/* * Copyright (C) 2015 The Pennsylvania State University and the University of Wisconsin * Systems and Internet Infrastructure Security Laboratory * * Author: Damien Octeau * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package edu.psu.cse.siis.ic3; import java.util.Objects; import edu.psu.cse.siis.coal.Constants; public class DataAuthority { private final String host; private final String port; public DataAuthority(String host, String port) { this.host = host; this.port = port; } public String getHost() { return host; } public String getPort() { return port; } public boolean isPrecise() { return !(Constants.ANY_STRING.equals(host) || Constants.ANY_STRING.equals(port)); } @Override public String toString() { return "host " + host + ", port " + port; } @Override public int hashCode() { return Objects.hash(host, port); } @Override public boolean equals(Object other) { if (!(other instanceof DataAuthority)) { return false; } DataAuthority secondDataAuthority = (DataAuthority) other; return Objects.equals(this.host, secondDataAuthority.host) && Objects.equals(this.port, secondDataAuthority.port); } }