azure-sdk-for-js/sdk/locks/arm-locks
Jeremy Meng a28e8f0795 [EngSys] move to vendored version of cross-env via dev-tool
***NO_CI***

- apply the transformation

- update samples' README
2024-11-02 00:48:06 +00:00
..
review Recording refresh9 (#23959) 2022-11-28 14:40:04 +08:00
samples/v2 [EngSys] move to vendored version of cross-env via dev-tool 2024-11-02 00:48:06 +00:00
samples-dev
src Post release automated changes for locks releases (#24013) 2022-12-05 04:58:33 +00:00
test [mgmt] add Sanitized rule and update changelog template to fix ci fai… (#30226) 2024-09-06 17:10:40 +08:00
CHANGELOG.md [mgmt] add Sanitized rule and update changelog template to fix ci fai… (#30226) 2024-09-06 17:10:40 +08:00
LICENSE
README.md
_meta.json Recording refresh9 (#23959) 2022-11-28 14:40:04 +08:00
api-extractor.json
assets.json migrate sdk recording files 2 (#25670) 2023-04-28 15:50:56 +08:00
package.json [EngSys] move to vendored version of cross-env via dev-tool 2024-11-02 00:48:06 +00:00
sample.env
tsconfig.json Recording refresh9 (#23959) 2022-11-28 14:40:04 +08:00

README.md

Azure ManagementLock client library for JavaScript

This package contains an isomorphic SDK (runs both in Node.js and in browsers) for Azure ManagementLock client.

Azure resources can be locked to prevent other users in your organization from deleting or modifying resources.

Source code | Package (NPM) | API reference documentation | Samples

Getting started

Currently supported environments

See our support policy for more details.

Prerequisites

Install the @azure/arm-locks package

Install the Azure ManagementLock client library for JavaScript with npm:

npm install @azure/arm-locks

Create and authenticate a ManagementLockClient

To create a client object to access the Azure ManagementLock API, you will need the endpoint of your Azure ManagementLock resource and a credential. The Azure ManagementLock client can use Azure Active Directory credentials to authenticate. You can find the endpoint for your Azure ManagementLock resource in the Azure Portal.

You can authenticate with Azure Active Directory using a credential from the @azure/identity library or an existing AAD Token.

To use the DefaultAzureCredential provider shown below, or other credential providers provided with the Azure SDK, please install the @azure/identity package:

npm install @azure/identity

You will also need to register a new AAD application and grant access to Azure ManagementLock by assigning the suitable role to your service principal (note: roles such as "Owner" will not grant the necessary permissions). Set the values of the client ID, tenant ID, and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET.

For more information about how to create an Azure AD Application check out this guide.

const { ManagementLockClient } = require("@azure/arm-locks");
const { DefaultAzureCredential } = require("@azure/identity");
// For client-side applications running in the browser, use InteractiveBrowserCredential instead of DefaultAzureCredential. See https://aka.ms/azsdk/js/identity/examples for more details.

const subscriptionId = "00000000-0000-0000-0000-000000000000";
const client = new ManagementLockClient(new DefaultAzureCredential(), subscriptionId);

// For client-side applications running in the browser, use this code instead:
// const credential = new InteractiveBrowserCredential({
//   tenantId: "<YOUR_TENANT_ID>",
//   clientId: "<YOUR_CLIENT_ID>"
// });
// const client = new ManagementLockClient(credential, subscriptionId);

JavaScript Bundle

To use this client library in the browser, first you need to use a bundler. For details on how to do this, please refer to our bundling documentation.

Key concepts

ManagementLockClient

ManagementLockClient is the primary interface for developers using the Azure ManagementLock client library. Explore the methods on this client object to understand the different features of the Azure ManagementLock service that you can access.

Troubleshooting

Logging

Enabling logging may help uncover useful information about failures. In order to see a log of HTTP requests and responses, set the AZURE_LOG_LEVEL environment variable to info. Alternatively, logging can be enabled at runtime by calling setLogLevel in the @azure/logger:

const { setLogLevel } = require("@azure/logger");
setLogLevel("info");

For more detailed instructions on how to enable logs, you can look at the @azure/logger package docs.

Next steps

Please take a look at the samples directory for detailed examples on how to use this library.

Contributing

If you'd like to contribute to this library, please read the contributing guide to learn more about how to build and test the code.

Impressions