-
Notifications
You must be signed in to change notification settings - Fork 200
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reference Code Example for Azure IoT/Tools #255
Comments
Hey @KZeronimo! What specifically are you interested in consuming/having visibility on from IoTHub? |
Hi @jamesadevine I would like to see the internals of the tool if possible We have automation that creates IoTC applications, and we would like to output the DPS Scope Id and 10 IoTH endpoints that comprise the IoTC application so that our Azure Sphere device enablement team can whitelist appropriately. I suppose we could attempt to fire the The key question I have at the moment is there a way to reveal the DPS Scope Id given the IoTC application URL as the only input - I notice |
Hi, @jamesadevine I was playing around a bit with My goal is to be able to acquire the DPS Scope Id and 10 IoTH endpoints associated with an IoTC application in an automation pipeline and reduce the manual steps required to get the information needed to add to One viable option is to build an input file "iotcapp.txt" n
https://<iotcapphost>.azureiotcentral.com/
SharedAccessSignature sr=...
scopeid And then |
Hi @KZeronimo! Sorry for the delay.
Absolutely agree, we will take a look at this.
Completely understand. Out of curiosity, what pipeline technology are you using? GitHub Actions, ADO, other?
Yup, we can look at this. Is there any reason why you prefer an input text file rather than parameters to the exe? The one drawback is that it is currently not possible to obtain the scope ID from IoTC programmatically. |
@jamesadevine would it be possible to see how the IoTC hub endpoints are surfaced
The text was updated successfully, but these errors were encountered: