From 795a8705c3fdc5bf55e83d382e7d3ff233896a0b Mon Sep 17 00:00:00 2001 From: Wim Date: Thu, 26 Dec 2019 23:12:28 +0100 Subject: Add initial Microsoft Teams support Documentation on https://github.com/42wim/matterbridge/wiki/MS-Teams-setup --- .../beta/WindowsMalwareExecutionStateEnum.go | 49 ++++++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go') diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go new file mode 100644 index 00000000..7536bfcc --- /dev/null +++ b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go @@ -0,0 +1,49 @@ +// Code generated by msgraph-generate.go DO NOT EDIT. + +package msgraph + +// WindowsMalwareExecutionState undocumented +type WindowsMalwareExecutionState int + +const ( + // WindowsMalwareExecutionStateVUnknown undocumented + WindowsMalwareExecutionStateVUnknown WindowsMalwareExecutionState = 0 + // WindowsMalwareExecutionStateVBlocked undocumented + WindowsMalwareExecutionStateVBlocked WindowsMalwareExecutionState = 1 + // WindowsMalwareExecutionStateVAllowed undocumented + WindowsMalwareExecutionStateVAllowed WindowsMalwareExecutionState = 2 + // WindowsMalwareExecutionStateVRunning undocumented + WindowsMalwareExecutionStateVRunning WindowsMalwareExecutionState = 3 + // WindowsMalwareExecutionStateVNotRunning undocumented + WindowsMalwareExecutionStateVNotRunning WindowsMalwareExecutionState = 4 +) + +// WindowsMalwareExecutionStatePUnknown returns a pointer to WindowsMalwareExecutionStateVUnknown +func WindowsMalwareExecutionStatePUnknown() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVUnknown + return &v +} + +// WindowsMalwareExecutionStatePBlocked returns a pointer to WindowsMalwareExecutionStateVBlocked +func WindowsMalwareExecutionStatePBlocked() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVBlocked + return &v +} + +// WindowsMalwareExecutionStatePAllowed returns a pointer to WindowsMalwareExecutionStateVAllowed +func WindowsMalwareExecutionStatePAllowed() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVAllowed + return &v +} + +// WindowsMalwareExecutionStatePRunning returns a pointer to WindowsMalwareExecutionStateVRunning +func WindowsMalwareExecutionStatePRunning() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVRunning + return &v +} + +// WindowsMalwareExecutionStatePNotRunning returns a pointer to WindowsMalwareExecutionStateVNotRunning +func WindowsMalwareExecutionStatePNotRunning() *WindowsMalwareExecutionState { + v := WindowsMalwareExecutionStateVNotRunning + return &v +} -- cgit v1.2.3