/** * * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ /** * Autogenerated by Thrift Compiler (0.9.3) * * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING * @generated */ package org.apache.airavata.model.credential.store; import org.apache.thrift.scheme.IScheme; import org.apache.thrift.scheme.SchemeFactory; import org.apache.thrift.scheme.StandardScheme; import org.apache.thrift.scheme.TupleScheme; import org.apache.thrift.protocol.TTupleProtocol; import org.apache.thrift.protocol.TProtocolException; import org.apache.thrift.EncodingUtils; import org.apache.thrift.TException; import org.apache.thrift.async.AsyncMethodCallback; import org.apache.thrift.server.AbstractNonblockingServer.*; import java.util.List; import java.util.ArrayList; import java.util.Map; import java.util.HashMap; import java.util.EnumMap; import java.util.Set; import java.util.HashSet; import java.util.EnumSet; import java.util.Collections; import java.util.BitSet; import java.nio.ByteBuffer; import java.util.Arrays; import javax.annotation.Generated; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @SuppressWarnings({"cast", "rawtypes", "serial", "unchecked"}) @Generated(value = "Autogenerated by Thrift Compiler (0.9.3)") public class PasswordCredential implements org.apache.thrift.TBase<PasswordCredential, PasswordCredential._Fields>, java.io.Serializable, Cloneable, Comparable<PasswordCredential> { private static final org.apache.thrift.protocol.TStruct STRUCT_DESC = new org.apache.thrift.protocol.TStruct("PasswordCredential"); private static final org.apache.thrift.protocol.TField GATEWAY_ID_FIELD_DESC = new org.apache.thrift.protocol.TField("gatewayId", org.apache.thrift.protocol.TType.STRING, (short)1); private static final org.apache.thrift.protocol.TField PORTAL_USER_NAME_FIELD_DESC = new org.apache.thrift.protocol.TField("portalUserName", org.apache.thrift.protocol.TType.STRING, (short)2); private static final org.apache.thrift.protocol.TField LOGIN_USER_NAME_FIELD_DESC = new org.apache.thrift.protocol.TField("loginUserName", org.apache.thrift.protocol.TType.STRING, (short)3); private static final org.apache.thrift.protocol.TField PASSWORD_FIELD_DESC = new org.apache.thrift.protocol.TField("password", org.apache.thrift.protocol.TType.STRING, (short)4); private static final org.apache.thrift.protocol.TField DESCRIPTION_FIELD_DESC = new org.apache.thrift.protocol.TField("description", org.apache.thrift.protocol.TType.STRING, (short)5); private static final org.apache.thrift.protocol.TField PERSISTED_TIME_FIELD_DESC = new org.apache.thrift.protocol.TField("persistedTime", org.apache.thrift.protocol.TType.I64, (short)6); private static final org.apache.thrift.protocol.TField TOKEN_FIELD_DESC = new org.apache.thrift.protocol.TField("token", org.apache.thrift.protocol.TType.STRING, (short)7); private static final Map<Class<? extends IScheme>, SchemeFactory> schemes = new HashMap<Class<? extends IScheme>, SchemeFactory>(); static { schemes.put(StandardScheme.class, new PasswordCredentialStandardSchemeFactory()); schemes.put(TupleScheme.class, new PasswordCredentialTupleSchemeFactory()); } private String gatewayId; // required private String portalUserName; // required private String loginUserName; // required private String password; // required private String description; // optional private long persistedTime; // optional private String token; // optional /** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */ public enum _Fields implements org.apache.thrift.TFieldIdEnum { GATEWAY_ID((short)1, "gatewayId"), PORTAL_USER_NAME((short)2, "portalUserName"), LOGIN_USER_NAME((short)3, "loginUserName"), PASSWORD((short)4, "password"), DESCRIPTION((short)5, "description"), PERSISTED_TIME((short)6, "persistedTime"), TOKEN((short)7, "token"); private static final Map<String, _Fields> byName = new HashMap<String, _Fields>(); static { for (_Fields field : EnumSet.allOf(_Fields.class)) { byName.put(field.getFieldName(), field); } } /** * Find the _Fields constant that matches fieldId, or null if its not found. */ public static _Fields findByThriftId(int fieldId) { switch(fieldId) { case 1: // GATEWAY_ID return GATEWAY_ID; case 2: // PORTAL_USER_NAME return PORTAL_USER_NAME; case 3: // LOGIN_USER_NAME return LOGIN_USER_NAME; case 4: // PASSWORD return PASSWORD; case 5: // DESCRIPTION return DESCRIPTION; case 6: // PERSISTED_TIME return PERSISTED_TIME; case 7: // TOKEN return TOKEN; default: return null; } } /** * Find the _Fields constant that matches fieldId, throwing an exception * if it is not found. */ public static _Fields findByThriftIdOrThrow(int fieldId) { _Fields fields = findByThriftId(fieldId); if (fields == null) throw new IllegalArgumentException("Field " + fieldId + " doesn't exist!"); return fields; } /** * Find the _Fields constant that matches name, or null if its not found. */ public static _Fields findByName(String name) { return byName.get(name); } private final short _thriftId; private final String _fieldName; _Fields(short thriftId, String fieldName) { _thriftId = thriftId; _fieldName = fieldName; } public short getThriftFieldId() { return _thriftId; } public String getFieldName() { return _fieldName; } } // isset id assignments private static final int __PERSISTEDTIME_ISSET_ID = 0; private byte __isset_bitfield = 0; private static final _Fields optionals[] = {_Fields.DESCRIPTION,_Fields.PERSISTED_TIME,_Fields.TOKEN}; public static final Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> metaDataMap; static { Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> tmpMap = new EnumMap<_Fields, org.apache.thrift.meta_data.FieldMetaData>(_Fields.class); tmpMap.put(_Fields.GATEWAY_ID, new org.apache.thrift.meta_data.FieldMetaData("gatewayId", org.apache.thrift.TFieldRequirementType.REQUIRED, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); tmpMap.put(_Fields.PORTAL_USER_NAME, new org.apache.thrift.meta_data.FieldMetaData("portalUserName", org.apache.thrift.TFieldRequirementType.REQUIRED, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); tmpMap.put(_Fields.LOGIN_USER_NAME, new org.apache.thrift.meta_data.FieldMetaData("loginUserName", org.apache.thrift.TFieldRequirementType.REQUIRED, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); tmpMap.put(_Fields.PASSWORD, new org.apache.thrift.meta_data.FieldMetaData("password", org.apache.thrift.TFieldRequirementType.REQUIRED, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); tmpMap.put(_Fields.DESCRIPTION, new org.apache.thrift.meta_data.FieldMetaData("description", org.apache.thrift.TFieldRequirementType.OPTIONAL, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); tmpMap.put(_Fields.PERSISTED_TIME, new org.apache.thrift.meta_data.FieldMetaData("persistedTime", org.apache.thrift.TFieldRequirementType.OPTIONAL, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.I64))); tmpMap.put(_Fields.TOKEN, new org.apache.thrift.meta_data.FieldMetaData("token", org.apache.thrift.TFieldRequirementType.OPTIONAL, new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING))); metaDataMap = Collections.unmodifiableMap(tmpMap); org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(PasswordCredential.class, metaDataMap); } public PasswordCredential() { } public PasswordCredential( String gatewayId, String portalUserName, String loginUserName, String password) { this(); this.gatewayId = gatewayId; this.portalUserName = portalUserName; this.loginUserName = loginUserName; this.password = password; } /** * Performs a deep copy on <i>other</i>. */ public PasswordCredential(PasswordCredential other) { __isset_bitfield = other.__isset_bitfield; if (other.isSetGatewayId()) { this.gatewayId = other.gatewayId; } if (other.isSetPortalUserName()) { this.portalUserName = other.portalUserName; } if (other.isSetLoginUserName()) { this.loginUserName = other.loginUserName; } if (other.isSetPassword()) { this.password = other.password; } if (other.isSetDescription()) { this.description = other.description; } this.persistedTime = other.persistedTime; if (other.isSetToken()) { this.token = other.token; } } public PasswordCredential deepCopy() { return new PasswordCredential(this); } @Override public void clear() { this.gatewayId = null; this.portalUserName = null; this.loginUserName = null; this.password = null; this.description = null; setPersistedTimeIsSet(false); this.persistedTime = 0; this.token = null; } public String getGatewayId() { return this.gatewayId; } public void setGatewayId(String gatewayId) { this.gatewayId = gatewayId; } public void unsetGatewayId() { this.gatewayId = null; } /** Returns true if field gatewayId is set (has been assigned a value) and false otherwise */ public boolean isSetGatewayId() { return this.gatewayId != null; } public void setGatewayIdIsSet(boolean value) { if (!value) { this.gatewayId = null; } } public String getPortalUserName() { return this.portalUserName; } public void setPortalUserName(String portalUserName) { this.portalUserName = portalUserName; } public void unsetPortalUserName() { this.portalUserName = null; } /** Returns true if field portalUserName is set (has been assigned a value) and false otherwise */ public boolean isSetPortalUserName() { return this.portalUserName != null; } public void setPortalUserNameIsSet(boolean value) { if (!value) { this.portalUserName = null; } } public String getLoginUserName() { return this.loginUserName; } public void setLoginUserName(String loginUserName) { this.loginUserName = loginUserName; } public void unsetLoginUserName() { this.loginUserName = null; } /** Returns true if field loginUserName is set (has been assigned a value) and false otherwise */ public boolean isSetLoginUserName() { return this.loginUserName != null; } public void setLoginUserNameIsSet(boolean value) { if (!value) { this.loginUserName = null; } } public String getPassword() { return this.password; } public void setPassword(String password) { this.password = password; } public void unsetPassword() { this.password = null; } /** Returns true if field password is set (has been assigned a value) and false otherwise */ public boolean isSetPassword() { return this.password != null; } public void setPasswordIsSet(boolean value) { if (!value) { this.password = null; } } public String getDescription() { return this.description; } public void setDescription(String description) { this.description = description; } public void unsetDescription() { this.description = null; } /** Returns true if field description is set (has been assigned a value) and false otherwise */ public boolean isSetDescription() { return this.description != null; } public void setDescriptionIsSet(boolean value) { if (!value) { this.description = null; } } public long getPersistedTime() { return this.persistedTime; } public void setPersistedTime(long persistedTime) { this.persistedTime = persistedTime; setPersistedTimeIsSet(true); } public void unsetPersistedTime() { __isset_bitfield = EncodingUtils.clearBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID); } /** Returns true if field persistedTime is set (has been assigned a value) and false otherwise */ public boolean isSetPersistedTime() { return EncodingUtils.testBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID); } public void setPersistedTimeIsSet(boolean value) { __isset_bitfield = EncodingUtils.setBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID, value); } public String getToken() { return this.token; } public void setToken(String token) { this.token = token; } public void unsetToken() { this.token = null; } /** Returns true if field token is set (has been assigned a value) and false otherwise */ public boolean isSetToken() { return this.token != null; } public void setTokenIsSet(boolean value) { if (!value) { this.token = null; } } public void setFieldValue(_Fields field, Object value) { switch (field) { case GATEWAY_ID: if (value == null) { unsetGatewayId(); } else { setGatewayId((String)value); } break; case PORTAL_USER_NAME: if (value == null) { unsetPortalUserName(); } else { setPortalUserName((String)value); } break; case LOGIN_USER_NAME: if (value == null) { unsetLoginUserName(); } else { setLoginUserName((String)value); } break; case PASSWORD: if (value == null) { unsetPassword(); } else { setPassword((String)value); } break; case DESCRIPTION: if (value == null) { unsetDescription(); } else { setDescription((String)value); } break; case PERSISTED_TIME: if (value == null) { unsetPersistedTime(); } else { setPersistedTime((Long)value); } break; case TOKEN: if (value == null) { unsetToken(); } else { setToken((String)value); } break; } } public Object getFieldValue(_Fields field) { switch (field) { case GATEWAY_ID: return getGatewayId(); case PORTAL_USER_NAME: return getPortalUserName(); case LOGIN_USER_NAME: return getLoginUserName(); case PASSWORD: return getPassword(); case DESCRIPTION: return getDescription(); case PERSISTED_TIME: return getPersistedTime(); case TOKEN: return getToken(); } throw new IllegalStateException(); } /** Returns true if field corresponding to fieldID is set (has been assigned a value) and false otherwise */ public boolean isSet(_Fields field) { if (field == null) { throw new IllegalArgumentException(); } switch (field) { case GATEWAY_ID: return isSetGatewayId(); case PORTAL_USER_NAME: return isSetPortalUserName(); case LOGIN_USER_NAME: return isSetLoginUserName(); case PASSWORD: return isSetPassword(); case DESCRIPTION: return isSetDescription(); case PERSISTED_TIME: return isSetPersistedTime(); case TOKEN: return isSetToken(); } throw new IllegalStateException(); } @Override public boolean equals(Object that) { if (that == null) return false; if (that instanceof PasswordCredential) return this.equals((PasswordCredential)that); return false; } public boolean equals(PasswordCredential that) { if (that == null) return false; boolean this_present_gatewayId = true && this.isSetGatewayId(); boolean that_present_gatewayId = true && that.isSetGatewayId(); if (this_present_gatewayId || that_present_gatewayId) { if (!(this_present_gatewayId && that_present_gatewayId)) return false; if (!this.gatewayId.equals(that.gatewayId)) return false; } boolean this_present_portalUserName = true && this.isSetPortalUserName(); boolean that_present_portalUserName = true && that.isSetPortalUserName(); if (this_present_portalUserName || that_present_portalUserName) { if (!(this_present_portalUserName && that_present_portalUserName)) return false; if (!this.portalUserName.equals(that.portalUserName)) return false; } boolean this_present_loginUserName = true && this.isSetLoginUserName(); boolean that_present_loginUserName = true && that.isSetLoginUserName(); if (this_present_loginUserName || that_present_loginUserName) { if (!(this_present_loginUserName && that_present_loginUserName)) return false; if (!this.loginUserName.equals(that.loginUserName)) return false; } boolean this_present_password = true && this.isSetPassword(); boolean that_present_password = true && that.isSetPassword(); if (this_present_password || that_present_password) { if (!(this_present_password && that_present_password)) return false; if (!this.password.equals(that.password)) return false; } boolean this_present_description = true && this.isSetDescription(); boolean that_present_description = true && that.isSetDescription(); if (this_present_description || that_present_description) { if (!(this_present_description && that_present_description)) return false; if (!this.description.equals(that.description)) return false; } boolean this_present_persistedTime = true && this.isSetPersistedTime(); boolean that_present_persistedTime = true && that.isSetPersistedTime(); if (this_present_persistedTime || that_present_persistedTime) { if (!(this_present_persistedTime && that_present_persistedTime)) return false; if (this.persistedTime != that.persistedTime) return false; } boolean this_present_token = true && this.isSetToken(); boolean that_present_token = true && that.isSetToken(); if (this_present_token || that_present_token) { if (!(this_present_token && that_present_token)) return false; if (!this.token.equals(that.token)) return false; } return true; } @Override public int hashCode() { List<Object> list = new ArrayList<Object>(); boolean present_gatewayId = true && (isSetGatewayId()); list.add(present_gatewayId); if (present_gatewayId) list.add(gatewayId); boolean present_portalUserName = true && (isSetPortalUserName()); list.add(present_portalUserName); if (present_portalUserName) list.add(portalUserName); boolean present_loginUserName = true && (isSetLoginUserName()); list.add(present_loginUserName); if (present_loginUserName) list.add(loginUserName); boolean present_password = true && (isSetPassword()); list.add(present_password); if (present_password) list.add(password); boolean present_description = true && (isSetDescription()); list.add(present_description); if (present_description) list.add(description); boolean present_persistedTime = true && (isSetPersistedTime()); list.add(present_persistedTime); if (present_persistedTime) list.add(persistedTime); boolean present_token = true && (isSetToken()); list.add(present_token); if (present_token) list.add(token); return list.hashCode(); } @Override public int compareTo(PasswordCredential other) { if (!getClass().equals(other.getClass())) { return getClass().getName().compareTo(other.getClass().getName()); } int lastComparison = 0; lastComparison = Boolean.valueOf(isSetGatewayId()).compareTo(other.isSetGatewayId()); if (lastComparison != 0) { return lastComparison; } if (isSetGatewayId()) { lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.gatewayId, other.gatewayId); if (lastComparison != 0) { return lastComparison; } } lastComparison = Boolean.valueOf(isSetPortalUserName()).compareTo(other.isSetPortalUserName()); if (lastComparison != 0) { return lastComparison; } if (isSetPortalUserName()) { lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.portalUserName, other.portalUserName); if (lastComparison != 0) { return lastComparison; } } lastComparison = Boolean.valueOf(isSetLoginUserName()).compareTo(other.isSetLoginUserName()); if (lastComparison != 0) { return lastComparison; } if (isSetLoginUserName()) { lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.loginUserName, other.loginUserName); if (lastComparison != 0) { return lastComparison; } } lastComparison = Boolean.valueOf(isSetPassword()).compareTo(other.isSetPassword()); if (lastComparison != 0) { return lastComparison; } if (isSetPassword()) { lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.password, other.password); if (lastComparison != 0) { return lastComparison; } } lastComparison = Boolean.valueOf(isSetDescription()).compareTo(other.isSetDescription()); if (lastComparison != 0) { return lastComparison; } if (isSetDescription()) { lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.description, other.description); if (lastComparison != 0) { return lastComparison; } } lastComparison = Boolean.valueOf(isSetPersistedTime()).compareTo(other.isSetPersistedTime()); if (lastComparison != 0) { return lastComparison; } if (isSetPersistedTime()) { lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.persistedTime, other.persistedTime); if (lastComparison != 0) { return lastComparison; } } lastComparison = Boolean.valueOf(isSetToken()).compareTo(other.isSetToken()); if (lastComparison != 0) { return lastComparison; } if (isSetToken()) { lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.token, other.token); if (lastComparison != 0) { return lastComparison; } } return 0; } public _Fields fieldForId(int fieldId) { return _Fields.findByThriftId(fieldId); } public void read(org.apache.thrift.protocol.TProtocol iprot) throws org.apache.thrift.TException { schemes.get(iprot.getScheme()).getScheme().read(iprot, this); } public void write(org.apache.thrift.protocol.TProtocol oprot) throws org.apache.thrift.TException { schemes.get(oprot.getScheme()).getScheme().write(oprot, this); } @Override public String toString() { StringBuilder sb = new StringBuilder("PasswordCredential("); boolean first = true; sb.append("gatewayId:"); if (this.gatewayId == null) { sb.append("null"); } else { sb.append(this.gatewayId); } first = false; if (!first) sb.append(", "); sb.append("portalUserName:"); if (this.portalUserName == null) { sb.append("null"); } else { sb.append(this.portalUserName); } first = false; if (!first) sb.append(", "); sb.append("loginUserName:"); if (this.loginUserName == null) { sb.append("null"); } else { sb.append(this.loginUserName); } first = false; if (!first) sb.append(", "); sb.append("password:"); if (this.password == null) { sb.append("null"); } else { sb.append(this.password); } first = false; if (isSetDescription()) { if (!first) sb.append(", "); sb.append("description:"); if (this.description == null) { sb.append("null"); } else { sb.append(this.description); } first = false; } if (isSetPersistedTime()) { if (!first) sb.append(", "); sb.append("persistedTime:"); sb.append(this.persistedTime); first = false; } if (isSetToken()) { if (!first) sb.append(", "); sb.append("token:"); if (this.token == null) { sb.append("null"); } else { sb.append(this.token); } first = false; } sb.append(")"); return sb.toString(); } public void validate() throws org.apache.thrift.TException { // check for required fields if (!isSetGatewayId()) { throw new org.apache.thrift.protocol.TProtocolException("Required field 'gatewayId' is unset! Struct:" + toString()); } if (!isSetPortalUserName()) { throw new org.apache.thrift.protocol.TProtocolException("Required field 'portalUserName' is unset! Struct:" + toString()); } if (!isSetLoginUserName()) { throw new org.apache.thrift.protocol.TProtocolException("Required field 'loginUserName' is unset! Struct:" + toString()); } if (!isSetPassword()) { throw new org.apache.thrift.protocol.TProtocolException("Required field 'password' is unset! Struct:" + toString()); } // check for sub-struct validity } private void writeObject(java.io.ObjectOutputStream out) throws java.io.IOException { try { write(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(out))); } catch (org.apache.thrift.TException te) { throw new java.io.IOException(te); } } private void readObject(java.io.ObjectInputStream in) throws java.io.IOException, ClassNotFoundException { try { // it doesn't seem like you should have to do this, but java serialization is wacky, and doesn't call the default constructor. __isset_bitfield = 0; read(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(in))); } catch (org.apache.thrift.TException te) { throw new java.io.IOException(te); } } private static class PasswordCredentialStandardSchemeFactory implements SchemeFactory { public PasswordCredentialStandardScheme getScheme() { return new PasswordCredentialStandardScheme(); } } private static class PasswordCredentialStandardScheme extends StandardScheme<PasswordCredential> { public void read(org.apache.thrift.protocol.TProtocol iprot, PasswordCredential struct) throws org.apache.thrift.TException { org.apache.thrift.protocol.TField schemeField; iprot.readStructBegin(); while (true) { schemeField = iprot.readFieldBegin(); if (schemeField.type == org.apache.thrift.protocol.TType.STOP) { break; } switch (schemeField.id) { case 1: // GATEWAY_ID if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { struct.gatewayId = iprot.readString(); struct.setGatewayIdIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } break; case 2: // PORTAL_USER_NAME if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { struct.portalUserName = iprot.readString(); struct.setPortalUserNameIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } break; case 3: // LOGIN_USER_NAME if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { struct.loginUserName = iprot.readString(); struct.setLoginUserNameIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } break; case 4: // PASSWORD if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { struct.password = iprot.readString(); struct.setPasswordIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } break; case 5: // DESCRIPTION if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { struct.description = iprot.readString(); struct.setDescriptionIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } break; case 6: // PERSISTED_TIME if (schemeField.type == org.apache.thrift.protocol.TType.I64) { struct.persistedTime = iprot.readI64(); struct.setPersistedTimeIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } break; case 7: // TOKEN if (schemeField.type == org.apache.thrift.protocol.TType.STRING) { struct.token = iprot.readString(); struct.setTokenIsSet(true); } else { org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } break; default: org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type); } iprot.readFieldEnd(); } iprot.readStructEnd(); struct.validate(); } public void write(org.apache.thrift.protocol.TProtocol oprot, PasswordCredential struct) throws org.apache.thrift.TException { struct.validate(); oprot.writeStructBegin(STRUCT_DESC); if (struct.gatewayId != null) { oprot.writeFieldBegin(GATEWAY_ID_FIELD_DESC); oprot.writeString(struct.gatewayId); oprot.writeFieldEnd(); } if (struct.portalUserName != null) { oprot.writeFieldBegin(PORTAL_USER_NAME_FIELD_DESC); oprot.writeString(struct.portalUserName); oprot.writeFieldEnd(); } if (struct.loginUserName != null) { oprot.writeFieldBegin(LOGIN_USER_NAME_FIELD_DESC); oprot.writeString(struct.loginUserName); oprot.writeFieldEnd(); } if (struct.password != null) { oprot.writeFieldBegin(PASSWORD_FIELD_DESC); oprot.writeString(struct.password); oprot.writeFieldEnd(); } if (struct.description != null) { if (struct.isSetDescription()) { oprot.writeFieldBegin(DESCRIPTION_FIELD_DESC); oprot.writeString(struct.description); oprot.writeFieldEnd(); } } if (struct.isSetPersistedTime()) { oprot.writeFieldBegin(PERSISTED_TIME_FIELD_DESC); oprot.writeI64(struct.persistedTime); oprot.writeFieldEnd(); } if (struct.token != null) { if (struct.isSetToken()) { oprot.writeFieldBegin(TOKEN_FIELD_DESC); oprot.writeString(struct.token); oprot.writeFieldEnd(); } } oprot.writeFieldStop(); oprot.writeStructEnd(); } } private static class PasswordCredentialTupleSchemeFactory implements SchemeFactory { public PasswordCredentialTupleScheme getScheme() { return new PasswordCredentialTupleScheme(); } } private static class PasswordCredentialTupleScheme extends TupleScheme<PasswordCredential> { @Override public void write(org.apache.thrift.protocol.TProtocol prot, PasswordCredential struct) throws org.apache.thrift.TException { TTupleProtocol oprot = (TTupleProtocol) prot; oprot.writeString(struct.gatewayId); oprot.writeString(struct.portalUserName); oprot.writeString(struct.loginUserName); oprot.writeString(struct.password); BitSet optionals = new BitSet(); if (struct.isSetDescription()) { optionals.set(0); } if (struct.isSetPersistedTime()) { optionals.set(1); } if (struct.isSetToken()) { optionals.set(2); } oprot.writeBitSet(optionals, 3); if (struct.isSetDescription()) { oprot.writeString(struct.description); } if (struct.isSetPersistedTime()) { oprot.writeI64(struct.persistedTime); } if (struct.isSetToken()) { oprot.writeString(struct.token); } } @Override public void read(org.apache.thrift.protocol.TProtocol prot, PasswordCredential struct) throws org.apache.thrift.TException { TTupleProtocol iprot = (TTupleProtocol) prot; struct.gatewayId = iprot.readString(); struct.setGatewayIdIsSet(true); struct.portalUserName = iprot.readString(); struct.setPortalUserNameIsSet(true); struct.loginUserName = iprot.readString(); struct.setLoginUserNameIsSet(true); struct.password = iprot.readString(); struct.setPasswordIsSet(true); BitSet incoming = iprot.readBitSet(3); if (incoming.get(0)) { struct.description = iprot.readString(); struct.setDescriptionIsSet(true); } if (incoming.get(1)) { struct.persistedTime = iprot.readI64(); struct.setPersistedTimeIsSet(true); } if (incoming.get(2)) { struct.token = iprot.readString(); struct.setTokenIsSet(true); } } } }