bitwarden_api_api/models/
two_factor_authenticator_disable_request_model.rs1use serde::{Deserialize, Serialize};
12
13use crate::models;
14
15#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
16pub struct TwoFactorAuthenticatorDisableRequestModel {
17 #[serde(
18 rename = "masterPasswordHash",
19 alias = "MasterPasswordHash",
20 skip_serializing_if = "Option::is_none"
21 )]
22 pub master_password_hash: Option<String>,
23 #[serde(rename = "otp", alias = "Otp", skip_serializing_if = "Option::is_none")]
24 pub otp: Option<String>,
25 #[serde(
26 rename = "authRequestAccessCode",
27 alias = "AuthRequestAccessCode",
28 skip_serializing_if = "Option::is_none"
29 )]
30 pub auth_request_access_code: Option<String>,
31 #[serde(
32 rename = "secret",
33 alias = "Secret",
34 skip_serializing_if = "Option::is_none"
35 )]
36 pub secret: Option<String>,
37 #[serde(rename = "type", alias = "R#type")]
38 pub r#type: models::TwoFactorProviderType,
39 #[serde(rename = "userVerificationToken", alias = "UserVerificationToken")]
40 pub user_verification_token: String,
41 #[serde(rename = "key", alias = "Key")]
42 pub key: String,
43}
44
45impl TwoFactorAuthenticatorDisableRequestModel {
46 pub fn new(
47 r#type: models::TwoFactorProviderType,
48 user_verification_token: String,
49 key: String,
50 ) -> TwoFactorAuthenticatorDisableRequestModel {
51 TwoFactorAuthenticatorDisableRequestModel {
52 master_password_hash: None,
53 otp: None,
54 auth_request_access_code: None,
55 secret: None,
56 r#type,
57 user_verification_token,
58 key,
59 }
60 }
61}