summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2020-03-08 17:08:18 +0100
committerGitHub <noreply@github.com>2020-03-08 17:08:18 +0100
commit9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch)
treee8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go
parent2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff)
downloadmatterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354 go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go')
-rw-r--r--vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go33
1 files changed, 0 insertions, 33 deletions
diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go b/vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go
deleted file mode 100644
index ce647930..00000000
--- a/vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go
+++ /dev/null
@@ -1,33 +0,0 @@
-// Code generated by msgraph-generate.go DO NOT EDIT.
-
-package msgraph
-
-// BitLockerSystemDrivePolicy undocumented
-type BitLockerSystemDrivePolicy struct {
- // Object is the base model of BitLockerSystemDrivePolicy
- Object
- // EncryptionMethod Select the encryption method for operating system drives.
- EncryptionMethod *BitLockerEncryptionMethod `json:"encryptionMethod,omitempty"`
- // StartupAuthenticationRequired Require additional authentication at startup.
- StartupAuthenticationRequired *bool `json:"startupAuthenticationRequired,omitempty"`
- // StartupAuthenticationBlockWithoutTpmChip Indicates whether to allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive).
- StartupAuthenticationBlockWithoutTpmChip *bool `json:"startupAuthenticationBlockWithoutTpmChip,omitempty"`
- // StartupAuthenticationTpmUsage Indicates if TPM startup is allowed/required/disallowed.
- StartupAuthenticationTpmUsage *ConfigurationUsage `json:"startupAuthenticationTpmUsage,omitempty"`
- // StartupAuthenticationTpmPinUsage Indicates if TPM startup pin is allowed/required/disallowed.
- StartupAuthenticationTpmPinUsage *ConfigurationUsage `json:"startupAuthenticationTpmPinUsage,omitempty"`
- // StartupAuthenticationTpmKeyUsage Indicates if TPM startup key is allowed/required/disallowed.
- StartupAuthenticationTpmKeyUsage *ConfigurationUsage `json:"startupAuthenticationTpmKeyUsage,omitempty"`
- // StartupAuthenticationTpmPinAndKeyUsage Indicates if TPM startup pin key and key are allowed/required/disallowed.
- StartupAuthenticationTpmPinAndKeyUsage *ConfigurationUsage `json:"startupAuthenticationTpmPinAndKeyUsage,omitempty"`
- // MinimumPinLength Indicates the minimum length of startup pin. Valid values 4 to 20
- MinimumPinLength *int `json:"minimumPinLength,omitempty"`
- // RecoveryOptions Allows to recover BitLocker encrypted operating system drives in the absence of the required startup key information. This policy setting is applied when you turn on BitLocker.
- RecoveryOptions *BitLockerRecoveryOptions `json:"recoveryOptions,omitempty"`
- // PrebootRecoveryEnableMessageAndURL Enable pre-boot recovery message and Url. If requireStartupAuthentication is false, this value does not affect.
- PrebootRecoveryEnableMessageAndURL *bool `json:"prebootRecoveryEnableMessageAndUrl,omitempty"`
- // PrebootRecoveryMessage Defines a custom recovery message.
- PrebootRecoveryMessage *string `json:"prebootRecoveryMessage,omitempty"`
- // PrebootRecoveryURL Defines a custom recovery URL.
- PrebootRecoveryURL *string `json:"prebootRecoveryUrl,omitempty"`
-}