diff options
author | Wim <wim@42.be> | 2020-03-08 17:08:18 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-03-08 17:08:18 +0100 |
commit | 9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch) | |
tree | e8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go | |
parent | 2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff) | |
download | matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2 matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip |
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354
go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go')
-rw-r--r-- | vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go new file mode 100644 index 00000000..ec8b2dbd --- /dev/null +++ b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsDeviceMalwareStateModel.go @@ -0,0 +1,33 @@ +// Code generated by msgraph-generate.go DO NOT EDIT. + +package msgraph + +import "time" + +// WindowsDeviceMalwareState Malware detection entity. +type WindowsDeviceMalwareState struct { + // Entity is the base model of WindowsDeviceMalwareState + Entity + // DisplayName Malware name + DisplayName *string `json:"displayName,omitempty"` + // AdditionalInformationURL Information URL to learn more about the malware + AdditionalInformationURL *string `json:"additionalInformationUrl,omitempty"` + // Severity Severity of the malware + Severity *WindowsMalwareSeverity `json:"severity,omitempty"` + // Catetgory Category of the malware + Catetgory *WindowsMalwareCategory `json:"catetgory,omitempty"` + // ExecutionState Execution status of the malware like blocked/executing etc + ExecutionState *WindowsMalwareExecutionState `json:"executionState,omitempty"` + // State Current status of the malware like cleaned/quarantined/allowed etc + State *WindowsMalwareState `json:"state,omitempty"` + // ThreatState Current status of the malware like cleaned/quarantined/allowed etc + ThreatState *WindowsMalwareThreatState `json:"threatState,omitempty"` + // InitialDetectionDateTime Initial detection datetime of the malware + InitialDetectionDateTime *time.Time `json:"initialDetectionDateTime,omitempty"` + // LastStateChangeDateTime The last time this particular threat was changed + LastStateChangeDateTime *time.Time `json:"lastStateChangeDateTime,omitempty"` + // DetectionCount Number of times the malware is detected + DetectionCount *int `json:"detectionCount,omitempty"` + // Category Category of the malware + Category *WindowsMalwareCategory `json:"category,omitempty"` +} |