mirror of
https://github.com/rocky-linux/peridot.git
synced 2024-11-18 11:21:25 +00:00
308 lines
7.9 KiB
Go
308 lines
7.9 KiB
Go
// Code generated by go-swagger; DO NOT EDIT.
|
|
|
|
package models
|
|
|
|
// This file was generated by the swagger tool.
|
|
// Editing this file might prove futile when you re-run the swagger generate command
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/go-openapi/errors"
|
|
"github.com/go-openapi/strfmt"
|
|
"github.com/go-openapi/swag"
|
|
"github.com/go-openapi/validate"
|
|
)
|
|
|
|
// LoginRequest Contains information on an ongoing login request.
|
|
//
|
|
// swagger:model loginRequest
|
|
type LoginRequest struct {
|
|
|
|
// ID is the identifier ("login challenge") of the login request. It is used to
|
|
// identify the session.
|
|
// Required: true
|
|
Challenge *string `json:"challenge"`
|
|
|
|
// client
|
|
// Required: true
|
|
Client *OAuth2Client `json:"client"`
|
|
|
|
// oidc context
|
|
OidcContext *OpenIDConnectContext `json:"oidc_context,omitempty"`
|
|
|
|
// RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which
|
|
// initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but
|
|
// might come in handy if you want to deal with additional request parameters.
|
|
// Required: true
|
|
RequestURL *string `json:"request_url"`
|
|
|
|
// requested access token audience
|
|
// Required: true
|
|
RequestedAccessTokenAudience StringSlicePipeDelimiter `json:"requested_access_token_audience"`
|
|
|
|
// requested scope
|
|
// Required: true
|
|
RequestedScope StringSlicePipeDelimiter `json:"requested_scope"`
|
|
|
|
// SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)
|
|
// this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)
|
|
// this will be a new random value. This value is used as the "sid" parameter in the ID Token and in OIDC Front-/Back-
|
|
// channel logout. It's value can generally be used to associate consecutive login requests by a certain user.
|
|
SessionID string `json:"session_id,omitempty"`
|
|
|
|
// Skip, if true, implies that the client has requested the same scopes from the same user previously.
|
|
// If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL.
|
|
//
|
|
// This feature allows you to update / set session information.
|
|
// Required: true
|
|
Skip *bool `json:"skip"`
|
|
|
|
// Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope
|
|
// requested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type
|
|
// when accepting the login request, or the request will fail.
|
|
// Required: true
|
|
Subject *string `json:"subject"`
|
|
}
|
|
|
|
// Validate validates this login request
|
|
func (m *LoginRequest) Validate(formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.validateChallenge(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateClient(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateOidcContext(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateRequestURL(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateRequestedAccessTokenAudience(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateRequestedScope(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateSkip(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateSubject(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateChallenge(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("challenge", "body", m.Challenge); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateClient(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("client", "body", m.Client); err != nil {
|
|
return err
|
|
}
|
|
|
|
if m.Client != nil {
|
|
if err := m.Client.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("client")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateOidcContext(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.OidcContext) { // not required
|
|
return nil
|
|
}
|
|
|
|
if m.OidcContext != nil {
|
|
if err := m.OidcContext.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("oidc_context")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateRequestURL(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("request_url", "body", m.RequestURL); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateRequestedAccessTokenAudience(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("requested_access_token_audience", "body", m.RequestedAccessTokenAudience); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := m.RequestedAccessTokenAudience.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_access_token_audience")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateRequestedScope(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("requested_scope", "body", m.RequestedScope); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := m.RequestedScope.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_scope")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateSkip(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("skip", "body", m.Skip); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) validateSubject(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("subject", "body", m.Subject); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ContextValidate validate this login request based on the context it is used
|
|
func (m *LoginRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.contextValidateClient(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateOidcContext(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateRequestedAccessTokenAudience(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateRequestedScope(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) contextValidateClient(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.Client != nil {
|
|
if err := m.Client.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("client")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) contextValidateOidcContext(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.OidcContext != nil {
|
|
if err := m.OidcContext.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("oidc_context")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) contextValidateRequestedAccessTokenAudience(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if err := m.RequestedAccessTokenAudience.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_access_token_audience")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *LoginRequest) contextValidateRequestedScope(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if err := m.RequestedScope.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_scope")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// MarshalBinary interface implementation
|
|
func (m *LoginRequest) MarshalBinary() ([]byte, error) {
|
|
if m == nil {
|
|
return nil, nil
|
|
}
|
|
return swag.WriteJSON(m)
|
|
}
|
|
|
|
// UnmarshalBinary interface implementation
|
|
func (m *LoginRequest) UnmarshalBinary(b []byte) error {
|
|
var res LoginRequest
|
|
if err := swag.ReadJSON(b, &res); err != nil {
|
|
return err
|
|
}
|
|
*m = res
|
|
return nil
|
|
}
|