Tabnine Logo
SharedAccessAccountPolicy
Code IndexAdd Tabnine to your IDE (free)

How to use
SharedAccessAccountPolicy
in
com.microsoft.azure.storage

Best Java code snippets using com.microsoft.azure.storage.SharedAccessAccountPolicy (Showing top 20 results out of 315)

origin: org.apache.hadoop/hadoop-azure

/**
 * Helper method to generate Access Policy for the Storage Account SAS Key
 * @return SharedAccessAccountPolicy
 */
private SharedAccessAccountPolicy getDefaultAccountAccessPolicy() {
 SharedAccessAccountPolicy ap =
   new SharedAccessAccountPolicy();
 Calendar cal = new GregorianCalendar(TimeZone.getTimeZone("UTC"));
 cal.setTime(new Date());
 cal.add(Calendar.HOUR, (int) getSasKeyExpiryPeriod() * HOURS_IN_DAY);
 ap.setSharedAccessExpiryTime(cal.getTime());
 ap.setPermissions(getDefaultAccoutSASKeyPermissions());
 ap.setResourceTypes(EnumSet.of(SharedAccessAccountResourceType.CONTAINER,
   SharedAccessAccountResourceType.OBJECT));
 ap.setServices(EnumSet.of(SharedAccessAccountService.BLOB));
 return ap;
}
origin: com.microsoft.azure/azure-storage

/**
 * Converts this shared access policy's permissions to a <code>String</code>.
 * 
 * @return A <code>String</code> which represents the shared access permissions.
 */
public String permissionsToString() {
  return SharedAccessAccountPermissions.permissionsToString(this.getPermissions());
}
origin: com.microsoft.azure/azure-storage

/**
 * Converts this shared access policy's resource types to a <code>String</code>.
 * 
 * @return A <code>String</code> which represents the shared access permissions.
 */
public String resourceTypesToString() {
  return SharedAccessAccountResourceType.resourceTypesToString(this.getResourceTypes());
}
origin: com.microsoft.azure/azure-storage

permissions = policy.permissionsToString();
startTime = policy.getSharedAccessStartTime();
expiryTime = policy.getSharedAccessExpiryTime();
ipRange = policy.getRange();
protocols = policy.getProtocols();
services = policy.servicesToString();
resourceTypes = policy.resourceTypesToString();
origin: Azure/azure-storage-android

cal.add(Calendar.SECOND, 300);
SharedAccessAccountPolicy policy = new SharedAccessAccountPolicy();
policy.setServices(services);
policy.setPermissions(permissions);
policy.setResourceTypes(resourceTypes);
policy.setRange(ipRange);
policy.setProtocols(protocols);
policy.setSharedAccessExpiryTime(cal.getTime());
origin: Azure/azure-storage-android

if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER) &&
    (policy.getPermissions().contains(SharedAccessAccountPermissions.CREATE) ||
     policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE))) {
    if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER)) {
      assertMessagesMatch(AccountSasTests.INVALID_PERMISSION_MESSAGE, ex);
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.SERVICE) &&
    (policy.getPermissions().contains(SharedAccessAccountPermissions.LIST))) {
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.OBJECT)) {
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.CREATE) ||
      policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE)) {
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.ADD) ||
      policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE)) {
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.READ)) {
    sasBlob.download(outStream);
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.DELETE)) {
    sasBlob.delete();
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER) &&
     policy.getPermissions().contains(SharedAccessAccountPermissions.DELETE)) {
    if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER)) {
      assertMessagesMatch(AccountSasTests.INVALID_PERMISSION_MESSAGE, ex);
origin: com.microsoft.azure/azure-storage

/**
 * Sets shared access permissions using the specified permissions <code>String</code>.
 * 
 * @param value
 *        A <code>String</code> which represents the shared access permissions.
 **/
public void setPermissionsFromString(final String value) {
  this.setPermissions(SharedAccessAccountPermissions.permissionsFromString(value));
}
 
origin: com.microsoft.azure/azure-storage

  /**
   * Sets shared access services using the specified services <code>String</code>.
   * 
   * @param value
   *        A <code>String</code> which represents the shared access services.
   **/
  public void setServiceFromString(final String value) {
    this.setServices(SharedAccessAccountService.servicesFromString(value));
  }
}
origin: com.microsoft.azure/azure-storage

/**
 * Sets shared access resource types using the specified resource types <code>String</code>.
 * 
 * @param value
 *        A <code>String</code> which represents the shared access resource types.
 **/
public void setResourceTypeFromString(final String value) {
  this.setResourceTypes(SharedAccessAccountResourceType.resourceTypesFromString(value));
}
origin: com.microsoft.azure/azure-storage

/**
 * Converts this shared access policy's services to a <code>String</code>.
 * 
 * @return A <code>String</code> which represents the shared access permissions.
 */
public String servicesToString() {
  return SharedAccessAccountService.servicesToString(this.getServices());
}
origin: Azure/azure-storage-android

permissions = policy.permissionsToString();
startTime = policy.getSharedAccessStartTime();
expiryTime = policy.getSharedAccessExpiryTime();
ipRange = policy.getRange();
protocols = policy.getProtocols();
services = policy.servicesToString();
resourceTypes = policy.resourceTypesToString();
origin: Azure/azure-storage-android

if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER) &&
    (policy.getPermissions().contains(SharedAccessAccountPermissions.CREATE) ||
     policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE))) {
    if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER)) {
      assertMessagesMatch(AccountSasTests.INVALID_PERMISSION_MESSAGE, ex);
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.SERVICE) &&
    (policy.getPermissions().contains(SharedAccessAccountPermissions.LIST))) {
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.OBJECT)) {
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.CREATE) ||
      policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE)) {
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE)) {
    sasFile.upload(sourcestream, length);
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.READ)) {
    sasFile.download(outStream);
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.DELETE)) {
    sasFile.delete();
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER) &&
     policy.getPermissions().contains(SharedAccessAccountPermissions.DELETE)) {
    if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER)) {
      assertMessagesMatch(AccountSasTests.INVALID_PERMISSION_MESSAGE, ex);
origin: Azure/azure-storage-android

/**
 * Sets shared access permissions using the specified permissions <code>String</code>.
 * 
 * @param value
 *        A <code>String</code> which represents the shared access permissions.
 **/
public void setPermissionsFromString(final String value) {
  this.setPermissions(SharedAccessAccountPermissions.permissionsFromString(value));
}

origin: Azure/azure-storage-android

  /**
   * Sets shared access services using the specified services <code>String</code>.
   * 
   * @param value
   *        A <code>String</code> which represents the shared access services.
   **/
  public void setServiceFromString(final String value) {
    this.setServices(SharedAccessAccountService.servicesFromString(value));
  }
}
origin: Azure/azure-storage-android

/**
 * Sets shared access resource types using the specified resource types <code>String</code>.
 * 
 * @param value
 *        A <code>String</code> which represents the shared access resource types.
 **/
public void setResourceTypeFromString(final String value) {
  this.setResourceTypes(SharedAccessAccountResourceType.resourceTypesFromString(value));
}
origin: Azure/azure-storage-android

/**
 * Converts this shared access policy's services to a <code>String</code>.
 * 
 * @return A <code>String</code> which represents the shared access permissions.
 */
public String servicesToString() {
  return SharedAccessAccountService.servicesToString(this.getServices());
}
origin: Azure/azure-storage-android

policy.setSharedAccessExpiryTime(cal.getTime());
SharedAccessAccountPolicy accountPolicy = new SharedAccessAccountPolicy();
accountPolicy.setPermissions(EnumSet.of(SharedAccessAccountPermissions.READ, SharedAccessAccountPermissions.WRITE));
accountPolicy.setServices(EnumSet.of(SharedAccessAccountService.BLOB));
accountPolicy.setResourceTypes(EnumSet.of(SharedAccessAccountResourceType.OBJECT, SharedAccessAccountResourceType.CONTAINER));
accountPolicy.setSharedAccessExpiryTime(cal.getTime());
final CloudBlobClient sasClient = TestHelper.createCloudBlobClient(accountPolicy, false);
origin: com.microsoft.azure/azure-storage

String resourceTypes = null;
if (policy != null) {
  permissions = policy.permissionsToString();
  startTime = policy.getSharedAccessStartTime();
  expiryTime = policy.getSharedAccessExpiryTime();
  ipRange = policy.getRange();
  protocols = policy.getProtocols();
  services = policy.servicesToString();
  resourceTypes = policy.resourceTypesToString();
origin: Azure/azure-storage-android

if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER)) {
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.CREATE) ||
      policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE)) {
      if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER)) {
        assertMessagesMatch(AccountSasTests.INVALID_PERMISSION_MESSAGE, ex);
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.WRITE)) {
    sasQueue.getMetadata().put(key, value);
    sasQueue.uploadMetadata();
    if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.CONTAINER)) {
      assertMessagesMatch(AccountSasTests.INVALID_PERMISSION_MESSAGE, ex);
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.SERVICE) &&
    (policy.getPermissions().contains(SharedAccessAccountPermissions.LIST))) {
if (policy.getResourceTypes().contains(SharedAccessAccountResourceType.OBJECT)) {
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.ADD)) {
    sasQueue.addMessage(new CloudQueueMessage(value));
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.READ)) {
    message = sasQueue.peekMessage();
  if (policy.getPermissions().contains(SharedAccessAccountPermissions.PROCESS_MESSAGES)) {
    message = sasQueue.retrieveMessage();
origin: Azure/azure-storage-android

/**
 * Converts this shared access policy's resource types to a <code>String</code>.
 * 
 * @return A <code>String</code> which represents the shared access permissions.
 */
public String resourceTypesToString() {
  return SharedAccessAccountResourceType.resourceTypesToString(this.getResourceTypes());
}
com.microsoft.azure.storageSharedAccessAccountPolicy

Javadoc

Represents a shared access policy, which specifies the start time, expiry time, and permissions for a shared access signature.

Most used methods

  • setPermissions
    Sets the permissions for a shared access signature associated with this shared access policy.
  • setResourceTypes
    Sets the resource type for a shared access signature associated with this shared access policy.
  • setServices
    Sets the services (blob, file, queue, table) for a shared access signature associated with this shar
  • getPermissions
    Gets the permissions for a shared access signature associated with this shared access policy.
  • getResourceTypes
    Gets the resource type for a shared access signature associated with this shared access policy.
  • <init>
  • getProtocols
    Gets the allowed protocols for a shared access signature associated with this shared access policy.
  • getRange
    Gets the allowed IP addresses for a shared access signature associated with this shared access polic
  • getServices
    Gets the services (blob, file, queue, table) for a shared access signature associated with this shar
  • getSharedAccessExpiryTime
  • getSharedAccessStartTime
  • permissionsToString
    Converts this shared access policy's permissions to a String.
  • getSharedAccessStartTime,
  • permissionsToString,
  • resourceTypesToString,
  • servicesToString,
  • setSharedAccessExpiryTime,
  • setProtocols,
  • setRange

Popular in Java

  • Updating database using SQL prepared statement
  • getSystemService (Context)
  • findViewById (Activity)
  • putExtra (Intent)
  • Menu (java.awt)
  • BufferedWriter (java.io)
    Wraps an existing Writer and buffers the output. Expensive interaction with the underlying reader is
  • GregorianCalendar (java.util)
    GregorianCalendar is a concrete subclass of Calendarand provides the standard calendar used by most
  • Callable (java.util.concurrent)
    A task that returns a result and may throw an exception. Implementors define a single method with no
  • DataSource (javax.sql)
    An interface for the creation of Connection objects which represent a connection to a database. This
  • Reflections (org.reflections)
    Reflections one-stop-shop objectReflections scans your classpath, indexes the metadata, allows you t
  • CodeWhisperer alternatives
Tabnine Logo
  • Products

    Search for Java codeSearch for JavaScript code
  • IDE Plugins

    IntelliJ IDEAWebStormVisual StudioAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimGoLandRubyMineEmacsJupyter NotebookJupyter LabRiderDataGripAppCode
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogTabnine AcademyTerms of usePrivacy policyJava Code IndexJavascript Code Index
Get Tabnine for your IDE now