------------------------------------------------------------------------------
+// Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
+// is regenerated.
using System;
using System.Reflection;
+using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
-[assembly: AssemblyTitle("Microsoft Azure Powershell - FirmwareAnalysis")]
-[assembly: AssemblyCompany(Microsoft.WindowsAzure.Commands.Common.AzurePowerShell.AssemblyCompany)]
-[assembly: AssemblyProduct(Microsoft.WindowsAzure.Commands.Common.AzurePowerShell.AssemblyProduct)]
-[assembly: AssemblyCopyright(Microsoft.WindowsAzure.Commands.Common.AzurePowerShell.AssemblyCopyright)]
+[assembly: System.Reflection.AssemblyCompanyAttribute("Microsoft")]
+[assembly: System.Reflection.AssemblyCopyrightAttribute("Copyright © Microsoft")]
+[assembly: System.Reflection.AssemblyProductAttribute("Microsoft Azure PowerShell")]
+[assembly: System.Reflection.AssemblyTitleAttribute("Microsoft Azure PowerShell - FirmwareAnalysis")]
+[assembly: System.Reflection.AssemblyFileVersionAttribute("0.1.4")]
+[assembly: System.Reflection.AssemblyVersionAttribute("0.1.4")]
+[assembly: System.Runtime.InteropServices.ComVisibleAttribute(false)]
+[assembly: System.CLSCompliantAttribute(false)]
-[assembly: ComVisible(false)]
-[assembly: CLSCompliant(false)]
-[assembly: Guid("ef6bdf0c-8d39-428c-b222-9f9675d964d6")]
-[assembly: AssemblyVersion("0.1.4")]
-[assembly: AssemblyFileVersion("0.1.4")]
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisBinaryHardening.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisBinaryHardening.ps1
index a43dd9bf1acc..c924e20cb2e7 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisBinaryHardening.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisBinaryHardening.ps1
@@ -114,6 +114,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -136,8 +145,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisBinaryHardening_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -151,6 +158,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoCertificate.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoCertificate.ps1
index 7344e42247f4..abf3f822adc6 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoCertificate.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoCertificate.ps1
@@ -16,9 +16,9 @@
<#
.Synopsis
-Lists cryptographic certificate analysis results found in a firmware.
+Lists crypto certificate analysis results of a firmware.
.Description
-Lists cryptographic certificate analysis results found in a firmware.
+Lists crypto certificate analysis results of a firmware.
.Example
Get-AzFirmwareAnalysisCryptoCertificate -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName | ConvertTo-Json
@@ -114,6 +114,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -136,8 +145,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisCryptoCertificate_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -151,6 +158,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoKey.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoKey.ps1
index b572e8fb0a88..b65994b3a6e6 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoKey.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCryptoKey.ps1
@@ -16,9 +16,9 @@
<#
.Synopsis
-Lists cryptographic key analysis results found in a firmware.
+Lists crypto key analysis results of a firmware.
.Description
-Lists cryptographic key analysis results found in a firmware.
+Lists crypto key analysis results of a firmware.
.Example
Get-AzFirmwareAnalysisCryptoKey -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName | ConvertTo-Json
@@ -114,6 +114,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -136,8 +145,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisCryptoKey_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -151,6 +158,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCve.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCve.ps1
index 7695e37e4d7b..c2c51c8ca43d 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCve.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisCve.ps1
@@ -114,6 +114,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -136,8 +145,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisCve_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -151,6 +158,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisFirmware.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisFirmware.ps1
index 82f6f580f6cd..80b94fcdd809 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisFirmware.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisFirmware.ps1
@@ -36,17 +36,19 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
WORKSPACEINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysisfirmware
@@ -155,6 +157,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -180,8 +191,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisFirmware_List';
}
if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -195,6 +204,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisPasswordHash.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisPasswordHash.ps1
index c2cfce662610..573bbacf60af 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisPasswordHash.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisPasswordHash.ps1
@@ -114,6 +114,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -136,8 +145,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisPasswordHash_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -151,6 +158,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSbomComponent.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSbomComponent.ps1
index 8784dedc3aaf..30640013287c 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSbomComponent.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSbomComponent.ps1
@@ -16,9 +16,9 @@
<#
.Synopsis
-Lists SBOM analysis results of a firmware.
+Lists sbom analysis results of a firmware.
.Description
-Lists SBOM analysis results of a firmware.
+Lists sbom analysis results of a firmware.
.Example
Get-AzFirmwareAnalysisSbomComponent -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName | ConvertTo-Json
@@ -114,6 +114,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -136,8 +145,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisSbomComponent_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -151,6 +158,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSummary.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSummary.ps1
index 9d62fd4b59f8..0db965c31a07 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSummary.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisSummary.ps1
@@ -20,9 +20,9 @@ Get an analysis result summary of a firmware by name.
.Description
Get an analysis result summary of a firmware by name.
.Example
-Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Name Type
+Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Type CVE
.Example
-Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Name Type
+Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Type Firmware
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity
@@ -36,25 +36,28 @@ To create the parameters described below, construct a hash table containing the
FIRMWAREINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
WORKSPACEINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysissummary
@@ -70,16 +73,6 @@ param(
# The id of the firmware.
${FirmwareId},
- [Parameter(ParameterSetName='Get', Mandatory)]
- [Parameter(ParameterSetName='GetViaIdentityFirmware', Mandatory)]
- [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory)]
- [Alias('SummaryName')]
- [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.PSArgumentCompleterAttribute("Firmware", "CVE", "BinaryHardening", "CryptoCertificate", "CryptoKey")]
- [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
- [System.String]
- # The Firmware analysis summary name describing the type of summary.
- ${Name},
-
[Parameter(ParameterSetName='Get', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
[System.String]
@@ -95,6 +88,16 @@ param(
# The value must be an UUID.
${SubscriptionId},
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='GetViaIdentityFirmware', Mandatory)]
+ [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory)]
+ [Alias('SummaryType')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.PSArgumentCompleterAttribute("Firmware", "CommonVulnerabilitiesAndExposures", "BinaryHardening", "CryptoCertificate", "CryptoKey")]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The Firmware analysis summary name describing the type of summary.
+ ${Type},
+
[Parameter(ParameterSetName='Get', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
[System.String]
@@ -175,6 +178,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -200,8 +212,6 @@ begin {
GetViaIdentityWorkspace = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisSummary_GetViaIdentityWorkspace';
}
if (('Get') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -215,6 +225,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisUsageMetric.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisUsageMetric.ps1
new file mode 100644
index 000000000000..c12c78bc3038
--- /dev/null
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisUsageMetric.ps1
@@ -0,0 +1,248 @@
+
+# ----------------------------------------------------------------------------------
+# Copyright (c) Microsoft Corporation. All rights reserved.
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+# http://www.apache.org/licenses/LICENSE-2.0
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
+# is regenerated.
+# ----------------------------------------------------------------------------------
+
+<#
+.Synopsis
+Gets monthly usage information for a workspace.
+.Description
+Gets monthly usage information for a workspace.
+.Example
+Get-AzFirmwareAnalysisUsageMetric -ResourceGroupName FirmwareAnalysisRG -WorkspaceName default
+
+.Inputs
+Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity
+.Outputs
+Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IUsageMetric
+.Notes
+COMPLEX PARAMETER PROPERTIES
+
+To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
+
+INPUTOBJECT : Identity Parameter
+ [FirmwareId ]: The id of the firmware.
+ [Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
+ [ResourceGroupName ]: The name of the resource group. The name is case insensitive.
+ [SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
+ [WorkspaceName ]: The name of the firmware analysis workspace.
+
+WORKSPACEINPUTOBJECT : Identity Parameter
+ [FirmwareId ]: The id of the firmware.
+ [Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
+ [ResourceGroupName ]: The name of the resource group. The name is case insensitive.
+ [SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
+ [WorkspaceName ]: The name of the firmware analysis workspace.
+.Link
+https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysisusagemetric
+#>
+function Get-AzFirmwareAnalysisUsageMetric {
+[OutputType([Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IUsageMetric])]
+[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
+param(
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The Firmware analysis summary name describing the type of summary.
+ ${Name},
+
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='List', Mandatory)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The name of the resource group.
+ # The name is case insensitive.
+ ${ResourceGroupName},
+
+ [Parameter(ParameterSetName='Get')]
+ [Parameter(ParameterSetName='List')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
+ [System.String[]]
+ # The ID of the target subscription.
+ # The value must be an UUID.
+ ${SubscriptionId},
+
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='List', Mandatory)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The name of the firmware analysis workspace.
+ ${WorkspaceName},
+
+ [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity]
+ # Identity Parameter
+ ${InputObject},
+
+ [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory, ValueFromPipeline)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity]
+ # Identity Parameter
+ ${WorkspaceInputObject},
+
+ [Parameter()]
+ [Alias('AzureRMContext', 'AzureCredential')]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Azure')]
+ [System.Management.Automation.PSObject]
+ # The DefaultProfile parameter is not functional.
+ # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
+ ${DefaultProfile},
+
+ [Parameter(DontShow)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Wait for .NET debugger to attach
+ ${Break},
+
+ [Parameter(DontShow)]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.SendAsyncStep[]]
+ # SendAsync Pipeline Steps to be appended to the front of the pipeline
+ ${HttpPipelineAppend},
+
+ [Parameter(DontShow)]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.SendAsyncStep[]]
+ # SendAsync Pipeline Steps to be prepended to the front of the pipeline
+ ${HttpPipelinePrepend},
+
+ [Parameter(DontShow)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Uri]
+ # The URI for the proxy server to use
+ ${Proxy},
+
+ [Parameter(DontShow)]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.PSCredential]
+ # Credentials for a proxy server to use for the remote call
+ ${ProxyCredential},
+
+ [Parameter(DontShow)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Use the default credentials for the proxy
+ ${ProxyUseDefaultCredentials}
+)
+
+begin {
+ try {
+ $outBuffer = $null
+ if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
+ $PSBoundParameters['OutBuffer'] = 1
+ }
+ $parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
+
+ if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
+ [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
+ }
+ $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
+ if ($preTelemetryId -eq '') {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
+ } else {
+ $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
+ if ($internalCalledCmdlets -eq '') {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
+ } else {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
+ }
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
+ }
+
+ $mapping = @{
+ Get = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_Get';
+ GetViaIdentity = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_GetViaIdentity';
+ GetViaIdentityWorkspace = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_GetViaIdentityWorkspace';
+ List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_List';
+ }
+ if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
+ if ($testPlayback) {
+ $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
+ } else {
+ $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
+ }
+ }
+ $cmdInfo = Get-Command -Name $mapping[$parameterSet]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
+ if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
+ [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
+ }
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
+ $scriptCmd = {& $wrappedCmd @PSBoundParameters}
+ $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
+ $steppablePipeline.Begin($PSCmdlet)
+ } catch {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ throw
+ }
+}
+
+process {
+ try {
+ $steppablePipeline.Process($_)
+ } catch {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ throw
+ }
+
+ finally {
+ $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
+ $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ }
+
+}
+end {
+ try {
+ $steppablePipeline.End()
+
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
+ if ($preTelemetryId -eq '') {
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ }
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
+
+ } catch {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ throw
+ }
+}
+}
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisWorkspace.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisWorkspace.ps1
index 75780e222844..92da0af51c2e 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisWorkspace.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Get-AzFirmwareAnalysisWorkspace.ps1
@@ -36,9 +36,10 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysisworkspace
@@ -134,6 +135,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -159,8 +169,6 @@ begin {
List1 = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisWorkspace_List1';
}
if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -174,6 +182,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisFirmware.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisFirmware.ps1
index 7f08d7ab86c7..9bcb3b0df603 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisFirmware.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisFirmware.ps1
@@ -16,9 +16,9 @@
<#
.Synopsis
-The operation to Create a firmware.
+The operation to create a firmware.
.Description
-The operation to Create a firmware.
+The operation to create a firmware.
.Example
New-AzFirmwareAnalysisFirmware -ResourceGroupName resourceGroupName -WorkspaceName workspaceName -Description description -FileSize 1 -FileName fileName -Vendor vendor -Model model -Version version
.Example
@@ -176,6 +176,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -201,8 +210,6 @@ begin {
$PSBoundParameters['Id'] = New-Guid
}
if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -216,6 +223,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspace.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspace.ps1
index ea4b30da94f0..297932357d84 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspace.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspace.ps1
@@ -16,9 +16,9 @@
<#
.Synopsis
-The operation to Create a firmware analysis workspace.
+The operation to create a firmware analysis workspace.
.Description
-The operation to Create a firmware analysis workspace.
+The operation to create a firmware analysis workspace.
.Example
New-AzFirmwareAnalysisWorkspace -ResourceGroupName resourceGroupName -Name name -Location location
@@ -59,6 +59,42 @@ param(
# The geo-location where the resource lives
${Location},
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.Int32]
+ # If the SKU supports scale out/in then the capacity integer should be included.
+ # If scale out/in is not possible for the resource this may be omitted.
+ ${SkuCapacity},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # If the service has different generations of hardware, for the same SKU, then that can be captured here.
+ ${SkuFamily},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # The name of the SKU.
+ # E.g.
+ # P3.
+ # It is typically a letter+number code
+ ${SkuName},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # The SKU size.
+ # When the name field is the combination of tier and some other value, this would be the standalone code.
+ ${SkuSize},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.PSArgumentCompleterAttribute("Free", "Basic", "Standard", "Premium")]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # This field is required to be implemented by the Resource Provider if the service has more than one tier, but is not required on a PUT.
+ ${SkuTier},
+
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.ITrackedResourceTags]))]
@@ -122,6 +158,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -144,8 +189,6 @@ begin {
CreateExpanded = 'Az.FirmwareAnalysis.private\New-AzFirmwareAnalysisWorkspace_CreateExpanded';
}
if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -159,6 +202,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspaceUploadUrl.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspaceUploadUrl.ps1
index 2f7d85fef0d4..53291a2d9147 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspaceUploadUrl.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/New-AzFirmwareAnalysisWorkspaceUploadUrl.ps1
@@ -16,9 +16,9 @@
<#
.Synopsis
-The operation to get a url for file upload.
+Generate a URL for uploading a firmware image.
.Description
-The operation to get a url for file upload.
+Generate a URL for uploading a firmware image.
.Example
New-AzFirmwareAnalysisWorkspaceUploadUrl -ResourceGroupName resourceGroupName -WorkspaceName workspaceName -FirmwareId firmwareId
@@ -33,15 +33,16 @@ COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
-GENERATEUPLOADURL : Properties for generating an upload URL
+BODY : Properties for generating an upload URL
[FirmwareId ]: A unique ID for the firmware to be uploaded.
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/new-azfirmwareanalysisworkspaceuploadurl
@@ -92,7 +93,7 @@ param(
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IGenerateUploadUrlRequest]
# Properties for generating an upload URL
- ${GenerateUploadUrl},
+ ${Body},
[Parameter(ParameterSetName='GenerateExpanded')]
[Parameter(ParameterSetName='GenerateViaIdentityExpanded')]
@@ -169,6 +170,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -196,8 +206,6 @@ begin {
GenerateViaJsonString = 'Az.FirmwareAnalysis.private\New-AzFirmwareAnalysisWorkspaceUploadUrl_GenerateViaJsonString';
}
if (('Generate', 'GenerateExpanded', 'GenerateViaJsonFilePath', 'GenerateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -211,6 +219,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/ProxyCmdletDefinitions.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/ProxyCmdletDefinitions.ps1
index 5a62f6a55148..538c960d8604 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/ProxyCmdletDefinitions.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/ProxyCmdletDefinitions.ps1
@@ -114,6 +114,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -136,8 +145,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisBinaryHardening_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -151,6 +158,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -196,9 +206,9 @@ end {
<#
.Synopsis
-Lists cryptographic certificate analysis results found in a firmware.
+Lists crypto certificate analysis results of a firmware.
.Description
-Lists cryptographic certificate analysis results found in a firmware.
+Lists crypto certificate analysis results of a firmware.
.Example
Get-AzFirmwareAnalysisCryptoCertificate -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName | ConvertTo-Json
@@ -294,6 +304,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -316,8 +335,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisCryptoCertificate_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -331,6 +348,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -376,9 +396,9 @@ end {
<#
.Synopsis
-Lists cryptographic key analysis results found in a firmware.
+Lists crypto key analysis results of a firmware.
.Description
-Lists cryptographic key analysis results found in a firmware.
+Lists crypto key analysis results of a firmware.
.Example
Get-AzFirmwareAnalysisCryptoKey -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName | ConvertTo-Json
@@ -474,6 +494,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -496,8 +525,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisCryptoKey_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -511,6 +538,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -654,6 +684,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -676,8 +715,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisCve_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -691,6 +728,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -756,17 +796,19 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
WORKSPACEINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysisfirmware
@@ -875,6 +917,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -900,8 +951,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisFirmware_List';
}
if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -915,6 +964,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -1058,6 +1110,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -1080,8 +1141,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisPasswordHash_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -1095,6 +1154,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -1140,9 +1202,9 @@ end {
<#
.Synopsis
-Lists SBOM analysis results of a firmware.
+Lists sbom analysis results of a firmware.
.Description
-Lists SBOM analysis results of a firmware.
+Lists sbom analysis results of a firmware.
.Example
Get-AzFirmwareAnalysisSbomComponent -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName | ConvertTo-Json
@@ -1238,6 +1300,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -1260,8 +1331,6 @@ begin {
List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisSbomComponent_List';
}
if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -1275,6 +1344,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -1324,9 +1396,9 @@ Get an analysis result summary of a firmware by name.
.Description
Get an analysis result summary of a firmware by name.
.Example
-Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Name Type
+Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Type CVE
.Example
-Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Name Type
+Get-AzFirmwareAnalysisSummary -FirmwareId FirmwareId -ResourceGroupName ResourceGroupName -WorkspaceName WorkspaceName -Type Firmware
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity
@@ -1340,25 +1412,28 @@ To create the parameters described below, construct a hash table containing the
FIRMWAREINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
WORKSPACEINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysissummary
@@ -1374,16 +1449,6 @@ param(
# The id of the firmware.
${FirmwareId},
- [Parameter(ParameterSetName='Get', Mandatory)]
- [Parameter(ParameterSetName='GetViaIdentityFirmware', Mandatory)]
- [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory)]
- [Alias('SummaryName')]
- [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.PSArgumentCompleterAttribute("Firmware", "CVE", "BinaryHardening", "CryptoCertificate", "CryptoKey")]
- [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
- [System.String]
- # The Firmware analysis summary name describing the type of summary.
- ${Name},
-
[Parameter(ParameterSetName='Get', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
[System.String]
@@ -1399,6 +1464,16 @@ param(
# The value must be an UUID.
${SubscriptionId},
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='GetViaIdentityFirmware', Mandatory)]
+ [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory)]
+ [Alias('SummaryType')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.PSArgumentCompleterAttribute("Firmware", "CommonVulnerabilitiesAndExposures", "BinaryHardening", "CryptoCertificate", "CryptoKey")]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The Firmware analysis summary name describing the type of summary.
+ ${Type},
+
[Parameter(ParameterSetName='Get', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
[System.String]
@@ -1479,6 +1554,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -1504,8 +1588,6 @@ begin {
GetViaIdentityWorkspace = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisSummary_GetViaIdentityWorkspace';
}
if (('Get') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -1519,6 +1601,242 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
+ $scriptCmd = {& $wrappedCmd @PSBoundParameters}
+ $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
+ $steppablePipeline.Begin($PSCmdlet)
+ } catch {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ throw
+ }
+}
+
+process {
+ try {
+ $steppablePipeline.Process($_)
+ } catch {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ throw
+ }
+
+ finally {
+ $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
+ $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ }
+
+}
+end {
+ try {
+ $steppablePipeline.End()
+
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
+ if ($preTelemetryId -eq '') {
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ }
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
+
+ } catch {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
+ throw
+ }
+}
+}
+
+<#
+.Synopsis
+Gets monthly usage information for a workspace.
+.Description
+Gets monthly usage information for a workspace.
+.Example
+Get-AzFirmwareAnalysisUsageMetric -ResourceGroupName FirmwareAnalysisRG -WorkspaceName default
+
+.Inputs
+Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity
+.Outputs
+Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IUsageMetric
+.Notes
+COMPLEX PARAMETER PROPERTIES
+
+To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
+
+INPUTOBJECT : Identity Parameter
+ [FirmwareId ]: The id of the firmware.
+ [Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
+ [ResourceGroupName ]: The name of the resource group. The name is case insensitive.
+ [SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
+ [WorkspaceName ]: The name of the firmware analysis workspace.
+
+WORKSPACEINPUTOBJECT : Identity Parameter
+ [FirmwareId ]: The id of the firmware.
+ [Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
+ [ResourceGroupName ]: The name of the resource group. The name is case insensitive.
+ [SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
+ [WorkspaceName ]: The name of the firmware analysis workspace.
+.Link
+https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysisusagemetric
+#>
+function Get-AzFirmwareAnalysisUsageMetric {
+[OutputType([Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IUsageMetric])]
+[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
+param(
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The Firmware analysis summary name describing the type of summary.
+ ${Name},
+
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='List', Mandatory)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The name of the resource group.
+ # The name is case insensitive.
+ ${ResourceGroupName},
+
+ [Parameter(ParameterSetName='Get')]
+ [Parameter(ParameterSetName='List')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
+ [System.String[]]
+ # The ID of the target subscription.
+ # The value must be an UUID.
+ ${SubscriptionId},
+
+ [Parameter(ParameterSetName='Get', Mandatory)]
+ [Parameter(ParameterSetName='List', Mandatory)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [System.String]
+ # The name of the firmware analysis workspace.
+ ${WorkspaceName},
+
+ [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity]
+ # Identity Parameter
+ ${InputObject},
+
+ [Parameter(ParameterSetName='GetViaIdentityWorkspace', Mandatory, ValueFromPipeline)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Path')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IFirmwareAnalysisIdentity]
+ # Identity Parameter
+ ${WorkspaceInputObject},
+
+ [Parameter()]
+ [Alias('AzureRMContext', 'AzureCredential')]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Azure')]
+ [System.Management.Automation.PSObject]
+ # The DefaultProfile parameter is not functional.
+ # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
+ ${DefaultProfile},
+
+ [Parameter(DontShow)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Wait for .NET debugger to attach
+ ${Break},
+
+ [Parameter(DontShow)]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.SendAsyncStep[]]
+ # SendAsync Pipeline Steps to be appended to the front of the pipeline
+ ${HttpPipelineAppend},
+
+ [Parameter(DontShow)]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.SendAsyncStep[]]
+ # SendAsync Pipeline Steps to be prepended to the front of the pipeline
+ ${HttpPipelinePrepend},
+
+ [Parameter(DontShow)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Uri]
+ # The URI for the proxy server to use
+ ${Proxy},
+
+ [Parameter(DontShow)]
+ [ValidateNotNull()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.PSCredential]
+ # Credentials for a proxy server to use for the remote call
+ ${ProxyCredential},
+
+ [Parameter(DontShow)]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Use the default credentials for the proxy
+ ${ProxyUseDefaultCredentials}
+)
+
+begin {
+ try {
+ $outBuffer = $null
+ if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
+ $PSBoundParameters['OutBuffer'] = 1
+ }
+ $parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
+
+ if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
+ [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
+ }
+ $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
+ if ($preTelemetryId -eq '') {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
+ } else {
+ $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
+ if ($internalCalledCmdlets -eq '') {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
+ } else {
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
+ }
+ [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
+ }
+
+ $mapping = @{
+ Get = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_Get';
+ GetViaIdentity = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_GetViaIdentity';
+ GetViaIdentityWorkspace = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_GetViaIdentityWorkspace';
+ List = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisUsageMetric_List';
+ }
+ if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
+ if ($testPlayback) {
+ $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
+ } else {
+ $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
+ }
+ }
+ $cmdInfo = Get-Command -Name $mapping[$parameterSet]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
+ if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
+ [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
+ }
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -1584,9 +1902,10 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/get-azfirmwareanalysisworkspace
@@ -1682,6 +2001,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -1707,8 +2035,6 @@ begin {
List1 = 'Az.FirmwareAnalysis.private\Get-AzFirmwareAnalysisWorkspace_List1';
}
if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -1722,6 +2048,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -1767,9 +2096,9 @@ end {
<#
.Synopsis
-The operation to Create a firmware.
+The operation to create a firmware.
.Description
-The operation to Create a firmware.
+The operation to create a firmware.
.Example
New-AzFirmwareAnalysisFirmware -ResourceGroupName resourceGroupName -WorkspaceName workspaceName -Description description -FileSize 1 -FileName fileName -Vendor vendor -Model model -Version version
.Example
@@ -1927,6 +2256,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -1952,8 +2290,6 @@ begin {
$PSBoundParameters['Id'] = New-Guid
}
if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -1967,6 +2303,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -2012,9 +2351,9 @@ end {
<#
.Synopsis
-The operation to get a url for file upload.
+Generate a URL for uploading a firmware image.
.Description
-The operation to get a url for file upload.
+Generate a URL for uploading a firmware image.
.Example
New-AzFirmwareAnalysisWorkspaceUploadUrl -ResourceGroupName resourceGroupName -WorkspaceName workspaceName -FirmwareId firmwareId
@@ -2029,15 +2368,16 @@ COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
-GENERATEUPLOADURL : Properties for generating an upload URL
+BODY : Properties for generating an upload URL
[FirmwareId ]: A unique ID for the firmware to be uploaded.
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/new-azfirmwareanalysisworkspaceuploadurl
@@ -2088,7 +2428,7 @@ param(
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IGenerateUploadUrlRequest]
# Properties for generating an upload URL
- ${GenerateUploadUrl},
+ ${Body},
[Parameter(ParameterSetName='GenerateExpanded')]
[Parameter(ParameterSetName='GenerateViaIdentityExpanded')]
@@ -2165,6 +2505,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -2192,8 +2541,6 @@ begin {
GenerateViaJsonString = 'Az.FirmwareAnalysis.private\New-AzFirmwareAnalysisWorkspaceUploadUrl_GenerateViaJsonString';
}
if (('Generate', 'GenerateExpanded', 'GenerateViaJsonFilePath', 'GenerateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -2207,6 +2554,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -2252,9 +2602,9 @@ end {
<#
.Synopsis
-The operation to Create a firmware analysis workspace.
+The operation to create a firmware analysis workspace.
.Description
-The operation to Create a firmware analysis workspace.
+The operation to create a firmware analysis workspace.
.Example
New-AzFirmwareAnalysisWorkspace -ResourceGroupName resourceGroupName -Name name -Location location
@@ -2295,6 +2645,42 @@ param(
# The geo-location where the resource lives
${Location},
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.Int32]
+ # If the SKU supports scale out/in then the capacity integer should be included.
+ # If scale out/in is not possible for the resource this may be omitted.
+ ${SkuCapacity},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # If the service has different generations of hardware, for the same SKU, then that can be captured here.
+ ${SkuFamily},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # The name of the SKU.
+ # E.g.
+ # P3.
+ # It is typically a letter+number code
+ ${SkuName},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # The SKU size.
+ # When the name field is the combination of tier and some other value, this would be the standalone code.
+ ${SkuSize},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.PSArgumentCompleterAttribute("Free", "Basic", "Standard", "Premium")]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # This field is required to be implemented by the Resource Provider if the service has more than one tier, but is not required on a PUT.
+ ${SkuTier},
+
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.ITrackedResourceTags]))]
@@ -2358,6 +2744,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -2380,8 +2775,6 @@ begin {
CreateExpanded = 'Az.FirmwareAnalysis.private\New-AzFirmwareAnalysisWorkspace_CreateExpanded';
}
if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -2395,6 +2788,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -2458,17 +2854,19 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
WORKSPACEINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/remove-azfirmwareanalysisfirmware
@@ -2580,6 +2978,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -2604,8 +3011,6 @@ begin {
DeleteViaIdentityWorkspace = 'Az.FirmwareAnalysis.private\Remove-AzFirmwareAnalysisFirmware_DeleteViaIdentityWorkspace';
}
if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -2619,6 +3024,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -2682,9 +3090,10 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/remove-azfirmwareanalysisworkspace
@@ -2730,6 +3139,12 @@ param(
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Run the command as a job
+ ${AsJob},
+
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
@@ -2750,6 +3165,12 @@ param(
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Run the command asynchronously
+ ${NoWait},
+
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
@@ -2783,6 +3204,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -2806,8 +3236,6 @@ begin {
DeleteViaIdentity = 'Az.FirmwareAnalysis.private\Remove-AzFirmwareAnalysisWorkspace_DeleteViaIdentity';
}
if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -2821,6 +3249,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -2866,9 +3297,9 @@ end {
<#
.Synopsis
-The operation to Update firmware.
+The operation to update firmware.
.Description
-The operation to Update firmware.
+The operation to update firmware.
.Example
Update-AzFirmwareAnalysisFirmware -FirmwareId firmwareId -ResourceGroupName resourceGroupName -WorkspaceName workspaceName -Description description -FileSize 1 -FileName fileName -Vendor vendor -Model model -Version version
@@ -2884,9 +3315,10 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
STATUSMESSAGE : A list of errors or other messages generated during firmware analysis
@@ -2896,9 +3328,10 @@ STATUSMESSAGE : A list of errors or other messages generated d
WORKSPACEINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/update-azfirmwareanalysisfirmware
@@ -3054,6 +3487,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -3078,8 +3520,6 @@ begin {
UpdateViaIdentityWorkspaceExpanded = 'Az.FirmwareAnalysis.private\Update-AzFirmwareAnalysisFirmware_UpdateViaIdentityWorkspaceExpanded';
}
if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -3093,6 +3533,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
@@ -3138,9 +3581,9 @@ end {
<#
.Synopsis
-The operation to Update a firmware analysis workspaces.
+The operation to update a firmware analysis workspaces.
.Description
-The operation to Update a firmware analysis workspaces.
+The operation to update a firmware analysis workspaces.
.Example
Update-AzFirmwareAnalysisWorkspace -ResourceGroupName resourceGroupName -Name workspaceName
@@ -3156,9 +3599,10 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/update-azfirmwareanalysisworkspace
@@ -3195,6 +3639,48 @@ param(
# Identity Parameter
${InputObject},
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.Int32]
+ # If the SKU supports scale out/in then the capacity integer should be included.
+ # If scale out/in is not possible for the resource this may be omitted.
+ ${SkuCapacity},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # If the service has different generations of hardware, for the same SKU, then that can be captured here.
+ ${SkuFamily},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # The name of the SKU.
+ # Ex - P3.
+ # It is typically a letter+number code
+ ${SkuName},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # The SKU size.
+ # When the name field is the combination of tier and some other value, this would be the standalone code.
+ ${SkuSize},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.PSArgumentCompleterAttribute("Free", "Basic", "Standard", "Premium")]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [System.String]
+ # This field is required to be implemented by the Resource Provider if the service has more than one tier, but is not required on a PUT.
+ ${SkuTier},
+
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Body')]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Models.IWorkspaceUpdateTags]))]
+ [System.Collections.Hashtable]
+ # Resource tags.
+ ${Tag},
+
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
@@ -3251,6 +3737,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -3274,8 +3769,6 @@ begin {
UpdateViaIdentityExpanded = 'Az.FirmwareAnalysis.private\Update-AzFirmwareAnalysisWorkspace_UpdateViaIdentityExpanded';
}
if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -3289,6 +3782,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisFirmware.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisFirmware.ps1
index de55dbe7b4ba..fe446d1aeed0 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisFirmware.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisFirmware.ps1
@@ -34,17 +34,19 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
WORKSPACEINPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/remove-azfirmwareanalysisfirmware
@@ -156,6 +158,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -180,8 +191,6 @@ begin {
DeleteViaIdentityWorkspace = 'Az.FirmwareAnalysis.private\Remove-AzFirmwareAnalysisFirmware_DeleteViaIdentityWorkspace';
}
if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -195,6 +204,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisWorkspace.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisWorkspace.ps1
index 95b8db84042a..dfaaa776deff 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisWorkspace.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Remove-AzFirmwareAnalysisWorkspace.ps1
@@ -34,9 +34,10 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType ]: The Firmware analysis summary name describing the type of summary.
[WorkspaceName ]: The name of the firmware analysis workspace.
.Link
https://learn.microsoft.com/powershell/module/az.firmwareanalysis/remove-azfirmwareanalysisworkspace
@@ -82,6 +83,12 @@ param(
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Run the command as a job
+ ${AsJob},
+
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
@@ -102,6 +109,12 @@ param(
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
+ [Parameter()]
+ [Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
+ [System.Management.Automation.SwitchParameter]
+ # Run the command asynchronously
+ ${NoWait},
+
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
@@ -135,6 +148,15 @@ begin {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
+
+ $testPlayback = $false
+ $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
+
+ $context = Get-AzContext
+ if (-not $context -and -not $testPlayback) {
+ Write-Error "No Azure login detected. Please run 'Connect-AzAccount' to log in."
+ exit
+ }
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
@@ -158,8 +180,6 @@ begin {
DeleteViaIdentity = 'Az.FirmwareAnalysis.private\Remove-AzFirmwareAnalysisWorkspace_DeleteViaIdentity';
}
if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) {
- $testPlayback = $false
- $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.FirmwareAnalysis.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
@@ -173,6 +193,9 @@ begin {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
+ if ($wrappedCmd -eq $null) {
+ $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Function)
+ }
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
diff --git a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Update-AzFirmwareAnalysisFirmware.ps1 b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Update-AzFirmwareAnalysisFirmware.ps1
index 67a7950ae705..09cbcf9278cd 100644
--- a/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Update-AzFirmwareAnalysisFirmware.ps1
+++ b/generated/FirmwareAnalysis/FirmwareAnalysis.Autorest/exports/Update-AzFirmwareAnalysisFirmware.ps1
@@ -16,9 +16,9 @@
<#
.Synopsis
-The operation to Update firmware.
+The operation to update firmware.
.Description
-The operation to Update firmware.
+The operation to update firmware.
.Example
Update-AzFirmwareAnalysisFirmware -FirmwareId firmwareId -ResourceGroupName resourceGroupName -WorkspaceName workspaceName -Description description -FileSize 1 -FileName fileName -Vendor vendor -Model model -Version version
@@ -34,9 +34,10 @@ To create the parameters described below, construct a hash table containing the
INPUTOBJECT : Identity Parameter
[FirmwareId ]: The id of the firmware.
[Id ]: Resource identity path
+ [Name ]: The Firmware analysis summary name describing the type of summary.
[ResourceGroupName ]: The name of the resource group. The name is case insensitive.
[SubscriptionId ]: The ID of the target subscription. The value must be an UUID.
- [SummaryName ]: The Firmware analysis summary name describing the type of summary.
+ [SummaryType