diff options
author | Qais Patankar <qaisjp@gmail.com> | 2020-03-15 22:43:46 +0000 |
---|---|---|
committer | Wim <wim@42.be> | 2020-03-22 00:02:48 +0100 |
commit | 76e5fe5a87d7e60919075f96eee599f3c6255a9f (patch) | |
tree | af3181ad6aadaea02069473a3718a827be888426 /vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go | |
parent | 802c80f40c709ba4967de317e40a8d6abe57f6be (diff) | |
download | matterbridge-msglm-76e5fe5a87d7e60919075f96eee599f3c6255a9f.tar.gz matterbridge-msglm-76e5fe5a87d7e60919075f96eee599f3c6255a9f.tar.bz2 matterbridge-msglm-76e5fe5a87d7e60919075f96eee599f3c6255a9f.zip |
Update vendor yaegashi/msgraph.go to v0.1.2 (2)
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go')
-rw-r--r-- | vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go | 49 |
1 files changed, 0 insertions, 49 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go deleted file mode 100644 index 7536bfcc..00000000 --- a/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go +++ /dev/null @@ -1,49 +0,0 @@ -// Code generated by msgraph-generate.go DO NOT EDIT. - -package msgraph - -// WindowsMalwareExecutionState undocumented -type WindowsMalwareExecutionState int - -const ( - // WindowsMalwareExecutionStateVUnknown undocumented - WindowsMalwareExecutionStateVUnknown WindowsMalwareExecutionState = 0 - // WindowsMalwareExecutionStateVBlocked undocumented - WindowsMalwareExecutionStateVBlocked WindowsMalwareExecutionState = 1 - // WindowsMalwareExecutionStateVAllowed undocumented - WindowsMalwareExecutionStateVAllowed WindowsMalwareExecutionState = 2 - // WindowsMalwareExecutionStateVRunning undocumented - WindowsMalwareExecutionStateVRunning WindowsMalwareExecutionState = 3 - // WindowsMalwareExecutionStateVNotRunning undocumented - WindowsMalwareExecutionStateVNotRunning WindowsMalwareExecutionState = 4 -) - -// WindowsMalwareExecutionStatePUnknown returns a pointer to WindowsMalwareExecutionStateVUnknown -func WindowsMalwareExecutionStatePUnknown() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVUnknown - return &v -} - -// WindowsMalwareExecutionStatePBlocked returns a pointer to WindowsMalwareExecutionStateVBlocked -func WindowsMalwareExecutionStatePBlocked() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVBlocked - return &v -} - -// WindowsMalwareExecutionStatePAllowed returns a pointer to WindowsMalwareExecutionStateVAllowed -func WindowsMalwareExecutionStatePAllowed() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVAllowed - return &v -} - -// WindowsMalwareExecutionStatePRunning returns a pointer to WindowsMalwareExecutionStateVRunning -func WindowsMalwareExecutionStatePRunning() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVRunning - return &v -} - -// WindowsMalwareExecutionStatePNotRunning returns a pointer to WindowsMalwareExecutionStateVNotRunning -func WindowsMalwareExecutionStatePNotRunning() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVNotRunning - return &v -} |