bitwarden_api_api/models/
two_factor_recovery_request_model.rs1use serde::{Deserialize, Serialize};
12
13use crate::models;
14
15#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
16pub struct TwoFactorRecoveryRequestModel {
17 #[serde(rename = "masterPasswordHash", skip_serializing_if = "Option::is_none")]
18 pub master_password_hash: Option<String>,
19 #[serde(rename = "otp", skip_serializing_if = "Option::is_none")]
20 pub otp: Option<String>,
21 #[serde(
22 rename = "authRequestAccessCode",
23 skip_serializing_if = "Option::is_none"
24 )]
25 pub auth_request_access_code: Option<String>,
26 #[serde(rename = "secret", skip_serializing_if = "Option::is_none")]
27 pub secret: Option<String>,
28 #[serde(rename = "email")]
29 pub email: String,
30 #[serde(rename = "authRequestId", skip_serializing_if = "Option::is_none")]
31 pub auth_request_id: Option<String>,
32 #[serde(
33 rename = "ssoEmail2FaSessionToken",
34 skip_serializing_if = "Option::is_none"
35 )]
36 pub sso_email2_fa_session_token: Option<String>,
37 #[serde(rename = "recoveryCode")]
38 pub recovery_code: String,
39}
40
41impl TwoFactorRecoveryRequestModel {
42 pub fn new(email: String, recovery_code: String) -> TwoFactorRecoveryRequestModel {
43 TwoFactorRecoveryRequestModel {
44 master_password_hash: None,
45 otp: None,
46 auth_request_access_code: None,
47 secret: None,
48 email,
49 auth_request_id: None,
50 sso_email2_fa_session_token: None,
51 recovery_code,
52 }
53 }
54}