http://git-wip-us.apache.org/repos/asf/airavata/blob/686d8e30/airavata-services/profile-service/profile-service-stubs/src/main/java/org/apache/airavata/service/profile/iam/admin/services/cpi/IamAdminServices.java ---------------------------------------------------------------------- diff --git a/airavata-services/profile-service/profile-service-stubs/src/main/java/org/apache/airavata/service/profile/iam/admin/services/cpi/IamAdminServices.java b/airavata-services/profile-service/profile-service-stubs/src/main/java/org/apache/airavata/service/profile/iam/admin/services/cpi/IamAdminServices.java index c8f70cd..9cbc825 100644 --- a/airavata-services/profile-service/profile-service-stubs/src/main/java/org/apache/airavata/service/profile/iam/admin/services/cpi/IamAdminServices.java +++ b/airavata-services/profile-service/profile-service-stubs/src/main/java/org/apache/airavata/service/profile/iam/admin/services/cpi/IamAdminServices.java @@ -63,6 +63,10 @@ public class IamAdminServices { public boolean enableUser(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials) throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException; + public boolean resetUserPassword(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, String newPassword) throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException; + + public List<org.apache.airavata.model.user.UserProfile> findUsers(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayID, String email, String userId, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials) throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException; + } public interface AsyncIface { @@ -75,6 +79,10 @@ public class IamAdminServices { public void enableUser(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException; + public void resetUserPassword(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, String newPassword, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException; + + public void findUsers(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayID, String email, String userId, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException; + } public static class Client extends org.apache.thrift.TServiceClient implements Iface { @@ -220,6 +228,71 @@ public class IamAdminServices { throw new org.apache.thrift.TApplicationException(org.apache.thrift.TApplicationException.MISSING_RESULT, "enableUser failed: unknown result"); } + public boolean resetUserPassword(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, String newPassword) throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException + { + send_resetUserPassword(authzToken, userDetails, isRealmAdminCredentials, newPassword); + return recv_resetUserPassword(); + } + + public void send_resetUserPassword(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, String newPassword) throws org.apache.thrift.TException + { + resetUserPassword_args args = new resetUserPassword_args(); + args.setAuthzToken(authzToken); + args.setUserDetails(userDetails); + args.setIsRealmAdminCredentials(isRealmAdminCredentials); + args.setNewPassword(newPassword); + sendBase("resetUserPassword", args); + } + + public boolean recv_resetUserPassword() throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException + { + resetUserPassword_result result = new resetUserPassword_result(); + receiveBase(result, "resetUserPassword"); + if (result.isSetSuccess()) { + return result.success; + } + if (result.Idse != null) { + throw result.Idse; + } + if (result.ae != null) { + throw result.ae; + } + throw new org.apache.thrift.TApplicationException(org.apache.thrift.TApplicationException.MISSING_RESULT, "resetUserPassword failed: unknown result"); + } + + public List<org.apache.airavata.model.user.UserProfile> findUsers(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayID, String email, String userId, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials) throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException + { + send_findUsers(authzToken, gatewayID, email, userId, isRealmAdminCredentials); + return recv_findUsers(); + } + + public void send_findUsers(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayID, String email, String userId, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials) throws org.apache.thrift.TException + { + findUsers_args args = new findUsers_args(); + args.setAuthzToken(authzToken); + args.setGatewayID(gatewayID); + args.setEmail(email); + args.setUserId(userId); + args.setIsRealmAdminCredentials(isRealmAdminCredentials); + sendBase("findUsers", args); + } + + public List<org.apache.airavata.model.user.UserProfile> recv_findUsers() throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException + { + findUsers_result result = new findUsers_result(); + receiveBase(result, "findUsers"); + if (result.isSetSuccess()) { + return result.success; + } + if (result.Idse != null) { + throw result.Idse; + } + if (result.ae != null) { + throw result.ae; + } + throw new org.apache.thrift.TApplicationException(org.apache.thrift.TApplicationException.MISSING_RESULT, "findUsers failed: unknown result"); + } + } public static class AsyncClient extends org.apache.thrift.async.TAsyncClient implements AsyncIface { public static class Factory implements org.apache.thrift.async.TAsyncClientFactory<AsyncClient> { @@ -387,6 +460,91 @@ public class IamAdminServices { } } + public void resetUserPassword(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, String newPassword, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException { + checkReady(); + resetUserPassword_call method_call = new resetUserPassword_call(authzToken, userDetails, isRealmAdminCredentials, newPassword, resultHandler, this, ___protocolFactory, ___transport); + this.___currentMethod = method_call; + ___manager.call(method_call); + } + + public static class resetUserPassword_call extends org.apache.thrift.async.TAsyncMethodCall { + private org.apache.airavata.model.security.AuthzToken authzToken; + private org.apache.airavata.model.user.UserProfile userDetails; + private org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials; + private String newPassword; + public resetUserPassword_call(org.apache.airavata.model.security.AuthzToken authzToken, org.apache.airavata.model.user.UserProfile userDetails, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, String newPassword, org.apache.thrift.async.AsyncMethodCallback resultHandler, org.apache.thrift.async.TAsyncClient client, org.apache.thrift.protocol.TProtocolFactory protocolFactory, org.apache.thrift.transport.TNonblockingTransport transport) throws org.apache.thrift.TException { + super(client, protocolFactory, transport, resultHandler, false); + this.authzToken = authzToken; + this.userDetails = userDetails; + this.isRealmAdminCredentials = isRealmAdminCredentials; + this.newPassword = newPassword; + } + + public void write_args(org.apache.thrift.protocol.TProtocol prot) throws org.apache.thrift.TException { + prot.writeMessageBegin(new org.apache.thrift.protocol.TMessage("resetUserPassword", org.apache.thrift.protocol.TMessageType.CALL, 0)); + resetUserPassword_args args = new resetUserPassword_args(); + args.setAuthzToken(authzToken); + args.setUserDetails(userDetails); + args.setIsRealmAdminCredentials(isRealmAdminCredentials); + args.setNewPassword(newPassword); + args.write(prot); + prot.writeMessageEnd(); + } + + public boolean getResult() throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException { + if (getState() != org.apache.thrift.async.TAsyncMethodCall.State.RESPONSE_READ) { + throw new IllegalStateException("Method call not finished!"); + } + org.apache.thrift.transport.TMemoryInputTransport memoryTransport = new org.apache.thrift.transport.TMemoryInputTransport(getFrameBuffer().array()); + org.apache.thrift.protocol.TProtocol prot = client.getProtocolFactory().getProtocol(memoryTransport); + return (new Client(prot)).recv_resetUserPassword(); + } + } + + public void findUsers(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayID, String email, String userId, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, org.apache.thrift.async.AsyncMethodCallback resultHandler) throws org.apache.thrift.TException { + checkReady(); + findUsers_call method_call = new findUsers_call(authzToken, gatewayID, email, userId, isRealmAdminCredentials, resultHandler, this, ___protocolFactory, ___transport); + this.___currentMethod = method_call; + ___manager.call(method_call); + } + + public static class findUsers_call extends org.apache.thrift.async.TAsyncMethodCall { + private org.apache.airavata.model.security.AuthzToken authzToken; + private String gatewayID; + private String email; + private String userId; + private org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials; + public findUsers_call(org.apache.airavata.model.security.AuthzToken authzToken, String gatewayID, String email, String userId, org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, org.apache.thrift.async.AsyncMethodCallback resultHandler, org.apache.thrift.async.TAsyncClient client, org.apache.thrift.protocol.TProtocolFactory protocolFactory, org.apache.thrift.transport.TNonblockingTransport transport) throws org.apache.thrift.TException { + super(client, protocolFactory, transport, resultHandler, false); + this.authzToken = authzToken; + this.gatewayID = gatewayID; + this.email = email; + this.userId = userId; + this.isRealmAdminCredentials = isRealmAdminCredentials; + } + + public void write_args(org.apache.thrift.protocol.TProtocol prot) throws org.apache.thrift.TException { + prot.writeMessageBegin(new org.apache.thrift.protocol.TMessage("findUsers", org.apache.thrift.protocol.TMessageType.CALL, 0)); + findUsers_args args = new findUsers_args(); + args.setAuthzToken(authzToken); + args.setGatewayID(gatewayID); + args.setEmail(email); + args.setUserId(userId); + args.setIsRealmAdminCredentials(isRealmAdminCredentials); + args.write(prot); + prot.writeMessageEnd(); + } + + public List<org.apache.airavata.model.user.UserProfile> getResult() throws org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException, org.apache.airavata.model.error.AuthorizationException, org.apache.thrift.TException { + if (getState() != org.apache.thrift.async.TAsyncMethodCall.State.RESPONSE_READ) { + throw new IllegalStateException("Method call not finished!"); + } + org.apache.thrift.transport.TMemoryInputTransport memoryTransport = new org.apache.thrift.transport.TMemoryInputTransport(getFrameBuffer().array()); + org.apache.thrift.protocol.TProtocol prot = client.getProtocolFactory().getProtocol(memoryTransport); + return (new Client(prot)).recv_findUsers(); + } + } + } public static class Processor<I extends Iface> extends org.apache.thrift.TBaseProcessor<I> implements org.apache.thrift.TProcessor { @@ -404,6 +562,8 @@ public class IamAdminServices { processMap.put("setUpGateway", new setUpGateway()); processMap.put("registerUser", new registerUser()); processMap.put("enableUser", new enableUser()); + processMap.put("resetUserPassword", new resetUserPassword()); + processMap.put("findUsers", new findUsers()); return processMap; } @@ -513,6 +673,59 @@ public class IamAdminServices { } } + public static class resetUserPassword<I extends Iface> extends org.apache.thrift.ProcessFunction<I, resetUserPassword_args> { + public resetUserPassword() { + super("resetUserPassword"); + } + + public resetUserPassword_args getEmptyArgsInstance() { + return new resetUserPassword_args(); + } + + protected boolean isOneway() { + return false; + } + + public resetUserPassword_result getResult(I iface, resetUserPassword_args args) throws org.apache.thrift.TException { + resetUserPassword_result result = new resetUserPassword_result(); + try { + result.success = iface.resetUserPassword(args.authzToken, args.userDetails, args.isRealmAdminCredentials, args.newPassword); + result.setSuccessIsSet(true); + } catch (org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException Idse) { + result.Idse = Idse; + } catch (org.apache.airavata.model.error.AuthorizationException ae) { + result.ae = ae; + } + return result; + } + } + + public static class findUsers<I extends Iface> extends org.apache.thrift.ProcessFunction<I, findUsers_args> { + public findUsers() { + super("findUsers"); + } + + public findUsers_args getEmptyArgsInstance() { + return new findUsers_args(); + } + + protected boolean isOneway() { + return false; + } + + public findUsers_result getResult(I iface, findUsers_args args) throws org.apache.thrift.TException { + findUsers_result result = new findUsers_result(); + try { + result.success = iface.findUsers(args.authzToken, args.gatewayID, args.email, args.userId, args.isRealmAdminCredentials); + } catch (org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException Idse) { + result.Idse = Idse; + } catch (org.apache.airavata.model.error.AuthorizationException ae) { + result.ae = ae; + } + return result; + } + } + } public static class AsyncProcessor<I extends AsyncIface> extends org.apache.thrift.TBaseAsyncProcessor<I> { @@ -530,6 +743,8 @@ public class IamAdminServices { processMap.put("setUpGateway", new setUpGateway()); processMap.put("registerUser", new registerUser()); processMap.put("enableUser", new enableUser()); + processMap.put("resetUserPassword", new resetUserPassword()); + processMap.put("findUsers", new findUsers()); return processMap; } @@ -783,6 +998,131 @@ public class IamAdminServices { } } + public static class resetUserPassword<I extends AsyncIface> extends org.apache.thrift.AsyncProcessFunction<I, resetUserPassword_args, Boolean> { + public resetUserPassword() { + super("resetUserPassword"); + } + + public resetUserPassword_args getEmptyArgsInstance() { + return new resetUserPassword_args(); + } + + public AsyncMethodCallback<Boolean> getResultHandler(final AsyncFrameBuffer fb, final int seqid) { + final org.apache.thrift.AsyncProcessFunction fcall = this; + return new AsyncMethodCallback<Boolean>() { + public void onComplete(Boolean o) { + resetUserPassword_result result = new resetUserPassword_result(); + result.success = o; + result.setSuccessIsSet(true); + try { + fcall.sendResponse(fb,result, org.apache.thrift.protocol.TMessageType.REPLY,seqid); + return; + } catch (Exception e) { + LOGGER.error("Exception writing to internal frame buffer", e); + } + fb.close(); + } + public void onError(Exception e) { + byte msgType = org.apache.thrift.protocol.TMessageType.REPLY; + org.apache.thrift.TBase msg; + resetUserPassword_result result = new resetUserPassword_result(); + if (e instanceof org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException) { + result.Idse = (org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException) e; + result.setIdseIsSet(true); + msg = result; + } + else if (e instanceof org.apache.airavata.model.error.AuthorizationException) { + result.ae = (org.apache.airavata.model.error.AuthorizationException) e; + result.setAeIsSet(true); + msg = result; + } + else + { + msgType = org.apache.thrift.protocol.TMessageType.EXCEPTION; + msg = (org.apache.thrift.TBase)new org.apache.thrift.TApplicationException(org.apache.thrift.TApplicationException.INTERNAL_ERROR, e.getMessage()); + } + try { + fcall.sendResponse(fb,msg,msgType,seqid); + return; + } catch (Exception ex) { + LOGGER.error("Exception writing to internal frame buffer", ex); + } + fb.close(); + } + }; + } + + protected boolean isOneway() { + return false; + } + + public void start(I iface, resetUserPassword_args args, org.apache.thrift.async.AsyncMethodCallback<Boolean> resultHandler) throws TException { + iface.resetUserPassword(args.authzToken, args.userDetails, args.isRealmAdminCredentials, args.newPassword,resultHandler); + } + } + + public static class findUsers<I extends AsyncIface> extends org.apache.thrift.AsyncProcessFunction<I, findUsers_args, List<org.apache.airavata.model.user.UserProfile>> { + public findUsers() { + super("findUsers"); + } + + public findUsers_args getEmptyArgsInstance() { + return new findUsers_args(); + } + + public AsyncMethodCallback<List<org.apache.airavata.model.user.UserProfile>> getResultHandler(final AsyncFrameBuffer fb, final int seqid) { + final org.apache.thrift.AsyncProcessFunction fcall = this; + return new AsyncMethodCallback<List<org.apache.airavata.model.user.UserProfile>>() { + public void onComplete(List<org.apache.airavata.model.user.UserProfile> o) { + findUsers_result result = new findUsers_result(); + result.success = o; + try { + fcall.sendResponse(fb,result, org.apache.thrift.protocol.TMessageType.REPLY,seqid); + return; + } catch (Exception e) { + LOGGER.error("Exception writing to internal frame buffer", e); + } + fb.close(); + } + public void onError(Exception e) { + byte msgType = org.apache.thrift.protocol.TMessageType.REPLY; + org.apache.thrift.TBase msg; + findUsers_result result = new findUsers_result(); + if (e instanceof org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException) { + result.Idse = (org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException) e; + result.setIdseIsSet(true); + msg = result; + } + else if (e instanceof org.apache.airavata.model.error.AuthorizationException) { + result.ae = (org.apache.airavata.model.error.AuthorizationException) e; + result.setAeIsSet(true); + msg = result; + } + else + { + msgType = org.apache.thrift.protocol.TMessageType.EXCEPTION; + msg = (org.apache.thrift.TBase)new org.apache.thrift.TApplicationException(org.apache.thrift.TApplicationException.INTERNAL_ERROR, e.getMessage()); + } + try { + fcall.sendResponse(fb,msg,msgType,seqid); + return; + } catch (Exception ex) { + LOGGER.error("Exception writing to internal frame buffer", ex); + } + fb.close(); + } + }; + } + + protected boolean isOneway() { + return false; + } + + public void start(I iface, findUsers_args args, org.apache.thrift.async.AsyncMethodCallback<List<org.apache.airavata.model.user.UserProfile>> resultHandler) throws TException { + iface.findUsers(args.authzToken, args.gatewayID, args.email, args.userId, args.isRealmAdminCredentials,resultHandler); + } + } + } public static class getAPIVersion_args implements org.apache.thrift.TBase<getAPIVersion_args, getAPIVersion_args._Fields>, java.io.Serializable, Cloneable, Comparable<getAPIVersion_args> { @@ -5263,4 +5603,2648 @@ public class IamAdminServices { } + public static class resetUserPassword_args implements org.apache.thrift.TBase<resetUserPassword_args, resetUserPassword_args._Fields>, java.io.Serializable, Cloneable, Comparable<resetUserPassword_args> { + private static final org.apache.thrift.protocol.TStruct STRUCT_DESC = new org.apache.thrift.protocol.TStruct("resetUserPassword_args"); + + private static final org.apache.thrift.protocol.TField AUTHZ_TOKEN_FIELD_DESC = new org.apache.thrift.protocol.TField("authzToken", org.apache.thrift.protocol.TType.STRUCT, (short)1); + private static final org.apache.thrift.protocol.TField USER_DETAILS_FIELD_DESC = new org.apache.thrift.protocol.TField("userDetails", org.apache.thrift.protocol.TType.STRUCT, (short)2); + private static final org.apache.thrift.protocol.TField IS_REALM_ADMIN_CREDENTIALS_FIELD_DESC = new org.apache.thrift.protocol.TField("isRealmAdminCredentials", org.apache.thrift.protocol.TType.STRUCT, (short)3); + private static final org.apache.thrift.protocol.TField NEW_PASSWORD_FIELD_DESC = new org.apache.thrift.protocol.TField("newPassword", org.apache.thrift.protocol.TType.STRING, (short)4); + + private static final Map<Class<? extends IScheme>, SchemeFactory> schemes = new HashMap<Class<? extends IScheme>, SchemeFactory>(); + static { + schemes.put(StandardScheme.class, new resetUserPassword_argsStandardSchemeFactory()); + schemes.put(TupleScheme.class, new resetUserPassword_argsTupleSchemeFactory()); + } + + public org.apache.airavata.model.security.AuthzToken authzToken; // required + public org.apache.airavata.model.user.UserProfile userDetails; // required + public org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials; // required + public String newPassword; // required + + /** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */ + public enum _Fields implements org.apache.thrift.TFieldIdEnum { + AUTHZ_TOKEN((short)1, "authzToken"), + USER_DETAILS((short)2, "userDetails"), + IS_REALM_ADMIN_CREDENTIALS((short)3, "isRealmAdminCredentials"), + NEW_PASSWORD((short)4, "newPassword"); + + private static final Map<String, _Fields> byName = new HashMap<String, _Fields>(); + + static { + for (_Fields field : EnumSet.allOf(_Fields.class)) { + byName.put(field.getFieldName(), field); + } + } + + /** + * Find the _Fields constant that matches fieldId, or null if its not found. + */ + public static _Fields findByThriftId(int fieldId) { + switch(fieldId) { + case 1: // AUTHZ_TOKEN + return AUTHZ_TOKEN; + case 2: // USER_DETAILS + return USER_DETAILS; + case 3: // IS_REALM_ADMIN_CREDENTIALS + return IS_REALM_ADMIN_CREDENTIALS; + case 4: // NEW_PASSWORD + return NEW_PASSWORD; + default: + return null; + } + } + + /** + * Find the _Fields constant that matches fieldId, throwing an exception + * if it is not found. + */ + public static _Fields findByThriftIdOrThrow(int fieldId) { + _Fields fields = findByThriftId(fieldId); + if (fields == null) throw new IllegalArgumentException("Field " + fieldId + " doesn't exist!"); + return fields; + } + + /** + * Find the _Fields constant that matches name, or null if its not found. + */ + public static _Fields findByName(String name) { + return byName.get(name); + } + + private final short _thriftId; + private final String _fieldName; + + _Fields(short thriftId, String fieldName) { + _thriftId = thriftId; + _fieldName = fieldName; + } + + public short getThriftFieldId() { + return _thriftId; + } + + public String getFieldName() { + return _fieldName; + } + } + + // isset id assignments + public static final Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> metaDataMap; + static { + Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> tmpMap = new EnumMap<_Fields, org.apache.thrift.meta_data.FieldMetaData>(_Fields.class); + tmpMap.put(_Fields.AUTHZ_TOKEN, new org.apache.thrift.meta_data.FieldMetaData("authzToken", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.StructMetaData(org.apache.thrift.protocol.TType.STRUCT, org.apache.airavata.model.security.AuthzToken.class))); + tmpMap.put(_Fields.USER_DETAILS, new org.apache.thrift.meta_data.FieldMetaData("userDetails", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.StructMetaData(org.apache.thrift.protocol.TType.STRUCT, org.apache.airavata.model.user.UserProfile.class))); + tmpMap.put(_Fields.IS_REALM_ADMIN_CREDENTIALS, new org.apache.thrift.meta_data.FieldMetaData("isRealmAdminCredentials", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.StructMetaData(org.apache.thrift.protocol.TType.STRUCT, org.apache.airavata.model.credential.store.PasswordCredential.class))); + tmpMap.put(_Fields.NEW_PASSWORD, new org.apache.thrift.meta_data.FieldMetaData("newPassword", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + metaDataMap = Collections.unmodifiableMap(tmpMap); + org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(resetUserPassword_args.class, metaDataMap); + } + + public resetUserPassword_args() { + } + + public resetUserPassword_args( + org.apache.airavata.model.security.AuthzToken authzToken, + org.apache.airavata.model.user.UserProfile userDetails, + org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials, + String newPassword) + { + this(); + this.authzToken = authzToken; + this.userDetails = userDetails; + this.isRealmAdminCredentials = isRealmAdminCredentials; + this.newPassword = newPassword; + } + + /** + * Performs a deep copy on <i>other</i>. + */ + public resetUserPassword_args(resetUserPassword_args other) { + if (other.isSetAuthzToken()) { + this.authzToken = new org.apache.airavata.model.security.AuthzToken(other.authzToken); + } + if (other.isSetUserDetails()) { + this.userDetails = new org.apache.airavata.model.user.UserProfile(other.userDetails); + } + if (other.isSetIsRealmAdminCredentials()) { + this.isRealmAdminCredentials = new org.apache.airavata.model.credential.store.PasswordCredential(other.isRealmAdminCredentials); + } + if (other.isSetNewPassword()) { + this.newPassword = other.newPassword; + } + } + + public resetUserPassword_args deepCopy() { + return new resetUserPassword_args(this); + } + + @Override + public void clear() { + this.authzToken = null; + this.userDetails = null; + this.isRealmAdminCredentials = null; + this.newPassword = null; + } + + public org.apache.airavata.model.security.AuthzToken getAuthzToken() { + return this.authzToken; + } + + public resetUserPassword_args setAuthzToken(org.apache.airavata.model.security.AuthzToken authzToken) { + this.authzToken = authzToken; + return this; + } + + public void unsetAuthzToken() { + this.authzToken = null; + } + + /** Returns true if field authzToken is set (has been assigned a value) and false otherwise */ + public boolean isSetAuthzToken() { + return this.authzToken != null; + } + + public void setAuthzTokenIsSet(boolean value) { + if (!value) { + this.authzToken = null; + } + } + + public org.apache.airavata.model.user.UserProfile getUserDetails() { + return this.userDetails; + } + + public resetUserPassword_args setUserDetails(org.apache.airavata.model.user.UserProfile userDetails) { + this.userDetails = userDetails; + return this; + } + + public void unsetUserDetails() { + this.userDetails = null; + } + + /** Returns true if field userDetails is set (has been assigned a value) and false otherwise */ + public boolean isSetUserDetails() { + return this.userDetails != null; + } + + public void setUserDetailsIsSet(boolean value) { + if (!value) { + this.userDetails = null; + } + } + + public org.apache.airavata.model.credential.store.PasswordCredential getIsRealmAdminCredentials() { + return this.isRealmAdminCredentials; + } + + public resetUserPassword_args setIsRealmAdminCredentials(org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials) { + this.isRealmAdminCredentials = isRealmAdminCredentials; + return this; + } + + public void unsetIsRealmAdminCredentials() { + this.isRealmAdminCredentials = null; + } + + /** Returns true if field isRealmAdminCredentials is set (has been assigned a value) and false otherwise */ + public boolean isSetIsRealmAdminCredentials() { + return this.isRealmAdminCredentials != null; + } + + public void setIsRealmAdminCredentialsIsSet(boolean value) { + if (!value) { + this.isRealmAdminCredentials = null; + } + } + + public String getNewPassword() { + return this.newPassword; + } + + public resetUserPassword_args setNewPassword(String newPassword) { + this.newPassword = newPassword; + return this; + } + + public void unsetNewPassword() { + this.newPassword = null; + } + + /** Returns true if field newPassword is set (has been assigned a value) and false otherwise */ + public boolean isSetNewPassword() { + return this.newPassword != null; + } + + public void setNewPasswordIsSet(boolean value) { + if (!value) { + this.newPassword = null; + } + } + + public void setFieldValue(_Fields field, Object value) { + switch (field) { + case AUTHZ_TOKEN: + if (value == null) { + unsetAuthzToken(); + } else { + setAuthzToken((org.apache.airavata.model.security.AuthzToken)value); + } + break; + + case USER_DETAILS: + if (value == null) { + unsetUserDetails(); + } else { + setUserDetails((org.apache.airavata.model.user.UserProfile)value); + } + break; + + case IS_REALM_ADMIN_CREDENTIALS: + if (value == null) { + unsetIsRealmAdminCredentials(); + } else { + setIsRealmAdminCredentials((org.apache.airavata.model.credential.store.PasswordCredential)value); + } + break; + + case NEW_PASSWORD: + if (value == null) { + unsetNewPassword(); + } else { + setNewPassword((String)value); + } + break; + + } + } + + public Object getFieldValue(_Fields field) { + switch (field) { + case AUTHZ_TOKEN: + return getAuthzToken(); + + case USER_DETAILS: + return getUserDetails(); + + case IS_REALM_ADMIN_CREDENTIALS: + return getIsRealmAdminCredentials(); + + case NEW_PASSWORD: + return getNewPassword(); + + } + throw new IllegalStateException(); + } + + /** Returns true if field corresponding to fieldID is set (has been assigned a value) and false otherwise */ + public boolean isSet(_Fields field) { + if (field == null) { + throw new IllegalArgumentException(); + } + + switch (field) { + case AUTHZ_TOKEN: + return isSetAuthzToken(); + case USER_DETAILS: + return isSetUserDetails(); + case IS_REALM_ADMIN_CREDENTIALS: + return isSetIsRealmAdminCredentials(); + case NEW_PASSWORD: + return isSetNewPassword(); + } + throw new IllegalStateException(); + } + + @Override + public boolean equals(Object that) { + if (that == null) + return false; + if (that instanceof resetUserPassword_args) + return this.equals((resetUserPassword_args)that); + return false; + } + + public boolean equals(resetUserPassword_args that) { + if (that == null) + return false; + + boolean this_present_authzToken = true && this.isSetAuthzToken(); + boolean that_present_authzToken = true && that.isSetAuthzToken(); + if (this_present_authzToken || that_present_authzToken) { + if (!(this_present_authzToken && that_present_authzToken)) + return false; + if (!this.authzToken.equals(that.authzToken)) + return false; + } + + boolean this_present_userDetails = true && this.isSetUserDetails(); + boolean that_present_userDetails = true && that.isSetUserDetails(); + if (this_present_userDetails || that_present_userDetails) { + if (!(this_present_userDetails && that_present_userDetails)) + return false; + if (!this.userDetails.equals(that.userDetails)) + return false; + } + + boolean this_present_isRealmAdminCredentials = true && this.isSetIsRealmAdminCredentials(); + boolean that_present_isRealmAdminCredentials = true && that.isSetIsRealmAdminCredentials(); + if (this_present_isRealmAdminCredentials || that_present_isRealmAdminCredentials) { + if (!(this_present_isRealmAdminCredentials && that_present_isRealmAdminCredentials)) + return false; + if (!this.isRealmAdminCredentials.equals(that.isRealmAdminCredentials)) + return false; + } + + boolean this_present_newPassword = true && this.isSetNewPassword(); + boolean that_present_newPassword = true && that.isSetNewPassword(); + if (this_present_newPassword || that_present_newPassword) { + if (!(this_present_newPassword && that_present_newPassword)) + return false; + if (!this.newPassword.equals(that.newPassword)) + return false; + } + + return true; + } + + @Override + public int hashCode() { + List<Object> list = new ArrayList<Object>(); + + boolean present_authzToken = true && (isSetAuthzToken()); + list.add(present_authzToken); + if (present_authzToken) + list.add(authzToken); + + boolean present_userDetails = true && (isSetUserDetails()); + list.add(present_userDetails); + if (present_userDetails) + list.add(userDetails); + + boolean present_isRealmAdminCredentials = true && (isSetIsRealmAdminCredentials()); + list.add(present_isRealmAdminCredentials); + if (present_isRealmAdminCredentials) + list.add(isRealmAdminCredentials); + + boolean present_newPassword = true && (isSetNewPassword()); + list.add(present_newPassword); + if (present_newPassword) + list.add(newPassword); + + return list.hashCode(); + } + + @Override + public int compareTo(resetUserPassword_args other) { + if (!getClass().equals(other.getClass())) { + return getClass().getName().compareTo(other.getClass().getName()); + } + + int lastComparison = 0; + + lastComparison = Boolean.valueOf(isSetAuthzToken()).compareTo(other.isSetAuthzToken()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetAuthzToken()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.authzToken, other.authzToken); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetUserDetails()).compareTo(other.isSetUserDetails()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetUserDetails()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.userDetails, other.userDetails); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetIsRealmAdminCredentials()).compareTo(other.isSetIsRealmAdminCredentials()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetIsRealmAdminCredentials()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.isRealmAdminCredentials, other.isRealmAdminCredentials); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetNewPassword()).compareTo(other.isSetNewPassword()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetNewPassword()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.newPassword, other.newPassword); + if (lastComparison != 0) { + return lastComparison; + } + } + return 0; + } + + public _Fields fieldForId(int fieldId) { + return _Fields.findByThriftId(fieldId); + } + + public void read(org.apache.thrift.protocol.TProtocol iprot) throws org.apache.thrift.TException { + schemes.get(iprot.getScheme()).getScheme().read(iprot, this); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot) throws org.apache.thrift.TException { + schemes.get(oprot.getScheme()).getScheme().write(oprot, this); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder("resetUserPassword_args("); + boolean first = true; + + sb.append("authzToken:"); + if (this.authzToken == null) { + sb.append("null"); + } else { + sb.append(this.authzToken); + } + first = false; + if (!first) sb.append(", "); + sb.append("userDetails:"); + if (this.userDetails == null) { + sb.append("null"); + } else { + sb.append(this.userDetails); + } + first = false; + if (!first) sb.append(", "); + sb.append("isRealmAdminCredentials:"); + if (this.isRealmAdminCredentials == null) { + sb.append("null"); + } else { + sb.append(this.isRealmAdminCredentials); + } + first = false; + if (!first) sb.append(", "); + sb.append("newPassword:"); + if (this.newPassword == null) { + sb.append("null"); + } else { + sb.append(this.newPassword); + } + first = false; + sb.append(")"); + return sb.toString(); + } + + public void validate() throws org.apache.thrift.TException { + // check for required fields + if (authzToken == null) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'authzToken' was not present! Struct: " + toString()); + } + if (userDetails == null) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'userDetails' was not present! Struct: " + toString()); + } + if (isRealmAdminCredentials == null) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'isRealmAdminCredentials' was not present! Struct: " + toString()); + } + if (newPassword == null) { + throw new org.apache.thrift.protocol.TProtocolException("Required field 'newPassword' was not present! Struct: " + toString()); + } + // check for sub-struct validity + if (authzToken != null) { + authzToken.validate(); + } + if (userDetails != null) { + userDetails.validate(); + } + if (isRealmAdminCredentials != null) { + isRealmAdminCredentials.validate(); + } + } + + private void writeObject(java.io.ObjectOutputStream out) throws java.io.IOException { + try { + write(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(out))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private void readObject(java.io.ObjectInputStream in) throws java.io.IOException, ClassNotFoundException { + try { + read(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(in))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private static class resetUserPassword_argsStandardSchemeFactory implements SchemeFactory { + public resetUserPassword_argsStandardScheme getScheme() { + return new resetUserPassword_argsStandardScheme(); + } + } + + private static class resetUserPassword_argsStandardScheme extends StandardScheme<resetUserPassword_args> { + + public void read(org.apache.thrift.protocol.TProtocol iprot, resetUserPassword_args struct) throws org.apache.thrift.TException { + org.apache.thrift.protocol.TField schemeField; + iprot.readStructBegin(); + while (true) + { + schemeField = iprot.readFieldBegin(); + if (schemeField.type == org.apache.thrift.protocol.TType.STOP) { + break; + } + switch (schemeField.id) { + case 1: // AUTHZ_TOKEN + if (schemeField.type == org.apache.thrift.protocol.TType.STRUCT) { + struct.authzToken = new org.apache.airavata.model.security.AuthzToken(); + struct.authzToken.read(iprot); + struct.setAuthzTokenIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 2: // USER_DETAILS + if (schemeField.type == org.apache.thrift.protocol.TType.STRUCT) { + struct.userDetails = new org.apache.airavata.model.user.UserProfile(); + struct.userDetails.read(iprot); + struct.setUserDetailsIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 3: // IS_REALM_ADMIN_CREDENTIALS + if (schemeField.type == org.apache.thrift.protocol.TType.STRUCT) { + struct.isRealmAdminCredentials = new org.apache.airavata.model.credential.store.PasswordCredential(); + struct.isRealmAdminCredentials.read(iprot); + struct.setIsRealmAdminCredentialsIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 4: // NEW_PASSWORD + if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { + struct.newPassword = iprot.readString(); + struct.setNewPasswordIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + default: + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + iprot.readFieldEnd(); + } + iprot.readStructEnd(); + + // check for required fields of primitive type, which can't be checked in the validate method + struct.validate(); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot, resetUserPassword_args struct) throws org.apache.thrift.TException { + struct.validate(); + + oprot.writeStructBegin(STRUCT_DESC); + if (struct.authzToken != null) { + oprot.writeFieldBegin(AUTHZ_TOKEN_FIELD_DESC); + struct.authzToken.write(oprot); + oprot.writeFieldEnd(); + } + if (struct.userDetails != null) { + oprot.writeFieldBegin(USER_DETAILS_FIELD_DESC); + struct.userDetails.write(oprot); + oprot.writeFieldEnd(); + } + if (struct.isRealmAdminCredentials != null) { + oprot.writeFieldBegin(IS_REALM_ADMIN_CREDENTIALS_FIELD_DESC); + struct.isRealmAdminCredentials.write(oprot); + oprot.writeFieldEnd(); + } + if (struct.newPassword != null) { + oprot.writeFieldBegin(NEW_PASSWORD_FIELD_DESC); + oprot.writeString(struct.newPassword); + oprot.writeFieldEnd(); + } + oprot.writeFieldStop(); + oprot.writeStructEnd(); + } + + } + + private static class resetUserPassword_argsTupleSchemeFactory implements SchemeFactory { + public resetUserPassword_argsTupleScheme getScheme() { + return new resetUserPassword_argsTupleScheme(); + } + } + + private static class resetUserPassword_argsTupleScheme extends TupleScheme<resetUserPassword_args> { + + @Override + public void write(org.apache.thrift.protocol.TProtocol prot, resetUserPassword_args struct) throws org.apache.thrift.TException { + TTupleProtocol oprot = (TTupleProtocol) prot; + struct.authzToken.write(oprot); + struct.userDetails.write(oprot); + struct.isRealmAdminCredentials.write(oprot); + oprot.writeString(struct.newPassword); + } + + @Override + public void read(org.apache.thrift.protocol.TProtocol prot, resetUserPassword_args struct) throws org.apache.thrift.TException { + TTupleProtocol iprot = (TTupleProtocol) prot; + struct.authzToken = new org.apache.airavata.model.security.AuthzToken(); + struct.authzToken.read(iprot); + struct.setAuthzTokenIsSet(true); + struct.userDetails = new org.apache.airavata.model.user.UserProfile(); + struct.userDetails.read(iprot); + struct.setUserDetailsIsSet(true); + struct.isRealmAdminCredentials = new org.apache.airavata.model.credential.store.PasswordCredential(); + struct.isRealmAdminCredentials.read(iprot); + struct.setIsRealmAdminCredentialsIsSet(true); + struct.newPassword = iprot.readString(); + struct.setNewPasswordIsSet(true); + } + } + + } + + public static class resetUserPassword_result implements org.apache.thrift.TBase<resetUserPassword_result, resetUserPassword_result._Fields>, java.io.Serializable, Cloneable, Comparable<resetUserPassword_result> { + private static final org.apache.thrift.protocol.TStruct STRUCT_DESC = new org.apache.thrift.protocol.TStruct("resetUserPassword_result"); + + private static final org.apache.thrift.protocol.TField SUCCESS_FIELD_DESC = new org.apache.thrift.protocol.TField("success", org.apache.thrift.protocol.TType.BOOL, (short)0); + private static final org.apache.thrift.protocol.TField IDSE_FIELD_DESC = new org.apache.thrift.protocol.TField("Idse", org.apache.thrift.protocol.TType.STRUCT, (short)1); + private static final org.apache.thrift.protocol.TField AE_FIELD_DESC = new org.apache.thrift.protocol.TField("ae", org.apache.thrift.protocol.TType.STRUCT, (short)2); + + private static final Map<Class<? extends IScheme>, SchemeFactory> schemes = new HashMap<Class<? extends IScheme>, SchemeFactory>(); + static { + schemes.put(StandardScheme.class, new resetUserPassword_resultStandardSchemeFactory()); + schemes.put(TupleScheme.class, new resetUserPassword_resultTupleSchemeFactory()); + } + + public boolean success; // required + public org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException Idse; // required + public org.apache.airavata.model.error.AuthorizationException ae; // required + + /** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */ + public enum _Fields implements org.apache.thrift.TFieldIdEnum { + SUCCESS((short)0, "success"), + IDSE((short)1, "Idse"), + AE((short)2, "ae"); + + private static final Map<String, _Fields> byName = new HashMap<String, _Fields>(); + + static { + for (_Fields field : EnumSet.allOf(_Fields.class)) { + byName.put(field.getFieldName(), field); + } + } + + /** + * Find the _Fields constant that matches fieldId, or null if its not found. + */ + public static _Fields findByThriftId(int fieldId) { + switch(fieldId) { + case 0: // SUCCESS + return SUCCESS; + case 1: // IDSE + return IDSE; + case 2: // AE + return AE; + default: + return null; + } + } + + /** + * Find the _Fields constant that matches fieldId, throwing an exception + * if it is not found. + */ + public static _Fields findByThriftIdOrThrow(int fieldId) { + _Fields fields = findByThriftId(fieldId); + if (fields == null) throw new IllegalArgumentException("Field " + fieldId + " doesn't exist!"); + return fields; + } + + /** + * Find the _Fields constant that matches name, or null if its not found. + */ + public static _Fields findByName(String name) { + return byName.get(name); + } + + private final short _thriftId; + private final String _fieldName; + + _Fields(short thriftId, String fieldName) { + _thriftId = thriftId; + _fieldName = fieldName; + } + + public short getThriftFieldId() { + return _thriftId; + } + + public String getFieldName() { + return _fieldName; + } + } + + // isset id assignments + private static final int __SUCCESS_ISSET_ID = 0; + private byte __isset_bitfield = 0; + public static final Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> metaDataMap; + static { + Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> tmpMap = new EnumMap<_Fields, org.apache.thrift.meta_data.FieldMetaData>(_Fields.class); + tmpMap.put(_Fields.SUCCESS, new org.apache.thrift.meta_data.FieldMetaData("success", org.apache.thrift.TFieldRequirementType.DEFAULT, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.BOOL))); + tmpMap.put(_Fields.IDSE, new org.apache.thrift.meta_data.FieldMetaData("Idse", org.apache.thrift.TFieldRequirementType.DEFAULT, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRUCT))); + tmpMap.put(_Fields.AE, new org.apache.thrift.meta_data.FieldMetaData("ae", org.apache.thrift.TFieldRequirementType.DEFAULT, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRUCT))); + metaDataMap = Collections.unmodifiableMap(tmpMap); + org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(resetUserPassword_result.class, metaDataMap); + } + + public resetUserPassword_result() { + } + + public resetUserPassword_result( + boolean success, + org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException Idse, + org.apache.airavata.model.error.AuthorizationException ae) + { + this(); + this.success = success; + setSuccessIsSet(true); + this.Idse = Idse; + this.ae = ae; + } + + /** + * Performs a deep copy on <i>other</i>. + */ + public resetUserPassword_result(resetUserPassword_result other) { + __isset_bitfield = other.__isset_bitfield; + this.success = other.success; + if (other.isSetIdse()) { + this.Idse = new org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException(other.Idse); + } + if (other.isSetAe()) { + this.ae = new org.apache.airavata.model.error.AuthorizationException(other.ae); + } + } + + public resetUserPassword_result deepCopy() { + return new resetUserPassword_result(this); + } + + @Override + public void clear() { + setSuccessIsSet(false); + this.success = false; + this.Idse = null; + this.ae = null; + } + + public boolean isSuccess() { + return this.success; + } + + public resetUserPassword_result setSuccess(boolean success) { + this.success = success; + setSuccessIsSet(true); + return this; + } + + public void unsetSuccess() { + __isset_bitfield = EncodingUtils.clearBit(__isset_bitfield, __SUCCESS_ISSET_ID); + } + + /** Returns true if field success is set (has been assigned a value) and false otherwise */ + public boolean isSetSuccess() { + return EncodingUtils.testBit(__isset_bitfield, __SUCCESS_ISSET_ID); + } + + public void setSuccessIsSet(boolean value) { + __isset_bitfield = EncodingUtils.setBit(__isset_bitfield, __SUCCESS_ISSET_ID, value); + } + + public org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException getIdse() { + return this.Idse; + } + + public resetUserPassword_result setIdse(org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException Idse) { + this.Idse = Idse; + return this; + } + + public void unsetIdse() { + this.Idse = null; + } + + /** Returns true if field Idse is set (has been assigned a value) and false otherwise */ + public boolean isSetIdse() { + return this.Idse != null; + } + + public void setIdseIsSet(boolean value) { + if (!value) { + this.Idse = null; + } + } + + public org.apache.airavata.model.error.AuthorizationException getAe() { + return this.ae; + } + + public resetUserPassword_result setAe(org.apache.airavata.model.error.AuthorizationException ae) { + this.ae = ae; + return this; + } + + public void unsetAe() { + this.ae = null; + } + + /** Returns true if field ae is set (has been assigned a value) and false otherwise */ + public boolean isSetAe() { + return this.ae != null; + } + + public void setAeIsSet(boolean value) { + if (!value) { + this.ae = null; + } + } + + public void setFieldValue(_Fields field, Object value) { + switch (field) { + case SUCCESS: + if (value == null) { + unsetSuccess(); + } else { + setSuccess((Boolean)value); + } + break; + + case IDSE: + if (value == null) { + unsetIdse(); + } else { + setIdse((org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException)value); + } + break; + + case AE: + if (value == null) { + unsetAe(); + } else { + setAe((org.apache.airavata.model.error.AuthorizationException)value); + } + break; + + } + } + + public Object getFieldValue(_Fields field) { + switch (field) { + case SUCCESS: + return isSuccess(); + + case IDSE: + return getIdse(); + + case AE: + return getAe(); + + } + throw new IllegalStateException(); + } + + /** Returns true if field corresponding to fieldID is set (has been assigned a value) and false otherwise */ + public boolean isSet(_Fields field) { + if (field == null) { + throw new IllegalArgumentException(); + } + + switch (field) { + case SUCCESS: + return isSetSuccess(); + case IDSE: + return isSetIdse(); + case AE: + return isSetAe(); + } + throw new IllegalStateException(); + } + + @Override + public boolean equals(Object that) { + if (that == null) + return false; + if (that instanceof resetUserPassword_result) + return this.equals((resetUserPassword_result)that); + return false; + } + + public boolean equals(resetUserPassword_result that) { + if (that == null) + return false; + + boolean this_present_success = true; + boolean that_present_success = true; + if (this_present_success || that_present_success) { + if (!(this_present_success && that_present_success)) + return false; + if (this.success != that.success) + return false; + } + + boolean this_present_Idse = true && this.isSetIdse(); + boolean that_present_Idse = true && that.isSetIdse(); + if (this_present_Idse || that_present_Idse) { + if (!(this_present_Idse && that_present_Idse)) + return false; + if (!this.Idse.equals(that.Idse)) + return false; + } + + boolean this_present_ae = true && this.isSetAe(); + boolean that_present_ae = true && that.isSetAe(); + if (this_present_ae || that_present_ae) { + if (!(this_present_ae && that_present_ae)) + return false; + if (!this.ae.equals(that.ae)) + return false; + } + + return true; + } + + @Override + public int hashCode() { + List<Object> list = new ArrayList<Object>(); + + boolean present_success = true; + list.add(present_success); + if (present_success) + list.add(success); + + boolean present_Idse = true && (isSetIdse()); + list.add(present_Idse); + if (present_Idse) + list.add(Idse); + + boolean present_ae = true && (isSetAe()); + list.add(present_ae); + if (present_ae) + list.add(ae); + + return list.hashCode(); + } + + @Override + public int compareTo(resetUserPassword_result other) { + if (!getClass().equals(other.getClass())) { + return getClass().getName().compareTo(other.getClass().getName()); + } + + int lastComparison = 0; + + lastComparison = Boolean.valueOf(isSetSuccess()).compareTo(other.isSetSuccess()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetSuccess()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.success, other.success); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetIdse()).compareTo(other.isSetIdse()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetIdse()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.Idse, other.Idse); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetAe()).compareTo(other.isSetAe()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetAe()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.ae, other.ae); + if (lastComparison != 0) { + return lastComparison; + } + } + return 0; + } + + public _Fields fieldForId(int fieldId) { + return _Fields.findByThriftId(fieldId); + } + + public void read(org.apache.thrift.protocol.TProtocol iprot) throws org.apache.thrift.TException { + schemes.get(iprot.getScheme()).getScheme().read(iprot, this); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot) throws org.apache.thrift.TException { + schemes.get(oprot.getScheme()).getScheme().write(oprot, this); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder("resetUserPassword_result("); + boolean first = true; + + sb.append("success:"); + sb.append(this.success); + first = false; + if (!first) sb.append(", "); + sb.append("Idse:"); + if (this.Idse == null) { + sb.append("null"); + } else { + sb.append(this.Idse); + } + first = false; + if (!first) sb.append(", "); + sb.append("ae:"); + if (this.ae == null) { + sb.append("null"); + } else { + sb.append(this.ae); + } + first = false; + sb.append(")"); + return sb.toString(); + } + + public void validate() throws org.apache.thrift.TException { + // check for required fields + // check for sub-struct validity + } + + private void writeObject(java.io.ObjectOutputStream out) throws java.io.IOException { + try { + write(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(out))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private void readObject(java.io.ObjectInputStream in) throws java.io.IOException, ClassNotFoundException { + try { + // it doesn't seem like you should have to do this, but java serialization is wacky, and doesn't call the default constructor. + __isset_bitfield = 0; + read(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(in))); + } catch (org.apache.thrift.TException te) { + throw new java.io.IOException(te); + } + } + + private static class resetUserPassword_resultStandardSchemeFactory implements SchemeFactory { + public resetUserPassword_resultStandardScheme getScheme() { + return new resetUserPassword_resultStandardScheme(); + } + } + + private static class resetUserPassword_resultStandardScheme extends StandardScheme<resetUserPassword_result> { + + public void read(org.apache.thrift.protocol.TProtocol iprot, resetUserPassword_result struct) throws org.apache.thrift.TException { + org.apache.thrift.protocol.TField schemeField; + iprot.readStructBegin(); + while (true) + { + schemeField = iprot.readFieldBegin(); + if (schemeField.type == org.apache.thrift.protocol.TType.STOP) { + break; + } + switch (schemeField.id) { + case 0: // SUCCESS + if (schemeField.type == org.apache.thrift.protocol.TType.BOOL) { + struct.success = iprot.readBool(); + struct.setSuccessIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 1: // IDSE + if (schemeField.type == org.apache.thrift.protocol.TType.STRUCT) { + struct.Idse = new org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException(); + struct.Idse.read(iprot); + struct.setIdseIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + case 2: // AE + if (schemeField.type == org.apache.thrift.protocol.TType.STRUCT) { + struct.ae = new org.apache.airavata.model.error.AuthorizationException(); + struct.ae.read(iprot); + struct.setAeIsSet(true); + } else { + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + break; + default: + org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); + } + iprot.readFieldEnd(); + } + iprot.readStructEnd(); + + // check for required fields of primitive type, which can't be checked in the validate method + struct.validate(); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot, resetUserPassword_result struct) throws org.apache.thrift.TException { + struct.validate(); + + oprot.writeStructBegin(STRUCT_DESC); + if (struct.isSetSuccess()) { + oprot.writeFieldBegin(SUCCESS_FIELD_DESC); + oprot.writeBool(struct.success); + oprot.writeFieldEnd(); + } + if (struct.Idse != null) { + oprot.writeFieldBegin(IDSE_FIELD_DESC); + struct.Idse.write(oprot); + oprot.writeFieldEnd(); + } + if (struct.ae != null) { + oprot.writeFieldBegin(AE_FIELD_DESC); + struct.ae.write(oprot); + oprot.writeFieldEnd(); + } + oprot.writeFieldStop(); + oprot.writeStructEnd(); + } + + } + + private static class resetUserPassword_resultTupleSchemeFactory implements SchemeFactory { + public resetUserPassword_resultTupleScheme getScheme() { + return new resetUserPassword_resultTupleScheme(); + } + } + + private static class resetUserPassword_resultTupleScheme extends TupleScheme<resetUserPassword_result> { + + @Override + public void write(org.apache.thrift.protocol.TProtocol prot, resetUserPassword_result struct) throws org.apache.thrift.TException { + TTupleProtocol oprot = (TTupleProtocol) prot; + BitSet optionals = new BitSet(); + if (struct.isSetSuccess()) { + optionals.set(0); + } + if (struct.isSetIdse()) { + optionals.set(1); + } + if (struct.isSetAe()) { + optionals.set(2); + } + oprot.writeBitSet(optionals, 3); + if (struct.isSetSuccess()) { + oprot.writeBool(struct.success); + } + if (struct.isSetIdse()) { + struct.Idse.write(oprot); + } + if (struct.isSetAe()) { + struct.ae.write(oprot); + } + } + + @Override + public void read(org.apache.thrift.protocol.TProtocol prot, resetUserPassword_result struct) throws org.apache.thrift.TException { + TTupleProtocol iprot = (TTupleProtocol) prot; + BitSet incoming = iprot.readBitSet(3); + if (incoming.get(0)) { + struct.success = iprot.readBool(); + struct.setSuccessIsSet(true); + } + if (incoming.get(1)) { + struct.Idse = new org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException(); + struct.Idse.read(iprot); + struct.setIdseIsSet(true); + } + if (incoming.get(2)) { + struct.ae = new org.apache.airavata.model.error.AuthorizationException(); + struct.ae.read(iprot); + struct.setAeIsSet(true); + } + } + } + + } + + public static class findUsers_args implements org.apache.thrift.TBase<findUsers_args, findUsers_args._Fields>, java.io.Serializable, Cloneable, Comparable<findUsers_args> { + private static final org.apache.thrift.protocol.TStruct STRUCT_DESC = new org.apache.thrift.protocol.TStruct("findUsers_args"); + + private static final org.apache.thrift.protocol.TField AUTHZ_TOKEN_FIELD_DESC = new org.apache.thrift.protocol.TField("authzToken", org.apache.thrift.protocol.TType.STRUCT, (short)1); + private static final org.apache.thrift.protocol.TField GATEWAY_ID_FIELD_DESC = new org.apache.thrift.protocol.TField("gatewayID", org.apache.thrift.protocol.TType.STRING, (short)2); + private static final org.apache.thrift.protocol.TField EMAIL_FIELD_DESC = new org.apache.thrift.protocol.TField("email", org.apache.thrift.protocol.TType.STRING, (short)3); + private static final org.apache.thrift.protocol.TField USER_ID_FIELD_DESC = new org.apache.thrift.protocol.TField("userId", org.apache.thrift.protocol.TType.STRING, (short)4); + private static final org.apache.thrift.protocol.TField IS_REALM_ADMIN_CREDENTIALS_FIELD_DESC = new org.apache.thrift.protocol.TField("isRealmAdminCredentials", org.apache.thrift.protocol.TType.STRUCT, (short)5); + + private static final Map<Class<? extends IScheme>, SchemeFactory> schemes = new HashMap<Class<? extends IScheme>, SchemeFactory>(); + static { + schemes.put(StandardScheme.class, new findUsers_argsStandardSchemeFactory()); + schemes.put(TupleScheme.class, new findUsers_argsTupleSchemeFactory()); + } + + public org.apache.airavata.model.security.AuthzToken authzToken; // required + public String gatewayID; // required + public String email; // required + public String userId; // required + public org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials; // required + + /** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */ + public enum _Fields implements org.apache.thrift.TFieldIdEnum { + AUTHZ_TOKEN((short)1, "authzToken"), + GATEWAY_ID((short)2, "gatewayID"), + EMAIL((short)3, "email"), + USER_ID((short)4, "userId"), + IS_REALM_ADMIN_CREDENTIALS((short)5, "isRealmAdminCredentials"); + + private static final Map<String, _Fields> byName = new HashMap<String, _Fields>(); + + static { + for (_Fields field : EnumSet.allOf(_Fields.class)) { + byName.put(field.getFieldName(), field); + } + } + + /** + * Find the _Fields constant that matches fieldId, or null if its not found. + */ + public static _Fields findByThriftId(int fieldId) { + switch(fieldId) { + case 1: // AUTHZ_TOKEN + return AUTHZ_TOKEN; + case 2: // GATEWAY_ID + return GATEWAY_ID; + case 3: // EMAIL + return EMAIL; + case 4: // USER_ID + return USER_ID; + case 5: // IS_REALM_ADMIN_CREDENTIALS + return IS_REALM_ADMIN_CREDENTIALS; + default: + return null; + } + } + + /** + * Find the _Fields constant that matches fieldId, throwing an exception + * if it is not found. + */ + public static _Fields findByThriftIdOrThrow(int fieldId) { + _Fields fields = findByThriftId(fieldId); + if (fields == null) throw new IllegalArgumentException("Field " + fieldId + " doesn't exist!"); + return fields; + } + + /** + * Find the _Fields constant that matches name, or null if its not found. + */ + public static _Fields findByName(String name) { + return byName.get(name); + } + + private final short _thriftId; + private final String _fieldName; + + _Fields(short thriftId, String fieldName) { + _thriftId = thriftId; + _fieldName = fieldName; + } + + public short getThriftFieldId() { + return _thriftId; + } + + public String getFieldName() { + return _fieldName; + } + } + + // isset id assignments + public static final Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> metaDataMap; + static { + Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> tmpMap = new EnumMap<_Fields, org.apache.thrift.meta_data.FieldMetaData>(_Fields.class); + tmpMap.put(_Fields.AUTHZ_TOKEN, new org.apache.thrift.meta_data.FieldMetaData("authzToken", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.StructMetaData(org.apache.thrift.protocol.TType.STRUCT, org.apache.airavata.model.security.AuthzToken.class))); + tmpMap.put(_Fields.GATEWAY_ID, new org.apache.thrift.meta_data.FieldMetaData("gatewayID", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.EMAIL, new org.apache.thrift.meta_data.FieldMetaData("email", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.USER_ID, new org.apache.thrift.meta_data.FieldMetaData("userId", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); + tmpMap.put(_Fields.IS_REALM_ADMIN_CREDENTIALS, new org.apache.thrift.meta_data.FieldMetaData("isRealmAdminCredentials", org.apache.thrift.TFieldRequirementType.REQUIRED, + new org.apache.thrift.meta_data.StructMetaData(org.apache.thrift.protocol.TType.STRUCT, org.apache.airavata.model.credential.store.PasswordCredential.class))); + metaDataMap = Collections.unmodifiableMap(tmpMap); + org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(findUsers_args.class, metaDataMap); + } + + public findUsers_args() { + } + + public findUsers_args( + org.apache.airavata.model.security.AuthzToken authzToken, + String gatewayID, + String email, + String userId, + org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials) + { + this(); + this.authzToken = authzToken; + this.gatewayID = gatewayID; + this.email = email; + this.userId = userId; + this.isRealmAdminCredentials = isRealmAdminCredentials; + } + + /** + * Performs a deep copy on <i>other</i>. + */ + public findUsers_args(findUsers_args other) { + if (other.isSetAuthzToken()) { + this.authzToken = new org.apache.airavata.model.security.AuthzToken(other.authzToken); + } + if (other.isSetGatewayID()) { + this.gatewayID = other.gatewayID; + } + if (other.isSetEmail()) { + this.email = other.email; + } + if (other.isSetUserId()) { + this.userId = other.userId; + } + if (other.isSetIsRealmAdminCredentials()) { + this.isRealmAdminCredentials = new org.apache.airavata.model.credential.store.PasswordCredential(other.isRealmAdminCredentials); + } + } + + public findUsers_args deepCopy() { + return new findUsers_args(this); + } + + @Override + public void clear() { + this.authzToken = null; + this.gatewayID = null; + this.email = null; + this.userId = null; + this.isRealmAdminCredentials = null; + } + + public org.apache.airavata.model.security.AuthzToken getAuthzToken() { + return this.authzToken; + } + + public findUsers_args setAuthzToken(org.apache.airavata.model.security.AuthzToken authzToken) { + this.authzToken = authzToken; + return this; + } + + public void unsetAuthzToken() { + this.authzToken = null; + } + + /** Returns true if field authzToken is set (has been assigned a value) and false otherwise */ + public boolean isSetAuthzToken() { + return this.authzToken != null; + } + + public void setAuthzTokenIsSet(boolean value) { + if (!value) { + this.authzToken = null; + } + } + + public String getGatewayID() { + return this.gatewayID; + } + + public findUsers_args setGatewayID(String gatewayID) { + this.gatewayID = gatewayID; + return this; + } + + public void unsetGatewayID() { + this.gatewayID = null; + } + + /** Returns true if field gatewayID is set (has been assigned a value) and false otherwise */ + public boolean isSetGatewayID() { + return this.gatewayID != null; + } + + public void setGatewayIDIsSet(boolean value) { + if (!value) { + this.gatewayID = null; + } + } + + public String getEmail() { + return this.email; + } + + public findUsers_args setEmail(String email) { + this.email = email; + return this; + } + + public void unsetEmail() { + this.email = null; + } + + /** Returns true if field email is set (has been assigned a value) and false otherwise */ + public boolean isSetEmail() { + return this.email != null; + } + + public void setEmailIsSet(boolean value) { + if (!value) { + this.email = null; + } + } + + public String getUserId() { + return this.userId; + } + + public findUsers_args setUserId(String userId) { + this.userId = userId; + return this; + } + + public void unsetUserId() { + this.userId = null; + } + + /** Returns true if field userId is set (has been assigned a value) and false otherwise */ + public boolean isSetUserId() { + return this.userId != null; + } + + public void setUserIdIsSet(boolean value) { + if (!value) { + this.userId = null; + } + } + + public org.apache.airavata.model.credential.store.PasswordCredential getIsRealmAdminCredentials() { + return this.isRealmAdminCredentials; + } + + public findUsers_args setIsRealmAdminCredentials(org.apache.airavata.model.credential.store.PasswordCredential isRealmAdminCredentials) { + this.isRealmAdminCredentials = isRealmAdminCredentials; + return this; + } + + public void unsetIsRealmAdminCredentials() { + this.isRealmAdminCredentials = null; + } + + /** Returns true if field isRealmAdminCredentials is set (has been assigned a value) and false otherwise */ + public boolean isSetIsRealmAdminCredentials() { + return this.isRealmAdminCredentials != null; + } + + public void setIsRealmAdminCredentialsIsSet(boolean value) { + if (!value) { + this.isRealmAdminCredentials = null; + } + } + + public void setFieldValue(_Fields field, Object value) { + switch (field) { + case AUTHZ_TOKEN: + if (value == null) { + unsetAuthzToken(); + } else { + setAuthzToken((org.apache.airavata.model.security.AuthzToken)value); + } + break; + + case GATEWAY_ID: + if (value == null) { + unsetGatewayID(); + } else { + setGatewayID((String)value); + } + break; + + case EMAIL: + if (value == null) { + unsetEmail(); + } else { + setEmail((String)value); + } + break; + + case USER_ID: + if (value == null) { + unsetUserId(); + } else { + setUserId((String)value); + } + break; + + case IS_REALM_ADMIN_CREDENTIALS: + if (value == null) { + unsetIsRealmAdminCredentials(); + } else { + setIsRealmAdminCredentials((org.apache.airavata.model.credential.store.PasswordCredential)value); + } + break; + + } + } + + public Object getFieldValue(_Fields field) { + switch (field) { + case AUTHZ_TOKEN: + return getAuthzToken(); + + case GATEWAY_ID: + return getGatewayID(); + + case EMAIL: + return getEmail(); + + case USER_ID: + return getUserId(); + + case IS_REALM_ADMIN_CREDENTIALS: + return getIsRealmAdminCredentials(); + + } + throw new IllegalStateException(); + } + + /** Returns true if field corresponding to fieldID is set (has been assigned a value) and false otherwise */ + public boolean isSet(_Fields field) { + if (field == null) { + throw new IllegalArgumentException(); + } + + switch (field) { + case AUTHZ_TOKEN: + return isSetAuthzToken(); + case GATEWAY_ID: + return isSetGatewayID(); + case EMAIL: + return isSetEmail(); + case USER_ID: + return isSetUserId(); + case IS_REALM_ADMIN_CREDENTIALS: + return isSetIsRealmAdminCredentials(); + } + throw new IllegalStateException(); + } + + @Override + public boolean equals(Object that) { + if (that == null) + return false; + if (that instanceof findUsers_args) + return this.equals((findUsers_args)that); + return false; + } + + public boolean equals(findUsers_args that) { + if (that == null) + return false; + + boolean this_present_authzToken = true && this.isSetAuthzToken(); + boolean that_present_authzToken = true && that.isSetAuthzToken(); + if (this_present_authzToken || that_present_authzToken) { + if (!(this_present_authzToken && that_present_authzToken)) + return false; + if (!this.authzToken.equals(that.authzToken)) + return false; + } + + boolean this_present_gatewayID = true && this.isSetGatewayID(); + boolean that_present_gatewayID = true && that.isSetGatewayID(); + if (this_present_gatewayID || that_present_gatewayID) { + if (!(this_present_gatewayID && that_present_gatewayID)) + return false; + if (!this.gatewayID.equals(that.gatewayID)) + return false; + } + + boolean this_present_email = true && this.isSetEmail(); + boolean that_present_email = true && that.isSetEmail(); + if (this_present_email || that_present_email) { + if (!(this_present_email && that_present_email)) + return false; + if (!this.email.equals(that.email)) + return false; + } + + boolean this_present_userId = true && this.isSetUserId(); + boolean that_present_userId = true && that.isSetUserId(); + if (this_present_userId || that_present_userId) { + if (!(this_present_userId && that_present_userId)) + return false; + if (!this.userId.equals(that.userId)) + return false; + } + + boolean this_present_isRealmAdminCredentials = true && this.isSetIsRealmAdminCredentials(); + boolean that_present_isRealmAdminCredentials = true && that.isSetIsRealmAdminCredentials(); + if (this_present_isRealmAdminCredentials || that_present_isRealmAdminCredentials) { + if (!(this_present_isRealmAdminCredentials && that_present_isRealmAdminCredentials)) + return false; + if (!this.isRealmAdminCredentials.equals(that.isRealmAdminCredentials)) + return false; + } + + return true; + } + + @Override + public int hashCode() { + List<Object> list = new ArrayList<Object>(); + + boolean present_authzToken = true && (isSetAuthzToken()); + list.add(present_authzToken); + if (present_authzToken) + list.add(authzToken); + + boolean present_gatewayID = true && (isSetGatewayID()); + list.add(present_gatewayID); + if (present_gatewayID) + list.add(gatewayID); + + boolean present_email = true && (isSetEmail()); + list.add(present_email); + if (present_email) + list.add(email); + + boolean present_userId = true && (isSetUserId()); + list.add(present_userId); + if (present_userId) + list.add(userId); + + boolean present_isRealmAdminCredentials = true && (isSetIsRealmAdminCredentials()); + list.add(present_isRealmAdminCredentials); + if (present_isRealmAdminCredentials) + list.add(isRealmAdminCredentials); + + return list.hashCode(); + } + + @Override + public int compareTo(findUsers_args other) { + if (!getClass().equals(other.getClass())) { + return getClass().getName().compareTo(other.getClass().getName()); + } + + int lastComparison = 0; + + lastComparison = Boolean.valueOf(isSetAuthzToken()).compareTo(other.isSetAuthzToken()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetAuthzToken()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.authzToken, other.authzToken); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetGatewayID()).compareTo(other.isSetGatewayID()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetGatewayID()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.gatewayID, other.gatewayID); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetEmail()).compareTo(other.isSetEmail()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetEmail()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.email, other.email); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetUserId()).compareTo(other.isSetUserId()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetUserId()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.userId, other.userId); + if (lastComparison != 0) { + return lastComparison; + } + } + lastComparison = Boolean.valueOf(isSetIsRealmAdminCredentials()).compareTo(other.isSetIsRealmAdminCredentials()); + if (lastComparison != 0) { + return lastComparison; + } + if (isSetIsRealmAdminCredentials()) { + lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.isRealmAdminCredentials, other.isRealmAdminCredentials); + if (lastComparison != 0) { + return lastComparison; + } + } + return 0; + } + + public _Fields fieldForId(int fieldId) { + return _Fields.findByThriftId(fieldId); + } + + public void read(org.apache.thrift.protocol.TProtocol iprot) throws org.apache.thrift.TException { + schemes.get(iprot.getScheme()).getScheme().read(iprot, this); + } + + public void write(org.apache.thrift.protocol.TProtocol oprot) throws org.apache.thrift.TException { + schemes.get(oprot.getScheme()).getScheme().write(oprot, this); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder("findUsers_args("); + boolean first = true; + + sb.append("authzToken:"); + if (this.authzToken == null) { + sb.append("null"); + } else { + sb.append(this.authzToken); + } + first = false; + if (!first) sb.append(", "); + sb.append("gatewayID:"); + if (this.gatewayID == null) { + sb.append("null"); + } else { + sb.append(this.gatewayID); + } + first = false; + if (!first) sb.append(", "); + sb.append("email:"); + if (this.email == null) { + sb.append("null"); + } else { + sb.append(this.email); + } + first = false; + if (!first) sb.appe
<TRUNCATED>
