diff --git a/common/config/rush/pnpm-lock.yaml b/common/config/rush/pnpm-lock.yaml index c1abeafa46e3..63ec78e43c53 100644 --- a/common/config/rush/pnpm-lock.yaml +++ b/common/config/rush/pnpm-lock.yaml @@ -14141,7 +14141,7 @@ packages: dev: false file:projects/arm-iotfirmwaredefense.tgz: - resolution: {integrity: sha512-WjogQNEjuVkfiAN9gnaphl5L0qQxUQQeHY9TIv1ntiGFcHFuK4X5irE3erwuZa8aBPCE3lBEnFWIGTfk/ix7Jw==, tarball: file:projects/arm-iotfirmwaredefense.tgz} + resolution: {integrity: sha512-6L8z9n7SicAg/+uC8iXs4gq7+GkDPfDYGLRTxOPP1+A/+8dkBSuxnbcCZWiNmO6pt9GNuhpWJ7Zv0Brvq3I0pQ==, tarball: file:projects/arm-iotfirmwaredefense.tgz} name: '@rush-temp/arm-iotfirmwaredefense' version: 0.0.0 dependencies: @@ -14153,6 +14153,7 @@ packages: chai: 4.3.10 cross-env: 7.0.3 dotenv: 16.4.5 + esm: 3.2.25 mkdirp: 2.1.6 mocha: 10.3.0 rimraf: 5.0.5 @@ -15272,7 +15273,7 @@ packages: dev: false file:projects/arm-nginx.tgz: - resolution: {integrity: sha512-LoqehVB1afT29IOfLh7Qk5tO0L+Shm6R2NDTuhARtR741dNCcFgJGvcwfG15h9SoMvNE0r9dToFU1gMloGTLsw==, tarball: file:projects/arm-nginx.tgz} + resolution: {integrity: sha512-AvmU9ogVUUk92KHFeSMszUOXtcKhKd6o4499wNqRTZ5wVCARN91GDkrDCOAirTJuxYU5ZrdNOoap192IF2rfMA==, tarball: file:projects/arm-nginx.tgz} name: '@rush-temp/arm-nginx' version: 0.0.0 dependencies: diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/CHANGELOG.md b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/CHANGELOG.md index 921530f702a1..c1ff71df7a9d 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/CHANGELOG.md +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/CHANGELOG.md @@ -1,15 +1,5 @@ # Release History - -## 1.0.0-beta.2 (Unreleased) - -### Features Added - -### Breaking Changes - -### Bugs Fixed - -### Other Changes - -## 1.0.0-beta.1 (2023-07-19) + +## 1.0.0 (2024-03-08) The package of @azure/arm-iotfirmwaredefense is using our next generation design principles. To learn more, please refer to our documentation [Quick Start](https://aka.ms/azsdk/js/mgmt/quickstart ). diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/LICENSE b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/LICENSE index 3a1d9b6f24f7..7d5934740965 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/LICENSE +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/LICENSE @@ -1,6 +1,6 @@ The MIT License (MIT) -Copyright (c) 2023 Microsoft +Copyright (c) 2024 Microsoft Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md index f513552347ea..bd8233be9e40 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md @@ -2,11 +2,11 @@ This package contains an isomorphic SDK (runs both in Node.js and in browsers) for Azure IoTFirmwareDefense client. -The definitions and parameters in this swagger specification will be used to manage the IoT Firmware Defense resources. +Firmware & IoT Security REST API [Source code](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense) | [Package (NPM)](https://www.npmjs.com/package/@azure/arm-iotfirmwaredefense) | -[API reference documentation](https://docs.microsoft.com/javascript/api/@azure/arm-iotfirmwaredefense?view=azure-node-preview) | +[API reference documentation](https://docs.microsoft.com/javascript/api/@azure/arm-iotfirmwaredefense) | [Samples](https://github.com/Azure-Samples/azure-samples-js-management) ## Getting started diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/_meta.json b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/_meta.json index da35f3557091..4d1a00f1f22a 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/_meta.json +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/_meta.json @@ -1,8 +1,8 @@ { - "commit": "14a3cf043a4567366366f3d70829b4ef57711eb3", + "commit": "1a011ff0d72315ef3c530fe545c4fe82d0450201", "readme": "specification/fist/resource-manager/readme.md", - "autorest_command": "autorest --version=3.9.3 --typescript --modelerfour.lenient-model-deduplication --azure-arm --head-as-boolean=true --license-header=MICROSOFT_MIT_NO_VERSION --generate-test --typescript-sdks-folder=D:\\Git\\azure-sdk-for-js ..\\azure-rest-api-specs\\specification\\fist\\resource-manager\\readme.md --use=@autorest/typescript@6.0.5 --generate-sample=true", + "autorest_command": "autorest --version=3.9.7 --typescript --modelerfour.lenient-model-deduplication --azure-arm --head-as-boolean=true --license-header=MICROSOFT_MIT_NO_VERSION --generate-test --typescript-sdks-folder=D:\\Git\\azure-sdk-for-js ..\\azure-rest-api-specs\\specification\\fist\\resource-manager\\readme.md --use=@autorest/typescript@6.0.17 --generate-sample=true", "repository_url": "https://github.com/Azure/azure-rest-api-specs.git", - "release_tool": "@azure-tools/js-sdk-release-tools@2.7.0", - "use": "@autorest/typescript@6.0.5" + "release_tool": "@azure-tools/js-sdk-release-tools@2.7.4", + "use": "@autorest/typescript@6.0.17" } \ No newline at end of file diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/assets.json b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/assets.json index 3541cd0e3205..2b679644a0be 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/assets.json +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/assets.json @@ -2,5 +2,5 @@ "AssetsRepo": "Azure/azure-sdk-assets", "AssetsRepoPrefixPath": "js", "TagPrefix": "js/iotfirmwaredefense/arm-iotfirmwaredefense", - "Tag": "js/iotfirmwaredefense/arm-iotfirmwaredefense_30d53907bb" + "Tag": "js/iotfirmwaredefense/arm-iotfirmwaredefense_153e6c5c5a" } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/package.json b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/package.json index c4f0059c5ca0..89f19bceb454 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/package.json +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/package.json @@ -3,15 +3,15 @@ "sdk-type": "mgmt", "author": "Microsoft Corporation", "description": "A generated SDK for IoTFirmwareDefenseClient.", - "version": "1.0.0-beta.2", + "version": "1.0.0", "engines": { "node": ">=18.0.0" }, "dependencies": { "@azure/core-paging": "^1.2.0", "@azure/core-client": "^1.7.0", - "@azure/core-auth": "^1.3.0", - "@azure/core-rest-pipeline": "^1.8.0", + "@azure/core-auth": "^1.6.0", + "@azure/core-rest-pipeline": "^1.14.0", "tslib": "^2.2.0" }, "keywords": [ @@ -30,19 +30,20 @@ "mkdirp": "^2.1.2", "typescript": "~5.3.3", "uglify-js": "^3.4.9", - "rimraf": "^5.0.5", + "rimraf": "^5.0.0", "dotenv": "^16.0.0", + "@azure/dev-tool": "^1.0.0", "@azure/identity": "^4.0.1", "@azure-tools/test-recorder": "^3.0.0", "@azure-tools/test-credential": "^1.0.0", "mocha": "^10.0.0", + "@types/mocha": "^10.0.0", + "esm": "^3.2.18", "@types/chai": "^4.2.8", "chai": "^4.2.0", "cross-env": "^7.0.2", "@types/node": "^18.0.0", - "@azure/dev-tool": "^1.0.0", - "ts-node": "^10.0.0", - "@types/mocha": "^10.0.0" + "ts-node": "^10.0.0" }, "repository": { "type": "git", @@ -75,7 +76,6 @@ "pack": "npm pack 2>&1", "extract-api": "api-extractor run --local", "lint": "echo skipped", - "audit": "echo skipped", "clean": "rimraf --glob dist dist-browser dist-esm test-dist temp types *.tgz *.log", "build:node": "echo skipped", "build:browser": "echo skipped", @@ -113,4 +113,4 @@ "disableDocsMs": true, "apiRefLink": "https://docs.microsoft.com/javascript/api/@azure/arm-iotfirmwaredefense?view=azure-node-preview" } -} +} \ No newline at end of file diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/review/arm-iotfirmwaredefense.api.md b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/review/arm-iotfirmwaredefense.api.md index 54cb39f1c083..acabb3ca7914 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/review/arm-iotfirmwaredefense.api.md +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/review/arm-iotfirmwaredefense.api.md @@ -13,53 +13,63 @@ export type ActionType = string; // @public export interface BinaryHardening { - architecture?: string; - binaryHardeningId?: string; - canary?: CanaryFlag; - class?: string; - nx?: NxFlag; - path?: string; - pie?: PieFlag; - relro?: RelroFlag; - rpath?: string; - runpath?: string; - stripped?: StrippedFlag; + listByFirmware(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: BinaryHardeningListByFirmwareOptionalParams): PagedAsyncIterableIterator; } // @public -export interface BinaryHardeningList { - nextLink?: string; - readonly value?: BinaryHardening[]; +export interface BinaryHardeningFeatures { + canary?: boolean; + nx?: boolean; + pie?: boolean; + relro?: boolean; + stripped?: boolean; } // @public -export interface BinaryHardeningSummary { - canary?: number; - nx?: number; - pie?: number; - relro?: number; - stripped?: number; - totalFiles?: number; +export interface BinaryHardeningListByFirmwareNextOptionalParams extends coreClient.OperationOptions { } // @public -export type CanaryFlag = string; +export type BinaryHardeningListByFirmwareNextResponse = BinaryHardeningListResult; // @public -export interface Component { - componentId?: string; - componentName?: string; - isUpdateAvailable?: IsUpdateAvailable; - license?: string; - paths?: string[]; - releaseDate?: Date; - version?: string; +export interface BinaryHardeningListByFirmwareOptionalParams extends coreClient.OperationOptions { } // @public -export interface ComponentList { +export type BinaryHardeningListByFirmwareResponse = BinaryHardeningListResult; + +// @public +export interface BinaryHardeningListResult { nextLink?: string; - readonly value?: Component[]; + readonly value?: BinaryHardeningResource[]; +} + +// @public +export interface BinaryHardeningResource extends Resource { + properties?: BinaryHardeningResult; +} + +// @public +export interface BinaryHardeningResult { + architecture?: string; + binaryHardeningId?: string; + class?: string; + features?: BinaryHardeningFeatures; + filePath?: string; + rpath?: string; + runpath?: string; +} + +// @public +export interface BinaryHardeningSummaryResource extends SummaryResourceProperties { + canary?: number; + nx?: number; + pie?: number; + relro?: number; + stripped?: number; + summaryType: "BinaryHardening"; + totalFiles?: number; } // @public @@ -72,12 +82,12 @@ export interface CryptoCertificate { expirationDate?: Date; readonly filePaths?: string[]; fingerprint?: string; - isExpired?: IsExpired; - isSelfSigned?: IsSelfSigned; - isShortKeySize?: IsShortKeySize; + isExpired?: boolean; + isSelfSigned?: boolean; + isShortKeySize?: boolean; issuedDate?: Date; issuer?: CryptoCertificateEntity; - isWeakSignature?: IsWeakSignature; + isWeakSignature?: boolean; keyAlgorithm?: string; keySize?: number; name?: string; @@ -99,18 +109,43 @@ export interface CryptoCertificateEntity { } // @public -export interface CryptoCertificateList { +export interface CryptoCertificateListResult { nextLink?: string; - readonly value?: CryptoCertificate[]; + readonly value?: CryptoCertificateResource[]; +} + +// @public +export interface CryptoCertificateResource extends Resource { + properties?: CryptoCertificate; +} + +// @public +export interface CryptoCertificates { + listByFirmware(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: CryptoCertificatesListByFirmwareOptionalParams): PagedAsyncIterableIterator; +} + +// @public +export interface CryptoCertificatesListByFirmwareNextOptionalParams extends coreClient.OperationOptions { } // @public -export interface CryptoCertificateSummary { +export type CryptoCertificatesListByFirmwareNextResponse = CryptoCertificateListResult; + +// @public +export interface CryptoCertificatesListByFirmwareOptionalParams extends coreClient.OperationOptions { +} + +// @public +export type CryptoCertificatesListByFirmwareResponse = CryptoCertificateListResult; + +// @public +export interface CryptoCertificateSummaryResource extends SummaryResourceProperties { expired?: number; expiringSoon?: number; pairedKeys?: number; selfSigned?: number; shortKeySize?: number; + summaryType: "CryptoCertificate"; totalCertificates?: number; weakSignature?: number; } @@ -119,7 +154,7 @@ export interface CryptoCertificateSummary { interface CryptoKey_2 { cryptoKeyId?: string; readonly filePaths?: string[]; - isShortKeySize?: IsShortKeySize; + isShortKeySize?: boolean; keyAlgorithm?: string; keySize?: number; keyType?: string; @@ -129,179 +164,137 @@ interface CryptoKey_2 { export { CryptoKey_2 as CryptoKey } // @public -export interface CryptoKeyList { +export interface CryptoKeyListResult { nextLink?: string; - readonly value?: CryptoKey_2[]; + readonly value?: CryptoKeyResource[]; } // @public -export interface CryptoKeySummary { - pairedKeys?: number; - privateKeys?: number; - publicKeys?: number; - shortKeySize?: number; - totalKeys?: number; +export interface CryptoKeyResource extends Resource { + properties?: CryptoKey_2; } // @public -export interface Cve { - component?: Record; - cveId?: string; - cvssScore?: string; - cvssV2Score?: string; - cvssV3Score?: string; - cvssVersion?: string; - description?: string; - readonly links?: CveLink[]; - name?: string; - publishDate?: Date; - severity?: string; - updatedDate?: Date; +export interface CryptoKeys { + listByFirmware(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: CryptoKeysListByFirmwareOptionalParams): PagedAsyncIterableIterator; } // @public -export interface CveComponent { - componentId?: string; - name?: string; - version?: string; +export interface CryptoKeysListByFirmwareNextOptionalParams extends coreClient.OperationOptions { } // @public -export interface CveLink { - href?: string; - label?: string; -} - -// @public -export interface CveList { - nextLink?: string; - readonly value?: Cve[]; -} - -// @public -export interface CveSummary { - critical?: number; - high?: number; - low?: number; - medium?: number; - undefined?: number; - unknown?: number; -} +export type CryptoKeysListByFirmwareNextResponse = CryptoKeyListResult; // @public -export interface ErrorAdditionalInfo { - readonly info?: Record; - readonly type?: string; +export interface CryptoKeysListByFirmwareOptionalParams extends coreClient.OperationOptions { } // @public -export interface ErrorDetail { - readonly additionalInfo?: ErrorAdditionalInfo[]; - readonly code?: string; - readonly details?: ErrorDetail[]; - readonly message?: string; - readonly target?: string; -} +export type CryptoKeysListByFirmwareResponse = CryptoKeyListResult; // @public -export interface ErrorResponse { - error?: ErrorDetail; +export interface CryptoKeySummaryResource extends SummaryResourceProperties { + pairedKeys?: number; + privateKeys?: number; + publicKeys?: number; + shortKeySize?: number; + summaryType: "CryptoKey"; + totalKeys?: number; } // @public -export interface Firmware extends ProxyResource { - description?: string; - fileName?: string; - fileSize?: number; - model?: string; - readonly provisioningState?: ProvisioningState; - status?: Status; - statusMessages?: Record[]; - vendor?: string; +export interface CveComponent { + componentId?: string; + name?: string; version?: string; } // @public -export interface FirmwareCreateOptionalParams extends coreClient.OperationOptions { +export interface CveLink { + href?: string; + label?: string; } // @public -export type FirmwareCreateResponse = Firmware; - -// @public -export interface FirmwareDeleteOptionalParams extends coreClient.OperationOptions { +export interface CveListResult { + nextLink?: string; + readonly value?: CveResource[]; } // @public -export interface FirmwareGenerateBinaryHardeningDetailsOptionalParams extends coreClient.OperationOptions { +export interface CveResource extends Resource { + properties?: CveResult; } // @public -export type FirmwareGenerateBinaryHardeningDetailsResponse = BinaryHardening; - -// @public -export interface FirmwareGenerateBinaryHardeningSummaryOptionalParams extends coreClient.OperationOptions { +export interface CveResult { + component?: CveComponent; + cveId?: string; + cvssScore?: string; + cvssV2Score?: string; + cvssV3Score?: string; + cvssVersion?: string; + description?: string; + readonly links?: CveLink[]; + name?: string; + severity?: string; } // @public -export type FirmwareGenerateBinaryHardeningSummaryResponse = BinaryHardeningSummary; - -// @public -export interface FirmwareGenerateComponentDetailsOptionalParams extends coreClient.OperationOptions { +export interface Cves { + listByFirmware(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: CvesListByFirmwareOptionalParams): PagedAsyncIterableIterator; } // @public -export type FirmwareGenerateComponentDetailsResponse = Component; - -// @public -export interface FirmwareGenerateCryptoCertificateSummaryOptionalParams extends coreClient.OperationOptions { +export interface CvesListByFirmwareNextOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareGenerateCryptoCertificateSummaryResponse = CryptoCertificateSummary; +export type CvesListByFirmwareNextResponse = CveListResult; // @public -export interface FirmwareGenerateCryptoKeySummaryOptionalParams extends coreClient.OperationOptions { +export interface CvesListByFirmwareOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareGenerateCryptoKeySummaryResponse = CryptoKeySummary; +export type CvesListByFirmwareResponse = CveListResult; // @public -export interface FirmwareGenerateCveSummaryOptionalParams extends coreClient.OperationOptions { +export interface CveSummary extends SummaryResourceProperties { + critical?: number; + high?: number; + low?: number; + medium?: number; + summaryType: "CVE"; + unknown?: number; } // @public -export type FirmwareGenerateCveSummaryResponse = CveSummary; - -// @public -export interface FirmwareGenerateDownloadUrlOptionalParams extends coreClient.OperationOptions { +export interface ErrorAdditionalInfo { + readonly info?: Record; + readonly type?: string; } // @public -export type FirmwareGenerateDownloadUrlResponse = UrlToken; - -// @public -export interface FirmwareGenerateFilesystemDownloadUrlOptionalParams extends coreClient.OperationOptions { +export interface ErrorDetail { + readonly additionalInfo?: ErrorAdditionalInfo[]; + readonly code?: string; + readonly details?: ErrorDetail[]; + readonly message?: string; + readonly target?: string; } // @public -export type FirmwareGenerateFilesystemDownloadUrlResponse = UrlToken; - -// @public -export interface FirmwareGenerateSummaryOptionalParams extends coreClient.OperationOptions { +export interface ErrorResponse { + error?: ErrorDetail; } // @public -export type FirmwareGenerateSummaryResponse = FirmwareSummary; - -// @public -export interface FirmwareGetOptionalParams extends coreClient.OperationOptions { +export interface Firmware extends Resource { + properties?: FirmwareProperties; } -// @public -export type FirmwareGetResponse = Firmware; - // @public export interface FirmwareList { nextLink?: string; @@ -309,129 +302,77 @@ export interface FirmwareList { } // @public -export interface FirmwareListByWorkspaceNextOptionalParams extends coreClient.OperationOptions { -} - -// @public -export type FirmwareListByWorkspaceNextResponse = FirmwareList; - -// @public -export interface FirmwareListByWorkspaceOptionalParams extends coreClient.OperationOptions { -} - -// @public -export type FirmwareListByWorkspaceResponse = FirmwareList; - -// @public -export interface FirmwareListGenerateBinaryHardeningListNextOptionalParams extends coreClient.OperationOptions { -} - -// @public -export type FirmwareListGenerateBinaryHardeningListNextResponse = BinaryHardeningList; - -// @public -export interface FirmwareListGenerateBinaryHardeningListOptionalParams extends coreClient.OperationOptions { -} - -// @public -export type FirmwareListGenerateBinaryHardeningListResponse = BinaryHardeningList; - -// @public -export interface FirmwareListGenerateComponentListNextOptionalParams extends coreClient.OperationOptions { -} - -// @public -export type FirmwareListGenerateComponentListNextResponse = ComponentList; - -// @public -export interface FirmwareListGenerateComponentListOptionalParams extends coreClient.OperationOptions { +export interface FirmwareProperties { + description?: string; + fileName?: string; + fileSize?: number; + model?: string; + readonly provisioningState?: ProvisioningState; + status?: Status; + statusMessages?: StatusMessage[]; + vendor?: string; + version?: string; } // @public -export type FirmwareListGenerateComponentListResponse = ComponentList; - -// @public -export interface FirmwareListGenerateCryptoCertificateListNextOptionalParams extends coreClient.OperationOptions { +export interface Firmwares { + create(resourceGroupName: string, workspaceName: string, firmwareId: string, firmware: Firmware, options?: FirmwaresCreateOptionalParams): Promise; + delete(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwaresDeleteOptionalParams): Promise; + generateDownloadUrl(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwaresGenerateDownloadUrlOptionalParams): Promise; + generateFilesystemDownloadUrl(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwaresGenerateFilesystemDownloadUrlOptionalParams): Promise; + get(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwaresGetOptionalParams): Promise; + listByWorkspace(resourceGroupName: string, workspaceName: string, options?: FirmwaresListByWorkspaceOptionalParams): PagedAsyncIterableIterator; + update(resourceGroupName: string, workspaceName: string, firmwareId: string, firmware: FirmwareUpdateDefinition, options?: FirmwaresUpdateOptionalParams): Promise; } // @public -export type FirmwareListGenerateCryptoCertificateListNextResponse = CryptoCertificateList; - -// @public -export interface FirmwareListGenerateCryptoCertificateListOptionalParams extends coreClient.OperationOptions { +export interface FirmwaresCreateOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareListGenerateCryptoCertificateListResponse = CryptoCertificateList; +export type FirmwaresCreateResponse = Firmware; // @public -export interface FirmwareListGenerateCryptoKeyListNextOptionalParams extends coreClient.OperationOptions { +export interface FirmwaresDeleteOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareListGenerateCryptoKeyListNextResponse = CryptoKeyList; - -// @public -export interface FirmwareListGenerateCryptoKeyListOptionalParams extends coreClient.OperationOptions { +export interface FirmwaresGenerateDownloadUrlOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareListGenerateCryptoKeyListResponse = CryptoKeyList; +export type FirmwaresGenerateDownloadUrlResponse = UrlToken; // @public -export interface FirmwareListGenerateCveListNextOptionalParams extends coreClient.OperationOptions { +export interface FirmwaresGenerateFilesystemDownloadUrlOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareListGenerateCveListNextResponse = CveList; +export type FirmwaresGenerateFilesystemDownloadUrlResponse = UrlToken; // @public -export interface FirmwareListGenerateCveListOptionalParams extends coreClient.OperationOptions { +export interface FirmwaresGetOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareListGenerateCveListResponse = CveList; +export type FirmwaresGetResponse = Firmware; // @public -export interface FirmwareListGeneratePasswordHashListNextOptionalParams extends coreClient.OperationOptions { +export interface FirmwaresListByWorkspaceNextOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareListGeneratePasswordHashListNextResponse = PasswordHashList; +export type FirmwaresListByWorkspaceNextResponse = FirmwareList; // @public -export interface FirmwareListGeneratePasswordHashListOptionalParams extends coreClient.OperationOptions { +export interface FirmwaresListByWorkspaceOptionalParams extends coreClient.OperationOptions { } // @public -export type FirmwareListGeneratePasswordHashListResponse = PasswordHashList; - -// @public -export interface FirmwareOperations { - create(resourceGroupName: string, workspaceName: string, firmwareId: string, firmware: Firmware, options?: FirmwareCreateOptionalParams): Promise; - delete(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareDeleteOptionalParams): Promise; - generateBinaryHardeningDetails(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateBinaryHardeningDetailsOptionalParams): Promise; - generateBinaryHardeningSummary(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateBinaryHardeningSummaryOptionalParams): Promise; - generateComponentDetails(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateComponentDetailsOptionalParams): Promise; - generateCryptoCertificateSummary(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateCryptoCertificateSummaryOptionalParams): Promise; - generateCryptoKeySummary(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateCryptoKeySummaryOptionalParams): Promise; - generateCveSummary(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateCveSummaryOptionalParams): Promise; - generateDownloadUrl(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateDownloadUrlOptionalParams): Promise; - generateFilesystemDownloadUrl(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateFilesystemDownloadUrlOptionalParams): Promise; - generateSummary(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGenerateSummaryOptionalParams): Promise; - get(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareGetOptionalParams): Promise; - listByWorkspace(resourceGroupName: string, workspaceName: string, options?: FirmwareListByWorkspaceOptionalParams): PagedAsyncIterableIterator; - listGenerateBinaryHardeningList(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareListGenerateBinaryHardeningListOptionalParams): PagedAsyncIterableIterator; - listGenerateComponentList(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareListGenerateComponentListOptionalParams): PagedAsyncIterableIterator; - listGenerateCryptoCertificateList(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareListGenerateCryptoCertificateListOptionalParams): PagedAsyncIterableIterator; - listGenerateCryptoKeyList(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareListGenerateCryptoKeyListOptionalParams): PagedAsyncIterableIterator; - listGenerateCveList(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareListGenerateCveListOptionalParams): PagedAsyncIterableIterator; - listGeneratePasswordHashList(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: FirmwareListGeneratePasswordHashListOptionalParams): PagedAsyncIterableIterator; - update(resourceGroupName: string, workspaceName: string, firmwareId: string, firmware: FirmwareUpdateDefinition, options?: FirmwareUpdateOptionalParams): Promise; -} +export type FirmwaresListByWorkspaceResponse = FirmwareList; // @public -export interface FirmwareSummary { +export interface FirmwareSummary extends SummaryResourceProperties { analysisTimeSeconds?: number; binaryCount?: number; componentCount?: number; @@ -439,27 +380,20 @@ export interface FirmwareSummary { extractedSize?: number; fileSize?: number; rootFileSystems?: number; + summaryType: "Firmware"; } // @public -export interface FirmwareUpdateDefinition { - description?: string; - fileName?: string; - fileSize?: number; - model?: string; - readonly provisioningState?: ProvisioningState; - status?: Status; - statusMessages?: Record[]; - vendor?: string; - version?: string; +export interface FirmwaresUpdateOptionalParams extends coreClient.OperationOptions { } // @public -export interface FirmwareUpdateOptionalParams extends coreClient.OperationOptions { -} +export type FirmwaresUpdateResponse = Firmware; // @public -export type FirmwareUpdateResponse = Firmware; +export interface FirmwareUpdateDefinition { + properties?: FirmwareProperties; +} // @public export interface GenerateUploadUrlRequest { @@ -477,12 +411,26 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { // (undocumented) apiVersion: string; // (undocumented) - firmwareOperations: FirmwareOperations; + binaryHardening: BinaryHardening; + // (undocumented) + cryptoCertificates: CryptoCertificates; + // (undocumented) + cryptoKeys: CryptoKeys; + // (undocumented) + cves: Cves; + // (undocumented) + firmwares: Firmwares; // (undocumented) operations: Operations; // (undocumented) + passwordHashes: PasswordHashes; + // (undocumented) + sbomComponents: SbomComponents; + // (undocumented) subscriptionId: string; // (undocumented) + summaries: Summaries; + // (undocumented) workspaces: Workspaces; } @@ -493,32 +441,11 @@ export interface IoTFirmwareDefenseClientOptionalParams extends coreClient.Servi endpoint?: string; } -// @public -export type IsExpired = string; - -// @public -export type IsSelfSigned = string; - -// @public -export type IsShortKeySize = string; - -// @public -export type IsUpdateAvailable = string; - -// @public -export type IsWeakSignature = string; - // @public export enum KnownActionType { Internal = "Internal" } -// @public -export enum KnownCanaryFlag { - False = "False", - True = "True" -} - // @public export enum KnownCreatedByType { Application = "Application", @@ -527,42 +454,6 @@ export enum KnownCreatedByType { User = "User" } -// @public -export enum KnownIsExpired { - False = "False", - True = "True" -} - -// @public -export enum KnownIsSelfSigned { - False = "False", - True = "True" -} - -// @public -export enum KnownIsShortKeySize { - False = "False", - True = "True" -} - -// @public -export enum KnownIsUpdateAvailable { - False = "False", - True = "True" -} - -// @public -export enum KnownIsWeakSignature { - False = "False", - True = "True" -} - -// @public -export enum KnownNxFlag { - False = "False", - True = "True" -} - // @public export enum KnownOrigin { System = "system", @@ -570,12 +461,6 @@ export enum KnownOrigin { UserSystem = "user,system" } -// @public -export enum KnownPieFlag { - False = "False", - True = "True" -} - // @public export enum KnownProvisioningState { Accepted = "Accepted", @@ -584,12 +469,6 @@ export enum KnownProvisioningState { Succeeded = "Succeeded" } -// @public -export enum KnownRelroFlag { - False = "False", - True = "True" -} - // @public export enum KnownStatus { Analyzing = "Analyzing", @@ -600,13 +479,22 @@ export enum KnownStatus { } // @public -export enum KnownStrippedFlag { - False = "False", - True = "True" +export enum KnownSummaryName { + BinaryHardening = "BinaryHardening", + CryptoCertificate = "CryptoCertificate", + CryptoKey = "CryptoKey", + CVE = "CVE", + Firmware = "Firmware" } // @public -export type NxFlag = string; +export enum KnownSummaryType { + BinaryHardening = "BinaryHardening", + CryptoCertificate = "CryptoCertificate", + CryptoKey = "CryptoKey", + CVE = "CVE", + Firmware = "Firmware" +} // @public export interface Operation { @@ -655,7 +543,6 @@ export type Origin = string; // @public export interface PairedKey { - additionalProperties?: Record; id?: string; type?: string; } @@ -672,23 +559,37 @@ export interface PasswordHash { } // @public -export interface PasswordHashList { - nextLink?: string; - readonly value?: PasswordHash[]; +export interface PasswordHashes { + listByFirmware(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: PasswordHashesListByFirmwareOptionalParams): PagedAsyncIterableIterator; } // @public -export type PieFlag = string; +export interface PasswordHashesListByFirmwareNextOptionalParams extends coreClient.OperationOptions { +} // @public -export type ProvisioningState = string; +export type PasswordHashesListByFirmwareNextResponse = PasswordHashListResult; + +// @public +export interface PasswordHashesListByFirmwareOptionalParams extends coreClient.OperationOptions { +} + +// @public +export type PasswordHashesListByFirmwareResponse = PasswordHashListResult; + +// @public +export interface PasswordHashListResult { + nextLink?: string; + readonly value?: PasswordHashResource[]; +} // @public -export interface ProxyResource extends Resource { +export interface PasswordHashResource extends Resource { + properties?: PasswordHash; } // @public -export type RelroFlag = string; +export type ProvisioningState = string; // @public export interface Resource { @@ -698,11 +599,105 @@ export interface Resource { readonly type?: string; } +// @public +export interface SbomComponent { + componentId?: string; + componentName?: string; + filePaths?: string[]; + license?: string; + version?: string; +} + +// @public +export interface SbomComponentListResult { + nextLink?: string; + readonly value?: SbomComponentResource[]; +} + +// @public +export interface SbomComponentResource extends Resource { + properties?: SbomComponent; +} + +// @public +export interface SbomComponents { + listByFirmware(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: SbomComponentsListByFirmwareOptionalParams): PagedAsyncIterableIterator; +} + +// @public +export interface SbomComponentsListByFirmwareNextOptionalParams extends coreClient.OperationOptions { +} + +// @public +export type SbomComponentsListByFirmwareNextResponse = SbomComponentListResult; + +// @public +export interface SbomComponentsListByFirmwareOptionalParams extends coreClient.OperationOptions { +} + +// @public +export type SbomComponentsListByFirmwareResponse = SbomComponentListResult; + // @public export type Status = string; // @public -export type StrippedFlag = string; +export interface StatusMessage { + errorCode?: number; + message?: string; +} + +// @public +export interface Summaries { + get(resourceGroupName: string, workspaceName: string, firmwareId: string, summaryName: SummaryName, options?: SummariesGetOptionalParams): Promise; + listByFirmware(resourceGroupName: string, workspaceName: string, firmwareId: string, options?: SummariesListByFirmwareOptionalParams): PagedAsyncIterableIterator; +} + +// @public +export interface SummariesGetOptionalParams extends coreClient.OperationOptions { +} + +// @public +export type SummariesGetResponse = SummaryResource; + +// @public +export interface SummariesListByFirmwareNextOptionalParams extends coreClient.OperationOptions { +} + +// @public +export type SummariesListByFirmwareNextResponse = SummaryListResult; + +// @public +export interface SummariesListByFirmwareOptionalParams extends coreClient.OperationOptions { +} + +// @public +export type SummariesListByFirmwareResponse = SummaryListResult; + +// @public +export interface SummaryListResult { + nextLink?: string; + readonly value?: SummaryResource[]; +} + +// @public +export type SummaryName = string; + +// @public +export interface SummaryResource extends Resource { + readonly properties?: SummaryResourcePropertiesUnion; +} + +// @public +export interface SummaryResourceProperties { + summaryType: "Firmware" | "CVE" | "BinaryHardening" | "CryptoCertificate" | "CryptoKey"; +} + +// @public (undocumented) +export type SummaryResourcePropertiesUnion = SummaryResourceProperties | FirmwareSummary | CveSummary | BinaryHardeningSummaryResource | CryptoCertificateSummaryResource | CryptoKeySummaryResource; + +// @public +export type SummaryType = string; // @public export interface SystemData { @@ -724,13 +719,12 @@ export interface TrackedResource extends Resource { // @public export interface UrlToken { - readonly uploadUrl?: string; readonly url?: string; } // @public export interface Workspace extends TrackedResource { - readonly provisioningState?: ProvisioningState; + properties?: WorkspaceProperties; } // @public @@ -739,6 +733,11 @@ export interface WorkspaceList { readonly value?: Workspace[]; } +// @public +export interface WorkspaceProperties { + readonly provisioningState?: ProvisioningState; +} + // @public export interface Workspaces { create(resourceGroupName: string, workspaceName: string, workspace: Workspace, options?: WorkspacesCreateOptionalParams): Promise; @@ -812,7 +811,7 @@ export type WorkspacesUpdateResponse = Workspace; // @public export interface WorkspaceUpdateDefinition { - readonly provisioningState?: ProvisioningState; + properties?: WorkspaceProperties; } // (No @packageDocumentation comment for this package) diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoKeyListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/binaryHardeningListByFirmwareSample.ts similarity index 54% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoKeyListSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/binaryHardeningListByFirmwareSample.ts index 06c83a901318..4573ecc76a26 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoKeyListSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/binaryHardeningListByFirmwareSample.ts @@ -15,26 +15,26 @@ import * as dotenv from "dotenv"; dotenv.config(); /** - * This sample demonstrates how to The operation to list all crypto keys for a firmware. + * This sample demonstrates how to Lists binary hardening analysis results of a firmware. * - * @summary The operation to list all crypto keys for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json + * @summary Lists binary hardening analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json */ -async function firmwareListGenerateCryptoKeyListMaximumSetGen() { +async function binaryHardeningListByFirmwareMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoKeyList( + for await (let item of client.binaryHardening.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -42,27 +42,26 @@ async function firmwareListGenerateCryptoKeyListMaximumSetGen() { } /** - * This sample demonstrates how to The operation to list all crypto keys for a firmware. + * This sample demonstrates how to Lists binary hardening analysis results of a firmware. * - * @summary The operation to list all crypto keys for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MinimumSet_Gen.json + * @summary Lists binary hardening analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MinimumSet_Gen.json */ -async function firmwareListGenerateCryptoKeyListMinimumSetGen() { +async function binaryHardeningListByFirmwareMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoKeyList( + for await (let item of client.binaryHardening.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -70,8 +69,8 @@ async function firmwareListGenerateCryptoKeyListMinimumSetGen() { } async function main() { - firmwareListGenerateCryptoKeyListMaximumSetGen(); - firmwareListGenerateCryptoKeyListMinimumSetGen(); + binaryHardeningListByFirmwareMaximumSetGen(); + binaryHardeningListByFirmwareMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCryptoCertificateListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cryptoCertificatesListByFirmwareSample.ts similarity index 53% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCryptoCertificateListSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cryptoCertificatesListByFirmwareSample.ts index d3ba4f6cd80b..6ccda8905df0 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCryptoCertificateListSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cryptoCertificatesListByFirmwareSample.ts @@ -15,26 +15,26 @@ import * as dotenv from "dotenv"; dotenv.config(); /** - * This sample demonstrates how to The operation to list all crypto certificates for a firmware. + * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware. * - * @summary The operation to list all crypto certificates for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json + * @summary Lists cryptographic certificate analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json */ -async function firmwareListGenerateCryptoCertificateListMaximumSetGen() { +async function cryptoCertificatesListByFirmwareMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoCertificateList( + for await (let item of client.cryptoCertificates.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -42,27 +42,26 @@ async function firmwareListGenerateCryptoCertificateListMaximumSetGen() { } /** - * This sample demonstrates how to The operation to list all crypto certificates for a firmware. + * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware. * - * @summary The operation to list all crypto certificates for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MinimumSet_Gen.json + * @summary Lists cryptographic certificate analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MinimumSet_Gen.json */ -async function firmwareListGenerateCryptoCertificateListMinimumSetGen() { +async function cryptoCertificatesListByFirmwareMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoCertificateList( + for await (let item of client.cryptoCertificates.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -70,8 +69,8 @@ async function firmwareListGenerateCryptoCertificateListMinimumSetGen() { } async function main() { - firmwareListGenerateCryptoCertificateListMaximumSetGen(); - firmwareListGenerateCryptoCertificateListMinimumSetGen(); + cryptoCertificatesListByFirmwareMaximumSetGen(); + cryptoCertificatesListByFirmwareMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCryptoKeyListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cryptoKeysListByFirmwareSample.ts similarity index 54% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCryptoKeyListSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cryptoKeysListByFirmwareSample.ts index 06c83a901318..145eab076365 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCryptoKeyListSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cryptoKeysListByFirmwareSample.ts @@ -15,26 +15,26 @@ import * as dotenv from "dotenv"; dotenv.config(); /** - * This sample demonstrates how to The operation to list all crypto keys for a firmware. + * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware. * - * @summary The operation to list all crypto keys for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json + * @summary Lists cryptographic key analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json */ -async function firmwareListGenerateCryptoKeyListMaximumSetGen() { +async function cryptoKeysListByFirmwareMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoKeyList( + for await (let item of client.cryptoKeys.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -42,27 +42,26 @@ async function firmwareListGenerateCryptoKeyListMaximumSetGen() { } /** - * This sample demonstrates how to The operation to list all crypto keys for a firmware. + * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware. * - * @summary The operation to list all crypto keys for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MinimumSet_Gen.json + * @summary Lists cryptographic key analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MinimumSet_Gen.json */ -async function firmwareListGenerateCryptoKeyListMinimumSetGen() { +async function cryptoKeysListByFirmwareMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoKeyList( + for await (let item of client.cryptoKeys.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -70,8 +69,8 @@ async function firmwareListGenerateCryptoKeyListMinimumSetGen() { } async function main() { - firmwareListGenerateCryptoKeyListMaximumSetGen(); - firmwareListGenerateCryptoKeyListMinimumSetGen(); + cryptoKeysListByFirmwareMaximumSetGen(); + cryptoKeysListByFirmwareMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cvesListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cvesListByFirmwareSample.ts new file mode 100644 index 000000000000..a3eb07fd0ef6 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/cvesListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists CVE analysis results of a firmware. + * + * @summary Lists CVE analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json + */ +async function cvesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cves.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists CVE analysis results of a firmware. + * + * @summary Lists CVE analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MinimumSet_Gen.json + */ +async function cvesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cves.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + cvesListByFirmwareMaximumSetGen(); + cvesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.ts deleted file mode 100644 index e7a7588a96fe..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateBinaryHardeningDetailsSample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to get binary hardening details for a firmware. - * - * @summary The operation to get binary hardening details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MaximumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningDetailsMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get binary hardening details for a firmware. - * - * @summary The operation to get binary hardening details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MinimumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningDetailsMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateBinaryHardeningDetailsMaximumSetGen(); - firmwareGenerateBinaryHardeningDetailsMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateBinaryHardeningSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateBinaryHardeningSummarySample.ts deleted file mode 100644 index ab8f60e77d27..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateBinaryHardeningSummarySample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware. - * - * @summary The operation to list the binary hardening summary percentages for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware. - * - * @summary The operation to list the binary hardening summary percentages for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateBinaryHardeningSummaryMaximumSetGen(); - firmwareGenerateBinaryHardeningSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateComponentDetailsSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateComponentDetailsSample.ts deleted file mode 100644 index 8548c3a12726..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateComponentDetailsSample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to get component details for a firmware. - * - * @summary The operation to get component details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MaximumSet_Gen.json - */ -async function firmwareGenerateComponentDetailsMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateComponentDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get component details for a firmware. - * - * @summary The operation to get component details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MinimumSet_Gen.json - */ -async function firmwareGenerateComponentDetailsMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateComponentDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateComponentDetailsMaximumSetGen(); - firmwareGenerateComponentDetailsMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCryptoCertificateSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCryptoCertificateSummarySample.ts deleted file mode 100644 index 3f1be2ccf326..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCryptoCertificateSummarySample.ts +++ /dev/null @@ -1,71 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCryptoCertificateSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; - const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoCertificateSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCryptoCertificateSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoCertificateSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateCryptoCertificateSummaryMaximumSetGen(); - firmwareGenerateCryptoCertificateSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCryptoKeySummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCryptoKeySummarySample.ts deleted file mode 100644 index a4cfe4416486..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCryptoKeySummarySample.ts +++ /dev/null @@ -1,71 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCryptoKeySummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; - const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoKeySummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCryptoKeySummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoKeySummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateCryptoKeySummaryMaximumSetGen(); - firmwareGenerateCryptoKeySummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCveSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCveSummarySample.ts deleted file mode 100644 index 418a1806ca16..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateCveSummarySample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image. - * - * @summary The operation to provide a high level summary of the CVEs reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCveSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCveSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image. - * - * @summary The operation to provide a high level summary of the CVEs reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCveSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCveSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateCveSummaryMaximumSetGen(); - firmwareGenerateCveSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateBinaryHardeningListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateBinaryHardeningListSample.ts deleted file mode 100644 index 7371a8e18d1e..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateBinaryHardeningListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all binary hardening result for a firmware. - * - * @summary The operation to list all binary hardening result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MaximumSet_Gen.json - */ -async function firmwareListGenerateBinaryHardeningListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateBinaryHardeningList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all binary hardening result for a firmware. - * - * @summary The operation to list all binary hardening result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MinimumSet_Gen.json - */ -async function firmwareListGenerateBinaryHardeningListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateBinaryHardeningList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateBinaryHardeningListMaximumSetGen(); - firmwareListGenerateBinaryHardeningListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateComponentListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateComponentListSample.ts deleted file mode 100644 index cfe7b29d06e8..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateComponentListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all components result for a firmware. - * - * @summary The operation to list all components result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MaximumSet_Gen.json - */ -async function firmwareListGenerateComponentListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateComponentList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all components result for a firmware. - * - * @summary The operation to list all components result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MinimumSet_Gen.json - */ -async function firmwareListGenerateComponentListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateComponentList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateComponentListMaximumSetGen(); - firmwareListGenerateComponentListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCveListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCveListSample.ts deleted file mode 100644 index 370d3f5ef604..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGenerateCveListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all cve results for a firmware. - * - * @summary The operation to list all cve results for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MaximumSet_Gen.json - */ -async function firmwareListGenerateCveListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCveList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all cve results for a firmware. - * - * @summary The operation to list all cve results for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MinimumSet_Gen.json - */ -async function firmwareListGenerateCveListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCveList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateCveListMaximumSetGen(); - firmwareListGenerateCveListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGeneratePasswordHashListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGeneratePasswordHashListSample.ts deleted file mode 100644 index b14e06e4785d..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListGeneratePasswordHashListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all password hashes for a firmware. - * - * @summary The operation to list all password hashes for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MaximumSet_Gen.json - */ -async function firmwareListGeneratePasswordHashListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGeneratePasswordHashList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all password hashes for a firmware. - * - * @summary The operation to list all password hashes for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MinimumSet_Gen.json - */ -async function firmwareListGeneratePasswordHashListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGeneratePasswordHashList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGeneratePasswordHashListMaximumSetGen(); - firmwareListGeneratePasswordHashListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareCreateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresCreateSample.ts similarity index 72% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareCreateSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresCreateSample.ts index f54cad6e8208..73feeaa5d01b 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareCreateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresCreateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { Firmware, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,9 +21,9 @@ dotenv.config(); * This sample demonstrates how to The operation to create a firmware. * * @summary The operation to create a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json */ -async function firmwareCreateMaximumSetGen() { +async function firmwaresCreateMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -33,22 +33,24 @@ async function firmwareCreateMaximumSetGen() { const workspaceName = "A7"; const firmwareId = "umrkdttp"; const firmware: Firmware = { - description: "uz", - fileName: "wresexxulcdsdd", - fileSize: 17, - model: "f", - status: "Pending", - statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], - vendor: "vycmdhgtmepcptyoubztiuudpkcpd", - version: "s" + properties: { + description: "uz", + fileName: "wresexxulcdsdd", + fileSize: 17, + model: "f", + status: "Pending", + statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], + vendor: "vycmdhgtmepcptyoubztiuudpkcpd", + version: "s", + }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.create( + const result = await client.firmwares.create( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } @@ -57,9 +59,9 @@ async function firmwareCreateMaximumSetGen() { * This sample demonstrates how to The operation to create a firmware. * * @summary The operation to create a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MinimumSet_Gen.json */ -async function firmwareCreateMinimumSetGen() { +async function firmwaresCreateMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -71,18 +73,18 @@ async function firmwareCreateMinimumSetGen() { const firmware: Firmware = {}; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.create( + const result = await client.firmwares.create( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } async function main() { - firmwareCreateMaximumSetGen(); - firmwareCreateMinimumSetGen(); + firmwaresCreateMaximumSetGen(); + firmwaresCreateMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareDeleteSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresDeleteSample.ts similarity index 79% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareDeleteSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresDeleteSample.ts index 35c5d3750a02..fa8be1065a9a 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareDeleteSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresDeleteSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to The operation to delete a firmware. * * @summary The operation to delete a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json */ -async function firmwareDeleteMaximumSetGen() { +async function firmwaresDeleteMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareDeleteMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.delete( + const result = await client.firmwares.delete( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareDeleteMaximumSetGen() { * This sample demonstrates how to The operation to delete a firmware. * * @summary The operation to delete a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MinimumSet_Gen.json */ -async function firmwareDeleteMinimumSetGen() { +async function firmwaresDeleteMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareDeleteMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.delete( + const result = await client.firmwares.delete( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareDeleteMaximumSetGen(); - firmwareDeleteMinimumSetGen(); + firmwaresDeleteMaximumSetGen(); + firmwaresDeleteMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateDownloadUrlSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGenerateDownloadUrlSample.ts similarity index 76% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateDownloadUrlSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGenerateDownloadUrlSample.ts index 3cb301856870..96dd159592a8 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateDownloadUrlSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGenerateDownloadUrlSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to The operation to a url for file download. * * @summary The operation to a url for file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MaximumSet_Gen.json */ -async function firmwareGenerateDownloadUrlMaximumSetGen() { +async function firmwaresGenerateDownloadUrlMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareGenerateDownloadUrlMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateDownloadUrl( + const result = await client.firmwares.generateDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareGenerateDownloadUrlMaximumSetGen() { * This sample demonstrates how to The operation to a url for file download. * * @summary The operation to a url for file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MinimumSet_Gen.json */ -async function firmwareGenerateDownloadUrlMinimumSetGen() { +async function firmwaresGenerateDownloadUrlMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareGenerateDownloadUrlMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateDownloadUrl( + const result = await client.firmwares.generateDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareGenerateDownloadUrlMaximumSetGen(); - firmwareGenerateDownloadUrlMinimumSetGen(); + firmwaresGenerateDownloadUrlMaximumSetGen(); + firmwaresGenerateDownloadUrlMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateFilesystemDownloadUrlSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.ts similarity index 74% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateFilesystemDownloadUrlSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.ts index 96974d02d1f3..1f5718987729 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateFilesystemDownloadUrlSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGenerateFilesystemDownloadUrlSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to The operation to a url for tar file download. * * @summary The operation to a url for tar file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json */ -async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { +async function firmwaresGenerateFilesystemDownloadUrlMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateFilesystemDownloadUrl( + const result = await client.firmwares.generateFilesystemDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { * This sample demonstrates how to The operation to a url for tar file download. * * @summary The operation to a url for tar file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json */ -async function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() { +async function firmwaresGenerateFilesystemDownloadUrlMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateFilesystemDownloadUrl( + const result = await client.firmwares.generateFilesystemDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareGenerateFilesystemDownloadUrlMaximumSetGen(); - firmwareGenerateFilesystemDownloadUrlMinimumSetGen(); + firmwaresGenerateFilesystemDownloadUrlMaximumSetGen(); + firmwaresGenerateFilesystemDownloadUrlMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGetSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGetSample.ts similarity index 79% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGetSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGetSample.ts index 1cfb3f735e7f..70d35c3ab040 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGetSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresGetSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to Get firmware. * * @summary Get firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MaximumSet_Gen.json */ -async function firmwareGetMaximumSetGen() { +async function firmwaresGetMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareGetMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.get( + const result = await client.firmwares.get( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareGetMaximumSetGen() { * This sample demonstrates how to Get firmware. * * @summary Get firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MinimumSet_Gen.json */ -async function firmwareGetMinimumSetGen() { +async function firmwaresGetMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareGetMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.get( + const result = await client.firmwares.get( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareGetMaximumSetGen(); - firmwareGetMinimumSetGen(); + firmwaresGetMaximumSetGen(); + firmwaresGetMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListByWorkspaceSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresListByWorkspaceSample.ts similarity index 77% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListByWorkspaceSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresListByWorkspaceSample.ts index 02e3e43dc707..ab3741f9f403 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListByWorkspaceSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresListByWorkspaceSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to Lists all of firmwares inside a workspace. * * @summary Lists all of firmwares inside a workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MaximumSet_Gen.json */ -async function firmwareListByWorkspaceMaximumSetGen() { +async function firmwaresListByWorkspaceMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,9 +31,9 @@ async function firmwareListByWorkspaceMaximumSetGen() { const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listByWorkspace( + for await (let item of client.firmwares.listByWorkspace( resourceGroupName, - workspaceName + workspaceName, )) { resArray.push(item); } @@ -44,9 +44,9 @@ async function firmwareListByWorkspaceMaximumSetGen() { * This sample demonstrates how to Lists all of firmwares inside a workspace. * * @summary Lists all of firmwares inside a workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MinimumSet_Gen.json */ -async function firmwareListByWorkspaceMinimumSetGen() { +async function firmwaresListByWorkspaceMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -57,9 +57,9 @@ async function firmwareListByWorkspaceMinimumSetGen() { const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listByWorkspace( + for await (let item of client.firmwares.listByWorkspace( resourceGroupName, - workspaceName + workspaceName, )) { resArray.push(item); } @@ -67,8 +67,8 @@ async function firmwareListByWorkspaceMinimumSetGen() { } async function main() { - firmwareListByWorkspaceMaximumSetGen(); - firmwareListByWorkspaceMinimumSetGen(); + firmwaresListByWorkspaceMaximumSetGen(); + firmwaresListByWorkspaceMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareUpdateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresUpdateSample.ts similarity index 72% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareUpdateSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresUpdateSample.ts index 97aada7c255f..5a2589556ce7 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareUpdateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwaresUpdateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { FirmwareUpdateDefinition, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,9 +21,9 @@ dotenv.config(); * This sample demonstrates how to The operation to update firmware. * * @summary The operation to update firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MaximumSet_Gen.json */ -async function firmwareUpdateMaximumSetGen() { +async function firmwaresUpdateMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -33,22 +33,24 @@ async function firmwareUpdateMaximumSetGen() { const workspaceName = "A7"; const firmwareId = "umrkdttp"; const firmware: FirmwareUpdateDefinition = { - description: "uz", - fileName: "wresexxulcdsdd", - fileSize: 17, - model: "f", - status: "Pending", - statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], - vendor: "vycmdhgtmepcptyoubztiuudpkcpd", - version: "s" + properties: { + description: "uz", + fileName: "wresexxulcdsdd", + fileSize: 17, + model: "f", + status: "Pending", + statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], + vendor: "vycmdhgtmepcptyoubztiuudpkcpd", + version: "s", + }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.update( + const result = await client.firmwares.update( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } @@ -57,9 +59,9 @@ async function firmwareUpdateMaximumSetGen() { * This sample demonstrates how to The operation to update firmware. * * @summary The operation to update firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MinimumSet_Gen.json */ -async function firmwareUpdateMinimumSetGen() { +async function firmwaresUpdateMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -71,18 +73,18 @@ async function firmwareUpdateMinimumSetGen() { const firmware: FirmwareUpdateDefinition = {}; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.update( + const result = await client.firmwares.update( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } async function main() { - firmwareUpdateMaximumSetGen(); - firmwareUpdateMinimumSetGen(); + firmwaresUpdateMaximumSetGen(); + firmwaresUpdateMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/operationsListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/operationsListSample.ts index 55f91946e6be..dbdf7b4001bf 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/operationsListSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/operationsListSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Lists the operations for this resource provider * * @summary Lists the operations for this resource provider - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MaximumSet_Gen.json */ async function operationsListMaximumSetGen() { const subscriptionId = @@ -37,7 +37,7 @@ async function operationsListMaximumSetGen() { * This sample demonstrates how to Lists the operations for this resource provider * * @summary Lists the operations for this resource provider - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MinimumSet_Gen.json */ async function operationsListMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/passwordHashesListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/passwordHashesListByFirmwareSample.ts new file mode 100644 index 000000000000..4b82d9fc178a --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/passwordHashesListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists password hash analysis results of a firmware. + * + * @summary Lists password hash analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MaximumSet_Gen.json + */ +async function passwordHashesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.passwordHashes.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists password hash analysis results of a firmware. + * + * @summary Lists password hash analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MinimumSet_Gen.json + */ +async function passwordHashesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.passwordHashes.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + passwordHashesListByFirmwareMaximumSetGen(); + passwordHashesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/sbomComponentsListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/sbomComponentsListByFirmwareSample.ts new file mode 100644 index 000000000000..108b8d25a332 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/sbomComponentsListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists SBOM analysis results of a firmware. + * + * @summary Lists SBOM analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MaximumSet_Gen.json + */ +async function sbomComponentsListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.sbomComponents.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists SBOM analysis results of a firmware. + * + * @summary Lists SBOM analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MinimumSet_Gen.json + */ +async function sbomComponentsListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.sbomComponents.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + sbomComponentsListByFirmwareMaximumSetGen(); + sbomComponentsListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/summariesGetSample.ts similarity index 50% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateSummarySample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/summariesGetSample.ts index 6483cb5e7e29..e03c299125c4 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateSummarySample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/summariesGetSample.ts @@ -15,58 +15,60 @@ import * as dotenv from "dotenv"; dotenv.config(); /** - * This sample demonstrates how to The operation to get a scan summary. + * This sample demonstrates how to Get an analysis result summary of a firmware by name. * - * @summary The operation to get a scan summary. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MaximumSet_Gen.json + * @summary Get an analysis result summary of a firmware by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MaximumSet_Gen.json */ -async function firmwareGenerateSummaryMaximumSetGen() { +async function summariesGetMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const summaryName = "Firmware"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateSummary( + const result = await client.summaries.get( resourceGroupName, workspaceName, - firmwareId + firmwareId, + summaryName, ); console.log(result); } /** - * This sample demonstrates how to The operation to get a scan summary. + * This sample demonstrates how to Get an analysis result summary of a firmware by name. * - * @summary The operation to get a scan summary. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MinimumSet_Gen.json + * @summary Get an analysis result summary of a firmware by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MinimumSet_Gen.json */ -async function firmwareGenerateSummaryMinimumSetGen() { +async function summariesGetMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const summaryName = "Firmware"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateSummary( + const result = await client.summaries.get( resourceGroupName, workspaceName, - firmwareId + firmwareId, + summaryName, ); console.log(result); } async function main() { - firmwareGenerateSummaryMaximumSetGen(); - firmwareGenerateSummaryMinimumSetGen(); + summariesGetMaximumSetGen(); + summariesGetMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/summariesListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/summariesListByFirmwareSample.ts new file mode 100644 index 000000000000..c0282fce9044 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/summariesListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * + * @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MaximumSet_Gen.json + */ +async function summariesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.summaries.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * + * @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MinimumSet_Gen.json + */ +async function summariesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.summaries.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + summariesListByFirmwareMaximumSetGen(); + summariesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesCreateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesCreateSample.ts index ee4bdd522b68..0e625a1aa8e0 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesCreateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesCreateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { Workspace, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,7 +21,7 @@ dotenv.config(); * This sample demonstrates how to The operation to create or update a firmware analysis workspace. * * @summary The operation to create or update a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MaximumSet_Gen.json */ async function workspacesCreateMaximumSetGen() { const subscriptionId = @@ -32,14 +32,15 @@ async function workspacesCreateMaximumSetGen() { const workspaceName = "E___-3"; const workspace: Workspace = { location: "jjwbseilitjgdrhbvvkwviqj", - tags: { key450: "rzqqumbpfsbibnpirsm" } + properties: {}, + tags: { key450: "rzqqumbpfsbibnpirsm" }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.create( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } @@ -48,7 +49,7 @@ async function workspacesCreateMaximumSetGen() { * This sample demonstrates how to The operation to create or update a firmware analysis workspace. * * @summary The operation to create or update a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MinimumSet_Gen.json */ async function workspacesCreateMinimumSetGen() { const subscriptionId = @@ -63,7 +64,7 @@ async function workspacesCreateMinimumSetGen() { const result = await client.workspaces.create( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesDeleteSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesDeleteSample.ts index ab29667e42f3..7b4b69656d09 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesDeleteSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesDeleteSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to The operation to delete a firmware analysis workspace. * * @summary The operation to delete a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MaximumSet_Gen.json */ async function workspacesDeleteMaximumSetGen() { const subscriptionId = @@ -31,7 +31,7 @@ async function workspacesDeleteMaximumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.delete( resourceGroupName, - workspaceName + workspaceName, ); console.log(result); } @@ -40,7 +40,7 @@ async function workspacesDeleteMaximumSetGen() { * This sample demonstrates how to The operation to delete a firmware analysis workspace. * * @summary The operation to delete a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MinimumSet_Gen.json */ async function workspacesDeleteMinimumSetGen() { const subscriptionId = @@ -53,7 +53,7 @@ async function workspacesDeleteMinimumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.delete( resourceGroupName, - workspaceName + workspaceName, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGenerateUploadUrlSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGenerateUploadUrlSample.ts index e795809c7f5c..5ce164ee4a27 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGenerateUploadUrlSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGenerateUploadUrlSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { GenerateUploadUrlRequest, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,7 +21,7 @@ dotenv.config(); * This sample demonstrates how to The operation to get a url for file upload. * * @summary The operation to get a url for file upload. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json */ async function workspacesGenerateUploadUrlMaximumSetGen() { const subscriptionId = @@ -31,14 +31,14 @@ async function workspacesGenerateUploadUrlMaximumSetGen() { process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces"; const workspaceName = "E___-3"; const generateUploadUrl: GenerateUploadUrlRequest = { - firmwareId: "ytsfprbywi" + firmwareId: "ytsfprbywi", }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.generateUploadUrl( resourceGroupName, workspaceName, - generateUploadUrl + generateUploadUrl, ); console.log(result); } @@ -47,7 +47,7 @@ async function workspacesGenerateUploadUrlMaximumSetGen() { * This sample demonstrates how to The operation to get a url for file upload. * * @summary The operation to get a url for file upload. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MinimumSet_Gen.json */ async function workspacesGenerateUploadUrlMinimumSetGen() { const subscriptionId = @@ -62,7 +62,7 @@ async function workspacesGenerateUploadUrlMinimumSetGen() { const result = await client.workspaces.generateUploadUrl( resourceGroupName, workspaceName, - generateUploadUrl + generateUploadUrl, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGetSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGetSample.ts index 505ba01ca2f8..26c376faa749 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGetSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesGetSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Get firmware analysis workspace. * * @summary Get firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MaximumSet_Gen.json */ async function workspacesGetMaximumSetGen() { const subscriptionId = @@ -37,7 +37,7 @@ async function workspacesGetMaximumSetGen() { * This sample demonstrates how to Get firmware analysis workspace. * * @summary Get firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MinimumSet_Gen.json */ async function workspacesGetMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListByResourceGroupSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListByResourceGroupSample.ts index 526fcbc2417b..f2fb56a6c1ba 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListByResourceGroupSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListByResourceGroupSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group. * * @summary Lists all of the firmware analysis workspaces in the specified resource group. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json */ async function workspacesListByResourceGroupMaximumSetGen() { const subscriptionId = @@ -30,7 +30,7 @@ async function workspacesListByResourceGroupMaximumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); for await (let item of client.workspaces.listByResourceGroup( - resourceGroupName + resourceGroupName, )) { resArray.push(item); } @@ -41,7 +41,7 @@ async function workspacesListByResourceGroupMaximumSetGen() { * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group. * * @summary Lists all of the firmware analysis workspaces in the specified resource group. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MinimumSet_Gen.json */ async function workspacesListByResourceGroupMinimumSetGen() { const subscriptionId = @@ -53,7 +53,7 @@ async function workspacesListByResourceGroupMinimumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); for await (let item of client.workspaces.listByResourceGroup( - resourceGroupName + resourceGroupName, )) { resArray.push(item); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListBySubscriptionSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListBySubscriptionSample.ts index cfdd984e4ca6..d5ec9dccd511 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListBySubscriptionSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesListBySubscriptionSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription. * * @summary Lists all of the firmware analysis workspaces in the specified subscription. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json */ async function workspacesListBySubscriptionMaximumSetGen() { const subscriptionId = @@ -37,7 +37,7 @@ async function workspacesListBySubscriptionMaximumSetGen() { * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription. * * @summary Lists all of the firmware analysis workspaces in the specified subscription. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MinimumSet_Gen.json */ async function workspacesListBySubscriptionMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesUpdateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesUpdateSample.ts index cbbc90073a35..08780161f3ca 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesUpdateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/workspacesUpdateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { WorkspaceUpdateDefinition, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,7 +21,7 @@ dotenv.config(); * This sample demonstrates how to The operation to update a firmware analysis workspaces. * * @summary The operation to update a firmware analysis workspaces. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MaximumSet_Gen.json */ async function workspacesUpdateMaximumSetGen() { const subscriptionId = @@ -30,13 +30,13 @@ async function workspacesUpdateMaximumSetGen() { const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces"; const workspaceName = "E___-3"; - const workspace: WorkspaceUpdateDefinition = {}; + const workspace: WorkspaceUpdateDefinition = { properties: {} }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.update( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } @@ -45,7 +45,7 @@ async function workspacesUpdateMaximumSetGen() { * This sample demonstrates how to The operation to update a firmware analysis workspaces. * * @summary The operation to update a firmware analysis workspaces. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MinimumSet_Gen.json */ async function workspacesUpdateMinimumSetGen() { const subscriptionId = @@ -60,7 +60,7 @@ async function workspacesUpdateMinimumSetGen() { const result = await client.workspaces.update( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/README.md b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/README.md deleted file mode 100644 index fd47e9048144..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/README.md +++ /dev/null @@ -1,104 +0,0 @@ -# client library samples for JavaScript (Beta) - -These sample programs show how to use the JavaScript client libraries for in some common scenarios. - -| **File Name** | **Description** | -| ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | -| [firmwareCreateSample.js][firmwarecreatesample] | The operation to create a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MaximumSet_Gen.json | -| [firmwareDeleteSample.js][firmwaredeletesample] | The operation to delete a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MaximumSet_Gen.json | -| [firmwareGenerateBinaryHardeningDetailsSample.js][firmwaregeneratebinaryhardeningdetailssample] | The operation to get binary hardening details for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MaximumSet_Gen.json | -| [firmwareGenerateBinaryHardeningSummarySample.js][firmwaregeneratebinaryhardeningsummarysample] | The operation to list the binary hardening summary percentages for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MaximumSet_Gen.json | -| [firmwareGenerateComponentDetailsSample.js][firmwaregeneratecomponentdetailssample] | The operation to get component details for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MaximumSet_Gen.json | -| [firmwareGenerateCryptoCertificateSummarySample.js][firmwaregeneratecryptocertificatesummarysample] | The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MaximumSet_Gen.json | -| [firmwareGenerateCryptoKeySummarySample.js][firmwaregeneratecryptokeysummarysample] | The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MaximumSet_Gen.json | -| [firmwareGenerateCveSummarySample.js][firmwaregeneratecvesummarysample] | The operation to provide a high level summary of the CVEs reported for the firmware image. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MaximumSet_Gen.json | -| [firmwareGenerateDownloadUrlSample.js][firmwaregeneratedownloadurlsample] | The operation to a url for file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MaximumSet_Gen.json | -| [firmwareGenerateFilesystemDownloadUrlSample.js][firmwaregeneratefilesystemdownloadurlsample] | The operation to a url for tar file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json | -| [firmwareGenerateSummarySample.js][firmwaregeneratesummarysample] | The operation to get a scan summary. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MaximumSet_Gen.json | -| [firmwareGetSample.js][firmwaregetsample] | Get firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MaximumSet_Gen.json | -| [firmwareListByWorkspaceSample.js][firmwarelistbyworkspacesample] | Lists all of firmwares inside a workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MaximumSet_Gen.json | -| [firmwareListGenerateBinaryHardeningListSample.js][firmwarelistgeneratebinaryhardeninglistsample] | The operation to list all binary hardening result for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MaximumSet_Gen.json | -| [firmwareListGenerateComponentListSample.js][firmwarelistgeneratecomponentlistsample] | The operation to list all components result for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MaximumSet_Gen.json | -| [firmwareListGenerateCryptoCertificateListSample.js][firmwarelistgeneratecryptocertificatelistsample] | The operation to list all crypto certificates for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json | -| [firmwareListGenerateCryptoKeyListSample.js][firmwarelistgeneratecryptokeylistsample] | The operation to list all crypto keys for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json | -| [firmwareListGenerateCveListSample.js][firmwarelistgeneratecvelistsample] | The operation to list all cve results for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MaximumSet_Gen.json | -| [firmwareListGeneratePasswordHashListSample.js][firmwarelistgeneratepasswordhashlistsample] | The operation to list all password hashes for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MaximumSet_Gen.json | -| [firmwareUpdateSample.js][firmwareupdatesample] | The operation to update firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MaximumSet_Gen.json | -| [operationsListSample.js][operationslistsample] | Lists the operations for this resource provider x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MaximumSet_Gen.json | -| [workspacesCreateSample.js][workspacescreatesample] | The operation to create or update a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MaximumSet_Gen.json | -| [workspacesDeleteSample.js][workspacesdeletesample] | The operation to delete a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MaximumSet_Gen.json | -| [workspacesGenerateUploadUrlSample.js][workspacesgenerateuploadurlsample] | The operation to get a url for file upload. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json | -| [workspacesGetSample.js][workspacesgetsample] | Get firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MaximumSet_Gen.json | -| [workspacesListByResourceGroupSample.js][workspaceslistbyresourcegroupsample] | Lists all of the firmware analysis workspaces in the specified resource group. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json | -| [workspacesListBySubscriptionSample.js][workspaceslistbysubscriptionsample] | Lists all of the firmware analysis workspaces in the specified subscription. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json | -| [workspacesUpdateSample.js][workspacesupdatesample] | The operation to update a firmware analysis workspaces. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MaximumSet_Gen.json | - -## Prerequisites - -The sample programs are compatible with [LTS versions of Node.js](https://github.com/nodejs/release#release-schedule). - -You need [an Azure subscription][freesub] to run these sample programs. - -Samples retrieve credentials to access the service endpoint from environment variables. Alternatively, edit the source code to include the appropriate credentials. See each individual sample for details on which environment variables/credentials it requires to function. - -Adapting the samples to run in the browser may require some additional consideration. For details, please see the [package README][package]. - -## Setup - -To run the samples using the published version of the package: - -1. Install the dependencies using `npm`: - -```bash -npm install -``` - -2. Edit the file `sample.env`, adding the correct credentials to access the Azure service and run the samples. Then rename the file from `sample.env` to just `.env`. The sample programs will read this file automatically. - -3. Run whichever samples you like (note that some samples may require additional setup, see the table above): - -```bash -node firmwareCreateSample.js -``` - -Alternatively, run a single sample with the correct environment variables set (setting up the `.env` file is not required if you do this), for example (cross-platform): - -```bash -npx cross-env IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID="" IOTFIRMWAREDEFENSE_RESOURCE_GROUP="" node firmwareCreateSample.js -``` - -## Next Steps - -Take a look at our [API Documentation][apiref] for more information about the APIs that are available in the clients. - -[firmwarecreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareCreateSample.js -[firmwaredeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareDeleteSample.js -[firmwaregeneratebinaryhardeningdetailssample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningDetailsSample.js -[firmwaregeneratebinaryhardeningsummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningSummarySample.js -[firmwaregeneratecomponentdetailssample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateComponentDetailsSample.js -[firmwaregeneratecryptocertificatesummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoCertificateSummarySample.js -[firmwaregeneratecryptokeysummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoKeySummarySample.js -[firmwaregeneratecvesummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCveSummarySample.js -[firmwaregeneratedownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateDownloadUrlSample.js -[firmwaregeneratefilesystemdownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateFilesystemDownloadUrlSample.js -[firmwaregeneratesummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateSummarySample.js -[firmwaregetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGetSample.js -[firmwarelistbyworkspacesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListByWorkspaceSample.js -[firmwarelistgeneratebinaryhardeninglistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateBinaryHardeningListSample.js -[firmwarelistgeneratecomponentlistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateComponentListSample.js -[firmwarelistgeneratecryptocertificatelistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoCertificateListSample.js -[firmwarelistgeneratecryptokeylistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoKeyListSample.js -[firmwarelistgeneratecvelistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCveListSample.js -[firmwarelistgeneratepasswordhashlistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGeneratePasswordHashListSample.js -[firmwareupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareUpdateSample.js -[operationslistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/operationsListSample.js -[workspacescreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesCreateSample.js -[workspacesdeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesDeleteSample.js -[workspacesgenerateuploadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGenerateUploadUrlSample.js -[workspacesgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGetSample.js -[workspaceslistbyresourcegroupsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListByResourceGroupSample.js -[workspaceslistbysubscriptionsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListBySubscriptionSample.js -[workspacesupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesUpdateSample.js -[apiref]: https://docs.microsoft.com/javascript/api/@azure/arm-iotfirmwaredefense?view=azure-node-preview -[freesub]: https://azure.microsoft.com/free/ -[package]: https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningDetailsSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningDetailsSample.js deleted file mode 100644 index f394a6f55725..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningDetailsSample.js +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to get binary hardening details for a firmware. - * - * @summary The operation to get binary hardening details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MaximumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningDetailsMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningDetails( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get binary hardening details for a firmware. - * - * @summary The operation to get binary hardening details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MinimumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningDetailsMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningDetails( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -async function main() { - firmwareGenerateBinaryHardeningDetailsMaximumSetGen(); - firmwareGenerateBinaryHardeningDetailsMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningSummarySample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningSummarySample.js deleted file mode 100644 index 3f06c7c81282..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateBinaryHardeningSummarySample.js +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware. - * - * @summary The operation to list the binary hardening summary percentages for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware. - * - * @summary The operation to list the binary hardening summary percentages for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -async function main() { - firmwareGenerateBinaryHardeningSummaryMaximumSetGen(); - firmwareGenerateBinaryHardeningSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateComponentDetailsSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateComponentDetailsSample.js deleted file mode 100644 index 2b481abb0784..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateComponentDetailsSample.js +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to get component details for a firmware. - * - * @summary The operation to get component details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MaximumSet_Gen.json - */ -async function firmwareGenerateComponentDetailsMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateComponentDetails( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get component details for a firmware. - * - * @summary The operation to get component details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MinimumSet_Gen.json - */ -async function firmwareGenerateComponentDetailsMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateComponentDetails( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -async function main() { - firmwareGenerateComponentDetailsMaximumSetGen(); - firmwareGenerateComponentDetailsMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoCertificateSummarySample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoCertificateSummarySample.js deleted file mode 100644 index e60400edf739..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoCertificateSummarySample.js +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCryptoCertificateSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; - const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoCertificateSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCryptoCertificateSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoCertificateSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -async function main() { - firmwareGenerateCryptoCertificateSummaryMaximumSetGen(); - firmwareGenerateCryptoCertificateSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoKeySummarySample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoKeySummarySample.js deleted file mode 100644 index 0f6bd59268a8..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCryptoKeySummarySample.js +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCryptoKeySummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; - const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoKeySummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCryptoKeySummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoKeySummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -async function main() { - firmwareGenerateCryptoKeySummaryMaximumSetGen(); - firmwareGenerateCryptoKeySummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCveSummarySample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCveSummarySample.js deleted file mode 100644 index 1a4233d31177..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateCveSummarySample.js +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image. - * - * @summary The operation to provide a high level summary of the CVEs reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCveSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCveSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image. - * - * @summary The operation to provide a high level summary of the CVEs reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCveSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCveSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -async function main() { - firmwareGenerateCveSummaryMaximumSetGen(); - firmwareGenerateCveSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateSummarySample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateSummarySample.js deleted file mode 100644 index b935b365625c..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateSummarySample.js +++ /dev/null @@ -1,66 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to get a scan summary. - * - * @summary The operation to get a scan summary. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get a scan summary. - * - * @summary The operation to get a scan summary. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateSummary( - resourceGroupName, - workspaceName, - firmwareId, - ); - console.log(result); -} - -async function main() { - firmwareGenerateSummaryMaximumSetGen(); - firmwareGenerateSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateBinaryHardeningListSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateBinaryHardeningListSample.js deleted file mode 100644 index 7dead95cc9ac..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateBinaryHardeningListSample.js +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to list all binary hardening result for a firmware. - * - * @summary The operation to list all binary hardening result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MaximumSet_Gen.json - */ -async function firmwareListGenerateBinaryHardeningListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateBinaryHardeningList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all binary hardening result for a firmware. - * - * @summary The operation to list all binary hardening result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MinimumSet_Gen.json - */ -async function firmwareListGenerateBinaryHardeningListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateBinaryHardeningList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateBinaryHardeningListMaximumSetGen(); - firmwareListGenerateBinaryHardeningListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateComponentListSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateComponentListSample.js deleted file mode 100644 index 164e6b101a33..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateComponentListSample.js +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to list all components result for a firmware. - * - * @summary The operation to list all components result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MaximumSet_Gen.json - */ -async function firmwareListGenerateComponentListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateComponentList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all components result for a firmware. - * - * @summary The operation to list all components result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MinimumSet_Gen.json - */ -async function firmwareListGenerateComponentListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateComponentList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateComponentListMaximumSetGen(); - firmwareListGenerateComponentListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCveListSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCveListSample.js deleted file mode 100644 index 7aa1bf284f76..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCveListSample.js +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to list all cve results for a firmware. - * - * @summary The operation to list all cve results for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MaximumSet_Gen.json - */ -async function firmwareListGenerateCveListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCveList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all cve results for a firmware. - * - * @summary The operation to list all cve results for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MinimumSet_Gen.json - */ -async function firmwareListGenerateCveListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCveList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateCveListMaximumSetGen(); - firmwareListGenerateCveListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGeneratePasswordHashListSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGeneratePasswordHashListSample.js deleted file mode 100644 index ebf5de19d248..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGeneratePasswordHashListSample.js +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); -const { DefaultAzureCredential } = require("@azure/identity"); -require("dotenv").config(); - -/** - * This sample demonstrates how to The operation to list all password hashes for a firmware. - * - * @summary The operation to list all password hashes for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MaximumSet_Gen.json - */ -async function firmwareListGeneratePasswordHashListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGeneratePasswordHashList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all password hashes for a firmware. - * - * @summary The operation to list all password hashes for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MinimumSet_Gen.json - */ -async function firmwareListGeneratePasswordHashListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGeneratePasswordHashList( - resourceGroupName, - workspaceName, - firmwareId, - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGeneratePasswordHashListMaximumSetGen(); - firmwareListGeneratePasswordHashListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/README.md b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/README.md deleted file mode 100644 index 1a7fe2e1fa82..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/README.md +++ /dev/null @@ -1,117 +0,0 @@ -# client library samples for TypeScript (Beta) - -These sample programs show how to use the TypeScript client libraries for in some common scenarios. - -| **File Name** | **Description** | -| ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | -| [firmwareCreateSample.ts][firmwarecreatesample] | The operation to create a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MaximumSet_Gen.json | -| [firmwareDeleteSample.ts][firmwaredeletesample] | The operation to delete a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MaximumSet_Gen.json | -| [firmwareGenerateBinaryHardeningDetailsSample.ts][firmwaregeneratebinaryhardeningdetailssample] | The operation to get binary hardening details for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MaximumSet_Gen.json | -| [firmwareGenerateBinaryHardeningSummarySample.ts][firmwaregeneratebinaryhardeningsummarysample] | The operation to list the binary hardening summary percentages for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MaximumSet_Gen.json | -| [firmwareGenerateComponentDetailsSample.ts][firmwaregeneratecomponentdetailssample] | The operation to get component details for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MaximumSet_Gen.json | -| [firmwareGenerateCryptoCertificateSummarySample.ts][firmwaregeneratecryptocertificatesummarysample] | The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MaximumSet_Gen.json | -| [firmwareGenerateCryptoKeySummarySample.ts][firmwaregeneratecryptokeysummarysample] | The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MaximumSet_Gen.json | -| [firmwareGenerateCveSummarySample.ts][firmwaregeneratecvesummarysample] | The operation to provide a high level summary of the CVEs reported for the firmware image. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MaximumSet_Gen.json | -| [firmwareGenerateDownloadUrlSample.ts][firmwaregeneratedownloadurlsample] | The operation to a url for file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MaximumSet_Gen.json | -| [firmwareGenerateFilesystemDownloadUrlSample.ts][firmwaregeneratefilesystemdownloadurlsample] | The operation to a url for tar file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json | -| [firmwareGenerateSummarySample.ts][firmwaregeneratesummarysample] | The operation to get a scan summary. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MaximumSet_Gen.json | -| [firmwareGetSample.ts][firmwaregetsample] | Get firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MaximumSet_Gen.json | -| [firmwareListByWorkspaceSample.ts][firmwarelistbyworkspacesample] | Lists all of firmwares inside a workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MaximumSet_Gen.json | -| [firmwareListGenerateBinaryHardeningListSample.ts][firmwarelistgeneratebinaryhardeninglistsample] | The operation to list all binary hardening result for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MaximumSet_Gen.json | -| [firmwareListGenerateComponentListSample.ts][firmwarelistgeneratecomponentlistsample] | The operation to list all components result for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MaximumSet_Gen.json | -| [firmwareListGenerateCryptoCertificateListSample.ts][firmwarelistgeneratecryptocertificatelistsample] | The operation to list all crypto certificates for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json | -| [firmwareListGenerateCryptoKeyListSample.ts][firmwarelistgeneratecryptokeylistsample] | The operation to list all crypto keys for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json | -| [firmwareListGenerateCveListSample.ts][firmwarelistgeneratecvelistsample] | The operation to list all cve results for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MaximumSet_Gen.json | -| [firmwareListGeneratePasswordHashListSample.ts][firmwarelistgeneratepasswordhashlistsample] | The operation to list all password hashes for a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MaximumSet_Gen.json | -| [firmwareUpdateSample.ts][firmwareupdatesample] | The operation to update firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MaximumSet_Gen.json | -| [operationsListSample.ts][operationslistsample] | Lists the operations for this resource provider x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MaximumSet_Gen.json | -| [workspacesCreateSample.ts][workspacescreatesample] | The operation to create or update a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MaximumSet_Gen.json | -| [workspacesDeleteSample.ts][workspacesdeletesample] | The operation to delete a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MaximumSet_Gen.json | -| [workspacesGenerateUploadUrlSample.ts][workspacesgenerateuploadurlsample] | The operation to get a url for file upload. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json | -| [workspacesGetSample.ts][workspacesgetsample] | Get firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MaximumSet_Gen.json | -| [workspacesListByResourceGroupSample.ts][workspaceslistbyresourcegroupsample] | Lists all of the firmware analysis workspaces in the specified resource group. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json | -| [workspacesListBySubscriptionSample.ts][workspaceslistbysubscriptionsample] | Lists all of the firmware analysis workspaces in the specified subscription. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json | -| [workspacesUpdateSample.ts][workspacesupdatesample] | The operation to update a firmware analysis workspaces. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MaximumSet_Gen.json | - -## Prerequisites - -The sample programs are compatible with [LTS versions of Node.js](https://github.com/nodejs/release#release-schedule). - -Before running the samples in Node, they must be compiled to JavaScript using the TypeScript compiler. For more information on TypeScript, see the [TypeScript documentation][typescript]. Install the TypeScript compiler using: - -```bash -npm install -g typescript -``` - -You need [an Azure subscription][freesub] to run these sample programs. - -Samples retrieve credentials to access the service endpoint from environment variables. Alternatively, edit the source code to include the appropriate credentials. See each individual sample for details on which environment variables/credentials it requires to function. - -Adapting the samples to run in the browser may require some additional consideration. For details, please see the [package README][package]. - -## Setup - -To run the samples using the published version of the package: - -1. Install the dependencies using `npm`: - -```bash -npm install -``` - -2. Compile the samples: - -```bash -npm run build -``` - -3. Edit the file `sample.env`, adding the correct credentials to access the Azure service and run the samples. Then rename the file from `sample.env` to just `.env`. The sample programs will read this file automatically. - -4. Run whichever samples you like (note that some samples may require additional setup, see the table above): - -```bash -node dist/firmwareCreateSample.js -``` - -Alternatively, run a single sample with the correct environment variables set (setting up the `.env` file is not required if you do this), for example (cross-platform): - -```bash -npx cross-env IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID="" IOTFIRMWAREDEFENSE_RESOURCE_GROUP="" node dist/firmwareCreateSample.js -``` - -## Next Steps - -Take a look at our [API Documentation][apiref] for more information about the APIs that are available in the clients. - -[firmwarecreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareCreateSample.ts -[firmwaredeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareDeleteSample.ts -[firmwaregeneratebinaryhardeningdetailssample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningDetailsSample.ts -[firmwaregeneratebinaryhardeningsummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningSummarySample.ts -[firmwaregeneratecomponentdetailssample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateComponentDetailsSample.ts -[firmwaregeneratecryptocertificatesummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoCertificateSummarySample.ts -[firmwaregeneratecryptokeysummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoKeySummarySample.ts -[firmwaregeneratecvesummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCveSummarySample.ts -[firmwaregeneratedownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateDownloadUrlSample.ts -[firmwaregeneratefilesystemdownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateFilesystemDownloadUrlSample.ts -[firmwaregeneratesummarysample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateSummarySample.ts -[firmwaregetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGetSample.ts -[firmwarelistbyworkspacesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListByWorkspaceSample.ts -[firmwarelistgeneratebinaryhardeninglistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateBinaryHardeningListSample.ts -[firmwarelistgeneratecomponentlistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateComponentListSample.ts -[firmwarelistgeneratecryptocertificatelistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoCertificateListSample.ts -[firmwarelistgeneratecryptokeylistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoKeyListSample.ts -[firmwarelistgeneratecvelistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCveListSample.ts -[firmwarelistgeneratepasswordhashlistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGeneratePasswordHashListSample.ts -[firmwareupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareUpdateSample.ts -[operationslistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/operationsListSample.ts -[workspacescreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesCreateSample.ts -[workspacesdeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesDeleteSample.ts -[workspacesgenerateuploadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGenerateUploadUrlSample.ts -[workspacesgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGetSample.ts -[workspaceslistbyresourcegroupsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListByResourceGroupSample.ts -[workspaceslistbysubscriptionsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListBySubscriptionSample.ts -[workspacesupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesUpdateSample.ts -[apiref]: https://docs.microsoft.com/javascript/api/@azure/arm-iotfirmwaredefense?view=azure-node-preview -[freesub]: https://azure.microsoft.com/free/ -[package]: https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md -[typescript]: https://www.typescriptlang.org/docs/home.html diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningDetailsSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningDetailsSample.ts deleted file mode 100644 index e7a7588a96fe..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningDetailsSample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to get binary hardening details for a firmware. - * - * @summary The operation to get binary hardening details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MaximumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningDetailsMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get binary hardening details for a firmware. - * - * @summary The operation to get binary hardening details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningDetails_MinimumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningDetailsMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateBinaryHardeningDetailsMaximumSetGen(); - firmwareGenerateBinaryHardeningDetailsMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningSummarySample.ts deleted file mode 100644 index ab8f60e77d27..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateBinaryHardeningSummarySample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware. - * - * @summary The operation to list the binary hardening summary percentages for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to list the binary hardening summary percentages for a firmware. - * - * @summary The operation to list the binary hardening summary percentages for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateBinaryHardeningSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateBinaryHardeningSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateBinaryHardeningSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateBinaryHardeningSummaryMaximumSetGen(); - firmwareGenerateBinaryHardeningSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateComponentDetailsSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateComponentDetailsSample.ts deleted file mode 100644 index 8548c3a12726..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateComponentDetailsSample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to get component details for a firmware. - * - * @summary The operation to get component details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MaximumSet_Gen.json - */ -async function firmwareGenerateComponentDetailsMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateComponentDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get component details for a firmware. - * - * @summary The operation to get component details for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateComponentDetails_MinimumSet_Gen.json - */ -async function firmwareGenerateComponentDetailsMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateComponentDetails( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateComponentDetailsMaximumSetGen(); - firmwareGenerateComponentDetailsMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoCertificateSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoCertificateSummarySample.ts deleted file mode 100644 index 3f1be2ccf326..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoCertificateSummarySample.ts +++ /dev/null @@ -1,71 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCryptoCertificateSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; - const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoCertificateSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic certificates reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoCertificateSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCryptoCertificateSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoCertificateSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateCryptoCertificateSummaryMaximumSetGen(); - firmwareGenerateCryptoCertificateSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoKeySummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoKeySummarySample.ts deleted file mode 100644 index a4cfe4416486..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCryptoKeySummarySample.ts +++ /dev/null @@ -1,71 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCryptoKeySummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; - const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoKeySummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * - * @summary The operation to provide a high level summary of the discovered cryptographic keys reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCryptoKeySummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCryptoKeySummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCryptoKeySummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateCryptoKeySummaryMaximumSetGen(); - firmwareGenerateCryptoKeySummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCveSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCveSummarySample.ts deleted file mode 100644 index 418a1806ca16..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateCveSummarySample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image. - * - * @summary The operation to provide a high level summary of the CVEs reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateCveSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCveSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to provide a high level summary of the CVEs reported for the firmware image. - * - * @summary The operation to provide a high level summary of the CVEs reported for the firmware image. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateCveSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateCveSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateCveSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateCveSummaryMaximumSetGen(); - firmwareGenerateCveSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateSummarySample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateSummarySample.ts deleted file mode 100644 index 6483cb5e7e29..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGenerateSummarySample.ts +++ /dev/null @@ -1,72 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to get a scan summary. - * - * @summary The operation to get a scan summary. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MaximumSet_Gen.json - */ -async function firmwareGenerateSummaryMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -/** - * This sample demonstrates how to The operation to get a scan summary. - * - * @summary The operation to get a scan summary. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateSummary_MinimumSet_Gen.json - */ -async function firmwareGenerateSummaryMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateSummary( - resourceGroupName, - workspaceName, - firmwareId - ); - console.log(result); -} - -async function main() { - firmwareGenerateSummaryMaximumSetGen(); - firmwareGenerateSummaryMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateBinaryHardeningListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateBinaryHardeningListSample.ts deleted file mode 100644 index 7371a8e18d1e..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateBinaryHardeningListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all binary hardening result for a firmware. - * - * @summary The operation to list all binary hardening result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MaximumSet_Gen.json - */ -async function firmwareListGenerateBinaryHardeningListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateBinaryHardeningList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all binary hardening result for a firmware. - * - * @summary The operation to list all binary hardening result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateBinaryHardeningList_MinimumSet_Gen.json - */ -async function firmwareListGenerateBinaryHardeningListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateBinaryHardeningList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateBinaryHardeningListMaximumSetGen(); - firmwareListGenerateBinaryHardeningListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateComponentListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateComponentListSample.ts deleted file mode 100644 index cfe7b29d06e8..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateComponentListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all components result for a firmware. - * - * @summary The operation to list all components result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MaximumSet_Gen.json - */ -async function firmwareListGenerateComponentListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateComponentList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all components result for a firmware. - * - * @summary The operation to list all components result for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateComponentList_MinimumSet_Gen.json - */ -async function firmwareListGenerateComponentListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateComponentList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateComponentListMaximumSetGen(); - firmwareListGenerateComponentListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCveListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCveListSample.ts deleted file mode 100644 index 370d3f5ef604..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCveListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all cve results for a firmware. - * - * @summary The operation to list all cve results for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MaximumSet_Gen.json - */ -async function firmwareListGenerateCveListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCveList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all cve results for a firmware. - * - * @summary The operation to list all cve results for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCveList_MinimumSet_Gen.json - */ -async function firmwareListGenerateCveListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCveList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGenerateCveListMaximumSetGen(); - firmwareListGenerateCveListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGeneratePasswordHashListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGeneratePasswordHashListSample.ts deleted file mode 100644 index b14e06e4785d..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGeneratePasswordHashListSample.ts +++ /dev/null @@ -1,78 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -// Copyright (c) Microsoft Corporation. -// Licensed under the MIT License. -import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; -import { DefaultAzureCredential } from "@azure/identity"; -import * as dotenv from "dotenv"; - -dotenv.config(); - -/** - * This sample demonstrates how to The operation to list all password hashes for a firmware. - * - * @summary The operation to list all password hashes for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MaximumSet_Gen.json - */ -async function firmwareListGeneratePasswordHashListMaximumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGeneratePasswordHashList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -/** - * This sample demonstrates how to The operation to list all password hashes for a firmware. - * - * @summary The operation to list all password hashes for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGeneratePasswordHashList_MinimumSet_Gen.json - */ -async function firmwareListGeneratePasswordHashListMinimumSetGen() { - const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; - const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "A7"; - const firmwareId = "umrkdttp"; - const credential = new DefaultAzureCredential(); - const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const resArray = new Array(); - for await (let item of client.firmwareOperations.listGeneratePasswordHashList( - resourceGroupName, - workspaceName, - firmwareId - )) { - resArray.push(item); - } - console.log(resArray); -} - -async function main() { - firmwareListGeneratePasswordHashListMaximumSetGen(); - firmwareListGeneratePasswordHashListMinimumSetGen(); -} - -main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/README.md b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/README.md new file mode 100644 index 000000000000..89fad269373b --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/README.md @@ -0,0 +1,94 @@ +# client library samples for JavaScript + +These sample programs show how to use the JavaScript client libraries for in some common scenarios. + +| **File Name** | **Description** | +| ----------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [binaryHardeningListByFirmwareSample.js][binaryhardeninglistbyfirmwaresample] | Lists binary hardening analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json | +| [cryptoCertificatesListByFirmwareSample.js][cryptocertificateslistbyfirmwaresample] | Lists cryptographic certificate analysis results found in a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json | +| [cryptoKeysListByFirmwareSample.js][cryptokeyslistbyfirmwaresample] | Lists cryptographic key analysis results found in a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json | +| [cvesListByFirmwareSample.js][cveslistbyfirmwaresample] | Lists CVE analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json | +| [firmwaresCreateSample.js][firmwarescreatesample] | The operation to create a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json | +| [firmwaresDeleteSample.js][firmwaresdeletesample] | The operation to delete a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json | +| [firmwaresGenerateDownloadUrlSample.js][firmwaresgeneratedownloadurlsample] | The operation to a url for file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MaximumSet_Gen.json | +| [firmwaresGenerateFilesystemDownloadUrlSample.js][firmwaresgeneratefilesystemdownloadurlsample] | The operation to a url for tar file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json | +| [firmwaresGetSample.js][firmwaresgetsample] | Get firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MaximumSet_Gen.json | +| [firmwaresListByWorkspaceSample.js][firmwareslistbyworkspacesample] | Lists all of firmwares inside a workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MaximumSet_Gen.json | +| [firmwaresUpdateSample.js][firmwaresupdatesample] | The operation to update firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MaximumSet_Gen.json | +| [operationsListSample.js][operationslistsample] | Lists the operations for this resource provider x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MaximumSet_Gen.json | +| [passwordHashesListByFirmwareSample.js][passwordhasheslistbyfirmwaresample] | Lists password hash analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MaximumSet_Gen.json | +| [sbomComponentsListByFirmwareSample.js][sbomcomponentslistbyfirmwaresample] | Lists SBOM analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MaximumSet_Gen.json | +| [summariesGetSample.js][summariesgetsample] | Get an analysis result summary of a firmware by name. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MaximumSet_Gen.json | +| [summariesListByFirmwareSample.js][summarieslistbyfirmwaresample] | Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MaximumSet_Gen.json | +| [workspacesCreateSample.js][workspacescreatesample] | The operation to create or update a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MaximumSet_Gen.json | +| [workspacesDeleteSample.js][workspacesdeletesample] | The operation to delete a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MaximumSet_Gen.json | +| [workspacesGenerateUploadUrlSample.js][workspacesgenerateuploadurlsample] | The operation to get a url for file upload. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json | +| [workspacesGetSample.js][workspacesgetsample] | Get firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MaximumSet_Gen.json | +| [workspacesListByResourceGroupSample.js][workspaceslistbyresourcegroupsample] | Lists all of the firmware analysis workspaces in the specified resource group. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json | +| [workspacesListBySubscriptionSample.js][workspaceslistbysubscriptionsample] | Lists all of the firmware analysis workspaces in the specified subscription. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json | +| [workspacesUpdateSample.js][workspacesupdatesample] | The operation to update a firmware analysis workspaces. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MaximumSet_Gen.json | + +## Prerequisites + +The sample programs are compatible with [LTS versions of Node.js](https://github.com/nodejs/release#release-schedule). + +You need [an Azure subscription][freesub] to run these sample programs. + +Samples retrieve credentials to access the service endpoint from environment variables. Alternatively, edit the source code to include the appropriate credentials. See each individual sample for details on which environment variables/credentials it requires to function. + +Adapting the samples to run in the browser may require some additional consideration. For details, please see the [package README][package]. + +## Setup + +To run the samples using the published version of the package: + +1. Install the dependencies using `npm`: + +```bash +npm install +``` + +2. Edit the file `sample.env`, adding the correct credentials to access the Azure service and run the samples. Then rename the file from `sample.env` to just `.env`. The sample programs will read this file automatically. + +3. Run whichever samples you like (note that some samples may require additional setup, see the table above): + +```bash +node binaryHardeningListByFirmwareSample.js +``` + +Alternatively, run a single sample with the correct environment variables set (setting up the `.env` file is not required if you do this), for example (cross-platform): + +```bash +npx cross-env IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID="" IOTFIRMWAREDEFENSE_RESOURCE_GROUP="" node binaryHardeningListByFirmwareSample.js +``` + +## Next Steps + +Take a look at our [API Documentation][apiref] for more information about the APIs that are available in the clients. + +[binaryhardeninglistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/binaryHardeningListByFirmwareSample.js +[cryptocertificateslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoCertificatesListByFirmwareSample.js +[cryptokeyslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoKeysListByFirmwareSample.js +[cveslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cvesListByFirmwareSample.js +[firmwarescreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresCreateSample.js +[firmwaresdeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresDeleteSample.js +[firmwaresgeneratedownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateDownloadUrlSample.js +[firmwaresgeneratefilesystemdownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateFilesystemDownloadUrlSample.js +[firmwaresgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGetSample.js +[firmwareslistbyworkspacesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresListByWorkspaceSample.js +[firmwaresupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresUpdateSample.js +[operationslistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/operationsListSample.js +[passwordhasheslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/passwordHashesListByFirmwareSample.js +[sbomcomponentslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/sbomComponentsListByFirmwareSample.js +[summariesgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesGetSample.js +[summarieslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesListByFirmwareSample.js +[workspacescreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesCreateSample.js +[workspacesdeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesDeleteSample.js +[workspacesgenerateuploadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGenerateUploadUrlSample.js +[workspacesgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGetSample.js +[workspaceslistbyresourcegroupsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListByResourceGroupSample.js +[workspaceslistbysubscriptionsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListBySubscriptionSample.js +[workspacesupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesUpdateSample.js +[apiref]: https://docs.microsoft.com/javascript/api/@azure/arm-iotfirmwaredefense?view=azure-node-preview +[freesub]: https://azure.microsoft.com/free/ +[package]: https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoKeyListSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/binaryHardeningListByFirmwareSample.js similarity index 51% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoKeyListSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/binaryHardeningListByFirmwareSample.js index 995574b5dd92..279c8c77bdda 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoKeyListSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/binaryHardeningListByFirmwareSample.js @@ -13,22 +13,22 @@ const { DefaultAzureCredential } = require("@azure/identity"); require("dotenv").config(); /** - * This sample demonstrates how to The operation to list all crypto keys for a firmware. + * This sample demonstrates how to Lists binary hardening analysis results of a firmware. * - * @summary The operation to list all crypto keys for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MaximumSet_Gen.json + * @summary Lists binary hardening analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json */ -async function firmwareListGenerateCryptoKeyListMaximumSetGen() { +async function binaryHardeningListByFirmwareMaximumSetGen() { const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoKeyList( + for await (let item of client.binaryHardening.listByFirmware( resourceGroupName, workspaceName, firmwareId, @@ -39,22 +39,22 @@ async function firmwareListGenerateCryptoKeyListMaximumSetGen() { } /** - * This sample demonstrates how to The operation to list all crypto keys for a firmware. + * This sample demonstrates how to Lists binary hardening analysis results of a firmware. * - * @summary The operation to list all crypto keys for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoKeyList_MinimumSet_Gen.json + * @summary Lists binary hardening analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MinimumSet_Gen.json */ -async function firmwareListGenerateCryptoKeyListMinimumSetGen() { +async function binaryHardeningListByFirmwareMinimumSetGen() { const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoKeyList( + for await (let item of client.binaryHardening.listByFirmware( resourceGroupName, workspaceName, firmwareId, @@ -65,8 +65,8 @@ async function firmwareListGenerateCryptoKeyListMinimumSetGen() { } async function main() { - firmwareListGenerateCryptoKeyListMaximumSetGen(); - firmwareListGenerateCryptoKeyListMinimumSetGen(); + binaryHardeningListByFirmwareMaximumSetGen(); + binaryHardeningListByFirmwareMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoCertificatesListByFirmwareSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoCertificatesListByFirmwareSample.js new file mode 100644 index 000000000000..1dd55a233bce --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoCertificatesListByFirmwareSample.js @@ -0,0 +1,72 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); +const { DefaultAzureCredential } = require("@azure/identity"); +require("dotenv").config(); + +/** + * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware. + * + * @summary Lists cryptographic certificate analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json + */ +async function cryptoCertificatesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cryptoCertificates.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware. + * + * @summary Lists cryptographic certificate analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MinimumSet_Gen.json + */ +async function cryptoCertificatesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cryptoCertificates.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + cryptoCertificatesListByFirmwareMaximumSetGen(); + cryptoCertificatesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoCertificateListSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoKeysListByFirmwareSample.js similarity index 50% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoCertificateListSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoKeysListByFirmwareSample.js index e1d702f2ed56..195e208fc721 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListGenerateCryptoCertificateListSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cryptoKeysListByFirmwareSample.js @@ -13,22 +13,22 @@ const { DefaultAzureCredential } = require("@azure/identity"); require("dotenv").config(); /** - * This sample demonstrates how to The operation to list all crypto certificates for a firmware. + * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware. * - * @summary The operation to list all crypto certificates for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json + * @summary Lists cryptographic key analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json */ -async function firmwareListGenerateCryptoCertificateListMaximumSetGen() { +async function cryptoKeysListByFirmwareMaximumSetGen() { const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoCertificateList( + for await (let item of client.cryptoKeys.listByFirmware( resourceGroupName, workspaceName, firmwareId, @@ -39,22 +39,22 @@ async function firmwareListGenerateCryptoCertificateListMaximumSetGen() { } /** - * This sample demonstrates how to The operation to list all crypto certificates for a firmware. + * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware. * - * @summary The operation to list all crypto certificates for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MinimumSet_Gen.json + * @summary Lists cryptographic key analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MinimumSet_Gen.json */ -async function firmwareListGenerateCryptoCertificateListMinimumSetGen() { +async function cryptoKeysListByFirmwareMinimumSetGen() { const subscriptionId = - process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoCertificateList( + for await (let item of client.cryptoKeys.listByFirmware( resourceGroupName, workspaceName, firmwareId, @@ -65,8 +65,8 @@ async function firmwareListGenerateCryptoCertificateListMinimumSetGen() { } async function main() { - firmwareListGenerateCryptoCertificateListMaximumSetGen(); - firmwareListGenerateCryptoCertificateListMinimumSetGen(); + cryptoKeysListByFirmwareMaximumSetGen(); + cryptoKeysListByFirmwareMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cvesListByFirmwareSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cvesListByFirmwareSample.js new file mode 100644 index 000000000000..8d74350ecf88 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/cvesListByFirmwareSample.js @@ -0,0 +1,64 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); +const { DefaultAzureCredential } = require("@azure/identity"); +require("dotenv").config(); + +/** + * This sample demonstrates how to Lists CVE analysis results of a firmware. + * + * @summary Lists CVE analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json + */ +async function cvesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists CVE analysis results of a firmware. + * + * @summary Lists CVE analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MinimumSet_Gen.json + */ +async function cvesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cves.listByFirmware(resourceGroupName, workspaceName, firmwareId)) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + cvesListByFirmwareMaximumSetGen(); + cvesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareCreateSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresCreateSample.js similarity index 73% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareCreateSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresCreateSample.js index a01d3c63f5c3..03d15f8bcc25 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareCreateSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresCreateSample.js @@ -16,9 +16,9 @@ require("dotenv").config(); * This sample demonstrates how to The operation to create a firmware. * * @summary The operation to create a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json */ -async function firmwareCreateMaximumSetGen() { +async function firmwaresCreateMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -26,18 +26,20 @@ async function firmwareCreateMaximumSetGen() { const workspaceName = "A7"; const firmwareId = "umrkdttp"; const firmware = { - description: "uz", - fileName: "wresexxulcdsdd", - fileSize: 17, - model: "f", - status: "Pending", - statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], - vendor: "vycmdhgtmepcptyoubztiuudpkcpd", - version: "s", + properties: { + description: "uz", + fileName: "wresexxulcdsdd", + fileSize: 17, + model: "f", + status: "Pending", + statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], + vendor: "vycmdhgtmepcptyoubztiuudpkcpd", + version: "s", + }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.create( + const result = await client.firmwares.create( resourceGroupName, workspaceName, firmwareId, @@ -50,9 +52,9 @@ async function firmwareCreateMaximumSetGen() { * This sample demonstrates how to The operation to create a firmware. * * @summary The operation to create a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MinimumSet_Gen.json */ -async function firmwareCreateMinimumSetGen() { +async function firmwaresCreateMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -62,7 +64,7 @@ async function firmwareCreateMinimumSetGen() { const firmware = {}; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.create( + const result = await client.firmwares.create( resourceGroupName, workspaceName, firmwareId, @@ -72,8 +74,8 @@ async function firmwareCreateMinimumSetGen() { } async function main() { - firmwareCreateMaximumSetGen(); - firmwareCreateMinimumSetGen(); + firmwaresCreateMaximumSetGen(); + firmwaresCreateMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareDeleteSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresDeleteSample.js similarity index 75% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareDeleteSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresDeleteSample.js index 4eb2c522d3bf..5b2fa37a22cd 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareDeleteSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresDeleteSample.js @@ -16,9 +16,9 @@ require("dotenv").config(); * This sample demonstrates how to The operation to delete a firmware. * * @summary The operation to delete a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json */ -async function firmwareDeleteMaximumSetGen() { +async function firmwaresDeleteMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -27,11 +27,7 @@ async function firmwareDeleteMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.delete( - resourceGroupName, - workspaceName, - firmwareId, - ); + const result = await client.firmwares.delete(resourceGroupName, workspaceName, firmwareId); console.log(result); } @@ -39,9 +35,9 @@ async function firmwareDeleteMaximumSetGen() { * This sample demonstrates how to The operation to delete a firmware. * * @summary The operation to delete a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MinimumSet_Gen.json */ -async function firmwareDeleteMinimumSetGen() { +async function firmwaresDeleteMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -50,17 +46,13 @@ async function firmwareDeleteMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.delete( - resourceGroupName, - workspaceName, - firmwareId, - ); + const result = await client.firmwares.delete(resourceGroupName, workspaceName, firmwareId); console.log(result); } async function main() { - firmwareDeleteMaximumSetGen(); - firmwareDeleteMinimumSetGen(); + firmwaresDeleteMaximumSetGen(); + firmwaresDeleteMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateDownloadUrlSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateDownloadUrlSample.js similarity index 77% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateDownloadUrlSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateDownloadUrlSample.js index e6ead143e648..7ed904da7f86 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateDownloadUrlSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateDownloadUrlSample.js @@ -16,9 +16,9 @@ require("dotenv").config(); * This sample demonstrates how to The operation to a url for file download. * * @summary The operation to a url for file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MaximumSet_Gen.json */ -async function firmwareGenerateDownloadUrlMaximumSetGen() { +async function firmwaresGenerateDownloadUrlMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -27,7 +27,7 @@ async function firmwareGenerateDownloadUrlMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateDownloadUrl( + const result = await client.firmwares.generateDownloadUrl( resourceGroupName, workspaceName, firmwareId, @@ -39,9 +39,9 @@ async function firmwareGenerateDownloadUrlMaximumSetGen() { * This sample demonstrates how to The operation to a url for file download. * * @summary The operation to a url for file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MinimumSet_Gen.json */ -async function firmwareGenerateDownloadUrlMinimumSetGen() { +async function firmwaresGenerateDownloadUrlMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -50,7 +50,7 @@ async function firmwareGenerateDownloadUrlMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateDownloadUrl( + const result = await client.firmwares.generateDownloadUrl( resourceGroupName, workspaceName, firmwareId, @@ -59,8 +59,8 @@ async function firmwareGenerateDownloadUrlMinimumSetGen() { } async function main() { - firmwareGenerateDownloadUrlMaximumSetGen(); - firmwareGenerateDownloadUrlMinimumSetGen(); + firmwaresGenerateDownloadUrlMaximumSetGen(); + firmwaresGenerateDownloadUrlMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateFilesystemDownloadUrlSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateFilesystemDownloadUrlSample.js similarity index 75% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateFilesystemDownloadUrlSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateFilesystemDownloadUrlSample.js index 9b179b78af0c..b47a908a3005 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGenerateFilesystemDownloadUrlSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGenerateFilesystemDownloadUrlSample.js @@ -16,9 +16,9 @@ require("dotenv").config(); * This sample demonstrates how to The operation to a url for tar file download. * * @summary The operation to a url for tar file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json */ -async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { +async function firmwaresGenerateFilesystemDownloadUrlMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -27,7 +27,7 @@ async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateFilesystemDownloadUrl( + const result = await client.firmwares.generateFilesystemDownloadUrl( resourceGroupName, workspaceName, firmwareId, @@ -39,9 +39,9 @@ async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { * This sample demonstrates how to The operation to a url for tar file download. * * @summary The operation to a url for tar file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json */ -async function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() { +async function firmwaresGenerateFilesystemDownloadUrlMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -50,7 +50,7 @@ async function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateFilesystemDownloadUrl( + const result = await client.firmwares.generateFilesystemDownloadUrl( resourceGroupName, workspaceName, firmwareId, @@ -59,8 +59,8 @@ async function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() { } async function main() { - firmwareGenerateFilesystemDownloadUrlMaximumSetGen(); - firmwareGenerateFilesystemDownloadUrlMinimumSetGen(); + firmwaresGenerateFilesystemDownloadUrlMaximumSetGen(); + firmwaresGenerateFilesystemDownloadUrlMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGetSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGetSample.js similarity index 76% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGetSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGetSample.js index 72f784945e16..eed3d0f8e30b 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareGetSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresGetSample.js @@ -16,9 +16,9 @@ require("dotenv").config(); * This sample demonstrates how to Get firmware. * * @summary Get firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MaximumSet_Gen.json */ -async function firmwareGetMaximumSetGen() { +async function firmwaresGetMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -27,7 +27,7 @@ async function firmwareGetMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.get(resourceGroupName, workspaceName, firmwareId); + const result = await client.firmwares.get(resourceGroupName, workspaceName, firmwareId); console.log(result); } @@ -35,9 +35,9 @@ async function firmwareGetMaximumSetGen() { * This sample demonstrates how to Get firmware. * * @summary Get firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MinimumSet_Gen.json */ -async function firmwareGetMinimumSetGen() { +async function firmwaresGetMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -46,13 +46,13 @@ async function firmwareGetMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.get(resourceGroupName, workspaceName, firmwareId); + const result = await client.firmwares.get(resourceGroupName, workspaceName, firmwareId); console.log(result); } async function main() { - firmwareGetMaximumSetGen(); - firmwareGetMinimumSetGen(); + firmwaresGetMaximumSetGen(); + firmwaresGetMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListByWorkspaceSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresListByWorkspaceSample.js similarity index 74% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListByWorkspaceSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresListByWorkspaceSample.js index d47c6cb75f3d..30d5c87cd122 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareListByWorkspaceSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresListByWorkspaceSample.js @@ -16,9 +16,9 @@ require("dotenv").config(); * This sample demonstrates how to Lists all of firmwares inside a workspace. * * @summary Lists all of firmwares inside a workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MaximumSet_Gen.json */ -async function firmwareListByWorkspaceMaximumSetGen() { +async function firmwaresListByWorkspaceMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -27,10 +27,7 @@ async function firmwareListByWorkspaceMaximumSetGen() { const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listByWorkspace( - resourceGroupName, - workspaceName, - )) { + for await (let item of client.firmwares.listByWorkspace(resourceGroupName, workspaceName)) { resArray.push(item); } console.log(resArray); @@ -40,9 +37,9 @@ async function firmwareListByWorkspaceMaximumSetGen() { * This sample demonstrates how to Lists all of firmwares inside a workspace. * * @summary Lists all of firmwares inside a workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MinimumSet_Gen.json */ -async function firmwareListByWorkspaceMinimumSetGen() { +async function firmwaresListByWorkspaceMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -51,18 +48,15 @@ async function firmwareListByWorkspaceMinimumSetGen() { const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listByWorkspace( - resourceGroupName, - workspaceName, - )) { + for await (let item of client.firmwares.listByWorkspace(resourceGroupName, workspaceName)) { resArray.push(item); } console.log(resArray); } async function main() { - firmwareListByWorkspaceMaximumSetGen(); - firmwareListByWorkspaceMinimumSetGen(); + firmwaresListByWorkspaceMaximumSetGen(); + firmwaresListByWorkspaceMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareUpdateSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresUpdateSample.js similarity index 73% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareUpdateSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresUpdateSample.js index 0f70818b690a..5d09cc6d42f2 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/firmwareUpdateSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/firmwaresUpdateSample.js @@ -16,9 +16,9 @@ require("dotenv").config(); * This sample demonstrates how to The operation to update firmware. * * @summary The operation to update firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MaximumSet_Gen.json */ -async function firmwareUpdateMaximumSetGen() { +async function firmwaresUpdateMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -26,18 +26,20 @@ async function firmwareUpdateMaximumSetGen() { const workspaceName = "A7"; const firmwareId = "umrkdttp"; const firmware = { - description: "uz", - fileName: "wresexxulcdsdd", - fileSize: 17, - model: "f", - status: "Pending", - statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], - vendor: "vycmdhgtmepcptyoubztiuudpkcpd", - version: "s", + properties: { + description: "uz", + fileName: "wresexxulcdsdd", + fileSize: 17, + model: "f", + status: "Pending", + statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], + vendor: "vycmdhgtmepcptyoubztiuudpkcpd", + version: "s", + }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.update( + const result = await client.firmwares.update( resourceGroupName, workspaceName, firmwareId, @@ -50,9 +52,9 @@ async function firmwareUpdateMaximumSetGen() { * This sample demonstrates how to The operation to update firmware. * * @summary The operation to update firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MinimumSet_Gen.json */ -async function firmwareUpdateMinimumSetGen() { +async function firmwaresUpdateMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; const resourceGroupName = @@ -62,7 +64,7 @@ async function firmwareUpdateMinimumSetGen() { const firmware = {}; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.update( + const result = await client.firmwares.update( resourceGroupName, workspaceName, firmwareId, @@ -72,8 +74,8 @@ async function firmwareUpdateMinimumSetGen() { } async function main() { - firmwareUpdateMaximumSetGen(); - firmwareUpdateMinimumSetGen(); + firmwaresUpdateMaximumSetGen(); + firmwaresUpdateMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/operationsListSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/operationsListSample.js similarity index 90% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/operationsListSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/operationsListSample.js index a85fee04cf05..40d108dfa990 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/operationsListSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/operationsListSample.js @@ -16,7 +16,7 @@ require("dotenv").config(); * This sample demonstrates how to Lists the operations for this resource provider * * @summary Lists the operations for this resource provider - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MaximumSet_Gen.json */ async function operationsListMaximumSetGen() { const subscriptionId = @@ -34,7 +34,7 @@ async function operationsListMaximumSetGen() { * This sample demonstrates how to Lists the operations for this resource provider * * @summary Lists the operations for this resource provider - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MinimumSet_Gen.json */ async function operationsListMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/package.json b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/package.json similarity index 80% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/package.json rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/package.json index b9ccc0724db1..f9eee0e869ad 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/package.json +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/package.json @@ -1,8 +1,8 @@ { - "name": "@azure-samples/arm-iotfirmwaredefense-js-beta", + "name": "@azure-samples/arm-iotfirmwaredefense-js", "private": true, "version": "1.0.0", - "description": " client library samples for JavaScript (Beta)", + "description": " client library samples for JavaScript", "engines": { "node": ">=18.0.0" }, @@ -25,7 +25,7 @@ }, "homepage": "https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense", "dependencies": { - "@azure/arm-iotfirmwaredefense": "next", + "@azure/arm-iotfirmwaredefense": "latest", "dotenv": "latest", "@azure/identity": "^4.0.1" } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/passwordHashesListByFirmwareSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/passwordHashesListByFirmwareSample.js new file mode 100644 index 000000000000..4b2e1f4ce6ee --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/passwordHashesListByFirmwareSample.js @@ -0,0 +1,72 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); +const { DefaultAzureCredential } = require("@azure/identity"); +require("dotenv").config(); + +/** + * This sample demonstrates how to Lists password hash analysis results of a firmware. + * + * @summary Lists password hash analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MaximumSet_Gen.json + */ +async function passwordHashesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.passwordHashes.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists password hash analysis results of a firmware. + * + * @summary Lists password hash analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MinimumSet_Gen.json + */ +async function passwordHashesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.passwordHashes.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + passwordHashesListByFirmwareMaximumSetGen(); + passwordHashesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/sample.env b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/sample.env similarity index 100% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/sample.env rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/sample.env diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/sbomComponentsListByFirmwareSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/sbomComponentsListByFirmwareSample.js new file mode 100644 index 000000000000..a1a710f0612e --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/sbomComponentsListByFirmwareSample.js @@ -0,0 +1,72 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); +const { DefaultAzureCredential } = require("@azure/identity"); +require("dotenv").config(); + +/** + * This sample demonstrates how to Lists SBOM analysis results of a firmware. + * + * @summary Lists SBOM analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MaximumSet_Gen.json + */ +async function sbomComponentsListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.sbomComponents.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists SBOM analysis results of a firmware. + * + * @summary Lists SBOM analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MinimumSet_Gen.json + */ +async function sbomComponentsListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.sbomComponents.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + sbomComponentsListByFirmwareMaximumSetGen(); + sbomComponentsListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesGetSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesGetSample.js new file mode 100644 index 000000000000..2456073cc520 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesGetSample.js @@ -0,0 +1,70 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); +const { DefaultAzureCredential } = require("@azure/identity"); +require("dotenv").config(); + +/** + * This sample demonstrates how to Get an analysis result summary of a firmware by name. + * + * @summary Get an analysis result summary of a firmware by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MaximumSet_Gen.json + */ +async function summariesGetMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const summaryName = "Firmware"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const result = await client.summaries.get( + resourceGroupName, + workspaceName, + firmwareId, + summaryName, + ); + console.log(result); +} + +/** + * This sample demonstrates how to Get an analysis result summary of a firmware by name. + * + * @summary Get an analysis result summary of a firmware by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MinimumSet_Gen.json + */ +async function summariesGetMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const summaryName = "Firmware"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const result = await client.summaries.get( + resourceGroupName, + workspaceName, + firmwareId, + summaryName, + ); + console.log(result); +} + +async function main() { + summariesGetMaximumSetGen(); + summariesGetMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesListByFirmwareSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesListByFirmwareSample.js new file mode 100644 index 000000000000..7e449159d310 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/summariesListByFirmwareSample.js @@ -0,0 +1,72 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +const { IoTFirmwareDefenseClient } = require("@azure/arm-iotfirmwaredefense"); +const { DefaultAzureCredential } = require("@azure/identity"); +require("dotenv").config(); + +/** + * This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * + * @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MaximumSet_Gen.json + */ +async function summariesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.summaries.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * + * @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MinimumSet_Gen.json + */ +async function summariesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.summaries.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + summariesListByFirmwareMaximumSetGen(); + summariesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesCreateSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesCreateSample.js similarity index 92% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesCreateSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesCreateSample.js index 81f9e4c4598d..2ee576cbbf85 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesCreateSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesCreateSample.js @@ -16,7 +16,7 @@ require("dotenv").config(); * This sample demonstrates how to The operation to create or update a firmware analysis workspace. * * @summary The operation to create or update a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MaximumSet_Gen.json */ async function workspacesCreateMaximumSetGen() { const subscriptionId = @@ -25,6 +25,7 @@ async function workspacesCreateMaximumSetGen() { const workspaceName = "E___-3"; const workspace = { location: "jjwbseilitjgdrhbvvkwviqj", + properties: {}, tags: { key450: "rzqqumbpfsbibnpirsm" }, }; const credential = new DefaultAzureCredential(); @@ -37,7 +38,7 @@ async function workspacesCreateMaximumSetGen() { * This sample demonstrates how to The operation to create or update a firmware analysis workspace. * * @summary The operation to create or update a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MinimumSet_Gen.json */ async function workspacesCreateMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesDeleteSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesDeleteSample.js similarity index 91% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesDeleteSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesDeleteSample.js index 943cdc127daa..e92daa9c12c8 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesDeleteSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesDeleteSample.js @@ -16,7 +16,7 @@ require("dotenv").config(); * This sample demonstrates how to The operation to delete a firmware analysis workspace. * * @summary The operation to delete a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MaximumSet_Gen.json */ async function workspacesDeleteMaximumSetGen() { const subscriptionId = @@ -33,7 +33,7 @@ async function workspacesDeleteMaximumSetGen() { * This sample demonstrates how to The operation to delete a firmware analysis workspace. * * @summary The operation to delete a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MinimumSet_Gen.json */ async function workspacesDeleteMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGenerateUploadUrlSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGenerateUploadUrlSample.js similarity index 91% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGenerateUploadUrlSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGenerateUploadUrlSample.js index 9455530e9c75..8fd4a6ff74a9 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGenerateUploadUrlSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGenerateUploadUrlSample.js @@ -16,7 +16,7 @@ require("dotenv").config(); * This sample demonstrates how to The operation to get a url for file upload. * * @summary The operation to get a url for file upload. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json */ async function workspacesGenerateUploadUrlMaximumSetGen() { const subscriptionId = @@ -40,7 +40,7 @@ async function workspacesGenerateUploadUrlMaximumSetGen() { * This sample demonstrates how to The operation to get a url for file upload. * * @summary The operation to get a url for file upload. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MinimumSet_Gen.json */ async function workspacesGenerateUploadUrlMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGetSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGetSample.js similarity index 91% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGetSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGetSample.js index d25c7f00f297..68a61b84fd7a 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesGetSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesGetSample.js @@ -16,7 +16,7 @@ require("dotenv").config(); * This sample demonstrates how to Get firmware analysis workspace. * * @summary Get firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MaximumSet_Gen.json */ async function workspacesGetMaximumSetGen() { const subscriptionId = @@ -33,7 +33,7 @@ async function workspacesGetMaximumSetGen() { * This sample demonstrates how to Get firmware analysis workspace. * * @summary Get firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MinimumSet_Gen.json */ async function workspacesGetMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListByResourceGroupSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListByResourceGroupSample.js similarity index 91% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListByResourceGroupSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListByResourceGroupSample.js index f81e74fc2b3d..96d7884f9da0 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListByResourceGroupSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListByResourceGroupSample.js @@ -16,7 +16,7 @@ require("dotenv").config(); * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group. * * @summary Lists all of the firmware analysis workspaces in the specified resource group. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json */ async function workspacesListByResourceGroupMaximumSetGen() { const subscriptionId = @@ -35,7 +35,7 @@ async function workspacesListByResourceGroupMaximumSetGen() { * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group. * * @summary Lists all of the firmware analysis workspaces in the specified resource group. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MinimumSet_Gen.json */ async function workspacesListByResourceGroupMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListBySubscriptionSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListBySubscriptionSample.js similarity index 90% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListBySubscriptionSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListBySubscriptionSample.js index da53a80cd1f0..41647561c1a3 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesListBySubscriptionSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesListBySubscriptionSample.js @@ -16,7 +16,7 @@ require("dotenv").config(); * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription. * * @summary Lists all of the firmware analysis workspaces in the specified subscription. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json */ async function workspacesListBySubscriptionMaximumSetGen() { const subscriptionId = @@ -34,7 +34,7 @@ async function workspacesListBySubscriptionMaximumSetGen() { * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription. * * @summary Lists all of the firmware analysis workspaces in the specified subscription. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MinimumSet_Gen.json */ async function workspacesListBySubscriptionMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesUpdateSample.js b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesUpdateSample.js similarity index 90% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesUpdateSample.js rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesUpdateSample.js index b1bf7b684222..bc331e4097b2 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/javascript/workspacesUpdateSample.js +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/javascript/workspacesUpdateSample.js @@ -16,14 +16,14 @@ require("dotenv").config(); * This sample demonstrates how to The operation to update a firmware analysis workspaces. * * @summary The operation to update a firmware analysis workspaces. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MaximumSet_Gen.json */ async function workspacesUpdateMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "5443A01A-5242-4950-AC1A-2DD362180254"; const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces"; const workspaceName = "E___-3"; - const workspace = {}; + const workspace = { properties: {} }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.update(resourceGroupName, workspaceName, workspace); @@ -34,7 +34,7 @@ async function workspacesUpdateMaximumSetGen() { * This sample demonstrates how to The operation to update a firmware analysis workspaces. * * @summary The operation to update a firmware analysis workspaces. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MinimumSet_Gen.json */ async function workspacesUpdateMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/README.md b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/README.md new file mode 100644 index 000000000000..16984177e4dd --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/README.md @@ -0,0 +1,107 @@ +# client library samples for TypeScript + +These sample programs show how to use the TypeScript client libraries for in some common scenarios. + +| **File Name** | **Description** | +| ----------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [binaryHardeningListByFirmwareSample.ts][binaryhardeninglistbyfirmwaresample] | Lists binary hardening analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json | +| [cryptoCertificatesListByFirmwareSample.ts][cryptocertificateslistbyfirmwaresample] | Lists cryptographic certificate analysis results found in a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json | +| [cryptoKeysListByFirmwareSample.ts][cryptokeyslistbyfirmwaresample] | Lists cryptographic key analysis results found in a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json | +| [cvesListByFirmwareSample.ts][cveslistbyfirmwaresample] | Lists CVE analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json | +| [firmwaresCreateSample.ts][firmwarescreatesample] | The operation to create a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json | +| [firmwaresDeleteSample.ts][firmwaresdeletesample] | The operation to delete a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json | +| [firmwaresGenerateDownloadUrlSample.ts][firmwaresgeneratedownloadurlsample] | The operation to a url for file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MaximumSet_Gen.json | +| [firmwaresGenerateFilesystemDownloadUrlSample.ts][firmwaresgeneratefilesystemdownloadurlsample] | The operation to a url for tar file download. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json | +| [firmwaresGetSample.ts][firmwaresgetsample] | Get firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MaximumSet_Gen.json | +| [firmwaresListByWorkspaceSample.ts][firmwareslistbyworkspacesample] | Lists all of firmwares inside a workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MaximumSet_Gen.json | +| [firmwaresUpdateSample.ts][firmwaresupdatesample] | The operation to update firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MaximumSet_Gen.json | +| [operationsListSample.ts][operationslistsample] | Lists the operations for this resource provider x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MaximumSet_Gen.json | +| [passwordHashesListByFirmwareSample.ts][passwordhasheslistbyfirmwaresample] | Lists password hash analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MaximumSet_Gen.json | +| [sbomComponentsListByFirmwareSample.ts][sbomcomponentslistbyfirmwaresample] | Lists SBOM analysis results of a firmware. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MaximumSet_Gen.json | +| [summariesGetSample.ts][summariesgetsample] | Get an analysis result summary of a firmware by name. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MaximumSet_Gen.json | +| [summariesListByFirmwareSample.ts][summarieslistbyfirmwaresample] | Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MaximumSet_Gen.json | +| [workspacesCreateSample.ts][workspacescreatesample] | The operation to create or update a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MaximumSet_Gen.json | +| [workspacesDeleteSample.ts][workspacesdeletesample] | The operation to delete a firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MaximumSet_Gen.json | +| [workspacesGenerateUploadUrlSample.ts][workspacesgenerateuploadurlsample] | The operation to get a url for file upload. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json | +| [workspacesGetSample.ts][workspacesgetsample] | Get firmware analysis workspace. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MaximumSet_Gen.json | +| [workspacesListByResourceGroupSample.ts][workspaceslistbyresourcegroupsample] | Lists all of the firmware analysis workspaces in the specified resource group. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json | +| [workspacesListBySubscriptionSample.ts][workspaceslistbysubscriptionsample] | Lists all of the firmware analysis workspaces in the specified subscription. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json | +| [workspacesUpdateSample.ts][workspacesupdatesample] | The operation to update a firmware analysis workspaces. x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MaximumSet_Gen.json | + +## Prerequisites + +The sample programs are compatible with [LTS versions of Node.js](https://github.com/nodejs/release#release-schedule). + +Before running the samples in Node, they must be compiled to JavaScript using the TypeScript compiler. For more information on TypeScript, see the [TypeScript documentation][typescript]. Install the TypeScript compiler using: + +```bash +npm install -g typescript +``` + +You need [an Azure subscription][freesub] to run these sample programs. + +Samples retrieve credentials to access the service endpoint from environment variables. Alternatively, edit the source code to include the appropriate credentials. See each individual sample for details on which environment variables/credentials it requires to function. + +Adapting the samples to run in the browser may require some additional consideration. For details, please see the [package README][package]. + +## Setup + +To run the samples using the published version of the package: + +1. Install the dependencies using `npm`: + +```bash +npm install +``` + +2. Compile the samples: + +```bash +npm run build +``` + +3. Edit the file `sample.env`, adding the correct credentials to access the Azure service and run the samples. Then rename the file from `sample.env` to just `.env`. The sample programs will read this file automatically. + +4. Run whichever samples you like (note that some samples may require additional setup, see the table above): + +```bash +node dist/binaryHardeningListByFirmwareSample.js +``` + +Alternatively, run a single sample with the correct environment variables set (setting up the `.env` file is not required if you do this), for example (cross-platform): + +```bash +npx cross-env IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID="" IOTFIRMWAREDEFENSE_RESOURCE_GROUP="" node dist/binaryHardeningListByFirmwareSample.js +``` + +## Next Steps + +Take a look at our [API Documentation][apiref] for more information about the APIs that are available in the clients. + +[binaryhardeninglistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/binaryHardeningListByFirmwareSample.ts +[cryptocertificateslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoCertificatesListByFirmwareSample.ts +[cryptokeyslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoKeysListByFirmwareSample.ts +[cveslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cvesListByFirmwareSample.ts +[firmwarescreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresCreateSample.ts +[firmwaresdeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresDeleteSample.ts +[firmwaresgeneratedownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateDownloadUrlSample.ts +[firmwaresgeneratefilesystemdownloadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateFilesystemDownloadUrlSample.ts +[firmwaresgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGetSample.ts +[firmwareslistbyworkspacesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresListByWorkspaceSample.ts +[firmwaresupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresUpdateSample.ts +[operationslistsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/operationsListSample.ts +[passwordhasheslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/passwordHashesListByFirmwareSample.ts +[sbomcomponentslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/sbomComponentsListByFirmwareSample.ts +[summariesgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesGetSample.ts +[summarieslistbyfirmwaresample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesListByFirmwareSample.ts +[workspacescreatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesCreateSample.ts +[workspacesdeletesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesDeleteSample.ts +[workspacesgenerateuploadurlsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGenerateUploadUrlSample.ts +[workspacesgetsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGetSample.ts +[workspaceslistbyresourcegroupsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListByResourceGroupSample.ts +[workspaceslistbysubscriptionsample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListBySubscriptionSample.ts +[workspacesupdatesample]: https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesUpdateSample.ts +[apiref]: https://docs.microsoft.com/javascript/api/@azure/arm-iotfirmwaredefense?view=azure-node-preview +[freesub]: https://azure.microsoft.com/free/ +[package]: https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/README.md +[typescript]: https://www.typescriptlang.org/docs/home.html diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/package.json b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/package.json similarity index 83% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/package.json rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/package.json index 585927429dec..abf2d96c9680 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/package.json +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/package.json @@ -1,8 +1,8 @@ { - "name": "@azure-samples/arm-iotfirmwaredefense-ts-beta", + "name": "@azure-samples/arm-iotfirmwaredefense-ts", "private": true, "version": "1.0.0", - "description": " client library samples for TypeScript (Beta)", + "description": " client library samples for TypeScript", "engines": { "node": ">=18.0.0" }, @@ -29,7 +29,7 @@ }, "homepage": "https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/iotfirmwaredefense/arm-iotfirmwaredefense", "dependencies": { - "@azure/arm-iotfirmwaredefense": "next", + "@azure/arm-iotfirmwaredefense": "latest", "dotenv": "latest", "@azure/identity": "^4.0.1" }, diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/sample.env b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/sample.env similarity index 100% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/sample.env rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/sample.env diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/binaryHardeningListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/binaryHardeningListByFirmwareSample.ts new file mode 100644 index 000000000000..4573ecc76a26 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/binaryHardeningListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists binary hardening analysis results of a firmware. + * + * @summary Lists binary hardening analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MaximumSet_Gen.json + */ +async function binaryHardeningListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.binaryHardening.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists binary hardening analysis results of a firmware. + * + * @summary Lists binary hardening analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/BinaryHardening_ListByFirmware_MinimumSet_Gen.json + */ +async function binaryHardeningListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.binaryHardening.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + binaryHardeningListByFirmwareMaximumSetGen(); + binaryHardeningListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoCertificatesListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoCertificatesListByFirmwareSample.ts new file mode 100644 index 000000000000..6ccda8905df0 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoCertificatesListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware. + * + * @summary Lists cryptographic certificate analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MaximumSet_Gen.json + */ +async function cryptoCertificatesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cryptoCertificates.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists cryptographic certificate analysis results found in a firmware. + * + * @summary Lists cryptographic certificate analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoCertificates_ListByFirmware_MinimumSet_Gen.json + */ +async function cryptoCertificatesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cryptoCertificates.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + cryptoCertificatesListByFirmwareMaximumSetGen(); + cryptoCertificatesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoCertificateListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoKeysListByFirmwareSample.ts similarity index 53% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoCertificateListSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoKeysListByFirmwareSample.ts index d3ba4f6cd80b..145eab076365 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareListGenerateCryptoCertificateListSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cryptoKeysListByFirmwareSample.ts @@ -15,26 +15,26 @@ import * as dotenv from "dotenv"; dotenv.config(); /** - * This sample demonstrates how to The operation to list all crypto certificates for a firmware. + * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware. * - * @summary The operation to list all crypto certificates for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MaximumSet_Gen.json + * @summary Lists cryptographic key analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MaximumSet_Gen.json */ -async function firmwareListGenerateCryptoCertificateListMaximumSetGen() { +async function cryptoKeysListByFirmwareMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; const workspaceName = "default"; - const firmwareId = "DECAFBAD-0000-0000-0000-BADBADBADBAD"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoCertificateList( + for await (let item of client.cryptoKeys.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -42,27 +42,26 @@ async function firmwareListGenerateCryptoCertificateListMaximumSetGen() { } /** - * This sample demonstrates how to The operation to list all crypto certificates for a firmware. + * This sample demonstrates how to Lists cryptographic key analysis results found in a firmware. * - * @summary The operation to list all crypto certificates for a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListGenerateCryptoCertificateList_MinimumSet_Gen.json + * @summary Lists cryptographic key analysis results found in a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/CryptoKeys_ListByFirmware_MinimumSet_Gen.json */ -async function firmwareListGenerateCryptoCertificateListMinimumSetGen() { +async function cryptoKeysListByFirmwareMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || - "C589E84A-5C11-4A25-9CF9-4E9C2F1EBFCA"; + "00000000-0000-0000-0000-000000000000"; const resourceGroupName = - process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || - "rgworkspaces-firmwares"; - const workspaceName = "j5QE_"; - const firmwareId = "wujtpcgypfpqseyrsebolarkspy"; + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listGenerateCryptoCertificateList( + for await (let item of client.cryptoKeys.listByFirmware( resourceGroupName, workspaceName, - firmwareId + firmwareId, )) { resArray.push(item); } @@ -70,8 +69,8 @@ async function firmwareListGenerateCryptoCertificateListMinimumSetGen() { } async function main() { - firmwareListGenerateCryptoCertificateListMaximumSetGen(); - firmwareListGenerateCryptoCertificateListMinimumSetGen(); + cryptoKeysListByFirmwareMaximumSetGen(); + cryptoKeysListByFirmwareMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cvesListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cvesListByFirmwareSample.ts new file mode 100644 index 000000000000..a3eb07fd0ef6 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/cvesListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists CVE analysis results of a firmware. + * + * @summary Lists CVE analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MaximumSet_Gen.json + */ +async function cvesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cves.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists CVE analysis results of a firmware. + * + * @summary Lists CVE analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Cves_ListByFirmware_MinimumSet_Gen.json + */ +async function cvesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.cves.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + cvesListByFirmwareMaximumSetGen(); + cvesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareCreateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresCreateSample.ts similarity index 72% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareCreateSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresCreateSample.ts index f54cad6e8208..73feeaa5d01b 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareCreateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresCreateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { Firmware, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,9 +21,9 @@ dotenv.config(); * This sample demonstrates how to The operation to create a firmware. * * @summary The operation to create a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MaximumSet_Gen.json */ -async function firmwareCreateMaximumSetGen() { +async function firmwaresCreateMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -33,22 +33,24 @@ async function firmwareCreateMaximumSetGen() { const workspaceName = "A7"; const firmwareId = "umrkdttp"; const firmware: Firmware = { - description: "uz", - fileName: "wresexxulcdsdd", - fileSize: 17, - model: "f", - status: "Pending", - statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], - vendor: "vycmdhgtmepcptyoubztiuudpkcpd", - version: "s" + properties: { + description: "uz", + fileName: "wresexxulcdsdd", + fileSize: 17, + model: "f", + status: "Pending", + statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], + vendor: "vycmdhgtmepcptyoubztiuudpkcpd", + version: "s", + }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.create( + const result = await client.firmwares.create( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } @@ -57,9 +59,9 @@ async function firmwareCreateMaximumSetGen() { * This sample demonstrates how to The operation to create a firmware. * * @summary The operation to create a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Create_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Create_MinimumSet_Gen.json */ -async function firmwareCreateMinimumSetGen() { +async function firmwaresCreateMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -71,18 +73,18 @@ async function firmwareCreateMinimumSetGen() { const firmware: Firmware = {}; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.create( + const result = await client.firmwares.create( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } async function main() { - firmwareCreateMaximumSetGen(); - firmwareCreateMinimumSetGen(); + firmwaresCreateMaximumSetGen(); + firmwaresCreateMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareDeleteSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresDeleteSample.ts similarity index 79% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareDeleteSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresDeleteSample.ts index 35c5d3750a02..fa8be1065a9a 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareDeleteSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresDeleteSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to The operation to delete a firmware. * * @summary The operation to delete a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MaximumSet_Gen.json */ -async function firmwareDeleteMaximumSetGen() { +async function firmwaresDeleteMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareDeleteMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.delete( + const result = await client.firmwares.delete( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareDeleteMaximumSetGen() { * This sample demonstrates how to The operation to delete a firmware. * * @summary The operation to delete a firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Delete_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Delete_MinimumSet_Gen.json */ -async function firmwareDeleteMinimumSetGen() { +async function firmwaresDeleteMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareDeleteMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.delete( + const result = await client.firmwares.delete( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareDeleteMaximumSetGen(); - firmwareDeleteMinimumSetGen(); + firmwaresDeleteMaximumSetGen(); + firmwaresDeleteMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateDownloadUrlSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateDownloadUrlSample.ts similarity index 76% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateDownloadUrlSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateDownloadUrlSample.ts index 3cb301856870..96dd159592a8 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateDownloadUrlSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateDownloadUrlSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to The operation to a url for file download. * * @summary The operation to a url for file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MaximumSet_Gen.json */ -async function firmwareGenerateDownloadUrlMaximumSetGen() { +async function firmwaresGenerateDownloadUrlMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareGenerateDownloadUrlMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateDownloadUrl( + const result = await client.firmwares.generateDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareGenerateDownloadUrlMaximumSetGen() { * This sample demonstrates how to The operation to a url for file download. * * @summary The operation to a url for file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateDownloadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateDownloadUrl_MinimumSet_Gen.json */ -async function firmwareGenerateDownloadUrlMinimumSetGen() { +async function firmwaresGenerateDownloadUrlMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareGenerateDownloadUrlMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateDownloadUrl( + const result = await client.firmwares.generateDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareGenerateDownloadUrlMaximumSetGen(); - firmwareGenerateDownloadUrlMinimumSetGen(); + firmwaresGenerateDownloadUrlMaximumSetGen(); + firmwaresGenerateDownloadUrlMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateFilesystemDownloadUrlSample.ts similarity index 74% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateFilesystemDownloadUrlSample.ts index 96974d02d1f3..1f5718987729 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareGenerateFilesystemDownloadUrlSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGenerateFilesystemDownloadUrlSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to The operation to a url for tar file download. * * @summary The operation to a url for tar file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MaximumSet_Gen.json */ -async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { +async function firmwaresGenerateFilesystemDownloadUrlMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateFilesystemDownloadUrl( + const result = await client.firmwares.generateFilesystemDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareGenerateFilesystemDownloadUrlMaximumSetGen() { * This sample demonstrates how to The operation to a url for tar file download. * * @summary The operation to a url for tar file download. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_GenerateFilesystemDownloadUrl_MinimumSet_Gen.json */ -async function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() { +async function firmwaresGenerateFilesystemDownloadUrlMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareGenerateFilesystemDownloadUrlMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.generateFilesystemDownloadUrl( + const result = await client.firmwares.generateFilesystemDownloadUrl( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareGenerateFilesystemDownloadUrlMaximumSetGen(); - firmwareGenerateFilesystemDownloadUrlMinimumSetGen(); + firmwaresGenerateFilesystemDownloadUrlMaximumSetGen(); + firmwaresGenerateFilesystemDownloadUrlMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGetSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGetSample.ts similarity index 79% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGetSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGetSample.ts index 1cfb3f735e7f..70d35c3ab040 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareGetSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresGetSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to Get firmware. * * @summary Get firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MaximumSet_Gen.json */ -async function firmwareGetMaximumSetGen() { +async function firmwaresGetMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,10 +31,10 @@ async function firmwareGetMaximumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.get( + const result = await client.firmwares.get( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } @@ -43,9 +43,9 @@ async function firmwareGetMaximumSetGen() { * This sample demonstrates how to Get firmware. * * @summary Get firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Get_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Get_MinimumSet_Gen.json */ -async function firmwareGetMinimumSetGen() { +async function firmwaresGetMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -56,17 +56,17 @@ async function firmwareGetMinimumSetGen() { const firmwareId = "umrkdttp"; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.get( + const result = await client.firmwares.get( resourceGroupName, workspaceName, - firmwareId + firmwareId, ); console.log(result); } async function main() { - firmwareGetMaximumSetGen(); - firmwareGetMinimumSetGen(); + firmwaresGetMaximumSetGen(); + firmwaresGetMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListByWorkspaceSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresListByWorkspaceSample.ts similarity index 77% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListByWorkspaceSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresListByWorkspaceSample.ts index 02e3e43dc707..ab3741f9f403 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples-dev/firmwareListByWorkspaceSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresListByWorkspaceSample.ts @@ -18,9 +18,9 @@ dotenv.config(); * This sample demonstrates how to Lists all of firmwares inside a workspace. * * @summary Lists all of firmwares inside a workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MaximumSet_Gen.json */ -async function firmwareListByWorkspaceMaximumSetGen() { +async function firmwaresListByWorkspaceMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -31,9 +31,9 @@ async function firmwareListByWorkspaceMaximumSetGen() { const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listByWorkspace( + for await (let item of client.firmwares.listByWorkspace( resourceGroupName, - workspaceName + workspaceName, )) { resArray.push(item); } @@ -44,9 +44,9 @@ async function firmwareListByWorkspaceMaximumSetGen() { * This sample demonstrates how to Lists all of firmwares inside a workspace. * * @summary Lists all of firmwares inside a workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_ListByWorkspace_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_ListByWorkspace_MinimumSet_Gen.json */ -async function firmwareListByWorkspaceMinimumSetGen() { +async function firmwaresListByWorkspaceMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -57,9 +57,9 @@ async function firmwareListByWorkspaceMinimumSetGen() { const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); - for await (let item of client.firmwareOperations.listByWorkspace( + for await (let item of client.firmwares.listByWorkspace( resourceGroupName, - workspaceName + workspaceName, )) { resArray.push(item); } @@ -67,8 +67,8 @@ async function firmwareListByWorkspaceMinimumSetGen() { } async function main() { - firmwareListByWorkspaceMaximumSetGen(); - firmwareListByWorkspaceMinimumSetGen(); + firmwaresListByWorkspaceMaximumSetGen(); + firmwaresListByWorkspaceMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareUpdateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresUpdateSample.ts similarity index 72% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareUpdateSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresUpdateSample.ts index 97aada7c255f..5a2589556ce7 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/firmwareUpdateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/firmwaresUpdateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { FirmwareUpdateDefinition, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,9 +21,9 @@ dotenv.config(); * This sample demonstrates how to The operation to update firmware. * * @summary The operation to update firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MaximumSet_Gen.json */ -async function firmwareUpdateMaximumSetGen() { +async function firmwaresUpdateMaximumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -33,22 +33,24 @@ async function firmwareUpdateMaximumSetGen() { const workspaceName = "A7"; const firmwareId = "umrkdttp"; const firmware: FirmwareUpdateDefinition = { - description: "uz", - fileName: "wresexxulcdsdd", - fileSize: 17, - model: "f", - status: "Pending", - statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], - vendor: "vycmdhgtmepcptyoubztiuudpkcpd", - version: "s" + properties: { + description: "uz", + fileName: "wresexxulcdsdd", + fileSize: 17, + model: "f", + status: "Pending", + statusMessages: [{ message: "ulvhmhokezathzzauiitu" }], + vendor: "vycmdhgtmepcptyoubztiuudpkcpd", + version: "s", + }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.update( + const result = await client.firmwares.update( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } @@ -57,9 +59,9 @@ async function firmwareUpdateMaximumSetGen() { * This sample demonstrates how to The operation to update firmware. * * @summary The operation to update firmware. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Firmware_Update_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Firmwares_Update_MinimumSet_Gen.json */ -async function firmwareUpdateMinimumSetGen() { +async function firmwaresUpdateMinimumSetGen() { const subscriptionId = process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || "685C0C6F-9867-4B1C-A534-AA3A05B54BCE"; @@ -71,18 +73,18 @@ async function firmwareUpdateMinimumSetGen() { const firmware: FirmwareUpdateDefinition = {}; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); - const result = await client.firmwareOperations.update( + const result = await client.firmwares.update( resourceGroupName, workspaceName, firmwareId, - firmware + firmware, ); console.log(result); } async function main() { - firmwareUpdateMaximumSetGen(); - firmwareUpdateMinimumSetGen(); + firmwaresUpdateMaximumSetGen(); + firmwaresUpdateMinimumSetGen(); } main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/operationsListSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/operationsListSample.ts similarity index 90% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/operationsListSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/operationsListSample.ts index 55f91946e6be..dbdf7b4001bf 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/operationsListSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/operationsListSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Lists the operations for this resource provider * * @summary Lists the operations for this resource provider - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MaximumSet_Gen.json */ async function operationsListMaximumSetGen() { const subscriptionId = @@ -37,7 +37,7 @@ async function operationsListMaximumSetGen() { * This sample demonstrates how to Lists the operations for this resource provider * * @summary Lists the operations for this resource provider - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Operations_List_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Operations_List_MinimumSet_Gen.json */ async function operationsListMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/passwordHashesListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/passwordHashesListByFirmwareSample.ts new file mode 100644 index 000000000000..4b82d9fc178a --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/passwordHashesListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists password hash analysis results of a firmware. + * + * @summary Lists password hash analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MaximumSet_Gen.json + */ +async function passwordHashesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.passwordHashes.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists password hash analysis results of a firmware. + * + * @summary Lists password hash analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/PasswordHashes_ListByFirmware_MinimumSet_Gen.json + */ +async function passwordHashesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.passwordHashes.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + passwordHashesListByFirmwareMaximumSetGen(); + passwordHashesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/sbomComponentsListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/sbomComponentsListByFirmwareSample.ts new file mode 100644 index 000000000000..108b8d25a332 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/sbomComponentsListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists SBOM analysis results of a firmware. + * + * @summary Lists SBOM analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MaximumSet_Gen.json + */ +async function sbomComponentsListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.sbomComponents.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists SBOM analysis results of a firmware. + * + * @summary Lists SBOM analysis results of a firmware. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/SbomComponents_ListByFirmware_MinimumSet_Gen.json + */ +async function sbomComponentsListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.sbomComponents.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + sbomComponentsListByFirmwareMaximumSetGen(); + sbomComponentsListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesGetSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesGetSample.ts new file mode 100644 index 000000000000..e03c299125c4 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesGetSample.ts @@ -0,0 +1,74 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Get an analysis result summary of a firmware by name. + * + * @summary Get an analysis result summary of a firmware by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MaximumSet_Gen.json + */ +async function summariesGetMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const summaryName = "Firmware"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const result = await client.summaries.get( + resourceGroupName, + workspaceName, + firmwareId, + summaryName, + ); + console.log(result); +} + +/** + * This sample demonstrates how to Get an analysis result summary of a firmware by name. + * + * @summary Get an analysis result summary of a firmware by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_Get_MinimumSet_Gen.json + */ +async function summariesGetMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const summaryName = "Firmware"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const result = await client.summaries.get( + resourceGroupName, + workspaceName, + firmwareId, + summaryName, + ); + console.log(result); +} + +async function main() { + summariesGetMaximumSetGen(); + summariesGetMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesListByFirmwareSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesListByFirmwareSample.ts new file mode 100644 index 000000000000..c0282fce9044 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/summariesListByFirmwareSample.ts @@ -0,0 +1,76 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +// Copyright (c) Microsoft Corporation. +// Licensed under the MIT License. +import { IoTFirmwareDefenseClient } from "@azure/arm-iotfirmwaredefense"; +import { DefaultAzureCredential } from "@azure/identity"; +import * as dotenv from "dotenv"; + +dotenv.config(); + +/** + * This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * + * @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MaximumSet_Gen.json + */ +async function summariesListByFirmwareMaximumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.summaries.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +/** + * This sample demonstrates how to Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * + * @summary Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary by name. + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Summaries_ListByFirmware_MinimumSet_Gen.json + */ +async function summariesListByFirmwareMinimumSetGen() { + const subscriptionId = + process.env["IOTFIRMWAREDEFENSE_SUBSCRIPTION_ID"] || + "00000000-0000-0000-0000-000000000000"; + const resourceGroupName = + process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "FirmwareAnalysisRG"; + const workspaceName = "default"; + const firmwareId = "109a9886-50bf-85a8-9d75-000000000000"; + const credential = new DefaultAzureCredential(); + const client = new IoTFirmwareDefenseClient(credential, subscriptionId); + const resArray = new Array(); + for await (let item of client.summaries.listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + )) { + resArray.push(item); + } + console.log(resArray); +} + +async function main() { + summariesListByFirmwareMaximumSetGen(); + summariesListByFirmwareMinimumSetGen(); +} + +main().catch(console.error); diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesCreateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesCreateSample.ts similarity index 88% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesCreateSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesCreateSample.ts index ee4bdd522b68..0e625a1aa8e0 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesCreateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesCreateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { Workspace, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,7 +21,7 @@ dotenv.config(); * This sample demonstrates how to The operation to create or update a firmware analysis workspace. * * @summary The operation to create or update a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MaximumSet_Gen.json */ async function workspacesCreateMaximumSetGen() { const subscriptionId = @@ -32,14 +32,15 @@ async function workspacesCreateMaximumSetGen() { const workspaceName = "E___-3"; const workspace: Workspace = { location: "jjwbseilitjgdrhbvvkwviqj", - tags: { key450: "rzqqumbpfsbibnpirsm" } + properties: {}, + tags: { key450: "rzqqumbpfsbibnpirsm" }, }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.create( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } @@ -48,7 +49,7 @@ async function workspacesCreateMaximumSetGen() { * This sample demonstrates how to The operation to create or update a firmware analysis workspace. * * @summary The operation to create or update a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Create_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Create_MinimumSet_Gen.json */ async function workspacesCreateMinimumSetGen() { const subscriptionId = @@ -63,7 +64,7 @@ async function workspacesCreateMinimumSetGen() { const result = await client.workspaces.create( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesDeleteSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesDeleteSample.ts similarity index 90% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesDeleteSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesDeleteSample.ts index ab29667e42f3..7b4b69656d09 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesDeleteSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesDeleteSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to The operation to delete a firmware analysis workspace. * * @summary The operation to delete a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MaximumSet_Gen.json */ async function workspacesDeleteMaximumSetGen() { const subscriptionId = @@ -31,7 +31,7 @@ async function workspacesDeleteMaximumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.delete( resourceGroupName, - workspaceName + workspaceName, ); console.log(result); } @@ -40,7 +40,7 @@ async function workspacesDeleteMaximumSetGen() { * This sample demonstrates how to The operation to delete a firmware analysis workspace. * * @summary The operation to delete a firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Delete_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Delete_MinimumSet_Gen.json */ async function workspacesDeleteMinimumSetGen() { const subscriptionId = @@ -53,7 +53,7 @@ async function workspacesDeleteMinimumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.delete( resourceGroupName, - workspaceName + workspaceName, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGenerateUploadUrlSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGenerateUploadUrlSample.ts similarity index 88% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGenerateUploadUrlSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGenerateUploadUrlSample.ts index e795809c7f5c..5ce164ee4a27 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGenerateUploadUrlSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGenerateUploadUrlSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { GenerateUploadUrlRequest, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,7 +21,7 @@ dotenv.config(); * This sample demonstrates how to The operation to get a url for file upload. * * @summary The operation to get a url for file upload. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MaximumSet_Gen.json */ async function workspacesGenerateUploadUrlMaximumSetGen() { const subscriptionId = @@ -31,14 +31,14 @@ async function workspacesGenerateUploadUrlMaximumSetGen() { process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces"; const workspaceName = "E___-3"; const generateUploadUrl: GenerateUploadUrlRequest = { - firmwareId: "ytsfprbywi" + firmwareId: "ytsfprbywi", }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.generateUploadUrl( resourceGroupName, workspaceName, - generateUploadUrl + generateUploadUrl, ); console.log(result); } @@ -47,7 +47,7 @@ async function workspacesGenerateUploadUrlMaximumSetGen() { * This sample demonstrates how to The operation to get a url for file upload. * * @summary The operation to get a url for file upload. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_GenerateUploadUrl_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_GenerateUploadUrl_MinimumSet_Gen.json */ async function workspacesGenerateUploadUrlMinimumSetGen() { const subscriptionId = @@ -62,7 +62,7 @@ async function workspacesGenerateUploadUrlMinimumSetGen() { const result = await client.workspaces.generateUploadUrl( resourceGroupName, workspaceName, - generateUploadUrl + generateUploadUrl, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGetSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGetSample.ts similarity index 91% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGetSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGetSample.ts index 505ba01ca2f8..26c376faa749 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesGetSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesGetSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Get firmware analysis workspace. * * @summary Get firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MaximumSet_Gen.json */ async function workspacesGetMaximumSetGen() { const subscriptionId = @@ -37,7 +37,7 @@ async function workspacesGetMaximumSetGen() { * This sample demonstrates how to Get firmware analysis workspace. * * @summary Get firmware analysis workspace. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Get_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Get_MinimumSet_Gen.json */ async function workspacesGetMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListByResourceGroupSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListByResourceGroupSample.ts similarity index 89% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListByResourceGroupSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListByResourceGroupSample.ts index 526fcbc2417b..f2fb56a6c1ba 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListByResourceGroupSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListByResourceGroupSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group. * * @summary Lists all of the firmware analysis workspaces in the specified resource group. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MaximumSet_Gen.json */ async function workspacesListByResourceGroupMaximumSetGen() { const subscriptionId = @@ -30,7 +30,7 @@ async function workspacesListByResourceGroupMaximumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); for await (let item of client.workspaces.listByResourceGroup( - resourceGroupName + resourceGroupName, )) { resArray.push(item); } @@ -41,7 +41,7 @@ async function workspacesListByResourceGroupMaximumSetGen() { * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified resource group. * * @summary Lists all of the firmware analysis workspaces in the specified resource group. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListByResourceGroup_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListByResourceGroup_MinimumSet_Gen.json */ async function workspacesListByResourceGroupMinimumSetGen() { const subscriptionId = @@ -53,7 +53,7 @@ async function workspacesListByResourceGroupMinimumSetGen() { const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const resArray = new Array(); for await (let item of client.workspaces.listByResourceGroup( - resourceGroupName + resourceGroupName, )) { resArray.push(item); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListBySubscriptionSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListBySubscriptionSample.ts similarity index 90% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListBySubscriptionSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListBySubscriptionSample.ts index cfdd984e4ca6..d5ec9dccd511 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesListBySubscriptionSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesListBySubscriptionSample.ts @@ -18,7 +18,7 @@ dotenv.config(); * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription. * * @summary Lists all of the firmware analysis workspaces in the specified subscription. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MaximumSet_Gen.json */ async function workspacesListBySubscriptionMaximumSetGen() { const subscriptionId = @@ -37,7 +37,7 @@ async function workspacesListBySubscriptionMaximumSetGen() { * This sample demonstrates how to Lists all of the firmware analysis workspaces in the specified subscription. * * @summary Lists all of the firmware analysis workspaces in the specified subscription. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_ListBySubscription_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_ListBySubscription_MinimumSet_Gen.json */ async function workspacesListBySubscriptionMinimumSetGen() { const subscriptionId = diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesUpdateSample.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesUpdateSample.ts similarity index 88% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesUpdateSample.ts rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesUpdateSample.ts index cbbc90073a35..08780161f3ca 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/src/workspacesUpdateSample.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/src/workspacesUpdateSample.ts @@ -10,7 +10,7 @@ // Licensed under the MIT License. import { WorkspaceUpdateDefinition, - IoTFirmwareDefenseClient + IoTFirmwareDefenseClient, } from "@azure/arm-iotfirmwaredefense"; import { DefaultAzureCredential } from "@azure/identity"; import * as dotenv from "dotenv"; @@ -21,7 +21,7 @@ dotenv.config(); * This sample demonstrates how to The operation to update a firmware analysis workspaces. * * @summary The operation to update a firmware analysis workspaces. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MaximumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MaximumSet_Gen.json */ async function workspacesUpdateMaximumSetGen() { const subscriptionId = @@ -30,13 +30,13 @@ async function workspacesUpdateMaximumSetGen() { const resourceGroupName = process.env["IOTFIRMWAREDEFENSE_RESOURCE_GROUP"] || "rgworkspaces"; const workspaceName = "E___-3"; - const workspace: WorkspaceUpdateDefinition = {}; + const workspace: WorkspaceUpdateDefinition = { properties: {} }; const credential = new DefaultAzureCredential(); const client = new IoTFirmwareDefenseClient(credential, subscriptionId); const result = await client.workspaces.update( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } @@ -45,7 +45,7 @@ async function workspacesUpdateMaximumSetGen() { * This sample demonstrates how to The operation to update a firmware analysis workspaces. * * @summary The operation to update a firmware analysis workspaces. - * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/preview/2023-02-08-preview/examples/Workspaces_Update_MinimumSet_Gen.json + * x-ms-original-file: specification/fist/resource-manager/Microsoft.IoTFirmwareDefense/stable/2024-01-10/examples/Workspaces_Update_MinimumSet_Gen.json */ async function workspacesUpdateMinimumSetGen() { const subscriptionId = @@ -60,7 +60,7 @@ async function workspacesUpdateMinimumSetGen() { const result = await client.workspaces.update( resourceGroupName, workspaceName, - workspace + workspace, ); console.log(result); } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/tsconfig.json b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/tsconfig.json similarity index 100% rename from sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1-beta/typescript/tsconfig.json rename to sdk/iotfirmwaredefense/arm-iotfirmwaredefense/samples/v1/typescript/tsconfig.json diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/ioTFirmwareDefenseClient.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/ioTFirmwareDefenseClient.ts index 2f7f4be86f3f..a21406c99a0d 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/ioTFirmwareDefenseClient.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/ioTFirmwareDefenseClient.ts @@ -11,18 +11,32 @@ import * as coreRestPipeline from "@azure/core-rest-pipeline"; import { PipelineRequest, PipelineResponse, - SendRequest + SendRequest, } from "@azure/core-rest-pipeline"; import * as coreAuth from "@azure/core-auth"; import { - FirmwareOperationsImpl, + BinaryHardeningImpl, + CryptoCertificatesImpl, + CryptoKeysImpl, + CvesImpl, + FirmwaresImpl, + OperationsImpl, + PasswordHashesImpl, + SbomComponentsImpl, + SummariesImpl, WorkspacesImpl, - OperationsImpl } from "./operations"; import { - FirmwareOperations, + BinaryHardening, + CryptoCertificates, + CryptoKeys, + Cves, + Firmwares, + Operations, + PasswordHashes, + SbomComponents, + Summaries, Workspaces, - Operations } from "./operationsInterfaces"; import { IoTFirmwareDefenseClientOptionalParams } from "./models"; @@ -34,13 +48,13 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { /** * Initializes a new instance of the IoTFirmwareDefenseClient class. * @param credentials Subscription credentials which uniquely identify client subscription. - * @param subscriptionId The ID of the target subscription. + * @param subscriptionId The ID of the target subscription. The value must be an UUID. * @param options The parameter options */ constructor( credentials: coreAuth.TokenCredential, subscriptionId: string, - options?: IoTFirmwareDefenseClientOptionalParams + options?: IoTFirmwareDefenseClientOptionalParams, ) { if (credentials === undefined) { throw new Error("'credentials' cannot be null"); @@ -55,10 +69,10 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { } const defaults: IoTFirmwareDefenseClientOptionalParams = { requestContentType: "application/json; charset=utf-8", - credential: credentials + credential: credentials, }; - const packageDetails = `azsdk-js-arm-iotfirmwaredefense/1.0.0-beta.2`; + const packageDetails = `azsdk-js-arm-iotfirmwaredefense/1.0.0`; const userAgentPrefix = options.userAgentOptions && options.userAgentOptions.userAgentPrefix ? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}` @@ -68,20 +82,21 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { ...defaults, ...options, userAgentOptions: { - userAgentPrefix + userAgentPrefix, }, endpoint: - options.endpoint ?? options.baseUri ?? "https://management.azure.com" + options.endpoint ?? options.baseUri ?? "https://management.azure.com", }; super(optionsWithDefaults); let bearerTokenAuthenticationPolicyFound: boolean = false; if (options?.pipeline && options.pipeline.getOrderedPolicies().length > 0) { - const pipelinePolicies: coreRestPipeline.PipelinePolicy[] = options.pipeline.getOrderedPolicies(); + const pipelinePolicies: coreRestPipeline.PipelinePolicy[] = + options.pipeline.getOrderedPolicies(); bearerTokenAuthenticationPolicyFound = pipelinePolicies.some( (pipelinePolicy) => pipelinePolicy.name === - coreRestPipeline.bearerTokenAuthenticationPolicyName + coreRestPipeline.bearerTokenAuthenticationPolicyName, ); } if ( @@ -91,7 +106,7 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { !bearerTokenAuthenticationPolicyFound ) { this.pipeline.removePolicy({ - name: coreRestPipeline.bearerTokenAuthenticationPolicyName + name: coreRestPipeline.bearerTokenAuthenticationPolicyName, }); this.pipeline.addPolicy( coreRestPipeline.bearerTokenAuthenticationPolicy({ @@ -101,9 +116,9 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { `${optionsWithDefaults.endpoint}/.default`, challengeCallbacks: { authorizeRequestOnChallenge: - coreClient.authorizeRequestOnClaimChallenge - } - }) + coreClient.authorizeRequestOnClaimChallenge, + }, + }), ); } // Parameter assignments @@ -111,10 +126,17 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { // Assigning values to Constant parameters this.$host = options.$host || "https://management.azure.com"; - this.apiVersion = options.apiVersion || "2023-02-08-preview"; - this.firmwareOperations = new FirmwareOperationsImpl(this); - this.workspaces = new WorkspacesImpl(this); + this.apiVersion = options.apiVersion || "2024-01-10"; + this.binaryHardening = new BinaryHardeningImpl(this); + this.cryptoCertificates = new CryptoCertificatesImpl(this); + this.cryptoKeys = new CryptoKeysImpl(this); + this.cves = new CvesImpl(this); + this.firmwares = new FirmwaresImpl(this); this.operations = new OperationsImpl(this); + this.passwordHashes = new PasswordHashesImpl(this); + this.sbomComponents = new SbomComponentsImpl(this); + this.summaries = new SummariesImpl(this); + this.workspaces = new WorkspacesImpl(this); this.addCustomApiVersionPolicy(options.apiVersion); } @@ -127,7 +149,7 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { name: "CustomApiVersionPolicy", async sendRequest( request: PipelineRequest, - next: SendRequest + next: SendRequest, ): Promise { const param = request.url.split("?"); if (param.length > 1) { @@ -141,12 +163,19 @@ export class IoTFirmwareDefenseClient extends coreClient.ServiceClient { request.url = param[0] + "?" + newParams.join("&"); } return next(request); - } + }, }; this.pipeline.addPolicy(apiVersionPolicy); } - firmwareOperations: FirmwareOperations; - workspaces: Workspaces; + binaryHardening: BinaryHardening; + cryptoCertificates: CryptoCertificates; + cryptoKeys: CryptoKeys; + cves: Cves; + firmwares: Firmwares; operations: Operations; + passwordHashes: PasswordHashes; + sbomComponents: SbomComponents; + summaries: Summaries; + workspaces: Workspaces; } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/index.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/index.ts index d6473b5afc2a..95550f761c9d 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/index.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/index.ts @@ -8,21 +8,61 @@ import * as coreClient from "@azure/core-client"; -/** List of firmwares */ -export interface FirmwareList { +export type SummaryResourcePropertiesUnion = + | SummaryResourceProperties + | FirmwareSummary + | CveSummary + | BinaryHardeningSummaryResource + | CryptoCertificateSummaryResource + | CryptoKeySummaryResource; + +/** List of binary hardening results. */ +export interface BinaryHardeningListResult { /** - * The list of firmwares. + * The list of binary hardening results. * NOTE: This property will not be serialized. It can only be populated by the server. */ - readonly value?: Firmware[]; - /** The uri to fetch the next page of asset. */ + readonly value?: BinaryHardeningResource[]; + /** The uri to fetch the next page of resources. */ nextLink?: string; } +/** Binary hardening of a firmware. */ +export interface BinaryHardeningResult { + /** ID for the binary hardening result. */ + binaryHardeningId?: string; + /** Binary hardening features. */ + features?: BinaryHardeningFeatures; + /** The architecture of the uploaded firmware. */ + architecture?: string; + /** The executable path. */ + filePath?: string; + /** The executable class to indicate 32 or 64 bit. */ + class?: string; + /** The runpath of the uploaded firmware. */ + runpath?: string; + /** The rpath of the uploaded firmware. */ + rpath?: string; +} + +/** Binary hardening features. */ +export interface BinaryHardeningFeatures { + /** NX (no-execute) flag. */ + nx?: boolean; + /** PIE (position independent executable) flag. */ + pie?: boolean; + /** RELRO (relocation read-only) flag. */ + relro?: boolean; + /** Canary (stack canaries) flag. */ + canary?: boolean; + /** Stripped flag. */ + stripped?: boolean; +} + /** Common fields that are returned in the response for all Azure Resource Manager resources */ export interface Resource { /** - * Fully qualified resource ID for the resource. Ex - /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName} + * Fully qualified resource ID for the resource. E.g. "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}" * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly id?: string; @@ -108,286 +148,20 @@ export interface ErrorAdditionalInfo { readonly info?: Record; } -/** Firmware definition */ -export interface FirmwareUpdateDefinition { - /** File name for a firmware that user uploaded. */ - fileName?: string; - /** Firmware vendor. */ - vendor?: string; - /** Firmware model. */ - model?: string; - /** Firmware version. */ - version?: string; - /** User-specified description of the firmware. */ - description?: string; - /** File size of the uploaded firmware image. */ - fileSize?: number; - /** The status of firmware scan. */ - status?: Status; - /** A list of errors or other messages generated during firmware analysis */ - statusMessages?: Record[]; - /** - * Provisioning state of the resource. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly provisioningState?: ProvisioningState; -} - -/** Url data for creating or accessing a blob file. */ -export interface UrlToken { - /** - * SAS URL for creating or accessing a blob file. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly url?: string; - /** - * SAS URL for file uploading. Kept for backwards compatibility - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly uploadUrl?: string; -} - -/** Summary result after scanning the firmware. */ -export interface FirmwareSummary { - /** Total extracted size of the firmware in bytes. */ - extractedSize?: number; - /** Firmware file size in bytes. */ - fileSize?: number; - /** Extracted file count. */ - extractedFileCount?: number; - /** Components count. */ - componentCount?: number; - /** Binary count */ - binaryCount?: number; - /** Time used for analysis */ - analysisTimeSeconds?: number; - /** The number of root file systems found. */ - rootFileSystems?: number; -} - -/** List result for components */ -export interface ComponentList { - /** - * The list of components. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly value?: Component[]; - /** The uri to fetch the next page of asset. */ - nextLink?: string; -} - -/** Component of a firmware. */ -export interface Component { - /** ID for the component. */ - componentId?: string; - /** Name for the component. */ - componentName?: string; - /** Version for the component. */ - version?: string; - /** License for the component. */ - license?: string; - /** Release date for the component. */ - releaseDate?: Date; - /** Paths of the component. */ - paths?: string[]; - /** Flag if new update is available for the component. */ - isUpdateAvailable?: IsUpdateAvailable; -} - -/** List result for binary hardening */ -export interface BinaryHardeningList { - /** - * The list of binary hardening results. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly value?: BinaryHardening[]; - /** The uri to fetch the next page of asset. */ - nextLink?: string; -} - -/** Binary hardening of a firmware. */ -export interface BinaryHardening { - /** ID for the binary hardening result. */ - binaryHardeningId?: string; - /** The architecture of the uploaded firmware. */ - architecture?: string; - /** path for binary hardening. */ - path?: string; - /** class for binary hardening. */ - class?: string; - /** The runpath of the uploaded firmware. */ - runpath?: string; - /** The rpath of the uploaded firmware. */ - rpath?: string; - /** NX flag. */ - nx?: NxFlag; - /** PIE flag. */ - pie?: PieFlag; - /** RELRO flag. */ - relro?: RelroFlag; - /** Canary flag. */ - canary?: CanaryFlag; - /** Stripped flag. */ - stripped?: StrippedFlag; -} - -/** Binary hardening summary percentages. */ -export interface BinaryHardeningSummary { - /** Total number of binaries that were analyzed */ - totalFiles?: number; - /** NX summary percentage */ - nx?: number; - /** PIE summary percentage */ - pie?: number; - /** RELRO summary percentage */ - relro?: number; - /** Canary summary percentage */ - canary?: number; - /** Stripped summary percentage */ - stripped?: number; -} - -/** Password hashes list */ -export interface PasswordHashList { - /** - * Password hashes list - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly value?: PasswordHash[]; - /** The uri to fetch the next page of asset. */ - nextLink?: string; -} - -/** Password hash properties */ -export interface PasswordHash { - /** ID for password hash */ - passwordHashId?: string; - /** File path of the password hash */ - filePath?: string; - /** Salt of the password hash */ - salt?: string; - /** Hash of the password */ - hash?: string; - /** Context of password hash */ - context?: string; - /** User name of password hash */ - username?: string; - /** Algorithm of the password hash */ - algorithm?: string; -} - -/** List result for CVE */ -export interface CveList { - /** - * The list of CVE results. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly value?: Cve[]; - /** The uri to fetch the next page of asset. */ - nextLink?: string; -} - -/** Known CVEs of a firmware. */ -export interface Cve { - /** ID of CVE */ - cveId?: string; - /** Component of CVE */ - component?: Record; - /** Severity of CVE */ - severity?: string; - /** Name of CVE */ - name?: string; - /** A single CVSS score to represent the CVE. If a V3 score is specified, then it will use the V3 score. Otherwise if the V2 score is specified it will be the V2 score */ - cvssScore?: string; - /** Cvss version of CVE */ - cvssVersion?: string; - /** Cvss V2 score of CVE */ - cvssV2Score?: string; - /** Cvss V3 score of CVE */ - cvssV3Score?: string; - /** Publish date of CVE */ - publishDate?: Date; - /** Updated date of CVE */ - updatedDate?: Date; - /** - * The list of CVE links. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly links?: CveLink[]; - /** Description of CVE */ - description?: string; -} - -/** Link for CVE */ -export interface CveLink { - /** Href of CVE link */ - href?: string; - /** Label of CVE link */ - label?: string; -} - -/** CVE summary values. */ -export interface CveSummary { - /** The total number of critical severity CVEs detected */ - critical?: number; - /** The total number of high severity CVEs detected */ - high?: number; - /** The total number of medium severity CVEs detected */ - medium?: number; - /** The total number of low severity CVEs detected */ - low?: number; - /** The total number of unknown severity CVEs detected */ - unknown?: number; - /** The total number of undefined severity CVEs detected */ - undefined?: number; -} - -/** Cryptographic certificate summary values. */ -export interface CryptoCertificateSummary { - /** Total number of certificates found. */ - totalCertificates?: number; - /** Total number of paired private keys found for the certificates. */ - pairedKeys?: number; - /** Total number of expired certificates found. */ - expired?: number; - /** Total number of nearly expired certificates found. */ - expiringSoon?: number; - /** Total number of certificates found using a weak signature algorithm. */ - weakSignature?: number; - /** Total number of certificates found that are self-signed. */ - selfSigned?: number; - /** Total number of certificates found that have an insecure key size for the key algorithm. */ - shortKeySize?: number; -} - -/** Cryptographic key summary values. */ -export interface CryptoKeySummary { - /** Total number of cryptographic keys found. */ - totalKeys?: number; - /** Total number of (non-certificate) public keys found. */ - publicKeys?: number; - /** Total number of private keys found. */ - privateKeys?: number; - /** Total number of keys found that have a matching paired key or certificate. */ - pairedKeys?: number; - /** Total number of keys found that have an insecure key size for the algorithm. */ - shortKeySize?: number; -} - -/** Crypto certificates list */ -export interface CryptoCertificateList { +/** List of crypto certificates. */ +export interface CryptoCertificateListResult { /** - * Crypto certificates list + * The list of crypto certificate results. * NOTE: This property will not be serialized. It can only be populated by the server. */ - readonly value?: CryptoCertificate[]; - /** The uri to fetch the next page of asset. */ + readonly value?: CryptoCertificateResource[]; + /** The uri to fetch the next page of resources. */ nextLink?: string; } /** Crypto certificate properties */ export interface CryptoCertificate { - /** ID for the certificate. */ + /** ID for the certificate result. */ cryptoCertId?: string; /** Name of the certificate. */ name?: string; @@ -416,20 +190,20 @@ export interface CryptoCertificate { /** List of functions the certificate can fulfill. */ usage?: string[]; /** - * List of files paths for this certificate + * List of files where this certificate was found. * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly filePaths?: string[]; /** A matching paired private key. */ pairedKey?: PairedKey; /** Indicates if the certificate is expired. */ - isExpired?: IsExpired; - /** Indicates if the certificate was self-signed. */ - isSelfSigned?: IsSelfSigned; + isExpired?: boolean; + /** Indicates if the certificate is self-signed. */ + isSelfSigned?: boolean; /** Indicates the signature algorithm used is insecure. */ - isWeakSignature?: IsWeakSignature; + isWeakSignature?: boolean; /** Indicates the certificate's key size is considered too small to be secure for the key algorithm. */ - isShortKeySize?: IsShortKeySize; + isShortKeySize?: boolean; } /** Information on an entity (distinguished name) in a cryptographic certificate. */ @@ -452,24 +226,22 @@ export interface PairedKey { id?: string; /** The type indicating whether the paired object is a key or certificate. */ type?: string; - /** Additional paired key properties */ - additionalProperties?: Record; } -/** Crypto keys list */ -export interface CryptoKeyList { +/** List of crypto keys. */ +export interface CryptoKeyListResult { /** - * Crypto keys list + * The list of crypto key results. * NOTE: This property will not be serialized. It can only be populated by the server. */ - readonly value?: CryptoKey[]; - /** The uri to fetch the next page of asset. */ + readonly value?: CryptoKeyResource[]; + /** The uri to fetch the next page of resources. */ nextLink?: string; } /** Crypto key properties */ export interface CryptoKey { - /** ID for the key. */ + /** ID for the key result. */ cryptoKeyId?: string; /** Type of the key (public or private). */ keyType?: string; @@ -480,29 +252,101 @@ export interface CryptoKey { /** Functions the key can fulfill. */ usage?: string[]; /** - * List of files paths for this key. + * List of files where this key was found. * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly filePaths?: string[]; /** A matching paired key or certificate. */ pairedKey?: PairedKey; /** Indicates the key size is considered too small to be secure for the algorithm. */ - isShortKeySize?: IsShortKeySize; + isShortKeySize?: boolean; } -/** Return a list of firmware analysis workspaces. */ -export interface WorkspaceList { +/** List of CVE results. */ +export interface CveListResult { /** - * The list of firmware analysis workspaces. + * The list of CVE results. * NOTE: This property will not be serialized. It can only be populated by the server. */ - readonly value?: Workspace[]; + readonly value?: CveResource[]; + /** The uri to fetch the next page of resources. */ + nextLink?: string; +} + +/** Details of a CVE detected in firmware. */ +export interface CveResult { + /** ID of the CVE result. */ + cveId?: string; + /** The SBOM component for the CVE. */ + component?: CveComponent; + /** Severity of the CVE. */ + severity?: string; + /** Name of the CVE. */ + name?: string; + /** A single CVSS score to represent the CVE. If a V3 score is specified, then it will use the V3 score. Otherwise if the V2 score is specified it will be the V2 score. */ + cvssScore?: string; + /** CVSS version of the CVE. */ + cvssVersion?: string; + /** CVSS V2 score of the CVE. */ + cvssV2Score?: string; + /** CVSS V3 score of the CVE. */ + cvssV3Score?: string; + /** + * The list of reference links for the CVE. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly links?: CveLink[]; + /** The CVE description. */ + description?: string; +} + +/** Properties of the SBOM component for a CVE. */ +export interface CveComponent { + /** ID of the SBOM component */ + componentId?: string; + /** Name of the SBOM component */ + name?: string; + /** Version of the SBOM component. */ + version?: string; +} + +/** Properties of a reference link for a CVE. */ +export interface CveLink { + /** The destination of the reference link. */ + href?: string; + /** The label of the reference link. */ + label?: string; +} + +/** List of firmwares */ +export interface FirmwareList { + /** + * The list of firmwares. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly value?: Firmware[]; /** The uri to fetch the next page of asset. */ nextLink?: string; } -/** Firmware analysis workspace. */ -export interface WorkspaceUpdateDefinition { +/** Firmware properties. */ +export interface FirmwareProperties { + /** File name for a firmware that user uploaded. */ + fileName?: string; + /** Firmware vendor. */ + vendor?: string; + /** Firmware model. */ + model?: string; + /** Firmware version. */ + version?: string; + /** User-specified description of the firmware. */ + description?: string; + /** File size of the uploaded firmware image. */ + fileSize?: number; + /** The status of firmware scan. */ + status?: Status; + /** A list of errors or other messages generated during firmware analysis */ + statusMessages?: StatusMessage[]; /** * Provisioning state of the resource. * NOTE: This property will not be serialized. It can only be populated by the server. @@ -510,10 +354,27 @@ export interface WorkspaceUpdateDefinition { readonly provisioningState?: ProvisioningState; } -/** Properties for generating an upload URL */ -export interface GenerateUploadUrlRequest { - /** A unique ID for the firmware to be uploaded. */ - firmwareId?: string; +/** Error and status message */ +export interface StatusMessage { + /** The error code */ + errorCode?: number; + /** The error or status message */ + message?: string; +} + +/** Firmware definition */ +export interface FirmwareUpdateDefinition { + /** The editable properties of a firmware */ + properties?: FirmwareProperties; +} + +/** Url data for creating or accessing a blob file. */ +export interface UrlToken { + /** + * SAS URL for creating or accessing a blob file. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly url?: string; } /** A list of REST API operations supported by an Azure Resource Provider. It contains an URL link to get the next set of results. */ @@ -580,18 +441,164 @@ export interface OperationDisplay { readonly description?: string; } -/** Component for CVE */ -export interface CveComponent { - /** ID of CVE component */ +/** List of password hash results */ +export interface PasswordHashListResult { + /** + * The list of password hash results. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly value?: PasswordHashResource[]; + /** The uri to fetch the next page of resources. */ + nextLink?: string; +} + +/** Password hash properties */ +export interface PasswordHash { + /** ID for password hash */ + passwordHashId?: string; + /** File path of the password hash */ + filePath?: string; + /** Salt of the password hash */ + salt?: string; + /** Hash of the password */ + hash?: string; + /** Context of password hash */ + context?: string; + /** User name of password hash */ + username?: string; + /** Algorithm of the password hash */ + algorithm?: string; +} + +/** List of SBOM results. */ +export interface SbomComponentListResult { + /** + * The list of SBOM components. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly value?: SbomComponentResource[]; + /** The uri to fetch the next page of resources. */ + nextLink?: string; +} + +/** SBOM component of a firmware. */ +export interface SbomComponent { + /** ID for the component. */ componentId?: string; - /** Name of CVE component */ - name?: string; - /** Version of CVE component */ + /** Name for the component. */ + componentName?: string; + /** Version for the component. */ version?: string; + /** License for the component. */ + license?: string; + /** File paths related to the component. */ + filePaths?: string[]; +} + +/** List of analysis summaries. */ +export interface SummaryListResult { + /** + * The list of summaries. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly value?: SummaryResource[]; + /** The uri to fetch the next page of resources. */ + nextLink?: string; +} + +/** Properties of an analysis summary. */ +export interface SummaryResourceProperties { + /** Polymorphic discriminator, which specifies the different types this object can be */ + summaryType: + | "Firmware" + | "CVE" + | "BinaryHardening" + | "CryptoCertificate" + | "CryptoKey"; +} + +/** Return a list of firmware analysis workspaces. */ +export interface WorkspaceList { + /** + * The list of firmware analysis workspaces. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly value?: Workspace[]; + /** The uri to fetch the next page of asset. */ + nextLink?: string; +} + +/** Workspace properties. */ +export interface WorkspaceProperties { + /** + * Provisioning state of the resource. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly provisioningState?: ProvisioningState; +} + +/** Firmware analysis workspace. */ +export interface WorkspaceUpdateDefinition { + /** The editable workspace properties. */ + properties?: WorkspaceProperties; +} + +/** Properties for generating an upload URL */ +export interface GenerateUploadUrlRequest { + /** A unique ID for the firmware to be uploaded. */ + firmwareId?: string; +} + +/** binary hardening analysis result resource */ +export interface BinaryHardeningResource extends Resource { + /** The properties of a binary hardening result found within a firmware image */ + properties?: BinaryHardeningResult; +} + +/** Crypto certificate resource */ +export interface CryptoCertificateResource extends Resource { + /** The properties of a crypto certificate found within a firmware image */ + properties?: CryptoCertificate; +} + +/** Crypto key resource */ +export interface CryptoKeyResource extends Resource { + /** The properties of a crypto key found within a firmware image */ + properties?: CryptoKey; +} + +/** CVE analysis result resource */ +export interface CveResource extends Resource { + /** The properties of a CVE result found within a firmware image */ + properties?: CveResult; +} + +/** Firmware definition */ +export interface Firmware extends Resource { + /** The properties of a firmware */ + properties?: FirmwareProperties; +} + +/** Password hash resource */ +export interface PasswordHashResource extends Resource { + /** The properties of a password hash found within a firmware image */ + properties?: PasswordHash; +} + +/** SBOM analysis result resource */ +export interface SbomComponentResource extends Resource { + /** The properties of an SBOM component found within a firmware image */ + properties?: SbomComponent; } -/** The resource model definition for a Azure Resource Manager proxy resource. It will not have tags and a location */ -export interface ProxyResource extends Resource {} +/** The object representing a firmware analysis summary resource. */ +export interface SummaryResource extends Resource { + /** + * Properties of an analysis summary. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly properties?: SummaryResourcePropertiesUnion; +} /** The resource model definition for an Azure Resource Manager tracked top level resource which has 'tags' and a 'location' */ export interface TrackedResource extends Resource { @@ -601,40 +608,128 @@ export interface TrackedResource extends Resource { location: string; } -/** Firmware definition */ -export interface Firmware extends ProxyResource { - /** File name for a firmware that user uploaded. */ - fileName?: string; - /** Firmware vendor. */ - vendor?: string; - /** Firmware model. */ - model?: string; - /** Firmware version. */ - version?: string; - /** User-specified description of the firmware. */ - description?: string; - /** File size of the uploaded firmware image. */ +/** Properties for high level summary of firmware analysis results. */ +export interface FirmwareSummary extends SummaryResourceProperties { + /** Polymorphic discriminator, which specifies the different types this object can be */ + summaryType: "Firmware"; + /** Total extracted size of the firmware in bytes. */ + extractedSize?: number; + /** Firmware file size in bytes. */ fileSize?: number; - /** The status of firmware scan. */ - status?: Status; - /** A list of errors or other messages generated during firmware analysis */ - statusMessages?: Record[]; - /** - * Provisioning state of the resource. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly provisioningState?: ProvisioningState; + /** Extracted file count. */ + extractedFileCount?: number; + /** Components count. */ + componentCount?: number; + /** Binary count */ + binaryCount?: number; + /** Time used for analysis */ + analysisTimeSeconds?: number; + /** The number of root file systems found. */ + rootFileSystems?: number; +} + +/** Properties for a CVE analysis summary. */ +export interface CveSummary extends SummaryResourceProperties { + /** Polymorphic discriminator, which specifies the different types this object can be */ + summaryType: "CVE"; + /** The total number of critical severity CVEs detected */ + critical?: number; + /** The total number of high severity CVEs detected */ + high?: number; + /** The total number of medium severity CVEs detected */ + medium?: number; + /** The total number of low severity CVEs detected */ + low?: number; + /** The total number of unknown severity CVEs detected */ + unknown?: number; +} + +/** Properties for a binary hardening analysis summary. */ +export interface BinaryHardeningSummaryResource + extends SummaryResourceProperties { + /** Polymorphic discriminator, which specifies the different types this object can be */ + summaryType: "BinaryHardening"; + /** Total number of binaries that were analyzed */ + totalFiles?: number; + /** NX summary percentage */ + nx?: number; + /** PIE summary percentage */ + pie?: number; + /** RELRO summary percentage */ + relro?: number; + /** Canary summary percentage */ + canary?: number; + /** Stripped summary percentage */ + stripped?: number; +} + +/** Properties for cryptographic certificate summary. */ +export interface CryptoCertificateSummaryResource + extends SummaryResourceProperties { + /** Polymorphic discriminator, which specifies the different types this object can be */ + summaryType: "CryptoCertificate"; + /** Total number of certificates found. */ + totalCertificates?: number; + /** Total number of paired private keys found for the certificates. */ + pairedKeys?: number; + /** Total number of expired certificates found. */ + expired?: number; + /** Total number of nearly expired certificates found. */ + expiringSoon?: number; + /** Total number of certificates found using a weak signature algorithm. */ + weakSignature?: number; + /** Total number of certificates found that are self-signed. */ + selfSigned?: number; + /** Total number of certificates found that have an insecure key size for the key algorithm. */ + shortKeySize?: number; +} + +/** Properties for cryptographic key summary. */ +export interface CryptoKeySummaryResource extends SummaryResourceProperties { + /** Polymorphic discriminator, which specifies the different types this object can be */ + summaryType: "CryptoKey"; + /** Total number of cryptographic keys found. */ + totalKeys?: number; + /** Total number of (non-certificate) public keys found. */ + publicKeys?: number; + /** Total number of private keys found. */ + privateKeys?: number; + /** Total number of keys found that have a matching paired key or certificate. */ + pairedKeys?: number; + /** Total number of keys found that have an insecure key size for the algorithm. */ + shortKeySize?: number; } /** Firmware analysis workspace. */ export interface Workspace extends TrackedResource { - /** - * Provisioning state of the resource. - * NOTE: This property will not be serialized. It can only be populated by the server. - */ - readonly provisioningState?: ProvisioningState; + /** Workspace properties. */ + properties?: WorkspaceProperties; +} + +/** Known values of {@link CreatedByType} that the service accepts. */ +export enum KnownCreatedByType { + /** User */ + User = "User", + /** Application */ + Application = "Application", + /** ManagedIdentity */ + ManagedIdentity = "ManagedIdentity", + /** Key */ + Key = "Key", } +/** + * Defines values for CreatedByType. \ + * {@link KnownCreatedByType} can be used interchangeably with CreatedByType, + * this enum contains the known values that the service supports. + * ### Known values supported by the service + * **User** \ + * **Application** \ + * **ManagedIdentity** \ + * **Key** + */ +export type CreatedByType = string; + /** Known values of {@link Status} that the service accepts. */ export enum KnownStatus { /** Pending */ @@ -646,7 +741,7 @@ export enum KnownStatus { /** Ready */ Ready = "Ready", /** Error */ - Error = "Error" + Error = "Error", } /** @@ -671,7 +766,7 @@ export enum KnownProvisioningState { /** Canceled */ Canceled = "Canceled", /** Failed */ - Failed = "Failed" + Failed = "Failed", } /** @@ -686,210 +781,6 @@ export enum KnownProvisioningState { */ export type ProvisioningState = string; -/** Known values of {@link CreatedByType} that the service accepts. */ -export enum KnownCreatedByType { - /** User */ - User = "User", - /** Application */ - Application = "Application", - /** ManagedIdentity */ - ManagedIdentity = "ManagedIdentity", - /** Key */ - Key = "Key" -} - -/** - * Defines values for CreatedByType. \ - * {@link KnownCreatedByType} can be used interchangeably with CreatedByType, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **User** \ - * **Application** \ - * **ManagedIdentity** \ - * **Key** - */ -export type CreatedByType = string; - -/** Known values of {@link IsUpdateAvailable} that the service accepts. */ -export enum KnownIsUpdateAvailable { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for IsUpdateAvailable. \ - * {@link KnownIsUpdateAvailable} can be used interchangeably with IsUpdateAvailable, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type IsUpdateAvailable = string; - -/** Known values of {@link NxFlag} that the service accepts. */ -export enum KnownNxFlag { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for NxFlag. \ - * {@link KnownNxFlag} can be used interchangeably with NxFlag, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type NxFlag = string; - -/** Known values of {@link PieFlag} that the service accepts. */ -export enum KnownPieFlag { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for PieFlag. \ - * {@link KnownPieFlag} can be used interchangeably with PieFlag, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type PieFlag = string; - -/** Known values of {@link RelroFlag} that the service accepts. */ -export enum KnownRelroFlag { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for RelroFlag. \ - * {@link KnownRelroFlag} can be used interchangeably with RelroFlag, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type RelroFlag = string; - -/** Known values of {@link CanaryFlag} that the service accepts. */ -export enum KnownCanaryFlag { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for CanaryFlag. \ - * {@link KnownCanaryFlag} can be used interchangeably with CanaryFlag, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type CanaryFlag = string; - -/** Known values of {@link StrippedFlag} that the service accepts. */ -export enum KnownStrippedFlag { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for StrippedFlag. \ - * {@link KnownStrippedFlag} can be used interchangeably with StrippedFlag, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type StrippedFlag = string; - -/** Known values of {@link IsExpired} that the service accepts. */ -export enum KnownIsExpired { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for IsExpired. \ - * {@link KnownIsExpired} can be used interchangeably with IsExpired, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type IsExpired = string; - -/** Known values of {@link IsSelfSigned} that the service accepts. */ -export enum KnownIsSelfSigned { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for IsSelfSigned. \ - * {@link KnownIsSelfSigned} can be used interchangeably with IsSelfSigned, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type IsSelfSigned = string; - -/** Known values of {@link IsWeakSignature} that the service accepts. */ -export enum KnownIsWeakSignature { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for IsWeakSignature. \ - * {@link KnownIsWeakSignature} can be used interchangeably with IsWeakSignature, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type IsWeakSignature = string; - -/** Known values of {@link IsShortKeySize} that the service accepts. */ -export enum KnownIsShortKeySize { - /** True */ - True = "True", - /** False */ - False = "False" -} - -/** - * Defines values for IsShortKeySize. \ - * {@link KnownIsShortKeySize} can be used interchangeably with IsShortKeySize, - * this enum contains the known values that the service supports. - * ### Known values supported by the service - * **True** \ - * **False** - */ -export type IsShortKeySize = string; - /** Known values of {@link Origin} that the service accepts. */ export enum KnownOrigin { /** User */ @@ -897,7 +788,7 @@ export enum KnownOrigin { /** System */ System = "system", /** UserSystem */ - UserSystem = "user,system" + UserSystem = "user,system", } /** @@ -914,7 +805,7 @@ export type Origin = string; /** Known values of {@link ActionType} that the service accepts. */ export enum KnownActionType { /** Internal */ - Internal = "Internal" + Internal = "Internal", } /** @@ -926,191 +817,234 @@ export enum KnownActionType { */ export type ActionType = string; -/** Optional parameters. */ -export interface FirmwareListByWorkspaceOptionalParams - extends coreClient.OperationOptions {} - -/** Contains response data for the listByWorkspace operation. */ -export type FirmwareListByWorkspaceResponse = FirmwareList; +/** Known values of {@link SummaryType} that the service accepts. */ +export enum KnownSummaryType { + /** Firmware */ + Firmware = "Firmware", + /** CVE */ + CVE = "CVE", + /** BinaryHardening */ + BinaryHardening = "BinaryHardening", + /** CryptoCertificate */ + CryptoCertificate = "CryptoCertificate", + /** CryptoKey */ + CryptoKey = "CryptoKey", +} -/** Optional parameters. */ -export interface FirmwareCreateOptionalParams - extends coreClient.OperationOptions {} +/** + * Defines values for SummaryType. \ + * {@link KnownSummaryType} can be used interchangeably with SummaryType, + * this enum contains the known values that the service supports. + * ### Known values supported by the service + * **Firmware** \ + * **CVE** \ + * **BinaryHardening** \ + * **CryptoCertificate** \ + * **CryptoKey** + */ +export type SummaryType = string; + +/** Known values of {@link SummaryName} that the service accepts. */ +export enum KnownSummaryName { + /** Firmware */ + Firmware = "Firmware", + /** CVE */ + CVE = "CVE", + /** BinaryHardening */ + BinaryHardening = "BinaryHardening", + /** CryptoCertificate */ + CryptoCertificate = "CryptoCertificate", + /** CryptoKey */ + CryptoKey = "CryptoKey", +} -/** Contains response data for the create operation. */ -export type FirmwareCreateResponse = Firmware; +/** + * Defines values for SummaryName. \ + * {@link KnownSummaryName} can be used interchangeably with SummaryName, + * this enum contains the known values that the service supports. + * ### Known values supported by the service + * **Firmware** \ + * **CVE** \ + * **BinaryHardening** \ + * **CryptoCertificate** \ + * **CryptoKey** + */ +export type SummaryName = string; /** Optional parameters. */ -export interface FirmwareUpdateOptionalParams +export interface BinaryHardeningListByFirmwareOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the update operation. */ -export type FirmwareUpdateResponse = Firmware; +/** Contains response data for the listByFirmware operation. */ +export type BinaryHardeningListByFirmwareResponse = BinaryHardeningListResult; /** Optional parameters. */ -export interface FirmwareDeleteOptionalParams +export interface BinaryHardeningListByFirmwareNextOptionalParams extends coreClient.OperationOptions {} +/** Contains response data for the listByFirmwareNext operation. */ +export type BinaryHardeningListByFirmwareNextResponse = + BinaryHardeningListResult; + /** Optional parameters. */ -export interface FirmwareGetOptionalParams +export interface CryptoCertificatesListByFirmwareOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the get operation. */ -export type FirmwareGetResponse = Firmware; +/** Contains response data for the listByFirmware operation. */ +export type CryptoCertificatesListByFirmwareResponse = + CryptoCertificateListResult; /** Optional parameters. */ -export interface FirmwareGenerateDownloadUrlOptionalParams +export interface CryptoCertificatesListByFirmwareNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateDownloadUrl operation. */ -export type FirmwareGenerateDownloadUrlResponse = UrlToken; +/** Contains response data for the listByFirmwareNext operation. */ +export type CryptoCertificatesListByFirmwareNextResponse = + CryptoCertificateListResult; /** Optional parameters. */ -export interface FirmwareGenerateFilesystemDownloadUrlOptionalParams +export interface CryptoKeysListByFirmwareOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateFilesystemDownloadUrl operation. */ -export type FirmwareGenerateFilesystemDownloadUrlResponse = UrlToken; +/** Contains response data for the listByFirmware operation. */ +export type CryptoKeysListByFirmwareResponse = CryptoKeyListResult; /** Optional parameters. */ -export interface FirmwareGenerateSummaryOptionalParams +export interface CryptoKeysListByFirmwareNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateSummary operation. */ -export type FirmwareGenerateSummaryResponse = FirmwareSummary; +/** Contains response data for the listByFirmwareNext operation. */ +export type CryptoKeysListByFirmwareNextResponse = CryptoKeyListResult; /** Optional parameters. */ -export interface FirmwareListGenerateComponentListOptionalParams +export interface CvesListByFirmwareOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateComponentList operation. */ -export type FirmwareListGenerateComponentListResponse = ComponentList; +/** Contains response data for the listByFirmware operation. */ +export type CvesListByFirmwareResponse = CveListResult; /** Optional parameters. */ -export interface FirmwareGenerateComponentDetailsOptionalParams +export interface CvesListByFirmwareNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateComponentDetails operation. */ -export type FirmwareGenerateComponentDetailsResponse = Component; +/** Contains response data for the listByFirmwareNext operation. */ +export type CvesListByFirmwareNextResponse = CveListResult; /** Optional parameters. */ -export interface FirmwareListGenerateBinaryHardeningListOptionalParams +export interface FirmwaresListByWorkspaceOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateBinaryHardeningList operation. */ -export type FirmwareListGenerateBinaryHardeningListResponse = BinaryHardeningList; +/** Contains response data for the listByWorkspace operation. */ +export type FirmwaresListByWorkspaceResponse = FirmwareList; /** Optional parameters. */ -export interface FirmwareGenerateBinaryHardeningSummaryOptionalParams +export interface FirmwaresCreateOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateBinaryHardeningSummary operation. */ -export type FirmwareGenerateBinaryHardeningSummaryResponse = BinaryHardeningSummary; +/** Contains response data for the create operation. */ +export type FirmwaresCreateResponse = Firmware; /** Optional parameters. */ -export interface FirmwareGenerateBinaryHardeningDetailsOptionalParams +export interface FirmwaresUpdateOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateBinaryHardeningDetails operation. */ -export type FirmwareGenerateBinaryHardeningDetailsResponse = BinaryHardening; +/** Contains response data for the update operation. */ +export type FirmwaresUpdateResponse = Firmware; /** Optional parameters. */ -export interface FirmwareListGeneratePasswordHashListOptionalParams +export interface FirmwaresDeleteOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGeneratePasswordHashList operation. */ -export type FirmwareListGeneratePasswordHashListResponse = PasswordHashList; - /** Optional parameters. */ -export interface FirmwareListGenerateCveListOptionalParams +export interface FirmwaresGetOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateCveList operation. */ -export type FirmwareListGenerateCveListResponse = CveList; +/** Contains response data for the get operation. */ +export type FirmwaresGetResponse = Firmware; /** Optional parameters. */ -export interface FirmwareGenerateCveSummaryOptionalParams +export interface FirmwaresGenerateDownloadUrlOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateCveSummary operation. */ -export type FirmwareGenerateCveSummaryResponse = CveSummary; +/** Contains response data for the generateDownloadUrl operation. */ +export type FirmwaresGenerateDownloadUrlResponse = UrlToken; /** Optional parameters. */ -export interface FirmwareGenerateCryptoCertificateSummaryOptionalParams +export interface FirmwaresGenerateFilesystemDownloadUrlOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateCryptoCertificateSummary operation. */ -export type FirmwareGenerateCryptoCertificateSummaryResponse = CryptoCertificateSummary; +/** Contains response data for the generateFilesystemDownloadUrl operation. */ +export type FirmwaresGenerateFilesystemDownloadUrlResponse = UrlToken; /** Optional parameters. */ -export interface FirmwareGenerateCryptoKeySummaryOptionalParams +export interface FirmwaresListByWorkspaceNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the generateCryptoKeySummary operation. */ -export type FirmwareGenerateCryptoKeySummaryResponse = CryptoKeySummary; +/** Contains response data for the listByWorkspaceNext operation. */ +export type FirmwaresListByWorkspaceNextResponse = FirmwareList; /** Optional parameters. */ -export interface FirmwareListGenerateCryptoCertificateListOptionalParams +export interface OperationsListOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateCryptoCertificateList operation. */ -export type FirmwareListGenerateCryptoCertificateListResponse = CryptoCertificateList; +/** Contains response data for the list operation. */ +export type OperationsListResponse = OperationListResult; /** Optional parameters. */ -export interface FirmwareListGenerateCryptoKeyListOptionalParams +export interface OperationsListNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateCryptoKeyList operation. */ -export type FirmwareListGenerateCryptoKeyListResponse = CryptoKeyList; +/** Contains response data for the listNext operation. */ +export type OperationsListNextResponse = OperationListResult; /** Optional parameters. */ -export interface FirmwareListByWorkspaceNextOptionalParams +export interface PasswordHashesListByFirmwareOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listByWorkspaceNext operation. */ -export type FirmwareListByWorkspaceNextResponse = FirmwareList; +/** Contains response data for the listByFirmware operation. */ +export type PasswordHashesListByFirmwareResponse = PasswordHashListResult; /** Optional parameters. */ -export interface FirmwareListGenerateComponentListNextOptionalParams +export interface PasswordHashesListByFirmwareNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateComponentListNext operation. */ -export type FirmwareListGenerateComponentListNextResponse = ComponentList; +/** Contains response data for the listByFirmwareNext operation. */ +export type PasswordHashesListByFirmwareNextResponse = PasswordHashListResult; /** Optional parameters. */ -export interface FirmwareListGenerateBinaryHardeningListNextOptionalParams +export interface SbomComponentsListByFirmwareOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateBinaryHardeningListNext operation. */ -export type FirmwareListGenerateBinaryHardeningListNextResponse = BinaryHardeningList; +/** Contains response data for the listByFirmware operation. */ +export type SbomComponentsListByFirmwareResponse = SbomComponentListResult; /** Optional parameters. */ -export interface FirmwareListGeneratePasswordHashListNextOptionalParams +export interface SbomComponentsListByFirmwareNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGeneratePasswordHashListNext operation. */ -export type FirmwareListGeneratePasswordHashListNextResponse = PasswordHashList; +/** Contains response data for the listByFirmwareNext operation. */ +export type SbomComponentsListByFirmwareNextResponse = SbomComponentListResult; /** Optional parameters. */ -export interface FirmwareListGenerateCveListNextOptionalParams +export interface SummariesListByFirmwareOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateCveListNext operation. */ -export type FirmwareListGenerateCveListNextResponse = CveList; +/** Contains response data for the listByFirmware operation. */ +export type SummariesListByFirmwareResponse = SummaryListResult; /** Optional parameters. */ -export interface FirmwareListGenerateCryptoCertificateListNextOptionalParams +export interface SummariesGetOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateCryptoCertificateListNext operation. */ -export type FirmwareListGenerateCryptoCertificateListNextResponse = CryptoCertificateList; +/** Contains response data for the get operation. */ +export type SummariesGetResponse = SummaryResource; /** Optional parameters. */ -export interface FirmwareListGenerateCryptoKeyListNextOptionalParams +export interface SummariesListByFirmwareNextOptionalParams extends coreClient.OperationOptions {} -/** Contains response data for the listGenerateCryptoKeyListNext operation. */ -export type FirmwareListGenerateCryptoKeyListNextResponse = CryptoKeyList; +/** Contains response data for the listByFirmwareNext operation. */ +export type SummariesListByFirmwareNextResponse = SummaryListResult; /** Optional parameters. */ export interface WorkspacesListBySubscriptionOptionalParams @@ -1172,20 +1106,6 @@ export interface WorkspacesListByResourceGroupNextOptionalParams /** Contains response data for the listByResourceGroupNext operation. */ export type WorkspacesListByResourceGroupNextResponse = WorkspaceList; -/** Optional parameters. */ -export interface OperationsListOptionalParams - extends coreClient.OperationOptions {} - -/** Contains response data for the list operation. */ -export type OperationsListResponse = OperationListResult; - -/** Optional parameters. */ -export interface OperationsListNextOptionalParams - extends coreClient.OperationOptions {} - -/** Contains response data for the listNext operation. */ -export type OperationsListNextResponse = OperationListResult; - /** Optional parameters. */ export interface IoTFirmwareDefenseClientOptionalParams extends coreClient.ServiceClientOptions { diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/mappers.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/mappers.ts index 1e80387dfa59..393dde8bac8c 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/mappers.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/mappers.ts @@ -8,10 +8,10 @@ import * as coreClient from "@azure/core-client"; -export const FirmwareList: coreClient.CompositeMapper = { +export const BinaryHardeningListResult: coreClient.CompositeMapper = { type: { name: "Composite", - className: "FirmwareList", + className: "BinaryHardeningListResult", modelProperties: { value: { serializedName: "value", @@ -21,19 +21,116 @@ export const FirmwareList: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "Firmware" - } - } - } + className: "BinaryHardeningResource", + }, + }, + }, }, nextLink: { serializedName: "nextLink", type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, +}; + +export const BinaryHardeningResult: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "BinaryHardeningResult", + modelProperties: { + binaryHardeningId: { + serializedName: "binaryHardeningId", + nullable: true, + type: { + name: "String", + }, + }, + features: { + serializedName: "features", + type: { + name: "Composite", + className: "BinaryHardeningFeatures", + }, + }, + architecture: { + serializedName: "architecture", + nullable: true, + type: { + name: "String", + }, + }, + filePath: { + serializedName: "filePath", + nullable: true, + type: { + name: "String", + }, + }, + class: { + serializedName: "class", + nullable: true, + type: { + name: "String", + }, + }, + runpath: { + serializedName: "runpath", + nullable: true, + type: { + name: "String", + }, + }, + rpath: { + serializedName: "rpath", + nullable: true, + type: { + name: "String", + }, + }, + }, + }, +}; + +export const BinaryHardeningFeatures: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "BinaryHardeningFeatures", + modelProperties: { + nx: { + serializedName: "nx", + type: { + name: "Boolean", + }, + }, + pie: { + serializedName: "pie", + type: { + name: "Boolean", + }, + }, + relro: { + serializedName: "relro", + type: { + name: "Boolean", + }, + }, + canary: { + serializedName: "canary", + type: { + name: "Boolean", + }, + }, + stripped: { + serializedName: "stripped", + type: { + name: "Boolean", + }, + }, + }, + }, }; export const Resource: coreClient.CompositeMapper = { @@ -45,32 +142,32 @@ export const Resource: coreClient.CompositeMapper = { serializedName: "id", readOnly: true, type: { - name: "String" - } + name: "String", + }, }, name: { serializedName: "name", readOnly: true, type: { - name: "String" - } + name: "String", + }, }, type: { serializedName: "type", readOnly: true, type: { - name: "String" - } + name: "String", + }, }, systemData: { serializedName: "systemData", type: { name: "Composite", - className: "SystemData" - } - } - } - } + className: "SystemData", + }, + }, + }, + }, }; export const SystemData: coreClient.CompositeMapper = { @@ -81,41 +178,41 @@ export const SystemData: coreClient.CompositeMapper = { createdBy: { serializedName: "createdBy", type: { - name: "String" - } + name: "String", + }, }, createdByType: { serializedName: "createdByType", type: { - name: "String" - } + name: "String", + }, }, createdAt: { serializedName: "createdAt", type: { - name: "DateTime" - } + name: "DateTime", + }, }, lastModifiedBy: { serializedName: "lastModifiedBy", type: { - name: "String" - } + name: "String", + }, }, lastModifiedByType: { serializedName: "lastModifiedByType", type: { - name: "String" - } + name: "String", + }, }, lastModifiedAt: { serializedName: "lastModifiedAt", type: { - name: "DateTime" - } - } - } - } + name: "DateTime", + }, + }, + }, + }, }; export const ErrorResponse: coreClient.CompositeMapper = { @@ -127,11 +224,11 @@ export const ErrorResponse: coreClient.CompositeMapper = { serializedName: "error", type: { name: "Composite", - className: "ErrorDetail" - } - } - } - } + className: "ErrorDetail", + }, + }, + }, + }, }; export const ErrorDetail: coreClient.CompositeMapper = { @@ -143,22 +240,22 @@ export const ErrorDetail: coreClient.CompositeMapper = { serializedName: "code", readOnly: true, type: { - name: "String" - } + name: "String", + }, }, message: { serializedName: "message", readOnly: true, type: { - name: "String" - } + name: "String", + }, }, target: { serializedName: "target", readOnly: true, type: { - name: "String" - } + name: "String", + }, }, details: { serializedName: "details", @@ -168,10 +265,10 @@ export const ErrorDetail: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "ErrorDetail" - } - } - } + className: "ErrorDetail", + }, + }, + }, }, additionalInfo: { serializedName: "additionalInfo", @@ -181,13 +278,13 @@ export const ErrorDetail: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "ErrorAdditionalInfo" - } - } - } - } - } - } + className: "ErrorAdditionalInfo", + }, + }, + }, + }, + }, + }, }; export const ErrorAdditionalInfo: coreClient.CompositeMapper = { @@ -199,266 +296,278 @@ export const ErrorAdditionalInfo: coreClient.CompositeMapper = { serializedName: "type", readOnly: true, type: { - name: "String" - } + name: "String", + }, }, info: { serializedName: "info", readOnly: true, type: { name: "Dictionary", - value: { type: { name: "any" } } - } - } - } - } + value: { type: { name: "any" } }, + }, + }, + }, + }, }; -export const FirmwareUpdateDefinition: coreClient.CompositeMapper = { +export const CryptoCertificateListResult: coreClient.CompositeMapper = { type: { name: "Composite", - className: "FirmwareUpdateDefinition", + className: "CryptoCertificateListResult", modelProperties: { - fileName: { - serializedName: "properties.fileName", + value: { + serializedName: "value", + readOnly: true, type: { - name: "String" - } + name: "Sequence", + element: { + type: { + name: "Composite", + className: "CryptoCertificateResource", + }, + }, + }, }, - vendor: { - serializedName: "properties.vendor", + nextLink: { + serializedName: "nextLink", type: { - name: "String" - } + name: "String", + }, }, - model: { - serializedName: "properties.model", + }, + }, +}; + +export const CryptoCertificate: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "CryptoCertificate", + modelProperties: { + cryptoCertId: { + serializedName: "cryptoCertId", + nullable: true, type: { - name: "String" - } + name: "String", + }, }, - version: { - serializedName: "properties.version", + name: { + serializedName: "name", + nullable: true, type: { - name: "String" - } + name: "String", + }, }, - description: { - serializedName: "properties.description", + subject: { + serializedName: "subject", type: { - name: "String" - } + name: "Composite", + className: "CryptoCertificateEntity", + }, }, - fileSize: { - serializedName: "properties.fileSize", - nullable: true, + issuer: { + serializedName: "issuer", type: { - name: "Number" - } + name: "Composite", + className: "CryptoCertificateEntity", + }, }, - status: { - defaultValue: "Pending", - serializedName: "properties.status", + issuedDate: { + serializedName: "issuedDate", + nullable: true, type: { - name: "String" - } + name: "DateTime", + }, }, - statusMessages: { - serializedName: "properties.statusMessages", + expirationDate: { + serializedName: "expirationDate", + nullable: true, type: { - name: "Sequence", - element: { - type: { - name: "Dictionary", - value: { type: { name: "any" } } - } - } - } + name: "DateTime", + }, }, - provisioningState: { - serializedName: "properties.provisioningState", - readOnly: true, - type: { - name: "String" - } - } - } - } -}; - -export const UrlToken: coreClient.CompositeMapper = { - type: { - name: "Composite", - className: "UrlToken", - modelProperties: { - url: { - serializedName: "url", - readOnly: true, + role: { + serializedName: "role", + nullable: true, type: { - name: "String" - } + name: "String", + }, }, - uploadUrl: { - serializedName: "uploadUrl", - readOnly: true, - type: { - name: "String" - } - } - } - } -}; - -export const FirmwareSummary: coreClient.CompositeMapper = { - type: { - name: "Composite", - className: "FirmwareSummary", - modelProperties: { - extractedSize: { - serializedName: "extractedSize", + signatureAlgorithm: { + serializedName: "signatureAlgorithm", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - fileSize: { - serializedName: "fileSize", + keySize: { + serializedName: "keySize", nullable: true, type: { - name: "Number" - } + name: "Number", + }, }, - extractedFileCount: { - serializedName: "extractedFileCount", + keyAlgorithm: { + serializedName: "keyAlgorithm", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - componentCount: { - serializedName: "componentCount", + encoding: { + serializedName: "encoding", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - binaryCount: { - serializedName: "binaryCount", + serialNumber: { + serializedName: "serialNumber", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - analysisTimeSeconds: { - serializedName: "analysisTimeSeconds", + fingerprint: { + serializedName: "fingerprint", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - rootFileSystems: { - serializedName: "rootFileSystems", + usage: { + serializedName: "usage", nullable: true, type: { - name: "Number" - } - } - } - } -}; - -export const ComponentList: coreClient.CompositeMapper = { - type: { - name: "Composite", - className: "ComponentList", - modelProperties: { - value: { - serializedName: "value", + name: "Sequence", + element: { + type: { + name: "String", + }, + }, + }, + }, + filePaths: { + serializedName: "filePaths", readOnly: true, + nullable: true, type: { name: "Sequence", element: { type: { - name: "Composite", - className: "Component" - } - } - } + name: "String", + }, + }, + }, }, - nextLink: { - serializedName: "nextLink", + pairedKey: { + serializedName: "pairedKey", type: { - name: "String" - } - } - } - } + name: "Composite", + className: "PairedKey", + }, + }, + isExpired: { + serializedName: "isExpired", + nullable: true, + type: { + name: "Boolean", + }, + }, + isSelfSigned: { + serializedName: "isSelfSigned", + nullable: true, + type: { + name: "Boolean", + }, + }, + isWeakSignature: { + serializedName: "isWeakSignature", + nullable: true, + type: { + name: "Boolean", + }, + }, + isShortKeySize: { + serializedName: "isShortKeySize", + nullable: true, + type: { + name: "Boolean", + }, + }, + }, + }, }; -export const Component: coreClient.CompositeMapper = { +export const CryptoCertificateEntity: coreClient.CompositeMapper = { type: { name: "Composite", - className: "Component", + className: "CryptoCertificateEntity", modelProperties: { - componentId: { - serializedName: "componentId", + commonName: { + serializedName: "commonName", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - componentName: { - serializedName: "componentName", + organization: { + serializedName: "organization", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - version: { - serializedName: "version", + organizationalUnit: { + serializedName: "organizationalUnit", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - license: { - serializedName: "license", + state: { + serializedName: "state", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - releaseDate: { - serializedName: "releaseDate", + country: { + serializedName: "country", + nullable: true, + type: { + name: "String", + }, + }, + }, + }, +}; + +export const PairedKey: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "PairedKey", + modelProperties: { + id: { + serializedName: "id", type: { - name: "DateTime" - } + name: "String", + }, }, - paths: { - serializedName: "paths", + type: { + serializedName: "type", type: { - name: "Sequence", - element: { - type: { - name: "String" - } - } - } - }, - isUpdateAvailable: { - serializedName: "isUpdateAvailable", - type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const BinaryHardeningList: coreClient.CompositeMapper = { +export const CryptoKeyListResult: coreClient.CompositeMapper = { type: { name: "Composite", - className: "BinaryHardeningList", + className: "CryptoKeyListResult", modelProperties: { value: { serializedName: "value", @@ -468,242 +577,101 @@ export const BinaryHardeningList: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "BinaryHardening" - } - } - } + className: "CryptoKeyResource", + }, + }, + }, }, nextLink: { serializedName: "nextLink", type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const BinaryHardening: coreClient.CompositeMapper = { +export const CryptoKey: coreClient.CompositeMapper = { type: { name: "Composite", - className: "BinaryHardening", + className: "CryptoKey", modelProperties: { - binaryHardeningId: { - serializedName: "binaryHardeningId", - nullable: true, - type: { - name: "String" - } - }, - architecture: { - serializedName: "architecture", - nullable: true, - type: { - name: "String" - } - }, - path: { - serializedName: "path", - nullable: true, - type: { - name: "String" - } - }, - class: { - serializedName: "class", - nullable: true, - type: { - name: "String" - } - }, - runpath: { - serializedName: "runpath", - nullable: true, - type: { - name: "String" - } - }, - rpath: { - serializedName: "rpath", - nullable: true, - type: { - name: "String" - } - }, - nx: { - serializedName: "features.nx", - type: { - name: "String" - } - }, - pie: { - serializedName: "features.pie", - type: { - name: "String" - } - }, - relro: { - serializedName: "features.relro", - type: { - name: "String" - } - }, - canary: { - serializedName: "features.canary", - type: { - name: "String" - } - }, - stripped: { - serializedName: "features.stripped", - type: { - name: "String" - } - } - } - } -}; - -export const BinaryHardeningSummary: coreClient.CompositeMapper = { - type: { - name: "Composite", - className: "BinaryHardeningSummary", - modelProperties: { - totalFiles: { - serializedName: "totalFiles", - type: { - name: "Number" - } - }, - nx: { - serializedName: "nx", + cryptoKeyId: { + serializedName: "cryptoKeyId", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - pie: { - serializedName: "pie", + keyType: { + serializedName: "keyType", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - relro: { - serializedName: "relro", + keySize: { + serializedName: "keySize", nullable: true, type: { - name: "Number" - } + name: "Number", + }, }, - canary: { - serializedName: "canary", + keyAlgorithm: { + serializedName: "keyAlgorithm", nullable: true, type: { - name: "Number" - } + name: "String", + }, }, - stripped: { - serializedName: "stripped", + usage: { + serializedName: "usage", nullable: true, - type: { - name: "Number" - } - } - } - } -}; - -export const PasswordHashList: coreClient.CompositeMapper = { - type: { - name: "Composite", - className: "PasswordHashList", - modelProperties: { - value: { - serializedName: "value", - readOnly: true, type: { name: "Sequence", element: { type: { - name: "Composite", - className: "PasswordHash" - } - } - } - }, - nextLink: { - serializedName: "nextLink", - type: { - name: "String" - } - } - } - } -}; - -export const PasswordHash: coreClient.CompositeMapper = { - type: { - name: "Composite", - className: "PasswordHash", - modelProperties: { - passwordHashId: { - serializedName: "passwordHashId", - nullable: true, - type: { - name: "String" - } - }, - filePath: { - serializedName: "filePath", - nullable: true, - type: { - name: "String" - } - }, - salt: { - serializedName: "salt", - nullable: true, - type: { - name: "String" - } + name: "String", + }, + }, + }, }, - hash: { - serializedName: "hash", + filePaths: { + serializedName: "filePaths", + readOnly: true, nullable: true, type: { - name: "String" - } + name: "Sequence", + element: { + type: { + name: "String", + }, + }, + }, }, - context: { - serializedName: "context", - nullable: true, + pairedKey: { + serializedName: "pairedKey", type: { - name: "String" - } + name: "Composite", + className: "PairedKey", + }, }, - username: { - serializedName: "username", + isShortKeySize: { + serializedName: "isShortKeySize", nullable: true, type: { - name: "String" - } + name: "Boolean", + }, }, - algorithm: { - serializedName: "algorithm", - nullable: true, - type: { - name: "String" - } - } - } - } + }, + }, }; -export const CveList: coreClient.CompositeMapper = { +export const CveListResult: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CveList", + className: "CveListResult", modelProperties: { value: { serializedName: "value", @@ -713,93 +681,80 @@ export const CveList: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "Cve" - } - } - } + className: "CveResource", + }, + }, + }, }, nextLink: { serializedName: "nextLink", type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const Cve: coreClient.CompositeMapper = { +export const CveResult: coreClient.CompositeMapper = { type: { name: "Composite", - className: "Cve", + className: "CveResult", modelProperties: { cveId: { serializedName: "cveId", nullable: true, type: { - name: "String" - } + name: "String", + }, }, component: { serializedName: "component", type: { - name: "Dictionary", - value: { type: { name: "any" } } - } + name: "Composite", + className: "CveComponent", + }, }, severity: { serializedName: "severity", nullable: true, type: { - name: "String" - } + name: "String", + }, }, name: { serializedName: "name", - nullable: true, type: { - name: "String" - } + name: "String", + }, }, cvssScore: { serializedName: "cvssScore", nullable: true, type: { - name: "String" - } + name: "String", + }, }, cvssVersion: { serializedName: "cvssVersion", nullable: true, type: { - name: "String" - } + name: "String", + }, }, cvssV2Score: { serializedName: "cvssV2Score", nullable: true, type: { - name: "String" - } + name: "String", + }, }, cvssV3Score: { serializedName: "cvssV3Score", nullable: true, type: { - name: "String" - } - }, - publishDate: { - serializedName: "publishDate", - type: { - name: "DateTime" - } - }, - updatedDate: { - serializedName: "updatedDate", - type: { - name: "DateTime" - } + name: "String", + }, }, links: { serializedName: "links", @@ -809,20 +764,47 @@ export const Cve: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "CveLink" - } - } - } + className: "CveLink", + }, + }, + }, }, description: { serializedName: "description", nullable: true, type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, +}; + +export const CveComponent: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "CveComponent", + modelProperties: { + componentId: { + serializedName: "componentId", + type: { + name: "String", + }, + }, + name: { + serializedName: "name", + type: { + name: "String", + }, + }, + version: { + serializedName: "version", + type: { + name: "String", + }, + }, + }, + }, }; export const CveLink: coreClient.CompositeMapper = { @@ -834,167 +816,179 @@ export const CveLink: coreClient.CompositeMapper = { serializedName: "href", nullable: true, type: { - name: "String" - } + name: "String", + }, }, label: { serializedName: "label", nullable: true, type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const CveSummary: coreClient.CompositeMapper = { +export const FirmwareList: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CveSummary", + className: "FirmwareList", modelProperties: { - critical: { - serializedName: "critical", - nullable: true, - type: { - name: "Number" - } - }, - high: { - serializedName: "high", - nullable: true, - type: { - name: "Number" - } - }, - medium: { - serializedName: "medium", - nullable: true, - type: { - name: "Number" - } - }, - low: { - serializedName: "low", - nullable: true, + value: { + serializedName: "value", + readOnly: true, type: { - name: "Number" - } + name: "Sequence", + element: { + type: { + name: "Composite", + className: "Firmware", + }, + }, + }, }, - unknown: { - serializedName: "unknown", - nullable: true, + nextLink: { + serializedName: "nextLink", type: { - name: "Number" - } + name: "String", + }, }, - undefined: { - serializedName: "undefined", - nullable: true, - type: { - name: "Number" - } - } - } - } + }, + }, }; -export const CryptoCertificateSummary: coreClient.CompositeMapper = { +export const FirmwareProperties: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CryptoCertificateSummary", + className: "FirmwareProperties", modelProperties: { - totalCertificates: { - serializedName: "totalCertificates", + fileName: { + serializedName: "fileName", type: { - name: "Number" - } + name: "String", + }, }, - pairedKeys: { - serializedName: "pairedKeys", + vendor: { + serializedName: "vendor", type: { - name: "Number" - } + name: "String", + }, }, - expired: { - serializedName: "expired", + model: { + serializedName: "model", type: { - name: "Number" - } + name: "String", + }, }, - expiringSoon: { - serializedName: "expiringSoon", + version: { + serializedName: "version", type: { - name: "Number" - } + name: "String", + }, }, - weakSignature: { - serializedName: "weakSignature", + description: { + serializedName: "description", type: { - name: "Number" - } + name: "String", + }, }, - selfSigned: { - serializedName: "selfSigned", + fileSize: { + serializedName: "fileSize", + nullable: true, type: { - name: "Number" - } + name: "Number", + }, }, - shortKeySize: { - serializedName: "shortKeySize", + status: { + defaultValue: "Pending", + serializedName: "status", + type: { + name: "String", + }, + }, + statusMessages: { + serializedName: "statusMessages", + type: { + name: "Sequence", + element: { + type: { + name: "Composite", + className: "StatusMessage", + }, + }, + }, + }, + provisioningState: { + serializedName: "provisioningState", + readOnly: true, type: { - name: "Number" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const CryptoKeySummary: coreClient.CompositeMapper = { +export const StatusMessage: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CryptoKeySummary", + className: "StatusMessage", modelProperties: { - totalKeys: { - serializedName: "totalKeys", + errorCode: { + serializedName: "errorCode", type: { - name: "Number" - } + name: "Number", + }, }, - publicKeys: { - serializedName: "publicKeys", - type: { - name: "Number" - } - }, - privateKeys: { - serializedName: "privateKeys", + message: { + serializedName: "message", type: { - name: "Number" - } + name: "String", + }, }, - pairedKeys: { - serializedName: "pairedKeys", + }, + }, +}; + +export const FirmwareUpdateDefinition: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "FirmwareUpdateDefinition", + modelProperties: { + properties: { + serializedName: "properties", type: { - name: "Number" - } + name: "Composite", + className: "FirmwareProperties", + }, }, - shortKeySize: { - serializedName: "shortKeySize", - type: { - name: "Number" - } - } - } - } + }, + }, }; -export const CryptoCertificateList: coreClient.CompositeMapper = { +export const UrlToken: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CryptoCertificateList", + className: "UrlToken", modelProperties: { - value: { + url: { + serializedName: "url", + readOnly: true, + type: { + name: "String", + }, + }, + }, + }, +}; + +export const OperationListResult: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "OperationListResult", + modelProperties: { + value: { serializedName: "value", readOnly: true, type: { @@ -1002,258 +996,193 @@ export const CryptoCertificateList: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "CryptoCertificate" - } - } - } + className: "Operation", + }, + }, + }, }, nextLink: { serializedName: "nextLink", + readOnly: true, type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const CryptoCertificate: coreClient.CompositeMapper = { +export const Operation: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CryptoCertificate", + className: "Operation", modelProperties: { - cryptoCertId: { - serializedName: "cryptoCertId", - nullable: true, - type: { - name: "String" - } - }, name: { serializedName: "name", - nullable: true, + readOnly: true, type: { - name: "String" - } + name: "String", + }, }, - subject: { - serializedName: "subject", + isDataAction: { + serializedName: "isDataAction", + readOnly: true, type: { - name: "Composite", - className: "CryptoCertificateEntity" - } + name: "Boolean", + }, }, - issuer: { - serializedName: "issuer", + display: { + serializedName: "display", type: { name: "Composite", - className: "CryptoCertificateEntity" - } - }, - issuedDate: { - serializedName: "issuedDate", - nullable: true, - type: { - name: "DateTime" - } - }, - expirationDate: { - serializedName: "expirationDate", - nullable: true, - type: { - name: "DateTime" - } - }, - role: { - serializedName: "role", - nullable: true, - type: { - name: "String" - } - }, - signatureAlgorithm: { - serializedName: "signatureAlgorithm", - nullable: true, - type: { - name: "String" - } + className: "OperationDisplay", + }, }, - keySize: { - serializedName: "keySize", - nullable: true, + origin: { + serializedName: "origin", + readOnly: true, type: { - name: "Number" - } + name: "String", + }, }, - keyAlgorithm: { - serializedName: "keyAlgorithm", - nullable: true, + actionType: { + serializedName: "actionType", + readOnly: true, type: { - name: "String" - } + name: "String", + }, }, - encoding: { - serializedName: "encoding", - nullable: true, + }, + }, +}; + +export const OperationDisplay: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "OperationDisplay", + modelProperties: { + provider: { + serializedName: "provider", + readOnly: true, type: { - name: "String" - } + name: "String", + }, }, - serialNumber: { - serializedName: "serialNumber", - nullable: true, + resource: { + serializedName: "resource", + readOnly: true, type: { - name: "String" - } + name: "String", + }, }, - fingerprint: { - serializedName: "fingerprint", - nullable: true, + operation: { + serializedName: "operation", + readOnly: true, type: { - name: "String" - } + name: "String", + }, }, - usage: { - serializedName: "usage", - nullable: true, + description: { + serializedName: "description", + readOnly: true, type: { - name: "Sequence", - element: { - type: { - name: "String" - } - } - } + name: "String", + }, }, - filePaths: { - serializedName: "filePaths", + }, + }, +}; + +export const PasswordHashListResult: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "PasswordHashListResult", + modelProperties: { + value: { + serializedName: "value", readOnly: true, - nullable: true, type: { name: "Sequence", element: { type: { - name: "String" - } - } - } - }, - pairedKey: { - serializedName: "pairedKey", - type: { - name: "Composite", - className: "PairedKey" - } - }, - isExpired: { - serializedName: "isExpired", - nullable: true, - type: { - name: "String" - } - }, - isSelfSigned: { - serializedName: "isSelfSigned", - nullable: true, - type: { - name: "String" - } + name: "Composite", + className: "PasswordHashResource", + }, + }, + }, }, - isWeakSignature: { - serializedName: "isWeakSignature", - nullable: true, + nextLink: { + serializedName: "nextLink", type: { - name: "String" - } + name: "String", + }, }, - isShortKeySize: { - serializedName: "isShortKeySize", - nullable: true, - type: { - name: "String" - } - } - } - } + }, + }, }; -export const CryptoCertificateEntity: coreClient.CompositeMapper = { +export const PasswordHash: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CryptoCertificateEntity", + className: "PasswordHash", modelProperties: { - commonName: { - serializedName: "commonName", + passwordHashId: { + serializedName: "passwordHashId", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - organization: { - serializedName: "organization", + filePath: { + serializedName: "filePath", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - organizationalUnit: { - serializedName: "organizationalUnit", + salt: { + serializedName: "salt", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - state: { - serializedName: "state", + hash: { + serializedName: "hash", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - country: { - serializedName: "country", + context: { + serializedName: "context", nullable: true, type: { - name: "String" - } - } - } - } -}; - -export const PairedKey: coreClient.CompositeMapper = { - type: { - name: "Composite", - className: "PairedKey", - modelProperties: { - id: { - serializedName: "id", - type: { - name: "String" - } + name: "String", + }, }, - type: { - serializedName: "type", + username: { + serializedName: "username", + nullable: true, type: { - name: "String" - } + name: "String", + }, }, - additionalProperties: { - serializedName: "additionalProperties", + algorithm: { + serializedName: "algorithm", nullable: true, type: { - name: "Dictionary", - value: { type: { name: "any" } } - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const CryptoKeyList: coreClient.CompositeMapper = { +export const SbomComponentListResult: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CryptoKeyList", + className: "SbomComponentListResult", modelProperties: { value: { serializedName: "value", @@ -1263,95 +1192,114 @@ export const CryptoKeyList: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "CryptoKey" - } - } - } + className: "SbomComponentResource", + }, + }, + }, }, nextLink: { serializedName: "nextLink", type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const CryptoKey: coreClient.CompositeMapper = { +export const SbomComponent: coreClient.CompositeMapper = { type: { name: "Composite", - className: "CryptoKey", + className: "SbomComponent", modelProperties: { - cryptoKeyId: { - serializedName: "cryptoKeyId", + componentId: { + serializedName: "componentId", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - keyType: { - serializedName: "keyType", - nullable: true, + componentName: { + serializedName: "componentName", type: { - name: "String" - } + name: "String", + }, }, - keySize: { - serializedName: "keySize", - nullable: true, + version: { + serializedName: "version", type: { - name: "Number" - } + name: "String", + }, }, - keyAlgorithm: { - serializedName: "keyAlgorithm", + license: { + serializedName: "license", nullable: true, type: { - name: "String" - } + name: "String", + }, }, - usage: { - serializedName: "usage", - nullable: true, + filePaths: { + serializedName: "filePaths", type: { name: "Sequence", element: { type: { - name: "String" - } - } - } + name: "String", + }, + }, + }, }, - filePaths: { - serializedName: "filePaths", + }, + }, +}; + +export const SummaryListResult: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "SummaryListResult", + modelProperties: { + value: { + serializedName: "value", readOnly: true, - nullable: true, type: { name: "Sequence", element: { type: { - name: "String" - } - } - } + name: "Composite", + className: "SummaryResource", + }, + }, + }, }, - pairedKey: { - serializedName: "pairedKey", + nextLink: { + serializedName: "nextLink", type: { - name: "Composite", - className: "PairedKey" - } + name: "String", + }, }, - isShortKeySize: { - serializedName: "isShortKeySize", - nullable: true, + }, + }, +}; + +export const SummaryResourceProperties: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "SummaryResourceProperties", + uberParent: "SummaryResourceProperties", + polymorphicDiscriminator: { + serializedName: "summaryType", + clientName: "summaryType", + }, + modelProperties: { + summaryType: { + serializedName: "summaryType", + required: true, type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; export const WorkspaceList: coreClient.CompositeMapper = { @@ -1367,35 +1315,51 @@ export const WorkspaceList: coreClient.CompositeMapper = { element: { type: { name: "Composite", - className: "Workspace" - } - } - } + className: "Workspace", + }, + }, + }, }, nextLink: { serializedName: "nextLink", type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const WorkspaceUpdateDefinition: coreClient.CompositeMapper = { +export const WorkspaceProperties: coreClient.CompositeMapper = { type: { name: "Composite", - className: "WorkspaceUpdateDefinition", + className: "WorkspaceProperties", modelProperties: { provisioningState: { - serializedName: "properties.provisioningState", + serializedName: "provisioningState", readOnly: true, type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, +}; + +export const WorkspaceUpdateDefinition: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "WorkspaceUpdateDefinition", + modelProperties: { + properties: { + serializedName: "properties", + type: { + name: "Composite", + className: "WorkspaceProperties", + }, + }, + }, + }, }; export const GenerateUploadUrlRequest: coreClient.CompositeMapper = { @@ -1406,258 +1370,438 @@ export const GenerateUploadUrlRequest: coreClient.CompositeMapper = { firmwareId: { serializedName: "firmwareId", type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const OperationListResult: coreClient.CompositeMapper = { +export const BinaryHardeningResource: coreClient.CompositeMapper = { type: { name: "Composite", - className: "OperationListResult", + className: "BinaryHardeningResource", modelProperties: { - value: { - serializedName: "value", - readOnly: true, + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { - name: "Sequence", - element: { - type: { - name: "Composite", - className: "Operation" - } - } - } + name: "Composite", + className: "BinaryHardeningResult", + }, }, - nextLink: { - serializedName: "nextLink", - readOnly: true, - type: { - name: "String" - } - } - } - } + }, + }, }; -export const Operation: coreClient.CompositeMapper = { +export const CryptoCertificateResource: coreClient.CompositeMapper = { type: { name: "Composite", - className: "Operation", + className: "CryptoCertificateResource", modelProperties: { - name: { - serializedName: "name", - readOnly: true, + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { - name: "String" - } + name: "Composite", + className: "CryptoCertificate", + }, }, - isDataAction: { - serializedName: "isDataAction", - readOnly: true, + }, + }, +}; + +export const CryptoKeyResource: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "CryptoKeyResource", + modelProperties: { + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { - name: "Boolean" - } + name: "Composite", + className: "CryptoKey", + }, }, - display: { - serializedName: "display", + }, + }, +}; + +export const CveResource: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "CveResource", + modelProperties: { + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { name: "Composite", - className: "OperationDisplay" - } + className: "CveResult", + }, }, - origin: { - serializedName: "origin", - readOnly: true, + }, + }, +}; + +export const Firmware: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "Firmware", + modelProperties: { + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { - name: "String" - } + name: "Composite", + className: "FirmwareProperties", + }, }, - actionType: { - serializedName: "actionType", - readOnly: true, + }, + }, +}; + +export const PasswordHashResource: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "PasswordHashResource", + modelProperties: { + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { - name: "String" - } - } - } - } + name: "Composite", + className: "PasswordHash", + }, + }, + }, + }, }; -export const OperationDisplay: coreClient.CompositeMapper = { +export const SbomComponentResource: coreClient.CompositeMapper = { type: { name: "Composite", - className: "OperationDisplay", + className: "SbomComponentResource", modelProperties: { - provider: { - serializedName: "provider", - readOnly: true, + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { - name: "String" - } + name: "Composite", + className: "SbomComponent", + }, }, - resource: { - serializedName: "resource", - readOnly: true, + }, + }, +}; + +export const SummaryResource: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "SummaryResource", + modelProperties: { + ...Resource.type.modelProperties, + properties: { + serializedName: "properties", type: { - name: "String" - } + name: "Composite", + className: "SummaryResourceProperties", + }, }, - operation: { - serializedName: "operation", - readOnly: true, + }, + }, +}; + +export const TrackedResource: coreClient.CompositeMapper = { + type: { + name: "Composite", + className: "TrackedResource", + modelProperties: { + ...Resource.type.modelProperties, + tags: { + serializedName: "tags", type: { - name: "String" - } + name: "Dictionary", + value: { type: { name: "String" } }, + }, }, - description: { - serializedName: "description", - readOnly: true, + location: { + serializedName: "location", + required: true, type: { - name: "String" - } - } - } - } + name: "String", + }, + }, + }, + }, }; -export const CveComponent: coreClient.CompositeMapper = { +export const FirmwareSummary: coreClient.CompositeMapper = { + serializedName: "Firmware", type: { name: "Composite", - className: "CveComponent", + className: "FirmwareSummary", + uberParent: "SummaryResourceProperties", + polymorphicDiscriminator: + SummaryResourceProperties.type.polymorphicDiscriminator, modelProperties: { - componentId: { - serializedName: "componentId", + ...SummaryResourceProperties.type.modelProperties, + extractedSize: { + serializedName: "extractedSize", nullable: true, type: { - name: "String" - } + name: "Number", + }, }, - name: { - serializedName: "name", + fileSize: { + serializedName: "fileSize", nullable: true, type: { - name: "String" - } + name: "Number", + }, }, - version: { - serializedName: "version", + extractedFileCount: { + serializedName: "extractedFileCount", nullable: true, type: { - name: "String" - } - } - } - } + name: "Number", + }, + }, + componentCount: { + serializedName: "componentCount", + nullable: true, + type: { + name: "Number", + }, + }, + binaryCount: { + serializedName: "binaryCount", + nullable: true, + type: { + name: "Number", + }, + }, + analysisTimeSeconds: { + serializedName: "analysisTimeSeconds", + nullable: true, + type: { + name: "Number", + }, + }, + rootFileSystems: { + serializedName: "rootFileSystems", + nullable: true, + type: { + name: "Number", + }, + }, + }, + }, }; -export const ProxyResource: coreClient.CompositeMapper = { +export const CveSummary: coreClient.CompositeMapper = { + serializedName: "CVE", type: { name: "Composite", - className: "ProxyResource", + className: "CveSummary", + uberParent: "SummaryResourceProperties", + polymorphicDiscriminator: + SummaryResourceProperties.type.polymorphicDiscriminator, modelProperties: { - ...Resource.type.modelProperties - } - } + ...SummaryResourceProperties.type.modelProperties, + critical: { + serializedName: "critical", + nullable: true, + type: { + name: "Number", + }, + }, + high: { + serializedName: "high", + nullable: true, + type: { + name: "Number", + }, + }, + medium: { + serializedName: "medium", + nullable: true, + type: { + name: "Number", + }, + }, + low: { + serializedName: "low", + nullable: true, + type: { + name: "Number", + }, + }, + unknown: { + serializedName: "unknown", + nullable: true, + type: { + name: "Number", + }, + }, + }, + }, }; -export const TrackedResource: coreClient.CompositeMapper = { +export const BinaryHardeningSummaryResource: coreClient.CompositeMapper = { + serializedName: "BinaryHardening", type: { name: "Composite", - className: "TrackedResource", + className: "BinaryHardeningSummaryResource", + uberParent: "SummaryResourceProperties", + polymorphicDiscriminator: + SummaryResourceProperties.type.polymorphicDiscriminator, modelProperties: { - ...Resource.type.modelProperties, - tags: { - serializedName: "tags", + ...SummaryResourceProperties.type.modelProperties, + totalFiles: { + serializedName: "totalFiles", type: { - name: "Dictionary", - value: { type: { name: "String" } } - } + name: "Number", + }, }, - location: { - serializedName: "location", - required: true, + nx: { + serializedName: "nx", + nullable: true, + type: { + name: "Number", + }, + }, + pie: { + serializedName: "pie", + nullable: true, + type: { + name: "Number", + }, + }, + relro: { + serializedName: "relro", + nullable: true, + type: { + name: "Number", + }, + }, + canary: { + serializedName: "canary", + nullable: true, + type: { + name: "Number", + }, + }, + stripped: { + serializedName: "stripped", + nullable: true, type: { - name: "String" - } - } - } - } + name: "Number", + }, + }, + }, + }, }; -export const Firmware: coreClient.CompositeMapper = { +export const CryptoCertificateSummaryResource: coreClient.CompositeMapper = { + serializedName: "CryptoCertificate", type: { name: "Composite", - className: "Firmware", + className: "CryptoCertificateSummaryResource", + uberParent: "SummaryResourceProperties", + polymorphicDiscriminator: + SummaryResourceProperties.type.polymorphicDiscriminator, modelProperties: { - ...ProxyResource.type.modelProperties, - fileName: { - serializedName: "properties.fileName", + ...SummaryResourceProperties.type.modelProperties, + totalCertificates: { + serializedName: "totalCertificates", type: { - name: "String" - } + name: "Number", + }, }, - vendor: { - serializedName: "properties.vendor", + pairedKeys: { + serializedName: "pairedKeys", type: { - name: "String" - } + name: "Number", + }, }, - model: { - serializedName: "properties.model", + expired: { + serializedName: "expired", type: { - name: "String" - } + name: "Number", + }, }, - version: { - serializedName: "properties.version", + expiringSoon: { + serializedName: "expiringSoon", type: { - name: "String" - } + name: "Number", + }, }, - description: { - serializedName: "properties.description", + weakSignature: { + serializedName: "weakSignature", type: { - name: "String" - } + name: "Number", + }, }, - fileSize: { - serializedName: "properties.fileSize", - nullable: true, + selfSigned: { + serializedName: "selfSigned", type: { - name: "Number" - } + name: "Number", + }, }, - status: { - defaultValue: "Pending", - serializedName: "properties.status", + shortKeySize: { + serializedName: "shortKeySize", type: { - name: "String" - } + name: "Number", + }, }, - statusMessages: { - serializedName: "properties.statusMessages", + }, + }, +}; + +export const CryptoKeySummaryResource: coreClient.CompositeMapper = { + serializedName: "CryptoKey", + type: { + name: "Composite", + className: "CryptoKeySummaryResource", + uberParent: "SummaryResourceProperties", + polymorphicDiscriminator: + SummaryResourceProperties.type.polymorphicDiscriminator, + modelProperties: { + ...SummaryResourceProperties.type.modelProperties, + totalKeys: { + serializedName: "totalKeys", type: { - name: "Sequence", - element: { - type: { - name: "Dictionary", - value: { type: { name: "any" } } - } - } - } + name: "Number", + }, }, - provisioningState: { - serializedName: "properties.provisioningState", - readOnly: true, + publicKeys: { + serializedName: "publicKeys", + type: { + name: "Number", + }, + }, + privateKeys: { + serializedName: "privateKeys", type: { - name: "String" - } - } - } - } + name: "Number", + }, + }, + pairedKeys: { + serializedName: "pairedKeys", + type: { + name: "Number", + }, + }, + shortKeySize: { + serializedName: "shortKeySize", + type: { + name: "Number", + }, + }, + }, + }, }; export const Workspace: coreClient.CompositeMapper = { @@ -1666,13 +1810,23 @@ export const Workspace: coreClient.CompositeMapper = { className: "Workspace", modelProperties: { ...TrackedResource.type.modelProperties, - provisioningState: { - serializedName: "properties.provisioningState", - readOnly: true, + properties: { + serializedName: "properties", type: { - name: "String" - } - } - } - } + name: "Composite", + className: "WorkspaceProperties", + }, + }, + }, + }, +}; + +export let discriminators = { + SummaryResourceProperties: SummaryResourceProperties, + "SummaryResourceProperties.Firmware": FirmwareSummary, + "SummaryResourceProperties.CVE": CveSummary, + "SummaryResourceProperties.BinaryHardening": BinaryHardeningSummaryResource, + "SummaryResourceProperties.CryptoCertificate": + CryptoCertificateSummaryResource, + "SummaryResourceProperties.CryptoKey": CryptoKeySummaryResource, }; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/parameters.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/parameters.ts index d857a69cae44..1e6bb9c545ae 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/parameters.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/models/parameters.ts @@ -9,14 +9,14 @@ import { OperationParameter, OperationURLParameter, - OperationQueryParameter + OperationQueryParameter, } from "@azure/core-client"; import { Firmware as FirmwareMapper, FirmwareUpdateDefinition as FirmwareUpdateDefinitionMapper, Workspace as WorkspaceMapper, WorkspaceUpdateDefinition as WorkspaceUpdateDefinitionMapper, - GenerateUploadUrlRequest as GenerateUploadUrlRequestMapper + GenerateUploadUrlRequest as GenerateUploadUrlRequestMapper, } from "../models/mappers"; export const accept: OperationParameter = { @@ -26,9 +26,9 @@ export const accept: OperationParameter = { isConstant: true, serializedName: "Accept", type: { - name: "String" - } - } + name: "String", + }, + }, }; export const $host: OperationURLParameter = { @@ -37,24 +37,21 @@ export const $host: OperationURLParameter = { serializedName: "$host", required: true, type: { - name: "String" - } + name: "String", + }, }, - skipEncoding: true + skipEncoding: true, }; export const subscriptionId: OperationURLParameter = { parameterPath: "subscriptionId", mapper: { - constraints: { - MinLength: 1 - }, serializedName: "subscriptionId", required: true, type: { - name: "String" - } - } + name: "Uuid", + }, + }, }; export const resourceGroupName: OperationURLParameter = { @@ -62,40 +59,63 @@ export const resourceGroupName: OperationURLParameter = { mapper: { constraints: { MaxLength: 90, - MinLength: 1 + MinLength: 1, }, serializedName: "resourceGroupName", required: true, type: { - name: "String" - } - } + name: "String", + }, + }, }; export const workspaceName: OperationURLParameter = { parameterPath: "workspaceName", mapper: { constraints: { - Pattern: new RegExp("^[a-zA-Z0-9][a-zA-Z0-9_.-]*$") + Pattern: new RegExp("^[a-zA-Z0-9][a-zA-Z0-9_.-]*$"), }, serializedName: "workspaceName", required: true, type: { - name: "String" - } - } + name: "String", + }, + }, +}; + +export const firmwareId: OperationURLParameter = { + parameterPath: "firmwareId", + mapper: { + serializedName: "firmwareId", + required: true, + type: { + name: "String", + }, + }, }; export const apiVersion: OperationQueryParameter = { parameterPath: "apiVersion", mapper: { - defaultValue: "2023-02-08-preview", + defaultValue: "2024-01-10", isConstant: true, serializedName: "api-version", type: { - name: "String" - } - } + name: "String", + }, + }, +}; + +export const nextLink: OperationURLParameter = { + parameterPath: "nextLink", + mapper: { + serializedName: "nextLink", + required: true, + type: { + name: "String", + }, + }, + skipEncoding: true, }; export const contentType: OperationParameter = { @@ -105,55 +125,43 @@ export const contentType: OperationParameter = { isConstant: true, serializedName: "Content-Type", type: { - name: "String" - } - } + name: "String", + }, + }, }; export const firmware: OperationParameter = { parameterPath: "firmware", - mapper: FirmwareMapper -}; - -export const firmwareId: OperationURLParameter = { - parameterPath: "firmwareId", - mapper: { - serializedName: "firmwareId", - required: true, - type: { - name: "String" - } - } + mapper: FirmwareMapper, }; export const firmware1: OperationParameter = { parameterPath: "firmware", - mapper: FirmwareUpdateDefinitionMapper + mapper: FirmwareUpdateDefinitionMapper, }; -export const nextLink: OperationURLParameter = { - parameterPath: "nextLink", +export const summaryName: OperationURLParameter = { + parameterPath: "summaryName", mapper: { - serializedName: "nextLink", + serializedName: "summaryName", required: true, type: { - name: "String" - } + name: "String", + }, }, - skipEncoding: true }; export const workspace: OperationParameter = { parameterPath: "workspace", - mapper: WorkspaceMapper + mapper: WorkspaceMapper, }; export const workspace1: OperationParameter = { parameterPath: "workspace", - mapper: WorkspaceUpdateDefinitionMapper + mapper: WorkspaceUpdateDefinitionMapper, }; export const generateUploadUrl: OperationParameter = { parameterPath: "generateUploadUrl", - mapper: GenerateUploadUrlRequestMapper + mapper: GenerateUploadUrlRequestMapper, }; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/binaryHardening.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/binaryHardening.ts new file mode 100644 index 000000000000..aa56dad83ca8 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/binaryHardening.ts @@ -0,0 +1,216 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { BinaryHardening } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + BinaryHardeningResource, + BinaryHardeningListByFirmwareNextOptionalParams, + BinaryHardeningListByFirmwareOptionalParams, + BinaryHardeningListByFirmwareResponse, + BinaryHardeningListByFirmwareNextResponse, +} from "../models"; + +/// +/** Class containing BinaryHardening operations. */ +export class BinaryHardeningImpl implements BinaryHardening { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class BinaryHardening class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists binary hardening analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + public listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: BinaryHardeningListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByFirmwarePagingAll( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + settings, + ); + }, + }; + } + + private async *listByFirmwarePagingPage( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: BinaryHardeningListByFirmwareOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: BinaryHardeningListByFirmwareResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByFirmwareNext( + resourceGroupName, + workspaceName, + firmwareId, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByFirmwarePagingAll( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: BinaryHardeningListByFirmwareOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + )) { + yield* page; + } + } + + /** + * Lists binary hardening analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + private _listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: BinaryHardeningListByFirmwareOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + listByFirmwareOperationSpec, + ); + } + + /** + * ListByFirmwareNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param nextLink The nextLink from the previous successful call to the ListByFirmware method. + * @param options The options parameters. + */ + private _listByFirmwareNext( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + nextLink: string, + options?: BinaryHardeningListByFirmwareNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, nextLink, options }, + listByFirmwareNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByFirmwareOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/binaryHardeningResults", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.BinaryHardeningListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByFirmwareNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.BinaryHardeningListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cryptoCertificates.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cryptoCertificates.ts new file mode 100644 index 000000000000..2173b9a4579b --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cryptoCertificates.ts @@ -0,0 +1,216 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { CryptoCertificates } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + CryptoCertificateResource, + CryptoCertificatesListByFirmwareNextOptionalParams, + CryptoCertificatesListByFirmwareOptionalParams, + CryptoCertificatesListByFirmwareResponse, + CryptoCertificatesListByFirmwareNextResponse, +} from "../models"; + +/// +/** Class containing CryptoCertificates operations. */ +export class CryptoCertificatesImpl implements CryptoCertificates { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class CryptoCertificates class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists cryptographic certificate analysis results found in a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + public listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoCertificatesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByFirmwarePagingAll( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + settings, + ); + }, + }; + } + + private async *listByFirmwarePagingPage( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoCertificatesListByFirmwareOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: CryptoCertificatesListByFirmwareResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByFirmwareNext( + resourceGroupName, + workspaceName, + firmwareId, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByFirmwarePagingAll( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoCertificatesListByFirmwareOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + )) { + yield* page; + } + } + + /** + * Lists cryptographic certificate analysis results found in a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + private _listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoCertificatesListByFirmwareOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + listByFirmwareOperationSpec, + ); + } + + /** + * ListByFirmwareNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param nextLink The nextLink from the previous successful call to the ListByFirmware method. + * @param options The options parameters. + */ + private _listByFirmwareNext( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + nextLink: string, + options?: CryptoCertificatesListByFirmwareNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, nextLink, options }, + listByFirmwareNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByFirmwareOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/cryptoCertificates", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.CryptoCertificateListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByFirmwareNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.CryptoCertificateListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cryptoKeys.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cryptoKeys.ts new file mode 100644 index 000000000000..1d42ae32d207 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cryptoKeys.ts @@ -0,0 +1,216 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { CryptoKeys } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + CryptoKeyResource, + CryptoKeysListByFirmwareNextOptionalParams, + CryptoKeysListByFirmwareOptionalParams, + CryptoKeysListByFirmwareResponse, + CryptoKeysListByFirmwareNextResponse, +} from "../models"; + +/// +/** Class containing CryptoKeys operations. */ +export class CryptoKeysImpl implements CryptoKeys { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class CryptoKeys class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists cryptographic key analysis results found in a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + public listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoKeysListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByFirmwarePagingAll( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + settings, + ); + }, + }; + } + + private async *listByFirmwarePagingPage( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoKeysListByFirmwareOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: CryptoKeysListByFirmwareResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByFirmwareNext( + resourceGroupName, + workspaceName, + firmwareId, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByFirmwarePagingAll( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoKeysListByFirmwareOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + )) { + yield* page; + } + } + + /** + * Lists cryptographic key analysis results found in a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + private _listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoKeysListByFirmwareOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + listByFirmwareOperationSpec, + ); + } + + /** + * ListByFirmwareNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param nextLink The nextLink from the previous successful call to the ListByFirmware method. + * @param options The options parameters. + */ + private _listByFirmwareNext( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + nextLink: string, + options?: CryptoKeysListByFirmwareNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, nextLink, options }, + listByFirmwareNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByFirmwareOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/cryptoKeys", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.CryptoKeyListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByFirmwareNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.CryptoKeyListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cves.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cves.ts new file mode 100644 index 000000000000..58e2a18d6791 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/cves.ts @@ -0,0 +1,216 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { Cves } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + CveResource, + CvesListByFirmwareNextOptionalParams, + CvesListByFirmwareOptionalParams, + CvesListByFirmwareResponse, + CvesListByFirmwareNextResponse, +} from "../models"; + +/// +/** Class containing Cves operations. */ +export class CvesImpl implements Cves { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class Cves class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists CVE analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + public listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CvesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByFirmwarePagingAll( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + settings, + ); + }, + }; + } + + private async *listByFirmwarePagingPage( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CvesListByFirmwareOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: CvesListByFirmwareResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByFirmwareNext( + resourceGroupName, + workspaceName, + firmwareId, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByFirmwarePagingAll( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CvesListByFirmwareOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + )) { + yield* page; + } + } + + /** + * Lists CVE analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + private _listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CvesListByFirmwareOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + listByFirmwareOperationSpec, + ); + } + + /** + * ListByFirmwareNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param nextLink The nextLink from the previous successful call to the ListByFirmware method. + * @param options The options parameters. + */ + private _listByFirmwareNext( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + nextLink: string, + options?: CvesListByFirmwareNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, nextLink, options }, + listByFirmwareNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByFirmwareOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/cves", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.CveListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByFirmwareNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.CveListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/firmwareOperations.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/firmwareOperations.ts deleted file mode 100644 index 008ed4d68211..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/firmwareOperations.ts +++ /dev/null @@ -1,1892 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; -import { setContinuationToken } from "../pagingHelper"; -import { FirmwareOperations } from "../operationsInterfaces"; -import * as coreClient from "@azure/core-client"; -import * as Mappers from "../models/mappers"; -import * as Parameters from "../models/parameters"; -import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; -import { - Firmware, - FirmwareListByWorkspaceNextOptionalParams, - FirmwareListByWorkspaceOptionalParams, - FirmwareListByWorkspaceResponse, - Component, - FirmwareListGenerateComponentListNextOptionalParams, - FirmwareListGenerateComponentListOptionalParams, - FirmwareListGenerateComponentListResponse, - BinaryHardening, - FirmwareListGenerateBinaryHardeningListNextOptionalParams, - FirmwareListGenerateBinaryHardeningListOptionalParams, - FirmwareListGenerateBinaryHardeningListResponse, - PasswordHash, - FirmwareListGeneratePasswordHashListNextOptionalParams, - FirmwareListGeneratePasswordHashListOptionalParams, - FirmwareListGeneratePasswordHashListResponse, - Cve, - FirmwareListGenerateCveListNextOptionalParams, - FirmwareListGenerateCveListOptionalParams, - FirmwareListGenerateCveListResponse, - CryptoCertificate, - FirmwareListGenerateCryptoCertificateListNextOptionalParams, - FirmwareListGenerateCryptoCertificateListOptionalParams, - FirmwareListGenerateCryptoCertificateListResponse, - CryptoKey, - FirmwareListGenerateCryptoKeyListNextOptionalParams, - FirmwareListGenerateCryptoKeyListOptionalParams, - FirmwareListGenerateCryptoKeyListResponse, - FirmwareCreateOptionalParams, - FirmwareCreateResponse, - FirmwareUpdateDefinition, - FirmwareUpdateOptionalParams, - FirmwareUpdateResponse, - FirmwareDeleteOptionalParams, - FirmwareGetOptionalParams, - FirmwareGetResponse, - FirmwareGenerateDownloadUrlOptionalParams, - FirmwareGenerateDownloadUrlResponse, - FirmwareGenerateFilesystemDownloadUrlOptionalParams, - FirmwareGenerateFilesystemDownloadUrlResponse, - FirmwareGenerateSummaryOptionalParams, - FirmwareGenerateSummaryResponse, - FirmwareGenerateComponentDetailsOptionalParams, - FirmwareGenerateComponentDetailsResponse, - FirmwareGenerateBinaryHardeningSummaryOptionalParams, - FirmwareGenerateBinaryHardeningSummaryResponse, - FirmwareGenerateBinaryHardeningDetailsOptionalParams, - FirmwareGenerateBinaryHardeningDetailsResponse, - FirmwareGenerateCveSummaryOptionalParams, - FirmwareGenerateCveSummaryResponse, - FirmwareGenerateCryptoCertificateSummaryOptionalParams, - FirmwareGenerateCryptoCertificateSummaryResponse, - FirmwareGenerateCryptoKeySummaryOptionalParams, - FirmwareGenerateCryptoKeySummaryResponse, - FirmwareListByWorkspaceNextResponse, - FirmwareListGenerateComponentListNextResponse, - FirmwareListGenerateBinaryHardeningListNextResponse, - FirmwareListGeneratePasswordHashListNextResponse, - FirmwareListGenerateCveListNextResponse, - FirmwareListGenerateCryptoCertificateListNextResponse, - FirmwareListGenerateCryptoKeyListNextResponse -} from "../models"; - -/// -/** Class containing FirmwareOperations operations. */ -export class FirmwareOperationsImpl implements FirmwareOperations { - private readonly client: IoTFirmwareDefenseClient; - - /** - * Initialize a new instance of the class FirmwareOperations class. - * @param client Reference to the service client - */ - constructor(client: IoTFirmwareDefenseClient) { - this.client = client; - } - - /** - * Lists all of firmwares inside a workspace. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param options The options parameters. - */ - public listByWorkspace( - resourceGroupName: string, - workspaceName: string, - options?: FirmwareListByWorkspaceOptionalParams - ): PagedAsyncIterableIterator { - const iter = this.listByWorkspacePagingAll( - resourceGroupName, - workspaceName, - options - ); - return { - next() { - return iter.next(); - }, - [Symbol.asyncIterator]() { - return this; - }, - byPage: (settings?: PageSettings) => { - if (settings?.maxPageSize) { - throw new Error("maxPageSize is not supported by this operation."); - } - return this.listByWorkspacePagingPage( - resourceGroupName, - workspaceName, - options, - settings - ); - } - }; - } - - private async *listByWorkspacePagingPage( - resourceGroupName: string, - workspaceName: string, - options?: FirmwareListByWorkspaceOptionalParams, - settings?: PageSettings - ): AsyncIterableIterator { - let result: FirmwareListByWorkspaceResponse; - let continuationToken = settings?.continuationToken; - if (!continuationToken) { - result = await this._listByWorkspace( - resourceGroupName, - workspaceName, - options - ); - let page = result.value || []; - continuationToken = result.nextLink; - setContinuationToken(page, continuationToken); - yield page; - } - while (continuationToken) { - result = await this._listByWorkspaceNext( - resourceGroupName, - workspaceName, - continuationToken, - options - ); - continuationToken = result.nextLink; - let page = result.value || []; - setContinuationToken(page, continuationToken); - yield page; - } - } - - private async *listByWorkspacePagingAll( - resourceGroupName: string, - workspaceName: string, - options?: FirmwareListByWorkspaceOptionalParams - ): AsyncIterableIterator { - for await (const page of this.listByWorkspacePagingPage( - resourceGroupName, - workspaceName, - options - )) { - yield* page; - } - } - - /** - * The operation to list all components result for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - public listGenerateComponentList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateComponentListOptionalParams - ): PagedAsyncIterableIterator { - const iter = this.listGenerateComponentListPagingAll( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - return { - next() { - return iter.next(); - }, - [Symbol.asyncIterator]() { - return this; - }, - byPage: (settings?: PageSettings) => { - if (settings?.maxPageSize) { - throw new Error("maxPageSize is not supported by this operation."); - } - return this.listGenerateComponentListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options, - settings - ); - } - }; - } - - private async *listGenerateComponentListPagingPage( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateComponentListOptionalParams, - settings?: PageSettings - ): AsyncIterableIterator { - let result: FirmwareListGenerateComponentListResponse; - let continuationToken = settings?.continuationToken; - if (!continuationToken) { - result = await this._listGenerateComponentList( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - let page = result.value || []; - continuationToken = result.nextLink; - setContinuationToken(page, continuationToken); - yield page; - } - while (continuationToken) { - result = await this._listGenerateComponentListNext( - resourceGroupName, - workspaceName, - firmwareId, - continuationToken, - options - ); - continuationToken = result.nextLink; - let page = result.value || []; - setContinuationToken(page, continuationToken); - yield page; - } - } - - private async *listGenerateComponentListPagingAll( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateComponentListOptionalParams - ): AsyncIterableIterator { - for await (const page of this.listGenerateComponentListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options - )) { - yield* page; - } - } - - /** - * The operation to list all binary hardening result for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - public listGenerateBinaryHardeningList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateBinaryHardeningListOptionalParams - ): PagedAsyncIterableIterator { - const iter = this.listGenerateBinaryHardeningListPagingAll( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - return { - next() { - return iter.next(); - }, - [Symbol.asyncIterator]() { - return this; - }, - byPage: (settings?: PageSettings) => { - if (settings?.maxPageSize) { - throw new Error("maxPageSize is not supported by this operation."); - } - return this.listGenerateBinaryHardeningListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options, - settings - ); - } - }; - } - - private async *listGenerateBinaryHardeningListPagingPage( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateBinaryHardeningListOptionalParams, - settings?: PageSettings - ): AsyncIterableIterator { - let result: FirmwareListGenerateBinaryHardeningListResponse; - let continuationToken = settings?.continuationToken; - if (!continuationToken) { - result = await this._listGenerateBinaryHardeningList( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - let page = result.value || []; - continuationToken = result.nextLink; - setContinuationToken(page, continuationToken); - yield page; - } - while (continuationToken) { - result = await this._listGenerateBinaryHardeningListNext( - resourceGroupName, - workspaceName, - firmwareId, - continuationToken, - options - ); - continuationToken = result.nextLink; - let page = result.value || []; - setContinuationToken(page, continuationToken); - yield page; - } - } - - private async *listGenerateBinaryHardeningListPagingAll( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateBinaryHardeningListOptionalParams - ): AsyncIterableIterator { - for await (const page of this.listGenerateBinaryHardeningListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options - )) { - yield* page; - } - } - - /** - * The operation to list all password hashes for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - public listGeneratePasswordHashList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGeneratePasswordHashListOptionalParams - ): PagedAsyncIterableIterator { - const iter = this.listGeneratePasswordHashListPagingAll( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - return { - next() { - return iter.next(); - }, - [Symbol.asyncIterator]() { - return this; - }, - byPage: (settings?: PageSettings) => { - if (settings?.maxPageSize) { - throw new Error("maxPageSize is not supported by this operation."); - } - return this.listGeneratePasswordHashListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options, - settings - ); - } - }; - } - - private async *listGeneratePasswordHashListPagingPage( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGeneratePasswordHashListOptionalParams, - settings?: PageSettings - ): AsyncIterableIterator { - let result: FirmwareListGeneratePasswordHashListResponse; - let continuationToken = settings?.continuationToken; - if (!continuationToken) { - result = await this._listGeneratePasswordHashList( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - let page = result.value || []; - continuationToken = result.nextLink; - setContinuationToken(page, continuationToken); - yield page; - } - while (continuationToken) { - result = await this._listGeneratePasswordHashListNext( - resourceGroupName, - workspaceName, - firmwareId, - continuationToken, - options - ); - continuationToken = result.nextLink; - let page = result.value || []; - setContinuationToken(page, continuationToken); - yield page; - } - } - - private async *listGeneratePasswordHashListPagingAll( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGeneratePasswordHashListOptionalParams - ): AsyncIterableIterator { - for await (const page of this.listGeneratePasswordHashListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options - )) { - yield* page; - } - } - - /** - * The operation to list all cve results for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - public listGenerateCveList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCveListOptionalParams - ): PagedAsyncIterableIterator { - const iter = this.listGenerateCveListPagingAll( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - return { - next() { - return iter.next(); - }, - [Symbol.asyncIterator]() { - return this; - }, - byPage: (settings?: PageSettings) => { - if (settings?.maxPageSize) { - throw new Error("maxPageSize is not supported by this operation."); - } - return this.listGenerateCveListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options, - settings - ); - } - }; - } - - private async *listGenerateCveListPagingPage( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCveListOptionalParams, - settings?: PageSettings - ): AsyncIterableIterator { - let result: FirmwareListGenerateCveListResponse; - let continuationToken = settings?.continuationToken; - if (!continuationToken) { - result = await this._listGenerateCveList( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - let page = result.value || []; - continuationToken = result.nextLink; - setContinuationToken(page, continuationToken); - yield page; - } - while (continuationToken) { - result = await this._listGenerateCveListNext( - resourceGroupName, - workspaceName, - firmwareId, - continuationToken, - options - ); - continuationToken = result.nextLink; - let page = result.value || []; - setContinuationToken(page, continuationToken); - yield page; - } - } - - private async *listGenerateCveListPagingAll( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCveListOptionalParams - ): AsyncIterableIterator { - for await (const page of this.listGenerateCveListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options - )) { - yield* page; - } - } - - /** - * The operation to list all crypto certificates for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - public listGenerateCryptoCertificateList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoCertificateListOptionalParams - ): PagedAsyncIterableIterator { - const iter = this.listGenerateCryptoCertificateListPagingAll( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - return { - next() { - return iter.next(); - }, - [Symbol.asyncIterator]() { - return this; - }, - byPage: (settings?: PageSettings) => { - if (settings?.maxPageSize) { - throw new Error("maxPageSize is not supported by this operation."); - } - return this.listGenerateCryptoCertificateListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options, - settings - ); - } - }; - } - - private async *listGenerateCryptoCertificateListPagingPage( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoCertificateListOptionalParams, - settings?: PageSettings - ): AsyncIterableIterator { - let result: FirmwareListGenerateCryptoCertificateListResponse; - let continuationToken = settings?.continuationToken; - if (!continuationToken) { - result = await this._listGenerateCryptoCertificateList( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - let page = result.value || []; - continuationToken = result.nextLink; - setContinuationToken(page, continuationToken); - yield page; - } - while (continuationToken) { - result = await this._listGenerateCryptoCertificateListNext( - resourceGroupName, - workspaceName, - firmwareId, - continuationToken, - options - ); - continuationToken = result.nextLink; - let page = result.value || []; - setContinuationToken(page, continuationToken); - yield page; - } - } - - private async *listGenerateCryptoCertificateListPagingAll( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoCertificateListOptionalParams - ): AsyncIterableIterator { - for await (const page of this.listGenerateCryptoCertificateListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options - )) { - yield* page; - } - } - - /** - * The operation to list all crypto keys for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - public listGenerateCryptoKeyList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoKeyListOptionalParams - ): PagedAsyncIterableIterator { - const iter = this.listGenerateCryptoKeyListPagingAll( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - return { - next() { - return iter.next(); - }, - [Symbol.asyncIterator]() { - return this; - }, - byPage: (settings?: PageSettings) => { - if (settings?.maxPageSize) { - throw new Error("maxPageSize is not supported by this operation."); - } - return this.listGenerateCryptoKeyListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options, - settings - ); - } - }; - } - - private async *listGenerateCryptoKeyListPagingPage( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoKeyListOptionalParams, - settings?: PageSettings - ): AsyncIterableIterator { - let result: FirmwareListGenerateCryptoKeyListResponse; - let continuationToken = settings?.continuationToken; - if (!continuationToken) { - result = await this._listGenerateCryptoKeyList( - resourceGroupName, - workspaceName, - firmwareId, - options - ); - let page = result.value || []; - continuationToken = result.nextLink; - setContinuationToken(page, continuationToken); - yield page; - } - while (continuationToken) { - result = await this._listGenerateCryptoKeyListNext( - resourceGroupName, - workspaceName, - firmwareId, - continuationToken, - options - ); - continuationToken = result.nextLink; - let page = result.value || []; - setContinuationToken(page, continuationToken); - yield page; - } - } - - private async *listGenerateCryptoKeyListPagingAll( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoKeyListOptionalParams - ): AsyncIterableIterator { - for await (const page of this.listGenerateCryptoKeyListPagingPage( - resourceGroupName, - workspaceName, - firmwareId, - options - )) { - yield* page; - } - } - - /** - * Lists all of firmwares inside a workspace. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param options The options parameters. - */ - private _listByWorkspace( - resourceGroupName: string, - workspaceName: string, - options?: FirmwareListByWorkspaceOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, options }, - listByWorkspaceOperationSpec - ); - } - - /** - * The operation to create a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param firmware Details of the firmware being created or updated. - * @param options The options parameters. - */ - create( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - firmware: Firmware, - options?: FirmwareCreateOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, firmware, options }, - createOperationSpec - ); - } - - /** - * The operation to update firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param firmware Details of the firmware being created or updated. - * @param options The options parameters. - */ - update( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - firmware: FirmwareUpdateDefinition, - options?: FirmwareUpdateOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, firmware, options }, - updateOperationSpec - ); - } - - /** - * The operation to delete a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - delete( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareDeleteOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - deleteOperationSpec - ); - } - - /** - * Get firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - get( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGetOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - getOperationSpec - ); - } - - /** - * The operation to a url for file download. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateDownloadUrl( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateDownloadUrlOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateDownloadUrlOperationSpec - ); - } - - /** - * The operation to a url for tar file download. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateFilesystemDownloadUrl( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateFilesystemDownloadUrlOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateFilesystemDownloadUrlOperationSpec - ); - } - - /** - * The operation to get a scan summary. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateSummaryOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateSummaryOperationSpec - ); - } - - /** - * The operation to list all components result for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - private _listGenerateComponentList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateComponentListOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - listGenerateComponentListOperationSpec - ); - } - - /** - * The operation to get component details for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateComponentDetails( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateComponentDetailsOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateComponentDetailsOperationSpec - ); - } - - /** - * The operation to list all binary hardening result for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - private _listGenerateBinaryHardeningList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateBinaryHardeningListOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - listGenerateBinaryHardeningListOperationSpec - ); - } - - /** - * The operation to list the binary hardening summary percentages for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateBinaryHardeningSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateBinaryHardeningSummaryOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateBinaryHardeningSummaryOperationSpec - ); - } - - /** - * The operation to get binary hardening details for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateBinaryHardeningDetails( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateBinaryHardeningDetailsOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateBinaryHardeningDetailsOperationSpec - ); - } - - /** - * The operation to list all password hashes for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - private _listGeneratePasswordHashList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGeneratePasswordHashListOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - listGeneratePasswordHashListOperationSpec - ); - } - - /** - * The operation to list all cve results for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - private _listGenerateCveList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCveListOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - listGenerateCveListOperationSpec - ); - } - - /** - * The operation to provide a high level summary of the CVEs reported for the firmware image. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateCveSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateCveSummaryOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateCveSummaryOperationSpec - ); - } - - /** - * The operation to provide a high level summary of the discovered cryptographic certificates reported - * for the firmware image. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateCryptoCertificateSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateCryptoCertificateSummaryOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateCryptoCertificateSummaryOperationSpec - ); - } - - /** - * The operation to provide a high level summary of the discovered cryptographic keys reported for the - * firmware image. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateCryptoKeySummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateCryptoKeySummaryOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - generateCryptoKeySummaryOperationSpec - ); - } - - /** - * The operation to list all crypto certificates for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - private _listGenerateCryptoCertificateList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoCertificateListOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - listGenerateCryptoCertificateListOperationSpec - ); - } - - /** - * The operation to list all crypto keys for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - private _listGenerateCryptoKeyList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoKeyListOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, options }, - listGenerateCryptoKeyListOperationSpec - ); - } - - /** - * ListByWorkspaceNext - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param nextLink The nextLink from the previous successful call to the ListByWorkspace method. - * @param options The options parameters. - */ - private _listByWorkspaceNext( - resourceGroupName: string, - workspaceName: string, - nextLink: string, - options?: FirmwareListByWorkspaceNextOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, nextLink, options }, - listByWorkspaceNextOperationSpec - ); - } - - /** - * ListGenerateComponentListNext - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param nextLink The nextLink from the previous successful call to the ListGenerateComponentList - * method. - * @param options The options parameters. - */ - private _listGenerateComponentListNext( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - nextLink: string, - options?: FirmwareListGenerateComponentListNextOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, nextLink, options }, - listGenerateComponentListNextOperationSpec - ); - } - - /** - * ListGenerateBinaryHardeningListNext - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param nextLink The nextLink from the previous successful call to the - * ListGenerateBinaryHardeningList method. - * @param options The options parameters. - */ - private _listGenerateBinaryHardeningListNext( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - nextLink: string, - options?: FirmwareListGenerateBinaryHardeningListNextOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, nextLink, options }, - listGenerateBinaryHardeningListNextOperationSpec - ); - } - - /** - * ListGeneratePasswordHashListNext - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param nextLink The nextLink from the previous successful call to the ListGeneratePasswordHashList - * method. - * @param options The options parameters. - */ - private _listGeneratePasswordHashListNext( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - nextLink: string, - options?: FirmwareListGeneratePasswordHashListNextOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, nextLink, options }, - listGeneratePasswordHashListNextOperationSpec - ); - } - - /** - * ListGenerateCveListNext - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param nextLink The nextLink from the previous successful call to the ListGenerateCveList method. - * @param options The options parameters. - */ - private _listGenerateCveListNext( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - nextLink: string, - options?: FirmwareListGenerateCveListNextOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, nextLink, options }, - listGenerateCveListNextOperationSpec - ); - } - - /** - * ListGenerateCryptoCertificateListNext - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param nextLink The nextLink from the previous successful call to the - * ListGenerateCryptoCertificateList method. - * @param options The options parameters. - */ - private _listGenerateCryptoCertificateListNext( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - nextLink: string, - options?: FirmwareListGenerateCryptoCertificateListNextOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, nextLink, options }, - listGenerateCryptoCertificateListNextOperationSpec - ); - } - - /** - * ListGenerateCryptoKeyListNext - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param nextLink The nextLink from the previous successful call to the ListGenerateCryptoKeyList - * method. - * @param options The options parameters. - */ - private _listGenerateCryptoKeyListNext( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - nextLink: string, - options?: FirmwareListGenerateCryptoKeyListNextOptionalParams - ): Promise { - return this.client.sendOperationRequest( - { resourceGroupName, workspaceName, firmwareId, nextLink, options }, - listGenerateCryptoKeyListNextOperationSpec - ); - } -} -// Operation Specifications -const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); - -const listByWorkspaceOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.FirmwareList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName - ], - headerParameters: [Parameters.accept], - serializer -}; -const createOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", - httpMethod: "PUT", - responses: { - 200: { - bodyMapper: Mappers.Firmware - }, - 201: { - bodyMapper: Mappers.Firmware - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - requestBody: Parameters.firmware, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept, Parameters.contentType], - mediaType: "json", - serializer -}; -const updateOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", - httpMethod: "PATCH", - responses: { - 200: { - bodyMapper: Mappers.Firmware - }, - 201: { - bodyMapper: Mappers.Firmware - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - requestBody: Parameters.firmware1, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept, Parameters.contentType], - mediaType: "json", - serializer -}; -const deleteOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", - httpMethod: "DELETE", - responses: { - 200: {}, - 204: {}, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const getOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.Firmware - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateDownloadUrlOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateDownloadUrl", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.UrlToken - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateFilesystemDownloadUrlOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateFilesystemDownloadUrl", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.UrlToken - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateSummaryOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateSummary", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.FirmwareSummary - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateComponentListOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateComponentList", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.ComponentList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateComponentDetailsOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateComponentDetails", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.Component - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateBinaryHardeningListOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateBinaryHardeningList", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.BinaryHardeningList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateBinaryHardeningSummaryOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateBinaryHardeningSummary", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.BinaryHardeningSummary - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateBinaryHardeningDetailsOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateBinaryHardeningDetails", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.BinaryHardening - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGeneratePasswordHashListOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generatePasswordHashList", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.PasswordHashList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateCveListOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateCveList", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.CveList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateCveSummaryOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateCveSummary", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.CveSummary - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateCryptoCertificateSummaryOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateCryptoCertificateSummary", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.CryptoCertificateSummary - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const generateCryptoKeySummaryOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateCryptoKeySummary", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.CryptoKeySummary - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateCryptoCertificateListOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateCryptoCertificateList", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.CryptoCertificateList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateCryptoKeyListOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateCryptoKeyList", - httpMethod: "POST", - responses: { - 200: { - bodyMapper: Mappers.CryptoKeyList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - queryParameters: [Parameters.apiVersion], - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId - ], - headerParameters: [Parameters.accept], - serializer -}; -const listByWorkspaceNextOperationSpec: coreClient.OperationSpec = { - path: "{nextLink}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.FirmwareList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.nextLink - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateComponentListNextOperationSpec: coreClient.OperationSpec = { - path: "{nextLink}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.ComponentList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId, - Parameters.nextLink - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateBinaryHardeningListNextOperationSpec: coreClient.OperationSpec = { - path: "{nextLink}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.BinaryHardeningList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId, - Parameters.nextLink - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGeneratePasswordHashListNextOperationSpec: coreClient.OperationSpec = { - path: "{nextLink}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.PasswordHashList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId, - Parameters.nextLink - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateCveListNextOperationSpec: coreClient.OperationSpec = { - path: "{nextLink}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.CveList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId, - Parameters.nextLink - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateCryptoCertificateListNextOperationSpec: coreClient.OperationSpec = { - path: "{nextLink}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.CryptoCertificateList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId, - Parameters.nextLink - ], - headerParameters: [Parameters.accept], - serializer -}; -const listGenerateCryptoKeyListNextOperationSpec: coreClient.OperationSpec = { - path: "{nextLink}", - httpMethod: "GET", - responses: { - 200: { - bodyMapper: Mappers.CryptoKeyList - }, - default: { - bodyMapper: Mappers.ErrorResponse - } - }, - urlParameters: [ - Parameters.$host, - Parameters.subscriptionId, - Parameters.resourceGroupName, - Parameters.workspaceName, - Parameters.firmwareId, - Parameters.nextLink - ], - headerParameters: [Parameters.accept], - serializer -}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/firmwares.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/firmwares.ts new file mode 100644 index 000000000000..84b03e7c3a79 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/firmwares.ts @@ -0,0 +1,469 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { Firmwares } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + Firmware, + FirmwaresListByWorkspaceNextOptionalParams, + FirmwaresListByWorkspaceOptionalParams, + FirmwaresListByWorkspaceResponse, + FirmwaresCreateOptionalParams, + FirmwaresCreateResponse, + FirmwareUpdateDefinition, + FirmwaresUpdateOptionalParams, + FirmwaresUpdateResponse, + FirmwaresDeleteOptionalParams, + FirmwaresGetOptionalParams, + FirmwaresGetResponse, + FirmwaresGenerateDownloadUrlOptionalParams, + FirmwaresGenerateDownloadUrlResponse, + FirmwaresGenerateFilesystemDownloadUrlOptionalParams, + FirmwaresGenerateFilesystemDownloadUrlResponse, + FirmwaresListByWorkspaceNextResponse, +} from "../models"; + +/// +/** Class containing Firmwares operations. */ +export class FirmwaresImpl implements Firmwares { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class Firmwares class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists all of firmwares inside a workspace. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param options The options parameters. + */ + public listByWorkspace( + resourceGroupName: string, + workspaceName: string, + options?: FirmwaresListByWorkspaceOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByWorkspacePagingAll( + resourceGroupName, + workspaceName, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByWorkspacePagingPage( + resourceGroupName, + workspaceName, + options, + settings, + ); + }, + }; + } + + private async *listByWorkspacePagingPage( + resourceGroupName: string, + workspaceName: string, + options?: FirmwaresListByWorkspaceOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: FirmwaresListByWorkspaceResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByWorkspace( + resourceGroupName, + workspaceName, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByWorkspaceNext( + resourceGroupName, + workspaceName, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByWorkspacePagingAll( + resourceGroupName: string, + workspaceName: string, + options?: FirmwaresListByWorkspaceOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByWorkspacePagingPage( + resourceGroupName, + workspaceName, + options, + )) { + yield* page; + } + } + + /** + * Lists all of firmwares inside a workspace. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param options The options parameters. + */ + private _listByWorkspace( + resourceGroupName: string, + workspaceName: string, + options?: FirmwaresListByWorkspaceOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, options }, + listByWorkspaceOperationSpec, + ); + } + + /** + * The operation to create a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param firmware Details of the firmware being created or updated. + * @param options The options parameters. + */ + create( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + firmware: Firmware, + options?: FirmwaresCreateOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, firmware, options }, + createOperationSpec, + ); + } + + /** + * The operation to update firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param firmware Details of the firmware being created or updated. + * @param options The options parameters. + */ + update( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + firmware: FirmwareUpdateDefinition, + options?: FirmwaresUpdateOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, firmware, options }, + updateOperationSpec, + ); + } + + /** + * The operation to delete a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + delete( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresDeleteOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + deleteOperationSpec, + ); + } + + /** + * Get firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + get( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresGetOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + getOperationSpec, + ); + } + + /** + * The operation to a url for file download. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + generateDownloadUrl( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresGenerateDownloadUrlOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + generateDownloadUrlOperationSpec, + ); + } + + /** + * The operation to a url for tar file download. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + generateFilesystemDownloadUrl( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresGenerateFilesystemDownloadUrlOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + generateFilesystemDownloadUrlOperationSpec, + ); + } + + /** + * ListByWorkspaceNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param nextLink The nextLink from the previous successful call to the ListByWorkspace method. + * @param options The options parameters. + */ + private _listByWorkspaceNext( + resourceGroupName: string, + workspaceName: string, + nextLink: string, + options?: FirmwaresListByWorkspaceNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, nextLink, options }, + listByWorkspaceNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByWorkspaceOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.FirmwareList, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const createOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", + httpMethod: "PUT", + responses: { + 200: { + bodyMapper: Mappers.Firmware, + }, + 201: { + bodyMapper: Mappers.Firmware, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + requestBody: Parameters.firmware, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept, Parameters.contentType], + mediaType: "json", + serializer, +}; +const updateOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", + httpMethod: "PATCH", + responses: { + 200: { + bodyMapper: Mappers.Firmware, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + requestBody: Parameters.firmware1, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept, Parameters.contentType], + mediaType: "json", + serializer, +}; +const deleteOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", + httpMethod: "DELETE", + responses: { + 200: {}, + 204: {}, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const getOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.Firmware, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const generateDownloadUrlOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateDownloadUrl", + httpMethod: "POST", + responses: { + 200: { + bodyMapper: Mappers.UrlToken, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const generateFilesystemDownloadUrlOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/generateFilesystemDownloadUrl", + httpMethod: "POST", + responses: { + 200: { + bodyMapper: Mappers.UrlToken, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByWorkspaceNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.FirmwareList, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/index.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/index.ts index e435c0528d6c..e920abdccbeb 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/index.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/index.ts @@ -6,6 +6,13 @@ * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ -export * from "./firmwareOperations"; -export * from "./workspaces"; +export * from "./binaryHardening"; +export * from "./cryptoCertificates"; +export * from "./cryptoKeys"; +export * from "./cves"; +export * from "./firmwares"; export * from "./operations"; +export * from "./passwordHashes"; +export * from "./sbomComponents"; +export * from "./summaries"; +export * from "./workspaces"; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/operations.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/operations.ts index c34da8ccc29c..b9d7144a494f 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/operations.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/operations.ts @@ -18,7 +18,7 @@ import { OperationsListNextOptionalParams, OperationsListOptionalParams, OperationsListResponse, - OperationsListNextResponse + OperationsListNextResponse, } from "../models"; /// @@ -39,7 +39,7 @@ export class OperationsImpl implements Operations { * @param options The options parameters. */ public list( - options?: OperationsListOptionalParams + options?: OperationsListOptionalParams, ): PagedAsyncIterableIterator { const iter = this.listPagingAll(options); return { @@ -54,13 +54,13 @@ export class OperationsImpl implements Operations { throw new Error("maxPageSize is not supported by this operation."); } return this.listPagingPage(options, settings); - } + }, }; } private async *listPagingPage( options?: OperationsListOptionalParams, - settings?: PageSettings + settings?: PageSettings, ): AsyncIterableIterator { let result: OperationsListResponse; let continuationToken = settings?.continuationToken; @@ -81,7 +81,7 @@ export class OperationsImpl implements Operations { } private async *listPagingAll( - options?: OperationsListOptionalParams + options?: OperationsListOptionalParams, ): AsyncIterableIterator { for await (const page of this.listPagingPage(options)) { yield* page; @@ -93,7 +93,7 @@ export class OperationsImpl implements Operations { * @param options The options parameters. */ private _list( - options?: OperationsListOptionalParams + options?: OperationsListOptionalParams, ): Promise { return this.client.sendOperationRequest({ options }, listOperationSpec); } @@ -105,11 +105,11 @@ export class OperationsImpl implements Operations { */ private _listNext( nextLink: string, - options?: OperationsListNextOptionalParams + options?: OperationsListNextOptionalParams, ): Promise { return this.client.sendOperationRequest( { nextLink, options }, - listNextOperationSpec + listNextOperationSpec, ); } } @@ -121,29 +121,29 @@ const listOperationSpec: coreClient.OperationSpec = { httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.OperationListResult + bodyMapper: Mappers.OperationListResult, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, queryParameters: [Parameters.apiVersion], urlParameters: [Parameters.$host], headerParameters: [Parameters.accept], - serializer + serializer, }; const listNextOperationSpec: coreClient.OperationSpec = { path: "{nextLink}", httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.OperationListResult + bodyMapper: Mappers.OperationListResult, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, urlParameters: [Parameters.$host, Parameters.nextLink], headerParameters: [Parameters.accept], - serializer + serializer, }; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/passwordHashes.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/passwordHashes.ts new file mode 100644 index 000000000000..a112c806c418 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/passwordHashes.ts @@ -0,0 +1,216 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { PasswordHashes } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + PasswordHashResource, + PasswordHashesListByFirmwareNextOptionalParams, + PasswordHashesListByFirmwareOptionalParams, + PasswordHashesListByFirmwareResponse, + PasswordHashesListByFirmwareNextResponse, +} from "../models"; + +/// +/** Class containing PasswordHashes operations. */ +export class PasswordHashesImpl implements PasswordHashes { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class PasswordHashes class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists password hash analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + public listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: PasswordHashesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByFirmwarePagingAll( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + settings, + ); + }, + }; + } + + private async *listByFirmwarePagingPage( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: PasswordHashesListByFirmwareOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: PasswordHashesListByFirmwareResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByFirmwareNext( + resourceGroupName, + workspaceName, + firmwareId, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByFirmwarePagingAll( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: PasswordHashesListByFirmwareOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + )) { + yield* page; + } + } + + /** + * Lists password hash analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + private _listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: PasswordHashesListByFirmwareOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + listByFirmwareOperationSpec, + ); + } + + /** + * ListByFirmwareNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param nextLink The nextLink from the previous successful call to the ListByFirmware method. + * @param options The options parameters. + */ + private _listByFirmwareNext( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + nextLink: string, + options?: PasswordHashesListByFirmwareNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, nextLink, options }, + listByFirmwareNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByFirmwareOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/passwordHashes", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.PasswordHashListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByFirmwareNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.PasswordHashListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/sbomComponents.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/sbomComponents.ts new file mode 100644 index 000000000000..3ab4b69e8c63 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/sbomComponents.ts @@ -0,0 +1,216 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { SbomComponents } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + SbomComponentResource, + SbomComponentsListByFirmwareNextOptionalParams, + SbomComponentsListByFirmwareOptionalParams, + SbomComponentsListByFirmwareResponse, + SbomComponentsListByFirmwareNextResponse, +} from "../models"; + +/// +/** Class containing SbomComponents operations. */ +export class SbomComponentsImpl implements SbomComponents { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class SbomComponents class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists SBOM analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + public listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SbomComponentsListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByFirmwarePagingAll( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + settings, + ); + }, + }; + } + + private async *listByFirmwarePagingPage( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SbomComponentsListByFirmwareOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: SbomComponentsListByFirmwareResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByFirmwareNext( + resourceGroupName, + workspaceName, + firmwareId, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByFirmwarePagingAll( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SbomComponentsListByFirmwareOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + )) { + yield* page; + } + } + + /** + * Lists SBOM analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + private _listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SbomComponentsListByFirmwareOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + listByFirmwareOperationSpec, + ); + } + + /** + * ListByFirmwareNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param nextLink The nextLink from the previous successful call to the ListByFirmware method. + * @param options The options parameters. + */ + private _listByFirmwareNext( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + nextLink: string, + options?: SbomComponentsListByFirmwareNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, nextLink, options }, + listByFirmwareNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByFirmwareOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/sbomComponents", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.SbomComponentListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByFirmwareNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.SbomComponentListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/summaries.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/summaries.ts new file mode 100644 index 000000000000..5d40cb5290a5 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/summaries.ts @@ -0,0 +1,265 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator, PageSettings } from "@azure/core-paging"; +import { setContinuationToken } from "../pagingHelper"; +import { Summaries } from "../operationsInterfaces"; +import * as coreClient from "@azure/core-client"; +import * as Mappers from "../models/mappers"; +import * as Parameters from "../models/parameters"; +import { IoTFirmwareDefenseClient } from "../ioTFirmwareDefenseClient"; +import { + SummaryResource, + SummariesListByFirmwareNextOptionalParams, + SummariesListByFirmwareOptionalParams, + SummariesListByFirmwareResponse, + SummaryName, + SummariesGetOptionalParams, + SummariesGetResponse, + SummariesListByFirmwareNextResponse, +} from "../models"; + +/// +/** Class containing Summaries operations. */ +export class SummariesImpl implements Summaries { + private readonly client: IoTFirmwareDefenseClient; + + /** + * Initialize a new instance of the class Summaries class. + * @param client Reference to the service client + */ + constructor(client: IoTFirmwareDefenseClient) { + this.client = client; + } + + /** + * Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary + * by name. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + public listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SummariesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator { + const iter = this.listByFirmwarePagingAll( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + return { + next() { + return iter.next(); + }, + [Symbol.asyncIterator]() { + return this; + }, + byPage: (settings?: PageSettings) => { + if (settings?.maxPageSize) { + throw new Error("maxPageSize is not supported by this operation."); + } + return this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + settings, + ); + }, + }; + } + + private async *listByFirmwarePagingPage( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SummariesListByFirmwareOptionalParams, + settings?: PageSettings, + ): AsyncIterableIterator { + let result: SummariesListByFirmwareResponse; + let continuationToken = settings?.continuationToken; + if (!continuationToken) { + result = await this._listByFirmware( + resourceGroupName, + workspaceName, + firmwareId, + options, + ); + let page = result.value || []; + continuationToken = result.nextLink; + setContinuationToken(page, continuationToken); + yield page; + } + while (continuationToken) { + result = await this._listByFirmwareNext( + resourceGroupName, + workspaceName, + firmwareId, + continuationToken, + options, + ); + continuationToken = result.nextLink; + let page = result.value || []; + setContinuationToken(page, continuationToken); + yield page; + } + } + + private async *listByFirmwarePagingAll( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SummariesListByFirmwareOptionalParams, + ): AsyncIterableIterator { + for await (const page of this.listByFirmwarePagingPage( + resourceGroupName, + workspaceName, + firmwareId, + options, + )) { + yield* page; + } + } + + /** + * Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary + * by name. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + private _listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SummariesListByFirmwareOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, options }, + listByFirmwareOperationSpec, + ); + } + + /** + * Get an analysis result summary of a firmware by name. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param summaryName The Firmware analysis summary name describing the type of summary. + * @param options The options parameters. + */ + get( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + summaryName: SummaryName, + options?: SummariesGetOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, summaryName, options }, + getOperationSpec, + ); + } + + /** + * ListByFirmwareNext + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param nextLink The nextLink from the previous successful call to the ListByFirmware method. + * @param options The options parameters. + */ + private _listByFirmwareNext( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + nextLink: string, + options?: SummariesListByFirmwareNextOptionalParams, + ): Promise { + return this.client.sendOperationRequest( + { resourceGroupName, workspaceName, firmwareId, nextLink, options }, + listByFirmwareNextOperationSpec, + ); + } +} +// Operation Specifications +const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); + +const listByFirmwareOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/summaries", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.SummaryListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const getOperationSpec: coreClient.OperationSpec = { + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/firmwares/{firmwareId}/summaries/{summaryName}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.SummaryResource, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.summaryName, + ], + headerParameters: [Parameters.accept], + serializer, +}; +const listByFirmwareNextOperationSpec: coreClient.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.SummaryListResult, + }, + default: { + bodyMapper: Mappers.ErrorResponse, + }, + }, + urlParameters: [ + Parameters.$host, + Parameters.subscriptionId, + Parameters.resourceGroupName, + Parameters.workspaceName, + Parameters.firmwareId, + Parameters.nextLink, + ], + headerParameters: [Parameters.accept], + serializer, +}; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/workspaces.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/workspaces.ts index cf189758a4c2..92d2574e5125 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/workspaces.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operations/workspaces.ts @@ -33,7 +33,7 @@ import { WorkspacesGenerateUploadUrlOptionalParams, WorkspacesGenerateUploadUrlResponse, WorkspacesListBySubscriptionNextResponse, - WorkspacesListByResourceGroupNextResponse + WorkspacesListByResourceGroupNextResponse, } from "../models"; /// @@ -54,7 +54,7 @@ export class WorkspacesImpl implements Workspaces { * @param options The options parameters. */ public listBySubscription( - options?: WorkspacesListBySubscriptionOptionalParams + options?: WorkspacesListBySubscriptionOptionalParams, ): PagedAsyncIterableIterator { const iter = this.listBySubscriptionPagingAll(options); return { @@ -69,13 +69,13 @@ export class WorkspacesImpl implements Workspaces { throw new Error("maxPageSize is not supported by this operation."); } return this.listBySubscriptionPagingPage(options, settings); - } + }, }; } private async *listBySubscriptionPagingPage( options?: WorkspacesListBySubscriptionOptionalParams, - settings?: PageSettings + settings?: PageSettings, ): AsyncIterableIterator { let result: WorkspacesListBySubscriptionResponse; let continuationToken = settings?.continuationToken; @@ -96,7 +96,7 @@ export class WorkspacesImpl implements Workspaces { } private async *listBySubscriptionPagingAll( - options?: WorkspacesListBySubscriptionOptionalParams + options?: WorkspacesListBySubscriptionOptionalParams, ): AsyncIterableIterator { for await (const page of this.listBySubscriptionPagingPage(options)) { yield* page; @@ -110,7 +110,7 @@ export class WorkspacesImpl implements Workspaces { */ public listByResourceGroup( resourceGroupName: string, - options?: WorkspacesListByResourceGroupOptionalParams + options?: WorkspacesListByResourceGroupOptionalParams, ): PagedAsyncIterableIterator { const iter = this.listByResourceGroupPagingAll(resourceGroupName, options); return { @@ -127,16 +127,16 @@ export class WorkspacesImpl implements Workspaces { return this.listByResourceGroupPagingPage( resourceGroupName, options, - settings + settings, ); - } + }, }; } private async *listByResourceGroupPagingPage( resourceGroupName: string, options?: WorkspacesListByResourceGroupOptionalParams, - settings?: PageSettings + settings?: PageSettings, ): AsyncIterableIterator { let result: WorkspacesListByResourceGroupResponse; let continuationToken = settings?.continuationToken; @@ -151,7 +151,7 @@ export class WorkspacesImpl implements Workspaces { result = await this._listByResourceGroupNext( resourceGroupName, continuationToken, - options + options, ); continuationToken = result.nextLink; let page = result.value || []; @@ -162,11 +162,11 @@ export class WorkspacesImpl implements Workspaces { private async *listByResourceGroupPagingAll( resourceGroupName: string, - options?: WorkspacesListByResourceGroupOptionalParams + options?: WorkspacesListByResourceGroupOptionalParams, ): AsyncIterableIterator { for await (const page of this.listByResourceGroupPagingPage( resourceGroupName, - options + options, )) { yield* page; } @@ -177,11 +177,11 @@ export class WorkspacesImpl implements Workspaces { * @param options The options parameters. */ private _listBySubscription( - options?: WorkspacesListBySubscriptionOptionalParams + options?: WorkspacesListBySubscriptionOptionalParams, ): Promise { return this.client.sendOperationRequest( { options }, - listBySubscriptionOperationSpec + listBySubscriptionOperationSpec, ); } @@ -192,11 +192,11 @@ export class WorkspacesImpl implements Workspaces { */ private _listByResourceGroup( resourceGroupName: string, - options?: WorkspacesListByResourceGroupOptionalParams + options?: WorkspacesListByResourceGroupOptionalParams, ): Promise { return this.client.sendOperationRequest( { resourceGroupName, options }, - listByResourceGroupOperationSpec + listByResourceGroupOperationSpec, ); } @@ -211,11 +211,11 @@ export class WorkspacesImpl implements Workspaces { resourceGroupName: string, workspaceName: string, workspace: Workspace, - options?: WorkspacesCreateOptionalParams + options?: WorkspacesCreateOptionalParams, ): Promise { return this.client.sendOperationRequest( { resourceGroupName, workspaceName, workspace, options }, - createOperationSpec + createOperationSpec, ); } @@ -230,11 +230,11 @@ export class WorkspacesImpl implements Workspaces { resourceGroupName: string, workspaceName: string, workspace: WorkspaceUpdateDefinition, - options?: WorkspacesUpdateOptionalParams + options?: WorkspacesUpdateOptionalParams, ): Promise { return this.client.sendOperationRequest( { resourceGroupName, workspaceName, workspace, options }, - updateOperationSpec + updateOperationSpec, ); } @@ -247,11 +247,11 @@ export class WorkspacesImpl implements Workspaces { delete( resourceGroupName: string, workspaceName: string, - options?: WorkspacesDeleteOptionalParams + options?: WorkspacesDeleteOptionalParams, ): Promise { return this.client.sendOperationRequest( { resourceGroupName, workspaceName, options }, - deleteOperationSpec + deleteOperationSpec, ); } @@ -264,11 +264,11 @@ export class WorkspacesImpl implements Workspaces { get( resourceGroupName: string, workspaceName: string, - options?: WorkspacesGetOptionalParams + options?: WorkspacesGetOptionalParams, ): Promise { return this.client.sendOperationRequest( { resourceGroupName, workspaceName, options }, - getOperationSpec + getOperationSpec, ); } @@ -283,11 +283,11 @@ export class WorkspacesImpl implements Workspaces { resourceGroupName: string, workspaceName: string, generateUploadUrl: GenerateUploadUrlRequest, - options?: WorkspacesGenerateUploadUrlOptionalParams + options?: WorkspacesGenerateUploadUrlOptionalParams, ): Promise { return this.client.sendOperationRequest( { resourceGroupName, workspaceName, generateUploadUrl, options }, - generateUploadUrlOperationSpec + generateUploadUrlOperationSpec, ); } @@ -298,11 +298,11 @@ export class WorkspacesImpl implements Workspaces { */ private _listBySubscriptionNext( nextLink: string, - options?: WorkspacesListBySubscriptionNextOptionalParams + options?: WorkspacesListBySubscriptionNextOptionalParams, ): Promise { return this.client.sendOperationRequest( { nextLink, options }, - listBySubscriptionNextOperationSpec + listBySubscriptionNextOperationSpec, ); } @@ -315,11 +315,11 @@ export class WorkspacesImpl implements Workspaces { private _listByResourceGroupNext( resourceGroupName: string, nextLink: string, - options?: WorkspacesListByResourceGroupNextOptionalParams + options?: WorkspacesListByResourceGroupNextOptionalParams, ): Promise { return this.client.sendOperationRequest( { resourceGroupName, nextLink, options }, - listByResourceGroupNextOperationSpec + listByResourceGroupNextOperationSpec, ); } } @@ -327,57 +327,54 @@ export class WorkspacesImpl implements Workspaces { const serializer = coreClient.createSerializer(Mappers, /* isXml */ false); const listBySubscriptionOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/providers/Microsoft.IoTFirmwareDefense/workspaces", + path: "/subscriptions/{subscriptionId}/providers/Microsoft.IoTFirmwareDefense/workspaces", httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.WorkspaceList + bodyMapper: Mappers.WorkspaceList, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, queryParameters: [Parameters.apiVersion], urlParameters: [Parameters.$host, Parameters.subscriptionId], headerParameters: [Parameters.accept], - serializer + serializer, }; const listByResourceGroupOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces", + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces", httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.WorkspaceList + bodyMapper: Mappers.WorkspaceList, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, queryParameters: [Parameters.apiVersion], urlParameters: [ Parameters.$host, Parameters.subscriptionId, - Parameters.resourceGroupName + Parameters.resourceGroupName, ], headerParameters: [Parameters.accept], - serializer + serializer, }; const createOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", httpMethod: "PUT", responses: { 200: { - bodyMapper: Mappers.Workspace + bodyMapper: Mappers.Workspace, }, 201: { - bodyMapper: Mappers.Workspace + bodyMapper: Mappers.Workspace, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, requestBody: Parameters.workspace, queryParameters: [Parameters.apiVersion], @@ -385,26 +382,22 @@ const createOperationSpec: coreClient.OperationSpec = { Parameters.$host, Parameters.subscriptionId, Parameters.resourceGroupName, - Parameters.workspaceName + Parameters.workspaceName, ], headerParameters: [Parameters.accept, Parameters.contentType], mediaType: "json", - serializer + serializer, }; const updateOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", httpMethod: "PATCH", responses: { 200: { - bodyMapper: Mappers.Workspace - }, - 201: { - bodyMapper: Mappers.Workspace + bodyMapper: Mappers.Workspace, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, requestBody: Parameters.workspace1, queryParameters: [Parameters.apiVersion], @@ -412,67 +405,63 @@ const updateOperationSpec: coreClient.OperationSpec = { Parameters.$host, Parameters.subscriptionId, Parameters.resourceGroupName, - Parameters.workspaceName + Parameters.workspaceName, ], headerParameters: [Parameters.accept, Parameters.contentType], mediaType: "json", - serializer + serializer, }; const deleteOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", httpMethod: "DELETE", responses: { 200: {}, 204: {}, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, queryParameters: [Parameters.apiVersion], urlParameters: [ Parameters.$host, Parameters.subscriptionId, Parameters.resourceGroupName, - Parameters.workspaceName + Parameters.workspaceName, ], headerParameters: [Parameters.accept], - serializer + serializer, }; const getOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}", httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.Workspace + bodyMapper: Mappers.Workspace, }, - 304: {}, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, queryParameters: [Parameters.apiVersion], urlParameters: [ Parameters.$host, Parameters.subscriptionId, Parameters.resourceGroupName, - Parameters.workspaceName + Parameters.workspaceName, ], headerParameters: [Parameters.accept], - serializer + serializer, }; const generateUploadUrlOperationSpec: coreClient.OperationSpec = { - path: - "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/generateUploadUrl", + path: "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.IoTFirmwareDefense/workspaces/{workspaceName}/generateUploadUrl", httpMethod: "POST", responses: { 200: { - bodyMapper: Mappers.UrlToken + bodyMapper: Mappers.UrlToken, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, requestBody: Parameters.generateUploadUrl, queryParameters: [Parameters.apiVersion], @@ -480,48 +469,48 @@ const generateUploadUrlOperationSpec: coreClient.OperationSpec = { Parameters.$host, Parameters.subscriptionId, Parameters.resourceGroupName, - Parameters.workspaceName + Parameters.workspaceName, ], headerParameters: [Parameters.accept, Parameters.contentType], mediaType: "json", - serializer + serializer, }; const listBySubscriptionNextOperationSpec: coreClient.OperationSpec = { path: "{nextLink}", httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.WorkspaceList + bodyMapper: Mappers.WorkspaceList, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, urlParameters: [ Parameters.$host, Parameters.subscriptionId, - Parameters.nextLink + Parameters.nextLink, ], headerParameters: [Parameters.accept], - serializer + serializer, }; const listByResourceGroupNextOperationSpec: coreClient.OperationSpec = { path: "{nextLink}", httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.WorkspaceList + bodyMapper: Mappers.WorkspaceList, }, default: { - bodyMapper: Mappers.ErrorResponse - } + bodyMapper: Mappers.ErrorResponse, + }, }, urlParameters: [ Parameters.$host, Parameters.subscriptionId, Parameters.resourceGroupName, - Parameters.nextLink + Parameters.nextLink, ], headerParameters: [Parameters.accept], - serializer + serializer, }; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/binaryHardening.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/binaryHardening.ts new file mode 100644 index 000000000000..a7f59ecb0afc --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/binaryHardening.ts @@ -0,0 +1,31 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { + BinaryHardeningResource, + BinaryHardeningListByFirmwareOptionalParams, +} from "../models"; + +/// +/** Interface representing a BinaryHardening. */ +export interface BinaryHardening { + /** + * Lists binary hardening analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: BinaryHardeningListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cryptoCertificates.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cryptoCertificates.ts new file mode 100644 index 000000000000..fc370a4db478 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cryptoCertificates.ts @@ -0,0 +1,31 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { + CryptoCertificateResource, + CryptoCertificatesListByFirmwareOptionalParams, +} from "../models"; + +/// +/** Interface representing a CryptoCertificates. */ +export interface CryptoCertificates { + /** + * Lists cryptographic certificate analysis results found in a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoCertificatesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cryptoKeys.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cryptoKeys.ts new file mode 100644 index 000000000000..1e56a7452f80 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cryptoKeys.ts @@ -0,0 +1,31 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { + CryptoKeyResource, + CryptoKeysListByFirmwareOptionalParams, +} from "../models"; + +/// +/** Interface representing a CryptoKeys. */ +export interface CryptoKeys { + /** + * Lists cryptographic key analysis results found in a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CryptoKeysListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cves.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cves.ts new file mode 100644 index 000000000000..e968a9dd8172 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/cves.ts @@ -0,0 +1,28 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { CveResource, CvesListByFirmwareOptionalParams } from "../models"; + +/// +/** Interface representing a Cves. */ +export interface Cves { + /** + * Lists CVE analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: CvesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/firmwareOperations.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/firmwareOperations.ts deleted file mode 100644 index 256b7bdf7b24..000000000000 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/firmwareOperations.ts +++ /dev/null @@ -1,320 +0,0 @@ -/* - * Copyright (c) Microsoft Corporation. - * Licensed under the MIT License. - * - * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is regenerated. - */ - -import { PagedAsyncIterableIterator } from "@azure/core-paging"; -import { - Firmware, - FirmwareListByWorkspaceOptionalParams, - Component, - FirmwareListGenerateComponentListOptionalParams, - BinaryHardening, - FirmwareListGenerateBinaryHardeningListOptionalParams, - PasswordHash, - FirmwareListGeneratePasswordHashListOptionalParams, - Cve, - FirmwareListGenerateCveListOptionalParams, - CryptoCertificate, - FirmwareListGenerateCryptoCertificateListOptionalParams, - CryptoKey, - FirmwareListGenerateCryptoKeyListOptionalParams, - FirmwareCreateOptionalParams, - FirmwareCreateResponse, - FirmwareUpdateDefinition, - FirmwareUpdateOptionalParams, - FirmwareUpdateResponse, - FirmwareDeleteOptionalParams, - FirmwareGetOptionalParams, - FirmwareGetResponse, - FirmwareGenerateDownloadUrlOptionalParams, - FirmwareGenerateDownloadUrlResponse, - FirmwareGenerateFilesystemDownloadUrlOptionalParams, - FirmwareGenerateFilesystemDownloadUrlResponse, - FirmwareGenerateSummaryOptionalParams, - FirmwareGenerateSummaryResponse, - FirmwareGenerateComponentDetailsOptionalParams, - FirmwareGenerateComponentDetailsResponse, - FirmwareGenerateBinaryHardeningSummaryOptionalParams, - FirmwareGenerateBinaryHardeningSummaryResponse, - FirmwareGenerateBinaryHardeningDetailsOptionalParams, - FirmwareGenerateBinaryHardeningDetailsResponse, - FirmwareGenerateCveSummaryOptionalParams, - FirmwareGenerateCveSummaryResponse, - FirmwareGenerateCryptoCertificateSummaryOptionalParams, - FirmwareGenerateCryptoCertificateSummaryResponse, - FirmwareGenerateCryptoKeySummaryOptionalParams, - FirmwareGenerateCryptoKeySummaryResponse -} from "../models"; - -/// -/** Interface representing a FirmwareOperations. */ -export interface FirmwareOperations { - /** - * Lists all of firmwares inside a workspace. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param options The options parameters. - */ - listByWorkspace( - resourceGroupName: string, - workspaceName: string, - options?: FirmwareListByWorkspaceOptionalParams - ): PagedAsyncIterableIterator; - /** - * The operation to list all components result for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - listGenerateComponentList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateComponentListOptionalParams - ): PagedAsyncIterableIterator; - /** - * The operation to list all binary hardening result for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - listGenerateBinaryHardeningList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateBinaryHardeningListOptionalParams - ): PagedAsyncIterableIterator; - /** - * The operation to list all password hashes for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - listGeneratePasswordHashList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGeneratePasswordHashListOptionalParams - ): PagedAsyncIterableIterator; - /** - * The operation to list all cve results for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - listGenerateCveList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCveListOptionalParams - ): PagedAsyncIterableIterator; - /** - * The operation to list all crypto certificates for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - listGenerateCryptoCertificateList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoCertificateListOptionalParams - ): PagedAsyncIterableIterator; - /** - * The operation to list all crypto keys for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - listGenerateCryptoKeyList( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareListGenerateCryptoKeyListOptionalParams - ): PagedAsyncIterableIterator; - /** - * The operation to create a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param firmware Details of the firmware being created or updated. - * @param options The options parameters. - */ - create( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - firmware: Firmware, - options?: FirmwareCreateOptionalParams - ): Promise; - /** - * The operation to update firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param firmware Details of the firmware being created or updated. - * @param options The options parameters. - */ - update( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - firmware: FirmwareUpdateDefinition, - options?: FirmwareUpdateOptionalParams - ): Promise; - /** - * The operation to delete a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - delete( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareDeleteOptionalParams - ): Promise; - /** - * Get firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - get( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGetOptionalParams - ): Promise; - /** - * The operation to a url for file download. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateDownloadUrl( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateDownloadUrlOptionalParams - ): Promise; - /** - * The operation to a url for tar file download. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateFilesystemDownloadUrl( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateFilesystemDownloadUrlOptionalParams - ): Promise; - /** - * The operation to get a scan summary. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateSummaryOptionalParams - ): Promise; - /** - * The operation to get component details for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateComponentDetails( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateComponentDetailsOptionalParams - ): Promise; - /** - * The operation to list the binary hardening summary percentages for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateBinaryHardeningSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateBinaryHardeningSummaryOptionalParams - ): Promise; - /** - * The operation to get binary hardening details for a firmware. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateBinaryHardeningDetails( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateBinaryHardeningDetailsOptionalParams - ): Promise; - /** - * The operation to provide a high level summary of the CVEs reported for the firmware image. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateCveSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateCveSummaryOptionalParams - ): Promise; - /** - * The operation to provide a high level summary of the discovered cryptographic certificates reported - * for the firmware image. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateCryptoCertificateSummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateCryptoCertificateSummaryOptionalParams - ): Promise; - /** - * The operation to provide a high level summary of the discovered cryptographic keys reported for the - * firmware image. - * @param resourceGroupName The name of the resource group. The name is case insensitive. - * @param workspaceName The name of the firmware analysis workspace. - * @param firmwareId The id of the firmware. - * @param options The options parameters. - */ - generateCryptoKeySummary( - resourceGroupName: string, - workspaceName: string, - firmwareId: string, - options?: FirmwareGenerateCryptoKeySummaryOptionalParams - ): Promise; -} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/firmwares.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/firmwares.ts new file mode 100644 index 000000000000..63f5c71f75f1 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/firmwares.ts @@ -0,0 +1,123 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { + Firmware, + FirmwaresListByWorkspaceOptionalParams, + FirmwaresCreateOptionalParams, + FirmwaresCreateResponse, + FirmwareUpdateDefinition, + FirmwaresUpdateOptionalParams, + FirmwaresUpdateResponse, + FirmwaresDeleteOptionalParams, + FirmwaresGetOptionalParams, + FirmwaresGetResponse, + FirmwaresGenerateDownloadUrlOptionalParams, + FirmwaresGenerateDownloadUrlResponse, + FirmwaresGenerateFilesystemDownloadUrlOptionalParams, + FirmwaresGenerateFilesystemDownloadUrlResponse, +} from "../models"; + +/// +/** Interface representing a Firmwares. */ +export interface Firmwares { + /** + * Lists all of firmwares inside a workspace. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param options The options parameters. + */ + listByWorkspace( + resourceGroupName: string, + workspaceName: string, + options?: FirmwaresListByWorkspaceOptionalParams, + ): PagedAsyncIterableIterator; + /** + * The operation to create a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param firmware Details of the firmware being created or updated. + * @param options The options parameters. + */ + create( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + firmware: Firmware, + options?: FirmwaresCreateOptionalParams, + ): Promise; + /** + * The operation to update firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param firmware Details of the firmware being created or updated. + * @param options The options parameters. + */ + update( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + firmware: FirmwareUpdateDefinition, + options?: FirmwaresUpdateOptionalParams, + ): Promise; + /** + * The operation to delete a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + delete( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresDeleteOptionalParams, + ): Promise; + /** + * Get firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + get( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresGetOptionalParams, + ): Promise; + /** + * The operation to a url for file download. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + generateDownloadUrl( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresGenerateDownloadUrlOptionalParams, + ): Promise; + /** + * The operation to a url for tar file download. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + generateFilesystemDownloadUrl( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: FirmwaresGenerateFilesystemDownloadUrlOptionalParams, + ): Promise; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/index.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/index.ts index e435c0528d6c..e920abdccbeb 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/index.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/index.ts @@ -6,6 +6,13 @@ * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ -export * from "./firmwareOperations"; -export * from "./workspaces"; +export * from "./binaryHardening"; +export * from "./cryptoCertificates"; +export * from "./cryptoKeys"; +export * from "./cves"; +export * from "./firmwares"; export * from "./operations"; +export * from "./passwordHashes"; +export * from "./sbomComponents"; +export * from "./summaries"; +export * from "./workspaces"; diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/operations.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/operations.ts index fc1266988ba8..24de1617dfb7 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/operations.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/operations.ts @@ -17,6 +17,6 @@ export interface Operations { * @param options The options parameters. */ list( - options?: OperationsListOptionalParams + options?: OperationsListOptionalParams, ): PagedAsyncIterableIterator; } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/passwordHashes.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/passwordHashes.ts new file mode 100644 index 000000000000..742132300ba3 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/passwordHashes.ts @@ -0,0 +1,31 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { + PasswordHashResource, + PasswordHashesListByFirmwareOptionalParams, +} from "../models"; + +/// +/** Interface representing a PasswordHashes. */ +export interface PasswordHashes { + /** + * Lists password hash analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: PasswordHashesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/sbomComponents.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/sbomComponents.ts new file mode 100644 index 000000000000..7ff19c07c3af --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/sbomComponents.ts @@ -0,0 +1,31 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { + SbomComponentResource, + SbomComponentsListByFirmwareOptionalParams, +} from "../models"; + +/// +/** Interface representing a SbomComponents. */ +export interface SbomComponents { + /** + * Lists SBOM analysis results of a firmware. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SbomComponentsListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/summaries.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/summaries.ts new file mode 100644 index 000000000000..87351872b734 --- /dev/null +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/summaries.ts @@ -0,0 +1,50 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +import { PagedAsyncIterableIterator } from "@azure/core-paging"; +import { + SummaryResource, + SummariesListByFirmwareOptionalParams, + SummaryName, + SummariesGetOptionalParams, + SummariesGetResponse, +} from "../models"; + +/// +/** Interface representing a Summaries. */ +export interface Summaries { + /** + * Lists analysis result summary names of a firmware. To fetch the full summary data, get that summary + * by name. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param options The options parameters. + */ + listByFirmware( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + options?: SummariesListByFirmwareOptionalParams, + ): PagedAsyncIterableIterator; + /** + * Get an analysis result summary of a firmware by name. + * @param resourceGroupName The name of the resource group. The name is case insensitive. + * @param workspaceName The name of the firmware analysis workspace. + * @param firmwareId The id of the firmware. + * @param summaryName The Firmware analysis summary name describing the type of summary. + * @param options The options parameters. + */ + get( + resourceGroupName: string, + workspaceName: string, + firmwareId: string, + summaryName: SummaryName, + options?: SummariesGetOptionalParams, + ): Promise; +} diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/workspaces.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/workspaces.ts index 198ea6736488..a0674ea567e9 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/workspaces.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/operationsInterfaces/workspaces.ts @@ -21,7 +21,7 @@ import { WorkspacesGetResponse, GenerateUploadUrlRequest, WorkspacesGenerateUploadUrlOptionalParams, - WorkspacesGenerateUploadUrlResponse + WorkspacesGenerateUploadUrlResponse, } from "../models"; /// @@ -32,7 +32,7 @@ export interface Workspaces { * @param options The options parameters. */ listBySubscription( - options?: WorkspacesListBySubscriptionOptionalParams + options?: WorkspacesListBySubscriptionOptionalParams, ): PagedAsyncIterableIterator; /** * Lists all of the firmware analysis workspaces in the specified resource group. @@ -41,7 +41,7 @@ export interface Workspaces { */ listByResourceGroup( resourceGroupName: string, - options?: WorkspacesListByResourceGroupOptionalParams + options?: WorkspacesListByResourceGroupOptionalParams, ): PagedAsyncIterableIterator; /** * The operation to create or update a firmware analysis workspace. @@ -54,7 +54,7 @@ export interface Workspaces { resourceGroupName: string, workspaceName: string, workspace: Workspace, - options?: WorkspacesCreateOptionalParams + options?: WorkspacesCreateOptionalParams, ): Promise; /** * The operation to update a firmware analysis workspaces. @@ -67,7 +67,7 @@ export interface Workspaces { resourceGroupName: string, workspaceName: string, workspace: WorkspaceUpdateDefinition, - options?: WorkspacesUpdateOptionalParams + options?: WorkspacesUpdateOptionalParams, ): Promise; /** * The operation to delete a firmware analysis workspace. @@ -78,7 +78,7 @@ export interface Workspaces { delete( resourceGroupName: string, workspaceName: string, - options?: WorkspacesDeleteOptionalParams + options?: WorkspacesDeleteOptionalParams, ): Promise; /** * Get firmware analysis workspace. @@ -89,7 +89,7 @@ export interface Workspaces { get( resourceGroupName: string, workspaceName: string, - options?: WorkspacesGetOptionalParams + options?: WorkspacesGetOptionalParams, ): Promise; /** * The operation to get a url for file upload. @@ -102,6 +102,6 @@ export interface Workspaces { resourceGroupName: string, workspaceName: string, generateUploadUrl: GenerateUploadUrlRequest, - options?: WorkspacesGenerateUploadUrlOptionalParams + options?: WorkspacesGenerateUploadUrlOptionalParams, ): Promise; } diff --git a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/pagingHelper.ts b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/pagingHelper.ts index 269a2b9814b5..205cccc26592 100644 --- a/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/pagingHelper.ts +++ b/sdk/iotfirmwaredefense/arm-iotfirmwaredefense/src/pagingHelper.ts @@ -28,7 +28,7 @@ export function getContinuationToken(page: unknown): string | undefined { export function setContinuationToken( page: unknown, - continuationToken: string | undefined + continuationToken: string | undefined, ): void { if (typeof page !== "object" || page === null || !continuationToken) { return;