summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2020-03-08 17:08:18 +0100
committerGitHub <noreply@github.com>2020-03-08 17:08:18 +0100
commit9785edd26366be8eb11c2435f50f90a5c8eea7fc (patch)
treee8e236b5b273e7535c607507cc059f3b957068a1 /vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
parent2a0bc11b684f63305258e338c5f1d0e91eb24414 (diff)
downloadmatterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.gz
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.tar.bz2
matterbridge-msglm-9785edd26366be8eb11c2435f50f90a5c8eea7fc.zip
Remove replace directives and use own fork to make go get work again (#1028)
See https://github.com/golang/go/issues/30354 go get doesn't honor the go.mod replace options.
Diffstat (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go')
-rw-r--r--vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go49
1 files changed, 0 insertions, 49 deletions
diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
deleted file mode 100644
index 7536bfcc..00000000
--- a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go
+++ /dev/null
@@ -1,49 +0,0 @@
-// Code generated by msgraph-generate.go DO NOT EDIT.
-
-package msgraph
-
-// WindowsMalwareExecutionState undocumented
-type WindowsMalwareExecutionState int
-
-const (
- // WindowsMalwareExecutionStateVUnknown undocumented
- WindowsMalwareExecutionStateVUnknown WindowsMalwareExecutionState = 0
- // WindowsMalwareExecutionStateVBlocked undocumented
- WindowsMalwareExecutionStateVBlocked WindowsMalwareExecutionState = 1
- // WindowsMalwareExecutionStateVAllowed undocumented
- WindowsMalwareExecutionStateVAllowed WindowsMalwareExecutionState = 2
- // WindowsMalwareExecutionStateVRunning undocumented
- WindowsMalwareExecutionStateVRunning WindowsMalwareExecutionState = 3
- // WindowsMalwareExecutionStateVNotRunning undocumented
- WindowsMalwareExecutionStateVNotRunning WindowsMalwareExecutionState = 4
-)
-
-// WindowsMalwareExecutionStatePUnknown returns a pointer to WindowsMalwareExecutionStateVUnknown
-func WindowsMalwareExecutionStatePUnknown() *WindowsMalwareExecutionState {
- v := WindowsMalwareExecutionStateVUnknown
- return &v
-}
-
-// WindowsMalwareExecutionStatePBlocked returns a pointer to WindowsMalwareExecutionStateVBlocked
-func WindowsMalwareExecutionStatePBlocked() *WindowsMalwareExecutionState {
- v := WindowsMalwareExecutionStateVBlocked
- return &v
-}
-
-// WindowsMalwareExecutionStatePAllowed returns a pointer to WindowsMalwareExecutionStateVAllowed
-func WindowsMalwareExecutionStatePAllowed() *WindowsMalwareExecutionState {
- v := WindowsMalwareExecutionStateVAllowed
- return &v
-}
-
-// WindowsMalwareExecutionStatePRunning returns a pointer to WindowsMalwareExecutionStateVRunning
-func WindowsMalwareExecutionStatePRunning() *WindowsMalwareExecutionState {
- v := WindowsMalwareExecutionStateVRunning
- return &v
-}
-
-// WindowsMalwareExecutionStatePNotRunning returns a pointer to WindowsMalwareExecutionStateVNotRunning
-func WindowsMalwareExecutionStatePNotRunning() *WindowsMalwareExecutionState {
- v := WindowsMalwareExecutionStateVNotRunning
- return &v
-}