You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airavata.apache.org by sm...@apache.org on 2017/01/20 10:28:38 UTC
[5/8] airavata git commit: bumping api version
http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp
new file mode 100644
index 0000000..22b8c23
--- /dev/null
+++ b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.cpp
@@ -0,0 +1,1149 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+/**
+ * Autogenerated by Thrift Compiler (0.9.3)
+ *
+ * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING
+ * @generated
+ */
+#include "credential_store_data_models_types.h"
+
+#include <algorithm>
+#include <ostream>
+
+#include <thrift/TToString.h>
+
+
+
+int _kCredentialOwnerTypeValues[] = {
+ CredentialOwnerType::GATEWAY,
+ CredentialOwnerType::USER
+};
+const char* _kCredentialOwnerTypeNames[] = {
+ "GATEWAY",
+ "USER"
+};
+const std::map<int, const char*> _CredentialOwnerType_VALUES_TO_NAMES(::apache::thrift::TEnumIterator(2, _kCredentialOwnerTypeValues, _kCredentialOwnerTypeNames), ::apache::thrift::TEnumIterator(-1, NULL, NULL));
+
+int _kSummaryTypeValues[] = {
+ SummaryType::SSH,
+ SummaryType::PASSWD,
+ SummaryType::CERT
+};
+const char* _kSummaryTypeNames[] = {
+ "SSH",
+ "PASSWD",
+ "CERT"
+};
+const std::map<int, const char*> _SummaryType_VALUES_TO_NAMES(::apache::thrift::TEnumIterator(3, _kSummaryTypeValues, _kSummaryTypeNames), ::apache::thrift::TEnumIterator(-1, NULL, NULL));
+
+
+SSHCredential::~SSHCredential() throw() {
+}
+
+
+void SSHCredential::__set_gatewayId(const std::string& val) {
+ this->gatewayId = val;
+}
+
+void SSHCredential::__set_username(const std::string& val) {
+ this->username = val;
+}
+
+void SSHCredential::__set_passphrase(const std::string& val) {
+ this->passphrase = val;
+__isset.passphrase = true;
+}
+
+void SSHCredential::__set_publicKey(const std::string& val) {
+ this->publicKey = val;
+__isset.publicKey = true;
+}
+
+void SSHCredential::__set_privateKey(const std::string& val) {
+ this->privateKey = val;
+__isset.privateKey = true;
+}
+
+void SSHCredential::__set_persistedTime(const int64_t val) {
+ this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void SSHCredential::__set_token(const std::string& val) {
+ this->token = val;
+__isset.token = true;
+}
+
+void SSHCredential::__set_description(const std::string& val) {
+ this->description = val;
+__isset.description = true;
+}
+
+void SSHCredential::__set_credentialOwnerType(const CredentialOwnerType::type val) {
+ this->credentialOwnerType = val;
+__isset.credentialOwnerType = true;
+}
+
+uint32_t SSHCredential::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+ apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+ uint32_t xfer = 0;
+ std::string fname;
+ ::apache::thrift::protocol::TType ftype;
+ int16_t fid;
+
+ xfer += iprot->readStructBegin(fname);
+
+ using ::apache::thrift::protocol::TProtocolException;
+
+ bool isset_gatewayId = false;
+ bool isset_username = false;
+
+ while (true)
+ {
+ xfer += iprot->readFieldBegin(fname, ftype, fid);
+ if (ftype == ::apache::thrift::protocol::T_STOP) {
+ break;
+ }
+ switch (fid)
+ {
+ case 1:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->gatewayId);
+ isset_gatewayId = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 2:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->username);
+ isset_username = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 3:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->passphrase);
+ this->__isset.passphrase = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 4:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->publicKey);
+ this->__isset.publicKey = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 5:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->privateKey);
+ this->__isset.privateKey = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 6:
+ if (ftype == ::apache::thrift::protocol::T_I64) {
+ xfer += iprot->readI64(this->persistedTime);
+ this->__isset.persistedTime = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 7:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->token);
+ this->__isset.token = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 8:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->description);
+ this->__isset.description = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 9:
+ if (ftype == ::apache::thrift::protocol::T_I32) {
+ int32_t ecast0;
+ xfer += iprot->readI32(ecast0);
+ this->credentialOwnerType = (CredentialOwnerType::type)ecast0;
+ this->__isset.credentialOwnerType = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ default:
+ xfer += iprot->skip(ftype);
+ break;
+ }
+ xfer += iprot->readFieldEnd();
+ }
+
+ xfer += iprot->readStructEnd();
+
+ if (!isset_gatewayId)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_username)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ return xfer;
+}
+
+uint32_t SSHCredential::write(::apache::thrift::protocol::TProtocol* oprot) const {
+ uint32_t xfer = 0;
+ apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+ xfer += oprot->writeStructBegin("SSHCredential");
+
+ xfer += oprot->writeFieldBegin("gatewayId", ::apache::thrift::protocol::T_STRING, 1);
+ xfer += oprot->writeString(this->gatewayId);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("username", ::apache::thrift::protocol::T_STRING, 2);
+ xfer += oprot->writeString(this->username);
+ xfer += oprot->writeFieldEnd();
+
+ if (this->__isset.passphrase) {
+ xfer += oprot->writeFieldBegin("passphrase", ::apache::thrift::protocol::T_STRING, 3);
+ xfer += oprot->writeString(this->passphrase);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.publicKey) {
+ xfer += oprot->writeFieldBegin("publicKey", ::apache::thrift::protocol::T_STRING, 4);
+ xfer += oprot->writeString(this->publicKey);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.privateKey) {
+ xfer += oprot->writeFieldBegin("privateKey", ::apache::thrift::protocol::T_STRING, 5);
+ xfer += oprot->writeString(this->privateKey);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.persistedTime) {
+ xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 6);
+ xfer += oprot->writeI64(this->persistedTime);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.token) {
+ xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 7);
+ xfer += oprot->writeString(this->token);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.description) {
+ xfer += oprot->writeFieldBegin("description", ::apache::thrift::protocol::T_STRING, 8);
+ xfer += oprot->writeString(this->description);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.credentialOwnerType) {
+ xfer += oprot->writeFieldBegin("credentialOwnerType", ::apache::thrift::protocol::T_I32, 9);
+ xfer += oprot->writeI32((int32_t)this->credentialOwnerType);
+ xfer += oprot->writeFieldEnd();
+ }
+ xfer += oprot->writeFieldStop();
+ xfer += oprot->writeStructEnd();
+ return xfer;
+}
+
+void swap(SSHCredential &a, SSHCredential &b) {
+ using ::std::swap;
+ swap(a.gatewayId, b.gatewayId);
+ swap(a.username, b.username);
+ swap(a.passphrase, b.passphrase);
+ swap(a.publicKey, b.publicKey);
+ swap(a.privateKey, b.privateKey);
+ swap(a.persistedTime, b.persistedTime);
+ swap(a.token, b.token);
+ swap(a.description, b.description);
+ swap(a.credentialOwnerType, b.credentialOwnerType);
+ swap(a.__isset, b.__isset);
+}
+
+SSHCredential::SSHCredential(const SSHCredential& other1) {
+ gatewayId = other1.gatewayId;
+ username = other1.username;
+ passphrase = other1.passphrase;
+ publicKey = other1.publicKey;
+ privateKey = other1.privateKey;
+ persistedTime = other1.persistedTime;
+ token = other1.token;
+ description = other1.description;
+ credentialOwnerType = other1.credentialOwnerType;
+ __isset = other1.__isset;
+}
+SSHCredential& SSHCredential::operator=(const SSHCredential& other2) {
+ gatewayId = other2.gatewayId;
+ username = other2.username;
+ passphrase = other2.passphrase;
+ publicKey = other2.publicKey;
+ privateKey = other2.privateKey;
+ persistedTime = other2.persistedTime;
+ token = other2.token;
+ description = other2.description;
+ credentialOwnerType = other2.credentialOwnerType;
+ __isset = other2.__isset;
+ return *this;
+}
+void SSHCredential::printTo(std::ostream& out) const {
+ using ::apache::thrift::to_string;
+ out << "SSHCredential(";
+ out << "gatewayId=" << to_string(gatewayId);
+ out << ", " << "username=" << to_string(username);
+ out << ", " << "passphrase="; (__isset.passphrase ? (out << to_string(passphrase)) : (out << "<null>"));
+ out << ", " << "publicKey="; (__isset.publicKey ? (out << to_string(publicKey)) : (out << "<null>"));
+ out << ", " << "privateKey="; (__isset.privateKey ? (out << to_string(privateKey)) : (out << "<null>"));
+ out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+ out << ", " << "token="; (__isset.token ? (out << to_string(token)) : (out << "<null>"));
+ out << ", " << "description="; (__isset.description ? (out << to_string(description)) : (out << "<null>"));
+ out << ", " << "credentialOwnerType="; (__isset.credentialOwnerType ? (out << to_string(credentialOwnerType)) : (out << "<null>"));
+ out << ")";
+}
+
+
+CredentialSummary::~CredentialSummary() throw() {
+}
+
+
+void CredentialSummary::__set_type(const SummaryType::type val) {
+ this->type = val;
+}
+
+void CredentialSummary::__set_gatewayId(const std::string& val) {
+ this->gatewayId = val;
+}
+
+void CredentialSummary::__set_username(const std::string& val) {
+ this->username = val;
+}
+
+void CredentialSummary::__set_publicKey(const std::string& val) {
+ this->publicKey = val;
+__isset.publicKey = true;
+}
+
+void CredentialSummary::__set_persistedTime(const int64_t val) {
+ this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void CredentialSummary::__set_token(const std::string& val) {
+ this->token = val;
+}
+
+void CredentialSummary::__set_description(const std::string& val) {
+ this->description = val;
+__isset.description = true;
+}
+
+uint32_t CredentialSummary::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+ apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+ uint32_t xfer = 0;
+ std::string fname;
+ ::apache::thrift::protocol::TType ftype;
+ int16_t fid;
+
+ xfer += iprot->readStructBegin(fname);
+
+ using ::apache::thrift::protocol::TProtocolException;
+
+ bool isset_type = false;
+ bool isset_gatewayId = false;
+ bool isset_username = false;
+ bool isset_token = false;
+
+ while (true)
+ {
+ xfer += iprot->readFieldBegin(fname, ftype, fid);
+ if (ftype == ::apache::thrift::protocol::T_STOP) {
+ break;
+ }
+ switch (fid)
+ {
+ case 1:
+ if (ftype == ::apache::thrift::protocol::T_I32) {
+ int32_t ecast3;
+ xfer += iprot->readI32(ecast3);
+ this->type = (SummaryType::type)ecast3;
+ isset_type = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 2:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->gatewayId);
+ isset_gatewayId = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 3:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->username);
+ isset_username = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 4:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->publicKey);
+ this->__isset.publicKey = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 5:
+ if (ftype == ::apache::thrift::protocol::T_I64) {
+ xfer += iprot->readI64(this->persistedTime);
+ this->__isset.persistedTime = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 6:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->token);
+ isset_token = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 7:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->description);
+ this->__isset.description = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ default:
+ xfer += iprot->skip(ftype);
+ break;
+ }
+ xfer += iprot->readFieldEnd();
+ }
+
+ xfer += iprot->readStructEnd();
+
+ if (!isset_type)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_gatewayId)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_username)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_token)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ return xfer;
+}
+
+uint32_t CredentialSummary::write(::apache::thrift::protocol::TProtocol* oprot) const {
+ uint32_t xfer = 0;
+ apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+ xfer += oprot->writeStructBegin("CredentialSummary");
+
+ xfer += oprot->writeFieldBegin("type", ::apache::thrift::protocol::T_I32, 1);
+ xfer += oprot->writeI32((int32_t)this->type);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("gatewayId", ::apache::thrift::protocol::T_STRING, 2);
+ xfer += oprot->writeString(this->gatewayId);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("username", ::apache::thrift::protocol::T_STRING, 3);
+ xfer += oprot->writeString(this->username);
+ xfer += oprot->writeFieldEnd();
+
+ if (this->__isset.publicKey) {
+ xfer += oprot->writeFieldBegin("publicKey", ::apache::thrift::protocol::T_STRING, 4);
+ xfer += oprot->writeString(this->publicKey);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.persistedTime) {
+ xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 5);
+ xfer += oprot->writeI64(this->persistedTime);
+ xfer += oprot->writeFieldEnd();
+ }
+ xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 6);
+ xfer += oprot->writeString(this->token);
+ xfer += oprot->writeFieldEnd();
+
+ if (this->__isset.description) {
+ xfer += oprot->writeFieldBegin("description", ::apache::thrift::protocol::T_STRING, 7);
+ xfer += oprot->writeString(this->description);
+ xfer += oprot->writeFieldEnd();
+ }
+ xfer += oprot->writeFieldStop();
+ xfer += oprot->writeStructEnd();
+ return xfer;
+}
+
+void swap(CredentialSummary &a, CredentialSummary &b) {
+ using ::std::swap;
+ swap(a.type, b.type);
+ swap(a.gatewayId, b.gatewayId);
+ swap(a.username, b.username);
+ swap(a.publicKey, b.publicKey);
+ swap(a.persistedTime, b.persistedTime);
+ swap(a.token, b.token);
+ swap(a.description, b.description);
+ swap(a.__isset, b.__isset);
+}
+
+CredentialSummary::CredentialSummary(const CredentialSummary& other4) {
+ type = other4.type;
+ gatewayId = other4.gatewayId;
+ username = other4.username;
+ publicKey = other4.publicKey;
+ persistedTime = other4.persistedTime;
+ token = other4.token;
+ description = other4.description;
+ __isset = other4.__isset;
+}
+CredentialSummary& CredentialSummary::operator=(const CredentialSummary& other5) {
+ type = other5.type;
+ gatewayId = other5.gatewayId;
+ username = other5.username;
+ publicKey = other5.publicKey;
+ persistedTime = other5.persistedTime;
+ token = other5.token;
+ description = other5.description;
+ __isset = other5.__isset;
+ return *this;
+}
+void CredentialSummary::printTo(std::ostream& out) const {
+ using ::apache::thrift::to_string;
+ out << "CredentialSummary(";
+ out << "type=" << to_string(type);
+ out << ", " << "gatewayId=" << to_string(gatewayId);
+ out << ", " << "username=" << to_string(username);
+ out << ", " << "publicKey="; (__isset.publicKey ? (out << to_string(publicKey)) : (out << "<null>"));
+ out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+ out << ", " << "token=" << to_string(token);
+ out << ", " << "description="; (__isset.description ? (out << to_string(description)) : (out << "<null>"));
+ out << ")";
+}
+
+
+CommunityUser::~CommunityUser() throw() {
+}
+
+
+void CommunityUser::__set_gatewayName(const std::string& val) {
+ this->gatewayName = val;
+}
+
+void CommunityUser::__set_username(const std::string& val) {
+ this->username = val;
+}
+
+void CommunityUser::__set_userEmail(const std::string& val) {
+ this->userEmail = val;
+}
+
+uint32_t CommunityUser::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+ apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+ uint32_t xfer = 0;
+ std::string fname;
+ ::apache::thrift::protocol::TType ftype;
+ int16_t fid;
+
+ xfer += iprot->readStructBegin(fname);
+
+ using ::apache::thrift::protocol::TProtocolException;
+
+ bool isset_gatewayName = false;
+ bool isset_username = false;
+ bool isset_userEmail = false;
+
+ while (true)
+ {
+ xfer += iprot->readFieldBegin(fname, ftype, fid);
+ if (ftype == ::apache::thrift::protocol::T_STOP) {
+ break;
+ }
+ switch (fid)
+ {
+ case 1:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->gatewayName);
+ isset_gatewayName = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 2:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->username);
+ isset_username = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 3:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->userEmail);
+ isset_userEmail = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ default:
+ xfer += iprot->skip(ftype);
+ break;
+ }
+ xfer += iprot->readFieldEnd();
+ }
+
+ xfer += iprot->readStructEnd();
+
+ if (!isset_gatewayName)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_username)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_userEmail)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ return xfer;
+}
+
+uint32_t CommunityUser::write(::apache::thrift::protocol::TProtocol* oprot) const {
+ uint32_t xfer = 0;
+ apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+ xfer += oprot->writeStructBegin("CommunityUser");
+
+ xfer += oprot->writeFieldBegin("gatewayName", ::apache::thrift::protocol::T_STRING, 1);
+ xfer += oprot->writeString(this->gatewayName);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("username", ::apache::thrift::protocol::T_STRING, 2);
+ xfer += oprot->writeString(this->username);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("userEmail", ::apache::thrift::protocol::T_STRING, 3);
+ xfer += oprot->writeString(this->userEmail);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldStop();
+ xfer += oprot->writeStructEnd();
+ return xfer;
+}
+
+void swap(CommunityUser &a, CommunityUser &b) {
+ using ::std::swap;
+ swap(a.gatewayName, b.gatewayName);
+ swap(a.username, b.username);
+ swap(a.userEmail, b.userEmail);
+}
+
+CommunityUser::CommunityUser(const CommunityUser& other6) {
+ gatewayName = other6.gatewayName;
+ username = other6.username;
+ userEmail = other6.userEmail;
+}
+CommunityUser& CommunityUser::operator=(const CommunityUser& other7) {
+ gatewayName = other7.gatewayName;
+ username = other7.username;
+ userEmail = other7.userEmail;
+ return *this;
+}
+void CommunityUser::printTo(std::ostream& out) const {
+ using ::apache::thrift::to_string;
+ out << "CommunityUser(";
+ out << "gatewayName=" << to_string(gatewayName);
+ out << ", " << "username=" << to_string(username);
+ out << ", " << "userEmail=" << to_string(userEmail);
+ out << ")";
+}
+
+
+CertificateCredential::~CertificateCredential() throw() {
+}
+
+
+void CertificateCredential::__set_communityUser(const CommunityUser& val) {
+ this->communityUser = val;
+}
+
+void CertificateCredential::__set_x509Cert(const std::string& val) {
+ this->x509Cert = val;
+}
+
+void CertificateCredential::__set_notAfter(const std::string& val) {
+ this->notAfter = val;
+__isset.notAfter = true;
+}
+
+void CertificateCredential::__set_privateKey(const std::string& val) {
+ this->privateKey = val;
+__isset.privateKey = true;
+}
+
+void CertificateCredential::__set_lifeTime(const int64_t val) {
+ this->lifeTime = val;
+__isset.lifeTime = true;
+}
+
+void CertificateCredential::__set_notBefore(const std::string& val) {
+ this->notBefore = val;
+__isset.notBefore = true;
+}
+
+void CertificateCredential::__set_persistedTime(const int64_t val) {
+ this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void CertificateCredential::__set_token(const std::string& val) {
+ this->token = val;
+__isset.token = true;
+}
+
+uint32_t CertificateCredential::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+ apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+ uint32_t xfer = 0;
+ std::string fname;
+ ::apache::thrift::protocol::TType ftype;
+ int16_t fid;
+
+ xfer += iprot->readStructBegin(fname);
+
+ using ::apache::thrift::protocol::TProtocolException;
+
+ bool isset_communityUser = false;
+ bool isset_x509Cert = false;
+
+ while (true)
+ {
+ xfer += iprot->readFieldBegin(fname, ftype, fid);
+ if (ftype == ::apache::thrift::protocol::T_STOP) {
+ break;
+ }
+ switch (fid)
+ {
+ case 1:
+ if (ftype == ::apache::thrift::protocol::T_STRUCT) {
+ xfer += this->communityUser.read(iprot);
+ isset_communityUser = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 2:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->x509Cert);
+ isset_x509Cert = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 3:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->notAfter);
+ this->__isset.notAfter = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 4:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->privateKey);
+ this->__isset.privateKey = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 5:
+ if (ftype == ::apache::thrift::protocol::T_I64) {
+ xfer += iprot->readI64(this->lifeTime);
+ this->__isset.lifeTime = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 6:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->notBefore);
+ this->__isset.notBefore = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 7:
+ if (ftype == ::apache::thrift::protocol::T_I64) {
+ xfer += iprot->readI64(this->persistedTime);
+ this->__isset.persistedTime = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 8:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->token);
+ this->__isset.token = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ default:
+ xfer += iprot->skip(ftype);
+ break;
+ }
+ xfer += iprot->readFieldEnd();
+ }
+
+ xfer += iprot->readStructEnd();
+
+ if (!isset_communityUser)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_x509Cert)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ return xfer;
+}
+
+uint32_t CertificateCredential::write(::apache::thrift::protocol::TProtocol* oprot) const {
+ uint32_t xfer = 0;
+ apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+ xfer += oprot->writeStructBegin("CertificateCredential");
+
+ xfer += oprot->writeFieldBegin("communityUser", ::apache::thrift::protocol::T_STRUCT, 1);
+ xfer += this->communityUser.write(oprot);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("x509Cert", ::apache::thrift::protocol::T_STRING, 2);
+ xfer += oprot->writeString(this->x509Cert);
+ xfer += oprot->writeFieldEnd();
+
+ if (this->__isset.notAfter) {
+ xfer += oprot->writeFieldBegin("notAfter", ::apache::thrift::protocol::T_STRING, 3);
+ xfer += oprot->writeString(this->notAfter);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.privateKey) {
+ xfer += oprot->writeFieldBegin("privateKey", ::apache::thrift::protocol::T_STRING, 4);
+ xfer += oprot->writeString(this->privateKey);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.lifeTime) {
+ xfer += oprot->writeFieldBegin("lifeTime", ::apache::thrift::protocol::T_I64, 5);
+ xfer += oprot->writeI64(this->lifeTime);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.notBefore) {
+ xfer += oprot->writeFieldBegin("notBefore", ::apache::thrift::protocol::T_STRING, 6);
+ xfer += oprot->writeString(this->notBefore);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.persistedTime) {
+ xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 7);
+ xfer += oprot->writeI64(this->persistedTime);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.token) {
+ xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 8);
+ xfer += oprot->writeString(this->token);
+ xfer += oprot->writeFieldEnd();
+ }
+ xfer += oprot->writeFieldStop();
+ xfer += oprot->writeStructEnd();
+ return xfer;
+}
+
+void swap(CertificateCredential &a, CertificateCredential &b) {
+ using ::std::swap;
+ swap(a.communityUser, b.communityUser);
+ swap(a.x509Cert, b.x509Cert);
+ swap(a.notAfter, b.notAfter);
+ swap(a.privateKey, b.privateKey);
+ swap(a.lifeTime, b.lifeTime);
+ swap(a.notBefore, b.notBefore);
+ swap(a.persistedTime, b.persistedTime);
+ swap(a.token, b.token);
+ swap(a.__isset, b.__isset);
+}
+
+CertificateCredential::CertificateCredential(const CertificateCredential& other8) {
+ communityUser = other8.communityUser;
+ x509Cert = other8.x509Cert;
+ notAfter = other8.notAfter;
+ privateKey = other8.privateKey;
+ lifeTime = other8.lifeTime;
+ notBefore = other8.notBefore;
+ persistedTime = other8.persistedTime;
+ token = other8.token;
+ __isset = other8.__isset;
+}
+CertificateCredential& CertificateCredential::operator=(const CertificateCredential& other9) {
+ communityUser = other9.communityUser;
+ x509Cert = other9.x509Cert;
+ notAfter = other9.notAfter;
+ privateKey = other9.privateKey;
+ lifeTime = other9.lifeTime;
+ notBefore = other9.notBefore;
+ persistedTime = other9.persistedTime;
+ token = other9.token;
+ __isset = other9.__isset;
+ return *this;
+}
+void CertificateCredential::printTo(std::ostream& out) const {
+ using ::apache::thrift::to_string;
+ out << "CertificateCredential(";
+ out << "communityUser=" << to_string(communityUser);
+ out << ", " << "x509Cert=" << to_string(x509Cert);
+ out << ", " << "notAfter="; (__isset.notAfter ? (out << to_string(notAfter)) : (out << "<null>"));
+ out << ", " << "privateKey="; (__isset.privateKey ? (out << to_string(privateKey)) : (out << "<null>"));
+ out << ", " << "lifeTime="; (__isset.lifeTime ? (out << to_string(lifeTime)) : (out << "<null>"));
+ out << ", " << "notBefore="; (__isset.notBefore ? (out << to_string(notBefore)) : (out << "<null>"));
+ out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+ out << ", " << "token="; (__isset.token ? (out << to_string(token)) : (out << "<null>"));
+ out << ")";
+}
+
+
+PasswordCredential::~PasswordCredential() throw() {
+}
+
+
+void PasswordCredential::__set_gatewayId(const std::string& val) {
+ this->gatewayId = val;
+}
+
+void PasswordCredential::__set_portalUserName(const std::string& val) {
+ this->portalUserName = val;
+}
+
+void PasswordCredential::__set_loginUserName(const std::string& val) {
+ this->loginUserName = val;
+}
+
+void PasswordCredential::__set_password(const std::string& val) {
+ this->password = val;
+}
+
+void PasswordCredential::__set_description(const std::string& val) {
+ this->description = val;
+__isset.description = true;
+}
+
+void PasswordCredential::__set_persistedTime(const int64_t val) {
+ this->persistedTime = val;
+__isset.persistedTime = true;
+}
+
+void PasswordCredential::__set_token(const std::string& val) {
+ this->token = val;
+__isset.token = true;
+}
+
+uint32_t PasswordCredential::read(::apache::thrift::protocol::TProtocol* iprot) {
+
+ apache::thrift::protocol::TInputRecursionTracker tracker(*iprot);
+ uint32_t xfer = 0;
+ std::string fname;
+ ::apache::thrift::protocol::TType ftype;
+ int16_t fid;
+
+ xfer += iprot->readStructBegin(fname);
+
+ using ::apache::thrift::protocol::TProtocolException;
+
+ bool isset_gatewayId = false;
+ bool isset_portalUserName = false;
+ bool isset_loginUserName = false;
+ bool isset_password = false;
+
+ while (true)
+ {
+ xfer += iprot->readFieldBegin(fname, ftype, fid);
+ if (ftype == ::apache::thrift::protocol::T_STOP) {
+ break;
+ }
+ switch (fid)
+ {
+ case 1:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->gatewayId);
+ isset_gatewayId = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 2:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->portalUserName);
+ isset_portalUserName = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 3:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->loginUserName);
+ isset_loginUserName = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 4:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->password);
+ isset_password = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 5:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->description);
+ this->__isset.description = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 6:
+ if (ftype == ::apache::thrift::protocol::T_I64) {
+ xfer += iprot->readI64(this->persistedTime);
+ this->__isset.persistedTime = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ case 7:
+ if (ftype == ::apache::thrift::protocol::T_STRING) {
+ xfer += iprot->readString(this->token);
+ this->__isset.token = true;
+ } else {
+ xfer += iprot->skip(ftype);
+ }
+ break;
+ default:
+ xfer += iprot->skip(ftype);
+ break;
+ }
+ xfer += iprot->readFieldEnd();
+ }
+
+ xfer += iprot->readStructEnd();
+
+ if (!isset_gatewayId)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_portalUserName)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_loginUserName)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ if (!isset_password)
+ throw TProtocolException(TProtocolException::INVALID_DATA);
+ return xfer;
+}
+
+uint32_t PasswordCredential::write(::apache::thrift::protocol::TProtocol* oprot) const {
+ uint32_t xfer = 0;
+ apache::thrift::protocol::TOutputRecursionTracker tracker(*oprot);
+ xfer += oprot->writeStructBegin("PasswordCredential");
+
+ xfer += oprot->writeFieldBegin("gatewayId", ::apache::thrift::protocol::T_STRING, 1);
+ xfer += oprot->writeString(this->gatewayId);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("portalUserName", ::apache::thrift::protocol::T_STRING, 2);
+ xfer += oprot->writeString(this->portalUserName);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("loginUserName", ::apache::thrift::protocol::T_STRING, 3);
+ xfer += oprot->writeString(this->loginUserName);
+ xfer += oprot->writeFieldEnd();
+
+ xfer += oprot->writeFieldBegin("password", ::apache::thrift::protocol::T_STRING, 4);
+ xfer += oprot->writeString(this->password);
+ xfer += oprot->writeFieldEnd();
+
+ if (this->__isset.description) {
+ xfer += oprot->writeFieldBegin("description", ::apache::thrift::protocol::T_STRING, 5);
+ xfer += oprot->writeString(this->description);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.persistedTime) {
+ xfer += oprot->writeFieldBegin("persistedTime", ::apache::thrift::protocol::T_I64, 6);
+ xfer += oprot->writeI64(this->persistedTime);
+ xfer += oprot->writeFieldEnd();
+ }
+ if (this->__isset.token) {
+ xfer += oprot->writeFieldBegin("token", ::apache::thrift::protocol::T_STRING, 7);
+ xfer += oprot->writeString(this->token);
+ xfer += oprot->writeFieldEnd();
+ }
+ xfer += oprot->writeFieldStop();
+ xfer += oprot->writeStructEnd();
+ return xfer;
+}
+
+void swap(PasswordCredential &a, PasswordCredential &b) {
+ using ::std::swap;
+ swap(a.gatewayId, b.gatewayId);
+ swap(a.portalUserName, b.portalUserName);
+ swap(a.loginUserName, b.loginUserName);
+ swap(a.password, b.password);
+ swap(a.description, b.description);
+ swap(a.persistedTime, b.persistedTime);
+ swap(a.token, b.token);
+ swap(a.__isset, b.__isset);
+}
+
+PasswordCredential::PasswordCredential(const PasswordCredential& other10) {
+ gatewayId = other10.gatewayId;
+ portalUserName = other10.portalUserName;
+ loginUserName = other10.loginUserName;
+ password = other10.password;
+ description = other10.description;
+ persistedTime = other10.persistedTime;
+ token = other10.token;
+ __isset = other10.__isset;
+}
+PasswordCredential& PasswordCredential::operator=(const PasswordCredential& other11) {
+ gatewayId = other11.gatewayId;
+ portalUserName = other11.portalUserName;
+ loginUserName = other11.loginUserName;
+ password = other11.password;
+ description = other11.description;
+ persistedTime = other11.persistedTime;
+ token = other11.token;
+ __isset = other11.__isset;
+ return *this;
+}
+void PasswordCredential::printTo(std::ostream& out) const {
+ using ::apache::thrift::to_string;
+ out << "PasswordCredential(";
+ out << "gatewayId=" << to_string(gatewayId);
+ out << ", " << "portalUserName=" << to_string(portalUserName);
+ out << ", " << "loginUserName=" << to_string(loginUserName);
+ out << ", " << "password=" << to_string(password);
+ out << ", " << "description="; (__isset.description ? (out << to_string(description)) : (out << "<null>"));
+ out << ", " << "persistedTime="; (__isset.persistedTime ? (out << to_string(persistedTime)) : (out << "<null>"));
+ out << ", " << "token="; (__isset.token ? (out << to_string(token)) : (out << "<null>"));
+ out << ")";
+}
+
+
http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h
new file mode 100644
index 0000000..74f5733
--- /dev/null
+++ b/airavata-api/airavata-client-sdks/airavata-cpp-sdk/src/main/resources/lib/airavata/credential_store_data_models_types.h
@@ -0,0 +1,494 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+/**
+ * Autogenerated by Thrift Compiler (0.9.3)
+ *
+ * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING
+ * @generated
+ */
+#ifndef credential_store_data_models_TYPES_H
+#define credential_store_data_models_TYPES_H
+
+#include <iosfwd>
+
+#include <thrift/Thrift.h>
+#include <thrift/TApplicationException.h>
+#include <thrift/protocol/TProtocol.h>
+#include <thrift/transport/TTransport.h>
+
+#include <thrift/cxxfunctional.h>
+
+
+
+
+struct CredentialOwnerType {
+ enum type {
+ GATEWAY = 0,
+ USER = 1
+ };
+};
+
+extern const std::map<int, const char*> _CredentialOwnerType_VALUES_TO_NAMES;
+
+struct SummaryType {
+ enum type {
+ SSH = 0,
+ PASSWD = 1,
+ CERT = 2
+ };
+};
+
+extern const std::map<int, const char*> _SummaryType_VALUES_TO_NAMES;
+
+class SSHCredential;
+
+class CredentialSummary;
+
+class CommunityUser;
+
+class CertificateCredential;
+
+class PasswordCredential;
+
+typedef struct _SSHCredential__isset {
+ _SSHCredential__isset() : passphrase(false), publicKey(false), privateKey(false), persistedTime(false), token(false), description(false), credentialOwnerType(true) {}
+ bool passphrase :1;
+ bool publicKey :1;
+ bool privateKey :1;
+ bool persistedTime :1;
+ bool token :1;
+ bool description :1;
+ bool credentialOwnerType :1;
+} _SSHCredential__isset;
+
+class SSHCredential {
+ public:
+
+ SSHCredential(const SSHCredential&);
+ SSHCredential& operator=(const SSHCredential&);
+ SSHCredential() : gatewayId(), username(), passphrase(), publicKey(), privateKey(), persistedTime(0), token(), description(), credentialOwnerType((CredentialOwnerType::type)0) {
+ credentialOwnerType = (CredentialOwnerType::type)0;
+
+ }
+
+ virtual ~SSHCredential() throw();
+ std::string gatewayId;
+ std::string username;
+ std::string passphrase;
+ std::string publicKey;
+ std::string privateKey;
+ int64_t persistedTime;
+ std::string token;
+ std::string description;
+ CredentialOwnerType::type credentialOwnerType;
+
+ _SSHCredential__isset __isset;
+
+ void __set_gatewayId(const std::string& val);
+
+ void __set_username(const std::string& val);
+
+ void __set_passphrase(const std::string& val);
+
+ void __set_publicKey(const std::string& val);
+
+ void __set_privateKey(const std::string& val);
+
+ void __set_persistedTime(const int64_t val);
+
+ void __set_token(const std::string& val);
+
+ void __set_description(const std::string& val);
+
+ void __set_credentialOwnerType(const CredentialOwnerType::type val);
+
+ bool operator == (const SSHCredential & rhs) const
+ {
+ if (!(gatewayId == rhs.gatewayId))
+ return false;
+ if (!(username == rhs.username))
+ return false;
+ if (__isset.passphrase != rhs.__isset.passphrase)
+ return false;
+ else if (__isset.passphrase && !(passphrase == rhs.passphrase))
+ return false;
+ if (__isset.publicKey != rhs.__isset.publicKey)
+ return false;
+ else if (__isset.publicKey && !(publicKey == rhs.publicKey))
+ return false;
+ if (__isset.privateKey != rhs.__isset.privateKey)
+ return false;
+ else if (__isset.privateKey && !(privateKey == rhs.privateKey))
+ return false;
+ if (__isset.persistedTime != rhs.__isset.persistedTime)
+ return false;
+ else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+ return false;
+ if (__isset.token != rhs.__isset.token)
+ return false;
+ else if (__isset.token && !(token == rhs.token))
+ return false;
+ if (__isset.description != rhs.__isset.description)
+ return false;
+ else if (__isset.description && !(description == rhs.description))
+ return false;
+ if (__isset.credentialOwnerType != rhs.__isset.credentialOwnerType)
+ return false;
+ else if (__isset.credentialOwnerType && !(credentialOwnerType == rhs.credentialOwnerType))
+ return false;
+ return true;
+ }
+ bool operator != (const SSHCredential &rhs) const {
+ return !(*this == rhs);
+ }
+
+ bool operator < (const SSHCredential & ) const;
+
+ uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+ uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+ virtual void printTo(std::ostream& out) const;
+};
+
+void swap(SSHCredential &a, SSHCredential &b);
+
+inline std::ostream& operator<<(std::ostream& out, const SSHCredential& obj)
+{
+ obj.printTo(out);
+ return out;
+}
+
+typedef struct _CredentialSummary__isset {
+ _CredentialSummary__isset() : publicKey(false), persistedTime(false), description(false) {}
+ bool publicKey :1;
+ bool persistedTime :1;
+ bool description :1;
+} _CredentialSummary__isset;
+
+class CredentialSummary {
+ public:
+
+ CredentialSummary(const CredentialSummary&);
+ CredentialSummary& operator=(const CredentialSummary&);
+ CredentialSummary() : type((SummaryType::type)0), gatewayId(), username(), publicKey(), persistedTime(0), token(), description() {
+ }
+
+ virtual ~CredentialSummary() throw();
+ SummaryType::type type;
+ std::string gatewayId;
+ std::string username;
+ std::string publicKey;
+ int64_t persistedTime;
+ std::string token;
+ std::string description;
+
+ _CredentialSummary__isset __isset;
+
+ void __set_type(const SummaryType::type val);
+
+ void __set_gatewayId(const std::string& val);
+
+ void __set_username(const std::string& val);
+
+ void __set_publicKey(const std::string& val);
+
+ void __set_persistedTime(const int64_t val);
+
+ void __set_token(const std::string& val);
+
+ void __set_description(const std::string& val);
+
+ bool operator == (const CredentialSummary & rhs) const
+ {
+ if (!(type == rhs.type))
+ return false;
+ if (!(gatewayId == rhs.gatewayId))
+ return false;
+ if (!(username == rhs.username))
+ return false;
+ if (__isset.publicKey != rhs.__isset.publicKey)
+ return false;
+ else if (__isset.publicKey && !(publicKey == rhs.publicKey))
+ return false;
+ if (__isset.persistedTime != rhs.__isset.persistedTime)
+ return false;
+ else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+ return false;
+ if (!(token == rhs.token))
+ return false;
+ if (__isset.description != rhs.__isset.description)
+ return false;
+ else if (__isset.description && !(description == rhs.description))
+ return false;
+ return true;
+ }
+ bool operator != (const CredentialSummary &rhs) const {
+ return !(*this == rhs);
+ }
+
+ bool operator < (const CredentialSummary & ) const;
+
+ uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+ uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+ virtual void printTo(std::ostream& out) const;
+};
+
+void swap(CredentialSummary &a, CredentialSummary &b);
+
+inline std::ostream& operator<<(std::ostream& out, const CredentialSummary& obj)
+{
+ obj.printTo(out);
+ return out;
+}
+
+
+class CommunityUser {
+ public:
+
+ CommunityUser(const CommunityUser&);
+ CommunityUser& operator=(const CommunityUser&);
+ CommunityUser() : gatewayName(), username(), userEmail() {
+ }
+
+ virtual ~CommunityUser() throw();
+ std::string gatewayName;
+ std::string username;
+ std::string userEmail;
+
+ void __set_gatewayName(const std::string& val);
+
+ void __set_username(const std::string& val);
+
+ void __set_userEmail(const std::string& val);
+
+ bool operator == (const CommunityUser & rhs) const
+ {
+ if (!(gatewayName == rhs.gatewayName))
+ return false;
+ if (!(username == rhs.username))
+ return false;
+ if (!(userEmail == rhs.userEmail))
+ return false;
+ return true;
+ }
+ bool operator != (const CommunityUser &rhs) const {
+ return !(*this == rhs);
+ }
+
+ bool operator < (const CommunityUser & ) const;
+
+ uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+ uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+ virtual void printTo(std::ostream& out) const;
+};
+
+void swap(CommunityUser &a, CommunityUser &b);
+
+inline std::ostream& operator<<(std::ostream& out, const CommunityUser& obj)
+{
+ obj.printTo(out);
+ return out;
+}
+
+typedef struct _CertificateCredential__isset {
+ _CertificateCredential__isset() : notAfter(false), privateKey(false), lifeTime(false), notBefore(false), persistedTime(false), token(false) {}
+ bool notAfter :1;
+ bool privateKey :1;
+ bool lifeTime :1;
+ bool notBefore :1;
+ bool persistedTime :1;
+ bool token :1;
+} _CertificateCredential__isset;
+
+class CertificateCredential {
+ public:
+
+ CertificateCredential(const CertificateCredential&);
+ CertificateCredential& operator=(const CertificateCredential&);
+ CertificateCredential() : x509Cert(), notAfter(), privateKey(), lifeTime(0), notBefore(), persistedTime(0), token() {
+ }
+
+ virtual ~CertificateCredential() throw();
+ CommunityUser communityUser;
+ std::string x509Cert;
+ std::string notAfter;
+ std::string privateKey;
+ int64_t lifeTime;
+ std::string notBefore;
+ int64_t persistedTime;
+ std::string token;
+
+ _CertificateCredential__isset __isset;
+
+ void __set_communityUser(const CommunityUser& val);
+
+ void __set_x509Cert(const std::string& val);
+
+ void __set_notAfter(const std::string& val);
+
+ void __set_privateKey(const std::string& val);
+
+ void __set_lifeTime(const int64_t val);
+
+ void __set_notBefore(const std::string& val);
+
+ void __set_persistedTime(const int64_t val);
+
+ void __set_token(const std::string& val);
+
+ bool operator == (const CertificateCredential & rhs) const
+ {
+ if (!(communityUser == rhs.communityUser))
+ return false;
+ if (!(x509Cert == rhs.x509Cert))
+ return false;
+ if (__isset.notAfter != rhs.__isset.notAfter)
+ return false;
+ else if (__isset.notAfter && !(notAfter == rhs.notAfter))
+ return false;
+ if (__isset.privateKey != rhs.__isset.privateKey)
+ return false;
+ else if (__isset.privateKey && !(privateKey == rhs.privateKey))
+ return false;
+ if (__isset.lifeTime != rhs.__isset.lifeTime)
+ return false;
+ else if (__isset.lifeTime && !(lifeTime == rhs.lifeTime))
+ return false;
+ if (__isset.notBefore != rhs.__isset.notBefore)
+ return false;
+ else if (__isset.notBefore && !(notBefore == rhs.notBefore))
+ return false;
+ if (__isset.persistedTime != rhs.__isset.persistedTime)
+ return false;
+ else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+ return false;
+ if (__isset.token != rhs.__isset.token)
+ return false;
+ else if (__isset.token && !(token == rhs.token))
+ return false;
+ return true;
+ }
+ bool operator != (const CertificateCredential &rhs) const {
+ return !(*this == rhs);
+ }
+
+ bool operator < (const CertificateCredential & ) const;
+
+ uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+ uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+ virtual void printTo(std::ostream& out) const;
+};
+
+void swap(CertificateCredential &a, CertificateCredential &b);
+
+inline std::ostream& operator<<(std::ostream& out, const CertificateCredential& obj)
+{
+ obj.printTo(out);
+ return out;
+}
+
+typedef struct _PasswordCredential__isset {
+ _PasswordCredential__isset() : description(false), persistedTime(false), token(false) {}
+ bool description :1;
+ bool persistedTime :1;
+ bool token :1;
+} _PasswordCredential__isset;
+
+class PasswordCredential {
+ public:
+
+ PasswordCredential(const PasswordCredential&);
+ PasswordCredential& operator=(const PasswordCredential&);
+ PasswordCredential() : gatewayId(), portalUserName(), loginUserName(), password(), description(), persistedTime(0), token() {
+ }
+
+ virtual ~PasswordCredential() throw();
+ std::string gatewayId;
+ std::string portalUserName;
+ std::string loginUserName;
+ std::string password;
+ std::string description;
+ int64_t persistedTime;
+ std::string token;
+
+ _PasswordCredential__isset __isset;
+
+ void __set_gatewayId(const std::string& val);
+
+ void __set_portalUserName(const std::string& val);
+
+ void __set_loginUserName(const std::string& val);
+
+ void __set_password(const std::string& val);
+
+ void __set_description(const std::string& val);
+
+ void __set_persistedTime(const int64_t val);
+
+ void __set_token(const std::string& val);
+
+ bool operator == (const PasswordCredential & rhs) const
+ {
+ if (!(gatewayId == rhs.gatewayId))
+ return false;
+ if (!(portalUserName == rhs.portalUserName))
+ return false;
+ if (!(loginUserName == rhs.loginUserName))
+ return false;
+ if (!(password == rhs.password))
+ return false;
+ if (__isset.description != rhs.__isset.description)
+ return false;
+ else if (__isset.description && !(description == rhs.description))
+ return false;
+ if (__isset.persistedTime != rhs.__isset.persistedTime)
+ return false;
+ else if (__isset.persistedTime && !(persistedTime == rhs.persistedTime))
+ return false;
+ if (__isset.token != rhs.__isset.token)
+ return false;
+ else if (__isset.token && !(token == rhs.token))
+ return false;
+ return true;
+ }
+ bool operator != (const PasswordCredential &rhs) const {
+ return !(*this == rhs);
+ }
+
+ bool operator < (const PasswordCredential & ) const;
+
+ uint32_t read(::apache::thrift::protocol::TProtocol* iprot);
+ uint32_t write(::apache::thrift::protocol::TProtocol* oprot) const;
+
+ virtual void printTo(std::ostream& out) const;
+};
+
+void swap(PasswordCredential &a, PasswordCredential &b);
+
+inline std::ostream& operator<<(std::ostream& out, const PasswordCredential& obj)
+{
+ obj.printTo(out);
+ return out;
+}
+
+
+
+#endif
http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
index 2052d67..8f7ec37 100644
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
+++ b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/airavata-client-properties.ini
@@ -1,23 +1,21 @@
-/*
-*
-* Licensed to the Apache Software Foundation (ASF) under one
-* or more contributor license agreements. See the NOTICE file
-* distributed with this work for additional information
-* regarding copyright ownership. The ASF licenses this file
-* to you under the Apache License, Version 2.0 (the
-* "License"); you may not use this file except in compliance
-* with the License. You may obtain a copy of the License at
-*
-* http://www.apache.org/licenses/LICENSE-2.0
-*
-* Unless required by applicable law or agreed to in writing,
-* software distributed under the License is distributed on an
-* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-* KIND, either express or implied. See the License for the
-* specific language governing permissions and limitations
-* under the License.
-*
-*/
+;
+; Licensed to the Apache Software Foundation (ASF) under one
+; or more contributor license agreements. See the NOTICE file
+; distributed with this work for additional information
+; regarding copyright ownership. The ASF licenses this file
+; to you under the Apache License, Version 2.0 (the
+; "License"); you may not use this file except in compliance
+; with the License. You may obtain a copy of the License at
+;
+; http://www.apache.org/licenses/LICENSE-2.0
+;
+; Unless required by applicable law or agreed to in writing,
+; software distributed under the License is distributed on an
+; "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+; KIND, either express or implied. See the License for the
+; specific language governing permissions and limitations
+; under the License.
+;
; The is the configuration file with properties needed by Airavata Clients.
; Key properties specify location of Airavata Services, Ports and Such.
@@ -29,14 +27,17 @@ THRIFT_LIB_DIR = "../lib/Thrift/"
AIRAVATA_PHP_STUBS_DIR = "../lib/Airavata/"
; Host which runs the Airavata Server
-AIRAVATA_SERVER = "gw111.iu.xsede.org"
+AIRAVATA_SERVER = "gw153.iu.xsede.org"
;AIRAVATA_SERVER = "localhost"
; Airavata Server thrift port
-AIRAVATA_PORT = 9930
-;AIRAVATA_PORT = 8930
+;AIRAVATA_PORT = 9930
+AIRAVATA_PORT = 8930
; Time out value to give enough breathing room for client to get synchronous responses back
AIRAVATA_TIMEOUT = 50000
+; Gateway Identifier Registered within Airavata
+GATEWAY_ID = "Ultrascan_Production"
+
AIRAVATA_CREDENTIAL_STORE_TOKEN = 2c308fa9-99f8-4baa-92e4-d062e311483c
http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
index a080c5d..26dca58 100644
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
+++ b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/conf/app-catalog-identifiers.ini
@@ -1,22 +1,24 @@
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements. See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership. The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License. You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on an
-# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-# KIND, either express or implied. See the License for the
-# specific language governing permissions and limitations
-# under the License.
+;
+; Licensed to the Apache Software Foundation (ASF) under one
+; or more contributor license agreements. See the NOTICE file
+; distributed with this work for additional information
+; regarding copyright ownership. The ASF licenses this file
+; to you under the Apache License, Version 2.0 (the
+; "License"); you may not use this file except in compliance
+; with the License. You may obtain a copy of the License at
+;
+; http://www.apache.org/licenses/LICENSE-2.0
+;
+; Unless required by applicable law or agreed to in writing,
+; software distributed under the License is distributed on an
+; "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+; KIND, either express or implied. See the License for the
+; specific language governing permissions and limitations
+; under the License.
+;
-#Apache Airavata Gateway to Airavata Deployment Identifiers
-#Wed Jul 23 10:48:34 EDT 2014
+;Apache Airavata Gateway to Airavata Deployment Identifiers
+;Wed Jul 23 10:48:34 EDT 2014
espressoInterfaceId=ESPRESSO_fcc4ab64-94f8-40f1-9811-f919b7ee4cd9
amberInterfaceId=Amber_0489ef37-1184-4f5d-93c8-5f42fdd559ad
gromacsInterfaceId=GROMACS_9a9dd63b-598b-45d7-8277-b66e76032b95
@@ -28,5 +30,5 @@ wrfInterfaceId=WRF_a390e041-cae3-4b85-9bb9-e03df666deb9
autoDockInterfaceId=
nwChemInterfaceId=NWChem_bdc7b97a-dd39-49cb-b203-6d779781d5c8
lammpsInterfaceId=LAMMPS_f43520e2-b77a-4f11-b3b7-98693349fcd0
-#echoInterfaceId=Echo_271e6d47-a5db-434e-8453-e27985b7ea59
+;echoInterfaceId=Echo_271e6d47-a5db-434e-8453-e27985b7ea59
echoInterfaceId=Echo_c6e6aaac-7d9d-44fc-aba2-63b5100528e8
http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
index 389e1ca..84e30af 100644
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
+++ b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/API/Types.php
@@ -35,7 +35,7 @@ final class Constant extends \Thrift\Type\TConstant {
* in a change to major/minor version numbers.
*
*/
-"0.16.0";
+"0.17.0";
}
}
http://git-wip-us.apache.org/repos/asf/airavata/blob/22efc10b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php
----------------------------------------------------------------------
diff --git a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php b/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php
deleted file mode 100644
index 2dd144c..0000000
--- a/airavata-api/airavata-client-sdks/airavata-php-sdk/src/main/resources/lib/Airavata/Model/AppCatalog/CredetialSummary/Types.php
+++ /dev/null
@@ -1,210 +0,0 @@
-<?php
-namespace Airavata\Model\AppCatalog\CredetialSummary;
-
-/**
- * Autogenerated by Thrift Compiler (0.9.3)
- *
- * DO NOT EDIT UNLESS YOU ARE SURE THAT YOU KNOW WHAT YOU ARE DOING
- * @generated
- */
-use Thrift\Base\TBase;
-use Thrift\Type\TType;
-use Thrift\Type\TMessageType;
-use Thrift\Exception\TException;
-use Thrift\Exception\TProtocolException;
-use Thrift\Protocol\TProtocol;
-use Thrift\Protocol\TBinaryProtocolAccelerated;
-use Thrift\Exception\TApplicationException;
-
-
-class CredentialSummary {
- static $_TSPEC;
-
- /**
- * @var string
- */
- public $gatewayId = null;
- /**
- * @var string
- */
- public $username = null;
- /**
- * @var string
- */
- public $token = null;
- /**
- * @var string
- */
- public $publicKey = null;
- /**
- * @var int
- */
- public $persistedTime = null;
- /**
- * @var string
- */
- public $description = null;
-
- public function __construct($vals=null) {
- if (!isset(self::$_TSPEC)) {
- self::$_TSPEC = array(
- 1 => array(
- 'var' => 'gatewayId',
- 'type' => TType::STRING,
- ),
- 2 => array(
- 'var' => 'username',
- 'type' => TType::STRING,
- ),
- 3 => array(
- 'var' => 'token',
- 'type' => TType::STRING,
- ),
- 4 => array(
- 'var' => 'publicKey',
- 'type' => TType::STRING,
- ),
- 5 => array(
- 'var' => 'persistedTime',
- 'type' => TType::I64,
- ),
- 6 => array(
- 'var' => 'description',
- 'type' => TType::STRING,
- ),
- );
- }
- if (is_array($vals)) {
- if (isset($vals['gatewayId'])) {
- $this->gatewayId = $vals['gatewayId'];
- }
- if (isset($vals['username'])) {
- $this->username = $vals['username'];
- }
- if (isset($vals['token'])) {
- $this->token = $vals['token'];
- }
- if (isset($vals['publicKey'])) {
- $this->publicKey = $vals['publicKey'];
- }
- if (isset($vals['persistedTime'])) {
- $this->persistedTime = $vals['persistedTime'];
- }
- if (isset($vals['description'])) {
- $this->description = $vals['description'];
- }
- }
- }
-
- public function getName() {
- return 'CredentialSummary';
- }
-
- public function read($input)
- {
- $xfer = 0;
- $fname = null;
- $ftype = 0;
- $fid = 0;
- $xfer += $input->readStructBegin($fname);
- while (true)
- {
- $xfer += $input->readFieldBegin($fname, $ftype, $fid);
- if ($ftype == TType::STOP) {
- break;
- }
- switch ($fid)
- {
- case 1:
- if ($ftype == TType::STRING) {
- $xfer += $input->readString($this->gatewayId);
- } else {
- $xfer += $input->skip($ftype);
- }
- break;
- case 2:
- if ($ftype == TType::STRING) {
- $xfer += $input->readString($this->username);
- } else {
- $xfer += $input->skip($ftype);
- }
- break;
- case 3:
- if ($ftype == TType::STRING) {
- $xfer += $input->readString($this->token);
- } else {
- $xfer += $input->skip($ftype);
- }
- break;
- case 4:
- if ($ftype == TType::STRING) {
- $xfer += $input->readString($this->publicKey);
- } else {
- $xfer += $input->skip($ftype);
- }
- break;
- case 5:
- if ($ftype == TType::I64) {
- $xfer += $input->readI64($this->persistedTime);
- } else {
- $xfer += $input->skip($ftype);
- }
- break;
- case 6:
- if ($ftype == TType::STRING) {
- $xfer += $input->readString($this->description);
- } else {
- $xfer += $input->skip($ftype);
- }
- break;
- default:
- $xfer += $input->skip($ftype);
- break;
- }
- $xfer += $input->readFieldEnd();
- }
- $xfer += $input->readStructEnd();
- return $xfer;
- }
-
- public function write($output) {
- $xfer = 0;
- $xfer += $output->writeStructBegin('CredentialSummary');
- if ($this->gatewayId !== null) {
- $xfer += $output->writeFieldBegin('gatewayId', TType::STRING, 1);
- $xfer += $output->writeString($this->gatewayId);
- $xfer += $output->writeFieldEnd();
- }
- if ($this->username !== null) {
- $xfer += $output->writeFieldBegin('username', TType::STRING, 2);
- $xfer += $output->writeString($this->username);
- $xfer += $output->writeFieldEnd();
- }
- if ($this->token !== null) {
- $xfer += $output->writeFieldBegin('token', TType::STRING, 3);
- $xfer += $output->writeString($this->token);
- $xfer += $output->writeFieldEnd();
- }
- if ($this->publicKey !== null) {
- $xfer += $output->writeFieldBegin('publicKey', TType::STRING, 4);
- $xfer += $output->writeString($this->publicKey);
- $xfer += $output->writeFieldEnd();
- }
- if ($this->persistedTime !== null) {
- $xfer += $output->writeFieldBegin('persistedTime', TType::I64, 5);
- $xfer += $output->writeI64($this->persistedTime);
- $xfer += $output->writeFieldEnd();
- }
- if ($this->description !== null) {
- $xfer += $output->writeFieldBegin('description', TType::STRING, 6);
- $xfer += $output->writeString($this->description);
- $xfer += $output->writeFieldEnd();
- }
- $xfer += $output->writeFieldStop();
- $xfer += $output->writeStructEnd();
- return $xfer;
- }
-
-}
-
-