All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.mq.model.LdapServerMetadataInput Maven / Gradle / Ivy

Go to download

The AWS Java SDK for AmazonMQ module holds the client classes that are used for communicating with AmazonMQ Service

There is a newer version: 1.12.772
Show newest version
/*
 * Copyright 2017-2022 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.mq.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* Optional. The metadata of the LDAP server used to authenticate and authorize connections to the broker. *

* *

* Does not apply to RabbitMQ brokers. *

*
* * @see AWS API * Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class LdapServerMetadataInput implements Serializable, Cloneable, StructuredPojo { /** *

* Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . Optional * failover server. *

*/ private java.util.List hosts; /** *

* The distinguished name of the node in the directory information tree (DIT) to search for roles or groups. For * example, ou=group, ou=corp, dc=corp, dc=example, dc=com. *

*/ private String roleBase; /** *

* Specifies the LDAP attribute that identifies the group name attribute in the object returned from the group * membership query. *

*/ private String roleName; /** *

* The LDAP search filter used to find roles within the roleBase. The distinguished name of the user matched by * userSearchMatching is substituted into the {0} placeholder in the search filter. The client's username is * substituted into the {1} placeholder. For example, if you set this option to (member=uid={1})for the user * janedoe, the search filter becomes (member=uid=janedoe) after string substitution. It matches all role entries * that have a member attribute equal to uid=janedoe under the subtree selected by the roleBase. *

*/ private String roleSearchMatching; /** *

* The directory search scope for the role. If set to true, scope is to search the entire subtree. *

*/ private Boolean roleSearchSubtree; /** *

* Service account password. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

*/ private String serviceAccountPassword; /** *

* Service account username. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

*/ private String serviceAccountUsername; /** *

* Select a particular subtree of the directory information tree (DIT) to search for user entries. The subtree is * specified by a DN, which specifies the base node of the subtree. For example, by setting this option to * ou=Users,ou=corp, dc=corp, dc=example, dc=com, the search for user entries is restricted to the subtree beneath * ou=Users, ou=corp, dc=corp, dc=example, dc=com. *

*/ private String userBase; /** *

* Specifies the name of the LDAP attribute for the user group membership. *

*/ private String userRoleName; /** *

* The LDAP search filter used to find users within the userBase. The client's username is substituted into the {0} * placeholder in the search filter. For example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It will result in matching an entry * like uid=janedoe, ou=Users,ou=corp, dc=corp, dc=example, dc=com. *

*/ private String userSearchMatching; /** *

* The directory search scope for the user. If set to true, scope is to search the entire subtree. *

*/ private Boolean userSearchSubtree; /** *

* Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . Optional * failover server. *

* * @return Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . * Optional failover server. */ public java.util.List getHosts() { return hosts; } /** *

* Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . Optional * failover server. *

* * @param hosts * Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . * Optional failover server. */ public void setHosts(java.util.Collection hosts) { if (hosts == null) { this.hosts = null; return; } this.hosts = new java.util.ArrayList(hosts); } /** *

* Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . Optional * failover server. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setHosts(java.util.Collection)} or {@link #withHosts(java.util.Collection)} if you want to override the * existing values. *

* * @param hosts * Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . * Optional failover server. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withHosts(String... hosts) { if (this.hosts == null) { setHosts(new java.util.ArrayList(hosts.length)); } for (String ele : hosts) { this.hosts.add(ele); } return this; } /** *

* Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . Optional * failover server. *

* * @param hosts * Specifies the location of the LDAP server such as AWS Directory Service for Microsoft Active Directory . * Optional failover server. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withHosts(java.util.Collection hosts) { setHosts(hosts); return this; } /** *

* The distinguished name of the node in the directory information tree (DIT) to search for roles or groups. For * example, ou=group, ou=corp, dc=corp, dc=example, dc=com. *

* * @param roleBase * The distinguished name of the node in the directory information tree (DIT) to search for roles or groups. * For example, ou=group, ou=corp, dc=corp, dc=example, dc=com. */ public void setRoleBase(String roleBase) { this.roleBase = roleBase; } /** *

* The distinguished name of the node in the directory information tree (DIT) to search for roles or groups. For * example, ou=group, ou=corp, dc=corp, dc=example, dc=com. *

* * @return The distinguished name of the node in the directory information tree (DIT) to search for roles or groups. * For example, ou=group, ou=corp, dc=corp, dc=example, dc=com. */ public String getRoleBase() { return this.roleBase; } /** *

* The distinguished name of the node in the directory information tree (DIT) to search for roles or groups. For * example, ou=group, ou=corp, dc=corp, dc=example, dc=com. *

* * @param roleBase * The distinguished name of the node in the directory information tree (DIT) to search for roles or groups. * For example, ou=group, ou=corp, dc=corp, dc=example, dc=com. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withRoleBase(String roleBase) { setRoleBase(roleBase); return this; } /** *

* Specifies the LDAP attribute that identifies the group name attribute in the object returned from the group * membership query. *

* * @param roleName * Specifies the LDAP attribute that identifies the group name attribute in the object returned from the * group membership query. */ public void setRoleName(String roleName) { this.roleName = roleName; } /** *

* Specifies the LDAP attribute that identifies the group name attribute in the object returned from the group * membership query. *

* * @return Specifies the LDAP attribute that identifies the group name attribute in the object returned from the * group membership query. */ public String getRoleName() { return this.roleName; } /** *

* Specifies the LDAP attribute that identifies the group name attribute in the object returned from the group * membership query. *

* * @param roleName * Specifies the LDAP attribute that identifies the group name attribute in the object returned from the * group membership query. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withRoleName(String roleName) { setRoleName(roleName); return this; } /** *

* The LDAP search filter used to find roles within the roleBase. The distinguished name of the user matched by * userSearchMatching is substituted into the {0} placeholder in the search filter. The client's username is * substituted into the {1} placeholder. For example, if you set this option to (member=uid={1})for the user * janedoe, the search filter becomes (member=uid=janedoe) after string substitution. It matches all role entries * that have a member attribute equal to uid=janedoe under the subtree selected by the roleBase. *

* * @param roleSearchMatching * The LDAP search filter used to find roles within the roleBase. The distinguished name of the user matched * by userSearchMatching is substituted into the {0} placeholder in the search filter. The client's username * is substituted into the {1} placeholder. For example, if you set this option to (member=uid={1})for the * user janedoe, the search filter becomes (member=uid=janedoe) after string substitution. It matches all * role entries that have a member attribute equal to uid=janedoe under the subtree selected by the roleBase. */ public void setRoleSearchMatching(String roleSearchMatching) { this.roleSearchMatching = roleSearchMatching; } /** *

* The LDAP search filter used to find roles within the roleBase. The distinguished name of the user matched by * userSearchMatching is substituted into the {0} placeholder in the search filter. The client's username is * substituted into the {1} placeholder. For example, if you set this option to (member=uid={1})for the user * janedoe, the search filter becomes (member=uid=janedoe) after string substitution. It matches all role entries * that have a member attribute equal to uid=janedoe under the subtree selected by the roleBase. *

* * @return The LDAP search filter used to find roles within the roleBase. The distinguished name of the user matched * by userSearchMatching is substituted into the {0} placeholder in the search filter. The client's username * is substituted into the {1} placeholder. For example, if you set this option to (member=uid={1})for the * user janedoe, the search filter becomes (member=uid=janedoe) after string substitution. It matches all * role entries that have a member attribute equal to uid=janedoe under the subtree selected by the * roleBase. */ public String getRoleSearchMatching() { return this.roleSearchMatching; } /** *

* The LDAP search filter used to find roles within the roleBase. The distinguished name of the user matched by * userSearchMatching is substituted into the {0} placeholder in the search filter. The client's username is * substituted into the {1} placeholder. For example, if you set this option to (member=uid={1})for the user * janedoe, the search filter becomes (member=uid=janedoe) after string substitution. It matches all role entries * that have a member attribute equal to uid=janedoe under the subtree selected by the roleBase. *

* * @param roleSearchMatching * The LDAP search filter used to find roles within the roleBase. The distinguished name of the user matched * by userSearchMatching is substituted into the {0} placeholder in the search filter. The client's username * is substituted into the {1} placeholder. For example, if you set this option to (member=uid={1})for the * user janedoe, the search filter becomes (member=uid=janedoe) after string substitution. It matches all * role entries that have a member attribute equal to uid=janedoe under the subtree selected by the roleBase. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withRoleSearchMatching(String roleSearchMatching) { setRoleSearchMatching(roleSearchMatching); return this; } /** *

* The directory search scope for the role. If set to true, scope is to search the entire subtree. *

* * @param roleSearchSubtree * The directory search scope for the role. If set to true, scope is to search the entire subtree. */ public void setRoleSearchSubtree(Boolean roleSearchSubtree) { this.roleSearchSubtree = roleSearchSubtree; } /** *

* The directory search scope for the role. If set to true, scope is to search the entire subtree. *

* * @return The directory search scope for the role. If set to true, scope is to search the entire subtree. */ public Boolean getRoleSearchSubtree() { return this.roleSearchSubtree; } /** *

* The directory search scope for the role. If set to true, scope is to search the entire subtree. *

* * @param roleSearchSubtree * The directory search scope for the role. If set to true, scope is to search the entire subtree. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withRoleSearchSubtree(Boolean roleSearchSubtree) { setRoleSearchSubtree(roleSearchSubtree); return this; } /** *

* The directory search scope for the role. If set to true, scope is to search the entire subtree. *

* * @return The directory search scope for the role. If set to true, scope is to search the entire subtree. */ public Boolean isRoleSearchSubtree() { return this.roleSearchSubtree; } /** *

* Service account password. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

* * @param serviceAccountPassword * Service account password. A service account is an account in your LDAP server that has access to initiate * a connection. For example, cn=admin,dc=corp, dc=example, dc=com. */ public void setServiceAccountPassword(String serviceAccountPassword) { this.serviceAccountPassword = serviceAccountPassword; } /** *

* Service account password. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

* * @return Service account password. A service account is an account in your LDAP server that has access to initiate * a connection. For example, cn=admin,dc=corp, dc=example, dc=com. */ public String getServiceAccountPassword() { return this.serviceAccountPassword; } /** *

* Service account password. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

* * @param serviceAccountPassword * Service account password. A service account is an account in your LDAP server that has access to initiate * a connection. For example, cn=admin,dc=corp, dc=example, dc=com. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withServiceAccountPassword(String serviceAccountPassword) { setServiceAccountPassword(serviceAccountPassword); return this; } /** *

* Service account username. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

* * @param serviceAccountUsername * Service account username. A service account is an account in your LDAP server that has access to initiate * a connection. For example, cn=admin,dc=corp, dc=example, dc=com. */ public void setServiceAccountUsername(String serviceAccountUsername) { this.serviceAccountUsername = serviceAccountUsername; } /** *

* Service account username. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

* * @return Service account username. A service account is an account in your LDAP server that has access to initiate * a connection. For example, cn=admin,dc=corp, dc=example, dc=com. */ public String getServiceAccountUsername() { return this.serviceAccountUsername; } /** *

* Service account username. A service account is an account in your LDAP server that has access to initiate a * connection. For example, cn=admin,dc=corp, dc=example, dc=com. *

* * @param serviceAccountUsername * Service account username. A service account is an account in your LDAP server that has access to initiate * a connection. For example, cn=admin,dc=corp, dc=example, dc=com. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withServiceAccountUsername(String serviceAccountUsername) { setServiceAccountUsername(serviceAccountUsername); return this; } /** *

* Select a particular subtree of the directory information tree (DIT) to search for user entries. The subtree is * specified by a DN, which specifies the base node of the subtree. For example, by setting this option to * ou=Users,ou=corp, dc=corp, dc=example, dc=com, the search for user entries is restricted to the subtree beneath * ou=Users, ou=corp, dc=corp, dc=example, dc=com. *

* * @param userBase * Select a particular subtree of the directory information tree (DIT) to search for user entries. The * subtree is specified by a DN, which specifies the base node of the subtree. For example, by setting this * option to ou=Users,ou=corp, dc=corp, dc=example, dc=com, the search for user entries is restricted to the * subtree beneath ou=Users, ou=corp, dc=corp, dc=example, dc=com. */ public void setUserBase(String userBase) { this.userBase = userBase; } /** *

* Select a particular subtree of the directory information tree (DIT) to search for user entries. The subtree is * specified by a DN, which specifies the base node of the subtree. For example, by setting this option to * ou=Users,ou=corp, dc=corp, dc=example, dc=com, the search for user entries is restricted to the subtree beneath * ou=Users, ou=corp, dc=corp, dc=example, dc=com. *

* * @return Select a particular subtree of the directory information tree (DIT) to search for user entries. The * subtree is specified by a DN, which specifies the base node of the subtree. For example, by setting this * option to ou=Users,ou=corp, dc=corp, dc=example, dc=com, the search for user entries is restricted to the * subtree beneath ou=Users, ou=corp, dc=corp, dc=example, dc=com. */ public String getUserBase() { return this.userBase; } /** *

* Select a particular subtree of the directory information tree (DIT) to search for user entries. The subtree is * specified by a DN, which specifies the base node of the subtree. For example, by setting this option to * ou=Users,ou=corp, dc=corp, dc=example, dc=com, the search for user entries is restricted to the subtree beneath * ou=Users, ou=corp, dc=corp, dc=example, dc=com. *

* * @param userBase * Select a particular subtree of the directory information tree (DIT) to search for user entries. The * subtree is specified by a DN, which specifies the base node of the subtree. For example, by setting this * option to ou=Users,ou=corp, dc=corp, dc=example, dc=com, the search for user entries is restricted to the * subtree beneath ou=Users, ou=corp, dc=corp, dc=example, dc=com. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withUserBase(String userBase) { setUserBase(userBase); return this; } /** *

* Specifies the name of the LDAP attribute for the user group membership. *

* * @param userRoleName * Specifies the name of the LDAP attribute for the user group membership. */ public void setUserRoleName(String userRoleName) { this.userRoleName = userRoleName; } /** *

* Specifies the name of the LDAP attribute for the user group membership. *

* * @return Specifies the name of the LDAP attribute for the user group membership. */ public String getUserRoleName() { return this.userRoleName; } /** *

* Specifies the name of the LDAP attribute for the user group membership. *

* * @param userRoleName * Specifies the name of the LDAP attribute for the user group membership. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withUserRoleName(String userRoleName) { setUserRoleName(userRoleName); return this; } /** *

* The LDAP search filter used to find users within the userBase. The client's username is substituted into the {0} * placeholder in the search filter. For example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It will result in matching an entry * like uid=janedoe, ou=Users,ou=corp, dc=corp, dc=example, dc=com. *

* * @param userSearchMatching * The LDAP search filter used to find users within the userBase. The client's username is substituted into * the {0} placeholder in the search filter. For example, if this option is set to (uid={0}) and the received * username is janedoe, the search filter becomes (uid=janedoe) after string substitution. It will result in * matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, dc=example, dc=com. */ public void setUserSearchMatching(String userSearchMatching) { this.userSearchMatching = userSearchMatching; } /** *

* The LDAP search filter used to find users within the userBase. The client's username is substituted into the {0} * placeholder in the search filter. For example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It will result in matching an entry * like uid=janedoe, ou=Users,ou=corp, dc=corp, dc=example, dc=com. *

* * @return The LDAP search filter used to find users within the userBase. The client's username is substituted into * the {0} placeholder in the search filter. For example, if this option is set to (uid={0}) and the * received username is janedoe, the search filter becomes (uid=janedoe) after string substitution. It will * result in matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, dc=example, dc=com. */ public String getUserSearchMatching() { return this.userSearchMatching; } /** *

* The LDAP search filter used to find users within the userBase. The client's username is substituted into the {0} * placeholder in the search filter. For example, if this option is set to (uid={0}) and the received username is * janedoe, the search filter becomes (uid=janedoe) after string substitution. It will result in matching an entry * like uid=janedoe, ou=Users,ou=corp, dc=corp, dc=example, dc=com. *

* * @param userSearchMatching * The LDAP search filter used to find users within the userBase. The client's username is substituted into * the {0} placeholder in the search filter. For example, if this option is set to (uid={0}) and the received * username is janedoe, the search filter becomes (uid=janedoe) after string substitution. It will result in * matching an entry like uid=janedoe, ou=Users,ou=corp, dc=corp, dc=example, dc=com. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withUserSearchMatching(String userSearchMatching) { setUserSearchMatching(userSearchMatching); return this; } /** *

* The directory search scope for the user. If set to true, scope is to search the entire subtree. *

* * @param userSearchSubtree * The directory search scope for the user. If set to true, scope is to search the entire subtree. */ public void setUserSearchSubtree(Boolean userSearchSubtree) { this.userSearchSubtree = userSearchSubtree; } /** *

* The directory search scope for the user. If set to true, scope is to search the entire subtree. *

* * @return The directory search scope for the user. If set to true, scope is to search the entire subtree. */ public Boolean getUserSearchSubtree() { return this.userSearchSubtree; } /** *

* The directory search scope for the user. If set to true, scope is to search the entire subtree. *

* * @param userSearchSubtree * The directory search scope for the user. If set to true, scope is to search the entire subtree. * @return Returns a reference to this object so that method calls can be chained together. */ public LdapServerMetadataInput withUserSearchSubtree(Boolean userSearchSubtree) { setUserSearchSubtree(userSearchSubtree); return this; } /** *

* The directory search scope for the user. If set to true, scope is to search the entire subtree. *

* * @return The directory search scope for the user. If set to true, scope is to search the entire subtree. */ public Boolean isUserSearchSubtree() { return this.userSearchSubtree; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getHosts() != null) sb.append("Hosts: ").append(getHosts()).append(","); if (getRoleBase() != null) sb.append("RoleBase: ").append(getRoleBase()).append(","); if (getRoleName() != null) sb.append("RoleName: ").append(getRoleName()).append(","); if (getRoleSearchMatching() != null) sb.append("RoleSearchMatching: ").append(getRoleSearchMatching()).append(","); if (getRoleSearchSubtree() != null) sb.append("RoleSearchSubtree: ").append(getRoleSearchSubtree()).append(","); if (getServiceAccountPassword() != null) sb.append("ServiceAccountPassword: ").append(getServiceAccountPassword()).append(","); if (getServiceAccountUsername() != null) sb.append("ServiceAccountUsername: ").append(getServiceAccountUsername()).append(","); if (getUserBase() != null) sb.append("UserBase: ").append(getUserBase()).append(","); if (getUserRoleName() != null) sb.append("UserRoleName: ").append(getUserRoleName()).append(","); if (getUserSearchMatching() != null) sb.append("UserSearchMatching: ").append(getUserSearchMatching()).append(","); if (getUserSearchSubtree() != null) sb.append("UserSearchSubtree: ").append(getUserSearchSubtree()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof LdapServerMetadataInput == false) return false; LdapServerMetadataInput other = (LdapServerMetadataInput) obj; if (other.getHosts() == null ^ this.getHosts() == null) return false; if (other.getHosts() != null && other.getHosts().equals(this.getHosts()) == false) return false; if (other.getRoleBase() == null ^ this.getRoleBase() == null) return false; if (other.getRoleBase() != null && other.getRoleBase().equals(this.getRoleBase()) == false) return false; if (other.getRoleName() == null ^ this.getRoleName() == null) return false; if (other.getRoleName() != null && other.getRoleName().equals(this.getRoleName()) == false) return false; if (other.getRoleSearchMatching() == null ^ this.getRoleSearchMatching() == null) return false; if (other.getRoleSearchMatching() != null && other.getRoleSearchMatching().equals(this.getRoleSearchMatching()) == false) return false; if (other.getRoleSearchSubtree() == null ^ this.getRoleSearchSubtree() == null) return false; if (other.getRoleSearchSubtree() != null && other.getRoleSearchSubtree().equals(this.getRoleSearchSubtree()) == false) return false; if (other.getServiceAccountPassword() == null ^ this.getServiceAccountPassword() == null) return false; if (other.getServiceAccountPassword() != null && other.getServiceAccountPassword().equals(this.getServiceAccountPassword()) == false) return false; if (other.getServiceAccountUsername() == null ^ this.getServiceAccountUsername() == null) return false; if (other.getServiceAccountUsername() != null && other.getServiceAccountUsername().equals(this.getServiceAccountUsername()) == false) return false; if (other.getUserBase() == null ^ this.getUserBase() == null) return false; if (other.getUserBase() != null && other.getUserBase().equals(this.getUserBase()) == false) return false; if (other.getUserRoleName() == null ^ this.getUserRoleName() == null) return false; if (other.getUserRoleName() != null && other.getUserRoleName().equals(this.getUserRoleName()) == false) return false; if (other.getUserSearchMatching() == null ^ this.getUserSearchMatching() == null) return false; if (other.getUserSearchMatching() != null && other.getUserSearchMatching().equals(this.getUserSearchMatching()) == false) return false; if (other.getUserSearchSubtree() == null ^ this.getUserSearchSubtree() == null) return false; if (other.getUserSearchSubtree() != null && other.getUserSearchSubtree().equals(this.getUserSearchSubtree()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getHosts() == null) ? 0 : getHosts().hashCode()); hashCode = prime * hashCode + ((getRoleBase() == null) ? 0 : getRoleBase().hashCode()); hashCode = prime * hashCode + ((getRoleName() == null) ? 0 : getRoleName().hashCode()); hashCode = prime * hashCode + ((getRoleSearchMatching() == null) ? 0 : getRoleSearchMatching().hashCode()); hashCode = prime * hashCode + ((getRoleSearchSubtree() == null) ? 0 : getRoleSearchSubtree().hashCode()); hashCode = prime * hashCode + ((getServiceAccountPassword() == null) ? 0 : getServiceAccountPassword().hashCode()); hashCode = prime * hashCode + ((getServiceAccountUsername() == null) ? 0 : getServiceAccountUsername().hashCode()); hashCode = prime * hashCode + ((getUserBase() == null) ? 0 : getUserBase().hashCode()); hashCode = prime * hashCode + ((getUserRoleName() == null) ? 0 : getUserRoleName().hashCode()); hashCode = prime * hashCode + ((getUserSearchMatching() == null) ? 0 : getUserSearchMatching().hashCode()); hashCode = prime * hashCode + ((getUserSearchSubtree() == null) ? 0 : getUserSearchSubtree().hashCode()); return hashCode; } @Override public LdapServerMetadataInput clone() { try { return (LdapServerMetadataInput) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.mq.model.transform.LdapServerMetadataInputMarshaller.getInstance().marshall(this, protocolMarshaller); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy