mirror of
https://github.com/rocky-linux/peridot.git
synced 2024-12-21 10:18:32 +00:00
269 lines
7.5 KiB
Go
269 lines
7.5 KiB
Go
// Code generated by go-swagger; DO NOT EDIT.
|
|
|
|
package models
|
|
|
|
// This file was generated by the swagger tool.
|
|
// Editing this file might prove futile when you re-run the swagger generate command
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/go-openapi/errors"
|
|
"github.com/go-openapi/strfmt"
|
|
"github.com/go-openapi/swag"
|
|
"github.com/go-openapi/validate"
|
|
)
|
|
|
|
// ConsentRequest Contains information on an ongoing consent request.
|
|
//
|
|
// swagger:model consentRequest
|
|
type ConsentRequest struct {
|
|
|
|
// ACR represents the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it
|
|
// to express that, for example, a user authenticated using two factor authentication.
|
|
Acr string `json:"acr,omitempty"`
|
|
|
|
// ID is the identifier ("authorization challenge") of the consent authorization request. It is used to
|
|
// identify the session.
|
|
// Required: true
|
|
Challenge *string `json:"challenge"`
|
|
|
|
// client
|
|
Client *OAuth2Client `json:"client,omitempty"`
|
|
|
|
// context
|
|
Context JSONRawMessage `json:"context,omitempty"`
|
|
|
|
// LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate
|
|
// a login and consent request in the login & consent app.
|
|
LoginChallenge string `json:"login_challenge,omitempty"`
|
|
|
|
// LoginSessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)
|
|
// this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)
|
|
// this will be a new random value. This value is used as the "sid" parameter in the ID Token and in OIDC Front-/Back-
|
|
// channel logout. It's value can generally be used to associate consecutive login requests by a certain user.
|
|
LoginSessionID string `json:"login_session_id,omitempty"`
|
|
|
|
// oidc context
|
|
OidcContext *OpenIDConnectContext `json:"oidc_context,omitempty"`
|
|
|
|
// RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which
|
|
// initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but
|
|
// might come in handy if you want to deal with additional request parameters.
|
|
RequestURL string `json:"request_url,omitempty"`
|
|
|
|
// requested access token audience
|
|
RequestedAccessTokenAudience StringSlicePipeDelimiter `json:"requested_access_token_audience,omitempty"`
|
|
|
|
// requested scope
|
|
RequestedScope StringSlicePipeDelimiter `json:"requested_scope,omitempty"`
|
|
|
|
// Skip, if true, implies that the client has requested the same scopes from the same user previously.
|
|
// If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the
|
|
// consent request using the usual API call.
|
|
Skip bool `json:"skip,omitempty"`
|
|
|
|
// Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope
|
|
// requested by the OAuth 2.0 client.
|
|
Subject string `json:"subject,omitempty"`
|
|
}
|
|
|
|
// Validate validates this consent request
|
|
func (m *ConsentRequest) Validate(formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.validateChallenge(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateClient(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateOidcContext(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateRequestedAccessTokenAudience(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateRequestedScope(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) validateChallenge(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("challenge", "body", m.Challenge); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) validateClient(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.Client) { // not required
|
|
return nil
|
|
}
|
|
|
|
if m.Client != nil {
|
|
if err := m.Client.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("client")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) validateOidcContext(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.OidcContext) { // not required
|
|
return nil
|
|
}
|
|
|
|
if m.OidcContext != nil {
|
|
if err := m.OidcContext.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("oidc_context")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) validateRequestedAccessTokenAudience(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.RequestedAccessTokenAudience) { // not required
|
|
return nil
|
|
}
|
|
|
|
if err := m.RequestedAccessTokenAudience.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_access_token_audience")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) validateRequestedScope(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.RequestedScope) { // not required
|
|
return nil
|
|
}
|
|
|
|
if err := m.RequestedScope.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_scope")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ContextValidate validate this consent request based on the context it is used
|
|
func (m *ConsentRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.contextValidateClient(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateOidcContext(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateRequestedAccessTokenAudience(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateRequestedScope(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) contextValidateClient(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.Client != nil {
|
|
if err := m.Client.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("client")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) contextValidateOidcContext(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.OidcContext != nil {
|
|
if err := m.OidcContext.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("oidc_context")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) contextValidateRequestedAccessTokenAudience(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if err := m.RequestedAccessTokenAudience.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_access_token_audience")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *ConsentRequest) contextValidateRequestedScope(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if err := m.RequestedScope.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("requested_scope")
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// MarshalBinary interface implementation
|
|
func (m *ConsentRequest) MarshalBinary() ([]byte, error) {
|
|
if m == nil {
|
|
return nil, nil
|
|
}
|
|
return swag.WriteJSON(m)
|
|
}
|
|
|
|
// UnmarshalBinary interface implementation
|
|
func (m *ConsentRequest) UnmarshalBinary(b []byte) error {
|
|
var res ConsentRequest
|
|
if err := swag.ReadJSON(b, &res); err != nil {
|
|
return err
|
|
}
|
|
*m = res
|
|
return nil
|
|
}
|