403Webshell
Server IP : 103.119.228.120  /  Your IP : 18.191.97.133
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /usr/local/ssl/lib/mysqlsh/lib/python3.9/site-packages/oci/jms/models/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /usr/local/ssl/lib/mysqlsh/lib/python3.9/site-packages/oci/jms/models/jfr_attachment_target.py
# coding: utf-8
# Copyright (c) 2016, 2024, Oracle and/or its affiliates.  All rights reserved.
# This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.

# NOTE: This class is auto generated by OracleSDKGenerator. DO NOT EDIT. API Version: 20210610


from oci.util import formatted_flat_dict, NONE_SENTINEL, value_allowed_none_or_none_sentinel  # noqa: F401
from oci.decorators import init_model_state_from_kwargs


@init_model_state_from_kwargs
class JfrAttachmentTarget(object):
    """
    The target to collect JFR data. A target is a managed instance, with options to further limit to specific application and/or Java Runtime.
    When the applicationKey isn't specified, then all applications are selected.
    When the jreKey isn't specified, then all supported Java Runtime versions are selected.
    When the applicationInstallationKey isn't specified, then all application installations are selected.
    Keys applicationKey and applicationInstallationKey are mutually exclusive.
    """

    def __init__(self, **kwargs):
        """
        Initializes a new JfrAttachmentTarget object with values from keyword arguments.
        The following keyword arguments are supported (corresponding to the getters/setters of this class):

        :param managed_instance_id:
            The value to assign to the managed_instance_id property of this JfrAttachmentTarget.
        :type managed_instance_id: str

        :param application_key:
            The value to assign to the application_key property of this JfrAttachmentTarget.
        :type application_key: str

        :param application_installation_key:
            The value to assign to the application_installation_key property of this JfrAttachmentTarget.
        :type application_installation_key: str

        :param jre_key:
            The value to assign to the jre_key property of this JfrAttachmentTarget.
        :type jre_key: str

        """
        self.swagger_types = {
            'managed_instance_id': 'str',
            'application_key': 'str',
            'application_installation_key': 'str',
            'jre_key': 'str'
        }

        self.attribute_map = {
            'managed_instance_id': 'managedInstanceId',
            'application_key': 'applicationKey',
            'application_installation_key': 'applicationInstallationKey',
            'jre_key': 'jreKey'
        }

        self._managed_instance_id = None
        self._application_key = None
        self._application_installation_key = None
        self._jre_key = None

    @property
    def managed_instance_id(self):
        """
        **[Required]** Gets the managed_instance_id of this JfrAttachmentTarget.
        OCID of the Managed Instance to collect JFR data.


        :return: The managed_instance_id of this JfrAttachmentTarget.
        :rtype: str
        """
        return self._managed_instance_id

    @managed_instance_id.setter
    def managed_instance_id(self, managed_instance_id):
        """
        Sets the managed_instance_id of this JfrAttachmentTarget.
        OCID of the Managed Instance to collect JFR data.


        :param managed_instance_id: The managed_instance_id of this JfrAttachmentTarget.
        :type: str
        """
        self._managed_instance_id = managed_instance_id

    @property
    def application_key(self):
        """
        Gets the application_key of this JfrAttachmentTarget.
        Unique key that identifies the application for JFR data collection.


        :return: The application_key of this JfrAttachmentTarget.
        :rtype: str
        """
        return self._application_key

    @application_key.setter
    def application_key(self, application_key):
        """
        Sets the application_key of this JfrAttachmentTarget.
        Unique key that identifies the application for JFR data collection.


        :param application_key: The application_key of this JfrAttachmentTarget.
        :type: str
        """
        self._application_key = application_key

    @property
    def application_installation_key(self):
        """
        Gets the application_installation_key of this JfrAttachmentTarget.
        Unique key that identifies the application installation for JFR data collection.


        :return: The application_installation_key of this JfrAttachmentTarget.
        :rtype: str
        """
        return self._application_installation_key

    @application_installation_key.setter
    def application_installation_key(self, application_installation_key):
        """
        Sets the application_installation_key of this JfrAttachmentTarget.
        Unique key that identifies the application installation for JFR data collection.


        :param application_installation_key: The application_installation_key of this JfrAttachmentTarget.
        :type: str
        """
        self._application_installation_key = application_installation_key

    @property
    def jre_key(self):
        """
        Gets the jre_key of this JfrAttachmentTarget.
        Unique key that identify the JVM for JFR data collection.


        :return: The jre_key of this JfrAttachmentTarget.
        :rtype: str
        """
        return self._jre_key

    @jre_key.setter
    def jre_key(self, jre_key):
        """
        Sets the jre_key of this JfrAttachmentTarget.
        Unique key that identify the JVM for JFR data collection.


        :param jre_key: The jre_key of this JfrAttachmentTarget.
        :type: str
        """
        self._jre_key = jre_key

    def __repr__(self):
        return formatted_flat_dict(self)

    def __eq__(self, other):
        if other is None:
            return False

        return self.__dict__ == other.__dict__

    def __ne__(self, other):
        return not self == other

Youez - 2016 - github.com/yon3zu
LinuXploit