-
Notifications
You must be signed in to change notification settings - Fork 0
/
model_public_key_credential.go
162 lines (134 loc) · 5.39 KB
/
model_public_key_credential.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
/* Copyright 2018-2020 KoreWireless
*
* This is part of the KoreWireless Omnicore SDK.
* It is licensed under the BSD 3-Clause license; you may not use this file
* except in compliance with the License.
*
* You may obtain a copy of the License at:
* https://opensource.org/licenses/BSD-3-Clause
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package OmniCore
import (
"encoding/json"
)
// checks if the PublicKeyCredential type satisfies the MappedNullable interface at compile time
var _ MappedNullable = &PublicKeyCredential{}
// PublicKeyCredential struct for PublicKeyCredential
type PublicKeyCredential struct {
// Format: The format of the key. Possible values: \"UNSPECIFIED_PUBLIC_KEY_FORMAT\" - The format has not been specified. This is an invalid default value and must not be used. \"RSA_PEM\" - An RSA public key encoded in base64, and wrapped by `-----BEGIN PUBLIC KEY-----` and `-----END PUBLIC KEY-----`. This can be used to verify `RS256` signatures in JWT tokens ([RFC7518]( https://www.ietf.org/rfc/rfc7518.txt)). \"RSA_X509_PEM\" - As RSA_PEM, but wrapped in an X.509v3 certificate ([RFC5280]( https://www.ietf.org/rfc/rfc5280.txt)), encoded in base64, and wrapped by `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`. \"ES256_PEM\" - Public key for the ECDSA algorithm using P-256 and SHA-256, encoded in base64, and wrapped by `-----BEGIN PUBLIC KEY-----` and `-----END PUBLIC KEY-----`. This can be used to verify JWT tokens with the `ES256` algorithm ([RFC7518](https://www.ietf.org/rfc/rfc7518.txt)). This curve is defined in [OpenSSL](https://www.openssl.org/) as the `prime256v1` curve. \"ES256_X509_PEM\" - As ES256_PEM, but wrapped in an X.509v3 certificate ([RFC5280]( https://www.ietf.org/rfc/rfc5280.txt)), encoded in base64, and wrapped by `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
Format string `json:"format"`
// Key: The key data.
Key *string `json:"key,omitempty"`
}
// NewPublicKeyCredential instantiates a new PublicKeyCredential object
// This constructor will assign default values to properties that have it defined,
// and makes sure properties required by API are set, but the set of arguments
// will change when the set of required properties is changed
func NewPublicKeyCredential(format string) *PublicKeyCredential {
this := PublicKeyCredential{}
this.Format = format
return &this
}
// NewPublicKeyCredentialWithDefaults instantiates a new PublicKeyCredential object
// This constructor will only assign default values to properties that have it defined,
// but it doesn't guarantee that properties required by API are set
func NewPublicKeyCredentialWithDefaults() *PublicKeyCredential {
this := PublicKeyCredential{}
return &this
}
// GetFormat returns the Format field value
func (o *PublicKeyCredential) GetFormat() string {
if o == nil {
var ret string
return ret
}
return o.Format
}
// GetFormatOk returns a tuple with the Format field value
// and a boolean to check if the value has been set.
func (o *PublicKeyCredential) GetFormatOk() (*string, bool) {
if o == nil {
return nil, false
}
return &o.Format, true
}
// SetFormat sets field value
func (o *PublicKeyCredential) SetFormat(v string) {
o.Format = v
}
// GetKey returns the Key field value if set, zero value otherwise.
func (o *PublicKeyCredential) GetKey() string {
if o == nil || IsNil(o.Key) {
var ret string
return ret
}
return *o.Key
}
// GetKeyOk returns a tuple with the Key field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *PublicKeyCredential) GetKeyOk() (*string, bool) {
if o == nil || IsNil(o.Key) {
return nil, false
}
return o.Key, true
}
// HasKey returns a boolean if a field has been set.
func (o *PublicKeyCredential) HasKey() bool {
if o != nil && !IsNil(o.Key) {
return true
}
return false
}
// SetKey gets a reference to the given string and assigns it to the Key field.
func (o *PublicKeyCredential) SetKey(v string) {
o.Key = &v
}
func (o PublicKeyCredential) MarshalJSON() ([]byte, error) {
toSerialize,err := o.ToMap()
if err != nil {
return []byte{}, err
}
return json.Marshal(toSerialize)
}
func (o PublicKeyCredential) ToMap() (map[string]interface{}, error) {
toSerialize := map[string]interface{}{}
toSerialize["format"] = o.Format
if !IsNil(o.Key) {
toSerialize["key"] = o.Key
}
return toSerialize, nil
}
type NullablePublicKeyCredential struct {
value *PublicKeyCredential
isSet bool
}
func (v NullablePublicKeyCredential) Get() *PublicKeyCredential {
return v.value
}
func (v *NullablePublicKeyCredential) Set(val *PublicKeyCredential) {
v.value = val
v.isSet = true
}
func (v NullablePublicKeyCredential) IsSet() bool {
return v.isSet
}
func (v *NullablePublicKeyCredential) Unset() {
v.value = nil
v.isSet = false
}
func NewNullablePublicKeyCredential(val *PublicKeyCredential) *NullablePublicKeyCredential {
return &NullablePublicKeyCredential{value: val, isSet: true}
}
func (v NullablePublicKeyCredential) MarshalJSON() ([]byte, error) {
return json.Marshal(v.value)
}
func (v *NullablePublicKeyCredential) UnmarshalJSON(src []byte) error {
v.isSet = true
return json.Unmarshal(src, &v.value)
}