Clover Coverage Report
Coverage timestamp: Sun Mar 23 2008 08:24:39 GMT
8   100   1   1.6
0   27   0.62   5
5     1  
1    
 
 
  EntryLocator       Line # 55 8 1 100% 1.0
 
  (1)
 
1    /*
2    * Copyright (c) 2006, University of Kent
3    * All rights reserved.
4    *
5    * Redistribution and use in source and binary forms, with or without
6    * modification, are permitted provided that the following conditions are met:
7    *
8    * Redistributions of source code must retain the above copyright notice, this
9    * list of conditions and the following disclaimer.
10    *
11    * Redistributions in binary form must reproduce the above copyright notice,
12    * this list of conditions and the following disclaimer in the documentation
13    * and/or other materials provided with the distribution.
14    *
15    * 1. Neither the name of the University of Kent nor the names of its
16    * contributors may be used to endorse or promote products derived from this
17    * software without specific prior written permission.
18    *
19    * 2. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
20    * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
21    * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22    * PURPOSE ARE DISCLAIMED.
23    *
24    * 3. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
25    * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26    * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27    * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28    * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
29    * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30    * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31    * POSSIBILITY OF SUCH DAMAGE.
32    *
33    * 4. YOU AGREE THAT THE EXCLUSIONS IN PARAGRAPHS 2 AND 3 ABOVE ARE REASONABLE
34    * IN THE CIRCUMSTANCES. IN PARTICULAR, YOU ACKNOWLEDGE (1) THAT THIS
35    * SOFTWARE HAS BEEN MADE AVAILABLE TO YOU FREE OF CHARGE, (2) THAT THIS
36    * SOFTWARE IS NOT "PRODUCT" QUALITY, BUT HAS BEEN PRODUCED BY A RESEARCH
37    * GROUP WHO DESIRE TO MAKE THIS SOFTWARE FREELY AVAILABLE TO PEOPLE WHO WISH
38    * TO USE IT, AND (3) THAT BECAUSE THIS SOFTWARE IS NOT OF "PRODUCT" QUALITY
39    * IT IS INEVITABLE THAT THERE WILL BE BUGS AND ERRORS, AND POSSIBLY MORE
40    * SERIOUS FAULTS, IN THIS SOFTWARE.
41    *
42    * 5. This license is governed, except to the extent that local laws
43    * necessarily apply, by the laws of England and Wales.
44    */
45    package issrg.pba.repository;
46   
47    import issrg.utils.repository.Entry;
48    import issrg.utils.repository.TokenLocator;
49   
50   
51    /**
52    * This class is the default implementation of the TokenLocator. The get*
53    * methods simply return the corresponding values passed to the constructor.
54    */
 
55    public class EntryLocator implements TokenLocator {
56    protected Entry e;
57    protected java.security.Principal p;
58    protected TokenLocator a;
59    protected issrg.utils.repository.AttributeRepository ar;
60   
61    /**
62    * This constructor builds a EntryLocator using the given Entry, Principal
63    * of the TokenLocator, the repository in which this token locator makes sense,
64    * and the alternative locator.
65    *
66    * @param entry - the Entry that this token locator refers to; used for Domain
67    * matching
68    * @param locator - the Principal that helps find the tokens in the provided
69    * repository
70    * @param rep - the AttributeRepository from which the Authorization Tokens
71    * can
72    * be retrieved; can be null to imply that the tokens are available from
73    * a default location
74    * @param alternative - the alternative TokenLocator, where additional
75    * Authorization
76    * Tokens can be found; can be null
77    */
 
78  6646 toggle public EntryLocator(Entry entry, java.security.Principal locator, issrg.utils.repository.AttributeRepository rep, TokenLocator alternative){
79  6646 e=entry;
80  6646 p=locator;
81  6646 a=alternative;
82  6646 ar=rep;
83    }
84   
 
85  5516 toggle public Entry getEntry(){
86  5516 return e;
87    }
88   
 
89  7570 toggle public java.security.Principal getLocator(){
90  7570 return p;
91    }
92   
 
93  1880 toggle public issrg.utils.repository.AttributeRepository getRepository(){
94  1880 return ar;
95    }
96   
 
97  1880 toggle public TokenLocator getAlternativeLocator(){
98  1880 return a;
99    }
100    }