This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files
pxz-hos-client-cpp-module/support/aws-sdk-cpp-master/aws-cpp-sdk-guardduty/source/model/ThreatIntelSetStatus.cpp

106 lines
3.4 KiB
C++
Raw Normal View History

/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#include <aws/guardduty/model/ThreatIntelSetStatus.h>
#include <aws/core/utils/HashingUtils.h>
#include <aws/core/Globals.h>
#include <aws/core/utils/EnumParseOverflowContainer.h>
using namespace Aws::Utils;
namespace Aws
{
namespace GuardDuty
{
namespace Model
{
namespace ThreatIntelSetStatusMapper
{
static const int INACTIVE_HASH = HashingUtils::HashString("INACTIVE");
static const int ACTIVATING_HASH = HashingUtils::HashString("ACTIVATING");
static const int ACTIVE_HASH = HashingUtils::HashString("ACTIVE");
static const int DEACTIVATING_HASH = HashingUtils::HashString("DEACTIVATING");
static const int ERROR__HASH = HashingUtils::HashString("ERROR");
static const int DELETE_PENDING_HASH = HashingUtils::HashString("DELETE_PENDING");
static const int DELETED_HASH = HashingUtils::HashString("DELETED");
ThreatIntelSetStatus GetThreatIntelSetStatusForName(const Aws::String& name)
{
int hashCode = HashingUtils::HashString(name.c_str());
if (hashCode == INACTIVE_HASH)
{
return ThreatIntelSetStatus::INACTIVE;
}
else if (hashCode == ACTIVATING_HASH)
{
return ThreatIntelSetStatus::ACTIVATING;
}
else if (hashCode == ACTIVE_HASH)
{
return ThreatIntelSetStatus::ACTIVE;
}
else if (hashCode == DEACTIVATING_HASH)
{
return ThreatIntelSetStatus::DEACTIVATING;
}
else if (hashCode == ERROR__HASH)
{
return ThreatIntelSetStatus::ERROR_;
}
else if (hashCode == DELETE_PENDING_HASH)
{
return ThreatIntelSetStatus::DELETE_PENDING;
}
else if (hashCode == DELETED_HASH)
{
return ThreatIntelSetStatus::DELETED;
}
EnumParseOverflowContainer* overflowContainer = Aws::GetEnumOverflowContainer();
if(overflowContainer)
{
overflowContainer->StoreOverflow(hashCode, name);
return static_cast<ThreatIntelSetStatus>(hashCode);
}
return ThreatIntelSetStatus::NOT_SET;
}
Aws::String GetNameForThreatIntelSetStatus(ThreatIntelSetStatus enumValue)
{
switch(enumValue)
{
case ThreatIntelSetStatus::INACTIVE:
return "INACTIVE";
case ThreatIntelSetStatus::ACTIVATING:
return "ACTIVATING";
case ThreatIntelSetStatus::ACTIVE:
return "ACTIVE";
case ThreatIntelSetStatus::DEACTIVATING:
return "DEACTIVATING";
case ThreatIntelSetStatus::ERROR_:
return "ERROR";
case ThreatIntelSetStatus::DELETE_PENDING:
return "DELETE_PENDING";
case ThreatIntelSetStatus::DELETED:
return "DELETED";
default:
EnumParseOverflowContainer* overflowContainer = Aws::GetEnumOverflowContainer();
if(overflowContainer)
{
return overflowContainer->RetrieveOverflow(static_cast<int>(enumValue));
}
return {};
}
}
} // namespace ThreatIntelSetStatusMapper
} // namespace Model
} // namespace GuardDuty
} // namespace Aws