summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2019-12-26 23:12:28 +0100
committerWim <wim@42.be>2020-03-01 22:19:33 +0100
commit795a8705c3fdc5bf55e83d382e7d3ff233896a0b (patch)
tree46ac43e487102de7ea21a823a7a7902ae9493f88 /vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
parent3af0dc3b3a5bfaffe37770c437427f1e99402405 (diff)
downloadmatterbridge-msglm-795a8705c3fdc5bf55e83d382e7d3ff233896a0b.tar.gz
matterbridge-msglm-795a8705c3fdc5bf55e83d382e7d3ff233896a0b.tar.bz2
matterbridge-msglm-795a8705c3fdc5bf55e83d382e7d3ff233896a0b.zip
Add initial Microsoft Teams support
Documentation on https://github.com/42wim/matterbridge/wiki/MS-Teams-setup
Diffstat (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go')
-rw-r--r--vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go49
1 files changed, 49 insertions, 0 deletions
diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
new file mode 100644
index 00000000..7536bfcc
--- /dev/null
+++ b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
@@ -0,0 +1,49 @@
+// Code generated by msgraph-generate.go DO NOT EDIT.
+
+package msgraph
+
+// WindowsMalwareExecutionState undocumented
+type WindowsMalwareExecutionState int
+
+const (
+ // WindowsMalwareExecutionStateVUnknown undocumented
+ WindowsMalwareExecutionStateVUnknown WindowsMalwareExecutionState = 0
+ // WindowsMalwareExecutionStateVBlocked undocumented
+ WindowsMalwareExecutionStateVBlocked WindowsMalwareExecutionState = 1
+ // WindowsMalwareExecutionStateVAllowed undocumented
+ WindowsMalwareExecutionStateVAllowed WindowsMalwareExecutionState = 2
+ // WindowsMalwareExecutionStateVRunning undocumented
+ WindowsMalwareExecutionStateVRunning WindowsMalwareExecutionState = 3
+ // WindowsMalwareExecutionStateVNotRunning undocumented
+ WindowsMalwareExecutionStateVNotRunning WindowsMalwareExecutionState = 4
+)
+
+// WindowsMalwareExecutionStatePUnknown returns a pointer to WindowsMalwareExecutionStateVUnknown
+func WindowsMalwareExecutionStatePUnknown() *WindowsMalwareExecutionState {
+ v := WindowsMalwareExecutionStateVUnknown
+ return &v
+}
+
+// WindowsMalwareExecutionStatePBlocked returns a pointer to WindowsMalwareExecutionStateVBlocked
+func WindowsMalwareExecutionStatePBlocked() *WindowsMalwareExecutionState {
+ v := WindowsMalwareExecutionStateVBlocked
+ return &v
+}
+
+// WindowsMalwareExecutionStatePAllowed returns a pointer to WindowsMalwareExecutionStateVAllowed
+func WindowsMalwareExecutionStatePAllowed() *WindowsMalwareExecutionState {
+ v := WindowsMalwareExecutionStateVAllowed
+ return &v
+}
+
+// WindowsMalwareExecutionStatePRunning returns a pointer to WindowsMalwareExecutionStateVRunning
+func WindowsMalwareExecutionStatePRunning() *WindowsMalwareExecutionState {
+ v := WindowsMalwareExecutionStateVRunning
+ return &v
+}
+
+// WindowsMalwareExecutionStatePNotRunning returns a pointer to WindowsMalwareExecutionStateVNotRunning
+func WindowsMalwareExecutionStatePNotRunning() *WindowsMalwareExecutionState {
+ v := WindowsMalwareExecutionStateVNotRunning
+ return &v
+}