/**
*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
/**
* Autogenerated by Thrift Compiler (0.9.3)
*
* DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING
* @generated
*/
package org.apache.airavata.model.credential.store;
import org.apache.thrift.scheme.IScheme;
import org.apache.thrift.scheme.SchemeFactory;
import org.apache.thrift.scheme.StandardScheme;
import org.apache.thrift.scheme.TupleScheme;
import org.apache.thrift.protocol.TTupleProtocol;
import org.apache.thrift.protocol.TProtocolException;
import org.apache.thrift.EncodingUtils;
import org.apache.thrift.TException;
import org.apache.thrift.async.AsyncMethodCallback;
import org.apache.thrift.server.AbstractNonblockingServer.*;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.util.HashMap;
import java.util.EnumMap;
import java.util.Set;
import java.util.HashSet;
import java.util.EnumSet;
import java.util.Collections;
import java.util.BitSet;
import java.nio.ByteBuffer;
import java.util.Arrays;
import javax.annotation.Generated;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
@SuppressWarnings({"cast", "rawtypes", "serial", "unchecked"})
@Generated(value = "Autogenerated by Thrift Compiler (0.9.3)")
public class PasswordCredential implements org.apache.thrift.TBase<PasswordCredential, PasswordCredential._Fields>, java.io.Serializable, Cloneable, Comparable<PasswordCredential> {
private static final org.apache.thrift.protocol.TStruct STRUCT_DESC = new org.apache.thrift.protocol.TStruct("PasswordCredential");
private static final org.apache.thrift.protocol.TField GATEWAY_ID_FIELD_DESC = new org.apache.thrift.protocol.TField("gatewayId", org.apache.thrift.protocol.TType.STRING, (short)1);
private static final org.apache.thrift.protocol.TField PORTAL_USER_NAME_FIELD_DESC = new org.apache.thrift.protocol.TField("portalUserName", org.apache.thrift.protocol.TType.STRING, (short)2);
private static final org.apache.thrift.protocol.TField LOGIN_USER_NAME_FIELD_DESC = new org.apache.thrift.protocol.TField("loginUserName", org.apache.thrift.protocol.TType.STRING, (short)3);
private static final org.apache.thrift.protocol.TField PASSWORD_FIELD_DESC = new org.apache.thrift.protocol.TField("password", org.apache.thrift.protocol.TType.STRING, (short)4);
private static final org.apache.thrift.protocol.TField DESCRIPTION_FIELD_DESC = new org.apache.thrift.protocol.TField("description", org.apache.thrift.protocol.TType.STRING, (short)5);
private static final org.apache.thrift.protocol.TField PERSISTED_TIME_FIELD_DESC = new org.apache.thrift.protocol.TField("persistedTime", org.apache.thrift.protocol.TType.I64, (short)6);
private static final org.apache.thrift.protocol.TField TOKEN_FIELD_DESC = new org.apache.thrift.protocol.TField("token", org.apache.thrift.protocol.TType.STRING, (short)7);
private static final Map<Class<? extends IScheme>, SchemeFactory> schemes = new HashMap<Class<? extends IScheme>, SchemeFactory>();
static {
schemes.put(StandardScheme.class, new PasswordCredentialStandardSchemeFactory());
schemes.put(TupleScheme.class, new PasswordCredentialTupleSchemeFactory());
}
private String gatewayId; // required
private String portalUserName; // required
private String loginUserName; // required
private String password; // required
private String description; // optional
private long persistedTime; // optional
private String token; // optional
/** The set of fields this struct contains, along with convenience methods for finding and manipulating them. */
public enum _Fields implements org.apache.thrift.TFieldIdEnum {
GATEWAY_ID((short)1, "gatewayId"),
PORTAL_USER_NAME((short)2, "portalUserName"),
LOGIN_USER_NAME((short)3, "loginUserName"),
PASSWORD((short)4, "password"),
DESCRIPTION((short)5, "description"),
PERSISTED_TIME((short)6, "persistedTime"),
TOKEN((short)7, "token");
private static final Map<String, _Fields> byName = new HashMap<String, _Fields>();
static {
for (_Fields field : EnumSet.allOf(_Fields.class)) {
byName.put(field.getFieldName(), field);
}
}
/**
* Find the _Fields constant that matches fieldId, or null if its not found.
*/
public static _Fields findByThriftId(int fieldId) {
switch(fieldId) {
case 1: // GATEWAY_ID
return GATEWAY_ID;
case 2: // PORTAL_USER_NAME
return PORTAL_USER_NAME;
case 3: // LOGIN_USER_NAME
return LOGIN_USER_NAME;
case 4: // PASSWORD
return PASSWORD;
case 5: // DESCRIPTION
return DESCRIPTION;
case 6: // PERSISTED_TIME
return PERSISTED_TIME;
case 7: // TOKEN
return TOKEN;
default:
return null;
}
}
/**
* Find the _Fields constant that matches fieldId, throwing an exception
* if it is not found.
*/
public static _Fields findByThriftIdOrThrow(int fieldId) {
_Fields fields = findByThriftId(fieldId);
if (fields == null) throw new IllegalArgumentException("Field " + fieldId + " doesn't exist!");
return fields;
}
/**
* Find the _Fields constant that matches name, or null if its not found.
*/
public static _Fields findByName(String name) {
return byName.get(name);
}
private final short _thriftId;
private final String _fieldName;
_Fields(short thriftId, String fieldName) {
_thriftId = thriftId;
_fieldName = fieldName;
}
public short getThriftFieldId() {
return _thriftId;
}
public String getFieldName() {
return _fieldName;
}
}
// isset id assignments
private static final int __PERSISTEDTIME_ISSET_ID = 0;
private byte __isset_bitfield = 0;
private static final _Fields optionals[] = {_Fields.DESCRIPTION,_Fields.PERSISTED_TIME,_Fields.TOKEN};
public static final Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> metaDataMap;
static {
Map<_Fields, org.apache.thrift.meta_data.FieldMetaData> tmpMap = new EnumMap<_Fields, org.apache.thrift.meta_data.FieldMetaData>(_Fields.class);
tmpMap.put(_Fields.GATEWAY_ID, new org.apache.thrift.meta_data.FieldMetaData("gatewayId", org.apache.thrift.TFieldRequirementType.REQUIRED,
new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING)));
tmpMap.put(_Fields.PORTAL_USER_NAME, new org.apache.thrift.meta_data.FieldMetaData("portalUserName", org.apache.thrift.TFieldRequirementType.REQUIRED,
new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING)));
tmpMap.put(_Fields.LOGIN_USER_NAME, new org.apache.thrift.meta_data.FieldMetaData("loginUserName", org.apache.thrift.TFieldRequirementType.REQUIRED,
new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING)));
tmpMap.put(_Fields.PASSWORD, new org.apache.thrift.meta_data.FieldMetaData("password", org.apache.thrift.TFieldRequirementType.REQUIRED,
new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING)));
tmpMap.put(_Fields.DESCRIPTION, new org.apache.thrift.meta_data.FieldMetaData("description", org.apache.thrift.TFieldRequirementType.OPTIONAL,
new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING)));
tmpMap.put(_Fields.PERSISTED_TIME, new org.apache.thrift.meta_data.FieldMetaData("persistedTime", org.apache.thrift.TFieldRequirementType.OPTIONAL,
new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.I64)));
tmpMap.put(_Fields.TOKEN, new org.apache.thrift.meta_data.FieldMetaData("token", org.apache.thrift.TFieldRequirementType.OPTIONAL,
new org.apache.thrift.meta_data.FieldValueMetaData(org.apache.thrift.protocol.TType.STRING)));
metaDataMap = Collections.unmodifiableMap(tmpMap);
org.apache.thrift.meta_data.FieldMetaData.addStructMetaDataMap(PasswordCredential.class, metaDataMap);
}
public PasswordCredential() {
}
public PasswordCredential(
String gatewayId,
String portalUserName,
String loginUserName,
String password)
{
this();
this.gatewayId = gatewayId;
this.portalUserName = portalUserName;
this.loginUserName = loginUserName;
this.password = password;
}
/**
* Performs a deep copy on <i>other</i>.
*/
public PasswordCredential(PasswordCredential other) {
__isset_bitfield = other.__isset_bitfield;
if (other.isSetGatewayId()) {
this.gatewayId = other.gatewayId;
}
if (other.isSetPortalUserName()) {
this.portalUserName = other.portalUserName;
}
if (other.isSetLoginUserName()) {
this.loginUserName = other.loginUserName;
}
if (other.isSetPassword()) {
this.password = other.password;
}
if (other.isSetDescription()) {
this.description = other.description;
}
this.persistedTime = other.persistedTime;
if (other.isSetToken()) {
this.token = other.token;
}
}
public PasswordCredential deepCopy() {
return new PasswordCredential(this);
}
@Override
public void clear() {
this.gatewayId = null;
this.portalUserName = null;
this.loginUserName = null;
this.password = null;
this.description = null;
setPersistedTimeIsSet(false);
this.persistedTime = 0;
this.token = null;
}
public String getGatewayId() {
return this.gatewayId;
}
public void setGatewayId(String gatewayId) {
this.gatewayId = gatewayId;
}
public void unsetGatewayId() {
this.gatewayId = null;
}
/** Returns true if field gatewayId is set (has been assigned a value) and false otherwise */
public boolean isSetGatewayId() {
return this.gatewayId != null;
}
public void setGatewayIdIsSet(boolean value) {
if (!value) {
this.gatewayId = null;
}
}
public String getPortalUserName() {
return this.portalUserName;
}
public void setPortalUserName(String portalUserName) {
this.portalUserName = portalUserName;
}
public void unsetPortalUserName() {
this.portalUserName = null;
}
/** Returns true if field portalUserName is set (has been assigned a value) and false otherwise */
public boolean isSetPortalUserName() {
return this.portalUserName != null;
}
public void setPortalUserNameIsSet(boolean value) {
if (!value) {
this.portalUserName = null;
}
}
public String getLoginUserName() {
return this.loginUserName;
}
public void setLoginUserName(String loginUserName) {
this.loginUserName = loginUserName;
}
public void unsetLoginUserName() {
this.loginUserName = null;
}
/** Returns true if field loginUserName is set (has been assigned a value) and false otherwise */
public boolean isSetLoginUserName() {
return this.loginUserName != null;
}
public void setLoginUserNameIsSet(boolean value) {
if (!value) {
this.loginUserName = null;
}
}
public String getPassword() {
return this.password;
}
public void setPassword(String password) {
this.password = password;
}
public void unsetPassword() {
this.password = null;
}
/** Returns true if field password is set (has been assigned a value) and false otherwise */
public boolean isSetPassword() {
return this.password != null;
}
public void setPasswordIsSet(boolean value) {
if (!value) {
this.password = null;
}
}
public String getDescription() {
return this.description;
}
public void setDescription(String description) {
this.description = description;
}
public void unsetDescription() {
this.description = null;
}
/** Returns true if field description is set (has been assigned a value) and false otherwise */
public boolean isSetDescription() {
return this.description != null;
}
public void setDescriptionIsSet(boolean value) {
if (!value) {
this.description = null;
}
}
public long getPersistedTime() {
return this.persistedTime;
}
public void setPersistedTime(long persistedTime) {
this.persistedTime = persistedTime;
setPersistedTimeIsSet(true);
}
public void unsetPersistedTime() {
__isset_bitfield = EncodingUtils.clearBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID);
}
/** Returns true if field persistedTime is set (has been assigned a value) and false otherwise */
public boolean isSetPersistedTime() {
return EncodingUtils.testBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID);
}
public void setPersistedTimeIsSet(boolean value) {
__isset_bitfield = EncodingUtils.setBit(__isset_bitfield, __PERSISTEDTIME_ISSET_ID, value);
}
public String getToken() {
return this.token;
}
public void setToken(String token) {
this.token = token;
}
public void unsetToken() {
this.token = null;
}
/** Returns true if field token is set (has been assigned a value) and false otherwise */
public boolean isSetToken() {
return this.token != null;
}
public void setTokenIsSet(boolean value) {
if (!value) {
this.token = null;
}
}
public void setFieldValue(_Fields field, Object value) {
switch (field) {
case GATEWAY_ID:
if (value == null) {
unsetGatewayId();
} else {
setGatewayId((String)value);
}
break;
case PORTAL_USER_NAME:
if (value == null) {
unsetPortalUserName();
} else {
setPortalUserName((String)value);
}
break;
case LOGIN_USER_NAME:
if (value == null) {
unsetLoginUserName();
} else {
setLoginUserName((String)value);
}
break;
case PASSWORD:
if (value == null) {
unsetPassword();
} else {
setPassword((String)value);
}
break;
case DESCRIPTION:
if (value == null) {
unsetDescription();
} else {
setDescription((String)value);
}
break;
case PERSISTED_TIME:
if (value == null) {
unsetPersistedTime();
} else {
setPersistedTime((Long)value);
}
break;
case TOKEN:
if (value == null) {
unsetToken();
} else {
setToken((String)value);
}
break;
}
}
public Object getFieldValue(_Fields field) {
switch (field) {
case GATEWAY_ID:
return getGatewayId();
case PORTAL_USER_NAME:
return getPortalUserName();
case LOGIN_USER_NAME:
return getLoginUserName();
case PASSWORD:
return getPassword();
case DESCRIPTION:
return getDescription();
case PERSISTED_TIME:
return getPersistedTime();
case TOKEN:
return getToken();
}
throw new IllegalStateException();
}
/** Returns true if field corresponding to fieldID is set (has been assigned a value) and false otherwise */
public boolean isSet(_Fields field) {
if (field == null) {
throw new IllegalArgumentException();
}
switch (field) {
case GATEWAY_ID:
return isSetGatewayId();
case PORTAL_USER_NAME:
return isSetPortalUserName();
case LOGIN_USER_NAME:
return isSetLoginUserName();
case PASSWORD:
return isSetPassword();
case DESCRIPTION:
return isSetDescription();
case PERSISTED_TIME:
return isSetPersistedTime();
case TOKEN:
return isSetToken();
}
throw new IllegalStateException();
}
@Override
public boolean equals(Object that) {
if (that == null)
return false;
if (that instanceof PasswordCredential)
return this.equals((PasswordCredential)that);
return false;
}
public boolean equals(PasswordCredential that) {
if (that == null)
return false;
boolean this_present_gatewayId = true && this.isSetGatewayId();
boolean that_present_gatewayId = true && that.isSetGatewayId();
if (this_present_gatewayId || that_present_gatewayId) {
if (!(this_present_gatewayId && that_present_gatewayId))
return false;
if (!this.gatewayId.equals(that.gatewayId))
return false;
}
boolean this_present_portalUserName = true && this.isSetPortalUserName();
boolean that_present_portalUserName = true && that.isSetPortalUserName();
if (this_present_portalUserName || that_present_portalUserName) {
if (!(this_present_portalUserName && that_present_portalUserName))
return false;
if (!this.portalUserName.equals(that.portalUserName))
return false;
}
boolean this_present_loginUserName = true && this.isSetLoginUserName();
boolean that_present_loginUserName = true && that.isSetLoginUserName();
if (this_present_loginUserName || that_present_loginUserName) {
if (!(this_present_loginUserName && that_present_loginUserName))
return false;
if (!this.loginUserName.equals(that.loginUserName))
return false;
}
boolean this_present_password = true && this.isSetPassword();
boolean that_present_password = true && that.isSetPassword();
if (this_present_password || that_present_password) {
if (!(this_present_password && that_present_password))
return false;
if (!this.password.equals(that.password))
return false;
}
boolean this_present_description = true && this.isSetDescription();
boolean that_present_description = true && that.isSetDescription();
if (this_present_description || that_present_description) {
if (!(this_present_description && that_present_description))
return false;
if (!this.description.equals(that.description))
return false;
}
boolean this_present_persistedTime = true && this.isSetPersistedTime();
boolean that_present_persistedTime = true && that.isSetPersistedTime();
if (this_present_persistedTime || that_present_persistedTime) {
if (!(this_present_persistedTime && that_present_persistedTime))
return false;
if (this.persistedTime != that.persistedTime)
return false;
}
boolean this_present_token = true && this.isSetToken();
boolean that_present_token = true && that.isSetToken();
if (this_present_token || that_present_token) {
if (!(this_present_token && that_present_token))
return false;
if (!this.token.equals(that.token))
return false;
}
return true;
}
@Override
public int hashCode() {
List<Object> list = new ArrayList<Object>();
boolean present_gatewayId = true && (isSetGatewayId());
list.add(present_gatewayId);
if (present_gatewayId)
list.add(gatewayId);
boolean present_portalUserName = true && (isSetPortalUserName());
list.add(present_portalUserName);
if (present_portalUserName)
list.add(portalUserName);
boolean present_loginUserName = true && (isSetLoginUserName());
list.add(present_loginUserName);
if (present_loginUserName)
list.add(loginUserName);
boolean present_password = true && (isSetPassword());
list.add(present_password);
if (present_password)
list.add(password);
boolean present_description = true && (isSetDescription());
list.add(present_description);
if (present_description)
list.add(description);
boolean present_persistedTime = true && (isSetPersistedTime());
list.add(present_persistedTime);
if (present_persistedTime)
list.add(persistedTime);
boolean present_token = true && (isSetToken());
list.add(present_token);
if (present_token)
list.add(token);
return list.hashCode();
}
@Override
public int compareTo(PasswordCredential other) {
if (!getClass().equals(other.getClass())) {
return getClass().getName().compareTo(other.getClass().getName());
}
int lastComparison = 0;
lastComparison = Boolean.valueOf(isSetGatewayId()).compareTo(other.isSetGatewayId());
if (lastComparison != 0) {
return lastComparison;
}
if (isSetGatewayId()) {
lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.gatewayId, other.gatewayId);
if (lastComparison != 0) {
return lastComparison;
}
}
lastComparison = Boolean.valueOf(isSetPortalUserName()).compareTo(other.isSetPortalUserName());
if (lastComparison != 0) {
return lastComparison;
}
if (isSetPortalUserName()) {
lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.portalUserName, other.portalUserName);
if (lastComparison != 0) {
return lastComparison;
}
}
lastComparison = Boolean.valueOf(isSetLoginUserName()).compareTo(other.isSetLoginUserName());
if (lastComparison != 0) {
return lastComparison;
}
if (isSetLoginUserName()) {
lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.loginUserName, other.loginUserName);
if (lastComparison != 0) {
return lastComparison;
}
}
lastComparison = Boolean.valueOf(isSetPassword()).compareTo(other.isSetPassword());
if (lastComparison != 0) {
return lastComparison;
}
if (isSetPassword()) {
lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.password, other.password);
if (lastComparison != 0) {
return lastComparison;
}
}
lastComparison = Boolean.valueOf(isSetDescription()).compareTo(other.isSetDescription());
if (lastComparison != 0) {
return lastComparison;
}
if (isSetDescription()) {
lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.description, other.description);
if (lastComparison != 0) {
return lastComparison;
}
}
lastComparison = Boolean.valueOf(isSetPersistedTime()).compareTo(other.isSetPersistedTime());
if (lastComparison != 0) {
return lastComparison;
}
if (isSetPersistedTime()) {
lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.persistedTime, other.persistedTime);
if (lastComparison != 0) {
return lastComparison;
}
}
lastComparison = Boolean.valueOf(isSetToken()).compareTo(other.isSetToken());
if (lastComparison != 0) {
return lastComparison;
}
if (isSetToken()) {
lastComparison = org.apache.thrift.TBaseHelper.compareTo(this.token, other.token);
if (lastComparison != 0) {
return lastComparison;
}
}
return 0;
}
public _Fields fieldForId(int fieldId) {
return _Fields.findByThriftId(fieldId);
}
public void read(org.apache.thrift.protocol.TProtocol iprot) throws org.apache.thrift.TException {
schemes.get(iprot.getScheme()).getScheme().read(iprot, this);
}
public void write(org.apache.thrift.protocol.TProtocol oprot) throws org.apache.thrift.TException {
schemes.get(oprot.getScheme()).getScheme().write(oprot, this);
}
@Override
public String toString() {
StringBuilder sb = new StringBuilder("PasswordCredential(");
boolean first = true;
sb.append("gatewayId:");
if (this.gatewayId == null) {
sb.append("null");
} else {
sb.append(this.gatewayId);
}
first = false;
if (!first) sb.append(", ");
sb.append("portalUserName:");
if (this.portalUserName == null) {
sb.append("null");
} else {
sb.append(this.portalUserName);
}
first = false;
if (!first) sb.append(", ");
sb.append("loginUserName:");
if (this.loginUserName == null) {
sb.append("null");
} else {
sb.append(this.loginUserName);
}
first = false;
if (!first) sb.append(", ");
sb.append("password:");
if (this.password == null) {
sb.append("null");
} else {
sb.append(this.password);
}
first = false;
if (isSetDescription()) {
if (!first) sb.append(", ");
sb.append("description:");
if (this.description == null) {
sb.append("null");
} else {
sb.append(this.description);
}
first = false;
}
if (isSetPersistedTime()) {
if (!first) sb.append(", ");
sb.append("persistedTime:");
sb.append(this.persistedTime);
first = false;
}
if (isSetToken()) {
if (!first) sb.append(", ");
sb.append("token:");
if (this.token == null) {
sb.append("null");
} else {
sb.append(this.token);
}
first = false;
}
sb.append(")");
return sb.toString();
}
public void validate() throws org.apache.thrift.TException {
// check for required fields
if (!isSetGatewayId()) {
throw new org.apache.thrift.protocol.TProtocolException("Required field 'gatewayId' is unset! Struct:" + toString());
}
if (!isSetPortalUserName()) {
throw new org.apache.thrift.protocol.TProtocolException("Required field 'portalUserName' is unset! Struct:" + toString());
}
if (!isSetLoginUserName()) {
throw new org.apache.thrift.protocol.TProtocolException("Required field 'loginUserName' is unset! Struct:" + toString());
}
if (!isSetPassword()) {
throw new org.apache.thrift.protocol.TProtocolException("Required field 'password' is unset! Struct:" + toString());
}
// check for sub-struct validity
}
private void writeObject(java.io.ObjectOutputStream out) throws java.io.IOException {
try {
write(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(out)));
} catch (org.apache.thrift.TException te) {
throw new java.io.IOException(te);
}
}
private void readObject(java.io.ObjectInputStream in) throws java.io.IOException, ClassNotFoundException {
try {
// it doesn't seem like you should have to do this, but java serialization is wacky, and doesn't call the default constructor.
__isset_bitfield = 0;
read(new org.apache.thrift.protocol.TCompactProtocol(new org.apache.thrift.transport.TIOStreamTransport(in)));
} catch (org.apache.thrift.TException te) {
throw new java.io.IOException(te);
}
}
private static class PasswordCredentialStandardSchemeFactory implements SchemeFactory {
public PasswordCredentialStandardScheme getScheme() {
return new PasswordCredentialStandardScheme();
}
}
private static class PasswordCredentialStandardScheme extends StandardScheme<PasswordCredential> {
public void read(org.apache.thrift.protocol.TProtocol iprot, PasswordCredential struct) throws org.apache.thrift.TException {
org.apache.thrift.protocol.TField schemeField;
iprot.readStructBegin();
while (true)
{
schemeField = iprot.readFieldBegin();
if (schemeField.type == org.apache.thrift.protocol.TType.STOP) {
break;
}
switch (schemeField.id) {
case 1: // GATEWAY_ID
if (schemeField.type == org.apache.thrift.protocol.TType.STRING) {
struct.gatewayId = iprot.readString();
struct.setGatewayIdIsSet(true);
} else {
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
break;
case 2: // PORTAL_USER_NAME
if (schemeField.type == org.apache.thrift.protocol.TType.STRING) {
struct.portalUserName = iprot.readString();
struct.setPortalUserNameIsSet(true);
} else {
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
break;
case 3: // LOGIN_USER_NAME
if (schemeField.type == org.apache.thrift.protocol.TType.STRING) {
struct.loginUserName = iprot.readString();
struct.setLoginUserNameIsSet(true);
} else {
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
break;
case 4: // PASSWORD
if (schemeField.type == org.apache.thrift.protocol.TType.STRING) {
struct.password = iprot.readString();
struct.setPasswordIsSet(true);
} else {
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
break;
case 5: // DESCRIPTION
if (schemeField.type == org.apache.thrift.protocol.TType.STRING) {
struct.description = iprot.readString();
struct.setDescriptionIsSet(true);
} else {
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
break;
case 6: // PERSISTED_TIME
if (schemeField.type == org.apache.thrift.protocol.TType.I64) {
struct.persistedTime = iprot.readI64();
struct.setPersistedTimeIsSet(true);
} else {
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
break;
case 7: // TOKEN
if (schemeField.type == org.apache.thrift.protocol.TType.STRING) {
struct.token = iprot.readString();
struct.setTokenIsSet(true);
} else {
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
break;
default:
org.apache.thrift.protocol.TProtocolUtil.skip(iprot, schemeField.type);
}
iprot.readFieldEnd();
}
iprot.readStructEnd();
struct.validate();
}
public void write(org.apache.thrift.protocol.TProtocol oprot, PasswordCredential struct) throws org.apache.thrift.TException {
struct.validate();
oprot.writeStructBegin(STRUCT_DESC);
if (struct.gatewayId != null) {
oprot.writeFieldBegin(GATEWAY_ID_FIELD_DESC);
oprot.writeString(struct.gatewayId);
oprot.writeFieldEnd();
}
if (struct.portalUserName != null) {
oprot.writeFieldBegin(PORTAL_USER_NAME_FIELD_DESC);
oprot.writeString(struct.portalUserName);
oprot.writeFieldEnd();
}
if (struct.loginUserName != null) {
oprot.writeFieldBegin(LOGIN_USER_NAME_FIELD_DESC);
oprot.writeString(struct.loginUserName);
oprot.writeFieldEnd();
}
if (struct.password != null) {
oprot.writeFieldBegin(PASSWORD_FIELD_DESC);
oprot.writeString(struct.password);
oprot.writeFieldEnd();
}
if (struct.description != null) {
if (struct.isSetDescription()) {
oprot.writeFieldBegin(DESCRIPTION_FIELD_DESC);
oprot.writeString(struct.description);
oprot.writeFieldEnd();
}
}
if (struct.isSetPersistedTime()) {
oprot.writeFieldBegin(PERSISTED_TIME_FIELD_DESC);
oprot.writeI64(struct.persistedTime);
oprot.writeFieldEnd();
}
if (struct.token != null) {
if (struct.isSetToken()) {
oprot.writeFieldBegin(TOKEN_FIELD_DESC);
oprot.writeString(struct.token);
oprot.writeFieldEnd();
}
}
oprot.writeFieldStop();
oprot.writeStructEnd();
}
}
private static class PasswordCredentialTupleSchemeFactory implements SchemeFactory {
public PasswordCredentialTupleScheme getScheme() {
return new PasswordCredentialTupleScheme();
}
}
private static class PasswordCredentialTupleScheme extends TupleScheme<PasswordCredential> {
@Override
public void write(org.apache.thrift.protocol.TProtocol prot, PasswordCredential struct) throws org.apache.thrift.TException {
TTupleProtocol oprot = (TTupleProtocol) prot;
oprot.writeString(struct.gatewayId);
oprot.writeString(struct.portalUserName);
oprot.writeString(struct.loginUserName);
oprot.writeString(struct.password);
BitSet optionals = new BitSet();
if (struct.isSetDescription()) {
optionals.set(0);
}
if (struct.isSetPersistedTime()) {
optionals.set(1);
}
if (struct.isSetToken()) {
optionals.set(2);
}
oprot.writeBitSet(optionals, 3);
if (struct.isSetDescription()) {
oprot.writeString(struct.description);
}
if (struct.isSetPersistedTime()) {
oprot.writeI64(struct.persistedTime);
}
if (struct.isSetToken()) {
oprot.writeString(struct.token);
}
}
@Override
public void read(org.apache.thrift.protocol.TProtocol prot, PasswordCredential struct) throws org.apache.thrift.TException {
TTupleProtocol iprot = (TTupleProtocol) prot;
struct.gatewayId = iprot.readString();
struct.setGatewayIdIsSet(true);
struct.portalUserName = iprot.readString();
struct.setPortalUserNameIsSet(true);
struct.loginUserName = iprot.readString();
struct.setLoginUserNameIsSet(true);
struct.password = iprot.readString();
struct.setPasswordIsSet(true);
BitSet incoming = iprot.readBitSet(3);
if (incoming.get(0)) {
struct.description = iprot.readString();
struct.setDescriptionIsSet(true);
}
if (incoming.get(1)) {
struct.persistedTime = iprot.readI64();
struct.setPersistedTimeIsSet(true);
}
if (incoming.get(2)) {
struct.token = iprot.readString();
struct.setTokenIsSet(true);
}
}
}
}