-
Notifications
You must be signed in to change notification settings - Fork 155
/
model_authentication_cipher.go
114 lines (93 loc) · 2.86 KB
/
model_authentication_cipher.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
/*
NetBox REST API
No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
API version: 4.0.3 (4.0)
*/
// Code generated by OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package netbox
import (
"encoding/json"
"fmt"
)
// AuthenticationCipher * `auto` - Auto * `tkip` - TKIP * `aes` - AES
type AuthenticationCipher string
// List of Authentication_cipher
const (
AUTHENTICATIONCIPHER_AUTO AuthenticationCipher = "auto"
AUTHENTICATIONCIPHER_TKIP AuthenticationCipher = "tkip"
AUTHENTICATIONCIPHER_AES AuthenticationCipher = "aes"
AUTHENTICATIONCIPHER_EMPTY AuthenticationCipher = ""
)
// All allowed values of AuthenticationCipher enum
var AllowedAuthenticationCipherEnumValues = []AuthenticationCipher{
"auto",
"tkip",
"aes",
"",
}
func (v *AuthenticationCipher) UnmarshalJSON(src []byte) error {
var value string
err := json.Unmarshal(src, &value)
if err != nil {
return err
}
enumTypeValue := AuthenticationCipher(value)
for _, existing := range AllowedAuthenticationCipherEnumValues {
if existing == enumTypeValue {
*v = enumTypeValue
return nil
}
}
return fmt.Errorf("%+v is not a valid AuthenticationCipher", value)
}
// NewAuthenticationCipherFromValue returns a pointer to a valid AuthenticationCipher
// for the value passed as argument, or an error if the value passed is not allowed by the enum
func NewAuthenticationCipherFromValue(v string) (*AuthenticationCipher, error) {
ev := AuthenticationCipher(v)
if ev.IsValid() {
return &ev, nil
} else {
return nil, fmt.Errorf("invalid value '%v' for AuthenticationCipher: valid values are %v", v, AllowedAuthenticationCipherEnumValues)
}
}
// IsValid return true if the value is valid for the enum, false otherwise
func (v AuthenticationCipher) IsValid() bool {
for _, existing := range AllowedAuthenticationCipherEnumValues {
if existing == v {
return true
}
}
return false
}
// Ptr returns reference to Authentication_cipher value
func (v AuthenticationCipher) Ptr() *AuthenticationCipher {
return &v
}
type NullableAuthenticationCipher struct {
value *AuthenticationCipher
isSet bool
}
func (v NullableAuthenticationCipher) Get() *AuthenticationCipher {
return v.value
}
func (v *NullableAuthenticationCipher) Set(val *AuthenticationCipher) {
v.value = val
v.isSet = true
}
func (v NullableAuthenticationCipher) IsSet() bool {
return v.isSet
}
func (v *NullableAuthenticationCipher) Unset() {
v.value = nil
v.isSet = false
}
func NewNullableAuthenticationCipher(val *AuthenticationCipher) *NullableAuthenticationCipher {
return &NullableAuthenticationCipher{value: val, isSet: true}
}
func (v NullableAuthenticationCipher) MarshalJSON() ([]byte, error) {
return json.Marshal(v.value)
}
func (v *NullableAuthenticationCipher) UnmarshalJSON(src []byte) error {
v.isSet = true
return json.Unmarshal(src, &v.value)
}