source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(self, collection=None):
guid = str(uuid.uuid4())
if collection:
return str.join('/', [collection, guid])
else:
return guid
|
create_guid
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, collection=None):\n guid = str(uuid.uuid4())\n if collection:\n return str.join('/', [collection, guid])\n else:\n return guid\n",
"role": "user"
},
{
"content": "create_guid",
"role": "assistant"
}
] |
def x(self, collection, body):
assert isinstance(body, list), 'POST requires body to be a list'
assert collection.startswith('/'), 'Collections must start with /'
uri = self.uri + '/v1' + collection
return self.service._post(uri, body)
|
post_collection
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, collection, body):\n assert isinstance(body, list), 'POST requires body to be a list'\n assert collection.startswith('/'), 'Collections must start with /'\n uri = self.uri + '/v1' + collection\n return self.service._post(uri, body)\n",
"role": "user"
},
{
"content": "post_collection",
"role": "assistant"
}
] |
def x(self, collection, body):
uri = self.uri + '/v1' + collection
return self.service._put(uri, body)
|
put_collection
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, collection, body):\n uri = self.uri + '/v1' + collection\n return self.service._put(uri, body)\n",
"role": "user"
},
{
"content": "put_collection",
"role": "assistant"
}
] |
def x(self, collection):
uri = str.join('/', [self.uri, collection])
return self.service._delete(uri)
|
delete_collection
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, collection):\n uri = str.join('/', [self.uri, collection])\n return self.service._delete(uri)\n",
"role": "user"
},
{
"content": "delete_collection",
"role": "assistant"
}
] |
def x(self, collection, changes):
uri = str.join('/', [self.uri, collection])
return self.service._patch(uri, changes)
|
patch_collection
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, collection, changes):\n uri = str.join('/', [self.uri, collection])\n return self.service._patch(uri, changes)\n",
"role": "user"
},
{
"content": "patch_collection",
"role": "assistant"
}
] |
def x(self, collection):
assert isinstance(collection, predix.data.asset.AssetCollection
), 'Expected AssetCollection'
collection.validate()
self.put_collection(collection.uri, collection.__dict__)
|
save
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, collection):\n assert isinstance(collection, predix.data.asset.AssetCollection\n ), 'Expected AssetCollection'\n collection.validate()\n self.put_collection(collection.uri, collection.__dict__)\n",
"role": "user"
},
{
"content": "save",
"role": "assistant"
}
] |
def x(self):
space = predix.admin.cf.spaces.Space()
summary = space.get_space_summary()
for instance in summary['services']:
service_type = instance['service_plan']['service']['label']
name = instance['name']
if service_type in self.supported:
service = self.supported[service_type](name=name)
service.add_to_manifest(self)
elif service_type == 'us-weather-forecast':
weather = predix.admin.weather.WeatherForecast(name=name)
weather.add_to_manifest(self)
else:
logging.warning('Unsupported service type: %s' % service_type)
|
create_manifest_from_space
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n space = predix.admin.cf.spaces.Space()\n summary = space.get_space_summary()\n for instance in summary['services']:\n service_type = instance['service_plan']['service']['label']\n name = instance['name']\n if service_type in self.supported:\n service = self.supported[service_type](name=name)\n service.add_to_manifest(self)\n elif service_type == 'us-weather-forecast':\n weather = predix.admin.weather.WeatherForecast(name=name)\n weather.add_to_manifest(self)\n else:\n logging.warning('Unsupported service type: %s' % service_type)\n",
"role": "user"
},
{
"content": "create_manifest_from_space",
"role": "assistant"
}
] |
def x(self):
self.add_env_var('PREDIX_ORGANIZATION_GUID', self.space.org.guid)
self.add_env_var('PREDIX_ORGANIZATION_NAME', self.space.org.name)
self.add_env_var('PREDIX_SPACE_GUID', self.space.guid)
self.add_env_var('PREDIX_SPACE_NAME', self.space.name)
self.write_manifest()
|
lock_to_org_space
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.add_env_var('PREDIX_ORGANIZATION_GUID', self.space.org.guid)\n self.add_env_var('PREDIX_ORGANIZATION_NAME', self.space.org.name)\n self.add_env_var('PREDIX_SPACE_GUID', self.space.guid)\n self.add_env_var('PREDIX_SPACE_NAME', self.space.name)\n self.write_manifest()\n",
"role": "user"
},
{
"content": "lock_to_org_space",
"role": "assistant"
}
] |
def x(self, admin_secret, **kwargs):
uaa = predix.admin.uaa.UserAccountAuthentication(**kwargs)
if not uaa.exists():
uaa.create(admin_secret, **kwargs)
uaa.add_to_manifest(self)
return uaa
|
create_uaa
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, admin_secret, **kwargs):\n uaa = predix.admin.uaa.UserAccountAuthentication(**kwargs)\n if not uaa.exists():\n uaa.create(admin_secret, **kwargs)\n uaa.add_to_manifest(self)\n return uaa\n",
"role": "user"
},
{
"content": "create_uaa",
"role": "assistant"
}
] |
def x(self, client_id=None, client_secret=None, uaa=None):
if not uaa:
uaa = predix.admin.uaa.UserAccountAuthentication()
if not client_id:
client_id = uaa._create_id()
if not client_secret:
client_secret = uaa._create_secret()
uaa.create_client(client_id, client_secret)
uaa.add_client_to_manifest(client_id, client_secret, self)
|
create_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id=None, client_secret=None, uaa=None):\n if not uaa:\n uaa = predix.admin.uaa.UserAccountAuthentication()\n if not client_id:\n client_id = uaa._create_id()\n if not client_secret:\n client_secret = uaa._create_secret()\n uaa.create_client(client_id, client_secret)\n uaa.add_client_to_manifest(client_id, client_secret, self)\n",
"role": "user"
},
{
"content": "create_client",
"role": "assistant"
}
] |
def x(self, **kwargs):
ts = predix.admin.timeseries.TimeSeries(**kwargs)
ts.create()
client_id = self.get_client_id()
if client_id:
ts.grant_client(client_id)
ts.add_to_manifest(self)
return ts
|
create_timeseries
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n ts = predix.admin.timeseries.TimeSeries(**kwargs)\n ts.create()\n client_id = self.get_client_id()\n if client_id:\n ts.grant_client(client_id)\n ts.add_to_manifest(self)\n return ts\n",
"role": "user"
},
{
"content": "create_timeseries",
"role": "assistant"
}
] |
def x(self, **kwargs):
asset = predix.admin.asset.Asset(**kwargs)
asset.create()
client_id = self.get_client_id()
if client_id:
asset.grant_client(client_id)
asset.add_to_manifest(self)
return asset
|
create_asset
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n asset = predix.admin.asset.Asset(**kwargs)\n asset.create()\n client_id = self.get_client_id()\n if client_id:\n asset.grant_client(client_id)\n asset.add_to_manifest(self)\n return asset\n",
"role": "user"
},
{
"content": "create_asset",
"role": "assistant"
}
] |
def x(self, **kwargs):
acs = predix.admin.acs.AccessControl(**kwargs)
acs.create()
client_id = self.get_client_id()
if client_id:
acs.grant_client(client_id)
acs.grant_client(client_id)
acs.add_to_manifest(self)
return acs
|
create_acs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n acs = predix.admin.acs.AccessControl(**kwargs)\n acs.create()\n client_id = self.get_client_id()\n if client_id:\n acs.grant_client(client_id)\n acs.grant_client(client_id)\n acs.add_to_manifest(self)\n return acs\n",
"role": "user"
},
{
"content": "create_acs",
"role": "assistant"
}
] |
def x(self, **kwargs):
weather = predix.admin.weather.WeatherForecast(**kwargs)
weather.create()
client_id = self.get_client_id()
if client_id:
weather.grant_client(client_id)
weather.grant_client(client_id)
weather.add_to_manifest(self)
return weather
|
create_weather
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n weather = predix.admin.weather.WeatherForecast(**kwargs)\n weather.create()\n client_id = self.get_client_id()\n if client_id:\n weather.grant_client(client_id)\n weather.grant_client(client_id)\n weather.add_to_manifest(self)\n return weather\n",
"role": "user"
},
{
"content": "create_weather",
"role": "assistant"
}
] |
def x(self, **kwargs):
blobstore = predix.admin.blobstore.BlobStore(**kwargs)
blobstore.create()
blobstore.add_to_manifest(self)
return blobstore
|
create_blobstore
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n blobstore = predix.admin.blobstore.BlobStore(**kwargs)\n blobstore.create()\n blobstore.add_to_manifest(self)\n return blobstore\n",
"role": "user"
},
{
"content": "create_blobstore",
"role": "assistant"
}
] |
def x(self, **kwargs):
logstash = predix.admin.logstash.Logging(**kwargs)
logstash.create()
logstash.add_to_manifest(self)
logging.info(
'Install Kibana-Me-Logs application by following GitHub instructions')
logging.info(
'git clone https://github.com/cloudfoundry-community/kibana-me-logs.git'
)
return logstash
|
create_logstash
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n logstash = predix.admin.logstash.Logging(**kwargs)\n logstash.create()\n logstash.add_to_manifest(self)\n logging.info(\n 'Install Kibana-Me-Logs application by following GitHub instructions')\n logging.info(\n 'git clone https://github.com/cloudfoundry-community/kibana-me-logs.git'\n )\n return logstash\n",
"role": "user"
},
{
"content": "create_logstash",
"role": "assistant"
}
] |
def x(self, **kwargs):
cache = predix.admin.cache.Cache(**kwargs)
cache.create(**kwargs)
cache.add_to_manifest(self)
return cache
|
create_cache
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n cache = predix.admin.cache.Cache(**kwargs)\n cache.create(**kwargs)\n cache.add_to_manifest(self)\n return cache\n",
"role": "user"
},
{
"content": "create_cache",
"role": "assistant"
}
] |
def x(self, **kwargs):
eventhub = predix.admin.eventhub.EventHub(**kwargs)
eventhub.create()
eventhub.add_to_manifest(self)
eventhub.grant_client(client_id=self.get_client_id(), **kwargs)
eventhub.add_to_manifest(self)
return eventhub
|
create_eventhub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n eventhub = predix.admin.eventhub.EventHub(**kwargs)\n eventhub.create()\n eventhub.add_to_manifest(self)\n eventhub.grant_client(client_id=self.get_client_id(), **kwargs)\n eventhub.add_to_manifest(self)\n return eventhub\n",
"role": "user"
},
{
"content": "create_eventhub",
"role": "assistant"
}
] |
def x(self, available=True, unavailable=False, deprecated=False):
supported = set(self.supported.keys())
all_services = set(self.space.get_services())
results = set()
if available:
results.update(supported)
if unavailable:
results.update(all_services.difference(supported))
if deprecated:
results.update(supported.difference(all_services))
return list(results)
|
get_service_marketplace
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, available=True, unavailable=False, deprecated=False):\n supported = set(self.supported.keys())\n all_services = set(self.space.get_services())\n results = set()\n if available:\n results.update(supported)\n if unavailable:\n results.update(all_services.difference(supported))\n if deprecated:\n results.update(supported.difference(all_services))\n return list(results)\n",
"role": "user"
},
{
"content": "get_service_marketplace",
"role": "assistant"
}
] |
def x(self):
client_id = predix.config.get_env_value(predix.app.Manifest, 'client_id')
client_secret = predix.config.get_env_value(predix.app.Manifest,
'client_secret')
if client_id and client_secret:
logging.info('Automatically authenticated as %s' % client_id)
self.uaa.authenticate(client_id, client_secret)
|
auto_authenticate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n client_id = predix.config.get_env_value(predix.app.Manifest, 'client_id')\n client_secret = predix.config.get_env_value(predix.app.Manifest,\n 'client_secret')\n if client_id and client_secret:\n logging.info('Automatically authenticated as %s' % client_id)\n self.uaa.authenticate(client_id, client_secret)\n",
"role": "user"
},
{
"content": "auto_authenticate",
"role": "assistant"
}
] |
def x(self, uri, params=None, headers=None):
if not headers:
headers = self._get_headers()
logging.debug('URI=' + str(uri))
logging.debug('HEADERS=' + str(headers))
response = self.session.get(uri, headers=headers, params=params)
logging.debug('STATUS=' + str(response.status_code))
if response.status_code == 200:
return response.json()
else:
logging.error(b'ERROR=' + response.content)
response.raise_for_status()
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, uri, params=None, headers=None):\n if not headers:\n headers = self._get_headers()\n logging.debug('URI=' + str(uri))\n logging.debug('HEADERS=' + str(headers))\n response = self.session.get(uri, headers=headers, params=params)\n logging.debug('STATUS=' + str(response.status_code))\n if response.status_code == 200:\n return response.json()\n else:\n logging.error(b'ERROR=' + response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, uri, data):
headers = self._get_headers()
logging.debug('URI=' + str(uri))
logging.debug('BODY=' + json.dumps(data))
response = self.session.post(uri, headers=headers, data=json.dumps(data))
if response.status_code in [200, 204]:
try:
return response.json()
except ValueError:
return '{}'
else:
logging.error(response.content)
response.raise_for_status()
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, uri, data):\n headers = self._get_headers()\n logging.debug('URI=' + str(uri))\n logging.debug('BODY=' + json.dumps(data))\n response = self.session.post(uri, headers=headers, data=json.dumps(data))\n if response.status_code in [200, 204]:\n try:\n return response.json()\n except ValueError:\n return '{}'\n else:\n logging.error(response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(self, uri, data):
headers = self._get_headers()
logging.debug('URI=' + str(uri))
logging.debug('BODY=' + json.dumps(data))
response = self.session.put(uri, headers=headers, data=json.dumps(data))
if response.status_code in [201, 204]:
return data
else:
logging.error(response.content)
response.raise_for_status()
|
put
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, uri, data):\n headers = self._get_headers()\n logging.debug('URI=' + str(uri))\n logging.debug('BODY=' + json.dumps(data))\n response = self.session.put(uri, headers=headers, data=json.dumps(data))\n if response.status_code in [201, 204]:\n return data\n else:\n logging.error(response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "put",
"role": "assistant"
}
] |
def x(self, uri):
headers = self._get_headers()
response = self.session.delete(uri, headers=headers)
if response.status_code == 204:
return response
else:
logging.error(response.content)
response.raise_for_status()
|
delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, uri):\n headers = self._get_headers()\n response = self.session.delete(uri, headers=headers)\n if response.status_code == 204:\n return response\n else:\n logging.error(response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(self, uri, data):
headers = self._get_headers()
response = self.session.patch(uri, headers=headers, data=json.dumps(data))
if response.status_code == 204:
return response
else:
logging.error(response.content)
response.raise_for_status()
|
patch
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, uri, data):\n headers = self._get_headers()\n response = self.session.patch(uri, headers=headers, data=json.dumps(data))\n if response.status_code == 204:\n return response\n else:\n logging.error(response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "patch",
"role": "assistant"
}
] |
def x(self, guid=None):
uri = self.uri + '/v1/resource'
if guid:
uri += '/' + urllib.quote_plus(guid)
return uri
|
get_resource_uri
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, guid=None):\n uri = self.uri + '/v1/resource'\n if guid:\n uri += '/' + urllib.quote_plus(guid)\n return uri\n",
"role": "user"
},
{
"content": "get_resource_uri",
"role": "assistant"
}
] |
def x(self, resource_id):
uri = self._get_resource_uri(guid=resource_id)
return self.service._get(uri)
|
get_resource
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, resource_id):\n uri = self._get_resource_uri(guid=resource_id)\n return self.service._get(uri)\n",
"role": "user"
},
{
"content": "get_resource",
"role": "assistant"
}
] |
def x(self, body):
assert isinstance(body, list), 'POST for requires body to be a list'
uri = self._get_resource_uri()
return self.service._post(uri, body)
|
post_resource
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, body):\n assert isinstance(body, list), 'POST for requires body to be a list'\n uri = self._get_resource_uri()\n return self.service._post(uri, body)\n",
"role": "user"
},
{
"content": "post_resource",
"role": "assistant"
}
] |
def x(self, resource_id):
uri = self._get_resource_uri(guid=resource_id)
return self.service._delete(uri)
|
delete_resource
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, resource_id):\n uri = self._get_resource_uri(guid=resource_id)\n return self.service._delete(uri)\n",
"role": "user"
},
{
"content": "delete_resource",
"role": "assistant"
}
] |
def x(self, resource_id, body):
assert isinstance(body, dict), 'PUT requires body to be a dict.'
uri = self._get_resource_uri(guid=resource_id)
return self.service._put(uri, body)
|
put_resource
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, resource_id, body):\n assert isinstance(body, dict), 'PUT requires body to be a dict.'\n uri = self._get_resource_uri(guid=resource_id)\n return self.service._put(uri, body)\n",
"role": "user"
},
{
"content": "put_resource",
"role": "assistant"
}
] |
def x(self, resource_id, attributes, parents=[], issuer='default'):
assert isinstance(attributes, dict), 'attributes expected to be dict'
attrs = []
for key in attributes.keys():
attrs.append({'issuer': issuer, 'name': key, 'value': attributes[key]})
body = {'resourceIdentifier': resource_id, 'parents': parents,
'attributes': attrs}
return self._put_resource(resource_id, body)
|
add_resource
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, resource_id, attributes, parents=[], issuer='default'):\n assert isinstance(attributes, dict), 'attributes expected to be dict'\n attrs = []\n for key in attributes.keys():\n attrs.append({'issuer': issuer, 'name': key, 'value': attributes[key]})\n body = {'resourceIdentifier': resource_id, 'parents': parents,\n 'attributes': attrs}\n return self._put_resource(resource_id, body)\n",
"role": "user"
},
{
"content": "add_resource",
"role": "assistant"
}
] |
def x(self, guid=None):
uri = self.uri + '/v1/subject'
if guid:
uri += '/' + urllib.quote_plus(guid)
return uri
|
get_subject_uri
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, guid=None):\n uri = self.uri + '/v1/subject'\n if guid:\n uri += '/' + urllib.quote_plus(guid)\n return uri\n",
"role": "user"
},
{
"content": "get_subject_uri",
"role": "assistant"
}
] |
def x(self, subject_id):
uri = self._get_subject_uri(guid=subject_id)
return self.service._get(uri)
|
get_subject
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, subject_id):\n uri = self._get_subject_uri(guid=subject_id)\n return self.service._get(uri)\n",
"role": "user"
},
{
"content": "get_subject",
"role": "assistant"
}
] |
def x(self, body):
assert isinstance(body, list), 'POST requires body to be a list'
uri = self._get_subject_uri()
return self.service._post(uri, body)
|
post_subject
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, body):\n assert isinstance(body, list), 'POST requires body to be a list'\n uri = self._get_subject_uri()\n return self.service._post(uri, body)\n",
"role": "user"
},
{
"content": "post_subject",
"role": "assistant"
}
] |
def x(self, subject_id):
uri = self._get_subject_uri(guid=subject_id)
return self.service._delete(uri)
|
delete_subject
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, subject_id):\n uri = self._get_subject_uri(guid=subject_id)\n return self.service._delete(uri)\n",
"role": "user"
},
{
"content": "delete_subject",
"role": "assistant"
}
] |
def x(self, subject_id, body):
assert isinstance(body, dict), 'PUT requires body to be dict.'
uri = self._get_subject_uri(guid=subject_id)
return self.service._put(uri, body)
|
put_subject
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, subject_id, body):\n assert isinstance(body, dict), 'PUT requires body to be dict.'\n uri = self._get_subject_uri(guid=subject_id)\n return self.service._put(uri, body)\n",
"role": "user"
},
{
"content": "put_subject",
"role": "assistant"
}
] |
def x(self, subject_id, attributes, parents=[], issuer='default'):
assert isinstance(attributes, dict), 'attributes expected to be dict'
attrs = []
for key in attributes.keys():
attrs.append({'issuer': issuer, 'name': key, 'value': attributes[key]})
body = {'subjectIdentifier': subject_id, 'parents': parents,
'attributes': attrs}
return self._put_subject(subject_id, body)
|
add_subject
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, subject_id, attributes, parents=[], issuer='default'):\n assert isinstance(attributes, dict), 'attributes expected to be dict'\n attrs = []\n for key in attributes.keys():\n attrs.append({'issuer': issuer, 'name': key, 'value': attributes[key]})\n body = {'subjectIdentifier': subject_id, 'parents': parents,\n 'attributes': attrs}\n return self._put_subject(subject_id, body)\n",
"role": "user"
},
{
"content": "add_subject",
"role": "assistant"
}
] |
def x(self):
target = self.uri + '/monitoring/heartbeat'
response = self.session.get(target)
return response
|
get_monitoring_heartbeat
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n target = self.uri + '/monitoring/heartbeat'\n response = self.session.get(target)\n return response\n",
"role": "user"
},
{
"content": "get_monitoring_heartbeat",
"role": "assistant"
}
] |
def x(self):
response = self.get_monitoring_heartbeat()
if response.status_code == 200 and response.content == 'alive':
return True
return False
|
is_alive
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n response = self.get_monitoring_heartbeat()\n if response.status_code == 200 and response.content == 'alive':\n return True\n return False\n",
"role": "user"
},
{
"content": "is_alive",
"role": "assistant"
}
] |
def x(self, guid=None):
uri = self.uri + '/v1/policy-set'
if guid:
uri += '/' + urllib.quote_plus(guid)
return uri
|
get_policy_set_uri
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, guid=None):\n uri = self.uri + '/v1/policy-set'\n if guid:\n uri += '/' + urllib.quote_plus(guid)\n return uri\n",
"role": "user"
},
{
"content": "get_policy_set_uri",
"role": "assistant"
}
] |
def x(self, policy_set_id, body):
assert isinstance(body, dict), 'PUT requires body to be a dict.'
uri = self._get_policy_set_uri(guid=policy_set_id)
return self.service._put(uri, body)
|
put_policy_set
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, policy_set_id, body):\n assert isinstance(body, dict), 'PUT requires body to be a dict.'\n uri = self._get_policy_set_uri(guid=policy_set_id)\n return self.service._put(uri, body)\n",
"role": "user"
},
{
"content": "put_policy_set",
"role": "assistant"
}
] |
def x(self, policy_set_id):
uri = self._get_policy_set_uri(guid=policy_set_id)
return self.service._get(uri)
|
get_policy_set
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, policy_set_id):\n uri = self._get_policy_set_uri(guid=policy_set_id)\n return self.service._get(uri)\n",
"role": "user"
},
{
"content": "get_policy_set",
"role": "assistant"
}
] |
def x(self, policy_set_id):
uri = self._get_policy_set_uri(guid=policy_set_id)
return self.service._delete(uri)
|
delete_policy_set
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, policy_set_id):\n uri = self._get_policy_set_uri(guid=policy_set_id)\n return self.service._delete(uri)\n",
"role": "user"
},
{
"content": "delete_policy_set",
"role": "assistant"
}
] |
def x(self, name, action, resource, subject, condition, policy_set_id=None,
effect='PERMIT'):
if not policy_set_id:
policy_set_id = str(uuid.uuid4())
if action not in ['GET', 'PUT', 'POST', 'DELETE']:
raise ValueError('Invalid action')
policy = {'name': name, 'target': {'resource': resource, 'subject':
subject, 'action': action}, 'conditions': [{'name': '', 'condition':
condition}], 'effect': effect}
body = {'name': policy_set_id, 'policies': [policy]}
result = self._put_policy_set(policy_set_id, body)
return result
|
add_policy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name, action, resource, subject, condition, policy_set_id=None,\n effect='PERMIT'):\n if not policy_set_id:\n policy_set_id = str(uuid.uuid4())\n if action not in ['GET', 'PUT', 'POST', 'DELETE']:\n raise ValueError('Invalid action')\n policy = {'name': name, 'target': {'resource': resource, 'subject':\n subject, 'action': action}, 'conditions': [{'name': '', 'condition':\n condition}], 'effect': effect}\n body = {'name': policy_set_id, 'policies': [policy]}\n result = self._put_policy_set(policy_set_id, body)\n return result\n",
"role": "user"
},
{
"content": "add_policy",
"role": "assistant"
}
] |
def x(self, subject_id, action, resource_id, policy_sets=[]):
body = {'action': action, 'subjectIdentifier': subject_id,
'resourceIdentifier': resource_id}
if policy_sets:
body['policySetsEvaluationOrder'] = policy_sets
uri = self.uri + '/v1/policy-evaluation'
logging.debug('URI=' + str(uri))
logging.debug('BODY=' + str(body))
response = self.service._post(uri, body)
if 'effect' in response:
if response['effect'] in ['NOT_APPLICABLE', 'PERMIT']:
return True
return False
|
is_allowed
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, subject_id, action, resource_id, policy_sets=[]):\n body = {'action': action, 'subjectIdentifier': subject_id,\n 'resourceIdentifier': resource_id}\n if policy_sets:\n body['policySetsEvaluationOrder'] = policy_sets\n uri = self.uri + '/v1/policy-evaluation'\n logging.debug('URI=' + str(uri))\n logging.debug('BODY=' + str(body))\n response = self.service._post(uri, body)\n if 'effect' in response:\n if response['effect'] in ['NOT_APPLICABLE', 'PERMIT']:\n return True\n return False\n",
"role": "user"
},
{
"content": "is_allowed",
"role": "assistant"
}
] |
def x(url, path=None, headers=None, session=None, show_progress=True,
resume=True, auto_retry=True, max_rst_retries=5, pass_through_opts=None,
cainfo=None, user_agent=None, auth=None):
hm = Homura(url, path, headers, session, show_progress, resume,
auto_retry, max_rst_retries, pass_through_opts, cainfo, user_agent,
auth)
hm.start()
|
download
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url, path=None, headers=None, session=None, show_progress=True,\n resume=True, auto_retry=True, max_rst_retries=5, pass_through_opts=None,\n cainfo=None, user_agent=None, auth=None):\n hm = Homura(url, path, headers, session, show_progress, resume,\n auto_retry, max_rst_retries, pass_through_opts, cainfo, user_agent,\n auth)\n hm.start()\n",
"role": "user"
},
{
"content": "download",
"role": "assistant"
}
] |
def x(self):
if self.cainfo:
cainfo = self.cainfo
else:
try:
cainfo = certifi.where()
except AttributeError:
cainfo = None
if cainfo:
self._pycurl.setopt(pycurl.CAINFO, cainfo)
|
fill_in_cainfo
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.cainfo:\n cainfo = self.cainfo\n else:\n try:\n cainfo = certifi.where()\n except AttributeError:\n cainfo = None\n if cainfo:\n self._pycurl.setopt(pycurl.CAINFO, cainfo)\n",
"role": "user"
},
{
"content": "fill_in_cainfo",
"role": "assistant"
}
] |
def x(self):
c = self._pycurl
if os.path.exists(self.path) and self.resume:
mode = 'ab'
self.downloaded = os.path.getsize(self.path)
c.setopt(pycurl.RESUME_FROM, self.downloaded)
else:
mode = 'wb'
with open(self.path, mode) as f:
c.setopt(c.URL, utf8_encode(self.url))
if self.auth:
c.setopt(c.USERPWD, '%s:%s' % self.auth)
c.setopt(c.USERAGENT, self._user_agent)
c.setopt(c.WRITEDATA, f)
h = self._get_pycurl_headers()
if h is not None:
c.setopt(pycurl.HTTPHEADER, h)
c.setopt(c.NOPROGRESS, 0)
c.setopt(pycurl.FOLLOWLOCATION, 1)
c.setopt(c.PROGRESSFUNCTION, self.progress)
self._fill_in_cainfo()
if self._pass_through_opts:
for key, value in self._pass_through_opts.items():
c.setopt(key, value)
c.perform()
|
curl
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n c = self._pycurl\n if os.path.exists(self.path) and self.resume:\n mode = 'ab'\n self.downloaded = os.path.getsize(self.path)\n c.setopt(pycurl.RESUME_FROM, self.downloaded)\n else:\n mode = 'wb'\n with open(self.path, mode) as f:\n c.setopt(c.URL, utf8_encode(self.url))\n if self.auth:\n c.setopt(c.USERPWD, '%s:%s' % self.auth)\n c.setopt(c.USERAGENT, self._user_agent)\n c.setopt(c.WRITEDATA, f)\n h = self._get_pycurl_headers()\n if h is not None:\n c.setopt(pycurl.HTTPHEADER, h)\n c.setopt(c.NOPROGRESS, 0)\n c.setopt(pycurl.FOLLOWLOCATION, 1)\n c.setopt(c.PROGRESSFUNCTION, self.progress)\n self._fill_in_cainfo()\n if self._pass_through_opts:\n for key, value in self._pass_through_opts.items():\n c.setopt(key, value)\n c.perform()\n",
"role": "user"
},
{
"content": "curl",
"role": "assistant"
}
] |
def x(self):
if not self.auto_retry:
self.curl()
return
while not self.is_finished:
try:
self.curl()
except pycurl.error as e:
if e.args[0] == pycurl.E_PARTIAL_FILE:
pass
elif e.args[0] == pycurl.E_HTTP_RANGE_ERROR:
break
elif e.args[0] == pycurl.E_RECV_ERROR:
if self._rst_retries < self.max_rst_retries:
pass
else:
raise e
self._rst_retries += 1
else:
raise e
self._move_path()
self._done()
|
start
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.auto_retry:\n self.curl()\n return\n while not self.is_finished:\n try:\n self.curl()\n except pycurl.error as e:\n if e.args[0] == pycurl.E_PARTIAL_FILE:\n pass\n elif e.args[0] == pycurl.E_HTTP_RANGE_ERROR:\n break\n elif e.args[0] == pycurl.E_RECV_ERROR:\n if self._rst_retries < self.max_rst_retries:\n pass\n else:\n raise e\n self._rst_retries += 1\n else:\n raise e\n self._move_path()\n self._done()\n",
"role": "user"
},
{
"content": "start",
"role": "assistant"
}
] |
def x(self):
if is_temp_path(self._path) and self._pycurl is not None:
eurl = self._pycurl.getinfo(pycurl.EFFECTIVE_URL)
er = get_resource_name(eurl)
r = get_resource_name(self.url)
if er != r and os.path.exists(self.path):
new_path = self._get_path(self._path, eurl)
shutil.move(self.path, new_path)
self.path = new_path
|
move_path
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if is_temp_path(self._path) and self._pycurl is not None:\n eurl = self._pycurl.getinfo(pycurl.EFFECTIVE_URL)\n er = get_resource_name(eurl)\n r = get_resource_name(self.url)\n if er != r and os.path.exists(self.path):\n new_path = self._get_path(self._path, eurl)\n shutil.move(self.path, new_path)\n self.path = new_path\n",
"role": "user"
},
{
"content": "move_path",
"role": "assistant"
}
] |
def x(self, secret, **kwargs):
parameters = {'adminClientSecret': secret}
self.service.create(parameters=parameters)
predix.config.set_env_value(self.use_class, 'uri', self._get_uri())
self.authenticate()
|
create
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, secret, **kwargs):\n parameters = {'adminClientSecret': secret}\n self.service.create(parameters=parameters)\n predix.config.set_env_value(self.use_class, 'uri', self._get_uri())\n self.authenticate()\n",
"role": "user"
},
{
"content": "create",
"role": "assistant"
}
] |
def x(self, manifest):
manifest.add_service(self.service.name)
varname = predix.config.set_env_value(self.use_class, 'uri', self.
_get_uri())
manifest.add_env_var(varname, self._get_uri())
manifest.write_manifest()
|
add_to_manifest
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, manifest):\n manifest.add_service(self.service.name)\n varname = predix.config.set_env_value(self.use_class, 'uri', self.\n _get_uri())\n manifest.add_env_var(varname, self._get_uri())\n manifest.write_manifest()\n",
"role": "user"
},
{
"content": "add_to_manifest",
"role": "assistant"
}
] |
def x(self):
predix.config.set_env_value(self.use_class, 'uri', self._get_uri())
self.uaac = predix.security.uaa.UserAccountAuthentication()
self.uaac.authenticate('admin', self._get_admin_secret(), use_cache=False)
self.is_admin = True
|
authenticate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n predix.config.set_env_value(self.use_class, 'uri', self._get_uri())\n self.uaac = predix.security.uaa.UserAccountAuthentication()\n self.uaac.authenticate('admin', self._get_admin_secret(), use_cache=False)\n self.is_admin = True\n",
"role": "user"
},
{
"content": "authenticate",
"role": "assistant"
}
] |
def x(self, length=12):
charset = string.digits + string.ascii_letters + '+-'
return ''.join(random.SystemRandom().choice(charset) for _ in range(length)
)
|
create_secret
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length=12):\n charset = string.digits + string.ascii_letters + '+-'\n return ''.join(random.SystemRandom().choice(charset) for _ in range(length)\n )\n",
"role": "user"
},
{
"content": "create_secret",
"role": "assistant"
}
] |
def x(self, client_id, client_secret):
assert self.is_admin, 'Must authenticate() as admin to create client'
return self.uaac.create_client(client_id, client_secret)
|
create_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, client_secret):\n assert self.is_admin, 'Must authenticate() as admin to create client'\n return self.uaac.create_client(client_id, client_secret)\n",
"role": "user"
},
{
"content": "create_client",
"role": "assistant"
}
] |
def x(self, client_id, client_secret, manifest):
assert self.is_admin, 'Must authenticate() as admin to create client'
return self.uaac.add_client_to_manifest(client_id, client_secret, manifest)
|
add_client_to_manifest
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, client_secret, manifest):\n assert self.is_admin, 'Must authenticate() as admin to create client'\n return self.uaac.add_client_to_manifest(client_id, client_secret, manifest)\n",
"role": "user"
},
{
"content": "add_client_to_manifest",
"role": "assistant"
}
] |
def x(self):
if 'VCAP_SERVICES' in os.environ:
services = json.loads(os.getenv('VCAP_SERVICES'))
predix_uaa = services['predix-uaa'][0]['credentials']
return predix_uaa['uri']
else:
return predix.config.get_env_value(self, 'uri')
|
get_uaa_uri
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if 'VCAP_SERVICES' in os.environ:\n services = json.loads(os.getenv('VCAP_SERVICES'))\n predix_uaa = services['predix-uaa'][0]['credentials']\n return predix_uaa['uri']\n else:\n return predix.config.get_env_value(self, 'uri')\n",
"role": "user"
},
{
"content": "get_uaa_uri",
"role": "assistant"
}
] |
def x(self, client, secret):
client_s = str.join(':', [client, secret])
credentials = base64.b64encode(client_s.encode('utf-8')).decode('utf-8')
headers = {'Content-Type': 'application/x-www-form-urlencoded',
'Cache-Control': 'no-cache', 'Authorization': 'Basic ' + credentials}
params = {'client_id': client, 'grant_type': 'client_credentials'}
uri = self.uri + '/oauth/token'
logging.debug('URI=' + str(uri))
logging.debug('HEADERS=' + str(headers))
logging.debug('BODY=' + str(params))
response = requests.post(uri, headers=headers, params=params)
if response.status_code == 200:
logging.debug('RESPONSE=' + str(response.json()))
return response.json()
else:
logging.warning('Failed to authenticate as %s' % client)
response.raise_for_status()
|
authenticate_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client, secret):\n client_s = str.join(':', [client, secret])\n credentials = base64.b64encode(client_s.encode('utf-8')).decode('utf-8')\n headers = {'Content-Type': 'application/x-www-form-urlencoded',\n 'Cache-Control': 'no-cache', 'Authorization': 'Basic ' + credentials}\n params = {'client_id': client, 'grant_type': 'client_credentials'}\n uri = self.uri + '/oauth/token'\n logging.debug('URI=' + str(uri))\n logging.debug('HEADERS=' + str(headers))\n logging.debug('BODY=' + str(params))\n response = requests.post(uri, headers=headers, params=params)\n if response.status_code == 200:\n logging.debug('RESPONSE=' + str(response.json()))\n return response.json()\n else:\n logging.warning('Failed to authenticate as %s' % client)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "authenticate_client",
"role": "assistant"
}
] |
def x(self, user, password):
headers = self._get_headers()
params = {'username': user, 'password': password, 'grant_type': 'password'}
uri = self.uri + '/oauth/token'
logging.debug('URI=' + str(uri))
logging.debug('HEADERS=' + str(headers))
logging.debug('BODY=' + str(params))
response = requests.post(uri, headers=headers, params=params)
if response.status_code == 200:
logging.debug('RESPONSE=' + str(response.json()))
return response.json()
else:
logging.warning('Failed to authenticate %s' % user)
response.raise_for_status()
|
authenticate_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user, password):\n headers = self._get_headers()\n params = {'username': user, 'password': password, 'grant_type': 'password'}\n uri = self.uri + '/oauth/token'\n logging.debug('URI=' + str(uri))\n logging.debug('HEADERS=' + str(headers))\n logging.debug('BODY=' + str(params))\n response = requests.post(uri, headers=headers, params=params)\n if response.status_code == 200:\n logging.debug('RESPONSE=' + str(response.json()))\n return response.json()\n else:\n logging.warning('Failed to authenticate %s' % user)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "authenticate_user",
"role": "assistant"
}
] |
def x(self, client):
if 'expires' not in client:
return True
expires = dateutil.parser.parse(client['expires'])
if expires < datetime.datetime.now():
return True
return False
|
is_expired_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client):\n if 'expires' not in client:\n return True\n expires = dateutil.parser.parse(client['expires'])\n if expires < datetime.datetime.now():\n return True\n return False\n",
"role": "user"
},
{
"content": "is_expired_token",
"role": "assistant"
}
] |
def x(self):
try:
os.makedirs(os.path.dirname(self._cache_path))
except OSError as exc:
if exc.errno != errno.EEXIST:
raise
data = {}
data[self.uri] = []
return data
|
initialize_uaa_cache
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n try:\n os.makedirs(os.path.dirname(self._cache_path))\n except OSError as exc:\n if exc.errno != errno.EEXIST:\n raise\n data = {}\n data[self.uri] = []\n return data\n",
"role": "user"
},
{
"content": "initialize_uaa_cache",
"role": "assistant"
}
] |
def x(self):
self._cache_path = os.path.expanduser('~/.predix/uaa.json')
if not os.path.exists(self._cache_path):
return self._initialize_uaa_cache()
with open(self._cache_path, 'r') as data:
return json.load(data)
|
read_uaa_cache
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._cache_path = os.path.expanduser('~/.predix/uaa.json')\n if not os.path.exists(self._cache_path):\n return self._initialize_uaa_cache()\n with open(self._cache_path, 'r') as data:\n return json.load(data)\n",
"role": "user"
},
{
"content": "read_uaa_cache",
"role": "assistant"
}
] |
def x(self, client_id):
data = self._read_uaa_cache()
if self.uri not in data:
return
for client in data[self.uri]:
if client['id'] == client_id:
return client
|
get_client_from_cache
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id):\n data = self._read_uaa_cache()\n if self.uri not in data:\n return\n for client in data[self.uri]:\n if client['id'] == client_id:\n return client\n",
"role": "user"
},
{
"content": "get_client_from_cache",
"role": "assistant"
}
] |
def x(self, new_item):
data = self._read_uaa_cache()
if self.uri not in data:
data[self.uri] = []
for client in data[self.uri]:
if new_item['id'] == client['id']:
data[self.uri].remove(client)
continue
if 'expires' in client:
expires = dateutil.parser.parse(client['expires'])
if expires < datetime.datetime.now():
data[self.uri].remove(client)
continue
data[self.uri].append(new_item)
with open(self._cache_path, 'w') as output:
output.write(json.dumps(data, sort_keys=True, indent=4))
|
write_to_uaa_cache
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_item):\n data = self._read_uaa_cache()\n if self.uri not in data:\n data[self.uri] = []\n for client in data[self.uri]:\n if new_item['id'] == client['id']:\n data[self.uri].remove(client)\n continue\n if 'expires' in client:\n expires = dateutil.parser.parse(client['expires'])\n if expires < datetime.datetime.now():\n data[self.uri].remove(client)\n continue\n data[self.uri].append(new_item)\n with open(self._cache_path, 'w') as output:\n output.write(json.dumps(data, sort_keys=True, indent=4))\n",
"role": "user"
},
{
"content": "write_to_uaa_cache",
"role": "assistant"
}
] |
def x(self, client_id, client_secret, use_cache=True):
if use_cache:
client = self._get_client_from_cache(client_id)
if client and not self.is_expired_token(client):
self.authenticated = True
self.client = client
return
client = {'id': client_id, 'secret': client_secret}
res = self._authenticate_client(client_id, client_secret)
client.update(res)
expires = datetime.datetime.now() + datetime.timedelta(seconds=res[
'expires_in'])
client['expires'] = expires.isoformat()
self._write_to_uaa_cache(client)
self.client = client
self.authenticated = True
|
authenticate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, client_secret, use_cache=True):\n if use_cache:\n client = self._get_client_from_cache(client_id)\n if client and not self.is_expired_token(client):\n self.authenticated = True\n self.client = client\n return\n client = {'id': client_id, 'secret': client_secret}\n res = self._authenticate_client(client_id, client_secret)\n client.update(res)\n expires = datetime.datetime.now() + datetime.timedelta(seconds=res[\n 'expires_in'])\n client['expires'] = expires.isoformat()\n self._write_to_uaa_cache(client)\n self.client = client\n self.authenticated = True\n",
"role": "user"
},
{
"content": "authenticate",
"role": "assistant"
}
] |
def x(self):
data = self._read_uaa_cache()
if self.uri in data:
for client in data[self.uri]:
if client['id'] == self.client['id']:
data[self.uri].remove(client)
with open(self._cache_path, 'w') as output:
output.write(json.dumps(data, sort_keys=True, indent=4))
|
logout
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n data = self._read_uaa_cache()\n if self.uri in data:\n for client in data[self.uri]:\n if client['id'] == self.client['id']:\n data[self.uri].remove(client)\n with open(self._cache_path, 'w') as output:\n output.write(json.dumps(data, sort_keys=True, indent=4))\n",
"role": "user"
},
{
"content": "logout",
"role": "assistant"
}
] |
def x(self, uri, data, headers=None):
if not headers:
headers = self._get_headers()
logging.debug('URI=' + str(uri))
logging.debug('HEADERS=' + str(headers))
logging.debug('BODY=' + str(data))
response = self.session.post(uri, headers=headers, data=json.dumps(data))
logging.debug('STATUS=' + str(response.status_code))
if response.status_code in [200, 201]:
return response.json()
else:
logging.error(b'ERROR=' + response.content)
response.raise_for_status()
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, uri, data, headers=None):\n if not headers:\n headers = self._get_headers()\n logging.debug('URI=' + str(uri))\n logging.debug('HEADERS=' + str(headers))\n logging.debug('BODY=' + str(data))\n response = self.session.post(uri, headers=headers, data=json.dumps(data))\n logging.debug('STATUS=' + str(response.status_code))\n if response.status_code in [200, 201]:\n return response.json()\n else:\n logging.error(b'ERROR=' + response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(self):
if not self.authenticated:
raise ValueError('Must authenticate() as a client first.')
if self.is_expired_token(self.client):
logging.info('client token expired, will need to refresh token')
self.authenticate(self.client['id'], self.client['secret'],
use_cache=False)
return self.client['access_token']
|
get_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.authenticated:\n raise ValueError('Must authenticate() as a client first.')\n if self.is_expired_token(self.client):\n logging.info('client token expired, will need to refresh token')\n self.authenticate(self.client['id'], self.client['secret'],\n use_cache=False)\n return self.client['access_token']\n",
"role": "user"
},
{
"content": "get_token",
"role": "assistant"
}
] |
def x(self):
if not self.authenticated:
raise ValueError('Must authenticate() as a client first.')
scope = self.client['scope']
return scope.split()
|
get_scopes
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.authenticated:\n raise ValueError('Must authenticate() as a client first.')\n scope = self.client['scope']\n return scope.split()\n",
"role": "user"
},
{
"content": "get_scopes",
"role": "assistant"
}
] |
def x(self, scope_required):
if not self.authenticated:
raise ValueError('Must first authenticate()')
if scope_required not in self.get_scopes():
logging.warning('Authenticated as %s' % self.client['id'])
logging.warning('Have scopes: %s' % str.join(',', self.get_scopes()))
logging.warning('Insufficient scope %s for operation' % scope_required)
raise ValueError('Client does not have permission.')
return True
|
assert_has_permission
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, scope_required):\n if not self.authenticated:\n raise ValueError('Must first authenticate()')\n if scope_required not in self.get_scopes():\n logging.warning('Authenticated as %s' % self.client['id'])\n logging.warning('Have scopes: %s' % str.join(',', self.get_scopes()))\n logging.warning('Insufficient scope %s for operation' % scope_required)\n raise ValueError('Client does not have permission.')\n return True\n",
"role": "user"
},
{
"content": "assert_has_permission",
"role": "assistant"
}
] |
def x(self, client_id, admin=False, write=False, read=False, secret=False):
self.assert_has_permission('clients.admin')
perms = []
if admin:
perms.append('clients.admin')
if write or admin:
perms.append('clients.write')
if read or admin:
perms.append('clients.read')
if secret or admin:
perms.append('clients.secret')
if perms:
self.update_client_grants(client_id, scope=perms, authorities=perms)
|
grant_client_permissions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, admin=False, write=False, read=False, secret=False):\n self.assert_has_permission('clients.admin')\n perms = []\n if admin:\n perms.append('clients.admin')\n if write or admin:\n perms.append('clients.write')\n if read or admin:\n perms.append('clients.read')\n if secret or admin:\n perms.append('clients.secret')\n if perms:\n self.update_client_grants(client_id, scope=perms, authorities=perms)\n",
"role": "user"
},
{
"content": "grant_client_permissions",
"role": "assistant"
}
] |
def x(self):
self.assert_has_permission('clients.read')
uri = self.uri + '/oauth/clients'
headers = self.get_authorization_headers()
response = requests.get(uri, headers=headers)
return response.json()['resources']
|
get_clients
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.assert_has_permission('clients.read')\n uri = self.uri + '/oauth/clients'\n headers = self.get_authorization_headers()\n response = requests.get(uri, headers=headers)\n return response.json()['resources']\n",
"role": "user"
},
{
"content": "get_clients",
"role": "assistant"
}
] |
def x(self, client_id):
self.assert_has_permission('clients.read')
uri = self.uri + '/oauth/clients/' + client_id
headers = self.get_authorization_headers()
response = requests.get(uri, headers=headers)
if response.status_code == 200:
return response.json()
else:
return
|
get_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id):\n self.assert_has_permission('clients.read')\n uri = self.uri + '/oauth/clients/' + client_id\n headers = self.get_authorization_headers()\n response = requests.get(uri, headers=headers)\n if response.status_code == 200:\n return response.json()\n else:\n return\n",
"role": "user"
},
{
"content": "get_client",
"role": "assistant"
}
] |
def x(self, client_id, scope=[], authorities=[], grant_types=[],
redirect_uri=[], replace=False):
self.assert_has_permission('clients.write')
client = self.get_client(client_id)
if not client:
raise ValueError("Must first create client: '%s'" % client_id)
if replace:
changes = {'client_id': client_id, 'scope': scope, 'authorities':
authorities}
else:
changes = {'client_id': client_id}
if scope:
changes['scope'] = client['scope']
changes['scope'].extend(scope)
if authorities:
changes['authorities'] = client['authorities']
changes['authorities'].extend(authorities)
if grant_types:
if 'authorization_code' in grant_types and not redirect_uri:
logging.warning(
'A redirect_uri is required for authorization_code.')
changes['authorized_grant_types'] = client['authorized_grant_types'
]
changes['authorized_grant_types'].extend(grant_types)
if redirect_uri:
if 'redirect_uri' in client:
changes['redirect_uri'] = client['redirect_uri']
changes['redirect_uri'].extend(redirect_uri)
else:
changes['redirect_uri'] = redirect_uri
uri = self.uri + '/oauth/clients/' + client_id
headers = {'pragma': 'no-cache', 'Cache-Control': 'no-cache',
'Content-Type': 'application/json', 'Accepts': 'application/json',
'Authorization': 'Bearer ' + self.get_token()}
logging.debug('URI=' + str(uri))
logging.debug('HEADERS=' + str(headers))
logging.debug('BODY=' + json.dumps(changes))
response = requests.put(uri, headers=headers, data=json.dumps(changes))
logging.debug('STATUS=' + str(response.status_code))
if response.status_code == 200:
return response
else:
logging.error(response.content)
response.raise_for_status()
|
update_client_grants
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, scope=[], authorities=[], grant_types=[],\n redirect_uri=[], replace=False):\n self.assert_has_permission('clients.write')\n client = self.get_client(client_id)\n if not client:\n raise ValueError(\"Must first create client: '%s'\" % client_id)\n if replace:\n changes = {'client_id': client_id, 'scope': scope, 'authorities':\n authorities}\n else:\n changes = {'client_id': client_id}\n if scope:\n changes['scope'] = client['scope']\n changes['scope'].extend(scope)\n if authorities:\n changes['authorities'] = client['authorities']\n changes['authorities'].extend(authorities)\n if grant_types:\n if 'authorization_code' in grant_types and not redirect_uri:\n logging.warning(\n 'A redirect_uri is required for authorization_code.')\n changes['authorized_grant_types'] = client['authorized_grant_types'\n ]\n changes['authorized_grant_types'].extend(grant_types)\n if redirect_uri:\n if 'redirect_uri' in client:\n changes['redirect_uri'] = client['redirect_uri']\n changes['redirect_uri'].extend(redirect_uri)\n else:\n changes['redirect_uri'] = redirect_uri\n uri = self.uri + '/oauth/clients/' + client_id\n headers = {'pragma': 'no-cache', 'Cache-Control': 'no-cache',\n 'Content-Type': 'application/json', 'Accepts': 'application/json',\n 'Authorization': 'Bearer ' + self.get_token()}\n logging.debug('URI=' + str(uri))\n logging.debug('HEADERS=' + str(headers))\n logging.debug('BODY=' + json.dumps(changes))\n response = requests.put(uri, headers=headers, data=json.dumps(changes))\n logging.debug('STATUS=' + str(response.status_code))\n if response.status_code == 200:\n return response\n else:\n logging.error(response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "update_client_grants",
"role": "assistant"
}
] |
def x(self, client_id, read=False, write=False, create=False, userids=False,
zones=False, invite=False, openid=False):
self.assert_has_permission('clients.admin')
perms = []
if read:
perms.append('scim.read')
if write:
perms.append('scim.write')
if create:
perms.append('scim.create')
if userids:
perms.append('scim.userids')
if zones:
perms.append('scim.zones')
if invite:
perms.append('scim.invite')
if openid:
perms.append('openid')
if perms:
self.update_client_grants(client_id, scope=perms, authorities=perms)
|
grant_scim_permissions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, read=False, write=False, create=False, userids=False,\n zones=False, invite=False, openid=False):\n self.assert_has_permission('clients.admin')\n perms = []\n if read:\n perms.append('scim.read')\n if write:\n perms.append('scim.write')\n if create:\n perms.append('scim.create')\n if userids:\n perms.append('scim.userids')\n if zones:\n perms.append('scim.zones')\n if invite:\n perms.append('scim.invite')\n if openid:\n perms.append('openid')\n if perms:\n self.update_client_grants(client_id, scope=perms, authorities=perms)\n",
"role": "user"
},
{
"content": "grant_scim_permissions",
"role": "assistant"
}
] |
def x(self, client_id, client_secret, manifest=None, client_credentials=
True, refresh_token=True, authorization_code=False, redirect_uri=[]):
self.assert_has_permission('clients.admin')
if authorization_code and not redirect_uri:
raise ValueError(
'Must provide a redirect_uri for clients used with authorization_code'
)
client = self.get_client(client_id)
if client:
return client
uri = self.uri + '/oauth/clients'
headers = {'pragma': 'no-cache', 'Cache-Control': 'no-cache',
'Content-Type': 'application/json', 'Accepts': 'application/json',
'Authorization': 'Bearer ' + self.get_token()}
grant_types = []
if client_credentials:
grant_types.append('client_credentials')
if refresh_token:
grant_types.append('refresh_token')
if authorization_code:
grant_types.append('authorization_code')
params = {'client_id': client_id, 'client_secret': client_secret,
'scope': ['uaa.none'], 'authorized_grant_types': grant_types,
'authorities': ['uaa.none'], 'autoapprove': []}
if redirect_uri:
params.append(redirect_uri)
response = requests.post(uri, headers=headers, data=json.dumps(params))
if response.status_code == 201:
if manifest:
self.add_client_to_manifest(client_id, client_secret, manifest)
client = {'id': client_id, 'secret': client_secret}
self._write_to_uaa_cache(client)
return response
else:
logging.error(response.content)
response.raise_for_status()
|
create_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, client_secret, manifest=None, client_credentials=\n True, refresh_token=True, authorization_code=False, redirect_uri=[]):\n self.assert_has_permission('clients.admin')\n if authorization_code and not redirect_uri:\n raise ValueError(\n 'Must provide a redirect_uri for clients used with authorization_code'\n )\n client = self.get_client(client_id)\n if client:\n return client\n uri = self.uri + '/oauth/clients'\n headers = {'pragma': 'no-cache', 'Cache-Control': 'no-cache',\n 'Content-Type': 'application/json', 'Accepts': 'application/json',\n 'Authorization': 'Bearer ' + self.get_token()}\n grant_types = []\n if client_credentials:\n grant_types.append('client_credentials')\n if refresh_token:\n grant_types.append('refresh_token')\n if authorization_code:\n grant_types.append('authorization_code')\n params = {'client_id': client_id, 'client_secret': client_secret,\n 'scope': ['uaa.none'], 'authorized_grant_types': grant_types,\n 'authorities': ['uaa.none'], 'autoapprove': []}\n if redirect_uri:\n params.append(redirect_uri)\n response = requests.post(uri, headers=headers, data=json.dumps(params))\n if response.status_code == 201:\n if manifest:\n self.add_client_to_manifest(client_id, client_secret, manifest)\n client = {'id': client_id, 'secret': client_secret}\n self._write_to_uaa_cache(client)\n return response\n else:\n logging.error(response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "create_client",
"role": "assistant"
}
] |
def x(self, client_id, client_secret, manifest):
client_id_key = 'PREDIX_APP_CLIENT_ID'
manifest.add_env_var(client_id_key, client_id)
client_secret_key = 'PREDIX_APP_CLIENT_SECRET'
manifest.add_env_var(client_secret_key, client_secret)
manifest.write_manifest()
|
add_client_to_manifest
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, client_secret, manifest):\n client_id_key = 'PREDIX_APP_CLIENT_ID'\n manifest.add_env_var(client_id_key, client_id)\n client_secret_key = 'PREDIX_APP_CLIENT_SECRET'\n manifest.add_env_var(client_secret_key, client_secret)\n manifest.write_manifest()\n",
"role": "user"
},
{
"content": "add_client_to_manifest",
"role": "assistant"
}
] |
def x(self, username, password, family_name, given_name, primary_email,
details={}):
self.assert_has_permission('scim.write')
data = {'userName': username, 'password': password, 'name': {
'familyName': family_name, 'givenName': given_name}, 'emails': [{
'value': primary_email, 'primary': True}]}
if details:
data.update(details)
return self._post_user(data)
|
create_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, username, password, family_name, given_name, primary_email,\n details={}):\n self.assert_has_permission('scim.write')\n data = {'userName': username, 'password': password, 'name': {\n 'familyName': family_name, 'givenName': given_name}, 'emails': [{\n 'value': primary_email, 'primary': True}]}\n if details:\n data.update(details)\n return self._post_user(data)\n",
"role": "user"
},
{
"content": "create_user",
"role": "assistant"
}
] |
def x(self, id):
self.assert_has_permission('scim.write')
uri = self.uri + '/Users/%s' % id
headers = self._get_headers()
logging.debug('URI=' + str(uri))
logging.debug('HEADERS=' + str(headers))
response = self.session.delete(uri, headers=headers)
logging.debug('STATUS=' + str(response.status_code))
if response.status_code == 200:
return response
else:
logging.error(response.content)
response.raise_for_status()
|
delete_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, id):\n self.assert_has_permission('scim.write')\n uri = self.uri + '/Users/%s' % id\n headers = self._get_headers()\n logging.debug('URI=' + str(uri))\n logging.debug('HEADERS=' + str(headers))\n response = self.session.delete(uri, headers=headers)\n logging.debug('STATUS=' + str(response.status_code))\n if response.status_code == 200:\n return response\n else:\n logging.error(response.content)\n response.raise_for_status()\n",
"role": "user"
},
{
"content": "delete_user",
"role": "assistant"
}
] |
def x(self, filter=None, sortBy=None, sortOrder=None, startIndex=None,
count=None):
self.assert_has_permission('scim.read')
params = {}
if filter:
params['filter'] = filter
if sortBy:
params['sortBy'] = sortBy
if sortOrder:
params['sortOrder'] = sortOrder
if startIndex:
params['startIndex'] = startIndex
if count:
params['count'] = count
return self._get(self.uri + '/Users', params=params)
|
get_users
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filter=None, sortBy=None, sortOrder=None, startIndex=None,\n count=None):\n self.assert_has_permission('scim.read')\n params = {}\n if filter:\n params['filter'] = filter\n if sortBy:\n params['sortBy'] = sortBy\n if sortOrder:\n params['sortOrder'] = sortOrder\n if startIndex:\n params['startIndex'] = startIndex\n if count:\n params['count'] = count\n return self._get(self.uri + '/Users', params=params)\n",
"role": "user"
},
{
"content": "get_users",
"role": "assistant"
}
] |
def x(self, username):
results = self.get_users(filter='username eq "%s"' % username)
if results['totalResults'] == 0:
logging.warning('Found no matches for given username.')
return
elif results['totalResults'] > 1:
logging.warning('Found %s matches for username %s' % (results[
'totalResults'], username))
return results['resources'][0]
|
get_user_by_username
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, username):\n results = self.get_users(filter='username eq \"%s\"' % username)\n if results['totalResults'] == 0:\n logging.warning('Found no matches for given username.')\n return\n elif results['totalResults'] > 1:\n logging.warning('Found %s matches for username %s' % (results[\n 'totalResults'], username))\n return results['resources'][0]\n",
"role": "user"
},
{
"content": "get_user_by_username",
"role": "assistant"
}
] |
def x(self, email):
results = self.get_users(filter='email eq "%s"' % email)
if results['totalResults'] == 0:
logging.warning('Found no matches for given email.')
return
elif results['totalResults'] > 1:
logging.warning('Found %s matches for email %s' % (results[
'totalResults'], email))
return results['resources'][0]
|
get_user_by_email
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, email):\n results = self.get_users(filter='email eq \"%s\"' % email)\n if results['totalResults'] == 0:\n logging.warning('Found no matches for given email.')\n return\n elif results['totalResults'] > 1:\n logging.warning('Found %s matches for email %s' % (results[\n 'totalResults'], email))\n return results['resources'][0]\n",
"role": "user"
},
{
"content": "get_user_by_email",
"role": "assistant"
}
] |
def x(self, id):
self.assert_has_permission('scim.read')
return self._get(self.uri + '/Users/%s' % id)
|
get_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, id):\n self.assert_has_permission('scim.read')\n return self._get(self.uri + '/Users/%s' % id)\n",
"role": "user"
},
{
"content": "get_user",
"role": "assistant"
}
] |
def x(self):
self.service.create()
predix.config.set_env_value(self.use_class, 'ingest_uri', self.
get_ingest_uri())
predix.config.set_env_value(self.use_class, 'ingest_zone_id', self.
get_ingest_zone_id())
predix.config.set_env_value(self.use_class, 'query_uri', self.
get_query_uri())
predix.config.set_env_value(self.use_class, 'query_zone_id', self.
get_query_zone_id())
|
create
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.service.create()\n predix.config.set_env_value(self.use_class, 'ingest_uri', self.\n get_ingest_uri())\n predix.config.set_env_value(self.use_class, 'ingest_zone_id', self.\n get_ingest_zone_id())\n predix.config.set_env_value(self.use_class, 'query_uri', self.\n get_query_uri())\n predix.config.set_env_value(self.use_class, 'query_zone_id', self.\n get_query_zone_id())\n",
"role": "user"
},
{
"content": "create",
"role": "assistant"
}
] |
def x(self, client_id, read=True, write=True):
scopes = ['openid']
authorities = ['uaa.resource']
if write:
for zone in self.service.settings.data['ingest']['zone-token-scopes']:
scopes.append(zone)
authorities.append(zone)
if read:
for zone in self.service.settings.data['query']['zone-token-scopes']:
scopes.append(zone)
authorities.append(zone)
self.service.uaa.uaac.update_client_grants(client_id, scope=scopes,
authorities=authorities)
return self.service.uaa.uaac.get_client(client_id)
|
grant_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_id, read=True, write=True):\n scopes = ['openid']\n authorities = ['uaa.resource']\n if write:\n for zone in self.service.settings.data['ingest']['zone-token-scopes']:\n scopes.append(zone)\n authorities.append(zone)\n if read:\n for zone in self.service.settings.data['query']['zone-token-scopes']:\n scopes.append(zone)\n authorities.append(zone)\n self.service.uaa.uaac.update_client_grants(client_id, scope=scopes,\n authorities=authorities)\n return self.service.uaa.uaac.get_client(client_id)\n",
"role": "user"
},
{
"content": "grant_client",
"role": "assistant"
}
] |
def x(self):
query_uri = self.service.settings.data['query']['uri']
query_uri = urlparse(query_uri)
return query_uri.scheme + '://' + query_uri.netloc
|
get_query_uri
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n query_uri = self.service.settings.data['query']['uri']\n query_uri = urlparse(query_uri)\n return query_uri.scheme + '://' + query_uri.netloc\n",
"role": "user"
},
{
"content": "get_query_uri",
"role": "assistant"
}
] |
def x(self, manifest):
manifest.add_service(self.service.name)
uri = predix.config.get_env_key(self.use_class, 'ingest_uri')
manifest.add_env_var(uri, self.get_ingest_uri())
zone_id = predix.config.get_env_key(self.use_class, 'ingest_zone_id')
manifest.add_env_var(zone_id, self.get_ingest_zone_id())
uri = predix.config.get_env_key(self.use_class, 'query_uri')
manifest.add_env_var(uri, self.get_query_uri())
zone_id = predix.config.get_env_key(self.use_class, 'query_zone_id')
manifest.add_env_var(zone_id, self.get_query_zone_id())
manifest.write_manifest()
|
add_to_manifest
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, manifest):\n manifest.add_service(self.service.name)\n uri = predix.config.get_env_key(self.use_class, 'ingest_uri')\n manifest.add_env_var(uri, self.get_ingest_uri())\n zone_id = predix.config.get_env_key(self.use_class, 'ingest_zone_id')\n manifest.add_env_var(zone_id, self.get_ingest_zone_id())\n uri = predix.config.get_env_key(self.use_class, 'query_uri')\n manifest.add_env_var(uri, self.get_query_uri())\n zone_id = predix.config.get_env_key(self.use_class, 'query_zone_id')\n manifest.add_env_var(zone_id, self.get_query_zone_id())\n manifest.write_manifest()\n",
"role": "user"
},
{
"content": "add_to_manifest",
"role": "assistant"
}
] |
def x(path):
requirements = []
setup_py = os.path.join(path, 'setup.py')
if os.path.exists(setup_py) and os.path.isfile(setup_py):
try:
requirements = from_setup_py(setup_py)
requirements.sort()
return requirements
except CouldNotParseRequirements:
pass
for reqfile_name in ('requirements.txt', 'requirements.pip'):
reqfile_path = os.path.join(path, reqfile_name)
if os.path.exists(reqfile_path) and os.path.isfile(reqfile_path):
try:
requirements += from_requirements_txt(reqfile_path)
except CouldNotParseRequirements as e:
pass
requirements_dir = os.path.join(path, 'requirements')
if os.path.exists(requirements_dir) and os.path.isdir(requirements_dir):
from_dir = from_requirements_dir(requirements_dir)
if from_dir is not None:
requirements += from_dir
from_blob = from_requirements_blob(path)
if from_blob is not None:
requirements += from_blob
requirements = list(set(requirements))
if len(requirements) > 0:
requirements.sort()
return requirements
raise RequirementsNotFound
|
find_requirements
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path):\n requirements = []\n setup_py = os.path.join(path, 'setup.py')\n if os.path.exists(setup_py) and os.path.isfile(setup_py):\n try:\n requirements = from_setup_py(setup_py)\n requirements.sort()\n return requirements\n except CouldNotParseRequirements:\n pass\n for reqfile_name in ('requirements.txt', 'requirements.pip'):\n reqfile_path = os.path.join(path, reqfile_name)\n if os.path.exists(reqfile_path) and os.path.isfile(reqfile_path):\n try:\n requirements += from_requirements_txt(reqfile_path)\n except CouldNotParseRequirements as e:\n pass\n requirements_dir = os.path.join(path, 'requirements')\n if os.path.exists(requirements_dir) and os.path.isdir(requirements_dir):\n from_dir = from_requirements_dir(requirements_dir)\n if from_dir is not None:\n requirements += from_dir\n from_blob = from_requirements_blob(path)\n if from_blob is not None:\n requirements += from_blob\n requirements = list(set(requirements))\n if len(requirements) > 0:\n requirements.sort()\n return requirements\n raise RequirementsNotFound\n",
"role": "user"
},
{
"content": "find_requirements",
"role": "assistant"
}
] |
def x(self, app_name):
summary = self.space.get_space_summary()
for app in summary['apps']:
if app['name'] == app_name:
return app['guid']
|
get_app_guid
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_name):\n summary = self.space.get_space_summary()\n for app in summary['apps']:\n if app['name'] == app_name:\n return app['guid']\n",
"role": "user"
},
{
"content": "get_app_guid",
"role": "assistant"
}
] |
def x(self, app_name):
if app_name not in self.space.get_apps():
logging.warning('App not found so... succeeded?')
return True
guid = self.get_app_guid(app_name)
self.api.delete('/v2/apps/%s' % guid)
|
delete_app
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_name):\n if app_name not in self.space.get_apps():\n logging.warning('App not found so... succeeded?')\n return True\n guid = self.get_app_guid(app_name)\n self.api.delete('/v2/apps/%s' % guid)\n",
"role": "user"
},
{
"content": "delete_app",
"role": "assistant"
}
] |
def x(self):
if not os.path.exists(self.config_path):
try:
os.makedirs(os.path.dirname(self.config_path))
except OSError as exc:
if exc.errno != errno.EEXIST:
raise
return {}
with open(self.config_path, 'r') as data:
return json.load(data)
|
get_service_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not os.path.exists(self.config_path):\n try:\n os.makedirs(os.path.dirname(self.config_path))\n except OSError as exc:\n if exc.errno != errno.EEXIST:\n raise\n return {}\n with open(self.config_path, 'r') as data:\n return json.load(data)\n",
"role": "user"
},
{
"content": "get_service_config",
"role": "assistant"
}
] |
def x(self):
with open(self.config_path, 'w') as output:
output.write(json.dumps(self.data, sort_keys=True, indent=4))
|
write_service_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n with open(self.config_path, 'w') as output:\n output.write(json.dumps(self.data, sort_keys=True, indent=4))\n",
"role": "user"
},
{
"content": "write_service_config",
"role": "assistant"
}
] |
def x(self, **kwargs):
self.service.create(**kwargs)
predix.config.set_env_value(self.use_class, 'url', self.service.
settings.data['url'])
predix.config.set_env_value(self.use_class, 'access_key_id', self.
service.settings.data['access_key_id'])
predix.config.set_env_value(self.use_class, 'bucket_name', self.service
.settings.data['bucket_name'])
predix.config.set_env_value(self.use_class, 'host', self.service.
settings.data['host'])
predix.config.set_env_value(self.use_class, 'secret_access_key', self.
service.settings.data['secret_access_key'])
|
create
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n self.service.create(**kwargs)\n predix.config.set_env_value(self.use_class, 'url', self.service.\n settings.data['url'])\n predix.config.set_env_value(self.use_class, 'access_key_id', self.\n service.settings.data['access_key_id'])\n predix.config.set_env_value(self.use_class, 'bucket_name', self.service\n .settings.data['bucket_name'])\n predix.config.set_env_value(self.use_class, 'host', self.service.\n settings.data['host'])\n predix.config.set_env_value(self.use_class, 'secret_access_key', self.\n service.settings.data['secret_access_key'])\n",
"role": "user"
},
{
"content": "create",
"role": "assistant"
}
] |
def x(self, manifest):
manifest.add_service(self.service.name)
url = predix.config.get_env_key(self.use_class, 'url')
manifest.add_env_var(url, self.service.settings.data['url'])
akid = predix.config.get_env_key(self.use_class, 'access_key_id')
manifest.add_env_var(akid, self.service.settings.data['access_key_id'])
bucket = predix.config.get_env_key(self.use_class, 'bucket_name')
manifest.add_env_var(bucket, self.service.settings.data['bucket_name'])
host = predix.config.get_env_key(self.use_class, 'host')
manifest.add_env_var(host, self.service.settings.data['host'])
secret_access_key = predix.config.get_env_key(self.use_class,
'secret_access_key')
manifest.add_env_var(secret_access_key, self.service.settings.data[
'secret_access_key'])
manifest.write_manifest()
|
add_to_manifest
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, manifest):\n manifest.add_service(self.service.name)\n url = predix.config.get_env_key(self.use_class, 'url')\n manifest.add_env_var(url, self.service.settings.data['url'])\n akid = predix.config.get_env_key(self.use_class, 'access_key_id')\n manifest.add_env_var(akid, self.service.settings.data['access_key_id'])\n bucket = predix.config.get_env_key(self.use_class, 'bucket_name')\n manifest.add_env_var(bucket, self.service.settings.data['bucket_name'])\n host = predix.config.get_env_key(self.use_class, 'host')\n manifest.add_env_var(host, self.service.settings.data['host'])\n secret_access_key = predix.config.get_env_key(self.use_class,\n 'secret_access_key')\n manifest.add_env_var(secret_access_key, self.service.settings.data[\n 'secret_access_key'])\n manifest.write_manifest()\n",
"role": "user"
},
{
"content": "add_to_manifest",
"role": "assistant"
}
] |
def x(self):
while self.run_subscribe_generator:
if len(self._rx_messages) != 0:
yield self._rx_messages.pop(0)
return
|
subscribe
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n while self.run_subscribe_generator:\n if len(self._rx_messages) != 0:\n yield self._rx_messages.pop(0)\n return\n",
"role": "user"
},
{
"content": "subscribe",
"role": "assistant"
}
] |
def x(self, message):
if isinstance(message, EventHub_pb2.Message):
ack = EventHub_pb2.Ack(partition=message.partition, offset=message.
offset)
self.grpc_manager.send_message(EventHub_pb2.SubscriptionResponse(
ack=ack))
elif isinstance(message, EventHub_pb2.SubscriptionMessage):
acks = []
for m in message.messages:
acks.append(EventHub_pb2.Ack(parition=m.partition, offset=m.offset)
)
self.grpc_manager.send_message(EventHub_pb2.SubscriptionAcks(ack=acks))
|
send_acks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, message):\n if isinstance(message, EventHub_pb2.Message):\n ack = EventHub_pb2.Ack(partition=message.partition, offset=message.\n offset)\n self.grpc_manager.send_message(EventHub_pb2.SubscriptionResponse(\n ack=ack))\n elif isinstance(message, EventHub_pb2.SubscriptionMessage):\n acks = []\n for m in message.messages:\n acks.append(EventHub_pb2.Ack(parition=m.partition, offset=m.offset)\n )\n self.grpc_manager.send_message(EventHub_pb2.SubscriptionAcks(ack=acks))\n",
"role": "user"
},
{
"content": "send_acks",
"role": "assistant"
}
] |
def x(self):
headers = []
headers.append(('predix-zone-id', self.eventhub_client.zone_id))
token = self.eventhub_client.service._get_bearer_token()
headers.append(('subscribername', self._config.subscriber_name))
headers.append(('authorization', token[token.index(' ') + 1:]))
if self._config.topics is []:
headers.append(('topic', self.eventhub_client.zone_id + '_topic'))
else:
for topic in self._config.topics:
headers.append(('topic', topic))
headers.append(('offset-newest', str(self._config.recency == self.
_config.Recency.NEWEST).lower()))
headers.append(('acks', str(self._config.acks_enabled).lower()))
if self._config.acks_enabled:
headers.append(('max-retries', str(self._config.ack_max_retries)))
headers.append(('retry-interval', str(self._config.
ack_retry_interval_seconds) + 's'))
headers.append(('duration-before-retry', str(self._config.
ack_duration_before_retry_seconds) + 's'))
if self._config.batching_enabled:
headers.append(('batch-size', str(self._config.batch_size)))
headers.append(('batch-interval', str(self._config.
batch_interval_millis) + 'ms'))
return headers
|
generate_subscribe_headers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n headers = []\n headers.append(('predix-zone-id', self.eventhub_client.zone_id))\n token = self.eventhub_client.service._get_bearer_token()\n headers.append(('subscribername', self._config.subscriber_name))\n headers.append(('authorization', token[token.index(' ') + 1:]))\n if self._config.topics is []:\n headers.append(('topic', self.eventhub_client.zone_id + '_topic'))\n else:\n for topic in self._config.topics:\n headers.append(('topic', topic))\n headers.append(('offset-newest', str(self._config.recency == self.\n _config.Recency.NEWEST).lower()))\n headers.append(('acks', str(self._config.acks_enabled).lower()))\n if self._config.acks_enabled:\n headers.append(('max-retries', str(self._config.ack_max_retries)))\n headers.append(('retry-interval', str(self._config.\n ack_retry_interval_seconds) + 's'))\n headers.append(('duration-before-retry', str(self._config.\n ack_duration_before_retry_seconds) + 's'))\n if self._config.batching_enabled:\n headers.append(('batch-size', str(self._config.batch_size)))\n headers.append(('batch-interval', str(self._config.\n batch_interval_millis) + 'ms'))\n return headers\n",
"role": "user"
},
{
"content": "generate_subscribe_headers",
"role": "assistant"
}
] |
def x(self, bbox, size=None, page=None, asset_type=None, device_type=None,
event_type=None, media_type=None):
uri = self.uri + '/v1/assets/search'
headers = self._get_headers()
params = {'bbox': bbox}
params['q'] = []
if device_type:
if isinstance(device_type, str):
device_type = [device_type]
for device in device_type:
if device not in self.DEVICE_TYPES:
logging.warning('Invalid device type: %s' % device)
params['q'].append('device-type:%s' % device)
if asset_type:
if isinstance(asset_type, str):
asset_type = [asset_type]
for asset in asset_type:
if asset not in self.ASSET_TYPES:
logging.warning('Invalid asset type: %s' % asset)
params['q'].append('assetType:%s' % asset)
if media_type:
if isinstance(media_type, str):
media_type = [media_type]
for media in media_type:
if media not in self.MEDIA_TYPES:
logging.warning('Invalid media type: %s' % media)
params['q'].append('mediaType:%s' % media)
if event_type:
if isinstance(event_type, str):
event_type = [event_type]
for event in event_type:
if event not in self.EVENT_TYPES:
logging.warning('Invalid event type: %s' % event)
params['q'].append('eventTypes:%s' % event)
if size:
params['size'] = size
if page:
params['page'] = page
return self.service._get(uri, params=params, headers=headers)
|
get_assets
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, bbox, size=None, page=None, asset_type=None, device_type=None,\n event_type=None, media_type=None):\n uri = self.uri + '/v1/assets/search'\n headers = self._get_headers()\n params = {'bbox': bbox}\n params['q'] = []\n if device_type:\n if isinstance(device_type, str):\n device_type = [device_type]\n for device in device_type:\n if device not in self.DEVICE_TYPES:\n logging.warning('Invalid device type: %s' % device)\n params['q'].append('device-type:%s' % device)\n if asset_type:\n if isinstance(asset_type, str):\n asset_type = [asset_type]\n for asset in asset_type:\n if asset not in self.ASSET_TYPES:\n logging.warning('Invalid asset type: %s' % asset)\n params['q'].append('assetType:%s' % asset)\n if media_type:\n if isinstance(media_type, str):\n media_type = [media_type]\n for media in media_type:\n if media not in self.MEDIA_TYPES:\n logging.warning('Invalid media type: %s' % media)\n params['q'].append('mediaType:%s' % media)\n if event_type:\n if isinstance(event_type, str):\n event_type = [event_type]\n for event in event_type:\n if event not in self.EVENT_TYPES:\n logging.warning('Invalid event type: %s' % event)\n params['q'].append('eventTypes:%s' % event)\n if size:\n params['size'] = size\n if page:\n params['page'] = page\n return self.service._get(uri, params=params, headers=headers)\n",
"role": "user"
},
{
"content": "get_assets",
"role": "assistant"
}
] |
def x(self, bbox, **kwargs):
response = self._get_assets(bbox, **kwargs)
assets = []
for asset in response['_embedded']['assets']:
asset_url = asset['_links']['self']
uid = asset_url['href'].split('/')[-1]
asset['uid'] = uid
del asset['_links']
assets.append(asset)
return assets
|
get_assets
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, bbox, **kwargs):\n response = self._get_assets(bbox, **kwargs)\n assets = []\n for asset in response['_embedded']['assets']:\n asset_url = asset['_links']['self']\n uid = asset_url['href'].split('/')[-1]\n asset['uid'] = uid\n del asset['_links']\n assets.append(asset)\n return assets\n",
"role": "user"
},
{
"content": "get_assets",
"role": "assistant"
}
] |
def x(self, asset_uid):
uri = self.uri + '/v2/assets/' + asset_uid
headers = self._get_headers()
return self.service._get(uri, headers=headers)
|
get_asset
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, asset_uid):\n uri = self.uri + '/v2/assets/' + asset_uid\n headers = self._get_headers()\n return self.service._get(uri, headers=headers)\n",
"role": "user"
},
{
"content": "get_asset",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.