forked from okta/okta-sdk-golang
/
model_authenticator_type.go
134 lines (110 loc) · 3.57 KB
/
model_authenticator_type.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
/*
Okta Admin Management
Allows customers to easily access the Okta Management APIs
Copyright 2018 - Present Okta, Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
API version: 5.1.0
Contact: devex-public@okta.com
*/
// Code generated by OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package okta
import (
"encoding/json"
"fmt"
)
// AuthenticatorType the model 'AuthenticatorType'
type AuthenticatorType string
// List of AuthenticatorType
const (
AUTHENTICATORTYPE_APP AuthenticatorType = "app"
AUTHENTICATORTYPE_EMAIL AuthenticatorType = "email"
AUTHENTICATORTYPE_FEDERATED AuthenticatorType = "federated"
AUTHENTICATORTYPE_PASSWORD AuthenticatorType = "password"
AUTHENTICATORTYPE_PHONE AuthenticatorType = "phone"
AUTHENTICATORTYPE_SECURITY_KEY AuthenticatorType = "security_key"
AUTHENTICATORTYPE_SECURITY_QUESTION AuthenticatorType = "security_question"
)
// All allowed values of AuthenticatorType enum
var AllowedAuthenticatorTypeEnumValues = []AuthenticatorType{
"app",
"email",
"federated",
"password",
"phone",
"security_key",
"security_question",
}
func (v *AuthenticatorType) UnmarshalJSON(src []byte) error {
var value string
err := json.Unmarshal(src, &value)
if err != nil {
return err
}
enumTypeValue := AuthenticatorType(value)
for _, existing := range AllowedAuthenticatorTypeEnumValues {
if existing == enumTypeValue {
*v = enumTypeValue
return nil
}
}
return fmt.Errorf("%+v is not a valid AuthenticatorType", value)
}
// NewAuthenticatorTypeFromValue returns a pointer to a valid AuthenticatorType
// for the value passed as argument, or an error if the value passed is not allowed by the enum
func NewAuthenticatorTypeFromValue(v string) (*AuthenticatorType, error) {
ev := AuthenticatorType(v)
if ev.IsValid() {
return &ev, nil
} else {
return nil, fmt.Errorf("invalid value '%v' for AuthenticatorType: valid values are %v", v, AllowedAuthenticatorTypeEnumValues)
}
}
// IsValid return true if the value is valid for the enum, false otherwise
func (v AuthenticatorType) IsValid() bool {
for _, existing := range AllowedAuthenticatorTypeEnumValues {
if existing == v {
return true
}
}
return false
}
// Ptr returns reference to AuthenticatorType value
func (v AuthenticatorType) Ptr() *AuthenticatorType {
return &v
}
type NullableAuthenticatorType struct {
value *AuthenticatorType
isSet bool
}
func (v NullableAuthenticatorType) Get() *AuthenticatorType {
return v.value
}
func (v *NullableAuthenticatorType) Set(val *AuthenticatorType) {
v.value = val
v.isSet = true
}
func (v NullableAuthenticatorType) IsSet() bool {
return v.isSet
}
func (v *NullableAuthenticatorType) Unset() {
v.value = nil
v.isSet = false
}
func NewNullableAuthenticatorType(val *AuthenticatorType) *NullableAuthenticatorType {
return &NullableAuthenticatorType{value: val, isSet: true}
}
func (v NullableAuthenticatorType) MarshalJSON() ([]byte, error) {
return json.Marshal(v.value)
}
func (v *NullableAuthenticatorType) UnmarshalJSON(src []byte) error {
v.isSet = true
return json.Unmarshal(src, &v.value)
}