From 9785edd26366be8eb11c2435f50f90a5c8eea7fc Mon Sep 17 00:00:00 2001 From: Wim Date: Sun, 8 Mar 2020 17:08:18 +0100 Subject: Remove replace directives and use own fork to make go get work again (#1028) See https://github.com/golang/go/issues/30354 go get doesn't honor the go.mod replace options. --- .../beta/WindowsMalwareExecutionStateEnum.go | 49 ---------------------- 1 file changed, 49 deletions(-) delete mode 100644 vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go (limited to 'vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go') diff --git a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go b/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go deleted file mode 100644 index 7536bfcc..00000000 --- a/vendor/github.com/yaegashi/msgraph.go/beta/WindowsMalwareExecutionStateEnum.go +++ /dev/null @@ -1,49 +0,0 @@ -// Code generated by msgraph-generate.go DO NOT EDIT. - -package msgraph - -// WindowsMalwareExecutionState undocumented -type WindowsMalwareExecutionState int - -const ( - // WindowsMalwareExecutionStateVUnknown undocumented - WindowsMalwareExecutionStateVUnknown WindowsMalwareExecutionState = 0 - // WindowsMalwareExecutionStateVBlocked undocumented - WindowsMalwareExecutionStateVBlocked WindowsMalwareExecutionState = 1 - // WindowsMalwareExecutionStateVAllowed undocumented - WindowsMalwareExecutionStateVAllowed WindowsMalwareExecutionState = 2 - // WindowsMalwareExecutionStateVRunning undocumented - WindowsMalwareExecutionStateVRunning WindowsMalwareExecutionState = 3 - // WindowsMalwareExecutionStateVNotRunning undocumented - WindowsMalwareExecutionStateVNotRunning WindowsMalwareExecutionState = 4 -) - -// WindowsMalwareExecutionStatePUnknown returns a pointer to WindowsMalwareExecutionStateVUnknown -func WindowsMalwareExecutionStatePUnknown() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVUnknown - return &v -} - -// WindowsMalwareExecutionStatePBlocked returns a pointer to WindowsMalwareExecutionStateVBlocked -func WindowsMalwareExecutionStatePBlocked() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVBlocked - return &v -} - -// WindowsMalwareExecutionStatePAllowed returns a pointer to WindowsMalwareExecutionStateVAllowed -func WindowsMalwareExecutionStatePAllowed() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVAllowed - return &v -} - -// WindowsMalwareExecutionStatePRunning returns a pointer to WindowsMalwareExecutionStateVRunning -func WindowsMalwareExecutionStatePRunning() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVRunning - return &v -} - -// WindowsMalwareExecutionStatePNotRunning returns a pointer to WindowsMalwareExecutionStateVNotRunning -func WindowsMalwareExecutionStatePNotRunning() *WindowsMalwareExecutionState { - v := WindowsMalwareExecutionStateVNotRunning - return &v -} -- cgit v1.2.3