fusionauth_rust_client/models/
password_validation_rules.rs1use crate::models;
12use serde::{Deserialize, Serialize};
13
14#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
16pub struct PasswordValidationRules {
17 #[serde(rename = "breachDetection", skip_serializing_if = "Option::is_none")]
18 pub breach_detection: Option<Box<models::PasswordBreachDetection>>,
19 #[serde(rename = "maxLength", skip_serializing_if = "Option::is_none")]
20 pub max_length: Option<i32>,
21 #[serde(rename = "minLength", skip_serializing_if = "Option::is_none")]
22 pub min_length: Option<i32>,
23 #[serde(rename = "rememberPreviousPasswords", skip_serializing_if = "Option::is_none")]
24 pub remember_previous_passwords: Option<Box<models::RememberPreviousPasswords>>,
25 #[serde(rename = "requireMixedCase", skip_serializing_if = "Option::is_none")]
26 pub require_mixed_case: Option<bool>,
27 #[serde(rename = "requireNonAlpha", skip_serializing_if = "Option::is_none")]
28 pub require_non_alpha: Option<bool>,
29 #[serde(rename = "requireNumber", skip_serializing_if = "Option::is_none")]
30 pub require_number: Option<bool>,
31 #[serde(rename = "validateOnLogin", skip_serializing_if = "Option::is_none")]
32 pub validate_on_login: Option<bool>,
33}
34
35impl PasswordValidationRules {
36 pub fn new() -> PasswordValidationRules {
38 PasswordValidationRules {
39 breach_detection: None,
40 max_length: None,
41 min_length: None,
42 remember_previous_passwords: None,
43 require_mixed_case: None,
44 require_non_alpha: None,
45 require_number: None,
46 validate_on_login: None,
47 }
48 }
49}
50