mirror of
https://github.com/rocky-linux/peridot.git
synced 2024-10-19 07:55:07 +00:00
224 lines
5.5 KiB
Go
224 lines
5.5 KiB
Go
|
// Code generated by go-swagger; DO NOT EDIT.
|
||
|
|
||
|
package models
|
||
|
|
||
|
// This file was generated by the swagger tool.
|
||
|
// Editing this file might prove futile when you re-run the swagger generate command
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
|
||
|
"github.com/go-openapi/errors"
|
||
|
"github.com/go-openapi/strfmt"
|
||
|
"github.com/go-openapi/swag"
|
||
|
)
|
||
|
|
||
|
// AcceptConsentRequest The request payload used to accept a consent request.
|
||
|
//
|
||
|
// swagger:model acceptConsentRequest
|
||
|
type AcceptConsentRequest struct {
|
||
|
|
||
|
// grant access token audience
|
||
|
GrantAccessTokenAudience StringSlicePipeDelimiter `json:"grant_access_token_audience,omitempty"`
|
||
|
|
||
|
// grant scope
|
||
|
GrantScope StringSlicePipeDelimiter `json:"grant_scope,omitempty"`
|
||
|
|
||
|
// handled at
|
||
|
// Format: date-time
|
||
|
HandledAt NullTime `json:"handled_at,omitempty"`
|
||
|
|
||
|
// Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same
|
||
|
// client asks the same user for the same, or a subset of, scope.
|
||
|
Remember bool `json:"remember,omitempty"`
|
||
|
|
||
|
// RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the
|
||
|
// authorization will be remembered indefinitely.
|
||
|
RememberFor int64 `json:"remember_for,omitempty"`
|
||
|
|
||
|
// session
|
||
|
Session *ConsentRequestSession `json:"session,omitempty"`
|
||
|
}
|
||
|
|
||
|
// Validate validates this accept consent request
|
||
|
func (m *AcceptConsentRequest) Validate(formats strfmt.Registry) error {
|
||
|
var res []error
|
||
|
|
||
|
if err := m.validateGrantAccessTokenAudience(formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if err := m.validateGrantScope(formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if err := m.validateHandledAt(formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if err := m.validateSession(formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if len(res) > 0 {
|
||
|
return errors.CompositeValidationError(res...)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) validateGrantAccessTokenAudience(formats strfmt.Registry) error {
|
||
|
if swag.IsZero(m.GrantAccessTokenAudience) { // not required
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
if err := m.GrantAccessTokenAudience.Validate(formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("grant_access_token_audience")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) validateGrantScope(formats strfmt.Registry) error {
|
||
|
if swag.IsZero(m.GrantScope) { // not required
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
if err := m.GrantScope.Validate(formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("grant_scope")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) validateHandledAt(formats strfmt.Registry) error {
|
||
|
if swag.IsZero(m.HandledAt) { // not required
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
if err := m.HandledAt.Validate(formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("handled_at")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) validateSession(formats strfmt.Registry) error {
|
||
|
if swag.IsZero(m.Session) { // not required
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
if m.Session != nil {
|
||
|
if err := m.Session.Validate(formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("session")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// ContextValidate validate this accept consent request based on the context it is used
|
||
|
func (m *AcceptConsentRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
|
||
|
var res []error
|
||
|
|
||
|
if err := m.contextValidateGrantAccessTokenAudience(ctx, formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if err := m.contextValidateGrantScope(ctx, formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if err := m.contextValidateHandledAt(ctx, formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if err := m.contextValidateSession(ctx, formats); err != nil {
|
||
|
res = append(res, err)
|
||
|
}
|
||
|
|
||
|
if len(res) > 0 {
|
||
|
return errors.CompositeValidationError(res...)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) contextValidateGrantAccessTokenAudience(ctx context.Context, formats strfmt.Registry) error {
|
||
|
|
||
|
if err := m.GrantAccessTokenAudience.ContextValidate(ctx, formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("grant_access_token_audience")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) contextValidateGrantScope(ctx context.Context, formats strfmt.Registry) error {
|
||
|
|
||
|
if err := m.GrantScope.ContextValidate(ctx, formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("grant_scope")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) contextValidateHandledAt(ctx context.Context, formats strfmt.Registry) error {
|
||
|
|
||
|
if err := m.HandledAt.ContextValidate(ctx, formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("handled_at")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *AcceptConsentRequest) contextValidateSession(ctx context.Context, formats strfmt.Registry) error {
|
||
|
|
||
|
if m.Session != nil {
|
||
|
if err := m.Session.ContextValidate(ctx, formats); err != nil {
|
||
|
if ve, ok := err.(*errors.Validation); ok {
|
||
|
return ve.ValidateName("session")
|
||
|
}
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// MarshalBinary interface implementation
|
||
|
func (m *AcceptConsentRequest) MarshalBinary() ([]byte, error) {
|
||
|
if m == nil {
|
||
|
return nil, nil
|
||
|
}
|
||
|
return swag.WriteJSON(m)
|
||
|
}
|
||
|
|
||
|
// UnmarshalBinary interface implementation
|
||
|
func (m *AcceptConsentRequest) UnmarshalBinary(b []byte) error {
|
||
|
var res AcceptConsentRequest
|
||
|
if err := swag.ReadJSON(b, &res); err != nil {
|
||
|
return err
|
||
|
}
|
||
|
*m = res
|
||
|
return nil
|
||
|
}
|