Class: Azure::Security::Mgmt::V2020_01_01::ServerVulnerabilityAssessmentOperations
- Inherits:
-
Object
- Object
- Azure::Security::Mgmt::V2020_01_01::ServerVulnerabilityAssessmentOperations
- Includes:
- MsRestAzure
- Defined in:
- lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb
Overview
API spec for Microsoft.Security (Azure Security Center) resource provider
Instance Attribute Summary collapse
-
#client ⇒ SecurityCenter
readonly
Reference to the SecurityCenter.
Instance Method Summary collapse
-
#create_or_update(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ ServerVulnerabilityAssessment
Creating a server vulnerability assessment on a resource, which will onboard a resource for having a vulnerability assessment on it.
-
#create_or_update_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Creating a server vulnerability assessment on a resource, which will onboard a resource for having a vulnerability assessment on it.
-
#create_or_update_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Creating a server vulnerability assessment on a resource, which will onboard a resource for having a vulnerability assessment on it.
-
#delete(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Object
Removing server vulnerability assessment from a resource.
-
#delete_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Removing server vulnerability assessment from a resource.
-
#delete_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Removing server vulnerability assessment from a resource.
-
#get(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ ServerVulnerabilityAssessment
Gets a server vulnerability assessment onboarding statuses on a given resource.
-
#get_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Gets a server vulnerability assessment onboarding statuses on a given resource.
-
#get_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Gets a server vulnerability assessment onboarding statuses on a given resource.
-
#initialize(client) ⇒ ServerVulnerabilityAssessmentOperations
constructor
Creates and initializes a new instance of the ServerVulnerabilityAssessmentOperations class.
-
#list_by_extended_resource(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ ServerVulnerabilityAssessmentsList
Gets a list of server vulnerability assessment onboarding statuses on a given resource.
-
#list_by_extended_resource_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Gets a list of server vulnerability assessment onboarding statuses on a given resource.
-
#list_by_extended_resource_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Gets a list of server vulnerability assessment onboarding statuses on a given resource.
Constructor Details
#initialize(client) ⇒ ServerVulnerabilityAssessmentOperations
Creates and initializes a new instance of the ServerVulnerabilityAssessmentOperations class.
17 18 19 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 17 def initialize(client) @client = client end |
Instance Attribute Details
#client ⇒ SecurityCenter (readonly)
Returns reference to the SecurityCenter.
22 23 24 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 22 def client @client end |
Instance Method Details
#create_or_update(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ ServerVulnerabilityAssessment
Creating a server vulnerability assessment on a resource, which will onboard a resource for having a vulnerability assessment on it
user’s subscription. The name is case insensitive. will be added to the HTTP request.
263 264 265 266 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 263 def create_or_update(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) response = create_or_update_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! response.body unless response.nil? end |
#create_or_update_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Creating a server vulnerability assessment on a resource, which will onboard a resource for having a vulnerability assessment on it
user’s subscription. The name is case insensitive. to the HTTP request.
300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 300 def create_or_update_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'Pattern': '^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$'" if !@client.subscription_id.nil? && @client.subscription_id.match(Regexp.new('^^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$$')).nil? fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'resource_namespace is nil' if resource_namespace.nil? fail ArgumentError, 'resource_type is nil' if resource_type.nil? fail ArgumentError, 'resource_name is nil' if resource_name.nil? server_vulnerability_assessment = 'default' fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceNamespace}/{resourceType}/{resourceName}/providers/Microsoft.Security/serverVulnerabilityAssessments/{serverVulnerabilityAssessment}' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'resourceNamespace' => resource_namespace,'resourceType' => resource_type,'resourceName' => resource_name,'serverVulnerabilityAssessment' => server_vulnerability_assessment}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:put, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 202 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? # Deserialize Response if status_code == 202 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Security::Mgmt::V2020_01_01::Models::ServerVulnerabilityAssessment.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end result end promise.execute end |
#create_or_update_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Creating a server vulnerability assessment on a resource, which will onboard a resource for having a vulnerability assessment on it
user’s subscription. The name is case insensitive. will be added to the HTTP request.
282 283 284 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 282 def create_or_update_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) create_or_update_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! end |
#delete(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Object
Removing server vulnerability assessment from a resource.
user’s subscription. The name is case insensitive. will be added to the HTTP request.
374 375 376 377 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 374 def delete(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) response = delete_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! nil end |
#delete_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Removing server vulnerability assessment from a resource.
user’s subscription. The name is case insensitive. to the HTTP request.
409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 409 def delete_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'Pattern': '^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$'" if !@client.subscription_id.nil? && @client.subscription_id.match(Regexp.new('^^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$$')).nil? fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'resource_namespace is nil' if resource_namespace.nil? fail ArgumentError, 'resource_type is nil' if resource_type.nil? fail ArgumentError, 'resource_name is nil' if resource_name.nil? server_vulnerability_assessment = 'default' fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceNamespace}/{resourceType}/{resourceName}/providers/Microsoft.Security/serverVulnerabilityAssessments/{serverVulnerabilityAssessment}' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'resourceNamespace' => resource_namespace,'resourceType' => resource_type,'resourceName' => resource_name,'serverVulnerabilityAssessment' => server_vulnerability_assessment}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:delete, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 || status_code == 204 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? result end promise.execute end |
#delete_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Removing server vulnerability assessment from a resource.
user’s subscription. The name is case insensitive. will be added to the HTTP request.
392 393 394 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 392 def delete_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) delete_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! end |
#get(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ ServerVulnerabilityAssessment
Gets a server vulnerability assessment onboarding statuses on a given resource.
user’s subscription. The name is case insensitive. will be added to the HTTP request.
150 151 152 153 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 150 def get(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) response = get_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! response.body unless response.nil? end |
#get_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Gets a server vulnerability assessment onboarding statuses on a given resource.
user’s subscription. The name is case insensitive. to the HTTP request.
187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 187 def get_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'Pattern': '^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$'" if !@client.subscription_id.nil? && @client.subscription_id.match(Regexp.new('^^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$$')).nil? fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'resource_namespace is nil' if resource_namespace.nil? fail ArgumentError, 'resource_type is nil' if resource_type.nil? fail ArgumentError, 'resource_name is nil' if resource_name.nil? server_vulnerability_assessment = 'default' fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceNamespace}/{resourceType}/{resourceName}/providers/Microsoft.Security/serverVulnerabilityAssessments/{serverVulnerabilityAssessment}' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'resourceNamespace' => resource_namespace,'resourceType' => resource_type,'resourceName' => resource_name,'serverVulnerabilityAssessment' => server_vulnerability_assessment}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:get, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? # Deserialize Response if status_code == 200 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Security::Mgmt::V2020_01_01::Models::ServerVulnerabilityAssessment.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end result end promise.execute end |
#get_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Gets a server vulnerability assessment onboarding statuses on a given resource.
user’s subscription. The name is case insensitive. will be added to the HTTP request.
169 170 171 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 169 def get_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) get_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! end |
#list_by_extended_resource(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ ServerVulnerabilityAssessmentsList
Gets a list of server vulnerability assessment onboarding statuses on a given resource.
user’s subscription. The name is case insensitive. will be added to the HTTP request.
38 39 40 41 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 38 def list_by_extended_resource(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) response = list_by_extended_resource_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! response.body unless response.nil? end |
#list_by_extended_resource_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ Concurrent::Promise
Gets a list of server vulnerability assessment onboarding statuses on a given resource.
user’s subscription. The name is case insensitive. to the HTTP request.
75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 75 def list_by_extended_resource_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'Pattern': '^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$'" if !@client.subscription_id.nil? && @client.subscription_id.match(Regexp.new('^^[0-9A-Fa-f]{8}-([0-9A-Fa-f]{4}-){3}[0-9A-Fa-f]{12}$$')).nil? fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'resource_namespace is nil' if resource_namespace.nil? fail ArgumentError, 'resource_type is nil' if resource_type.nil? fail ArgumentError, 'resource_name is nil' if resource_name.nil? fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceNamespace}/{resourceType}/{resourceName}/providers/Microsoft.Security/serverVulnerabilityAssessments' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'resourceNamespace' => resource_namespace,'resourceType' => resource_type,'resourceName' => resource_name}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:get, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? # Deserialize Response if status_code == 200 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Security::Mgmt::V2020_01_01::Models::ServerVulnerabilityAssessmentsList.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end result end promise.execute end |
#list_by_extended_resource_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Gets a list of server vulnerability assessment onboarding statuses on a given resource.
user’s subscription. The name is case insensitive. will be added to the HTTP request.
57 58 59 |
# File 'lib/2020-01-01/generated/azure_mgmt_security/server_vulnerability_assessment_operations.rb', line 57 def list_by_extended_resource_with_http_info(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:nil) list_by_extended_resource_async(resource_group_name, resource_namespace, resource_type, resource_name, custom_headers:custom_headers).value! end |