Class: OCI::DataSafe::Models::DatabaseTableAccessEntrySummary
- Inherits:
-
Object
- Object
- OCI::DataSafe::Models::DatabaseTableAccessEntrySummary
- Defined in:
- lib/oci/data_safe/models/database_table_access_entry_summary.rb
Overview
Summary of DatabaseTableAccessEntry Object.
Constant Summary collapse
- ACCESS_TYPE_ENUM =
[ ACCESS_TYPE_SELECT = 'SELECT'.freeze, ACCESS_TYPE_UPDATE = 'UPDATE'.freeze, ACCESS_TYPE_INSERT = 'INSERT'.freeze, ACCESS_TYPE_DELETE = 'DELETE'.freeze, ACCESS_TYPE_OWNER = 'OWNER'.freeze, ACCESS_TYPE_UNKNOWN_ENUM_VALUE = 'UNKNOWN_ENUM_VALUE'.freeze ].freeze
- PRIVILEGE_ENUM =
[ PRIVILEGE_SELECT = 'SELECT'.freeze, PRIVILEGE_UPDATE = 'UPDATE'.freeze, PRIVILEGE_INSERT = 'INSERT'.freeze, PRIVILEGE_DELETE = 'DELETE'.freeze, PRIVILEGE_READ = 'READ'.freeze, PRIVILEGE_OWNER = 'OWNER'.freeze, PRIVILEGE_INDEX = 'INDEX'.freeze, PRIVILEGE_SELECT_ANY_TABLE = 'SELECT_ANY_TABLE'.freeze, PRIVILEGE_UPDATE_ANY_TABLE = 'UPDATE_ANY_TABLE'.freeze, PRIVILEGE_INSERT_ANY_TABLE = 'INSERT_ANY_TABLE'.freeze, PRIVILEGE_DELETE_ANY_TABLE = 'DELETE_ANY_TABLE'.freeze, PRIVILEGE_READ_ANY_TABLE = 'READ_ANY_TABLE'.freeze, PRIVILEGE_CREATE_ANY_INDEX = 'CREATE_ANY_INDEX'.freeze, PRIVILEGE_UNKNOWN_ENUM_VALUE = 'UNKNOWN_ENUM_VALUE'.freeze ].freeze
- PRIVILEGE_GRANTABLE_ENUM =
[ PRIVILEGE_GRANTABLE_ADMIN_OPTION = 'ADMIN_OPTION'.freeze, PRIVILEGE_GRANTABLE_GRANT_OPTION = 'GRANT_OPTION'.freeze, PRIVILEGE_GRANTABLE_UNKNOWN_ENUM_VALUE = 'UNKNOWN_ENUM_VALUE'.freeze ].freeze
Instance Attribute Summary collapse
-
#access_through_object ⇒ String
A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
-
#access_type ⇒ String
The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
-
#are_all_tables_accessible ⇒ BOOLEAN
Indicates whether the user has access to all the tables in the schema.
-
#column_name ⇒ String
If there are column level privileges on a table or view.
-
#grant_from_role ⇒ String
This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
-
#grantee ⇒ String
Grantee is the user who can access the table.
-
#grantor ⇒ String
The one who granted this privilege.
-
#is_access_constrained_by_database_vault ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Database Vault.
-
#is_access_constrained_by_label_security ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Label Security.
-
#is_access_constrained_by_real_application_security ⇒ BOOLEAN
Indicates whether the table access is constrained via Real Application Security.
-
#is_access_constrained_by_redaction ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Data Redaction.
-
#is_access_constrained_by_sql_firewall ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Database SQL Firewall.
-
#is_access_constrained_by_view ⇒ BOOLEAN
Indicates whether the access is constrained on a table via a view.
-
#is_access_constrained_by_virtual_private_database ⇒ BOOLEAN
Indicates whether the table access is constrained via Virtual Private Database.
-
#is_sensitive ⇒ BOOLEAN
Indicates whether the table is marked as sensitive.
-
#key ⇒ String
[Required] The unique key that identifies the table access report.
-
#privilege ⇒ String
Name of the privilege.
-
#privilege_grantable ⇒ String
Whether grantee can grant this privilege to other users.
-
#privilege_type ⇒ String
Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
-
#table_name ⇒ String
Name of the database table the user has access to.
-
#table_schema ⇒ String
Name of the schema the table belongs to.
-
#target_id ⇒ String
The OCID of the of the target database.
Class Method Summary collapse
-
.attribute_map ⇒ Object
Attribute mapping from ruby-style variable name to JSON key.
-
.swagger_types ⇒ Object
Attribute type mapping.
Instance Method Summary collapse
-
#==(other) ⇒ Object
Checks equality by comparing each attribute.
-
#build_from_hash(attributes) ⇒ Object
Builds the object from hash.
- #eql?(other) ⇒ Boolean
-
#hash ⇒ Fixnum
Calculates hash code according to all attributes.
-
#initialize(attributes = {}) ⇒ DatabaseTableAccessEntrySummary
constructor
Initializes the object.
-
#to_hash ⇒ Hash
Returns the object in the form of hash.
-
#to_s ⇒ String
Returns the string representation of the object.
Constructor Details
#initialize(attributes = {}) ⇒ DatabaseTableAccessEntrySummary
Initializes the object
229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 229 def initialize(attributes = {}) return unless attributes.is_a?(Hash) # convert string to symbol for hash key attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v } self.key = attributes[:'key'] if attributes[:'key'] self.grantee = attributes[:'grantee'] if attributes[:'grantee'] self.grant_from_role = attributes[:'grantFromRole'] if attributes[:'grantFromRole'] raise 'You cannot provide both :grantFromRole and :grant_from_role' if attributes.key?(:'grantFromRole') && attributes.key?(:'grant_from_role') self.grant_from_role = attributes[:'grant_from_role'] if attributes[:'grant_from_role'] self.access_type = attributes[:'accessType'] if attributes[:'accessType'] raise 'You cannot provide both :accessType and :access_type' if attributes.key?(:'accessType') && attributes.key?(:'access_type') self.access_type = attributes[:'access_type'] if attributes[:'access_type'] self.table_schema = attributes[:'tableSchema'] if attributes[:'tableSchema'] raise 'You cannot provide both :tableSchema and :table_schema' if attributes.key?(:'tableSchema') && attributes.key?(:'table_schema') self.table_schema = attributes[:'table_schema'] if attributes[:'table_schema'] self.table_name = attributes[:'tableName'] if attributes[:'tableName'] raise 'You cannot provide both :tableName and :table_name' if attributes.key?(:'tableName') && attributes.key?(:'table_name') self.table_name = attributes[:'table_name'] if attributes[:'table_name'] self.privilege_type = attributes[:'privilegeType'] if attributes[:'privilegeType'] raise 'You cannot provide both :privilegeType and :privilege_type' if attributes.key?(:'privilegeType') && attributes.key?(:'privilege_type') self.privilege_type = attributes[:'privilege_type'] if attributes[:'privilege_type'] self.target_id = attributes[:'targetId'] if attributes[:'targetId'] raise 'You cannot provide both :targetId and :target_id' if attributes.key?(:'targetId') && attributes.key?(:'target_id') self.target_id = attributes[:'target_id'] if attributes[:'target_id'] self.access_through_object = attributes[:'accessThroughObject'] if attributes[:'accessThroughObject'] raise 'You cannot provide both :accessThroughObject and :access_through_object' if attributes.key?(:'accessThroughObject') && attributes.key?(:'access_through_object') self.access_through_object = attributes[:'access_through_object'] if attributes[:'access_through_object'] self.privilege = attributes[:'privilege'] if attributes[:'privilege'] self.privilege_grantable = attributes[:'privilegeGrantable'] if attributes[:'privilegeGrantable'] raise 'You cannot provide both :privilegeGrantable and :privilege_grantable' if attributes.key?(:'privilegeGrantable') && attributes.key?(:'privilege_grantable') self.privilege_grantable = attributes[:'privilege_grantable'] if attributes[:'privilege_grantable'] self.column_name = attributes[:'columnName'] if attributes[:'columnName'] raise 'You cannot provide both :columnName and :column_name' if attributes.key?(:'columnName') && attributes.key?(:'column_name') self.column_name = attributes[:'column_name'] if attributes[:'column_name'] self.grantor = attributes[:'grantor'] if attributes[:'grantor'] self.are_all_tables_accessible = attributes[:'areAllTablesAccessible'] unless attributes[:'areAllTablesAccessible'].nil? raise 'You cannot provide both :areAllTablesAccessible and :are_all_tables_accessible' if attributes.key?(:'areAllTablesAccessible') && attributes.key?(:'are_all_tables_accessible') self.are_all_tables_accessible = attributes[:'are_all_tables_accessible'] unless attributes[:'are_all_tables_accessible'].nil? self.is_access_constrained_by_view = attributes[:'isAccessConstrainedByView'] unless attributes[:'isAccessConstrainedByView'].nil? raise 'You cannot provide both :isAccessConstrainedByView and :is_access_constrained_by_view' if attributes.key?(:'isAccessConstrainedByView') && attributes.key?(:'is_access_constrained_by_view') self.is_access_constrained_by_view = attributes[:'is_access_constrained_by_view'] unless attributes[:'is_access_constrained_by_view'].nil? self.is_access_constrained_by_label_security = attributes[:'isAccessConstrainedByLabelSecurity'] unless attributes[:'isAccessConstrainedByLabelSecurity'].nil? raise 'You cannot provide both :isAccessConstrainedByLabelSecurity and :is_access_constrained_by_label_security' if attributes.key?(:'isAccessConstrainedByLabelSecurity') && attributes.key?(:'is_access_constrained_by_label_security') self.is_access_constrained_by_label_security = attributes[:'is_access_constrained_by_label_security'] unless attributes[:'is_access_constrained_by_label_security'].nil? self.is_access_constrained_by_database_vault = attributes[:'isAccessConstrainedByDatabaseVault'] unless attributes[:'isAccessConstrainedByDatabaseVault'].nil? raise 'You cannot provide both :isAccessConstrainedByDatabaseVault and :is_access_constrained_by_database_vault' if attributes.key?(:'isAccessConstrainedByDatabaseVault') && attributes.key?(:'is_access_constrained_by_database_vault') self.is_access_constrained_by_database_vault = attributes[:'is_access_constrained_by_database_vault'] unless attributes[:'is_access_constrained_by_database_vault'].nil? self.is_access_constrained_by_virtual_private_database = attributes[:'isAccessConstrainedByVirtualPrivateDatabase'] unless attributes[:'isAccessConstrainedByVirtualPrivateDatabase'].nil? raise 'You cannot provide both :isAccessConstrainedByVirtualPrivateDatabase and :is_access_constrained_by_virtual_private_database' if attributes.key?(:'isAccessConstrainedByVirtualPrivateDatabase') && attributes.key?(:'is_access_constrained_by_virtual_private_database') self.is_access_constrained_by_virtual_private_database = attributes[:'is_access_constrained_by_virtual_private_database'] unless attributes[:'is_access_constrained_by_virtual_private_database'].nil? self.is_access_constrained_by_redaction = attributes[:'isAccessConstrainedByRedaction'] unless attributes[:'isAccessConstrainedByRedaction'].nil? raise 'You cannot provide both :isAccessConstrainedByRedaction and :is_access_constrained_by_redaction' if attributes.key?(:'isAccessConstrainedByRedaction') && attributes.key?(:'is_access_constrained_by_redaction') self.is_access_constrained_by_redaction = attributes[:'is_access_constrained_by_redaction'] unless attributes[:'is_access_constrained_by_redaction'].nil? self.is_access_constrained_by_real_application_security = attributes[:'isAccessConstrainedByRealApplicationSecurity'] unless attributes[:'isAccessConstrainedByRealApplicationSecurity'].nil? raise 'You cannot provide both :isAccessConstrainedByRealApplicationSecurity and :is_access_constrained_by_real_application_security' if attributes.key?(:'isAccessConstrainedByRealApplicationSecurity') && attributes.key?(:'is_access_constrained_by_real_application_security') self.is_access_constrained_by_real_application_security = attributes[:'is_access_constrained_by_real_application_security'] unless attributes[:'is_access_constrained_by_real_application_security'].nil? self.is_access_constrained_by_sql_firewall = attributes[:'isAccessConstrainedBySqlFirewall'] unless attributes[:'isAccessConstrainedBySqlFirewall'].nil? raise 'You cannot provide both :isAccessConstrainedBySqlFirewall and :is_access_constrained_by_sql_firewall' if attributes.key?(:'isAccessConstrainedBySqlFirewall') && attributes.key?(:'is_access_constrained_by_sql_firewall') self.is_access_constrained_by_sql_firewall = attributes[:'is_access_constrained_by_sql_firewall'] unless attributes[:'is_access_constrained_by_sql_firewall'].nil? self.is_sensitive = attributes[:'isSensitive'] unless attributes[:'isSensitive'].nil? raise 'You cannot provide both :isSensitive and :is_sensitive' if attributes.key?(:'isSensitive') && attributes.key?(:'is_sensitive') self.is_sensitive = attributes[:'is_sensitive'] unless attributes[:'is_sensitive'].nil? end |
Instance Attribute Details
#access_through_object ⇒ String
A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
85 86 87 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 85 def access_through_object @access_through_object end |
#access_type ⇒ String
The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
61 62 63 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 61 def access_type @access_type end |
#are_all_tables_accessible ⇒ BOOLEAN
Indicates whether the user has access to all the tables in the schema.
107 108 109 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 107 def are_all_tables_accessible @are_all_tables_accessible end |
#column_name ⇒ String
If there are column level privileges on a table or view.
99 100 101 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 99 def column_name @column_name end |
#grant_from_role ⇒ String
This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
56 57 58 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 56 def grant_from_role @grant_from_role end |
#grantee ⇒ String
Grantee is the user who can access the table
50 51 52 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 50 def grantee @grantee end |
#grantor ⇒ String
The one who granted this privilege.
103 104 105 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 103 def grantor @grantor end |
#is_access_constrained_by_database_vault ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Database Vault.
119 120 121 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 119 def is_access_constrained_by_database_vault @is_access_constrained_by_database_vault end |
#is_access_constrained_by_label_security ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Label Security.
115 116 117 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 115 def is_access_constrained_by_label_security @is_access_constrained_by_label_security end |
#is_access_constrained_by_real_application_security ⇒ BOOLEAN
Indicates whether the table access is constrained via Real Application Security.
131 132 133 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 131 def is_access_constrained_by_real_application_security @is_access_constrained_by_real_application_security end |
#is_access_constrained_by_redaction ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Data Redaction.
127 128 129 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 127 def is_access_constrained_by_redaction @is_access_constrained_by_redaction end |
#is_access_constrained_by_sql_firewall ⇒ BOOLEAN
Indicates whether the table access is constrained via Oracle Database SQL Firewall.
135 136 137 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 135 def is_access_constrained_by_sql_firewall @is_access_constrained_by_sql_firewall end |
#is_access_constrained_by_view ⇒ BOOLEAN
Indicates whether the access is constrained on a table via a view.
111 112 113 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 111 def is_access_constrained_by_view @is_access_constrained_by_view end |
#is_access_constrained_by_virtual_private_database ⇒ BOOLEAN
Indicates whether the table access is constrained via Virtual Private Database.
123 124 125 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 123 def is_access_constrained_by_virtual_private_database @is_access_constrained_by_virtual_private_database end |
#is_sensitive ⇒ BOOLEAN
Indicates whether the table is marked as sensitive.
139 140 141 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 139 def is_sensitive @is_sensitive end |
#key ⇒ String
[Required] The unique key that identifies the table access report. It is numeric and unique within a security policy report.
46 47 48 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 46 def key @key end |
#privilege ⇒ String
Name of the privilege.
89 90 91 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 89 def privilege @privilege end |
#privilege_grantable ⇒ String
Whether grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
95 96 97 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 95 def privilege_grantable @privilege_grantable end |
#privilege_type ⇒ String
Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
75 76 77 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 75 def privilege_type @privilege_type end |
#table_name ⇒ String
Name of the database table the user has access to.
69 70 71 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 69 def table_name @table_name end |
#table_schema ⇒ String
Name of the schema the table belongs to.
65 66 67 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 65 def table_schema @table_schema end |
#target_id ⇒ String
The OCID of the of the target database.
79 80 81 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 79 def target_id @target_id end |
Class Method Details
.attribute_map ⇒ Object
Attribute mapping from ruby-style variable name to JSON key.
142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 142 def self.attribute_map { # rubocop:disable Style/SymbolLiteral 'key': :'key', 'grantee': :'grantee', 'grant_from_role': :'grantFromRole', 'access_type': :'accessType', 'table_schema': :'tableSchema', 'table_name': :'tableName', 'privilege_type': :'privilegeType', 'target_id': :'targetId', 'access_through_object': :'accessThroughObject', 'privilege': :'privilege', 'privilege_grantable': :'privilegeGrantable', 'column_name': :'columnName', 'grantor': :'grantor', 'are_all_tables_accessible': :'areAllTablesAccessible', 'is_access_constrained_by_view': :'isAccessConstrainedByView', 'is_access_constrained_by_label_security': :'isAccessConstrainedByLabelSecurity', 'is_access_constrained_by_database_vault': :'isAccessConstrainedByDatabaseVault', 'is_access_constrained_by_virtual_private_database': :'isAccessConstrainedByVirtualPrivateDatabase', 'is_access_constrained_by_redaction': :'isAccessConstrainedByRedaction', 'is_access_constrained_by_real_application_security': :'isAccessConstrainedByRealApplicationSecurity', 'is_access_constrained_by_sql_firewall': :'isAccessConstrainedBySqlFirewall', 'is_sensitive': :'isSensitive' # rubocop:enable Style/SymbolLiteral } end |
.swagger_types ⇒ Object
Attribute type mapping.
172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 172 def self.swagger_types { # rubocop:disable Style/SymbolLiteral 'key': :'String', 'grantee': :'String', 'grant_from_role': :'String', 'access_type': :'String', 'table_schema': :'String', 'table_name': :'String', 'privilege_type': :'String', 'target_id': :'String', 'access_through_object': :'String', 'privilege': :'String', 'privilege_grantable': :'String', 'column_name': :'String', 'grantor': :'String', 'are_all_tables_accessible': :'BOOLEAN', 'is_access_constrained_by_view': :'BOOLEAN', 'is_access_constrained_by_label_security': :'BOOLEAN', 'is_access_constrained_by_database_vault': :'BOOLEAN', 'is_access_constrained_by_virtual_private_database': :'BOOLEAN', 'is_access_constrained_by_redaction': :'BOOLEAN', 'is_access_constrained_by_real_application_security': :'BOOLEAN', 'is_access_constrained_by_sql_firewall': :'BOOLEAN', 'is_sensitive': :'BOOLEAN' # rubocop:enable Style/SymbolLiteral } end |
Instance Method Details
#==(other) ⇒ Object
Checks equality by comparing each attribute.
398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 398 def ==(other) return true if equal?(other) self.class == other.class && key == other.key && grantee == other.grantee && grant_from_role == other.grant_from_role && access_type == other.access_type && table_schema == other.table_schema && table_name == other.table_name && privilege_type == other.privilege_type && target_id == other.target_id && access_through_object == other.access_through_object && privilege == other.privilege && privilege_grantable == other.privilege_grantable && column_name == other.column_name && grantor == other.grantor && are_all_tables_accessible == other.are_all_tables_accessible && is_access_constrained_by_view == other.is_access_constrained_by_view && is_access_constrained_by_label_security == other.is_access_constrained_by_label_security && is_access_constrained_by_database_vault == other.is_access_constrained_by_database_vault && is_access_constrained_by_virtual_private_database == other.is_access_constrained_by_virtual_private_database && is_access_constrained_by_redaction == other.is_access_constrained_by_redaction && is_access_constrained_by_real_application_security == other.is_access_constrained_by_real_application_security && is_access_constrained_by_sql_firewall == other.is_access_constrained_by_sql_firewall && is_sensitive == other.is_sensitive end |
#build_from_hash(attributes) ⇒ Object
Builds the object from hash
449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 449 def build_from_hash(attributes) return nil unless attributes.is_a?(Hash) self.class.swagger_types.each_pair do |key, type| if type =~ /^Array<(.*)>/i # check to ensure the input is an array given that the the attribute # is documented as an array but the input is not if attributes[self.class.attribute_map[key]].is_a?(Array) public_method("#{key}=").call( attributes[self.class.attribute_map[key]] .map { |v| OCI::Internal::Util.convert_to_type(Regexp.last_match(1), v) } ) end elsif !attributes[self.class.attribute_map[key]].nil? public_method("#{key}=").call( OCI::Internal::Util.convert_to_type(type, attributes[self.class.attribute_map[key]]) ) end # or else data not found in attributes(hash), not an issue as the data can be optional end self end |
#eql?(other) ⇒ Boolean
429 430 431 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 429 def eql?(other) self == other end |
#hash ⇒ Fixnum
Calculates hash code according to all attributes.
438 439 440 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 438 def hash [key, grantee, grant_from_role, access_type, table_schema, table_name, privilege_type, target_id, access_through_object, privilege, privilege_grantable, column_name, grantor, are_all_tables_accessible, is_access_constrained_by_view, is_access_constrained_by_label_security, is_access_constrained_by_database_vault, is_access_constrained_by_virtual_private_database, is_access_constrained_by_redaction, is_access_constrained_by_real_application_security, is_access_constrained_by_sql_firewall, is_sensitive].hash end |
#to_hash ⇒ Hash
Returns the object in the form of hash
482 483 484 485 486 487 488 489 490 491 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 482 def to_hash hash = {} self.class.attribute_map.each_pair do |attr, param| value = public_method(attr).call next if value.nil? && !instance_variable_defined?("@#{attr}") hash[param] = _to_hash(value) end hash end |
#to_s ⇒ String
Returns the string representation of the object
476 477 478 |
# File 'lib/oci/data_safe/models/database_table_access_entry_summary.rb', line 476 def to_s to_hash.to_s end |