migrating cred data models to airavata datamodel directory
Project: http://git-wip-us.apache.org/repos/asf/airavata/repo Commit: http://git-wip-us.apache.org/repos/asf/airavata/commit/122fb8da Tree: http://git-wip-us.apache.org/repos/asf/airavata/tree/122fb8da Diff: http://git-wip-us.apache.org/repos/asf/airavata/diff/122fb8da Branch: refs/heads/develop Commit: 122fb8da06408b1f203006e88a97e923be4fbc2a Parents: 4d5b61c Author: Anuj Bhandar <[email protected]> Authored: Mon Dec 12 04:18:06 2016 -0500 Committer: Anuj Bhandar <[email protected]> Committed: Mon Dec 12 04:18:06 2016 -0500 ---------------------------------------------------------------------- .../server/handler/AiravataServerHandler.java | 10 +- .../DefaultAiravataSecurityManager.java | 2 +- .../java/org/apache/airavata/api/Airavata.java | 38 +- .../credential/store/CertificateCredential.java | 1142 ++++++++++++++++ .../model/credential/store/CommunityUser.java | 608 +++++++++ .../credential/store/CredentialOwnerType.java | 62 + .../credential/store/PasswordCredential.java | 1028 ++++++++++++++ .../model/credential/store/SSHCredential.java | 1265 +++++++++++++++++ .../credential/store/SSHCredentialSummary.java | 927 +++++++++++++ .../credential_store_data_modelsConstants.java | 58 + .../monitoring/ClusterStatusMonitorJob.java | 2 +- .../store/credential/CredentialOwnerType.java | 12 +- .../server/CredentialStoreServerHandler.java | 10 +- .../credential/store/client/TestSSLClient.java | 6 +- .../store/cpi/CredentialStoreService.java | 356 ++--- .../store/datamodel/APICredential.java | 723 ---------- .../store/datamodel/CertificateCredential.java | 1149 ---------------- .../store/datamodel/CommunityUser.java | 609 --------- .../store/datamodel/CredentialOwnerType.java | 61 - .../store/datamodel/PasswordCredential.java | 1032 -------------- .../store/datamodel/SSHCredential.java | 1277 ------------------ .../store/datamodel/SSHCredentialSummary.java | 931 ------------- .../credential_store_data_modelsConstants.java | 57 - .../data-models/airavata_data_models.thrift | 1 + .../credential_store_data_models.thrift | 2 +- 25 files changed, 5310 insertions(+), 6058 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/airavata/blob/122fb8da/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/handler/AiravataServerHandler.java ---------------------------------------------------------------------- diff --git a/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/handler/AiravataServerHandler.java b/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/handler/AiravataServerHandler.java index 6eca4a0..c3a7dd1 100644 --- a/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/handler/AiravataServerHandler.java +++ b/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/handler/AiravataServerHandler.java @@ -31,10 +31,10 @@ import org.apache.airavata.common.utils.Constants; import org.apache.airavata.common.utils.ServerSettings; import org.apache.airavata.credential.store.client.CredentialStoreClientFactory; import org.apache.airavata.credential.store.cpi.CredentialStoreService; -import org.apache.airavata.credential.store.datamodel.CredentialOwnerType; -import org.apache.airavata.credential.store.datamodel.PasswordCredential; -import org.apache.airavata.credential.store.datamodel.SSHCredential; -import org.apache.airavata.credential.store.datamodel.SSHCredentialSummary; +import org.apache.airavata.model.credential.store.CredentialOwnerType; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.credential.store.SSHCredential; +import org.apache.airavata.model.credential.store.SSHCredentialSummary; import org.apache.airavata.credential.store.exception.CredentialStoreException; import org.apache.airavata.messaging.core.MessageContext; import org.apache.airavata.messaging.core.MessagingFactory; @@ -3401,7 +3401,7 @@ public class AiravataServerHandler implements Airavata.Iface { /** * Register a User Resource Profile. * - * @param UserResourceProfile User Resource Profile Object. + * @param userResourceProfile User Resource Profile Object. * The userId should be obtained from Airavata user profile registration and passed to register a corresponding * resource profile. * @return status. http://git-wip-us.apache.org/repos/asf/airavata/blob/122fb8da/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/security/DefaultAiravataSecurityManager.java ---------------------------------------------------------------------- diff --git a/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/security/DefaultAiravataSecurityManager.java b/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/security/DefaultAiravataSecurityManager.java index 3dbab86..1201a9a 100644 --- a/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/security/DefaultAiravataSecurityManager.java +++ b/airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/security/DefaultAiravataSecurityManager.java @@ -29,7 +29,7 @@ import org.apache.airavata.common.utils.Constants; import org.apache.airavata.common.utils.ServerSettings; import org.apache.airavata.credential.store.client.CredentialStoreClientFactory; import org.apache.airavata.credential.store.cpi.CredentialStoreService; -import org.apache.airavata.credential.store.datamodel.PasswordCredential; +import org.apache.airavata.model.credential.store.PasswordCredential; import org.apache.airavata.credential.store.exception.CredentialStoreException; import org.apache.airavata.model.appcatalog.gatewayprofile.GatewayResourceProfile; import org.apache.airavata.model.security.AuthzToken; http://git-wip-us.apache.org/repos/asf/airavata/blob/122fb8da/airavata-api/airavata-api-stubs/src/main/java/org/apache/airavata/api/Airavata.java ---------------------------------------------------------------------- diff --git a/airavata-api/airavata-api-stubs/src/main/java/org/apache/airavata/api/Airavata.java b/airavata-api/airavata-api-stubs/src/main/java/org/apache/airavata/api/Airavata.java index 78d2810..a6af662 100644 --- a/airavata-api/airavata-api-stubs/src/main/java/org/apache/airavata/api/Airavata.java +++ b/airavata-api/airavata-api-stubs/src/main/java/org/apache/airavata/api/Airavata.java @@ -236,7 +236,7 @@ public class Airavata { * @param description * @param credentialOwnerType */ - public String generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType) throws org.apache.airavata.model.error.InvalidRequestException, org.apache.airavata.model.error.AiravataClientException, org.apache.airavata.model.error.AiravataSystemException, org.apache.thrift.TException; + public String generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType) throws org.apache.airavata.model.error.InvalidRequestException, org.apache.airavata.model.error.AiravataClientException, org.apache.airavata.model.error.AiravataSystemException, org.apache.thrift.TException; /** * Generate and Register Username PWD Pair with Airavata Credential Store. @@ -3033,7 +3033,7 @@ public class Airavata { public void getAllNotifications(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException; - public void generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException; + public void generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException; public void registerPwdCredential(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String portalUserName, String loginUserName, String password, String description, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException; @@ -3871,13 +3871,13 @@ public class Airavata { throw new org.apache.thrift.TApplicationException(org.apache.thrift.TApplicationException.MISSING_RESULT, "getAllNotifications failed: unknown result"); } - public String generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType) throws org.apache.airavata.model.error.InvalidRequestException, org.apache.airavata.model.error.AiravataClientException, org.apache.airavata.model.error.AiravataSystemException, org.apache.thrift.TException + public String generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType) throws org.apache.airavata.model.error.InvalidRequestException, org.apache.airavata.model.error.AiravataClientException, org.apache.airavata.model.error.AiravataSystemException, org.apache.thrift.TException { send_generateAndRegisterSSHKeys(authzToken, gatewayId, userName, description, credentialOwnerType); return recv_generateAndRegisterSSHKeys(); } - public void send_generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType) throws org.apache.thrift.TException + public void send_generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType) throws org.apache.thrift.TException { generateAndRegisterSSHKeys_args args = new generateAndRegisterSSHKeys_args(); args.setAuthzToken(authzToken); @@ -10089,7 +10089,7 @@ public class Airavata { } } - public void generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException { + public void generateAndRegisterSSHKeys(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException { checkReady(); generateAndRegisterSSHKeys_call method_call = new generateAndRegisterSSHKeys_call(authzToken, gatewayId, userName, description, credentialOwnerType, resultHandler, this, ___protocolFactory, ___transport); this.___currentMethod = method_call; @@ -10101,8 +10101,8 @@ public class Airavata { private String gatewayId; private String userName; private String description; - private org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType; - public generateAndRegisterSSHKeys_call(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType, org.apache.thrift.async.AsyncMethodCallback resultHandler, org.apache.thrift.async.TAsyncClient client, org.apache.thrift.protocol.TProtocolFactory protocolFactory, org.apache.thrift.transport.TNonblockingTransport transport) throws org.apache.thrift.TException { + private org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType; + public generateAndRegisterSSHKeys_call(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayId, String userName, String description, org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType, org.apache.thrift.async.AsyncMethodCallback resultHandler, org.apache.thrift.async.TAsyncClient client, org.apache.thrift.protocol.TProtocolFactory protocolFactory, org.apache.thrift.transport.TNonblockingTransport transport) throws org.apache.thrift.TException { super(client, protocolFactory, transport, resultHandler, false); this.authzToken = authzToken; this.gatewayId = gatewayId; @@ -51566,9 +51566,9 @@ public class Airavata { public String description; // required /** * - * @see org.apache.airavata.credential.store.datamodel.CredentialOwnerType + * @see org.apache.airavata.model.credential.store.CredentialOwnerType */ - public org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType; // required + public org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType; // required /** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */ public enum _Fields implements org.apache.thrift.TFieldIdEnum { @@ -51578,7 +51578,7 @@ public class Airavata { DESCRIPTION((short)4, "description"), /** * - * @see org.apache.airavata.credential.store.datamodel.CredentialOwnerType + * @see org.apache.airavata.model.credential.store.CredentialOwnerType */ CREDENTIAL_OWNER_TYPE((short)5, "credentialOwnerType"); @@ -51657,7 +51657,7 @@ public class Airavata { tmpMap.put(_Fields.DESCRIPTION, new org.apache.thrift.meta_data.FieldMetaData("description", org.apache.thrift.TFieldRequirementType.DEFAULT, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); tmpMap.put(_Fields.CREDENTIAL_OWNER_TYPE, new org.apache.thrift.meta_data.FieldMetaData("credentialOwnerType", org.apache.thrift.TFieldRequirementType.DEFAULT, - new org.apache.thrift.meta_data.EnumMetaData(org.apache.thrift.protocol.TType.ENUM, org.apache.airavata.credential.store.datamodel.CredentialOwnerType.class))); + new org.apache.thrift.meta_data.EnumMetaData(org.apache.thrift.protocol.TType.ENUM, org.apache.airavata.model.credential.store.CredentialOwnerType.class))); metaDataMap = Collections.unmodifiableMap(tmpMap); org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(generateAndRegisterSSHKeys_args.class, metaDataMap); } @@ -51670,7 +51670,7 @@ public class Airavata { String gatewayId, String userName, String description, - org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType) + org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType) { this(); this.authzToken = authzToken; @@ -51812,17 +51812,17 @@ public class Airavata { /** * - * @see org.apache.airavata.credential.store.datamodel.CredentialOwnerType + * @see org.apache.airavata.model.credential.store.CredentialOwnerType */ - public org.apache.airavata.credential.store.datamodel.CredentialOwnerType getCredentialOwnerType() { + public org.apache.airavata.model.credential.store.CredentialOwnerType getCredentialOwnerType() { return this.credentialOwnerType; } /** * - * @see org.apache.airavata.credential.store.datamodel.CredentialOwnerType + * @see org.apache.airavata.model.credential.store.CredentialOwnerType */ - public generateAndRegisterSSHKeys_args setCredentialOwnerType(org.apache.airavata.credential.store.datamodel.CredentialOwnerType credentialOwnerType) { + public generateAndRegisterSSHKeys_args setCredentialOwnerType(org.apache.airavata.model.credential.store.CredentialOwnerType credentialOwnerType) { this.credentialOwnerType = credentialOwnerType; return this; } @@ -51880,7 +51880,7 @@ public class Airavata { if (value == null) { unsetCredentialOwnerType(); } else { - setCredentialOwnerType((org.apache.airavata.credential.store.datamodel.CredentialOwnerType)value); + setCredentialOwnerType((org.apache.airavata.model.credential.store.CredentialOwnerType)value); } break; @@ -52229,7 +52229,7 @@ public class Airavata { break; case 5: // CREDENTIAL_OWNER_TYPE if (schemeField.type == org.apache.thrift.protocol.TType.I32) { - struct.credentialOwnerType = org.apache.airavata.credential.store.datamodel.CredentialOwnerType.findByValue(iprot.readI32()); + struct.credentialOwnerType = org.apache.airavata.model.credential.store.CredentialOwnerType.findByValue(iprot.readI32()); struct.setCredentialOwnerTypeIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); @@ -52327,7 +52327,7 @@ public class Airavata { struct.setDescriptionIsSet(true); } if (incoming.get(1)) { - struct.credentialOwnerType = org.apache.airavata.credential.store.datamodel.CredentialOwnerType.findByValue(iprot.readI32()); + struct.credentialOwnerType = org.apache.airavata.model.credential.store.CredentialOwnerType.findByValue(iprot.readI32()); struct.setCredentialOwnerTypeIsSet(true); } } http://git-wip-us.apache.org/repos/asf/airavata/blob/122fb8da/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CertificateCredential.java ---------------------------------------------------------------------- diff --git a/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CertificateCredential.java b/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CertificateCredential.java new file mode 100644 index 0000000..c1d959c --- /dev/null +++ b/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CertificateCredential.java @@ -0,0 +1,1142 @@ +/** + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * Autogenerated by Thrift Compiler (0.9.3) + * + * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING + * @generated + */ +package org.apache.airavata.model.credential.store; + +import org.apache.thrift.scheme.IScheme; +import org.apache.thrift.scheme.SchemeFactory; +import org.apache.thrift.scheme.StandardScheme; + +import org.apache.thrift.scheme.TupleScheme; +import org.apache.thrift.protocol.TTupleProtocol; +import org.apache.thrift.protocol.TProtocolException; +import org.apache.thrift.EncodingUtils; +import org.apache.thrift.TException; +import org.apache.thrift.async.AsyncMethodCallback; +import org.apache.thrift.server.AbstractNonblockingServer.*; +import java.util.List; +import java.util.ArrayList; +import java.util.Map; +import java.util.HashMap; +import java.util.EnumMap; +import java.util.Set; +import java.util.HashSet; +import java.util.EnumSet; +import java.util.Collections; +import java.util.BitSet; +import java.nio.ByteBuffer; +import java.util.Arrays; +import javax.annotation.Generated; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; + +@SuppressWarnings({"cast", "rawtypes", "serial", "unchecked"}) +@Generated(value = "Autogenerated by Thrift Compiler (0.9.3)") +public class CertificateCredential implements org.apache.thrift.TBase<CertificateCredential, CertificateCredential._Fields>, java.io.Serializable, Cloneable, Comparable<CertificateCredential> { + private static final org.apache.thrift.protocol.TStruct STRUCT_DESC = new org.apache.thrift.protocol.TStruct("CertificateCredential"); + + private static final org.apache.thrift.protocol.TField COMMUNITY_USER_FIELD_DESC = new org.apache.thrift.protocol.TField("communityUser", org.apache.thrift.protocol.TType.STRUCT, (short)1); + private static final org.apache.thrift.protocol.TField X509_CERT_FIELD_DESC = new org.apache.thrift.protocol.TField("x509Cert", org.apache.thrift.protocol.TType.STRING, (short)2); + private static final org.apache.thrift.protocol.TField NOT_AFTER_FIELD_DESC = new org.apache.thrift.protocol.TField("notAfter", org.apache.thrift.protocol.TType.STRING, (short)3); + private static final org.apache.thrift.protocol.TField PRIVATE_KEY_FIELD_DESC = new org.apache.thrift.protocol.TField("privateKey", org.apache.thrift.protocol.TType.STRING, (short)4); + private static final org.apache.thrift.protocol.TField LIFE_TIME_FIELD_DESC = new org.apache.thrift.protocol.TField("lifeTime", org.apache.thrift.protocol.TType.I64, (short)5); + private static final org.apache.thrift.protocol.TField NOT_BEFORE_FIELD_DESC = new org.apache.thrift.protocol.TField("notBefore", org.apache.thrift.protocol.TType.STRING, (short)6); + private static final org.apache.thrift.protocol.TField PERSISTED_TIME_FIELD_DESC = new org.apache.thrift.protocol.TField("persistedTime", org.apache.thrift.protocol.TType.I64, (short)7); + private static final org.apache.thrift.protocol.TField TOKEN_FIELD_DESC = new org.apache.thrift.protocol.TField("token", org.apache.thrift.protocol.TType.STRING, (short)8); + + private static final Map<Class<? extends IScheme>, SchemeFactory> schemes = new HashMap<Class<? extends IScheme>, SchemeFactory>(); + static { + schemes.put(StandardScheme.class, new CertificateCredentialStandardSchemeFactory()); + schemes.put(TupleScheme.class, new CertificateCredentialTupleSchemeFactory()); + } + + private CommunityUser communityUser; // required + private String x509Cert; // required + private String notAfter; // optional + private String privateKey; // optional + private long lifeTime; // optional + private String notBefore; // optional + private long persistedTime; // optional + private String token; // optional + + /** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */ + public enum _Fields implements org.apache.thrift.TFieldIdEnum { + COMMUNITY_USER((short)1, "communityUser"), + X509_CERT((short)2, "x509Cert"), + NOT_AFTER((short)3, "notAfter"), + PRIVATE_KEY((short)4, "privateKey"), + LIFE_TIME((short)5, "lifeTime"), + NOT_BEFORE((short)6, "notBefore"), + PERSISTED_TIME((short)7, "persistedTime"), + TOKEN((short)8, "token"); + + private static final Map<String, _Fields> byName = new HashMap<String, _Fields>(); + + static { + for (_Fields field : EnumSet.allOf(_Fields.class)) { + byName.put(field.getFieldName(), field); + } + } + + /** + * Find the _Fields constant that matches fieldId, or null if its not found. + */ + public static _Fields findByThriftId(int fieldId) { + switch(fieldId) { + case 1: // COMMUNITY_USER + return COMMUNITY_USER; + case 2: // X509_CERT + return X509_CERT; + case 3: // NOT_AFTER + return NOT_AFTER; + case 4: // PRIVATE_KEY + return PRIVATE_KEY; + case 5: // LIFE_TIME + return LIFE_TIME; + case 6: // NOT_BEFORE + return NOT_BEFORE; + case 7: // PERSISTED_TIME + return PERSISTED_TIME; + case 8: // TOKEN + return TOKEN; + default: + return null; + } + } + + /** + * Find the _Fields constant that matches fieldId, throwing an exception + * if it is not found. + */ + public static _Fields findByThriftIdOrThrow(int fieldId) { + _Fields fields = findByThriftId(fieldId); + if (fields == null) throw new IllegalArgumentException("Field " + fieldId + " doesn't exist!"); + return fields; + } + + /** + * Find the _Fields constant that matches name, or null if its not found. + */ + public static _Fields findByName(String name) { + return byName.get(name); + } + + private final short _thriftId; + private final String _fieldName; + + _Fields(short thriftId, String fieldName) { + _thriftId = thriftId; + _fieldName = fieldName; + } + + public short getThriftFieldId() { + return _thriftId; + } + + public String getFieldName() { + return _fieldName; + } + } + + // isset id assignments + private static final int __LIFETIME_ISSET_ID = 0; + private static final int __PERSISTEDTIME_ISSET_ID = 1; + private byte __isset_bitfield = 0; + private static final _Fields optionals[] = {_Fields.NOT_AFTER,_Fields.PRIVATE_KEY,_Fields.LIFE_TIME,_Fields.NOT_BEFORE,_Fields.PERSISTED_TIME,_Fields.TOKEN}; + public static final Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> metaDataMap; + static { + Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> tmpMap = new EnumMap<_Fields, org.apache.thrift.meta_data.FieldMetaData>(_Fields.class); + tmpMap.put(_Fields.COMMUNITY_USER, new org.apache.thrift.meta_data.FieldMetaData("communityUser", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.StructMetaData(org.apache.thrift.protocol.TType.STRUCT, CommunityUser.class))); + tmpMap.put(_Fields.X509_CERT, new org.apache.thrift.meta_data.FieldMetaData("x509Cert", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.NOT_AFTER, new org.apache.thrift.meta_data.FieldMetaData("notAfter", org.apache.thrift.TFieldRequirementType.OPTIONAL, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.PRIVATE_KEY, new org.apache.thrift.meta_data.FieldMetaData("privateKey", org.apache.thrift.TFieldRequirementType.OPTIONAL, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.LIFE_TIME, new org.apache.thrift.meta_data.FieldMetaData("lifeTime", org.apache.thrift.TFieldRequirementType.OPTIONAL, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.I64))); + tmpMap.put(_Fields.NOT_BEFORE, new org.apache.thrift.meta_data.FieldMetaData("notBefore", org.apache.thrift.TFieldRequirementType.OPTIONAL, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.PERSISTED_TIME, new org.apache.thrift.meta_data.FieldMetaData("persistedTime", org.apache.thrift.TFieldRequirementType.OPTIONAL, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.I64))); + tmpMap.put(_Fields.TOKEN, new org.apache.thrift.meta_data.FieldMetaData("token", org.apache.thrift.TFieldRequirementType.OPTIONAL, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + metaDataMap = Collections.unmodifiableMap(tmpMap); + org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(CertificateCredential.class, metaDataMap); + } + + public CertificateCredential() { + } + + public CertificateCredential( + CommunityUser communityUser, + String x509Cert) + { + this(); + this.communityUser = communityUser; + this.x509Cert = x509Cert; + } + + /** + * Performs a deep copy on <i>other</i>. + */ + public CertificateCredential(CertificateCredential other) { + __isset_bitfield = other.__isset_bitfield; + if (other.isSetCommunityUser()) { + this.communityUser = new CommunityUser(other.communityUser); + } + if (other.isSetX509Cert()) { + this.x509Cert = other.x509Cert; + } + if (other.isSetNotAfter()) { + this.notAfter = other.notAfter; + } + if (other.isSetPrivateKey()) { + this.privateKey = other.privateKey; + } + this.lifeTime = other.lifeTime; + if (other.isSetNotBefore()) { + this.notBefore = other.notBefore; + } + this.persistedTime = other.persistedTime; + if (other.isSetToken()) { + this.token = other.token; + } + } + + public CertificateCredential deepCopy() { + return new CertificateCredential(this); + } + + @Override + public void clear() { + this.communityUser = null; + this.x509Cert = null; + this.notAfter = null; + this.privateKey = null; + setLifeTimeIsSet(false); + this.lifeTime = 0; + this.notBefore = null; + setPersistedTimeIsSet(false); + this.persistedTime = 0; + this.token = null; + } + + public CommunityUser getCommunityUser() { + return this.communityUser; + } + + public void setCommunityUser(CommunityUser communityUser) { + this.communityUser = communityUser; + } + + public void unsetCommunityUser() { + this.communityUser = null; + } + + /** Returns true if field communityUser is set (has been assigned a value) and false otherwise */ + public boolean isSetCommunityUser() { + return this.communityUser != null; + } + + public void setCommunityUserIsSet(boolean value) { + if (!value) { + this.communityUser = null; + } + } + + public String getX509Cert() { + return this.x509Cert; + } + + public void setX509Cert(String x509Cert) { + this.x509Cert = x509Cert; + } + + public void unsetX509Cert() { + this.x509Cert = null; + } + + /** Returns true if field x509Cert is set (has been assigned a value) and false otherwise */ + public boolean isSetX509Cert() { + return this.x509Cert != null; + } + + public void setX509CertIsSet(boolean value) { + if (!value) { + this.x509Cert = null; + } + } + + public String getNotAfter() { + return this.notAfter; + } + + public void setNotAfter(String notAfter) { + this.notAfter = notAfter; + } + + public void unsetNotAfter() { + this.notAfter = null; + } + + /** Returns true if field notAfter is set (has been assigned a value) and false otherwise */ + public boolean isSetNotAfter() { + return this.notAfter != null; + } + + public void setNotAfterIsSet(boolean value) { + if (!value) { + this.notAfter = null; + } + } + + public String getPrivateKey() { + return this.privateKey; + } + + public void setPrivateKey(String privateKey) { + this.privateKey = privateKey; + } + + public void unsetPrivateKey() { + this.privateKey = null; + } + + /** Returns true if field privateKey is set (has been assigned a value) and false otherwise */ + public boolean isSetPrivateKey() { + return this.privateKey != null; + } + + public void setPrivateKeyIsSet(boolean value) { + if (!value) { + this.privateKey = null; + } + } + + public long getLifeTime() { + return this.lifeTime; + } + + public void setLifeTime(long lifeTime) { + this.lifeTime = lifeTime; + setLifeTimeIsSet(true); + } + + public void unsetLifeTime() { + __isset_bitfield = EncodingUtils.clearBit(__isset_bitfield, __LIFETIME_ISSET_ID); + } + + /** Returns true if field lifeTime is set (has been assigned a value) and false otherwise */ + public boolean isSetLifeTime() { + return EncodingUtils.testBit(__isset_bitfield, __LIFETIME_ISSET_ID); + } + + public void setLifeTimeIsSet(boolean value) { + __isset_bitfield = EncodingUtils.setBit(__isset_bitfield, __LIFETIME_ISSET_ID, value); + } + + public String getNotBefore() { + return this.notBefore; + } + + public void setNotBefore(String notBefore) { + this.notBefore = notBefore; + } + + public void unsetNotBefore() { + this.notBefore = null; + } + + /** Returns true if field notBefore is set (has been assigned a value) and false otherwise */ + public boolean isSetNotBefore() { + return this.notBefore != null; + } + + public void setNotBeforeIsSet(boolean value) { + if (!value) { + this.notBefore = null; + } + } + + public long getPersistedTime() { + return this.persistedTime; + } + + public void setPersistedTime(long persistedTime) { + this.persistedTime = persistedTime; + setPersistedTimeIsSet(true); + } + + public void unsetPersistedTime() { + __isset_bitfield = EncodingUtils.clearBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID); + } + + /** Returns true if field persistedTime is set (has been assigned a value) and false otherwise */ + public boolean isSetPersistedTime() { + return EncodingUtils.testBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID); + } + + public void setPersistedTimeIsSet(boolean value) { + __isset_bitfield = EncodingUtils.setBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID, value); + } + + public String getToken() { + return this.token; + } + + public void setToken(String token) { + this.token = token; + } + + public void unsetToken() { + this.token = null; + } + + /** Returns true if field token is set (has been assigned a value) and false otherwise */ + public boolean isSetToken() { + return this.token != null; + } + + public void setTokenIsSet(boolean value) { + if (!value) { + this.token = null; + } + } + + public void setFieldValue(_Fields field, Object value) { + switch (field) { + case COMMUNITY_USER: + if (value == null) { + unsetCommunityUser(); + } else { + setCommunityUser((CommunityUser)value); + } + break; + + case X509_CERT: + if (value == null) { + unsetX509Cert(); + } else { + setX509Cert((String)value); + } + break; + + case NOT_AFTER: + if (value == null) { + unsetNotAfter(); + } else { + setNotAfter((String)value); + } + break; + + case PRIVATE_KEY: + if (value == null) { + unsetPrivateKey(); + } else { + setPrivateKey((String)value); + } + break; + + case LIFE_TIME: + if (value == null) { + unsetLifeTime(); + } else { + setLifeTime((Long)value); + } + break; + + case NOT_BEFORE: + if (value == null) { + unsetNotBefore(); + } else { + setNotBefore((String)value); + } + break; + + case PERSISTED_TIME: + if (value == null) { + unsetPersistedTime(); + } else { + setPersistedTime((Long)value); + } + break; + + case TOKEN: + if (value == null) { + unsetToken(); + } else { + setToken((String)value); + } + break; + + } + } + + public Object getFieldValue(_Fields field) { + switch (field) { + case COMMUNITY_USER: + return getCommunityUser(); + + case X509_CERT: + return getX509Cert(); + + case NOT_AFTER: + return getNotAfter(); + + case PRIVATE_KEY: + return getPrivateKey(); + + case LIFE_TIME: + return getLifeTime(); + + case NOT_BEFORE: + return getNotBefore(); + + case PERSISTED_TIME: + return getPersistedTime(); + + case TOKEN: + return getToken(); + + } + throw new IllegalStateException(); + } + + /** Returns true if field corresponding to fieldID is set (has been assigned a value) and false otherwise */ + public boolean isSet(_Fields field) { + if (field == null) { + throw new IllegalArgumentException(); + } + + switch (field) { + case COMMUNITY_USER: + return isSetCommunityUser(); + case X509_CERT: + return isSetX509Cert(); + case NOT_AFTER: + return isSetNotAfter(); + case PRIVATE_KEY: + return isSetPrivateKey(); + case LIFE_TIME: + return isSetLifeTime(); + case NOT_BEFORE: + return isSetNotBefore(); + case PERSISTED_TIME: + return isSetPersistedTime(); + case TOKEN: + return isSetToken(); + } + throw new IllegalStateException(); + } + + @Override + public boolean equals(Object that) { + if (that == null) + return false; + if (that instanceof CertificateCredential) + return this.equals((CertificateCredential)that); + return false; + } + + public boolean equals(CertificateCredential that) { + if (that == null) + return false; + + boolean this_present_communityUser = true && this.isSetCommunityUser(); + boolean that_present_communityUser = true && that.isSetCommunityUser(); + if (this_present_communityUser || that_present_communityUser) { + if (!(this_present_communityUser && that_present_communityUser)) + return false; + if (!this.communityUser.equals(that.communityUser)) + return false; + } + + boolean this_present_x509Cert = true && this.isSetX509Cert(); + boolean that_present_x509Cert = true && that.isSetX509Cert(); + if (this_present_x509Cert || that_present_x509Cert) { + if (!(this_present_x509Cert && that_present_x509Cert)) + return false; + if (!this.x509Cert.equals(that.x509Cert)) + return false; + } + + boolean this_present_notAfter = true && this.isSetNotAfter(); + boolean that_present_notAfter = true && that.isSetNotAfter(); + if (this_present_notAfter || that_present_notAfter) { + if (!(this_present_notAfter && that_present_notAfter)) + return false; + if (!this.notAfter.equals(that.notAfter)) + return false; + } + + boolean this_present_privateKey = true && this.isSetPrivateKey(); + boolean that_present_privateKey = true && that.isSetPrivateKey(); + if (this_present_privateKey || that_present_privateKey) { + if (!(this_present_privateKey && that_present_privateKey)) + return false; + if (!this.privateKey.equals(that.privateKey)) + return false; + } + + boolean this_present_lifeTime = true && this.isSetLifeTime(); + boolean that_present_lifeTime = true && that.isSetLifeTime(); + if (this_present_lifeTime || that_present_lifeTime) { + if (!(this_present_lifeTime && that_present_lifeTime)) + return false; + if (this.lifeTime != that.lifeTime) + return false; + } + + boolean this_present_notBefore = true && this.isSetNotBefore(); + boolean that_present_notBefore = true && that.isSetNotBefore(); + if (this_present_notBefore || that_present_notBefore) { + if (!(this_present_notBefore && that_present_notBefore)) + return false; + if (!this.notBefore.equals(that.notBefore)) + return false; + } + + boolean this_present_persistedTime = true && this.isSetPersistedTime(); + boolean that_present_persistedTime = true && that.isSetPersistedTime(); + if (this_present_persistedTime || that_present_persistedTime) { + if (!(this_present_persistedTime && that_present_persistedTime)) + return false; + if (this.persistedTime != that.persistedTime) + return false; + } + + boolean this_present_token = true && this.isSetToken(); + boolean that_present_token = true && that.isSetToken(); + if (this_present_token || that_present_token) { + if (!(this_present_token && that_present_token)) + return false; + if (!this.token.equals(that.token)) + return false; + } + + return true; + } + + @Override + public int hashCode() { + List<Object> list = new ArrayList<Object>(); + + boolean present_communityUser = true && (isSetCommunityUser()); + list.add(present_communityUser); + if (present_communityUser) + list.add(communityUser); + + boolean present_x509Cert = true && (isSetX509Cert()); + list.add(present_x509Cert); + if (present_x509Cert) + list.add(x509Cert); + + boolean present_notAfter = true && (isSetNotAfter()); + list.add(present_notAfter); + if (present_notAfter) + list.add(notAfter); + + boolean present_privateKey = true && (isSetPrivateKey()); + list.add(present_privateKey); + if (present_privateKey) + list.add(privateKey); + + boolean present_lifeTime = true && (isSetLifeTime()); + list.add(present_lifeTime); + if (present_lifeTime) + list.add(lifeTime); + + boolean present_notBefore = true && (isSetNotBefore()); + list.add(present_notBefore); + if (present_notBefore) + list.add(notBefore); + + boolean present_persistedTime = true && (isSetPersistedTime()); + list.add(present_persistedTime); + if (present_persistedTime) + list.add(persistedTime); + + boolean present_token = true && (isSetToken()); + list.add(present_token); + if (present_token) + list.add(token); + + return list.hashCode(); + } + + @Override + public int compareTo(CertificateCredential other) { + if (!getClass().equals(other.getClass())) { + return getClass().getName().compareTo(other.getClass().getName()); + } + + int lastComparison = 0; + + lastComparison = Boolean.valueOf(isSetCommunityUser()).compareTo(other.isSetCommunityUser()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetCommunityUser()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.communityUser, other.communityUser); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetX509Cert()).compareTo(other.isSetX509Cert()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetX509Cert()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.x509Cert, other.x509Cert); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetNotAfter()).compareTo(other.isSetNotAfter()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetNotAfter()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.notAfter, other.notAfter); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetPrivateKey()).compareTo(other.isSetPrivateKey()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetPrivateKey()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.privateKey, other.privateKey); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetLifeTime()).compareTo(other.isSetLifeTime()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetLifeTime()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.lifeTime, other.lifeTime); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetNotBefore()).compareTo(other.isSetNotBefore()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetNotBefore()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.notBefore, other.notBefore); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetPersistedTime()).compareTo(other.isSetPersistedTime()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetPersistedTime()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.persistedTime, other.persistedTime); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetToken()).compareTo(other.isSetToken()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetToken()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.token, other.token); + if (lastComparison != 0) { + return lastComparison; + } + } + return 0; + } + + public _Fields fieldForId(int fieldId) { + return _Fields.findByThriftId(fieldId); + } + + public void read(org.apache.thrift.protocol.TProtocol iprot) throws org.apache.thrift.TException { + schemes.get(iprot.getScheme()).getScheme().read(iprot, this); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot) throws org.apache.thrift.TException { + schemes.get(oprot.getScheme()).getScheme().write(oprot, this); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder("CertificateCredential("); + boolean first = true; + + sb.append("communityUser:"); + if (this.communityUser == null) { + sb.append("null"); + } else { + sb.append(this.communityUser); + } + first = false; + if (!first) sb.append(", "); + sb.append("x509Cert:"); + if (this.x509Cert == null) { + sb.append("null"); + } else { + sb.append(this.x509Cert); + } + first = false; + if (isSetNotAfter()) { + if (!first) sb.append(", "); + sb.append("notAfter:"); + if (this.notAfter == null) { + sb.append("null"); + } else { + sb.append(this.notAfter); + } + first = false; + } + if (isSetPrivateKey()) { + if (!first) sb.append(", "); + sb.append("privateKey:"); + if (this.privateKey == null) { + sb.append("null"); + } else { + sb.append(this.privateKey); + } + first = false; + } + if (isSetLifeTime()) { + if (!first) sb.append(", "); + sb.append("lifeTime:"); + sb.append(this.lifeTime); + first = false; + } + if (isSetNotBefore()) { + if (!first) sb.append(", "); + sb.append("notBefore:"); + if (this.notBefore == null) { + sb.append("null"); + } else { + sb.append(this.notBefore); + } + first = false; + } + if (isSetPersistedTime()) { + if (!first) sb.append(", "); + sb.append("persistedTime:"); + sb.append(this.persistedTime); + first = false; + } + if (isSetToken()) { + if (!first) sb.append(", "); + sb.append("token:"); + if (this.token == null) { + sb.append("null"); + } else { + sb.append(this.token); + } + first = false; + } + sb.append(")"); + return sb.toString(); + } + + public void validate() throws org.apache.thrift.TException { + // check for required fields + if (!isSetCommunityUser()) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'communityUser' is unset! Struct:" + toString()); + } + + if (!isSetX509Cert()) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'x509Cert' is unset! Struct:" + toString()); + } + + // check for sub-struct validity + if (communityUser != null) { + communityUser.validate(); + } + } + + private void writeObject(java.io.ObjectOutputStream out) throws java.io.IOException { + try { + write(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(out))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private void readObject(java.io.ObjectInputStream in) throws java.io.IOException, ClassNotFoundException { + try { + // it doesn't seem like you should have to do this, but java serialization is wacky, and doesn't call the default constructor. + __isset_bitfield = 0; + read(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(in))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private static class CertificateCredentialStandardSchemeFactory implements SchemeFactory { + public CertificateCredentialStandardScheme getScheme() { + return new CertificateCredentialStandardScheme(); + } + } + + private static class CertificateCredentialStandardScheme extends StandardScheme<CertificateCredential> { + + public void read(org.apache.thrift.protocol.TProtocol iprot, CertificateCredential struct) throws org.apache.thrift.TException { + org.apache.thrift.protocol.TField schemeField; + iprot.readStructBegin(); + while (true) + { + schemeField = iprot.readFieldBegin(); + if (schemeField.type == org.apache.thrift.protocol.TType.STOP) { + break; + } + switch (schemeField.id) { + case 1: // COMMUNITY_USER + if (schemeField.type == org.apache.thrift.protocol.TType.STRUCT) { + struct.communityUser = new CommunityUser(); + struct.communityUser.read(iprot); + struct.setCommunityUserIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 2: // X509_CERT + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.x509Cert = iprot.readString(); + struct.setX509CertIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 3: // NOT_AFTER + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.notAfter = iprot.readString(); + struct.setNotAfterIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 4: // PRIVATE_KEY + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.privateKey = iprot.readString(); + struct.setPrivateKeyIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 5: // LIFE_TIME + if (schemeField.type == org.apache.thrift.protocol.TType.I64) { + struct.lifeTime = iprot.readI64(); + struct.setLifeTimeIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 6: // NOT_BEFORE + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.notBefore = iprot.readString(); + struct.setNotBeforeIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 7: // PERSISTED_TIME + if (schemeField.type == org.apache.thrift.protocol.TType.I64) { + struct.persistedTime = iprot.readI64(); + struct.setPersistedTimeIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 8: // TOKEN + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.token = iprot.readString(); + struct.setTokenIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + default: + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + iprot.readFieldEnd(); + } + iprot.readStructEnd(); + struct.validate(); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot, CertificateCredential struct) throws org.apache.thrift.TException { + struct.validate(); + + oprot.writeStructBegin(STRUCT_DESC); + if (struct.communityUser != null) { + oprot.writeFieldBegin(COMMUNITY_USER_FIELD_DESC); + struct.communityUser.write(oprot); + oprot.writeFieldEnd(); + } + if (struct.x509Cert != null) { + oprot.writeFieldBegin(X509_CERT_FIELD_DESC); + oprot.writeString(struct.x509Cert); + oprot.writeFieldEnd(); + } + if (struct.notAfter != null) { + if (struct.isSetNotAfter()) { + oprot.writeFieldBegin(NOT_AFTER_FIELD_DESC); + oprot.writeString(struct.notAfter); + oprot.writeFieldEnd(); + } + } + if (struct.privateKey != null) { + if (struct.isSetPrivateKey()) { + oprot.writeFieldBegin(PRIVATE_KEY_FIELD_DESC); + oprot.writeString(struct.privateKey); + oprot.writeFieldEnd(); + } + } + if (struct.isSetLifeTime()) { + oprot.writeFieldBegin(LIFE_TIME_FIELD_DESC); + oprot.writeI64(struct.lifeTime); + oprot.writeFieldEnd(); + } + if (struct.notBefore != null) { + if (struct.isSetNotBefore()) { + oprot.writeFieldBegin(NOT_BEFORE_FIELD_DESC); + oprot.writeString(struct.notBefore); + oprot.writeFieldEnd(); + } + } + if (struct.isSetPersistedTime()) { + oprot.writeFieldBegin(PERSISTED_TIME_FIELD_DESC); + oprot.writeI64(struct.persistedTime); + oprot.writeFieldEnd(); + } + if (struct.token != null) { + if (struct.isSetToken()) { + oprot.writeFieldBegin(TOKEN_FIELD_DESC); + oprot.writeString(struct.token); + oprot.writeFieldEnd(); + } + } + oprot.writeFieldStop(); + oprot.writeStructEnd(); + } + + } + + private static class CertificateCredentialTupleSchemeFactory implements SchemeFactory { + public CertificateCredentialTupleScheme getScheme() { + return new CertificateCredentialTupleScheme(); + } + } + + private static class CertificateCredentialTupleScheme extends TupleScheme<CertificateCredential> { + + @Override + public void write(org.apache.thrift.protocol.TProtocol prot, CertificateCredential struct) throws org.apache.thrift.TException { + TTupleProtocol oprot = (TTupleProtocol) prot; + struct.communityUser.write(oprot); + oprot.writeString(struct.x509Cert); + BitSet optionals = new BitSet(); + if (struct.isSetNotAfter()) { + optionals.set(0); + } + if (struct.isSetPrivateKey()) { + optionals.set(1); + } + if (struct.isSetLifeTime()) { + optionals.set(2); + } + if (struct.isSetNotBefore()) { + optionals.set(3); + } + if (struct.isSetPersistedTime()) { + optionals.set(4); + } + if (struct.isSetToken()) { + optionals.set(5); + } + oprot.writeBitSet(optionals, 6); + if (struct.isSetNotAfter()) { + oprot.writeString(struct.notAfter); + } + if (struct.isSetPrivateKey()) { + oprot.writeString(struct.privateKey); + } + if (struct.isSetLifeTime()) { + oprot.writeI64(struct.lifeTime); + } + if (struct.isSetNotBefore()) { + oprot.writeString(struct.notBefore); + } + if (struct.isSetPersistedTime()) { + oprot.writeI64(struct.persistedTime); + } + if (struct.isSetToken()) { + oprot.writeString(struct.token); + } + } + + @Override + public void read(org.apache.thrift.protocol.TProtocol prot, CertificateCredential struct) throws org.apache.thrift.TException { + TTupleProtocol iprot = (TTupleProtocol) prot; + struct.communityUser = new CommunityUser(); + struct.communityUser.read(iprot); + struct.setCommunityUserIsSet(true); + struct.x509Cert = iprot.readString(); + struct.setX509CertIsSet(true); + BitSet incoming = iprot.readBitSet(6); + if (incoming.get(0)) { + struct.notAfter = iprot.readString(); + struct.setNotAfterIsSet(true); + } + if (incoming.get(1)) { + struct.privateKey = iprot.readString(); + struct.setPrivateKeyIsSet(true); + } + if (incoming.get(2)) { + struct.lifeTime = iprot.readI64(); + struct.setLifeTimeIsSet(true); + } + if (incoming.get(3)) { + struct.notBefore = iprot.readString(); + struct.setNotBeforeIsSet(true); + } + if (incoming.get(4)) { + struct.persistedTime = iprot.readI64(); + struct.setPersistedTimeIsSet(true); + } + if (incoming.get(5)) { + struct.token = iprot.readString(); + struct.setTokenIsSet(true); + } + } + } + +} + http://git-wip-us.apache.org/repos/asf/airavata/blob/122fb8da/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CommunityUser.java ---------------------------------------------------------------------- diff --git a/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CommunityUser.java b/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CommunityUser.java new file mode 100644 index 0000000..199fee6 --- /dev/null +++ b/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CommunityUser.java @@ -0,0 +1,608 @@ +/** + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * Autogenerated by Thrift Compiler (0.9.3) + * + * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING + * @generated + */ +package org.apache.airavata.model.credential.store; + +import org.apache.thrift.scheme.IScheme; +import org.apache.thrift.scheme.SchemeFactory; +import org.apache.thrift.scheme.StandardScheme; + +import org.apache.thrift.scheme.TupleScheme; +import org.apache.thrift.protocol.TTupleProtocol; +import org.apache.thrift.protocol.TProtocolException; +import org.apache.thrift.EncodingUtils; +import org.apache.thrift.TException; +import org.apache.thrift.async.AsyncMethodCallback; +import org.apache.thrift.server.AbstractNonblockingServer.*; +import java.util.List; +import java.util.ArrayList; +import java.util.Map; +import java.util.HashMap; +import java.util.EnumMap; +import java.util.Set; +import java.util.HashSet; +import java.util.EnumSet; +import java.util.Collections; +import java.util.BitSet; +import java.nio.ByteBuffer; +import java.util.Arrays; +import javax.annotation.Generated; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; + +@SuppressWarnings({"cast", "rawtypes", "serial", "unchecked"}) +@Generated(value = "Autogenerated by Thrift Compiler (0.9.3)") +public class CommunityUser implements org.apache.thrift.TBase<CommunityUser, CommunityUser._Fields>, java.io.Serializable, Cloneable, Comparable<CommunityUser> { + private static final org.apache.thrift.protocol.TStruct STRUCT_DESC = new org.apache.thrift.protocol.TStruct("CommunityUser"); + + private static final org.apache.thrift.protocol.TField GATEWAY_NAME_FIELD_DESC = new org.apache.thrift.protocol.TField("gatewayName", org.apache.thrift.protocol.TType.STRING, (short)1); + private static final org.apache.thrift.protocol.TField USERNAME_FIELD_DESC = new org.apache.thrift.protocol.TField("username", org.apache.thrift.protocol.TType.STRING, (short)2); + private static final org.apache.thrift.protocol.TField USER_EMAIL_FIELD_DESC = new org.apache.thrift.protocol.TField("userEmail", org.apache.thrift.protocol.TType.STRING, (short)3); + + private static final Map<Class<? extends IScheme>, SchemeFactory> schemes = new HashMap<Class<? extends IScheme>, SchemeFactory>(); + static { + schemes.put(StandardScheme.class, new CommunityUserStandardSchemeFactory()); + schemes.put(TupleScheme.class, new CommunityUserTupleSchemeFactory()); + } + + private String gatewayName; // required + private String username; // required + private String userEmail; // required + + /** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */ + public enum _Fields implements org.apache.thrift.TFieldIdEnum { + GATEWAY_NAME((short)1, "gatewayName"), + USERNAME((short)2, "username"), + USER_EMAIL((short)3, "userEmail"); + + private static final Map<String, _Fields> byName = new HashMap<String, _Fields>(); + + static { + for (_Fields field : EnumSet.allOf(_Fields.class)) { + byName.put(field.getFieldName(), field); + } + } + + /** + * Find the _Fields constant that matches fieldId, or null if its not found. + */ + public static _Fields findByThriftId(int fieldId) { + switch(fieldId) { + case 1: // GATEWAY_NAME + return GATEWAY_NAME; + case 2: // USERNAME + return USERNAME; + case 3: // USER_EMAIL + return USER_EMAIL; + default: + return null; + } + } + + /** + * Find the _Fields constant that matches fieldId, throwing an exception + * if it is not found. + */ + public static _Fields findByThriftIdOrThrow(int fieldId) { + _Fields fields = findByThriftId(fieldId); + if (fields == null) throw new IllegalArgumentException("Field " + fieldId + " doesn't exist!"); + return fields; + } + + /** + * Find the _Fields constant that matches name, or null if its not found. + */ + public static _Fields findByName(String name) { + return byName.get(name); + } + + private final short _thriftId; + private final String _fieldName; + + _Fields(short thriftId, String fieldName) { + _thriftId = thriftId; + _fieldName = fieldName; + } + + public short getThriftFieldId() { + return _thriftId; + } + + public String getFieldName() { + return _fieldName; + } + } + + // isset id assignments + public static final Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> metaDataMap; + static { + Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> tmpMap = new EnumMap<_Fields, org.apache.thrift.meta_data.FieldMetaData>(_Fields.class); + tmpMap.put(_Fields.GATEWAY_NAME, new org.apache.thrift.meta_data.FieldMetaData("gatewayName", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.USERNAME, new org.apache.thrift.meta_data.FieldMetaData("username", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.USER_EMAIL, new org.apache.thrift.meta_data.FieldMetaData("userEmail", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + metaDataMap = Collections.unmodifiableMap(tmpMap); + org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(CommunityUser.class, metaDataMap); + } + + public CommunityUser() { + } + + public CommunityUser( + String gatewayName, + String username, + String userEmail) + { + this(); + this.gatewayName = gatewayName; + this.username = username; + this.userEmail = userEmail; + } + + /** + * Performs a deep copy on <i>other</i>. + */ + public CommunityUser(CommunityUser other) { + if (other.isSetGatewayName()) { + this.gatewayName = other.gatewayName; + } + if (other.isSetUsername()) { + this.username = other.username; + } + if (other.isSetUserEmail()) { + this.userEmail = other.userEmail; + } + } + + public CommunityUser deepCopy() { + return new CommunityUser(this); + } + + @Override + public void clear() { + this.gatewayName = null; + this.username = null; + this.userEmail = null; + } + + public String getGatewayName() { + return this.gatewayName; + } + + public void setGatewayName(String gatewayName) { + this.gatewayName = gatewayName; + } + + public void unsetGatewayName() { + this.gatewayName = null; + } + + /** Returns true if field gatewayName is set (has been assigned a value) and false otherwise */ + public boolean isSetGatewayName() { + return this.gatewayName != null; + } + + public void setGatewayNameIsSet(boolean value) { + if (!value) { + this.gatewayName = null; + } + } + + public String getUsername() { + return this.username; + } + + public void setUsername(String username) { + this.username = username; + } + + public void unsetUsername() { + this.username = null; + } + + /** Returns true if field username is set (has been assigned a value) and false otherwise */ + public boolean isSetUsername() { + return this.username != null; + } + + public void setUsernameIsSet(boolean value) { + if (!value) { + this.username = null; + } + } + + public String getUserEmail() { + return this.userEmail; + } + + public void setUserEmail(String userEmail) { + this.userEmail = userEmail; + } + + public void unsetUserEmail() { + this.userEmail = null; + } + + /** Returns true if field userEmail is set (has been assigned a value) and false otherwise */ + public boolean isSetUserEmail() { + return this.userEmail != null; + } + + public void setUserEmailIsSet(boolean value) { + if (!value) { + this.userEmail = null; + } + } + + public void setFieldValue(_Fields field, Object value) { + switch (field) { + case GATEWAY_NAME: + if (value == null) { + unsetGatewayName(); + } else { + setGatewayName((String)value); + } + break; + + case USERNAME: + if (value == null) { + unsetUsername(); + } else { + setUsername((String)value); + } + break; + + case USER_EMAIL: + if (value == null) { + unsetUserEmail(); + } else { + setUserEmail((String)value); + } + break; + + } + } + + public Object getFieldValue(_Fields field) { + switch (field) { + case GATEWAY_NAME: + return getGatewayName(); + + case USERNAME: + return getUsername(); + + case USER_EMAIL: + return getUserEmail(); + + } + throw new IllegalStateException(); + } + + /** Returns true if field corresponding to fieldID is set (has been assigned a value) and false otherwise */ + public boolean isSet(_Fields field) { + if (field == null) { + throw new IllegalArgumentException(); + } + + switch (field) { + case GATEWAY_NAME: + return isSetGatewayName(); + case USERNAME: + return isSetUsername(); + case USER_EMAIL: + return isSetUserEmail(); + } + throw new IllegalStateException(); + } + + @Override + public boolean equals(Object that) { + if (that == null) + return false; + if (that instanceof CommunityUser) + return this.equals((CommunityUser)that); + return false; + } + + public boolean equals(CommunityUser that) { + if (that == null) + return false; + + boolean this_present_gatewayName = true && this.isSetGatewayName(); + boolean that_present_gatewayName = true && that.isSetGatewayName(); + if (this_present_gatewayName || that_present_gatewayName) { + if (!(this_present_gatewayName && that_present_gatewayName)) + return false; + if (!this.gatewayName.equals(that.gatewayName)) + return false; + } + + boolean this_present_username = true && this.isSetUsername(); + boolean that_present_username = true && that.isSetUsername(); + if (this_present_username || that_present_username) { + if (!(this_present_username && that_present_username)) + return false; + if (!this.username.equals(that.username)) + return false; + } + + boolean this_present_userEmail = true && this.isSetUserEmail(); + boolean that_present_userEmail = true && that.isSetUserEmail(); + if (this_present_userEmail || that_present_userEmail) { + if (!(this_present_userEmail && that_present_userEmail)) + return false; + if (!this.userEmail.equals(that.userEmail)) + return false; + } + + return true; + } + + @Override + public int hashCode() { + List<Object> list = new ArrayList<Object>(); + + boolean present_gatewayName = true && (isSetGatewayName()); + list.add(present_gatewayName); + if (present_gatewayName) + list.add(gatewayName); + + boolean present_username = true && (isSetUsername()); + list.add(present_username); + if (present_username) + list.add(username); + + boolean present_userEmail = true && (isSetUserEmail()); + list.add(present_userEmail); + if (present_userEmail) + list.add(userEmail); + + return list.hashCode(); + } + + @Override + public int compareTo(CommunityUser other) { + if (!getClass().equals(other.getClass())) { + return getClass().getName().compareTo(other.getClass().getName()); + } + + int lastComparison = 0; + + lastComparison = Boolean.valueOf(isSetGatewayName()).compareTo(other.isSetGatewayName()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetGatewayName()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.gatewayName, other.gatewayName); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetUsername()).compareTo(other.isSetUsername()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetUsername()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.username, other.username); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetUserEmail()).compareTo(other.isSetUserEmail()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetUserEmail()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.userEmail, other.userEmail); + if (lastComparison != 0) { + return lastComparison; + } + } + return 0; + } + + public _Fields fieldForId(int fieldId) { + return _Fields.findByThriftId(fieldId); + } + + public void read(org.apache.thrift.protocol.TProtocol iprot) throws org.apache.thrift.TException { + schemes.get(iprot.getScheme()).getScheme().read(iprot, this); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot) throws org.apache.thrift.TException { + schemes.get(oprot.getScheme()).getScheme().write(oprot, this); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder("CommunityUser("); + boolean first = true; + + sb.append("gatewayName:"); + if (this.gatewayName == null) { + sb.append("null"); + } else { + sb.append(this.gatewayName); + } + first = false; + if (!first) sb.append(", "); + sb.append("username:"); + if (this.username == null) { + sb.append("null"); + } else { + sb.append(this.username); + } + first = false; + if (!first) sb.append(", "); + sb.append("userEmail:"); + if (this.userEmail == null) { + sb.append("null"); + } else { + sb.append(this.userEmail); + } + first = false; + sb.append(")"); + return sb.toString(); + } + + public void validate() throws org.apache.thrift.TException { + // check for required fields + if (!isSetGatewayName()) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'gatewayName' is unset! Struct:" + toString()); + } + + if (!isSetUsername()) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'username' is unset! Struct:" + toString()); + } + + if (!isSetUserEmail()) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'userEmail' is unset! Struct:" + toString()); + } + + // check for sub-struct validity + } + + private void writeObject(java.io.ObjectOutputStream out) throws java.io.IOException { + try { + write(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(out))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private void readObject(java.io.ObjectInputStream in) throws java.io.IOException, ClassNotFoundException { + try { + read(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(in))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private static class CommunityUserStandardSchemeFactory implements SchemeFactory { + public CommunityUserStandardScheme getScheme() { + return new CommunityUserStandardScheme(); + } + } + + private static class CommunityUserStandardScheme extends StandardScheme<CommunityUser> { + + public void read(org.apache.thrift.protocol.TProtocol iprot, CommunityUser struct) throws org.apache.thrift.TException { + org.apache.thrift.protocol.TField schemeField; + iprot.readStructBegin(); + while (true) + { + schemeField = iprot.readFieldBegin(); + if (schemeField.type == org.apache.thrift.protocol.TType.STOP) { + break; + } + switch (schemeField.id) { + case 1: // GATEWAY_NAME + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.gatewayName = iprot.readString(); + struct.setGatewayNameIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 2: // USERNAME + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.username = iprot.readString(); + struct.setUsernameIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 3: // USER_EMAIL + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.userEmail = iprot.readString(); + struct.setUserEmailIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + default: + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + iprot.readFieldEnd(); + } + iprot.readStructEnd(); + struct.validate(); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot, CommunityUser struct) throws org.apache.thrift.TException { + struct.validate(); + + oprot.writeStructBegin(STRUCT_DESC); + if (struct.gatewayName != null) { + oprot.writeFieldBegin(GATEWAY_NAME_FIELD_DESC); + oprot.writeString(struct.gatewayName); + oprot.writeFieldEnd(); + } + if (struct.username != null) { + oprot.writeFieldBegin(USERNAME_FIELD_DESC); + oprot.writeString(struct.username); + oprot.writeFieldEnd(); + } + if (struct.userEmail != null) { + oprot.writeFieldBegin(USER_EMAIL_FIELD_DESC); + oprot.writeString(struct.userEmail); + oprot.writeFieldEnd(); + } + oprot.writeFieldStop(); + oprot.writeStructEnd(); + } + + } + + private static class CommunityUserTupleSchemeFactory implements SchemeFactory { + public CommunityUserTupleScheme getScheme() { + return new CommunityUserTupleScheme(); + } + } + + private static class CommunityUserTupleScheme extends TupleScheme<CommunityUser> { + + @Override + public void write(org.apache.thrift.protocol.TProtocol prot, CommunityUser struct) throws org.apache.thrift.TException { + TTupleProtocol oprot = (TTupleProtocol) prot; + oprot.writeString(struct.gatewayName); + oprot.writeString(struct.username); + oprot.writeString(struct.userEmail); + } + + @Override + public void read(org.apache.thrift.protocol.TProtocol prot, CommunityUser struct) throws org.apache.thrift.TException { + TTupleProtocol iprot = (TTupleProtocol) prot; + struct.gatewayName = iprot.readString(); + struct.setGatewayNameIsSet(true); + struct.username = iprot.readString(); + struct.setUsernameIsSet(true); + struct.userEmail = iprot.readString(); + struct.setUserEmailIsSet(true); + } + } + +} + http://git-wip-us.apache.org/repos/asf/airavata/blob/122fb8da/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CredentialOwnerType.java ---------------------------------------------------------------------- diff --git a/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CredentialOwnerType.java b/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CredentialOwnerType.java new file mode 100644 index 0000000..01b3c90 --- /dev/null +++ b/airavata-api/airavata-data-models/src/main/java/org/apache/airavata/model/credential/store/CredentialOwnerType.java @@ -0,0 +1,62 @@ +/** + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * Autogenerated by Thrift Compiler (0.9.3) + * + * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING + * @generated + */ +package org.apache.airavata.model.credential.store; + + +import java.util.Map; +import java.util.HashMap; +import org.apache.thrift.TEnum; + +public enum CredentialOwnerType implements org.apache.thrift.TEnum { + GATEWAY(0), + USER(1); + + private final int value; + + private CredentialOwnerType(int value) { + this.value = value; + } + + /** + * Get the integer value of this enum value, as defined in the Thrift IDL. + */ + public int getValue() { + return value; + } + + /** + * Find a the enum type by its integer value, as defined in the Thrift IDL. + * @return null if the value is not found. + */ + public static CredentialOwnerType findByValue(int value) { + switch (value) { + case 0: + return GATEWAY; + case 1: + return USER; + default: + return null; + } + } +}
