bitwarden_api_api/models/
two_factor_authenticator_disable_request_model.rs1use serde::{Deserialize, Serialize};
12
13use crate::models;
14
15#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
16pub struct TwoFactorAuthenticatorDisableRequestModel {
17 #[serde(rename = "masterPasswordHash", skip_serializing_if = "Option::is_none")]
18 pub master_password_hash: Option<String>,
19 #[serde(rename = "otp", skip_serializing_if = "Option::is_none")]
20 pub otp: Option<String>,
21 #[serde(
22 rename = "authRequestAccessCode",
23 skip_serializing_if = "Option::is_none"
24 )]
25 pub auth_request_access_code: Option<String>,
26 #[serde(rename = "secret", skip_serializing_if = "Option::is_none")]
27 pub secret: Option<String>,
28 #[serde(rename = "type")]
29 pub r#type: models::TwoFactorProviderType,
30 #[serde(rename = "userVerificationToken")]
31 pub user_verification_token: String,
32 #[serde(rename = "key")]
33 pub key: String,
34}
35
36impl TwoFactorAuthenticatorDisableRequestModel {
37 pub fn new(
38 r#type: models::TwoFactorProviderType,
39 user_verification_token: String,
40 key: String,
41 ) -> TwoFactorAuthenticatorDisableRequestModel {
42 TwoFactorAuthenticatorDisableRequestModel {
43 master_password_hash: None,
44 otp: None,
45 auth_request_access_code: None,
46 secret: None,
47 r#type,
48 user_verification_token,
49 key,
50 }
51 }
52}