diff options
author | Wim <wim@42.be> | 2020-03-08 17:08:18 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-03-08 17:08:18 +0100 |
commit | 9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch) | |
tree | e8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go | |
parent | 2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff) | |
download | matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2 matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip |
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354
go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go')
-rw-r--r-- | vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go | 33 |
1 files changed, 0 insertions, 33 deletions
diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go deleted file mode 100644 index ec8b2dbd..00000000 --- a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsDeviceMalwareStateModel.go +++ /dev/null @@ -1,33 +0,0 @@ -// Code generated by msgraph-generate.go DO NOT EDIT. - -package msgraph - -import "time" - -// WindowsDeviceMalwareState Malware detection entity. -type WindowsDeviceMalwareState struct { - // Entity is the base model of WindowsDeviceMalwareState - Entity - // DisplayName Malware name - DisplayName *string `json:"displayName,omitempty"` - // AdditionalInformationURL Information URL to learn more about the malware - AdditionalInformationURL *string `json:"additionalInformationUrl,omitempty"` - // Severity Severity of the malware - Severity *WindowsMalwareSeverity `json:"severity,omitempty"` - // Catetgory Category of the malware - Catetgory *WindowsMalwareCategory `json:"catetgory,omitempty"` - // ExecutionState Execution status of the malware like blocked/executing etc - ExecutionState *WindowsMalwareExecutionState `json:"executionState,omitempty"` - // State Current status of the malware like cleaned/quarantined/allowed etc - State *WindowsMalwareState `json:"state,omitempty"` - // ThreatState Current status of the malware like cleaned/quarantined/allowed etc - ThreatState *WindowsMalwareThreatState `json:"threatState,omitempty"` - // InitialDetectionDateTime Initial detection datetime of the malware - InitialDetectionDateTime *time.Time `json:"initialDetectionDateTime,omitempty"` - // LastStateChangeDateTime The last time this particular threat was changed - LastStateChangeDateTime *time.Time `json:"lastStateChangeDateTime,omitempty"` - // DetectionCount Number of times the malware is detected - DetectionCount *int `json:"detectionCount,omitempty"` - // Category Category of the malware - Category *WindowsMalwareCategory `json:"category,omitempty"` -} |