-
Notifications
You must be signed in to change notification settings - Fork 5
/
model_accept_o_auth2_consent_request_session.go
197 lines (156 loc) · 8.92 KB
/
model_accept_o_auth2_consent_request_session.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
/*
Ory APIs
# Introduction Documentation for all public and administrative Ory APIs. Administrative APIs can only be accessed with a valid Personal Access Token. Public APIs are mostly used in browsers. ## SDKs This document describes the APIs available in the Ory Network. The APIs are available as SDKs for the following languages: | Language | Download SDK | Documentation | | -------------- | ---------------------------------------------------------------- | ------------------------------------------------------------------------------------ | | Dart | [pub.dev](https://pub.dev/packages/ory_client) | [README](https://github.com/ory/sdk/blob/master/clients/client/dart/README.md) | | .NET | [nuget.org](https://www.nuget.org/packages/Ory.Client/) | [README](https://github.com/ory/sdk/blob/master/clients/client/dotnet/README.md) | | Elixir | [hex.pm](https://hex.pm/packages/ory_client) | [README](https://github.com/ory/sdk/blob/master/clients/client/elixir/README.md) | | Go | [github.com](https://github.com/ory/client-go) | [README](https://github.com/ory/sdk/blob/master/clients/client/go/README.md) | | Java | [maven.org](https://search.maven.org/artifact/sh.ory/ory-client) | [README](https://github.com/ory/sdk/blob/master/clients/client/java/README.md) | | JavaScript | [npmjs.com](https://www.npmjs.com/package/@ory/client) | [README](https://github.com/ory/sdk/blob/master/clients/client/typescript/README.md) | | JavaScript (With fetch) | [npmjs.com](https://www.npmjs.com/package/@ory/client-fetch) | [README](https://github.com/ory/sdk/blob/master/clients/client/typescript-fetch/README.md) | | PHP | [packagist.org](https://packagist.org/packages/ory/client) | [README](https://github.com/ory/sdk/blob/master/clients/client/php/README.md) | | Python | [pypi.org](https://pypi.org/project/ory-client/) | [README](https://github.com/ory/sdk/blob/master/clients/client/python/README.md) | | Ruby | [rubygems.org](https://rubygems.org/gems/ory-client) | [README](https://github.com/ory/sdk/blob/master/clients/client/ruby/README.md) | | Rust | [crates.io](https://crates.io/crates/ory-client) | [README](https://github.com/ory/sdk/blob/master/clients/client/rust/README.md) |
API version: v1.15.16
Contact: [email protected]
*/
// Code generated by OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package client
import (
"encoding/json"
)
// checks if the AcceptOAuth2ConsentRequestSession type satisfies the MappedNullable interface at compile time
var _ MappedNullable = &AcceptOAuth2ConsentRequestSession{}
// AcceptOAuth2ConsentRequestSession struct for AcceptOAuth2ConsentRequestSession
type AcceptOAuth2ConsentRequestSession struct {
// AccessToken sets session data for the access and refresh token, as well as any future tokens issued by the refresh grant. Keep in mind that this data will be available to anyone performing OAuth 2.0 Challenge Introspection. If only your services can perform OAuth 2.0 Challenge Introspection, this is usually fine. But if third parties can access that endpoint as well, sensitive data from the session might be exposed to them. Use with care!
AccessToken interface{} `json:"access_token,omitempty"`
// IDToken sets session data for the OpenID Connect ID token. Keep in mind that the session'id payloads are readable by anyone that has access to the ID Challenge. Use with care!
IdToken interface{} `json:"id_token,omitempty"`
AdditionalProperties map[string]interface{}
}
type _AcceptOAuth2ConsentRequestSession AcceptOAuth2ConsentRequestSession
// NewAcceptOAuth2ConsentRequestSession instantiates a new AcceptOAuth2ConsentRequestSession object
// This constructor will assign default values to properties that have it defined,
// and makes sure properties required by API are set, but the set of arguments
// will change when the set of required properties is changed
func NewAcceptOAuth2ConsentRequestSession() *AcceptOAuth2ConsentRequestSession {
this := AcceptOAuth2ConsentRequestSession{}
return &this
}
// NewAcceptOAuth2ConsentRequestSessionWithDefaults instantiates a new AcceptOAuth2ConsentRequestSession object
// This constructor will only assign default values to properties that have it defined,
// but it doesn't guarantee that properties required by API are set
func NewAcceptOAuth2ConsentRequestSessionWithDefaults() *AcceptOAuth2ConsentRequestSession {
this := AcceptOAuth2ConsentRequestSession{}
return &this
}
// GetAccessToken returns the AccessToken field value if set, zero value otherwise (both if not set or set to explicit null).
func (o *AcceptOAuth2ConsentRequestSession) GetAccessToken() interface{} {
if o == nil {
var ret interface{}
return ret
}
return o.AccessToken
}
// GetAccessTokenOk returns a tuple with the AccessToken field value if set, nil otherwise
// and a boolean to check if the value has been set.
// NOTE: If the value is an explicit nil, `nil, true` will be returned
func (o *AcceptOAuth2ConsentRequestSession) GetAccessTokenOk() (*interface{}, bool) {
if o == nil || IsNil(o.AccessToken) {
return nil, false
}
return &o.AccessToken, true
}
// HasAccessToken returns a boolean if a field has been set.
func (o *AcceptOAuth2ConsentRequestSession) HasAccessToken() bool {
if o != nil && !IsNil(o.AccessToken) {
return true
}
return false
}
// SetAccessToken gets a reference to the given interface{} and assigns it to the AccessToken field.
func (o *AcceptOAuth2ConsentRequestSession) SetAccessToken(v interface{}) {
o.AccessToken = v
}
// GetIdToken returns the IdToken field value if set, zero value otherwise (both if not set or set to explicit null).
func (o *AcceptOAuth2ConsentRequestSession) GetIdToken() interface{} {
if o == nil {
var ret interface{}
return ret
}
return o.IdToken
}
// GetIdTokenOk returns a tuple with the IdToken field value if set, nil otherwise
// and a boolean to check if the value has been set.
// NOTE: If the value is an explicit nil, `nil, true` will be returned
func (o *AcceptOAuth2ConsentRequestSession) GetIdTokenOk() (*interface{}, bool) {
if o == nil || IsNil(o.IdToken) {
return nil, false
}
return &o.IdToken, true
}
// HasIdToken returns a boolean if a field has been set.
func (o *AcceptOAuth2ConsentRequestSession) HasIdToken() bool {
if o != nil && !IsNil(o.IdToken) {
return true
}
return false
}
// SetIdToken gets a reference to the given interface{} and assigns it to the IdToken field.
func (o *AcceptOAuth2ConsentRequestSession) SetIdToken(v interface{}) {
o.IdToken = v
}
func (o AcceptOAuth2ConsentRequestSession) MarshalJSON() ([]byte, error) {
toSerialize,err := o.ToMap()
if err != nil {
return []byte{}, err
}
return json.Marshal(toSerialize)
}
func (o AcceptOAuth2ConsentRequestSession) ToMap() (map[string]interface{}, error) {
toSerialize := map[string]interface{}{}
if o.AccessToken != nil {
toSerialize["access_token"] = o.AccessToken
}
if o.IdToken != nil {
toSerialize["id_token"] = o.IdToken
}
for key, value := range o.AdditionalProperties {
toSerialize[key] = value
}
return toSerialize, nil
}
func (o *AcceptOAuth2ConsentRequestSession) UnmarshalJSON(data []byte) (err error) {
varAcceptOAuth2ConsentRequestSession := _AcceptOAuth2ConsentRequestSession{}
err = json.Unmarshal(data, &varAcceptOAuth2ConsentRequestSession)
if err != nil {
return err
}
*o = AcceptOAuth2ConsentRequestSession(varAcceptOAuth2ConsentRequestSession)
additionalProperties := make(map[string]interface{})
if err = json.Unmarshal(data, &additionalProperties); err == nil {
delete(additionalProperties, "access_token")
delete(additionalProperties, "id_token")
o.AdditionalProperties = additionalProperties
}
return err
}
type NullableAcceptOAuth2ConsentRequestSession struct {
value *AcceptOAuth2ConsentRequestSession
isSet bool
}
func (v NullableAcceptOAuth2ConsentRequestSession) Get() *AcceptOAuth2ConsentRequestSession {
return v.value
}
func (v *NullableAcceptOAuth2ConsentRequestSession) Set(val *AcceptOAuth2ConsentRequestSession) {
v.value = val
v.isSet = true
}
func (v NullableAcceptOAuth2ConsentRequestSession) IsSet() bool {
return v.isSet
}
func (v *NullableAcceptOAuth2ConsentRequestSession) Unset() {
v.value = nil
v.isSet = false
}
func NewNullableAcceptOAuth2ConsentRequestSession(val *AcceptOAuth2ConsentRequestSession) *NullableAcceptOAuth2ConsentRequestSession {
return &NullableAcceptOAuth2ConsentRequestSession{value: val, isSet: true}
}
func (v NullableAcceptOAuth2ConsentRequestSession) MarshalJSON() ([]byte, error) {
return json.Marshal(v.value)
}
func (v *NullableAcceptOAuth2ConsentRequestSession) UnmarshalJSON(src []byte) error {
v.isSet = true
return json.Unmarshal(src, &v.value)
}