diff options
Diffstat (limited to 'vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go')
-rw-r--r-- | vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go | 49 |
1 files changed, 0 insertions, 49 deletions
diff --git a/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go b/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go deleted file mode 100644 index 7536bfcc..00000000 --- a/vendor/github.com/matterbridge/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go +++ /dev/null @@ -1,49 +0,0 @@ -// Code generated by msgraph-generate.go DO NOT EDIT. - -package msgraph - -// WindowsMalwareExecutionState undocumented -type WindowsMalwareExecutionState int - -const ( - // WindowsMalwareExecutionStateVUnknown undocumented - WindowsMalwareExecutionStateVUnknown WindowsMalwareExecutionState = 0 - // WindowsMalwareExecutionStateVBlocked undocumented - WindowsMalwareExecutionStateVBlocked WindowsMalwareExecutionState = 1 - // WindowsMalwareExecutionStateVAllowed undocumented - WindowsMalwareExecutionStateVAllowed WindowsMalwareExecutionState = 2 - // WindowsMalwareExecutionStateVRunning undocumented - WindowsMalwareExecutionStateVRunning WindowsMalwareExecutionState = 3 - // WindowsMalwareExecutionStateVNotRunning undocumented - WindowsMalwareExecutionStateVNotRunning WindowsMalwareExecutionState = 4 -) - -// WindowsMalwareExecutionStatePUnknown returns a pointer to WindowsMalwareExecutionStateVUnknown -func WindowsMalwareExecutionStatePUnknown() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVUnknown - return &v -} - -// WindowsMalwareExecutionStatePBlocked returns a pointer to WindowsMalwareExecutionStateVBlocked -func WindowsMalwareExecutionStatePBlocked() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVBlocked - return &v -} - -// WindowsMalwareExecutionStatePAllowed returns a pointer to WindowsMalwareExecutionStateVAllowed -func WindowsMalwareExecutionStatePAllowed() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVAllowed - return &v -} - -// WindowsMalwareExecutionStatePRunning returns a pointer to WindowsMalwareExecutionStateVRunning -func WindowsMalwareExecutionStatePRunning() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVRunning - return &v -} - -// WindowsMalwareExecutionStatePNotRunning returns a pointer to WindowsMalwareExecutionStateVNotRunning -func WindowsMalwareExecutionStatePNotRunning() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVNotRunning - return &v -} |