From 9785edd26366be8eb11c2435f50f90a5c8eea7fc Mon Sep 17 00:00:00 2001 From: Wim Date: Sun, 8 Mar 2020 17:08:18 +0100 Subject: Remove replace directives and use own fork to make go get work again (#1028) See https://github.com/golang/go/issues/30354 go get doesn't honor the go.mod replace options. --- .../beta/BitLockerSystemDrivePolicyModel.go | 33 ---------------------- 1 file changed, 33 deletions(-) delete mode 100644 vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go') diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go b/vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go deleted file mode 100644 index ce647930..00000000 --- a/vendor/github.com/yaegashi/msgraph.go/beta/BitLockerSystemDrivePolicyModel.go +++ /dev/null @@ -1,33 +0,0 @@ -// Code generated by msgraph-generate.go DO NOT EDIT. - -package msgraph - -// BitLockerSystemDrivePolicy undocumented -type BitLockerSystemDrivePolicy struct { - // Object is the base model of BitLockerSystemDrivePolicy - Object - // EncryptionMethod Select the encryption method for operating system drives. - EncryptionMethod *BitLockerEncryptionMethod `json:"encryptionMethod,omitempty"` - // StartupAuthenticationRequired Require additional authentication at startup. - StartupAuthenticationRequired *bool `json:"startupAuthenticationRequired,omitempty"` - // StartupAuthenticationBlockWithoutTpmChip Indicates whether to allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive). - StartupAuthenticationBlockWithoutTpmChip *bool `json:"startupAuthenticationBlockWithoutTpmChip,omitempty"` - // StartupAuthenticationTpmUsage Indicates if TPM startup is allowed/required/disallowed. - StartupAuthenticationTpmUsage *ConfigurationUsage `json:"startupAuthenticationTpmUsage,omitempty"` - // StartupAuthenticationTpmPinUsage Indicates if TPM startup pin is allowed/required/disallowed. - StartupAuthenticationTpmPinUsage *ConfigurationUsage `json:"startupAuthenticationTpmPinUsage,omitempty"` - // StartupAuthenticationTpmKeyUsage Indicates if TPM startup key is allowed/required/disallowed. - StartupAuthenticationTpmKeyUsage *ConfigurationUsage `json:"startupAuthenticationTpmKeyUsage,omitempty"` - // StartupAuthenticationTpmPinAndKeyUsage Indicates if TPM startup pin key and key are allowed/required/disallowed. - StartupAuthenticationTpmPinAndKeyUsage *ConfigurationUsage `json:"startupAuthenticationTpmPinAndKeyUsage,omitempty"` - // MinimumPinLength Indicates the minimum length of startup pin. Valid values 4 to 20 - MinimumPinLength *int `json:"minimumPinLength,omitempty"` - // RecoveryOptions Allows to recover BitLocker encrypted operating system drives in the absence of the required startup key information. This policy setting is applied when you turn on BitLocker. - RecoveryOptions *BitLockerRecoveryOptions `json:"recoveryOptions,omitempty"` - // PrebootRecoveryEnableMessageAndURL Enable pre-boot recovery message and Url. If requireStartupAuthentication is false, this value does not affect. - PrebootRecoveryEnableMessageAndURL *bool `json:"prebootRecoveryEnableMessageAndUrl,omitempty"` - // PrebootRecoveryMessage Defines a custom recovery message. - PrebootRecoveryMessage *string `json:"prebootRecoveryMessage,omitempty"` - // PrebootRecoveryURL Defines a custom recovery URL. - PrebootRecoveryURL *string `json:"prebootRecoveryUrl,omitempty"` -} -- cgit v1.2.3