diff options
author | Wim <wim@42.be> | 2020-03-08 17:08:18 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-03-08 17:08:18 +0100 |
commit | 9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch) | |
tree | e8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go | |
parent | 2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff) | |
download | matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2 matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip |
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354
go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go')
-rw-r--r-- | vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go new file mode 100644 index 00000000..7536bfcc --- /dev/null +++ b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go @@ -0,0 +1,49 @@ +// Code generated by msgraph-generate.go DO NOT EDIT. + +package msgraph + +// WindowsMalwareExecutionState undocumented +type WindowsMalwareExecutionState int + +const ( + // WindowsMalwareExecutionStateVUnknown undocumented + WindowsMalwareExecutionStateVUnknown WindowsMalwareExecutionState = 0 + // WindowsMalwareExecutionStateVBlocked undocumented + WindowsMalwareExecutionStateVBlocked WindowsMalwareExecutionState = 1 + // WindowsMalwareExecutionStateVAllowed undocumented + WindowsMalwareExecutionStateVAllowed WindowsMalwareExecutionState = 2 + // WindowsMalwareExecutionStateVRunning undocumented + WindowsMalwareExecutionStateVRunning WindowsMalwareExecutionState = 3 + // WindowsMalwareExecutionStateVNotRunning undocumented + WindowsMalwareExecutionStateVNotRunning WindowsMalwareExecutionState = 4 +) + +// WindowsMalwareExecutionStatePUnknown returns a pointer to WindowsMalwareExecutionStateVUnknown +func WindowsMalwareExecutionStatePUnknown() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVUnknown + return &v +} + +// WindowsMalwareExecutionStatePBlocked returns a pointer to WindowsMalwareExecutionStateVBlocked +func WindowsMalwareExecutionStatePBlocked() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVBlocked + return &v +} + +// WindowsMalwareExecutionStatePAllowed returns a pointer to WindowsMalwareExecutionStateVAllowed +func WindowsMalwareExecutionStatePAllowed() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVAllowed + return &v +} + +// WindowsMalwareExecutionStatePRunning returns a pointer to WindowsMalwareExecutionStateVRunning +func WindowsMalwareExecutionStatePRunning() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVRunning + return &v +} + +// WindowsMalwareExecutionStatePNotRunning returns a pointer to WindowsMalwareExecutionStateVNotRunning +func WindowsMalwareExecutionStatePNotRunning() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVNotRunning + return &v +} |