/
token_authentication_static_keys_validation_policy.go
91 lines (77 loc) · 3.05 KB
/
token_authentication_static_keys_validation_policy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
// Copyright (c) 2016, 2018, 2024, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
// Code generated. DO NOT EDIT.
// API Gateway API
//
// API for the API Gateway service. Use this API to manage gateways, deployments, and related items.
// For more information, see
// Overview of API Gateway (https://docs.cloud.oracle.com/iaas/Content/APIGateway/Concepts/apigatewayoverview.htm).
//
package apigateway
import (
"encoding/json"
"fmt"
"github.com/oracle/oci-go-sdk/v65/common"
"strings"
)
// TokenAuthenticationStaticKeysValidationPolicy A set of static public keys that will be used to verify the JWT signature.
type TokenAuthenticationStaticKeysValidationPolicy struct {
AdditionalValidationPolicy *AdditionalValidationPolicy `mandatory:"false" json:"additionalValidationPolicy"`
// The set of static public keys.
Keys []StaticPublicKey `mandatory:"false" json:"keys"`
}
// GetAdditionalValidationPolicy returns AdditionalValidationPolicy
func (m TokenAuthenticationStaticKeysValidationPolicy) GetAdditionalValidationPolicy() *AdditionalValidationPolicy {
return m.AdditionalValidationPolicy
}
func (m TokenAuthenticationStaticKeysValidationPolicy) String() string {
return common.PointerString(m)
}
// ValidateEnumValue returns an error when providing an unsupported enum value
// This function is being called during constructing API request process
// Not recommended for calling this function directly
func (m TokenAuthenticationStaticKeysValidationPolicy) ValidateEnumValue() (bool, error) {
errMessage := []string{}
if len(errMessage) > 0 {
return true, fmt.Errorf(strings.Join(errMessage, "\n"))
}
return false, nil
}
// MarshalJSON marshals to json representation
func (m TokenAuthenticationStaticKeysValidationPolicy) MarshalJSON() (buff []byte, e error) {
type MarshalTypeTokenAuthenticationStaticKeysValidationPolicy TokenAuthenticationStaticKeysValidationPolicy
s := struct {
DiscriminatorParam string `json:"type"`
MarshalTypeTokenAuthenticationStaticKeysValidationPolicy
}{
"STATIC_KEYS",
(MarshalTypeTokenAuthenticationStaticKeysValidationPolicy)(m),
}
return json.Marshal(&s)
}
// UnmarshalJSON unmarshals from json
func (m *TokenAuthenticationStaticKeysValidationPolicy) UnmarshalJSON(data []byte) (e error) {
model := struct {
AdditionalValidationPolicy *AdditionalValidationPolicy `json:"additionalValidationPolicy"`
Keys []staticpublickey `json:"keys"`
}{}
e = json.Unmarshal(data, &model)
if e != nil {
return
}
var nn interface{}
m.AdditionalValidationPolicy = model.AdditionalValidationPolicy
m.Keys = make([]StaticPublicKey, len(model.Keys))
for i, n := range model.Keys {
nn, e = n.UnmarshalPolymorphicJSON(n.JsonData)
if e != nil {
return e
}
if nn != nil {
m.Keys[i] = nn.(StaticPublicKey)
} else {
m.Keys[i] = nil
}
}
return
}