/*
 * Copyright (C) 2015 The Pennsylvania State University and the University of Wisconsin
 * Systems and Internet Infrastructure Security Laboratory
 *
 * Author: Damien Octeau
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package edu.psu.cse.siis.coal.tuto;

import java.util.HashSet;
import java.util.Set;

public class Data {
  private Set<String> strings = new HashSet<>();
  private Set<Integer> integers = new HashSet<>();

  public void addString(String value) {
    strings.add(value);
  }

  public void addInt(int value) {
    integers.add(value);
  }

  public Set<String> getStrings() {
    return strings;
  }

  public Set<Integer> getInts() {
    return integers;
  }

  @Override
  public String toString() {
    StringBuilder builder = new StringBuilder("strings: ");
    builder.append(strings);
    builder.append(" - integers: ").append(integers);

    return builder.toString();
  }
}
