diff options
author | Wim <wim@42.be> | 2020-03-08 17:08:18 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-03-08 17:08:18 +0100 |
commit | 9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch) | |
tree | e8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/matterbridge/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go | |
parent | 2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff) | |
download | matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2 matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip |
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354
go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go')
-rw-r--r-- | vendor/github.com/matterbridge/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go b/vendor/github.com/matterbridge/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go new file mode 100644 index 00000000..ce647930 --- /dev/null +++ b/vendor/github.com/matterbridge/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go @@ -0,0 +1,33 @@ +// Code generated by msgraph-generate.go DO NOT EDIT. + +package msgraph + +// BitLockerSystemDrivePolicy undocumented +type BitLockerSystemDrivePolicy struct { + // Object is the base model of BitLockerSystemDrivePolicy + Object + // EncryptionMethod Select the encryption method for operating system drives. + EncryptionMethod *BitLockerEncryptionMethod `json:"encryptionMethod,omitempty"` + // StartupAuthenticationRequired Require additional authentication at startup. + StartupAuthenticationRequired *bool `json:"startupAuthenticationRequired,omitempty"` + // StartupAuthenticationBlockWithoutTpmChip Indicates whether to allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive). + StartupAuthenticationBlockWithoutTpmChip *bool `json:"startupAuthenticationBlockWithoutTpmChip,omitempty"` + // StartupAuthenticationTpmUsage Indicates if TPM startup is allowed/required/disallowed. + StartupAuthenticationTpmUsage *ConfigurationUsage `json:"startupAuthenticationTpmUsage,omitempty"` + // StartupAuthenticationTpmPinUsage Indicates if TPM startup pin is allowed/required/disallowed. + StartupAuthenticationTpmPinUsage *ConfigurationUsage `json:"startupAuthenticationTpmPinUsage,omitempty"` + // StartupAuthenticationTpmKeyUsage Indicates if TPM startup key is allowed/required/disallowed. + StartupAuthenticationTpmKeyUsage *ConfigurationUsage `json:"startupAuthenticationTpmKeyUsage,omitempty"` + // StartupAuthenticationTpmPinAndKeyUsage Indicates if TPM startup pin key and key are allowed/required/disallowed. + StartupAuthenticationTpmPinAndKeyUsage *ConfigurationUsage `json:"startupAuthenticationTpmPinAndKeyUsage,omitempty"` + // MinimumPinLength Indicates the minimum length of startup pin. Valid values 4 to 20 + MinimumPinLength *int `json:"minimumPinLength,omitempty"` + // RecoveryOptions Allows to recover BitLocker encrypted operating system drives in the absence of the required startup key information. This policy setting is applied when you turn on BitLocker. + RecoveryOptions *BitLockerRecoveryOptions `json:"recoveryOptions,omitempty"` + // PrebootRecoveryEnableMessageAndURL Enable pre-boot recovery message and Url. If requireStartupAuthentication is false, this value does not affect. + PrebootRecoveryEnableMessageAndURL *bool `json:"prebootRecoveryEnableMessageAndUrl,omitempty"` + // PrebootRecoveryMessage Defines a custom recovery message. + PrebootRecoveryMessage *string `json:"prebootRecoveryMessage,omitempty"` + // PrebootRecoveryURL Defines a custom recovery URL. + PrebootRecoveryURL *string `json:"prebootRecoveryUrl,omitempty"` +} |