bitwarden_api_api/models/
two_factor_authenticator_disable_request_model.rs

1/*
2 * Bitwarden Internal API
3 *
4 * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
5 *
6 * The version of the OpenAPI document: latest
7 *
8 * Generated by: https://openapi-generator.tech
9 */
10
11use serde::{Deserialize, Serialize};
12
13use crate::models;
14
15#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
16pub struct TwoFactorAuthenticatorDisableRequestModel {
17    #[serde(rename = "masterPasswordHash", skip_serializing_if = "Option::is_none")]
18    pub master_password_hash: Option<String>,
19    #[serde(rename = "otp", skip_serializing_if = "Option::is_none")]
20    pub otp: Option<String>,
21    #[serde(
22        rename = "authRequestAccessCode",
23        skip_serializing_if = "Option::is_none"
24    )]
25    pub auth_request_access_code: Option<String>,
26    #[serde(rename = "secret", skip_serializing_if = "Option::is_none")]
27    pub secret: Option<String>,
28    #[serde(rename = "type")]
29    pub r#type: models::TwoFactorProviderType,
30    #[serde(rename = "userVerificationToken")]
31    pub user_verification_token: String,
32    #[serde(rename = "key")]
33    pub key: String,
34}
35
36impl TwoFactorAuthenticatorDisableRequestModel {
37    pub fn new(
38        r#type: models::TwoFactorProviderType,
39        user_verification_token: String,
40        key: String,
41    ) -> TwoFactorAuthenticatorDisableRequestModel {
42        TwoFactorAuthenticatorDisableRequestModel {
43            master_password_hash: None,
44            otp: None,
45            auth_request_access_code: None,
46            secret: None,
47            r#type,
48            user_verification_token,
49            key,
50        }
51    }
52}