Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions sdk/iotfirmwaredefense/azure-mgmt-iotfirmwaredefense/_meta.json
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{
"commit": "90fc96af52257944371b95428245bce0f218c7f5",
"commit": "3438616bd8b5c1ba62246310b9fc77c19bc313b8",
"repository_url": "https://github.com/Azure/azure-rest-api-specs",
"autorest": "3.9.7",
"autorest": "3.10.2",
"use": [
"@autorest/python@6.7.1",
"@autorest/modelerfour@4.26.2"
"@autorest/python@6.27.4",
"@autorest/modelerfour@4.27.0"
],
"autorest_command": "autorest specification/fist/resource-manager/readme.md --generate-sample=True --include-x-ms-examples-original-file=True --python --python-sdks-folder=/home/vsts/work/1/azure-sdk-for-python/sdk --use=@autorest/python@6.7.1 --use=@autorest/modelerfour@4.26.2 --version=3.9.7 --version-tolerant=False",
"autorest_command": "autorest specification/fist/resource-manager/readme.md --generate-sample=True --generate-test=True --include-x-ms-examples-original-file=True --python --python-sdks-folder=/mnt/vss/_work/1/s/azure-sdk-for-python/sdk --use=@autorest/python@6.27.4 --use=@autorest/modelerfour@4.27.0 --version=3.10.2 --version-tolerant=False",
"readme": "specification/fist/resource-manager/readme.md"
}
Original file line number Diff line number Diff line change
Expand Up @@ -5,22 +5,28 @@
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------
# pylint: disable=wrong-import-position

from ._io_tfirmware_defense_mgmt_client import IoTFirmwareDefenseMgmtClient
from typing import TYPE_CHECKING

if TYPE_CHECKING:
from ._patch import * # pylint: disable=unused-wildcard-import

from ._io_tfirmware_defense_mgmt_client import IoTFirmwareDefenseMgmtClient # type: ignore
from ._version import VERSION

__version__ = VERSION

try:
from ._patch import __all__ as _patch_all
from ._patch import * # pylint: disable=unused-wildcard-import
from ._patch import *
except ImportError:
_patch_all = []
from ._patch import patch_sdk as _patch_sdk

__all__ = [
"IoTFirmwareDefenseMgmtClient",
]
__all__.extend([p for p in _patch_all if p not in __all__])
__all__.extend([p for p in _patch_all if p not in __all__]) # pyright: ignore

_patch_sdk()
Original file line number Diff line number Diff line change
Expand Up @@ -8,18 +8,16 @@

from typing import Any, TYPE_CHECKING

from azure.core.configuration import Configuration
from azure.core.pipeline import policies
from azure.mgmt.core.policies import ARMChallengeAuthenticationPolicy, ARMHttpLoggingPolicy

from ._version import VERSION

if TYPE_CHECKING:
# pylint: disable=unused-import,ungrouped-imports
from azure.core.credentials import TokenCredential


class IoTFirmwareDefenseMgmtClientConfiguration(Configuration): # pylint: disable=too-many-instance-attributes
class IoTFirmwareDefenseMgmtClientConfiguration: # pylint: disable=too-many-instance-attributes,name-too-long
"""Configuration for IoTFirmwareDefenseMgmtClient.

Note that all parameters used to create this instance are saved as instance
Expand All @@ -29,14 +27,13 @@ class IoTFirmwareDefenseMgmtClientConfiguration(Configuration): # pylint: disab
:type credential: ~azure.core.credentials.TokenCredential
:param subscription_id: The ID of the target subscription. The value must be an UUID. Required.
:type subscription_id: str
:keyword api_version: Api Version. Default value is "2024-01-10". Note that overriding this
default value may result in unsupported behavior.
:keyword api_version: Api Version. Default value is "2025-04-01-preview". Note that overriding
this default value may result in unsupported behavior.
:paramtype api_version: str
"""

def __init__(self, credential: "TokenCredential", subscription_id: str, **kwargs: Any) -> None:
super(IoTFirmwareDefenseMgmtClientConfiguration, self).__init__(**kwargs)
api_version: str = kwargs.pop("api_version", "2024-01-10")
api_version: str = kwargs.pop("api_version", "2025-04-01-preview")

if credential is None:
raise ValueError("Parameter 'credential' must not be None.")
Expand All @@ -48,6 +45,7 @@ def __init__(self, credential: "TokenCredential", subscription_id: str, **kwargs
self.api_version = api_version
self.credential_scopes = kwargs.pop("credential_scopes", ["https://management.azure.com/.default"])
kwargs.setdefault("sdk_moniker", "mgmt-iotfirmwaredefense/{}".format(VERSION))
self.polling_interval = kwargs.get("polling_interval", 30)
self._configure(**kwargs)

def _configure(self, **kwargs: Any) -> None:
Expand All @@ -56,9 +54,9 @@ def _configure(self, **kwargs: Any) -> None:
self.proxy_policy = kwargs.get("proxy_policy") or policies.ProxyPolicy(**kwargs)
self.logging_policy = kwargs.get("logging_policy") or policies.NetworkTraceLoggingPolicy(**kwargs)
self.http_logging_policy = kwargs.get("http_logging_policy") or ARMHttpLoggingPolicy(**kwargs)
self.retry_policy = kwargs.get("retry_policy") or policies.RetryPolicy(**kwargs)
self.custom_hook_policy = kwargs.get("custom_hook_policy") or policies.CustomHookPolicy(**kwargs)
self.redirect_policy = kwargs.get("redirect_policy") or policies.RedirectPolicy(**kwargs)
self.retry_policy = kwargs.get("retry_policy") or policies.RetryPolicy(**kwargs)
self.authentication_policy = kwargs.get("authentication_policy")
if self.credential and not self.authentication_policy:
self.authentication_policy = ARMChallengeAuthenticationPolicy(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,12 @@

from copy import deepcopy
from typing import Any, TYPE_CHECKING
from typing_extensions import Self

from azure.core.pipeline import policies
from azure.core.rest import HttpRequest, HttpResponse
from azure.mgmt.core import ARMPipelineClient
from azure.mgmt.core.policies import ARMAutoResourceProviderRegistrationPolicy

from . import models as _models
from ._configuration import IoTFirmwareDefenseMgmtClientConfiguration
Expand All @@ -25,46 +28,48 @@
PasswordHashesOperations,
SbomComponentsOperations,
SummariesOperations,
UsageMetricsOperations,
WorkspacesOperations,
)

if TYPE_CHECKING:
# pylint: disable=unused-import,ungrouped-imports
from azure.core.credentials import TokenCredential


class IoTFirmwareDefenseMgmtClient: # pylint: disable=client-accepts-api-version-keyword,too-many-instance-attributes
class IoTFirmwareDefenseMgmtClient: # pylint: disable=too-many-instance-attributes
"""Firmware & IoT Security REST API.

:ivar operations: Operations operations
:vartype operations: azure.mgmt.iotfirmwaredefense.operations.Operations
:ivar workspaces: WorkspacesOperations operations
:vartype workspaces: azure.mgmt.iotfirmwaredefense.operations.WorkspacesOperations
:ivar firmwares: FirmwaresOperations operations
:vartype firmwares: azure.mgmt.iotfirmwaredefense.operations.FirmwaresOperations
:ivar binary_hardening: BinaryHardeningOperations operations
:vartype binary_hardening: azure.mgmt.iotfirmwaredefense.operations.BinaryHardeningOperations
:ivar cves: CvesOperations operations
:vartype cves: azure.mgmt.iotfirmwaredefense.operations.CvesOperations
:ivar crypto_certificates: CryptoCertificatesOperations operations
:vartype crypto_certificates:
azure.mgmt.iotfirmwaredefense.operations.CryptoCertificatesOperations
:ivar crypto_keys: CryptoKeysOperations operations
:vartype crypto_keys: azure.mgmt.iotfirmwaredefense.operations.CryptoKeysOperations
:ivar cves: CvesOperations operations
:vartype cves: azure.mgmt.iotfirmwaredefense.operations.CvesOperations
:ivar firmwares: FirmwaresOperations operations
:vartype firmwares: azure.mgmt.iotfirmwaredefense.operations.FirmwaresOperations
:ivar operations: Operations operations
:vartype operations: azure.mgmt.iotfirmwaredefense.operations.Operations
:ivar password_hashes: PasswordHashesOperations operations
:vartype password_hashes: azure.mgmt.iotfirmwaredefense.operations.PasswordHashesOperations
:ivar sbom_components: SbomComponentsOperations operations
:vartype sbom_components: azure.mgmt.iotfirmwaredefense.operations.SbomComponentsOperations
:ivar summaries: SummariesOperations operations
:vartype summaries: azure.mgmt.iotfirmwaredefense.operations.SummariesOperations
:ivar workspaces: WorkspacesOperations operations
:vartype workspaces: azure.mgmt.iotfirmwaredefense.operations.WorkspacesOperations
:ivar usage_metrics: UsageMetricsOperations operations
:vartype usage_metrics: azure.mgmt.iotfirmwaredefense.operations.UsageMetricsOperations
:param credential: Credential needed for the client to connect to Azure. Required.
:type credential: ~azure.core.credentials.TokenCredential
:param subscription_id: The ID of the target subscription. The value must be an UUID. Required.
:type subscription_id: str
:param base_url: Service URL. Default value is "https://management.azure.com".
:type base_url: str
:keyword api_version: Api Version. Default value is "2024-01-10". Note that overriding this
default value may result in unsupported behavior.
:keyword api_version: Api Version. Default value is "2025-04-01-preview". Note that overriding
this default value may result in unsupported behavior.
:paramtype api_version: str
"""

Expand All @@ -78,28 +83,47 @@ def __init__(
self._config = IoTFirmwareDefenseMgmtClientConfiguration(
credential=credential, subscription_id=subscription_id, **kwargs
)
self._client: ARMPipelineClient = ARMPipelineClient(base_url=base_url, config=self._config, **kwargs)
_policies = kwargs.pop("policies", None)
if _policies is None:
_policies = [
policies.RequestIdPolicy(**kwargs),
self._config.headers_policy,
self._config.user_agent_policy,
self._config.proxy_policy,
policies.ContentDecodePolicy(**kwargs),
ARMAutoResourceProviderRegistrationPolicy(),
self._config.redirect_policy,
self._config.retry_policy,
self._config.authentication_policy,
self._config.custom_hook_policy,
self._config.logging_policy,
policies.DistributedTracingPolicy(**kwargs),
policies.SensitiveHeaderCleanupPolicy(**kwargs) if self._config.redirect_policy else None,
self._config.http_logging_policy,
]
self._client: ARMPipelineClient = ARMPipelineClient(base_url=base_url, policies=_policies, **kwargs)

client_models = {k: v for k, v in _models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._deserialize = Deserializer(client_models)
self._serialize.client_side_validation = False
self.operations = Operations(self._client, self._config, self._serialize, self._deserialize)
self.workspaces = WorkspacesOperations(self._client, self._config, self._serialize, self._deserialize)
self.firmwares = FirmwaresOperations(self._client, self._config, self._serialize, self._deserialize)
self.binary_hardening = BinaryHardeningOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.cves = CvesOperations(self._client, self._config, self._serialize, self._deserialize)
self.crypto_certificates = CryptoCertificatesOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.crypto_keys = CryptoKeysOperations(self._client, self._config, self._serialize, self._deserialize)
self.cves = CvesOperations(self._client, self._config, self._serialize, self._deserialize)
self.firmwares = FirmwaresOperations(self._client, self._config, self._serialize, self._deserialize)
self.operations = Operations(self._client, self._config, self._serialize, self._deserialize)
self.password_hashes = PasswordHashesOperations(self._client, self._config, self._serialize, self._deserialize)
self.sbom_components = SbomComponentsOperations(self._client, self._config, self._serialize, self._deserialize)
self.summaries = SummariesOperations(self._client, self._config, self._serialize, self._deserialize)
self.workspaces = WorkspacesOperations(self._client, self._config, self._serialize, self._deserialize)
self.usage_metrics = UsageMetricsOperations(self._client, self._config, self._serialize, self._deserialize)

def _send_request(self, request: HttpRequest, **kwargs: Any) -> HttpResponse:
def _send_request(self, request: HttpRequest, *, stream: bool = False, **kwargs: Any) -> HttpResponse:
"""Runs the network request through the client's chained policies.

>>> from azure.core.rest import HttpRequest
Expand All @@ -119,12 +143,12 @@ def _send_request(self, request: HttpRequest, **kwargs: Any) -> HttpResponse:

request_copy = deepcopy(request)
request_copy.url = self._client.format_url(request_copy.url)
return self._client.send_request(request_copy, **kwargs)
return self._client.send_request(request_copy, stream=stream, **kwargs) # type: ignore

def close(self) -> None:
self._client.close()

def __enter__(self) -> "IoTFirmwareDefenseMgmtClient":
def __enter__(self) -> Self:
self._client.__enter__()
return self

Expand Down
Loading