You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airavata.apache.org by sm...@apache.org on 2017/01/20 10:28:38 UTC

[5/8] airavata git commit: bumping api version

http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp
new file mode 100644
index 0000000..22b8c23
--- /dev/null
+++ b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp
@@ -0,0 +1,1149 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+/**
+ * Autogenerated by Thrift Compiler (0.9.3)
+ *
+ * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING
+ *  @generated
+ */
+#include "credential_store_data_models_types.h"
+
+#include <algorithm>
+#include <ostream>
+
+#include <thrift/TToString.h>
+
+
+
+int _kCredentialOwnerTypeValues[] = {
+  CredentialOwnerType::GATEWAY,
+  CredentialOwnerType::USER
+};
+const char* _kCredentialOwnerTypeNames[] = {
+  "GATEWAY",
+  "USER"
+};
+const std::map<int, const char*> _CredentialOwnerType_VALUES_TO_NAMES(::apache::thrift::TEnumIterator(2, _kCredentialOwnerTypeValues, _kCredentialOwnerTypeNames), ::apache::thrift::TEnumIterator(-1, NULL, NULL));
+
+int _kSummaryTypeValues[] = {
+  SummaryType::SSH,
+  SummaryType::PASSWD,
+  SummaryType::CERT
+};
+const char* _kSummaryTypeNames[] = {
+  "SSH",
+  "PASSWD",
+  "CERT"
+};
+const std::map<int, const char*> _SummaryType_VALUES_TO_NAMES(::apache::thrift::TEnumIterator(3, _kSummaryTypeValues, _kSummaryTypeNames), ::apache::thrift::TEnumIterator(-1, NULL, NULL));
+
+
+SSHCredential::~SSHCredential() throw() {
+}
+
+
+void SSHCredential::__set_gatewayId(const std::string& val) {
+  this->gatewayId = val;
+}
+
+void SSHCredential::__set_username(const std::string& val) {
+  this->username = val;
+}
+
+void SSHCredential::__set_passphrase(const std::string& val) {
+  this->passphrase = val;
+__isset.passphrase = true;
+}
+
+void SSHCredential::__set_publicKey(const std::string& val) {
+  this->publicKey = val;
+__isset.publicKey = true;
+}
+
+void SSHCredential::__set_privateKey(const std::string& val) {
+  this->privateKey = val;
+__isset.privateKey = true;
+}
+
+void SSHCredential::__set_persistedTime(const int64_t val) {
+  this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void SSHCredential::__set_token(const std::string& val) {
+  this->token = val;
+__isset.token = true;
+}
+
+void SSHCredential::__set_description(const std::string& val) {
+  this->description = val;
+__isset.description = true;
+}
+
+void SSHCredential::__set_credentialOwnerType(const CredentialOwnerType::type val) {
+  this->credentialOwnerType = val;
+__isset.credentialOwnerType = true;
+}
+
+uint32_t SSHCredential::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+  apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+  uint32_t xfer = 0;
+  std::string fname;
+  ::apache::thrift::protocol::TType ftype;
+  int16_t fid;
+
+  xfer += iprot->readStructBegin(fname);
+
+  using ::apache::thrift::protocol::TProtocolException;
+
+  bool isset_gatewayId = false;
+  bool isset_username = false;
+
+  while (true)
+  {
+    xfer += iprot->readFieldBegin(fname, ftype, fid);
+    if (ftype == ::apache::thrift::protocol::T_STOP) {
+      break;
+    }
+    switch (fid)
+    {
+      case 1:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->gatewayId);
+          isset_gatewayId = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 2:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->username);
+          isset_username = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 3:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->passphrase);
+          this->__isset.passphrase = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 4:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->publicKey);
+          this->__isset.publicKey = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 5:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->privateKey);
+          this->__isset.privateKey = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 6:
+        if (ftype == ::apache::thrift::protocol::T_I64) {
+          xfer += iprot->readI64(this->persistedTime);
+          this->__isset.persistedTime = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 7:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->token);
+          this->__isset.token = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 8:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->description);
+          this->__isset.description = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 9:
+        if (ftype == ::apache::thrift::protocol::T_I32) {
+          int32_t ecast0;
+          xfer += iprot->readI32(ecast0);
+          this->credentialOwnerType = (CredentialOwnerType::type)ecast0;
+          this->__isset.credentialOwnerType = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      default:
+        xfer += iprot->skip(ftype);
+        break;
+    }
+    xfer += iprot->readFieldEnd();
+  }
+
+  xfer += iprot->readStructEnd();
+
+  if (!isset_gatewayId)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_username)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  return xfer;
+}
+
+uint32_t SSHCredential::write(::apache::thrift::protocol::TProtocol* oprot) const {
+  uint32_t xfer = 0;
+  apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+  xfer += oprot->writeStructBegin("SSHCredential");
+
+  xfer += oprot->writeFieldBegin("gatewayId", ::apache::thrift::protocol::T_STRING, 1);
+  xfer += oprot->writeString(this->gatewayId);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("username", ::apache::thrift::protocol::T_STRING, 2);
+  xfer += oprot->writeString(this->username);
+  xfer += oprot->writeFieldEnd();
+
+  if (this->__isset.passphrase) {
+    xfer += oprot->writeFieldBegin("passphrase", ::apache::thrift::protocol::T_STRING, 3);
+    xfer += oprot->writeString(this->passphrase);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.publicKey) {
+    xfer += oprot->writeFieldBegin("publicKey", ::apache::thrift::protocol::T_STRING, 4);
+    xfer += oprot->writeString(this->publicKey);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.privateKey) {
+    xfer += oprot->writeFieldBegin("privateKey", ::apache::thrift::protocol::T_STRING, 5);
+    xfer += oprot->writeString(this->privateKey);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.persistedTime) {
+    xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 6);
+    xfer += oprot->writeI64(this->persistedTime);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.token) {
+    xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 7);
+    xfer += oprot->writeString(this->token);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.description) {
+    xfer += oprot->writeFieldBegin("description", ::apache::thrift::protocol::T_STRING, 8);
+    xfer += oprot->writeString(this->description);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.credentialOwnerType) {
+    xfer += oprot->writeFieldBegin("credentialOwnerType", ::apache::thrift::protocol::T_I32, 9);
+    xfer += oprot->writeI32((int32_t)this->credentialOwnerType);
+    xfer += oprot->writeFieldEnd();
+  }
+  xfer += oprot->writeFieldStop();
+  xfer += oprot->writeStructEnd();
+  return xfer;
+}
+
+void swap(SSHCredential &a, SSHCredential &b) {
+  using ::std::swap;
+  swap(a.gatewayId, b.gatewayId);
+  swap(a.username, b.username);
+  swap(a.passphrase, b.passphrase);
+  swap(a.publicKey, b.publicKey);
+  swap(a.privateKey, b.privateKey);
+  swap(a.persistedTime, b.persistedTime);
+  swap(a.token, b.token);
+  swap(a.description, b.description);
+  swap(a.credentialOwnerType, b.credentialOwnerType);
+  swap(a.__isset, b.__isset);
+}
+
+SSHCredential::SSHCredential(const SSHCredential& other1) {
+  gatewayId = other1.gatewayId;
+  username = other1.username;
+  passphrase = other1.passphrase;
+  publicKey = other1.publicKey;
+  privateKey = other1.privateKey;
+  persistedTime = other1.persistedTime;
+  token = other1.token;
+  description = other1.description;
+  credentialOwnerType = other1.credentialOwnerType;
+  __isset = other1.__isset;
+}
+SSHCredential& SSHCredential::operator=(const SSHCredential& other2) {
+  gatewayId = other2.gatewayId;
+  username = other2.username;
+  passphrase = other2.passphrase;
+  publicKey = other2.publicKey;
+  privateKey = other2.privateKey;
+  persistedTime = other2.persistedTime;
+  token = other2.token;
+  description = other2.description;
+  credentialOwnerType = other2.credentialOwnerType;
+  __isset = other2.__isset;
+  return *this;
+}
+void SSHCredential::printTo(std::ostream& out) const {
+  using ::apache::thrift::to_string;
+  out << "SSHCredential(";
+  out << "gatewayId=" << to_string(gatewayId);
+  out << ", " << "username=" << to_string(username);
+  out << ", " << "passphrase="; (__isset.passphrase ? (out << to_string(passphrase)) : (out << "<null>"));
+  out << ", " << "publicKey="; (__isset.publicKey ? (out << to_string(publicKey)) : (out << "<null>"));
+  out << ", " << "privateKey="; (__isset.privateKey ? (out << to_string(privateKey)) : (out << "<null>"));
+  out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+  out << ", " << "token="; (__isset.token ? (out << to_string(token)) : (out << "<null>"));
+  out << ", " << "description="; (__isset.description ? (out << to_string(description)) : (out << "<null>"));
+  out << ", " << "credentialOwnerType="; (__isset.credentialOwnerType ? (out << to_string(credentialOwnerType)) : (out << "<null>"));
+  out << ")";
+}
+
+
+CredentialSummary::~CredentialSummary() throw() {
+}
+
+
+void CredentialSummary::__set_type(const SummaryType::type val) {
+  this->type = val;
+}
+
+void CredentialSummary::__set_gatewayId(const std::string& val) {
+  this->gatewayId = val;
+}
+
+void CredentialSummary::__set_username(const std::string& val) {
+  this->username = val;
+}
+
+void CredentialSummary::__set_publicKey(const std::string& val) {
+  this->publicKey = val;
+__isset.publicKey = true;
+}
+
+void CredentialSummary::__set_persistedTime(const int64_t val) {
+  this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void CredentialSummary::__set_token(const std::string& val) {
+  this->token = val;
+}
+
+void CredentialSummary::__set_description(const std::string& val) {
+  this->description = val;
+__isset.description = true;
+}
+
+uint32_t CredentialSummary::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+  apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+  uint32_t xfer = 0;
+  std::string fname;
+  ::apache::thrift::protocol::TType ftype;
+  int16_t fid;
+
+  xfer += iprot->readStructBegin(fname);
+
+  using ::apache::thrift::protocol::TProtocolException;
+
+  bool isset_type = false;
+  bool isset_gatewayId = false;
+  bool isset_username = false;
+  bool isset_token = false;
+
+  while (true)
+  {
+    xfer += iprot->readFieldBegin(fname, ftype, fid);
+    if (ftype == ::apache::thrift::protocol::T_STOP) {
+      break;
+    }
+    switch (fid)
+    {
+      case 1:
+        if (ftype == ::apache::thrift::protocol::T_I32) {
+          int32_t ecast3;
+          xfer += iprot->readI32(ecast3);
+          this->type = (SummaryType::type)ecast3;
+          isset_type = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 2:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->gatewayId);
+          isset_gatewayId = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 3:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->username);
+          isset_username = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 4:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->publicKey);
+          this->__isset.publicKey = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 5:
+        if (ftype == ::apache::thrift::protocol::T_I64) {
+          xfer += iprot->readI64(this->persistedTime);
+          this->__isset.persistedTime = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 6:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->token);
+          isset_token = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 7:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->description);
+          this->__isset.description = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      default:
+        xfer += iprot->skip(ftype);
+        break;
+    }
+    xfer += iprot->readFieldEnd();
+  }
+
+  xfer += iprot->readStructEnd();
+
+  if (!isset_type)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_gatewayId)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_username)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_token)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  return xfer;
+}
+
+uint32_t CredentialSummary::write(::apache::thrift::protocol::TProtocol* oprot) const {
+  uint32_t xfer = 0;
+  apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+  xfer += oprot->writeStructBegin("CredentialSummary");
+
+  xfer += oprot->writeFieldBegin("type", ::apache::thrift::protocol::T_I32, 1);
+  xfer += oprot->writeI32((int32_t)this->type);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("gatewayId", ::apache::thrift::protocol::T_STRING, 2);
+  xfer += oprot->writeString(this->gatewayId);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("username", ::apache::thrift::protocol::T_STRING, 3);
+  xfer += oprot->writeString(this->username);
+  xfer += oprot->writeFieldEnd();
+
+  if (this->__isset.publicKey) {
+    xfer += oprot->writeFieldBegin("publicKey", ::apache::thrift::protocol::T_STRING, 4);
+    xfer += oprot->writeString(this->publicKey);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.persistedTime) {
+    xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 5);
+    xfer += oprot->writeI64(this->persistedTime);
+    xfer += oprot->writeFieldEnd();
+  }
+  xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 6);
+  xfer += oprot->writeString(this->token);
+  xfer += oprot->writeFieldEnd();
+
+  if (this->__isset.description) {
+    xfer += oprot->writeFieldBegin("description", ::apache::thrift::protocol::T_STRING, 7);
+    xfer += oprot->writeString(this->description);
+    xfer += oprot->writeFieldEnd();
+  }
+  xfer += oprot->writeFieldStop();
+  xfer += oprot->writeStructEnd();
+  return xfer;
+}
+
+void swap(CredentialSummary &a, CredentialSummary &b) {
+  using ::std::swap;
+  swap(a.type, b.type);
+  swap(a.gatewayId, b.gatewayId);
+  swap(a.username, b.username);
+  swap(a.publicKey, b.publicKey);
+  swap(a.persistedTime, b.persistedTime);
+  swap(a.token, b.token);
+  swap(a.description, b.description);
+  swap(a.__isset, b.__isset);
+}
+
+CredentialSummary::CredentialSummary(const CredentialSummary& other4) {
+  type = other4.type;
+  gatewayId = other4.gatewayId;
+  username = other4.username;
+  publicKey = other4.publicKey;
+  persistedTime = other4.persistedTime;
+  token = other4.token;
+  description = other4.description;
+  __isset = other4.__isset;
+}
+CredentialSummary& CredentialSummary::operator=(const CredentialSummary& other5) {
+  type = other5.type;
+  gatewayId = other5.gatewayId;
+  username = other5.username;
+  publicKey = other5.publicKey;
+  persistedTime = other5.persistedTime;
+  token = other5.token;
+  description = other5.description;
+  __isset = other5.__isset;
+  return *this;
+}
+void CredentialSummary::printTo(std::ostream& out) const {
+  using ::apache::thrift::to_string;
+  out << "CredentialSummary(";
+  out << "type=" << to_string(type);
+  out << ", " << "gatewayId=" << to_string(gatewayId);
+  out << ", " << "username=" << to_string(username);
+  out << ", " << "publicKey="; (__isset.publicKey ? (out << to_string(publicKey)) : (out << "<null>"));
+  out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+  out << ", " << "token=" << to_string(token);
+  out << ", " << "description="; (__isset.description ? (out << to_string(description)) : (out << "<null>"));
+  out << ")";
+}
+
+
+CommunityUser::~CommunityUser() throw() {
+}
+
+
+void CommunityUser::__set_gatewayName(const std::string& val) {
+  this->gatewayName = val;
+}
+
+void CommunityUser::__set_username(const std::string& val) {
+  this->username = val;
+}
+
+void CommunityUser::__set_userEmail(const std::string& val) {
+  this->userEmail = val;
+}
+
+uint32_t CommunityUser::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+  apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+  uint32_t xfer = 0;
+  std::string fname;
+  ::apache::thrift::protocol::TType ftype;
+  int16_t fid;
+
+  xfer += iprot->readStructBegin(fname);
+
+  using ::apache::thrift::protocol::TProtocolException;
+
+  bool isset_gatewayName = false;
+  bool isset_username = false;
+  bool isset_userEmail = false;
+
+  while (true)
+  {
+    xfer += iprot->readFieldBegin(fname, ftype, fid);
+    if (ftype == ::apache::thrift::protocol::T_STOP) {
+      break;
+    }
+    switch (fid)
+    {
+      case 1:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->gatewayName);
+          isset_gatewayName = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 2:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->username);
+          isset_username = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 3:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->userEmail);
+          isset_userEmail = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      default:
+        xfer += iprot->skip(ftype);
+        break;
+    }
+    xfer += iprot->readFieldEnd();
+  }
+
+  xfer += iprot->readStructEnd();
+
+  if (!isset_gatewayName)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_username)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_userEmail)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  return xfer;
+}
+
+uint32_t CommunityUser::write(::apache::thrift::protocol::TProtocol* oprot) const {
+  uint32_t xfer = 0;
+  apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+  xfer += oprot->writeStructBegin("CommunityUser");
+
+  xfer += oprot->writeFieldBegin("gatewayName", ::apache::thrift::protocol::T_STRING, 1);
+  xfer += oprot->writeString(this->gatewayName);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("username", ::apache::thrift::protocol::T_STRING, 2);
+  xfer += oprot->writeString(this->username);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("userEmail", ::apache::thrift::protocol::T_STRING, 3);
+  xfer += oprot->writeString(this->userEmail);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldStop();
+  xfer += oprot->writeStructEnd();
+  return xfer;
+}
+
+void swap(CommunityUser &a, CommunityUser &b) {
+  using ::std::swap;
+  swap(a.gatewayName, b.gatewayName);
+  swap(a.username, b.username);
+  swap(a.userEmail, b.userEmail);
+}
+
+CommunityUser::CommunityUser(const CommunityUser& other6) {
+  gatewayName = other6.gatewayName;
+  username = other6.username;
+  userEmail = other6.userEmail;
+}
+CommunityUser& CommunityUser::operator=(const CommunityUser& other7) {
+  gatewayName = other7.gatewayName;
+  username = other7.username;
+  userEmail = other7.userEmail;
+  return *this;
+}
+void CommunityUser::printTo(std::ostream& out) const {
+  using ::apache::thrift::to_string;
+  out << "CommunityUser(";
+  out << "gatewayName=" << to_string(gatewayName);
+  out << ", " << "username=" << to_string(username);
+  out << ", " << "userEmail=" << to_string(userEmail);
+  out << ")";
+}
+
+
+CertificateCredential::~CertificateCredential() throw() {
+}
+
+
+void CertificateCredential::__set_communityUser(const CommunityUser& val) {
+  this->communityUser = val;
+}
+
+void CertificateCredential::__set_x509Cert(const std::string& val) {
+  this->x509Cert = val;
+}
+
+void CertificateCredential::__set_notAfter(const std::string& val) {
+  this->notAfter = val;
+__isset.notAfter = true;
+}
+
+void CertificateCredential::__set_privateKey(const std::string& val) {
+  this->privateKey = val;
+__isset.privateKey = true;
+}
+
+void CertificateCredential::__set_lifeTime(const int64_t val) {
+  this->lifeTime = val;
+__isset.lifeTime = true;
+}
+
+void CertificateCredential::__set_notBefore(const std::string& val) {
+  this->notBefore = val;
+__isset.notBefore = true;
+}
+
+void CertificateCredential::__set_persistedTime(const int64_t val) {
+  this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void CertificateCredential::__set_token(const std::string& val) {
+  this->token = val;
+__isset.token = true;
+}
+
+uint32_t CertificateCredential::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+  apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+  uint32_t xfer = 0;
+  std::string fname;
+  ::apache::thrift::protocol::TType ftype;
+  int16_t fid;
+
+  xfer += iprot->readStructBegin(fname);
+
+  using ::apache::thrift::protocol::TProtocolException;
+
+  bool isset_communityUser = false;
+  bool isset_x509Cert = false;
+
+  while (true)
+  {
+    xfer += iprot->readFieldBegin(fname, ftype, fid);
+    if (ftype == ::apache::thrift::protocol::T_STOP) {
+      break;
+    }
+    switch (fid)
+    {
+      case 1:
+        if (ftype == ::apache::thrift::protocol::T_STRUCT) {
+          xfer += this->communityUser.read(iprot);
+          isset_communityUser = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 2:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->x509Cert);
+          isset_x509Cert = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 3:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->notAfter);
+          this->__isset.notAfter = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 4:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->privateKey);
+          this->__isset.privateKey = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 5:
+        if (ftype == ::apache::thrift::protocol::T_I64) {
+          xfer += iprot->readI64(this->lifeTime);
+          this->__isset.lifeTime = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 6:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->notBefore);
+          this->__isset.notBefore = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 7:
+        if (ftype == ::apache::thrift::protocol::T_I64) {
+          xfer += iprot->readI64(this->persistedTime);
+          this->__isset.persistedTime = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 8:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->token);
+          this->__isset.token = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      default:
+        xfer += iprot->skip(ftype);
+        break;
+    }
+    xfer += iprot->readFieldEnd();
+  }
+
+  xfer += iprot->readStructEnd();
+
+  if (!isset_communityUser)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_x509Cert)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  return xfer;
+}
+
+uint32_t CertificateCredential::write(::apache::thrift::protocol::TProtocol* oprot) const {
+  uint32_t xfer = 0;
+  apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+  xfer += oprot->writeStructBegin("CertificateCredential");
+
+  xfer += oprot->writeFieldBegin("communityUser", ::apache::thrift::protocol::T_STRUCT, 1);
+  xfer += this->communityUser.write(oprot);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("x509Cert", ::apache::thrift::protocol::T_STRING, 2);
+  xfer += oprot->writeString(this->x509Cert);
+  xfer += oprot->writeFieldEnd();
+
+  if (this->__isset.notAfter) {
+    xfer += oprot->writeFieldBegin("notAfter", ::apache::thrift::protocol::T_STRING, 3);
+    xfer += oprot->writeString(this->notAfter);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.privateKey) {
+    xfer += oprot->writeFieldBegin("privateKey", ::apache::thrift::protocol::T_STRING, 4);
+    xfer += oprot->writeString(this->privateKey);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.lifeTime) {
+    xfer += oprot->writeFieldBegin("lifeTime", ::apache::thrift::protocol::T_I64, 5);
+    xfer += oprot->writeI64(this->lifeTime);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.notBefore) {
+    xfer += oprot->writeFieldBegin("notBefore", ::apache::thrift::protocol::T_STRING, 6);
+    xfer += oprot->writeString(this->notBefore);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.persistedTime) {
+    xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 7);
+    xfer += oprot->writeI64(this->persistedTime);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.token) {
+    xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 8);
+    xfer += oprot->writeString(this->token);
+    xfer += oprot->writeFieldEnd();
+  }
+  xfer += oprot->writeFieldStop();
+  xfer += oprot->writeStructEnd();
+  return xfer;
+}
+
+void swap(CertificateCredential &a, CertificateCredential &b) {
+  using ::std::swap;
+  swap(a.communityUser, b.communityUser);
+  swap(a.x509Cert, b.x509Cert);
+  swap(a.notAfter, b.notAfter);
+  swap(a.privateKey, b.privateKey);
+  swap(a.lifeTime, b.lifeTime);
+  swap(a.notBefore, b.notBefore);
+  swap(a.persistedTime, b.persistedTime);
+  swap(a.token, b.token);
+  swap(a.__isset, b.__isset);
+}
+
+CertificateCredential::CertificateCredential(const CertificateCredential& other8) {
+  communityUser = other8.communityUser;
+  x509Cert = other8.x509Cert;
+  notAfter = other8.notAfter;
+  privateKey = other8.privateKey;
+  lifeTime = other8.lifeTime;
+  notBefore = other8.notBefore;
+  persistedTime = other8.persistedTime;
+  token = other8.token;
+  __isset = other8.__isset;
+}
+CertificateCredential& CertificateCredential::operator=(const CertificateCredential& other9) {
+  communityUser = other9.communityUser;
+  x509Cert = other9.x509Cert;
+  notAfter = other9.notAfter;
+  privateKey = other9.privateKey;
+  lifeTime = other9.lifeTime;
+  notBefore = other9.notBefore;
+  persistedTime = other9.persistedTime;
+  token = other9.token;
+  __isset = other9.__isset;
+  return *this;
+}
+void CertificateCredential::printTo(std::ostream& out) const {
+  using ::apache::thrift::to_string;
+  out << "CertificateCredential(";
+  out << "communityUser=" << to_string(communityUser);
+  out << ", " << "x509Cert=" << to_string(x509Cert);
+  out << ", " << "notAfter="; (__isset.notAfter ? (out << to_string(notAfter)) : (out << "<null>"));
+  out << ", " << "privateKey="; (__isset.privateKey ? (out << to_string(privateKey)) : (out << "<null>"));
+  out << ", " << "lifeTime="; (__isset.lifeTime ? (out << to_string(lifeTime)) : (out << "<null>"));
+  out << ", " << "notBefore="; (__isset.notBefore ? (out << to_string(notBefore)) : (out << "<null>"));
+  out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+  out << ", " << "token="; (__isset.token ? (out << to_string(token)) : (out << "<null>"));
+  out << ")";
+}
+
+
+PasswordCredential::~PasswordCredential() throw() {
+}
+
+
+void PasswordCredential::__set_gatewayId(const std::string& val) {
+  this->gatewayId = val;
+}
+
+void PasswordCredential::__set_portalUserName(const std::string& val) {
+  this->portalUserName = val;
+}
+
+void PasswordCredential::__set_loginUserName(const std::string& val) {
+  this->loginUserName = val;
+}
+
+void PasswordCredential::__set_password(const std::string& val) {
+  this->password = val;
+}
+
+void PasswordCredential::__set_description(const std::string& val) {
+  this->description = val;
+__isset.description = true;
+}
+
+void PasswordCredential::__set_persistedTime(const int64_t val) {
+  this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void PasswordCredential::__set_token(const std::string& val) {
+  this->token = val;
+__isset.token = true;
+}
+
+uint32_t PasswordCredential::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+  apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+  uint32_t xfer = 0;
+  std::string fname;
+  ::apache::thrift::protocol::TType ftype;
+  int16_t fid;
+
+  xfer += iprot->readStructBegin(fname);
+
+  using ::apache::thrift::protocol::TProtocolException;
+
+  bool isset_gatewayId = false;
+  bool isset_portalUserName = false;
+  bool isset_loginUserName = false;
+  bool isset_password = false;
+
+  while (true)
+  {
+    xfer += iprot->readFieldBegin(fname, ftype, fid);
+    if (ftype == ::apache::thrift::protocol::T_STOP) {
+      break;
+    }
+    switch (fid)
+    {
+      case 1:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->gatewayId);
+          isset_gatewayId = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 2:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->portalUserName);
+          isset_portalUserName = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 3:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->loginUserName);
+          isset_loginUserName = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 4:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->password);
+          isset_password = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 5:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->description);
+          this->__isset.description = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 6:
+        if (ftype == ::apache::thrift::protocol::T_I64) {
+          xfer += iprot->readI64(this->persistedTime);
+          this->__isset.persistedTime = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      case 7:
+        if (ftype == ::apache::thrift::protocol::T_STRING) {
+          xfer += iprot->readString(this->token);
+          this->__isset.token = true;
+        } else {
+          xfer += iprot->skip(ftype);
+        }
+        break;
+      default:
+        xfer += iprot->skip(ftype);
+        break;
+    }
+    xfer += iprot->readFieldEnd();
+  }
+
+  xfer += iprot->readStructEnd();
+
+  if (!isset_gatewayId)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_portalUserName)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_loginUserName)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  if (!isset_password)
+    throw TProtocolException(TProtocolException::INVALID_DATA);
+  return xfer;
+}
+
+uint32_t PasswordCredential::write(::apache::thrift::protocol::TProtocol* oprot) const {
+  uint32_t xfer = 0;
+  apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+  xfer += oprot->writeStructBegin("PasswordCredential");
+
+  xfer += oprot->writeFieldBegin("gatewayId", ::apache::thrift::protocol::T_STRING, 1);
+  xfer += oprot->writeString(this->gatewayId);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("portalUserName", ::apache::thrift::protocol::T_STRING, 2);
+  xfer += oprot->writeString(this->portalUserName);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("loginUserName", ::apache::thrift::protocol::T_STRING, 3);
+  xfer += oprot->writeString(this->loginUserName);
+  xfer += oprot->writeFieldEnd();
+
+  xfer += oprot->writeFieldBegin("password", ::apache::thrift::protocol::T_STRING, 4);
+  xfer += oprot->writeString(this->password);
+  xfer += oprot->writeFieldEnd();
+
+  if (this->__isset.description) {
+    xfer += oprot->writeFieldBegin("description", ::apache::thrift::protocol::T_STRING, 5);
+    xfer += oprot->writeString(this->description);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.persistedTime) {
+    xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 6);
+    xfer += oprot->writeI64(this->persistedTime);
+    xfer += oprot->writeFieldEnd();
+  }
+  if (this->__isset.token) {
+    xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 7);
+    xfer += oprot->writeString(this->token);
+    xfer += oprot->writeFieldEnd();
+  }
+  xfer += oprot->writeFieldStop();
+  xfer += oprot->writeStructEnd();
+  return xfer;
+}
+
+void swap(PasswordCredential &a, PasswordCredential &b) {
+  using ::std::swap;
+  swap(a.gatewayId, b.gatewayId);
+  swap(a.portalUserName, b.portalUserName);
+  swap(a.loginUserName, b.loginUserName);
+  swap(a.password, b.password);
+  swap(a.description, b.description);
+  swap(a.persistedTime, b.persistedTime);
+  swap(a.token, b.token);
+  swap(a.__isset, b.__isset);
+}
+
+PasswordCredential::PasswordCredential(const PasswordCredential& other10) {
+  gatewayId = other10.gatewayId;
+  portalUserName = other10.portalUserName;
+  loginUserName = other10.loginUserName;
+  password = other10.password;
+  description = other10.description;
+  persistedTime = other10.persistedTime;
+  token = other10.token;
+  __isset = other10.__isset;
+}
+PasswordCredential& PasswordCredential::operator=(const PasswordCredential& other11) {
+  gatewayId = other11.gatewayId;
+  portalUserName = other11.portalUserName;
+  loginUserName = other11.loginUserName;
+  password = other11.password;
+  description = other11.description;
+  persistedTime = other11.persistedTime;
+  token = other11.token;
+  __isset = other11.__isset;
+  return *this;
+}
+void PasswordCredential::printTo(std::ostream& out) const {
+  using ::apache::thrift::to_string;
+  out << "PasswordCredential(";
+  out << "gatewayId=" << to_string(gatewayId);
+  out << ", " << "portalUserName=" << to_string(portalUserName);
+  out << ", " << "loginUserName=" << to_string(loginUserName);
+  out << ", " << "password=" << to_string(password);
+  out << ", " << "description="; (__isset.description ? (out << to_string(description)) : (out << "<null>"));
+  out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+  out << ", " << "token="; (__isset.token ? (out << to_string(token)) : (out << "<null>"));
+  out << ")";
+}
+
+

http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h
new file mode 100644
index 0000000..74f5733
--- /dev/null
+++ b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h
@@ -0,0 +1,494 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+/**
+ * Autogenerated by Thrift Compiler (0.9.3)
+ *
+ * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING
+ *  @generated
+ */
+#ifndef credential_store_data_models_TYPES_H
+#define credential_store_data_models_TYPES_H
+
+#include <iosfwd>
+
+#include <thrift/Thrift.h>
+#include <thrift/TApplicationException.h>
+#include <thrift/protocol/TProtocol.h>
+#include <thrift/transport/TTransport.h>
+
+#include <thrift/cxxfunctional.h>
+
+
+
+
+struct CredentialOwnerType {
+  enum type {
+    GATEWAY = 0,
+    USER = 1
+  };
+};
+
+extern const std::map<int, const char*> _CredentialOwnerType_VALUES_TO_NAMES;
+
+struct SummaryType {
+  enum type {
+    SSH = 0,
+    PASSWD = 1,
+    CERT = 2
+  };
+};
+
+extern const std::map<int, const char*> _SummaryType_VALUES_TO_NAMES;
+
+class SSHCredential;
+
+class CredentialSummary;
+
+class CommunityUser;
+
+class CertificateCredential;
+
+class PasswordCredential;
+
+typedef struct _SSHCredential__isset {
+  _SSHCredential__isset() : passphrase(false), publicKey(false), privateKey(false), persistedTime(false), token(false), description(false), credentialOwnerType(true) {}
+  bool passphrase :1;
+  bool publicKey :1;
+  bool privateKey :1;
+  bool persistedTime :1;
+  bool token :1;
+  bool description :1;
+  bool credentialOwnerType :1;
+} _SSHCredential__isset;
+
+class SSHCredential {
+ public:
+
+  SSHCredential(const SSHCredential&);
+  SSHCredential& operator=(const SSHCredential&);
+  SSHCredential() : gatewayId(), username(), passphrase(), publicKey(), privateKey(), persistedTime(0), token(), description(), credentialOwnerType((CredentialOwnerType::type)0) {
+    credentialOwnerType = (CredentialOwnerType::type)0;
+
+  }
+
+  virtual ~SSHCredential() throw();
+  std::string gatewayId;
+  std::string username;
+  std::string passphrase;
+  std::string publicKey;
+  std::string privateKey;
+  int64_t persistedTime;
+  std::string token;
+  std::string description;
+  CredentialOwnerType::type credentialOwnerType;
+
+  _SSHCredential__isset __isset;
+
+  void __set_gatewayId(const std::string& val);
+
+  void __set_username(const std::string& val);
+
+  void __set_passphrase(const std::string& val);
+
+  void __set_publicKey(const std::string& val);
+
+  void __set_privateKey(const std::string& val);
+
+  void __set_persistedTime(const int64_t val);
+
+  void __set_token(const std::string& val);
+
+  void __set_description(const std::string& val);
+
+  void __set_credentialOwnerType(const CredentialOwnerType::type val);
+
+  bool operator == (const SSHCredential & rhs) const
+  {
+    if (!(gatewayId == rhs.gatewayId))
+      return false;
+    if (!(username == rhs.username))
+      return false;
+    if (__isset.passphrase != rhs.__isset.passphrase)
+      return false;
+    else if (__isset.passphrase && !(passphrase == rhs.passphrase))
+      return false;
+    if (__isset.publicKey != rhs.__isset.publicKey)
+      return false;
+    else if (__isset.publicKey && !(publicKey == rhs.publicKey))
+      return false;
+    if (__isset.privateKey != rhs.__isset.privateKey)
+      return false;
+    else if (__isset.privateKey && !(privateKey == rhs.privateKey))
+      return false;
+    if (__isset.persistedTime != rhs.__isset.persistedTime)
+      return false;
+    else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+      return false;
+    if (__isset.token != rhs.__isset.token)
+      return false;
+    else if (__isset.token && !(token == rhs.token))
+      return false;
+    if (__isset.description != rhs.__isset.description)
+      return false;
+    else if (__isset.description && !(description == rhs.description))
+      return false;
+    if (__isset.credentialOwnerType != rhs.__isset.credentialOwnerType)
+      return false;
+    else if (__isset.credentialOwnerType && !(credentialOwnerType == rhs.credentialOwnerType))
+      return false;
+    return true;
+  }
+  bool operator != (const SSHCredential &rhs) const {
+    return !(*this == rhs);
+  }
+
+  bool operator < (const SSHCredential & ) const;
+
+  uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+  uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+  virtual void printTo(std::ostream& out) const;
+};
+
+void swap(SSHCredential &a, SSHCredential &b);
+
+inline std::ostream& operator<<(std::ostream& out, const SSHCredential& obj)
+{
+  obj.printTo(out);
+  return out;
+}
+
+typedef struct _CredentialSummary__isset {
+  _CredentialSummary__isset() : publicKey(false), persistedTime(false), description(false) {}
+  bool publicKey :1;
+  bool persistedTime :1;
+  bool description :1;
+} _CredentialSummary__isset;
+
+class CredentialSummary {
+ public:
+
+  CredentialSummary(const CredentialSummary&);
+  CredentialSummary& operator=(const CredentialSummary&);
+  CredentialSummary() : type((SummaryType::type)0), gatewayId(), username(), publicKey(), persistedTime(0), token(), description() {
+  }
+
+  virtual ~CredentialSummary() throw();
+  SummaryType::type type;
+  std::string gatewayId;
+  std::string username;
+  std::string publicKey;
+  int64_t persistedTime;
+  std::string token;
+  std::string description;
+
+  _CredentialSummary__isset __isset;
+
+  void __set_type(const SummaryType::type val);
+
+  void __set_gatewayId(const std::string& val);
+
+  void __set_username(const std::string& val);
+
+  void __set_publicKey(const std::string& val);
+
+  void __set_persistedTime(const int64_t val);
+
+  void __set_token(const std::string& val);
+
+  void __set_description(const std::string& val);
+
+  bool operator == (const CredentialSummary & rhs) const
+  {
+    if (!(type == rhs.type))
+      return false;
+    if (!(gatewayId == rhs.gatewayId))
+      return false;
+    if (!(username == rhs.username))
+      return false;
+    if (__isset.publicKey != rhs.__isset.publicKey)
+      return false;
+    else if (__isset.publicKey && !(publicKey == rhs.publicKey))
+      return false;
+    if (__isset.persistedTime != rhs.__isset.persistedTime)
+      return false;
+    else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+      return false;
+    if (!(token == rhs.token))
+      return false;
+    if (__isset.description != rhs.__isset.description)
+      return false;
+    else if (__isset.description && !(description == rhs.description))
+      return false;
+    return true;
+  }
+  bool operator != (const CredentialSummary &rhs) const {
+    return !(*this == rhs);
+  }
+
+  bool operator < (const CredentialSummary & ) const;
+
+  uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+  uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+  virtual void printTo(std::ostream& out) const;
+};
+
+void swap(CredentialSummary &a, CredentialSummary &b);
+
+inline std::ostream& operator<<(std::ostream& out, const CredentialSummary& obj)
+{
+  obj.printTo(out);
+  return out;
+}
+
+
+class CommunityUser {
+ public:
+
+  CommunityUser(const CommunityUser&);
+  CommunityUser& operator=(const CommunityUser&);
+  CommunityUser() : gatewayName(), username(), userEmail() {
+  }
+
+  virtual ~CommunityUser() throw();
+  std::string gatewayName;
+  std::string username;
+  std::string userEmail;
+
+  void __set_gatewayName(const std::string& val);
+
+  void __set_username(const std::string& val);
+
+  void __set_userEmail(const std::string& val);
+
+  bool operator == (const CommunityUser & rhs) const
+  {
+    if (!(gatewayName == rhs.gatewayName))
+      return false;
+    if (!(username == rhs.username))
+      return false;
+    if (!(userEmail == rhs.userEmail))
+      return false;
+    return true;
+  }
+  bool operator != (const CommunityUser &rhs) const {
+    return !(*this == rhs);
+  }
+
+  bool operator < (const CommunityUser & ) const;
+
+  uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+  uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+  virtual void printTo(std::ostream& out) const;
+};
+
+void swap(CommunityUser &a, CommunityUser &b);
+
+inline std::ostream& operator<<(std::ostream& out, const CommunityUser& obj)
+{
+  obj.printTo(out);
+  return out;
+}
+
+typedef struct _CertificateCredential__isset {
+  _CertificateCredential__isset() : notAfter(false), privateKey(false), lifeTime(false), notBefore(false), persistedTime(false), token(false) {}
+  bool notAfter :1;
+  bool privateKey :1;
+  bool lifeTime :1;
+  bool notBefore :1;
+  bool persistedTime :1;
+  bool token :1;
+} _CertificateCredential__isset;
+
+class CertificateCredential {
+ public:
+
+  CertificateCredential(const CertificateCredential&);
+  CertificateCredential& operator=(const CertificateCredential&);
+  CertificateCredential() : x509Cert(), notAfter(), privateKey(), lifeTime(0), notBefore(), persistedTime(0), token() {
+  }
+
+  virtual ~CertificateCredential() throw();
+  CommunityUser communityUser;
+  std::string x509Cert;
+  std::string notAfter;
+  std::string privateKey;
+  int64_t lifeTime;
+  std::string notBefore;
+  int64_t persistedTime;
+  std::string token;
+
+  _CertificateCredential__isset __isset;
+
+  void __set_communityUser(const CommunityUser& val);
+
+  void __set_x509Cert(const std::string& val);
+
+  void __set_notAfter(const std::string& val);
+
+  void __set_privateKey(const std::string& val);
+
+  void __set_lifeTime(const int64_t val);
+
+  void __set_notBefore(const std::string& val);
+
+  void __set_persistedTime(const int64_t val);
+
+  void __set_token(const std::string& val);
+
+  bool operator == (const CertificateCredential & rhs) const
+  {
+    if (!(communityUser == rhs.communityUser))
+      return false;
+    if (!(x509Cert == rhs.x509Cert))
+      return false;
+    if (__isset.notAfter != rhs.__isset.notAfter)
+      return false;
+    else if (__isset.notAfter && !(notAfter == rhs.notAfter))
+      return false;
+    if (__isset.privateKey != rhs.__isset.privateKey)
+      return false;
+    else if (__isset.privateKey && !(privateKey == rhs.privateKey))
+      return false;
+    if (__isset.lifeTime != rhs.__isset.lifeTime)
+      return false;
+    else if (__isset.lifeTime && !(lifeTime == rhs.lifeTime))
+      return false;
+    if (__isset.notBefore != rhs.__isset.notBefore)
+      return false;
+    else if (__isset.notBefore && !(notBefore == rhs.notBefore))
+      return false;
+    if (__isset.persistedTime != rhs.__isset.persistedTime)
+      return false;
+    else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+      return false;
+    if (__isset.token != rhs.__isset.token)
+      return false;
+    else if (__isset.token && !(token == rhs.token))
+      return false;
+    return true;
+  }
+  bool operator != (const CertificateCredential &rhs) const {
+    return !(*this == rhs);
+  }
+
+  bool operator < (const CertificateCredential & ) const;
+
+  uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+  uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+  virtual void printTo(std::ostream& out) const;
+};
+
+void swap(CertificateCredential &a, CertificateCredential &b);
+
+inline std::ostream& operator<<(std::ostream& out, const CertificateCredential& obj)
+{
+  obj.printTo(out);
+  return out;
+}
+
+typedef struct _PasswordCredential__isset {
+  _PasswordCredential__isset() : description(false), persistedTime(false), token(false) {}
+  bool description :1;
+  bool persistedTime :1;
+  bool token :1;
+} _PasswordCredential__isset;
+
+class PasswordCredential {
+ public:
+
+  PasswordCredential(const PasswordCredential&);
+  PasswordCredential& operator=(const PasswordCredential&);
+  PasswordCredential() : gatewayId(), portalUserName(), loginUserName(), password(), description(), persistedTime(0), token() {
+  }
+
+  virtual ~PasswordCredential() throw();
+  std::string gatewayId;
+  std::string portalUserName;
+  std::string loginUserName;
+  std::string password;
+  std::string description;
+  int64_t persistedTime;
+  std::string token;
+
+  _PasswordCredential__isset __isset;
+
+  void __set_gatewayId(const std::string& val);
+
+  void __set_portalUserName(const std::string& val);
+
+  void __set_loginUserName(const std::string& val);
+
+  void __set_password(const std::string& val);
+
+  void __set_description(const std::string& val);
+
+  void __set_persistedTime(const int64_t val);
+
+  void __set_token(const std::string& val);
+
+  bool operator == (const PasswordCredential & rhs) const
+  {
+    if (!(gatewayId == rhs.gatewayId))
+      return false;
+    if (!(portalUserName == rhs.portalUserName))
+      return false;
+    if (!(loginUserName == rhs.loginUserName))
+      return false;
+    if (!(password == rhs.password))
+      return false;
+    if (__isset.description != rhs.__isset.description)
+      return false;
+    else if (__isset.description && !(description == rhs.description))
+      return false;
+    if (__isset.persistedTime != rhs.__isset.persistedTime)
+      return false;
+    else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+      return false;
+    if (__isset.token != rhs.__isset.token)
+      return false;
+    else if (__isset.token && !(token == rhs.token))
+      return false;
+    return true;
+  }
+  bool operator != (const PasswordCredential &rhs) const {
+    return !(*this == rhs);
+  }
+
+  bool operator < (const PasswordCredential & ) const;
+
+  uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+  uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+  virtual void printTo(std::ostream& out) const;
+};
+
+void swap(PasswordCredential &a, PasswordCredential &b);
+
+inline std::ostream& operator<<(std::ostream& out, const PasswordCredential& obj)
+{
+  obj.printTo(out);
+  return out;
+}
+
+
+
+#endif

http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
index 2052d67..8f7ec37 100644
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
+++ b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
@@ -1,23 +1,21 @@
-/*
-*
-* Licensed to the Apache Software Foundation (ASF) under one
-* or more contributor license agreements.  See the NOTICE file
-* distributed with this work for additional information
-* regarding copyright ownership.  The ASF licenses this file
-* to you under the Apache License, Version 2.0 (the
-* "License"); you may not use this file except in compliance
-* with the License.  You may obtain a copy of the License at
-*
-*   http://www.apache.org/licenses/LICENSE-2.0
-*
-* Unless required by applicable law or agreed to in writing,
-* software distributed under the License is distributed on an
-* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-* KIND, either express or implied.  See the License for the
-* specific language governing permissions and limitations
-* under the License.
-*
-*/
+;
+; Licensed to the Apache Software Foundation (ASF) under one
+; or more contributor license agreements.  See the NOTICE file
+; distributed with this work for additional information
+; regarding copyright ownership.  The ASF licenses this file
+; to you under the Apache License, Version 2.0 (the
+; "License"); you may not use this file except in compliance
+; with the License.  You may obtain a copy of the License at
+;
+;   http://www.apache.org/licenses/LICENSE-2.0
+;
+; Unless required by applicable law or agreed to in writing,
+; software distributed under the License is distributed on an
+; "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+; KIND, either express or implied.  See the License for the
+; specific language governing permissions and limitations
+; under the License.
+;
 
 ; The is the configuration file with properties needed by Airavata Clients.
 ;   Key properties specify location of Airavata Services, Ports and Such.
@@ -29,14 +27,17 @@ THRIFT_LIB_DIR = "../lib/Thrift/"
 AIRAVATA_PHP_STUBS_DIR = "../lib/Airavata/"
 
 ; Host which runs the Airavata Server
-AIRAVATA_SERVER = "gw111.iu.xsede.org"
+AIRAVATA_SERVER = "gw153.iu.xsede.org"
 ;AIRAVATA_SERVER = "localhost"
 
 ; Airavata Server thrift port
-AIRAVATA_PORT = 9930
-;AIRAVATA_PORT = 8930
+;AIRAVATA_PORT = 9930
+AIRAVATA_PORT = 8930
 
 ; Time out value to give enough breathing room for client to get synchronous responses back
 AIRAVATA_TIMEOUT = 50000
 
+; Gateway Identifier Registered within Airavata
+GATEWAY_ID = "Ultrascan_Production"
+
 AIRAVATA_CREDENTIAL_STORE_TOKEN = 2c308fa9-99f8-4baa-92e4-d062e311483c

http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
index a080c5d..26dca58 100644
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
+++ b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
@@ -1,22 +1,24 @@
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements. See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership. The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License. You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on an
-# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-# KIND, either express or implied. See the License for the
-# specific language governing permissions and limitations
-# under the License.
+;
+; Licensed to the Apache Software Foundation (ASF) under one
+; or more contributor license agreements.  See the NOTICE file
+; distributed with this work for additional information
+; regarding copyright ownership.  The ASF licenses this file
+; to you under the Apache License, Version 2.0 (the
+; "License"); you may not use this file except in compliance
+; with the License.  You may obtain a copy of the License at
+;
+;   http://www.apache.org/licenses/LICENSE-2.0
+;
+; Unless required by applicable law or agreed to in writing,
+; software distributed under the License is distributed on an
+; "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+; KIND, either express or implied.  See the License for the
+; specific language governing permissions and limitations
+; under the License.
+;
 
-#Apache Airavata Gateway to Airavata Deployment Identifiers
-#Wed Jul 23 10:48:34 EDT 2014
+;Apache Airavata Gateway to Airavata Deployment Identifiers
+;Wed Jul 23 10:48:34 EDT 2014
 espressoInterfaceId=ESPRESSO_fcc4ab64-94f8-40f1-9811-f919b7ee4cd9
 amberInterfaceId=Amber_0489ef37-1184-4f5d-93c8-5f42fdd559ad
 gromacsInterfaceId=GROMACS_9a9dd63b-598b-45d7-8277-b66e76032b95
@@ -28,5 +30,5 @@ wrfInterfaceId=WRF_a390e041-cae3-4b85-9bb9-e03df666deb9
 autoDockInterfaceId=
 nwChemInterfaceId=NWChem_bdc7b97a-dd39-49cb-b203-6d779781d5c8
 lammpsInterfaceId=LAMMPS_f43520e2-b77a-4f11-b3b7-98693349fcd0
-#echoInterfaceId=Echo_271e6d47-a5db-434e-8453-e27985b7ea59
+;echoInterfaceId=Echo_271e6d47-a5db-434e-8453-e27985b7ea59
 echoInterfaceId=Echo_c6e6aaac-7d9d-44fc-aba2-63b5100528e8

http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
index 389e1ca..84e30af 100644
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
+++ b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
@@ -35,7 +35,7 @@ final class Constant extends \Thrift\Type\TConstant {
      *              in a change to major/minor version numbers.
      * 
      */
-"0.16.0";
+"0.17.0";
   }
 }
 

http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php
deleted file mode 100644
index 2dd144c..0000000
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php
+++ /dev/null
@@ -1,210 +0,0 @@
-<?php
-namespace Airavata\Model\AppCatalog\CredetialSummary;
-
-/**
- * Autogenerated by Thrift Compiler (0.9.3)
- *
- * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING
- *  @generated
- */
-use Thrift\Base\TBase;
-use Thrift\Type\TType;
-use Thrift\Type\TMessageType;
-use Thrift\Exception\TException;
-use Thrift\Exception\TProtocolException;
-use Thrift\Protocol\TProtocol;
-use Thrift\Protocol\TBinaryProtocolAccelerated;
-use Thrift\Exception\TApplicationException;
-
-
-class CredentialSummary {
-  static $_TSPEC;
-
-  /**
-   * @var string
-   */
-  public $gatewayId = null;
-  /**
-   * @var string
-   */
-  public $username = null;
-  /**
-   * @var string
-   */
-  public $token = null;
-  /**
-   * @var string
-   */
-  public $publicKey = null;
-  /**
-   * @var int
-   */
-  public $persistedTime = null;
-  /**
-   * @var string
-   */
-  public $description = null;
-
-  public function __construct($vals=null) {
-    if (!isset(self::$_TSPEC)) {
-      self::$_TSPEC = array(
-        1 => array(
-          'var' => 'gatewayId',
-          'type' => TType::STRING,
-          ),
-        2 => array(
-          'var' => 'username',
-          'type' => TType::STRING,
-          ),
-        3 => array(
-          'var' => 'token',
-          'type' => TType::STRING,
-          ),
-        4 => array(
-          'var' => 'publicKey',
-          'type' => TType::STRING,
-          ),
-        5 => array(
-          'var' => 'persistedTime',
-          'type' => TType::I64,
-          ),
-        6 => array(
-          'var' => 'description',
-          'type' => TType::STRING,
-          ),
-        );
-    }
-    if (is_array($vals)) {
-      if (isset($vals['gatewayId'])) {
-        $this->gatewayId = $vals['gatewayId'];
-      }
-      if (isset($vals['username'])) {
-        $this->username = $vals['username'];
-      }
-      if (isset($vals['token'])) {
-        $this->token = $vals['token'];
-      }
-      if (isset($vals['publicKey'])) {
-        $this->publicKey = $vals['publicKey'];
-      }
-      if (isset($vals['persistedTime'])) {
-        $this->persistedTime = $vals['persistedTime'];
-      }
-      if (isset($vals['description'])) {
-        $this->description = $vals['description'];
-      }
-    }
-  }
-
-  public function getName() {
-    return 'CredentialSummary';
-  }
-
-  public function read($input)
-  {
-    $xfer = 0;
-    $fname = null;
-    $ftype = 0;
-    $fid = 0;
-    $xfer += $input->readStructBegin($fname);
-    while (true)
-    {
-      $xfer += $input->readFieldBegin($fname, $ftype, $fid);
-      if ($ftype == TType::STOP) {
-        break;
-      }
-      switch ($fid)
-      {
-        case 1:
-          if ($ftype == TType::STRING) {
-            $xfer += $input->readString($this->gatewayId);
-          } else {
-            $xfer += $input->skip($ftype);
-          }
-          break;
-        case 2:
-          if ($ftype == TType::STRING) {
-            $xfer += $input->readString($this->username);
-          } else {
-            $xfer += $input->skip($ftype);
-          }
-          break;
-        case 3:
-          if ($ftype == TType::STRING) {
-            $xfer += $input->readString($this->token);
-          } else {
-            $xfer += $input->skip($ftype);
-          }
-          break;
-        case 4:
-          if ($ftype == TType::STRING) {
-            $xfer += $input->readString($this->publicKey);
-          } else {
-            $xfer += $input->skip($ftype);
-          }
-          break;
-        case 5:
-          if ($ftype == TType::I64) {
-            $xfer += $input->readI64($this->persistedTime);
-          } else {
-            $xfer += $input->skip($ftype);
-          }
-          break;
-        case 6:
-          if ($ftype == TType::STRING) {
-            $xfer += $input->readString($this->description);
-          } else {
-            $xfer += $input->skip($ftype);
-          }
-          break;
-        default:
-          $xfer += $input->skip($ftype);
-          break;
-      }
-      $xfer += $input->readFieldEnd();
-    }
-    $xfer += $input->readStructEnd();
-    return $xfer;
-  }
-
-  public function write($output) {
-    $xfer = 0;
-    $xfer += $output->writeStructBegin('CredentialSummary');
-    if ($this->gatewayId !== null) {
-      $xfer += $output->writeFieldBegin('gatewayId', TType::STRING, 1);
-      $xfer += $output->writeString($this->gatewayId);
-      $xfer += $output->writeFieldEnd();
-    }
-    if ($this->username !== null) {
-      $xfer += $output->writeFieldBegin('username', TType::STRING, 2);
-      $xfer += $output->writeString($this->username);
-      $xfer += $output->writeFieldEnd();
-    }
-    if ($this->token !== null) {
-      $xfer += $output->writeFieldBegin('token', TType::STRING, 3);
-      $xfer += $output->writeString($this->token);
-      $xfer += $output->writeFieldEnd();
-    }
-    if ($this->publicKey !== null) {
-      $xfer += $output->writeFieldBegin('publicKey', TType::STRING, 4);
-      $xfer += $output->writeString($this->publicKey);
-      $xfer += $output->writeFieldEnd();
-    }
-    if ($this->persistedTime !== null) {
-      $xfer += $output->writeFieldBegin('persistedTime', TType::I64, 5);
-      $xfer += $output->writeI64($this->persistedTime);
-      $xfer += $output->writeFieldEnd();
-    }
-    if ($this->description !== null) {
-      $xfer += $output->writeFieldBegin('description', TType::STRING, 6);
-      $xfer += $output->writeString($this->description);
-      $xfer += $output->writeFieldEnd();
-    }
-    $xfer += $output->writeFieldStop();
-    $xfer += $output->writeStructEnd();
-    return $xfer;
-  }
-
-}
-
-