495 lines
12 KiB
Go
495 lines
12 KiB
Go
// Code generated by go-swagger; DO NOT EDIT.
|
|
|
|
// This file is part of MinIO Console Server
|
|
// Copyright (c) 2021 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
//
|
|
|
|
package models
|
|
|
|
// This file was generated by the swagger tool.
|
|
// Editing this file might prove futile when you re-run the swagger generate command
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/go-openapi/errors"
|
|
"github.com/go-openapi/strfmt"
|
|
"github.com/go-openapi/swag"
|
|
"github.com/go-openapi/validate"
|
|
)
|
|
|
|
// VaultConfigurationResponse vault configuration response
|
|
//
|
|
// swagger:model vaultConfigurationResponse
|
|
type VaultConfigurationResponse struct {
|
|
|
|
// approle
|
|
// Required: true
|
|
Approle *VaultConfigurationResponseApprole `json:"approle"`
|
|
|
|
// endpoint
|
|
// Required: true
|
|
Endpoint *string `json:"endpoint"`
|
|
|
|
// engine
|
|
Engine string `json:"engine,omitempty"`
|
|
|
|
// namespace
|
|
Namespace string `json:"namespace,omitempty"`
|
|
|
|
// prefix
|
|
Prefix string `json:"prefix,omitempty"`
|
|
|
|
// status
|
|
Status *VaultConfigurationResponseStatus `json:"status,omitempty"`
|
|
|
|
// tls
|
|
TLS *VaultConfigurationResponseTLS `json:"tls,omitempty"`
|
|
}
|
|
|
|
// Validate validates this vault configuration response
|
|
func (m *VaultConfigurationResponse) Validate(formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.validateApprole(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateEndpoint(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateStatus(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateTLS(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponse) validateApprole(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("approle", "body", m.Approle); err != nil {
|
|
return err
|
|
}
|
|
|
|
if m.Approle != nil {
|
|
if err := m.Approle.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("approle")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("approle")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponse) validateEndpoint(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("endpoint", "body", m.Endpoint); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponse) validateStatus(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.Status) { // not required
|
|
return nil
|
|
}
|
|
|
|
if m.Status != nil {
|
|
if err := m.Status.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("status")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("status")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponse) validateTLS(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.TLS) { // not required
|
|
return nil
|
|
}
|
|
|
|
if m.TLS != nil {
|
|
if err := m.TLS.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("tls")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("tls")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ContextValidate validate this vault configuration response based on the context it is used
|
|
func (m *VaultConfigurationResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.contextValidateApprole(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateStatus(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateTLS(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponse) contextValidateApprole(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.Approle != nil {
|
|
if err := m.Approle.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("approle")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("approle")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponse) contextValidateStatus(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.Status != nil {
|
|
if err := m.Status.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("status")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("status")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponse) contextValidateTLS(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.TLS != nil {
|
|
if err := m.TLS.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("tls")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("tls")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// MarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponse) MarshalBinary() ([]byte, error) {
|
|
if m == nil {
|
|
return nil, nil
|
|
}
|
|
return swag.WriteJSON(m)
|
|
}
|
|
|
|
// UnmarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponse) UnmarshalBinary(b []byte) error {
|
|
var res VaultConfigurationResponse
|
|
if err := swag.ReadJSON(b, &res); err != nil {
|
|
return err
|
|
}
|
|
*m = res
|
|
return nil
|
|
}
|
|
|
|
// VaultConfigurationResponseApprole vault configuration response approle
|
|
//
|
|
// swagger:model VaultConfigurationResponseApprole
|
|
type VaultConfigurationResponseApprole struct {
|
|
|
|
// engine
|
|
Engine string `json:"engine,omitempty"`
|
|
|
|
// id
|
|
// Required: true
|
|
ID *string `json:"id"`
|
|
|
|
// retry
|
|
Retry int64 `json:"retry,omitempty"`
|
|
|
|
// secret
|
|
// Required: true
|
|
Secret *string `json:"secret"`
|
|
}
|
|
|
|
// Validate validates this vault configuration response approle
|
|
func (m *VaultConfigurationResponseApprole) Validate(formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.validateID(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateSecret(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponseApprole) validateID(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("approle"+"."+"id", "body", m.ID); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponseApprole) validateSecret(formats strfmt.Registry) error {
|
|
|
|
if err := validate.Required("approle"+"."+"secret", "body", m.Secret); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ContextValidate validates this vault configuration response approle based on context it is used
|
|
func (m *VaultConfigurationResponseApprole) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
|
|
return nil
|
|
}
|
|
|
|
// MarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponseApprole) MarshalBinary() ([]byte, error) {
|
|
if m == nil {
|
|
return nil, nil
|
|
}
|
|
return swag.WriteJSON(m)
|
|
}
|
|
|
|
// UnmarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponseApprole) UnmarshalBinary(b []byte) error {
|
|
var res VaultConfigurationResponseApprole
|
|
if err := swag.ReadJSON(b, &res); err != nil {
|
|
return err
|
|
}
|
|
*m = res
|
|
return nil
|
|
}
|
|
|
|
// VaultConfigurationResponseStatus vault configuration response status
|
|
//
|
|
// swagger:model VaultConfigurationResponseStatus
|
|
type VaultConfigurationResponseStatus struct {
|
|
|
|
// ping
|
|
Ping int64 `json:"ping,omitempty"`
|
|
}
|
|
|
|
// Validate validates this vault configuration response status
|
|
func (m *VaultConfigurationResponseStatus) Validate(formats strfmt.Registry) error {
|
|
return nil
|
|
}
|
|
|
|
// ContextValidate validates this vault configuration response status based on context it is used
|
|
func (m *VaultConfigurationResponseStatus) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
|
|
return nil
|
|
}
|
|
|
|
// MarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponseStatus) MarshalBinary() ([]byte, error) {
|
|
if m == nil {
|
|
return nil, nil
|
|
}
|
|
return swag.WriteJSON(m)
|
|
}
|
|
|
|
// UnmarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponseStatus) UnmarshalBinary(b []byte) error {
|
|
var res VaultConfigurationResponseStatus
|
|
if err := swag.ReadJSON(b, &res); err != nil {
|
|
return err
|
|
}
|
|
*m = res
|
|
return nil
|
|
}
|
|
|
|
// VaultConfigurationResponseTLS vault configuration response TLS
|
|
//
|
|
// swagger:model VaultConfigurationResponseTLS
|
|
type VaultConfigurationResponseTLS struct {
|
|
|
|
// ca
|
|
Ca *CertificateInfo `json:"ca,omitempty"`
|
|
|
|
// crt
|
|
Crt *CertificateInfo `json:"crt,omitempty"`
|
|
}
|
|
|
|
// Validate validates this vault configuration response TLS
|
|
func (m *VaultConfigurationResponseTLS) Validate(formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.validateCa(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.validateCrt(formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponseTLS) validateCa(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.Ca) { // not required
|
|
return nil
|
|
}
|
|
|
|
if m.Ca != nil {
|
|
if err := m.Ca.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("tls" + "." + "ca")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("tls" + "." + "ca")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponseTLS) validateCrt(formats strfmt.Registry) error {
|
|
if swag.IsZero(m.Crt) { // not required
|
|
return nil
|
|
}
|
|
|
|
if m.Crt != nil {
|
|
if err := m.Crt.Validate(formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("tls" + "." + "crt")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("tls" + "." + "crt")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ContextValidate validate this vault configuration response TLS based on the context it is used
|
|
func (m *VaultConfigurationResponseTLS) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
|
|
var res []error
|
|
|
|
if err := m.contextValidateCa(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if err := m.contextValidateCrt(ctx, formats); err != nil {
|
|
res = append(res, err)
|
|
}
|
|
|
|
if len(res) > 0 {
|
|
return errors.CompositeValidationError(res...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponseTLS) contextValidateCa(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.Ca != nil {
|
|
if err := m.Ca.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("tls" + "." + "ca")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("tls" + "." + "ca")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *VaultConfigurationResponseTLS) contextValidateCrt(ctx context.Context, formats strfmt.Registry) error {
|
|
|
|
if m.Crt != nil {
|
|
if err := m.Crt.ContextValidate(ctx, formats); err != nil {
|
|
if ve, ok := err.(*errors.Validation); ok {
|
|
return ve.ValidateName("tls" + "." + "crt")
|
|
} else if ce, ok := err.(*errors.CompositeError); ok {
|
|
return ce.ValidateName("tls" + "." + "crt")
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// MarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponseTLS) MarshalBinary() ([]byte, error) {
|
|
if m == nil {
|
|
return nil, nil
|
|
}
|
|
return swag.WriteJSON(m)
|
|
}
|
|
|
|
// UnmarshalBinary interface implementation
|
|
func (m *VaultConfigurationResponseTLS) UnmarshalBinary(b []byte) error {
|
|
var res VaultConfigurationResponseTLS
|
|
if err := swag.ReadJSON(b, &res); err != nil {
|
|
return err
|
|
}
|
|
*m = res
|
|
return nil
|
|
}
|