diff options
author | Wim <wim@42.be> | 2020-03-08 17:08:18 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-03-08 17:08:18 +0100 |
commit | 9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch) | |
tree | e8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go | |
parent | 2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff) | |
download | matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2 matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip |
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354
go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go')
-rw-r--r-- | vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go b/vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go new file mode 100644 index 00000000..ad3f1dd3 --- /dev/null +++ b/vendor/github.com/matterbridge/msgraph.go/beta/IOSManagedAppProtectionModel.go @@ -0,0 +1,39 @@ +// Code generated by msgraph-generate.go DO NOT EDIT. + +package msgraph + +// IOSManagedAppProtection Policy used to configure detailed management settings targeted to specific security groups and for a specified set of apps on an iOS device +type IOSManagedAppProtection struct { + // TargetedManagedAppProtection is the base model of IOSManagedAppProtection + TargetedManagedAppProtection + // AppDataEncryptionType Type of encryption which should be used for data in a managed app. + AppDataEncryptionType *ManagedAppDataEncryptionType `json:"appDataEncryptionType,omitempty"` + // MinimumRequiredSdkVersion Versions less than the specified version will block the managed app from accessing company data. + MinimumRequiredSdkVersion *string `json:"minimumRequiredSdkVersion,omitempty"` + // DeployedAppCount Count of apps to which the current policy is deployed. + DeployedAppCount *int `json:"deployedAppCount,omitempty"` + // FaceIDBlocked Indicates whether use of the FaceID is allowed in place of a pin if PinRequired is set to True. + FaceIDBlocked *bool `json:"faceIdBlocked,omitempty"` + // ExemptedAppProtocols Apps in this list will be exempt from the policy and will be able to receive data from managed apps. + ExemptedAppProtocols []KeyValuePair `json:"exemptedAppProtocols,omitempty"` + // MinimumWipeSdkVersion Versions less than the specified version will block the managed app from accessing company data. + MinimumWipeSdkVersion *string `json:"minimumWipeSdkVersion,omitempty"` + // AllowedIOSDeviceModels Semicolon seperated list of device models allowed, as a string, for the managed app to work. + AllowedIOSDeviceModels *string `json:"allowedIosDeviceModels,omitempty"` + // AppActionIfIOSDeviceModelNotAllowed Defines a managed app behavior, either block or wipe, if the specified device model is not allowed. + AppActionIfIOSDeviceModelNotAllowed *ManagedAppRemediationAction `json:"appActionIfIosDeviceModelNotAllowed,omitempty"` + // ThirdPartyKeyboardsBlocked Defines if third party keyboards are allowed while accessing a managed app + ThirdPartyKeyboardsBlocked *bool `json:"thirdPartyKeyboardsBlocked,omitempty"` + // FilterOpenInToOnlyManagedApps Defines if open-in operation is supported from the managed app to the filesharing locations selected. This setting only applies when AllowedOutboundDataTransferDestinations is set to ManagedApps and DisableProtectionOfManagedOutboundOpenInData is set to False. + FilterOpenInToOnlyManagedApps *bool `json:"filterOpenInToOnlyManagedApps,omitempty"` + // DisableProtectionOfManagedOutboundOpenInData Disable protection of data transferred to other apps through IOS OpenIn option. This setting is only allowed to be True when AllowedOutboundDataTransferDestinations is set to ManagedApps. + DisableProtectionOfManagedOutboundOpenInData *bool `json:"disableProtectionOfManagedOutboundOpenInData,omitempty"` + // ProtectInboundDataFromUnknownSources Protect incoming data from unknown source. This setting is only allowed to be True when AllowedInboundDataTransferSources is set to AllApps. + ProtectInboundDataFromUnknownSources *bool `json:"protectInboundDataFromUnknownSources,omitempty"` + // CustomBrowserProtocol A custom browser protocol to open weblink on iOS. + CustomBrowserProtocol *string `json:"customBrowserProtocol,omitempty"` + // Apps undocumented + Apps []ManagedMobileApp `json:"apps,omitempty"` + // DeploymentSummary undocumented + DeploymentSummary *ManagedAppPolicyDeploymentSummary `json:"deploymentSummary,omitempty"` +} |