Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Generated models and request builders #1219

Merged
merged 1 commit into from
May 3, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 14 additions & 14 deletions src/Model/AccessPackageAssignmentRequestorSettings.php
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ class AccessPackageAssignmentRequestorSettings extends Entity
{
/**
* Gets the allowCustomAssignmentSchedule
* If false, the requestor is not permitted to include a schedule in their request.
* False indicates that the requestor is not permitted to include a schedule in their request.
*
* @return bool|null The allowCustomAssignmentSchedule
*/
Expand All @@ -40,7 +40,7 @@ public function getAllowCustomAssignmentSchedule()

/**
* Sets the allowCustomAssignmentSchedule
* If false, the requestor is not permitted to include a schedule in their request.
* False indicates that the requestor is not permitted to include a schedule in their request.
*
* @param bool $val The value of the allowCustomAssignmentSchedule
*
Expand All @@ -53,7 +53,7 @@ public function setAllowCustomAssignmentSchedule($val)
}
/**
* Gets the enableOnBehalfRequestorsToAddAccess
* If true, allows on-behalf-of requestors to create a request to add access for another principal.
* True allows on-behalf-of requestors to create a request to add access for another principal.
*
* @return bool|null The enableOnBehalfRequestorsToAddAccess
*/
Expand All @@ -68,7 +68,7 @@ public function getEnableOnBehalfRequestorsToAddAccess()

/**
* Sets the enableOnBehalfRequestorsToAddAccess
* If true, allows on-behalf-of requestors to create a request to add access for another principal.
* True allows on-behalf-of requestors to create a request to add access for another principal.
*
* @param bool $val The value of the enableOnBehalfRequestorsToAddAccess
*
Expand All @@ -81,7 +81,7 @@ public function setEnableOnBehalfRequestorsToAddAccess($val)
}
/**
* Gets the enableOnBehalfRequestorsToRemoveAccess
* If true, allows on-behalf-of requestors to create a request to remove access for another principal.
* True allows on-behalf-of requestors to create a request to remove access for another principal.
*
* @return bool|null The enableOnBehalfRequestorsToRemoveAccess
*/
Expand All @@ -96,7 +96,7 @@ public function getEnableOnBehalfRequestorsToRemoveAccess()

/**
* Sets the enableOnBehalfRequestorsToRemoveAccess
* If true, allows on-behalf-of requestors to create a request to remove access for another principal.
* True allows on-behalf-of requestors to create a request to remove access for another principal.
*
* @param bool $val The value of the enableOnBehalfRequestorsToRemoveAccess
*
Expand All @@ -109,7 +109,7 @@ public function setEnableOnBehalfRequestorsToRemoveAccess($val)
}
/**
* Gets the enableOnBehalfRequestorsToUpdateAccess
* If true, allows on-behalf-of requestors to create a request to update access for another principal.
* True allows on-behalf-of requestors to create a request to update access for another principal.
*
* @return bool|null The enableOnBehalfRequestorsToUpdateAccess
*/
Expand All @@ -124,7 +124,7 @@ public function getEnableOnBehalfRequestorsToUpdateAccess()

/**
* Sets the enableOnBehalfRequestorsToUpdateAccess
* If true, allows on-behalf-of requestors to create a request to update access for another principal.
* True allows on-behalf-of requestors to create a request to update access for another principal.
*
* @param bool $val The value of the enableOnBehalfRequestorsToUpdateAccess
*
Expand All @@ -137,7 +137,7 @@ public function setEnableOnBehalfRequestorsToUpdateAccess($val)
}
/**
* Gets the enableTargetsToSelfAddAccess
* If true, allows requestors to create a request to add access for themselves.
* True allows requestors to create a request to add access for themselves.
*
* @return bool|null The enableTargetsToSelfAddAccess
*/
Expand All @@ -152,7 +152,7 @@ public function getEnableTargetsToSelfAddAccess()

/**
* Sets the enableTargetsToSelfAddAccess
* If true, allows requestors to create a request to add access for themselves.
* True allows requestors to create a request to add access for themselves.
*
* @param bool $val The value of the enableTargetsToSelfAddAccess
*
Expand All @@ -165,7 +165,7 @@ public function setEnableTargetsToSelfAddAccess($val)
}
/**
* Gets the enableTargetsToSelfRemoveAccess
* If true, allows requestors to create a request to remove their access.
* True allows requestors to create a request to remove their access.
*
* @return bool|null The enableTargetsToSelfRemoveAccess
*/
Expand All @@ -180,7 +180,7 @@ public function getEnableTargetsToSelfRemoveAccess()

/**
* Sets the enableTargetsToSelfRemoveAccess
* If true, allows requestors to create a request to remove their access.
* True allows requestors to create a request to remove their access.
*
* @param bool $val The value of the enableTargetsToSelfRemoveAccess
*
Expand All @@ -193,7 +193,7 @@ public function setEnableTargetsToSelfRemoveAccess($val)
}
/**
* Gets the enableTargetsToSelfUpdateAccess
* If true, allows requestors to create a request to update their access.
* True allows requestors to create a request to update their access.
*
* @return bool|null The enableTargetsToSelfUpdateAccess
*/
Expand All @@ -208,7 +208,7 @@ public function getEnableTargetsToSelfUpdateAccess()

/**
* Sets the enableTargetsToSelfUpdateAccess
* If true, allows requestors to create a request to update their access.
* True allows requestors to create a request to update their access.
*
* @param bool $val The value of the enableTargetsToSelfUpdateAccess
*
Expand Down
31 changes: 31 additions & 0 deletions src/Model/CrossTenantAccessPolicyConfigurationDefault.php
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,37 @@
*/
class CrossTenantAccessPolicyConfigurationDefault extends Entity
{
/**
* Gets the automaticUserConsentSettings
*
* @return InboundOutboundPolicyConfiguration|null The automaticUserConsentSettings
*/
public function getAutomaticUserConsentSettings()
{
if (array_key_exists("automaticUserConsentSettings", $this->_propDict)) {
if (is_a($this->_propDict["automaticUserConsentSettings"], "\Microsoft\Graph\Model\InboundOutboundPolicyConfiguration") || is_null($this->_propDict["automaticUserConsentSettings"])) {
return $this->_propDict["automaticUserConsentSettings"];
} else {
$this->_propDict["automaticUserConsentSettings"] = new InboundOutboundPolicyConfiguration($this->_propDict["automaticUserConsentSettings"]);
return $this->_propDict["automaticUserConsentSettings"];
}
}
return null;
}

/**
* Sets the automaticUserConsentSettings
*
* @param InboundOutboundPolicyConfiguration $val The automaticUserConsentSettings
*
* @return CrossTenantAccessPolicyConfigurationDefault
*/
public function setAutomaticUserConsentSettings($val)
{
$this->_propDict["automaticUserConsentSettings"] = $val;
return $this;
}

/**
* Gets the b2bCollaborationInbound
* Defines your default configuration for users from other organizations accessing your resources via Azure AD B2B collaboration.
Expand Down
31 changes: 31 additions & 0 deletions src/Model/CrossTenantAccessPolicyConfigurationPartner.php
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,37 @@ public function getProperties()
return $this->_propDict;
}

/**
* Gets the automaticUserConsentSettings
*
* @return InboundOutboundPolicyConfiguration|null The automaticUserConsentSettings
*/
public function getAutomaticUserConsentSettings()
{
if (array_key_exists("automaticUserConsentSettings", $this->_propDict)) {
if (is_a($this->_propDict["automaticUserConsentSettings"], "\Microsoft\Graph\Model\InboundOutboundPolicyConfiguration") || is_null($this->_propDict["automaticUserConsentSettings"])) {
return $this->_propDict["automaticUserConsentSettings"];
} else {
$this->_propDict["automaticUserConsentSettings"] = new InboundOutboundPolicyConfiguration($this->_propDict["automaticUserConsentSettings"]);
return $this->_propDict["automaticUserConsentSettings"];
}
}
return null;
}

/**
* Sets the automaticUserConsentSettings
*
* @param InboundOutboundPolicyConfiguration $val The automaticUserConsentSettings
*
* @return CrossTenantAccessPolicyConfigurationPartner
*/
public function setAutomaticUserConsentSettings($val)
{
$this->_propDict["automaticUserConsentSettings"] = $val;
return $this;
}

/**
* Gets the b2bCollaborationInbound
* Defines your partner-specific configuration for users from other organizations accessing your resources via Azure AD B2B collaboration.
Expand Down
78 changes: 78 additions & 0 deletions src/Model/InboundOutboundPolicyConfiguration.php
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
<?php
/**
* Copyright (c) Microsoft Corporation. All Rights Reserved. Licensed under the MIT License. See License in the project root for license information.
*
* InboundOutboundPolicyConfiguration File
* PHP version 7
*
* @category Library
* @package Microsoft.Graph
* @copyright (c) Microsoft Corporation. All rights reserved.
* @license https://opensource.org/licenses/MIT MIT License
* @link https://graph.microsoft.com
*/
namespace Microsoft\Graph\Model;
/**
* InboundOutboundPolicyConfiguration class
*
* @category Model
* @package Microsoft.Graph
* @copyright (c) Microsoft Corporation. All rights reserved.
* @license https://opensource.org/licenses/MIT MIT License
* @link https://graph.microsoft.com
*/
class InboundOutboundPolicyConfiguration extends Entity
{
/**
* Gets the inboundAllowed
*
* @return bool|null The inboundAllowed
*/
public function getInboundAllowed()
{
if (array_key_exists("inboundAllowed", $this->_propDict)) {
return $this->_propDict["inboundAllowed"];
} else {
return null;
}
}

/**
* Sets the inboundAllowed
*
* @param bool $val The value of the inboundAllowed
*
* @return InboundOutboundPolicyConfiguration
*/
public function setInboundAllowed($val)
{
$this->_propDict["inboundAllowed"] = $val;
return $this;
}
/**
* Gets the outboundAllowed
*
* @return bool|null The outboundAllowed
*/
public function getOutboundAllowed()
{
if (array_key_exists("outboundAllowed", $this->_propDict)) {
return $this->_propDict["outboundAllowed"];
} else {
return null;
}
}

/**
* Sets the outboundAllowed
*
* @param bool $val The value of the outboundAllowed
*
* @return InboundOutboundPolicyConfiguration
*/
public function setOutboundAllowed($val)
{
$this->_propDict["outboundAllowed"] = $val;
return $this;
}
}
8 changes: 4 additions & 4 deletions src/Model/SignInActivity.php
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ class SignInActivity extends Entity

/**
* Gets the lastNonInteractiveSignInDateTime
* The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client signed in to the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
* The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client attempted to sign into the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
*
* @return \DateTime|null The lastNonInteractiveSignInDateTime
*/
Expand All @@ -45,7 +45,7 @@ public function getLastNonInteractiveSignInDateTime()

/**
* Sets the lastNonInteractiveSignInDateTime
* The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client signed in to the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
* The last non-interactive sign-in date for a specific user. You can use this field to calculate the last time a client attempted to sign into the directory on behalf of a user. Because some users may use clients to access tenant resources rather than signing into your tenant directly, you can use the non-interactive sign-in date to along with lastSignInDateTime to identify inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains non-interactive sign-ins going back to May 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
*
* @param \DateTime $val The value to assign to the lastNonInteractiveSignInDateTime
*
Expand Down Expand Up @@ -87,7 +87,7 @@ public function setLastNonInteractiveSignInRequestId($val)

/**
* Gets the lastSignInDateTime
* The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user signed in to the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
* The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user attempted to sign into the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
*
* @return \DateTime|null The lastSignInDateTime
*/
Expand All @@ -106,7 +106,7 @@ public function getLastSignInDateTime()

/**
* Sets the lastSignInDateTime
* The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user signed in to the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
* The last interactive sign-in date and time for a specific user. You can use this field to calculate the last time a user attempted to sign into the directory with an interactive authentication method. This field can be used to build reports, such as inactive users. The timestamp represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is: '2014-01-01T00:00:00Z'. Azure AD maintains interactive sign-ins going back to April 2020. For more information about using the value of this property, see Manage inactive user accounts in Azure AD.
*
* @param \DateTime $val The value to assign to the lastSignInDateTime
*
Expand Down