source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(cmd, output, name):
formatted = '.. code-block:: console\n\n'
formatted += ' (venv)$ {c}\n'.format(c=cmd)
lines = output.split('\n')
if name != 'help':
for idx, line in enumerate(lines):
if len(line) > 100:
lines[idx] = line[:100] + ' (...)'
if len(lines) > 12:
tmp_lines = lines[:5] + ['(...)'] + lines[-5:]
if ' -l' in cmd or ' --list-defaults' in cmd:
api_line = None
none_line = None
for line in lines:
if '(API)' in line:
api_line = line
break
for line in lines:
if line.strip().endswith('None'):
none_line = line
break
tmp_lines = lines[:5]
if api_line not in tmp_lines and api_line is not None:
tmp_lines = tmp_lines + ['(...)'] + [api_line]
if none_line not in tmp_lines and none_line is not None:
tmp_lines = tmp_lines + ['(...)'] + [none_line]
tmp_lines = tmp_lines + ['(...)'] + lines[-5:]
lines = tmp_lines
for line in lines:
if line.strip() == '':
continue
formatted += ' ' + line + '\n'
formatted += '\n'
return formatted
| format_cmd_output | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cmd, output, name):\n formatted = '.. code-block:: console\\n\\n'\n formatted += ' (venv)$ {c}\\n'.format(c=cmd)\n lines = output.split('\\n')\n if name != 'help':\n for idx, line in enumerate(lines):\n if len(line) > 100:\n lines[idx] = line[:100] + ' (...)'\n if len(lines) > 12:\n tmp_lines = lines[:5] + ['(...)'] + lines[-5:]\n if ' -l' in cmd or ' --list-defaults' in cmd:\n api_line = None\n none_line = None\n for line in lines:\n if '(API)' in line:\n api_line = line\n break\n for line in lines:\n if line.strip().endswith('None'):\n none_line = line\n break\n tmp_lines = lines[:5]\n if api_line not in tmp_lines and api_line is not None:\n tmp_lines = tmp_lines + ['(...)'] + [api_line]\n if none_line not in tmp_lines and none_line is not None:\n tmp_lines = tmp_lines + ['(...)'] + [none_line]\n tmp_lines = tmp_lines + ['(...)'] + lines[-5:]\n lines = tmp_lines\n for line in lines:\n if line.strip() == '':\n continue\n formatted += ' ' + line + '\\n'\n formatted += '\\n'\n return formatted\n",
"role": "user"
},
{
"content": "format_cmd_output",
"role": "assistant"
}
] |
def x():
if os.environ.get('CI', None) is not None:
print('Not building dynamic docs in CI environment')
raise SystemExit(0)
region = os.environ.get('AWS_DEFAULT_REGION', None)
if region is None:
raise SystemExit('ERROR: Please export AWS_DEFAULT_REGION')
logger.info('Beginning build of dynamically-generated docs')
logger.info('Instantiating AwsLimitChecker')
c = AwsLimitChecker(region=region)
build_iam_policy(c)
build_limits(c)
build_runner_examples()
| build_docs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if os.environ.get('CI', None) is not None:\n print('Not building dynamic docs in CI environment')\n raise SystemExit(0)\n region = os.environ.get('AWS_DEFAULT_REGION', None)\n if region is None:\n raise SystemExit('ERROR: Please export AWS_DEFAULT_REGION')\n logger.info('Beginning build of dynamically-generated docs')\n logger.info('Instantiating AwsLimitChecker')\n c = AwsLimitChecker(region=region)\n build_iam_policy(c)\n build_limits(c)\n build_runner_examples()\n",
"role": "user"
},
{
"content": "build_docs",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
self.connect()
for lim in self.limits.values():
lim._reset_usage()
self._find_usage_vpcs()
subnet_to_az = self._find_usage_subnets()
self._find_usage_ACLs()
self._find_usage_route_tables()
self._find_usage_gateways()
self._find_usage_nat_gateways(subnet_to_az)
self._find_usages_vpn_gateways()
self._find_usage_network_interfaces()
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_vpcs()\n subnet_to_az = self._find_usage_subnets()\n self._find_usage_ACLs()\n self._find_usage_route_tables()\n self._find_usage_gateways()\n self._find_usage_nat_gateways(subnet_to_az)\n self._find_usages_vpn_gateways()\n self._find_usage_network_interfaces()\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
vpcs = self.conn.describe_vpcs()
self.limits['VPCs']._add_current_usage(len(vpcs['Vpcs']), aws_type=
'AWS::EC2::VPC')
| find_usage_vpcs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vpcs = self.conn.describe_vpcs()\n self.limits['VPCs']._add_current_usage(len(vpcs['Vpcs']), aws_type=\n 'AWS::EC2::VPC')\n",
"role": "user"
},
{
"content": "find_usage_vpcs",
"role": "assistant"
}
] |
def x(self):
subnet_to_az = {}
subnets = defaultdict(int)
for subnet in self.conn.describe_subnets()['Subnets']:
subnets[subnet['VpcId']] += 1
subnet_to_az[subnet['SubnetId']] = subnet['AvailabilityZone']
for vpc_id in subnets:
self.limits['Subnets per VPC']._add_current_usage(subnets[vpc_id],
aws_type='AWS::EC2::VPC', resource_id=vpc_id)
return subnet_to_az
| find_usage_subnets | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n subnet_to_az = {}\n subnets = defaultdict(int)\n for subnet in self.conn.describe_subnets()['Subnets']:\n subnets[subnet['VpcId']] += 1\n subnet_to_az[subnet['SubnetId']] = subnet['AvailabilityZone']\n for vpc_id in subnets:\n self.limits['Subnets per VPC']._add_current_usage(subnets[vpc_id],\n aws_type='AWS::EC2::VPC', resource_id=vpc_id)\n return subnet_to_az\n",
"role": "user"
},
{
"content": "find_usage_subnets",
"role": "assistant"
}
] |
def x(self):
acls = defaultdict(int)
for acl in self.conn.describe_network_acls()['NetworkAcls']:
acls[acl['VpcId']] += 1
self.limits['Rules per network ACL']._add_current_usage(len(acl[
'Entries']), aws_type='AWS::EC2::NetworkAcl', resource_id=acl[
'NetworkAclId'])
for vpc_id in acls:
self.limits['Network ACLs per VPC']._add_current_usage(acls[vpc_id],
aws_type='AWS::EC2::VPC', resource_id=vpc_id)
| find_usage_ACLs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n acls = defaultdict(int)\n for acl in self.conn.describe_network_acls()['NetworkAcls']:\n acls[acl['VpcId']] += 1\n self.limits['Rules per network ACL']._add_current_usage(len(acl[\n 'Entries']), aws_type='AWS::EC2::NetworkAcl', resource_id=acl[\n 'NetworkAclId'])\n for vpc_id in acls:\n self.limits['Network ACLs per VPC']._add_current_usage(acls[vpc_id],\n aws_type='AWS::EC2::VPC', resource_id=vpc_id)\n",
"role": "user"
},
{
"content": "find_usage_ACLs",
"role": "assistant"
}
] |
def x(self):
tables = defaultdict(int)
for table in self.conn.describe_route_tables()['RouteTables']:
tables[table['VpcId']] += 1
routes = [r for r in table['Routes'] if r['Origin'] !=
'EnableVgwRoutePropagation']
self.limits['Entries per route table']._add_current_usage(len(
routes), aws_type='AWS::EC2::RouteTable', resource_id=table[
'RouteTableId'])
for vpc_id in tables:
self.limits['Route tables per VPC']._add_current_usage(tables[
vpc_id], aws_type='AWS::EC2::VPC', resource_id=vpc_id)
| find_usage_route_tables | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n tables = defaultdict(int)\n for table in self.conn.describe_route_tables()['RouteTables']:\n tables[table['VpcId']] += 1\n routes = [r for r in table['Routes'] if r['Origin'] !=\n 'EnableVgwRoutePropagation']\n self.limits['Entries per route table']._add_current_usage(len(\n routes), aws_type='AWS::EC2::RouteTable', resource_id=table[\n 'RouteTableId'])\n for vpc_id in tables:\n self.limits['Route tables per VPC']._add_current_usage(tables[\n vpc_id], aws_type='AWS::EC2::VPC', resource_id=vpc_id)\n",
"role": "user"
},
{
"content": "find_usage_route_tables",
"role": "assistant"
}
] |
def x(self):
gws = self.conn.describe_internet_gateways()
self.limits['Internet gateways']._add_current_usage(len(gws[
'InternetGateways']), aws_type='AWS::EC2::InternetGateway')
| find_usage_gateways | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n gws = self.conn.describe_internet_gateways()\n self.limits['Internet gateways']._add_current_usage(len(gws[\n 'InternetGateways']), aws_type='AWS::EC2::InternetGateway')\n",
"role": "user"
},
{
"content": "find_usage_gateways",
"role": "assistant"
}
] |
def x(self, subnet_to_az):
try:
gws_per_az = defaultdict(int)
for gw in paginate_dict(self.conn.describe_nat_gateways,
alc_marker_path=['NextToken'], alc_data_path=['NatGateways'],
alc_marker_param='NextToken')['NatGateways']:
if gw['State'] not in ['pending', 'available']:
logger.debug('Skipping NAT Gateway %s in state: %s', gw[
'NatGatewayId'], gw['State'])
continue
if gw['SubnetId'] not in subnet_to_az:
logger.error(
'ERROR: NAT Gateway %s in SubnetId %s, but SubnetId not found in subnet_to_az; Gateway cannot be counted!'
, gw['NatGatewayId'], gw['SubnetId'])
continue
gws_per_az[subnet_to_az[gw['SubnetId']]] += 1
for az in sorted(gws_per_az.keys()):
self.limits['NAT Gateways per AZ']._add_current_usage(gws_per_az
[az], resource_id=az, aws_type='AWS::EC2::NatGateway')
except ClientError:
logger.error(
'Caught exception when trying to list NAT Gateways; perhaps NAT service does not exist in this region?'
, exc_info=1)
| find_usage_nat_gateways | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, subnet_to_az):\n try:\n gws_per_az = defaultdict(int)\n for gw in paginate_dict(self.conn.describe_nat_gateways,\n alc_marker_path=['NextToken'], alc_data_path=['NatGateways'],\n alc_marker_param='NextToken')['NatGateways']:\n if gw['State'] not in ['pending', 'available']:\n logger.debug('Skipping NAT Gateway %s in state: %s', gw[\n 'NatGatewayId'], gw['State'])\n continue\n if gw['SubnetId'] not in subnet_to_az:\n logger.error(\n 'ERROR: NAT Gateway %s in SubnetId %s, but SubnetId not found in subnet_to_az; Gateway cannot be counted!'\n , gw['NatGatewayId'], gw['SubnetId'])\n continue\n gws_per_az[subnet_to_az[gw['SubnetId']]] += 1\n for az in sorted(gws_per_az.keys()):\n self.limits['NAT Gateways per AZ']._add_current_usage(gws_per_az\n [az], resource_id=az, aws_type='AWS::EC2::NatGateway')\n except ClientError:\n logger.error(\n 'Caught exception when trying to list NAT Gateways; perhaps NAT service does not exist in this region?'\n , exc_info=1)\n",
"role": "user"
},
{
"content": "find_usage_nat_gateways",
"role": "assistant"
}
] |
def x(self):
vpngws = self.conn.describe_vpn_gateways(Filters=[{'Name': 'state',
'Values': ['available', 'pending']}])['VpnGateways']
self.limits['Virtual private gateways']._add_current_usage(len(vpngws),
aws_type='AWS::EC2::VPNGateway')
| find_usages_vpn_gateways | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vpngws = self.conn.describe_vpn_gateways(Filters=[{'Name': 'state',\n 'Values': ['available', 'pending']}])['VpnGateways']\n self.limits['Virtual private gateways']._add_current_usage(len(vpngws),\n aws_type='AWS::EC2::VPNGateway')\n",
"role": "user"
},
{
"content": "find_usages_vpn_gateways",
"role": "assistant"
}
] |
def x(self):
enis = paginate_dict(self.conn.describe_network_interfaces,
alc_marker_path=['NextToken'], alc_data_path=['NetworkInterfaces'],
alc_marker_param='NextToken')
self.limits['Network interfaces per Region']._add_current_usage(len(
enis['NetworkInterfaces']), aws_type='AWS::EC2::NetworkInterface')
| find_usage_network_interfaces | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n enis = paginate_dict(self.conn.describe_network_interfaces,\n alc_marker_path=['NextToken'], alc_data_path=['NetworkInterfaces'],\n alc_marker_param='NextToken')\n self.limits['Network interfaces per Region']._add_current_usage(len(\n enis['NetworkInterfaces']), aws_type='AWS::EC2::NetworkInterface')\n",
"role": "user"
},
{
"content": "find_usage_network_interfaces",
"role": "assistant"
}
] |
def x(self):
self.connect()
self.connect_resource()
logger.info('Querying EC2 DescribeAccountAttributes for limits')
attribs = self.conn.describe_account_attributes()
for attrib in attribs['AccountAttributes']:
if attrib['AttributeName'] == 'max-instances':
val = attrib['AttributeValues'][0]['AttributeValue']
if int(val) * 5 > DEFAULT_ENI_LIMIT:
limit_name = 'Network interfaces per Region'
self.limits[limit_name]._set_api_limit(int(val) * 5)
logger.debug('Done setting limits from API')
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.connect()\n self.connect_resource()\n logger.info('Querying EC2 DescribeAccountAttributes for limits')\n attribs = self.conn.describe_account_attributes()\n for attrib in attribs['AccountAttributes']:\n if attrib['AttributeName'] == 'max-instances':\n val = attrib['AttributeValues'][0]['AttributeValue']\n if int(val) * 5 > DEFAULT_ENI_LIMIT:\n limit_name = 'Network interfaces per Region'\n self.limits[limit_name]._set_api_limit(int(val) * 5)\n logger.debug('Done setting limits from API')\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
self.connect()
for lim in self.limits.values():
lim._reset_usage()
resp = self.conn.get_directory_limits()
directory_limits = resp['DirectoryLimits']
self.limits['CloudOnlyDirectories']._add_current_usage(directory_limits
['CloudOnlyDirectoriesCurrentCount'], aws_type='AWS::DirectoryService')
self.limits['CloudOnlyMicrosoftAD']._add_current_usage(directory_limits
['CloudOnlyMicrosoftADCurrentCount'], aws_type='AWS::DirectoryService')
self.limits['ConnectedDirectories']._add_current_usage(directory_limits
['ConnectedDirectoriesCurrentCount'], aws_type='AWS::DirectoryService')
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n resp = self.conn.get_directory_limits()\n directory_limits = resp['DirectoryLimits']\n self.limits['CloudOnlyDirectories']._add_current_usage(directory_limits\n ['CloudOnlyDirectoriesCurrentCount'], aws_type='AWS::DirectoryService')\n self.limits['CloudOnlyMicrosoftAD']._add_current_usage(directory_limits\n ['CloudOnlyMicrosoftADCurrentCount'], aws_type='AWS::DirectoryService')\n self.limits['ConnectedDirectories']._add_current_usage(directory_limits\n ['ConnectedDirectoriesCurrentCount'], aws_type='AWS::DirectoryService')\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
logger.debug('Setting DirectoryService limits from API')
self.connect()
resp = self.conn.get_directory_limits()
directory_limits = resp['DirectoryLimits']
self.limits['CloudOnlyDirectories']._set_api_limit(directory_limits[
'CloudOnlyDirectoriesLimit'])
self.limits['CloudOnlyMicrosoftAD']._set_api_limit(directory_limits[
'CloudOnlyMicrosoftADLimit'])
self.limits['ConnectedDirectories']._set_api_limit(directory_limits[
'ConnectedDirectoriesLimit'])
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Setting DirectoryService limits from API')\n self.connect()\n resp = self.conn.get_directory_limits()\n directory_limits = resp['DirectoryLimits']\n self.limits['CloudOnlyDirectories']._set_api_limit(directory_limits[\n 'CloudOnlyDirectoriesLimit'])\n self.limits['CloudOnlyMicrosoftAD']._set_api_limit(directory_limits[\n 'CloudOnlyMicrosoftADLimit'])\n self.limits['ConnectedDirectories']._set_api_limit(directory_limits[\n 'ConnectedDirectoriesLimit'])\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(self):
ignore_statuses = ['DELETE_COMPLETE']
logger.debug('Checking usage for service %s', self.service_name)
self.connect()
for lim in self.limits.values():
lim._reset_usage()
count = 0
paginator = self.conn.get_paginator('describe_stacks')
iter = paginator.paginate()
for page in iter:
for stk in page['Stacks']:
if stk['StackStatus'] not in ignore_statuses:
count += 1
self.limits['Stacks']._add_current_usage(count, aws_type=
'AWS::CloudFormation::Stack')
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n ignore_statuses = ['DELETE_COMPLETE']\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n count = 0\n paginator = self.conn.get_paginator('describe_stacks')\n iter = paginator.paginate()\n for page in iter:\n for stk in page['Stacks']:\n if stk['StackStatus'] not in ignore_statuses:\n count += 1\n self.limits['Stacks']._add_current_usage(count, aws_type=\n 'AWS::CloudFormation::Stack')\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
logger.debug('Setting CloudFormation limits from API')
self.connect()
resp = self.conn.describe_account_limits()
for lim in resp['AccountLimits']:
if lim['Name'] == 'StackLimit':
self.limits['Stacks']._set_api_limit(lim['Value'])
continue
logger.debug('API response contained unknown CloudFormation limit: %s',
lim['Name'])
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Setting CloudFormation limits from API')\n self.connect()\n resp = self.conn.describe_account_limits()\n for lim in resp['AccountLimits']:\n if lim['Name'] == 'StackLimit':\n self.limits['Stacks']._set_api_limit(lim['Value'])\n continue\n logger.debug('API response contained unknown CloudFormation limit: %s',\n lim['Name'])\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(self, limit_value, override_ta=True):
self.limit_override = limit_value
self.override_ta = override_ta
| set_limit_override | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, limit_value, override_ta=True):\n self.limit_override = limit_value\n self.override_ta = override_ta\n",
"role": "user"
},
{
"content": "set_limit_override",
"role": "assistant"
}
] |
def x(self):
if self.limit_override is not None and (self.override_ta is True or
self.ta_limit is None and self.ta_unlimited is False):
return SOURCE_OVERRIDE
if self.api_limit is not None:
return SOURCE_API
if self.ta_limit is not None or self.ta_unlimited is True:
return SOURCE_TA
return SOURCE_DEFAULT
| get_limit_source | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.limit_override is not None and (self.override_ta is True or \n self.ta_limit is None and self.ta_unlimited is False):\n return SOURCE_OVERRIDE\n if self.api_limit is not None:\n return SOURCE_API\n if self.ta_limit is not None or self.ta_unlimited is True:\n return SOURCE_TA\n return SOURCE_DEFAULT\n",
"role": "user"
},
{
"content": "get_limit_source",
"role": "assistant"
}
] |
def x(self):
limit_type = self.get_limit_source()
if limit_type == SOURCE_OVERRIDE:
return self.limit_override
elif limit_type == SOURCE_API:
return self.api_limit
elif limit_type == SOURCE_TA:
if self.ta_unlimited is True:
return None
return self.ta_limit
return self.default_limit
| get_limit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n limit_type = self.get_limit_source()\n if limit_type == SOURCE_OVERRIDE:\n return self.limit_override\n elif limit_type == SOURCE_API:\n return self.api_limit\n elif limit_type == SOURCE_TA:\n if self.ta_unlimited is True:\n return None\n return self.ta_limit\n return self.default_limit\n",
"role": "user"
},
{
"content": "get_limit",
"role": "assistant"
}
] |
def x(self):
if len(self._current_usage) == 0:
return '<unknown>'
if len(self._current_usage) == 1:
return str(self._current_usage[0])
lim_str = ', '.join([str(x) for x in sorted(self._current_usage)])
s = 'max: {m} ({l})'.format(m=str(max(self._current_usage)), l=lim_str)
return s
| get_current_usage_str | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if len(self._current_usage) == 0:\n return '<unknown>'\n if len(self._current_usage) == 1:\n return str(self._current_usage[0])\n lim_str = ', '.join([str(x) for x in sorted(self._current_usage)])\n s = 'max: {m} ({l})'.format(m=str(max(self._current_usage)), l=lim_str)\n return s\n",
"role": "user"
},
{
"content": "get_current_usage_str",
"role": "assistant"
}
] |
def x(self, value, maximum=None, resource_id=None, aws_type=None):
self._current_usage.append(AwsLimitUsage(self, value, maximum=maximum,
resource_id=resource_id, aws_type=aws_type))
| add_current_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, value, maximum=None, resource_id=None, aws_type=None):\n self._current_usage.append(AwsLimitUsage(self, value, maximum=maximum,\n resource_id=resource_id, aws_type=aws_type))\n",
"role": "user"
},
{
"content": "add_current_usage",
"role": "assistant"
}
] |
def x(self):
t = (self.warn_count, self.warn_percent or self.def_warning_threshold,
self.crit_count, self.crit_percent or self.def_critical_threshold)
return t
| get_thresholds | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n t = (self.warn_count, self.warn_percent or self.def_warning_threshold,\n self.crit_count, self.crit_percent or self.def_critical_threshold)\n return t\n",
"role": "user"
},
{
"content": "get_thresholds",
"role": "assistant"
}
] |
def x(self, warn_percent=None, warn_count=None, crit_percent=None,
crit_count=None):
self.warn_percent = warn_percent
self.warn_count = warn_count
self.crit_percent = crit_percent
self.crit_count = crit_count
| set_threshold_override | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, warn_percent=None, warn_count=None, crit_percent=None,\n crit_count=None):\n self.warn_percent = warn_percent\n self.warn_count = warn_count\n self.crit_percent = crit_percent\n self.crit_count = crit_count\n",
"role": "user"
},
{
"content": "set_threshold_override",
"role": "assistant"
}
] |
def x(self):
warn_int, warn_pct, crit_int, crit_pct = self._get_thresholds()
all_ok = True
for u in self._current_usage:
usage = u.get_value()
limit = u.get_maximum() or self.get_limit()
if limit is None:
continue
pct = usage / (limit * 1.0) * 100
if crit_int is not None and usage >= crit_int:
self._criticals.append(u)
all_ok = False
elif pct >= crit_pct:
self._criticals.append(u)
all_ok = False
elif warn_int is not None and usage >= warn_int:
self._warnings.append(u)
all_ok = False
elif pct >= warn_pct:
self._warnings.append(u)
all_ok = False
return all_ok
| check_thresholds | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n warn_int, warn_pct, crit_int, crit_pct = self._get_thresholds()\n all_ok = True\n for u in self._current_usage:\n usage = u.get_value()\n limit = u.get_maximum() or self.get_limit()\n if limit is None:\n continue\n pct = usage / (limit * 1.0) * 100\n if crit_int is not None and usage >= crit_int:\n self._criticals.append(u)\n all_ok = False\n elif pct >= crit_pct:\n self._criticals.append(u)\n all_ok = False\n elif warn_int is not None and usage >= warn_int:\n self._warnings.append(u)\n all_ok = False\n elif pct >= warn_pct:\n self._warnings.append(u)\n all_ok = False\n return all_ok\n",
"role": "user"
},
{
"content": "check_thresholds",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
self.connect()
for lim in self.limits.values():
lim._reset_usage()
self._find_usage_nodes()
self._find_usage_subnet_groups()
self._find_usage_parameter_groups()
self._find_usage_security_groups()
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_nodes()\n self._find_usage_subnet_groups()\n self._find_usage_parameter_groups()\n self._find_usage_security_groups()\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
nodes = 0
paginator = self.conn.get_paginator('describe_cache_clusters')
for page in paginator.paginate(ShowCacheNodeInfo=True):
for cluster in page['CacheClusters']:
try:
num_nodes = len(cluster['CacheNodes'])
except (IndexError, TypeError, KeyError):
logger.debug(
"Cache Cluster '%s' returned dict with CacheNodes None",
cluster['CacheClusterId'])
num_nodes = cluster['NumCacheNodes']
nodes += num_nodes
if cluster['Engine'] == 'memcached':
self.limits['Nodes per Cluster']._add_current_usage(num_nodes,
aws_type='AWS::ElastiCache::CacheCluster', resource_id=
cluster['CacheClusterId'])
self.limits['Nodes']._add_current_usage(nodes, aws_type=
'AWS::ElastiCache::CacheNode')
| find_usage_nodes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n nodes = 0\n paginator = self.conn.get_paginator('describe_cache_clusters')\n for page in paginator.paginate(ShowCacheNodeInfo=True):\n for cluster in page['CacheClusters']:\n try:\n num_nodes = len(cluster['CacheNodes'])\n except (IndexError, TypeError, KeyError):\n logger.debug(\n \"Cache Cluster '%s' returned dict with CacheNodes None\",\n cluster['CacheClusterId'])\n num_nodes = cluster['NumCacheNodes']\n nodes += num_nodes\n if cluster['Engine'] == 'memcached':\n self.limits['Nodes per Cluster']._add_current_usage(num_nodes,\n aws_type='AWS::ElastiCache::CacheCluster', resource_id=\n cluster['CacheClusterId'])\n self.limits['Nodes']._add_current_usage(nodes, aws_type=\n 'AWS::ElastiCache::CacheNode')\n",
"role": "user"
},
{
"content": "find_usage_nodes",
"role": "assistant"
}
] |
def x(self):
num_groups = 0
paginator = self.conn.get_paginator('describe_cache_parameter_groups')
for page in paginator.paginate():
for group in page['CacheParameterGroups']:
num_groups += 1
self.limits['Parameter Groups']._add_current_usage(num_groups, aws_type
='AWS::ElastiCache::ParameterGroup')
| find_usage_parameter_groups | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n num_groups = 0\n paginator = self.conn.get_paginator('describe_cache_parameter_groups')\n for page in paginator.paginate():\n for group in page['CacheParameterGroups']:\n num_groups += 1\n self.limits['Parameter Groups']._add_current_usage(num_groups, aws_type\n ='AWS::ElastiCache::ParameterGroup')\n",
"role": "user"
},
{
"content": "find_usage_parameter_groups",
"role": "assistant"
}
] |
def x(self):
num_groups = 0
try:
paginator = self.conn.get_paginator('describe_cache_security_groups')
for page in paginator.paginate():
for secgroup in page['CacheSecurityGroups']:
num_groups += 1
except ClientError as ex:
if ex.response['Error']['Code'] != 'InvalidParameterValue':
raise ex
logger.debug(
'caught ClientError checking ElastiCache security groups (account without EC2-Classic?)'
)
self.limits['Security Groups']._add_current_usage(num_groups, aws_type=
'WS::ElastiCache::SecurityGroup')
| find_usage_security_groups | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n num_groups = 0\n try:\n paginator = self.conn.get_paginator('describe_cache_security_groups')\n for page in paginator.paginate():\n for secgroup in page['CacheSecurityGroups']:\n num_groups += 1\n except ClientError as ex:\n if ex.response['Error']['Code'] != 'InvalidParameterValue':\n raise ex\n logger.debug(\n 'caught ClientError checking ElastiCache security groups (account without EC2-Classic?)'\n )\n self.limits['Security Groups']._add_current_usage(num_groups, aws_type=\n 'WS::ElastiCache::SecurityGroup')\n",
"role": "user"
},
{
"content": "find_usage_security_groups",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
for lim in self.limits.values():
lim._reset_usage()
self._update_limits_from_api()
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n for lim in self.limits.values():\n lim._reset_usage()\n self._update_limits_from_api()\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
if self.limits != {}:
return self.limits
limits = {}
limits['Groups'] = AwsLimit('Groups', self, 300, self.warning_threshold,
self.critical_threshold, limit_type='AWS::IAM::Group')
limits['Users'] = AwsLimit('Users', self, 5000, self.warning_threshold,
self.critical_threshold, limit_type='AWS::IAM::User')
limits['Roles'] = AwsLimit('Roles', self, 1000, self.warning_threshold,
self.critical_threshold, limit_type='AWS::IAM::Role')
limits['Instance profiles'] = AwsLimit('Instance profiles', self, 1000,
self.warning_threshold, self.critical_threshold, limit_type=
'AWS::IAM::InstanceProfile')
limits['Server certificates'] = AwsLimit('Server certificates', self,
20, self.warning_threshold, self.critical_threshold, limit_type=
'AWS::IAM::ServerCertificate')
limits['Policies'] = AwsLimit('Policies', self, 1500, self.
warning_threshold, self.critical_threshold, limit_type=
'AWS::IAM::Policy')
limits['Policy Versions In Use'] = AwsLimit('Policy Versions In Use',
self, 10000, self.warning_threshold, self.critical_threshold,
limit_type='AWS::IAM::ServerCertificate')
self.limits = limits
return limits
| get_limits | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.limits != {}:\n return self.limits\n limits = {}\n limits['Groups'] = AwsLimit('Groups', self, 300, self.warning_threshold,\n self.critical_threshold, limit_type='AWS::IAM::Group')\n limits['Users'] = AwsLimit('Users', self, 5000, self.warning_threshold,\n self.critical_threshold, limit_type='AWS::IAM::User')\n limits['Roles'] = AwsLimit('Roles', self, 1000, self.warning_threshold,\n self.critical_threshold, limit_type='AWS::IAM::Role')\n limits['Instance profiles'] = AwsLimit('Instance profiles', self, 1000,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::IAM::InstanceProfile')\n limits['Server certificates'] = AwsLimit('Server certificates', self, \n 20, self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::IAM::ServerCertificate')\n limits['Policies'] = AwsLimit('Policies', self, 1500, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::IAM::Policy')\n limits['Policy Versions In Use'] = AwsLimit('Policy Versions In Use',\n self, 10000, self.warning_threshold, self.critical_threshold,\n limit_type='AWS::IAM::ServerCertificate')\n self.limits = limits\n return limits\n",
"role": "user"
},
{
"content": "get_limits",
"role": "assistant"
}
] |
def x(self):
self.connect_resource()
summary = self.resource_conn.AccountSummary()
for k, v in sorted(summary.summary_map.items()):
if k in self.API_TO_LIMIT_NAME:
lname = self.API_TO_LIMIT_NAME[k]
self.limits[lname]._add_current_usage(v)
elif k.endswith('Quota') and k[:-5] in self.API_TO_LIMIT_NAME:
lname = self.API_TO_LIMIT_NAME[k[:-5]]
self.limits[lname]._set_api_limit(v)
else:
logger.debug('Ignoring IAM AccountSummary attribute: %s', k)
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.connect_resource()\n summary = self.resource_conn.AccountSummary()\n for k, v in sorted(summary.summary_map.items()):\n if k in self.API_TO_LIMIT_NAME:\n lname = self.API_TO_LIMIT_NAME[k]\n self.limits[lname]._add_current_usage(v)\n elif k.endswith('Quota') and k[:-5] in self.API_TO_LIMIT_NAME:\n lname = self.API_TO_LIMIT_NAME[k[:-5]]\n self.limits[lname]._set_api_limit(v)\n else:\n logger.debug('Ignoring IAM AccountSummary attribute: %s', k)\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(self, argv):
desc = (
'Report on AWS service limits and usage via boto3, optionally warn about any services with usage nearing or exceeding their limits. For further help, see <http://awslimitchecker.readthedocs.org/>'
)
epilog = (
'awslimitchecker is AGPLv3-licensed Free Software. Anyone using this program, even remotely over a network, is entitled to a copy of the source code. Use `--version` for information on the source code location.'
)
p = argparse.ArgumentParser(description=desc, epilog=epilog)
p.add_argument('-S', '--service', action='store', nargs='*', help=
'perform action for only the specified service name; see -s|--list-services for valid names'
)
p.add_argument('--skip-service', action='append', default=[], dest=
'skip_service', help=
'avoid performing actions for the specified service name; see -s|--list-services for valid names'
)
p.add_argument('--skip-check', action='append', default=[], dest=
'skip_check', help=
'avoid performing actions for the specified check name')
p.add_argument('-s', '--list-services', action='store_true', default=
False, help=
'print a list of all AWS service types that awslimitchecker knows how to check'
)
p.add_argument('-l', '--list-limits', action='store_true', default=
False, help=
'print all AWS effective limits in "service_name/limit_name" format')
p.add_argument('--list-defaults', action='store_true', default=False,
help='print all AWS default limits in "service_name/limit_name" format'
)
p.add_argument('-L', '--limit', action=StoreKeyValuePair, help=
'override a single AWS limit, specified in "service_name/limit_name=value" format; can be specified multiple times.'
)
p.add_argument('-u', '--show-usage', action='store_true', default=False,
help=
'find and print the current usage of all AWS services with known limits'
)
p.add_argument('--iam-policy', action='store_true', default=False, help
=
'output a JSON serialized IAM Policy listing the required permissions for awslimitchecker to run correctly.'
)
p.add_argument('-W', '--warning-threshold', action='store', type=int,
default=80, help=
'default warning threshold (percentage of limit); default: 80')
p.add_argument('-C', '--critical-threshold', action='store', type=int,
default=99, help=
'default critical threshold (percentage of limit); default: 99')
p.add_argument('-P', '--profile', action='store', dest='profile_name',
type=str, default=None, help=
'Name of profile in the AWS cross-sdk credentials file to use credentials from; similar to the corresponding awscli option'
)
p.add_argument('-A', '--sts-account-id', action='store', type=str,
default=None, help=
'for use with STS, the Account ID of the destination account (account to assume a role in)'
)
p.add_argument('-R', '--sts-account-role', action='store', type=str,
default=None, help=
'for use with STS, the name of the IAM role to assume')
p.add_argument('-E', '--external-id', action='store', type=str, default
=None, help='External ID to use when assuming a role via STS')
p.add_argument('-M', '--mfa-serial-number', action='store', type=str,
default=None, help=
'MFA Serial Number to use when assuming a role via STS')
p.add_argument('-T', '--mfa-token', action='store', type=str, default=
None, help='MFA Token to use when assuming a role via STS')
p.add_argument('-r', '--region', action='store', type=str, default=None,
help='AWS region name to connect to; required for STS')
p.add_argument('--skip-ta', action='store_true', default=False, help=
'do not attempt to pull *any* information on limits from Trusted Advisor'
)
g = p.add_mutually_exclusive_group()
g.add_argument('--ta-refresh-wait', dest='ta_refresh_wait', action=
'store_true', default=False, help=
'If applicable, refresh all Trusted Advisor limit-related checks, and wait for the refresh to complete before continuing.'
)
g.add_argument('--ta-refresh-trigger', dest='ta_refresh_trigger',
action='store_true', default=False, help=
'If applicable, trigger refreshes for all Trusted Advisor limit-related checks, but do not wait for them to finish refreshing; trigger the refresh and continue on (useful to ensure checks are refreshed before the next scheduled run).'
)
g.add_argument('--ta-refresh-older', dest='ta_refresh_older', action=
'store', type=int, default=None, help=
'If applicable, trigger refreshes for all Trusted Advisor limit-related checks with results more than this number of seconds old. Wait for the refresh to complete before continuing.'
)
p.add_argument('--ta-refresh-timeout', dest='ta_refresh_timeout', type=
int, action='store', default=None, help=
'If waiting for TA checks to refresh, wait up to this number of seconds before continuing on anyway.'
)
p.add_argument('--no-color', action='store_true', default=False, help=
'do not colorize output')
p.add_argument('--no-check-version', action='store_false', default=True,
dest='check_version', help='do not check latest version at startup')
p.add_argument('-v', '--verbose', dest='verbose', action='count',
default=0, help='verbose output. specify twice for debug-level output.'
)
p.add_argument('-V', '--version', dest='version', action='store_true',
default=False, help='print version number and exit.')
args = p.parse_args(argv)
args.ta_refresh_mode = None
if args.ta_refresh_wait:
args.ta_refresh_mode = 'wait'
elif args.ta_refresh_trigger:
args.ta_refresh_mode = 'trigger'
elif args.ta_refresh_older is not None:
args.ta_refresh_mode = args.ta_refresh_older
return args
| parse_args | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, argv):\n desc = (\n 'Report on AWS service limits and usage via boto3, optionally warn about any services with usage nearing or exceeding their limits. For further help, see <http://awslimitchecker.readthedocs.org/>'\n )\n epilog = (\n 'awslimitchecker is AGPLv3-licensed Free Software. Anyone using this program, even remotely over a network, is entitled to a copy of the source code. Use `--version` for information on the source code location.'\n )\n p = argparse.ArgumentParser(description=desc, epilog=epilog)\n p.add_argument('-S', '--service', action='store', nargs='*', help=\n 'perform action for only the specified service name; see -s|--list-services for valid names'\n )\n p.add_argument('--skip-service', action='append', default=[], dest=\n 'skip_service', help=\n 'avoid performing actions for the specified service name; see -s|--list-services for valid names'\n )\n p.add_argument('--skip-check', action='append', default=[], dest=\n 'skip_check', help=\n 'avoid performing actions for the specified check name')\n p.add_argument('-s', '--list-services', action='store_true', default=\n False, help=\n 'print a list of all AWS service types that awslimitchecker knows how to check'\n )\n p.add_argument('-l', '--list-limits', action='store_true', default=\n False, help=\n 'print all AWS effective limits in \"service_name/limit_name\" format')\n p.add_argument('--list-defaults', action='store_true', default=False,\n help='print all AWS default limits in \"service_name/limit_name\" format'\n )\n p.add_argument('-L', '--limit', action=StoreKeyValuePair, help=\n 'override a single AWS limit, specified in \"service_name/limit_name=value\" format; can be specified multiple times.'\n )\n p.add_argument('-u', '--show-usage', action='store_true', default=False,\n help=\n 'find and print the current usage of all AWS services with known limits'\n )\n p.add_argument('--iam-policy', action='store_true', default=False, help\n =\n 'output a JSON serialized IAM Policy listing the required permissions for awslimitchecker to run correctly.'\n )\n p.add_argument('-W', '--warning-threshold', action='store', type=int,\n default=80, help=\n 'default warning threshold (percentage of limit); default: 80')\n p.add_argument('-C', '--critical-threshold', action='store', type=int,\n default=99, help=\n 'default critical threshold (percentage of limit); default: 99')\n p.add_argument('-P', '--profile', action='store', dest='profile_name',\n type=str, default=None, help=\n 'Name of profile in the AWS cross-sdk credentials file to use credentials from; similar to the corresponding awscli option'\n )\n p.add_argument('-A', '--sts-account-id', action='store', type=str,\n default=None, help=\n 'for use with STS, the Account ID of the destination account (account to assume a role in)'\n )\n p.add_argument('-R', '--sts-account-role', action='store', type=str,\n default=None, help=\n 'for use with STS, the name of the IAM role to assume')\n p.add_argument('-E', '--external-id', action='store', type=str, default\n =None, help='External ID to use when assuming a role via STS')\n p.add_argument('-M', '--mfa-serial-number', action='store', type=str,\n default=None, help=\n 'MFA Serial Number to use when assuming a role via STS')\n p.add_argument('-T', '--mfa-token', action='store', type=str, default=\n None, help='MFA Token to use when assuming a role via STS')\n p.add_argument('-r', '--region', action='store', type=str, default=None,\n help='AWS region name to connect to; required for STS')\n p.add_argument('--skip-ta', action='store_true', default=False, help=\n 'do not attempt to pull *any* information on limits from Trusted Advisor'\n )\n g = p.add_mutually_exclusive_group()\n g.add_argument('--ta-refresh-wait', dest='ta_refresh_wait', action=\n 'store_true', default=False, help=\n 'If applicable, refresh all Trusted Advisor limit-related checks, and wait for the refresh to complete before continuing.'\n )\n g.add_argument('--ta-refresh-trigger', dest='ta_refresh_trigger',\n action='store_true', default=False, help=\n 'If applicable, trigger refreshes for all Trusted Advisor limit-related checks, but do not wait for them to finish refreshing; trigger the refresh and continue on (useful to ensure checks are refreshed before the next scheduled run).'\n )\n g.add_argument('--ta-refresh-older', dest='ta_refresh_older', action=\n 'store', type=int, default=None, help=\n 'If applicable, trigger refreshes for all Trusted Advisor limit-related checks with results more than this number of seconds old. Wait for the refresh to complete before continuing.'\n )\n p.add_argument('--ta-refresh-timeout', dest='ta_refresh_timeout', type=\n int, action='store', default=None, help=\n 'If waiting for TA checks to refresh, wait up to this number of seconds before continuing on anyway.'\n )\n p.add_argument('--no-color', action='store_true', default=False, help=\n 'do not colorize output')\n p.add_argument('--no-check-version', action='store_false', default=True,\n dest='check_version', help='do not check latest version at startup')\n p.add_argument('-v', '--verbose', dest='verbose', action='count',\n default=0, help='verbose output. specify twice for debug-level output.'\n )\n p.add_argument('-V', '--version', dest='version', action='store_true',\n default=False, help='print version number and exit.')\n args = p.parse_args(argv)\n args.ta_refresh_mode = None\n if args.ta_refresh_wait:\n args.ta_refresh_mode = 'wait'\n elif args.ta_refresh_trigger:\n args.ta_refresh_mode = 'trigger'\n elif args.ta_refresh_older is not None:\n args.ta_refresh_mode = args.ta_refresh_older\n return args\n",
"role": "user"
},
{
"content": "parse_args",
"role": "assistant"
}
] |
def x(self, service_name, limit, crits, warns):
usage_str = ''
if len(crits) > 0:
tmp = 'CRITICAL: '
tmp += ', '.join([str(x) for x in sorted(crits)])
usage_str += self.color_output(tmp, 'red')
if len(warns) > 0:
if len(crits) > 0:
usage_str += ' '
tmp = 'WARNING: '
tmp += ', '.join([str(x) for x in sorted(warns)])
usage_str += self.color_output(tmp, 'yellow')
k = '{s}/{l}'.format(s=service_name, l=limit.name)
v = '(limit {v}) {u}'.format(v=limit.get_limit(), u=usage_str)
return k, v
| print_issue | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, service_name, limit, crits, warns):\n usage_str = ''\n if len(crits) > 0:\n tmp = 'CRITICAL: '\n tmp += ', '.join([str(x) for x in sorted(crits)])\n usage_str += self.color_output(tmp, 'red')\n if len(warns) > 0:\n if len(crits) > 0:\n usage_str += ' '\n tmp = 'WARNING: '\n tmp += ', '.join([str(x) for x in sorted(warns)])\n usage_str += self.color_output(tmp, 'yellow')\n k = '{s}/{l}'.format(s=service_name, l=limit.name)\n v = '(limit {v}) {u}'.format(v=limit.get_limit(), u=usage_str)\n return k, v\n",
"role": "user"
},
{
"content": "print_issue",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
for lim in self.limits.values():
lim._reset_usage()
elb_usage = self._find_usage_elbv1()
alb_usage = self._find_usage_elbv2()
logger.debug('ELBs in use: %d, ALBs in use: %d', elb_usage, alb_usage)
self.limits['Active load balancers']._add_current_usage(elb_usage +
alb_usage, aws_type='AWS::ElasticLoadBalancing::LoadBalancer')
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n for lim in self.limits.values():\n lim._reset_usage()\n elb_usage = self._find_usage_elbv1()\n alb_usage = self._find_usage_elbv2()\n logger.debug('ELBs in use: %d, ALBs in use: %d', elb_usage, alb_usage)\n self.limits['Active load balancers']._add_current_usage(elb_usage +\n alb_usage, aws_type='AWS::ElasticLoadBalancing::LoadBalancer')\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for ELBv1')
self.connect()
lbs = paginate_dict(self.conn.describe_load_balancers, alc_marker_path=
['NextMarker'], alc_data_path=['LoadBalancerDescriptions'],
alc_marker_param='Marker')
for lb in lbs['LoadBalancerDescriptions']:
self.limits['Listeners per load balancer']._add_current_usage(len(
lb['ListenerDescriptions']), aws_type=
'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[
'LoadBalancerName'])
self.limits['Registered instances per load balancer'
]._add_current_usage(len(lb['Instances']), aws_type=
'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[
'LoadBalancerName'])
logger.debug('Done with ELBv1 usage')
return len(lbs['LoadBalancerDescriptions'])
| find_usage_elbv1 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for ELBv1')\n self.connect()\n lbs = paginate_dict(self.conn.describe_load_balancers, alc_marker_path=\n ['NextMarker'], alc_data_path=['LoadBalancerDescriptions'],\n alc_marker_param='Marker')\n for lb in lbs['LoadBalancerDescriptions']:\n self.limits['Listeners per load balancer']._add_current_usage(len(\n lb['ListenerDescriptions']), aws_type=\n 'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[\n 'LoadBalancerName'])\n self.limits['Registered instances per load balancer'\n ]._add_current_usage(len(lb['Instances']), aws_type=\n 'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[\n 'LoadBalancerName'])\n logger.debug('Done with ELBv1 usage')\n return len(lbs['LoadBalancerDescriptions'])\n",
"role": "user"
},
{
"content": "find_usage_elbv1",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for ELBv2')
conn2 = client('elbv2', config=Config(retries={'max_attempts':
ELBV2_MAX_RETRY_ATTEMPTS}), **self._boto3_connection_kwargs)
logger.debug(
'Connected to %s in region %s (with max retry attempts overridden to %d)'
, 'elbv2', conn2._client_config.region_name, ELBV2_MAX_RETRY_ATTEMPTS)
tgroups = paginate_dict(conn2.describe_target_groups, alc_marker_path=[
'NextMarker'], alc_data_path=['TargetGroups'], alc_marker_param=
'Marker')
self.limits['Target groups']._add_current_usage(len(tgroups[
'TargetGroups']), aws_type='AWS::ElasticLoadBalancingV2::TargetGroup')
lbs = paginate_dict(conn2.describe_load_balancers, alc_marker_path=[
'NextMarker'], alc_data_path=['LoadBalancers'], alc_marker_param=
'Marker')
logger.debug('Checking usage for each of %d ALBs', len(lbs[
'LoadBalancers']))
alb_count = 0
nlb_count = 0
for lb in lbs['LoadBalancers']:
if lb.get('Type') == 'network':
nlb_count += 1
else:
alb_count += 1
self._update_usage_for_alb(conn2, lb['LoadBalancerArn'], lb[
'LoadBalancerName'])
self.limits['Network load balancers']._add_current_usage(nlb_count,
aws_type='AWS::ElasticLoadBalancing::NetworkLoadBalancer')
logger.debug('Done with ELBv2 usage')
return alb_count
| find_usage_elbv2 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for ELBv2')\n conn2 = client('elbv2', config=Config(retries={'max_attempts':\n ELBV2_MAX_RETRY_ATTEMPTS}), **self._boto3_connection_kwargs)\n logger.debug(\n 'Connected to %s in region %s (with max retry attempts overridden to %d)'\n , 'elbv2', conn2._client_config.region_name, ELBV2_MAX_RETRY_ATTEMPTS)\n tgroups = paginate_dict(conn2.describe_target_groups, alc_marker_path=[\n 'NextMarker'], alc_data_path=['TargetGroups'], alc_marker_param=\n 'Marker')\n self.limits['Target groups']._add_current_usage(len(tgroups[\n 'TargetGroups']), aws_type='AWS::ElasticLoadBalancingV2::TargetGroup')\n lbs = paginate_dict(conn2.describe_load_balancers, alc_marker_path=[\n 'NextMarker'], alc_data_path=['LoadBalancers'], alc_marker_param=\n 'Marker')\n logger.debug('Checking usage for each of %d ALBs', len(lbs[\n 'LoadBalancers']))\n alb_count = 0\n nlb_count = 0\n for lb in lbs['LoadBalancers']:\n if lb.get('Type') == 'network':\n nlb_count += 1\n else:\n alb_count += 1\n self._update_usage_for_alb(conn2, lb['LoadBalancerArn'], lb[\n 'LoadBalancerName'])\n self.limits['Network load balancers']._add_current_usage(nlb_count,\n aws_type='AWS::ElasticLoadBalancing::NetworkLoadBalancer')\n logger.debug('Done with ELBv2 usage')\n return alb_count\n",
"role": "user"
},
{
"content": "find_usage_elbv2",
"role": "assistant"
}
] |
def x(self, conn, alb_arn, alb_name):
logger.debug('Updating usage for ALB %s', alb_arn)
listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn=
alb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners'
], alc_marker_param='Marker')['Listeners']
num_rules = 0
num_certs = 0
for l in listeners:
certs = [x for x in l.get('Certificates', []) if x.get('IsDefault',
False) is False]
num_certs += len(certs)
rules = paginate_dict(conn.describe_rules, ListenerArn=l[
'ListenerArn'], alc_marker_path=['NextMarker'], alc_data_path=[
'Rules'], alc_marker_param='Marker')['Rules']
num_rules += len(rules)
self.limits['Listeners per application load balancer']._add_current_usage(
len(listeners), aws_type=
'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name)
self.limits['Rules per application load balancer']._add_current_usage(
num_rules, aws_type='AWS::ElasticLoadBalancingV2::LoadBalancer',
resource_id=alb_name)
self.limits['Certificates per application load balancer'
]._add_current_usage(num_certs, aws_type=
'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name)
| update_usage_for_alb | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, conn, alb_arn, alb_name):\n logger.debug('Updating usage for ALB %s', alb_arn)\n listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn=\n alb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners'\n ], alc_marker_param='Marker')['Listeners']\n num_rules = 0\n num_certs = 0\n for l in listeners:\n certs = [x for x in l.get('Certificates', []) if x.get('IsDefault',\n False) is False]\n num_certs += len(certs)\n rules = paginate_dict(conn.describe_rules, ListenerArn=l[\n 'ListenerArn'], alc_marker_path=['NextMarker'], alc_data_path=[\n 'Rules'], alc_marker_param='Marker')['Rules']\n num_rules += len(rules)\n self.limits['Listeners per application load balancer']._add_current_usage(\n len(listeners), aws_type=\n 'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name)\n self.limits['Rules per application load balancer']._add_current_usage(\n num_rules, aws_type='AWS::ElasticLoadBalancingV2::LoadBalancer',\n resource_id=alb_name)\n self.limits['Certificates per application load balancer'\n ]._add_current_usage(num_certs, aws_type=\n 'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name)\n",
"role": "user"
},
{
"content": "update_usage_for_alb",
"role": "assistant"
}
] |
def x(self, conn, nlb_arn, nlb_name):
logger.debug('Updating usage for NLB %s', nlb_arn)
listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn=
nlb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners'
], alc_marker_param='Marker')['Listeners']
self.limits['Listeners per network load balancer']._add_current_usage(len
(listeners), aws_type=
'AWS::ElasticLoadBalancingV2::NetworkLoadBalancer', resource_id=
nlb_name)
| update_usage_for_nlb | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, conn, nlb_arn, nlb_name):\n logger.debug('Updating usage for NLB %s', nlb_arn)\n listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn=\n nlb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners'\n ], alc_marker_param='Marker')['Listeners']\n self.limits['Listeners per network load balancer']._add_current_usage(len\n (listeners), aws_type=\n 'AWS::ElasticLoadBalancingV2::NetworkLoadBalancer', resource_id=\n nlb_name)\n",
"role": "user"
},
{
"content": "update_usage_for_nlb",
"role": "assistant"
}
] |
def x(self):
self.connect()
logger.debug('Querying ELB DescribeAccountLimits for limits')
attribs = self.conn.describe_account_limits()
name_to_limits = {'classic-load-balancers': 'Active load balancers',
'classic-listeners': 'Listeners per load balancer',
'classic-registered-instances':
'Registered instances per load balancer'}
for attrib in attribs['Limits']:
if int(attrib.get('Max', 0)) == 0:
continue
name = attrib.get('Name', 'unknown')
if name not in name_to_limits:
continue
self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max']))
self.conn2 = client('elbv2', **self._boto3_connection_kwargs)
logger.debug('Connected to %s in region %s', 'elbv2', self.conn2.
_client_config.region_name)
logger.debug('Querying ELBv2 (ALB) DescribeAccountLimits for limits')
attribs = self.conn2.describe_account_limits()
name_to_limits = {'target-groups': 'Target groups',
'listeners-per-application-load-balancer':
'Listeners per application load balancer',
'rules-per-application-load-balancer':
'Rules per application load balancer', 'network-load-balancers':
'Network load balancers', 'listeners-per-network-load-balancer':
'Listeners per network load balancer'}
for attrib in attribs['Limits']:
if int(attrib.get('Max', 0)) == 0:
continue
name = attrib.get('Name', 'unknown')
if name not in name_to_limits:
continue
self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max']))
logger.debug('Done setting limits from API')
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.connect()\n logger.debug('Querying ELB DescribeAccountLimits for limits')\n attribs = self.conn.describe_account_limits()\n name_to_limits = {'classic-load-balancers': 'Active load balancers',\n 'classic-listeners': 'Listeners per load balancer',\n 'classic-registered-instances':\n 'Registered instances per load balancer'}\n for attrib in attribs['Limits']:\n if int(attrib.get('Max', 0)) == 0:\n continue\n name = attrib.get('Name', 'unknown')\n if name not in name_to_limits:\n continue\n self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max']))\n self.conn2 = client('elbv2', **self._boto3_connection_kwargs)\n logger.debug('Connected to %s in region %s', 'elbv2', self.conn2.\n _client_config.region_name)\n logger.debug('Querying ELBv2 (ALB) DescribeAccountLimits for limits')\n attribs = self.conn2.describe_account_limits()\n name_to_limits = {'target-groups': 'Target groups',\n 'listeners-per-application-load-balancer':\n 'Listeners per application load balancer',\n 'rules-per-application-load-balancer':\n 'Rules per application load balancer', 'network-load-balancers':\n 'Network load balancers', 'listeners-per-network-load-balancer':\n 'Listeners per network load balancer'}\n for attrib in attribs['Limits']:\n if int(attrib.get('Max', 0)) == 0:\n continue\n name = attrib.get('Name', 'unknown')\n if name not in name_to_limits:\n continue\n self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max']))\n logger.debug('Done setting limits from API')\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(d, spaces=2, separator=' '):
if len(d) == 0:
return ''
s = ''
maxlen = max([len(k) for k in d.keys()])
fmt_str = '{k:' + separator + '<' + str(maxlen + spaces) + '}{v}\n'
for k in sorted(d.keys()):
s += fmt_str.format(k=k, v=d[k])
return s
| dict2cols | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(d, spaces=2, separator=' '):\n if len(d) == 0:\n return ''\n s = ''\n maxlen = max([len(k) for k in d.keys()])\n fmt_str = '{k:' + separator + '<' + str(maxlen + spaces) + '}{v}\\n'\n for k in sorted(d.keys()):\n s += fmt_str.format(k=k, v=d[k])\n return s\n",
"role": "user"
},
{
"content": "dict2cols",
"role": "assistant"
}
] |
def x(function_ref, *argv, **kwargs):
if 'alc_marker_path' not in kwargs:
raise Exception(
'alc_marker_path must be specified for queries that return a dict.'
)
if 'alc_data_path' not in kwargs:
raise Exception(
'alc_data_path must be specified for queries that return a dict.')
if 'alc_marker_param' not in kwargs:
raise Exception(
'alc_marker_param must be specified for queries that return a dict.'
)
marker_path = kwargs['alc_marker_path']
data_path = kwargs['alc_data_path']
marker_param = kwargs['alc_marker_param']
pass_kwargs = {}
for k, v in kwargs.items():
if not k.startswith('alc_'):
pass_kwargs[k] = v
result = function_ref(*argv, **pass_kwargs)
marker = _get_dict_value_by_path(result, marker_path)
if marker is None:
return result
logger.debug('Found marker (%s) in result; iterating for more results',
marker_path)
results = []
results.extend(_get_dict_value_by_path(result, data_path))
while marker is not None:
logger.debug('Querying %s with %s=%s', function_ref, marker_param,
marker)
pass_kwargs[marker_param] = marker
result = function_ref(*argv, **pass_kwargs)
data = _get_dict_value_by_path(result, data_path)
results.extend(data)
marker = _get_dict_value_by_path(result, marker_path)
res = _set_dict_value_by_path(result, results, data_path)
return res
| paginate_dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(function_ref, *argv, **kwargs):\n if 'alc_marker_path' not in kwargs:\n raise Exception(\n 'alc_marker_path must be specified for queries that return a dict.'\n )\n if 'alc_data_path' not in kwargs:\n raise Exception(\n 'alc_data_path must be specified for queries that return a dict.')\n if 'alc_marker_param' not in kwargs:\n raise Exception(\n 'alc_marker_param must be specified for queries that return a dict.'\n )\n marker_path = kwargs['alc_marker_path']\n data_path = kwargs['alc_data_path']\n marker_param = kwargs['alc_marker_param']\n pass_kwargs = {}\n for k, v in kwargs.items():\n if not k.startswith('alc_'):\n pass_kwargs[k] = v\n result = function_ref(*argv, **pass_kwargs)\n marker = _get_dict_value_by_path(result, marker_path)\n if marker is None:\n return result\n logger.debug('Found marker (%s) in result; iterating for more results',\n marker_path)\n results = []\n results.extend(_get_dict_value_by_path(result, data_path))\n while marker is not None:\n logger.debug('Querying %s with %s=%s', function_ref, marker_param,\n marker)\n pass_kwargs[marker_param] = marker\n result = function_ref(*argv, **pass_kwargs)\n data = _get_dict_value_by_path(result, data_path)\n results.extend(data)\n marker = _get_dict_value_by_path(result, marker_path)\n res = _set_dict_value_by_path(result, results, data_path)\n return res\n",
"role": "user"
},
{
"content": "paginate_dict",
"role": "assistant"
}
] |
def x(d, path):
tmp_path = deepcopy(path)
try:
while len(tmp_path) > 0:
k = tmp_path.pop(0)
d = d[k]
return d
except:
return None
| get_dict_value_by_path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(d, path):\n tmp_path = deepcopy(path)\n try:\n while len(tmp_path) > 0:\n k = tmp_path.pop(0)\n d = d[k]\n return d\n except:\n return None\n",
"role": "user"
},
{
"content": "get_dict_value_by_path",
"role": "assistant"
}
] |
def x(d, val, path):
tmp_path = deepcopy(path)
tmp_d = deepcopy(d)
result = tmp_d
while len(tmp_path) > 0:
if len(tmp_path) == 1:
result[tmp_path[0]] = val
break
k = tmp_path.pop(0)
result = result[k]
return tmp_d
| set_dict_value_by_path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(d, val, path):\n tmp_path = deepcopy(path)\n tmp_d = deepcopy(d)\n result = tmp_d\n while len(tmp_path) > 0:\n if len(tmp_path) == 1:\n result[tmp_path[0]] = val\n break\n k = tmp_path.pop(0)\n result = result[k]\n return tmp_d\n",
"role": "user"
},
{
"content": "set_dict_value_by_path",
"role": "assistant"
}
] |
def x(self):
kwargs = {'region_name': self.region}
if self.account_id is not None:
logger.debug(
"Connecting for account %s role '%s' with STS (region: %s)",
self.account_id, self.account_role, self.region)
credentials = self._get_sts_token()
kwargs['aws_access_key_id'] = credentials.access_key
kwargs['aws_secret_access_key'] = credentials.secret_key
kwargs['aws_session_token'] = credentials.session_token
elif self.profile_name is not None:
logger.debug('Using credentials profile: %s', self.profile_name)
session = boto3.Session(profile_name=self.profile_name)
credentials = session._session.get_credentials()
kwargs['aws_access_key_id'] = credentials.access_key
kwargs['aws_secret_access_key'] = credentials.secret_key
kwargs['aws_session_token'] = credentials.token
else:
logger.debug('Connecting to region %s', self.region)
return kwargs
| boto_conn_kwargs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n kwargs = {'region_name': self.region}\n if self.account_id is not None:\n logger.debug(\n \"Connecting for account %s role '%s' with STS (region: %s)\",\n self.account_id, self.account_role, self.region)\n credentials = self._get_sts_token()\n kwargs['aws_access_key_id'] = credentials.access_key\n kwargs['aws_secret_access_key'] = credentials.secret_key\n kwargs['aws_session_token'] = credentials.session_token\n elif self.profile_name is not None:\n logger.debug('Using credentials profile: %s', self.profile_name)\n session = boto3.Session(profile_name=self.profile_name)\n credentials = session._session.get_credentials()\n kwargs['aws_access_key_id'] = credentials.access_key\n kwargs['aws_secret_access_key'] = credentials.secret_key\n kwargs['aws_session_token'] = credentials.token\n else:\n logger.debug('Connecting to region %s', self.region)\n return kwargs\n",
"role": "user"
},
{
"content": "boto_conn_kwargs",
"role": "assistant"
}
] |
def x(self, services_to_remove=[]):
for sname in services_to_remove:
logger.warning('Skipping service: %s', sname)
self.services.pop(sname, None)
| remove_services | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, services_to_remove=[]):\n for sname in services_to_remove:\n logger.warning('Skipping service: %s', sname)\n self.services.pop(sname, None)\n",
"role": "user"
},
{
"content": "remove_services",
"role": "assistant"
}
] |
def x(self):
logger.debug('Connecting to STS in region %s', self.region)
sts = boto3.client('sts', region_name=self.region)
arn = 'arn:aws:iam::%s:role/%s' % (self.account_id, self.account_role)
logger.debug('STS assume role for %s', arn)
assume_kwargs = {'RoleArn': arn, 'RoleSessionName': 'awslimitchecker'}
if self.external_id is not None:
assume_kwargs['ExternalId'] = self.external_id
if self.mfa_serial_number is not None:
assume_kwargs['SerialNumber'] = self.mfa_serial_number
if self.mfa_token is not None:
assume_kwargs['TokenCode'] = self.mfa_token
role = sts.assume_role(**assume_kwargs)
creds = ConnectableCredentials(role)
creds.account_id = self.account_id
logger.debug(
'Got STS credentials for role; access_key_id=%s (account_id=%s)',
creds.access_key, creds.account_id)
return creds
| get_sts_token | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Connecting to STS in region %s', self.region)\n sts = boto3.client('sts', region_name=self.region)\n arn = 'arn:aws:iam::%s:role/%s' % (self.account_id, self.account_role)\n logger.debug('STS assume role for %s', arn)\n assume_kwargs = {'RoleArn': arn, 'RoleSessionName': 'awslimitchecker'}\n if self.external_id is not None:\n assume_kwargs['ExternalId'] = self.external_id\n if self.mfa_serial_number is not None:\n assume_kwargs['SerialNumber'] = self.mfa_serial_number\n if self.mfa_token is not None:\n assume_kwargs['TokenCode'] = self.mfa_token\n role = sts.assume_role(**assume_kwargs)\n creds = ConnectableCredentials(role)\n creds.account_id = self.account_id\n logger.debug(\n 'Got STS credentials for role; access_key_id=%s (account_id=%s)',\n creds.access_key, creds.account_id)\n return creds\n",
"role": "user"
},
{
"content": "get_sts_token",
"role": "assistant"
}
] |
def x(self, service=None, use_ta=True):
to_get = self.services
if service is not None:
to_get = dict((each, self.services[each]) for each in service)
if use_ta:
self.ta.update_limits()
for cls in to_get.values():
if hasattr(cls, '_update_limits_from_api'):
cls._update_limits_from_api()
logger.debug('Finding usage for service: %s', cls.service_name)
cls.find_usage()
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, service=None, use_ta=True):\n to_get = self.services\n if service is not None:\n to_get = dict((each, self.services[each]) for each in service)\n if use_ta:\n self.ta.update_limits()\n for cls in to_get.values():\n if hasattr(cls, '_update_limits_from_api'):\n cls._update_limits_from_api()\n logger.debug('Finding usage for service: %s', cls.service_name)\n cls.find_usage()\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self, override_dict, override_ta=True):
for svc_name in override_dict:
for lim_name in override_dict[svc_name]:
self.services[svc_name].set_limit_override(lim_name,
override_dict[svc_name][lim_name], override_ta=override_ta)
| set_limit_overrides | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, override_dict, override_ta=True):\n for svc_name in override_dict:\n for lim_name in override_dict[svc_name]:\n self.services[svc_name].set_limit_override(lim_name,\n override_dict[svc_name][lim_name], override_ta=override_ta)\n",
"role": "user"
},
{
"content": "set_limit_overrides",
"role": "assistant"
}
] |
def x(self, service_name, limit_name, value, override_ta=True):
self.services[service_name].set_limit_override(limit_name, value,
override_ta=override_ta)
| set_limit_override | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, service_name, limit_name, value, override_ta=True):\n self.services[service_name].set_limit_override(limit_name, value,\n override_ta=override_ta)\n",
"role": "user"
},
{
"content": "set_limit_override",
"role": "assistant"
}
] |
def x(self, override_dict):
for svc_name in sorted(override_dict):
for lim_name in sorted(override_dict[svc_name]):
d = override_dict[svc_name][lim_name]
kwargs = {}
if 'warning' in d:
if 'percent' in d['warning']:
kwargs['warn_percent'] = d['warning']['percent']
if 'count' in d['warning']:
kwargs['warn_count'] = d['warning']['count']
if 'critical' in d:
if 'percent' in d['critical']:
kwargs['crit_percent'] = d['critical']['percent']
if 'count' in d['critical']:
kwargs['crit_count'] = d['critical']['count']
self.services[svc_name].set_threshold_override(lim_name, **kwargs)
| set_threshold_overrides | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, override_dict):\n for svc_name in sorted(override_dict):\n for lim_name in sorted(override_dict[svc_name]):\n d = override_dict[svc_name][lim_name]\n kwargs = {}\n if 'warning' in d:\n if 'percent' in d['warning']:\n kwargs['warn_percent'] = d['warning']['percent']\n if 'count' in d['warning']:\n kwargs['warn_count'] = d['warning']['count']\n if 'critical' in d:\n if 'percent' in d['critical']:\n kwargs['crit_percent'] = d['critical']['percent']\n if 'count' in d['critical']:\n kwargs['crit_count'] = d['critical']['count']\n self.services[svc_name].set_threshold_override(lim_name, **kwargs)\n",
"role": "user"
},
{
"content": "set_threshold_overrides",
"role": "assistant"
}
] |
def x(self, service_name, limit_name, warn_percent=None, warn_count=None,
crit_percent=None, crit_count=None):
self.services[service_name].set_threshold_override(limit_name,
warn_percent=warn_percent, warn_count=warn_count, crit_percent=
crit_percent, crit_count=crit_count)
| set_threshold_override | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, service_name, limit_name, warn_percent=None, warn_count=None,\n crit_percent=None, crit_count=None):\n self.services[service_name].set_threshold_override(limit_name,\n warn_percent=warn_percent, warn_count=warn_count, crit_percent=\n crit_percent, crit_count=crit_count)\n",
"role": "user"
},
{
"content": "set_threshold_override",
"role": "assistant"
}
] |
def x(self, service=None, use_ta=True):
res = {}
to_get = self.services
if service is not None:
to_get = dict((each, self.services[each]) for each in service)
if use_ta:
self.ta.update_limits()
for sname, cls in to_get.items():
if hasattr(cls, '_update_limits_from_api'):
cls._update_limits_from_api()
tmp = cls.check_thresholds()
if len(tmp) > 0:
res[sname] = tmp
return res
| check_thresholds | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, service=None, use_ta=True):\n res = {}\n to_get = self.services\n if service is not None:\n to_get = dict((each, self.services[each]) for each in service)\n if use_ta:\n self.ta.update_limits()\n for sname, cls in to_get.items():\n if hasattr(cls, '_update_limits_from_api'):\n cls._update_limits_from_api()\n tmp = cls.check_thresholds()\n if len(tmp) > 0:\n res[sname] = tmp\n return res\n",
"role": "user"
},
{
"content": "check_thresholds",
"role": "assistant"
}
] |
def x(self):
required_actions = ['support:*', 'trustedadvisor:Describe*',
'trustedadvisor:RefreshCheck']
for cls in self.services.values():
required_actions.extend(cls.required_iam_permissions())
policy = {'Version': '2012-10-17', 'Statement': [{'Effect': 'Allow',
'Resource': '*', 'Action': sorted(list(set(required_actions)))}]}
return policy
| get_required_iam_policy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n required_actions = ['support:*', 'trustedadvisor:Describe*',\n 'trustedadvisor:RefreshCheck']\n for cls in self.services.values():\n required_actions.extend(cls.required_iam_permissions())\n policy = {'Version': '2012-10-17', 'Statement': [{'Effect': 'Allow',\n 'Resource': '*', 'Action': sorted(list(set(required_actions)))}]}\n return policy\n",
"role": "user"
},
{
"content": "get_required_iam_policy",
"role": "assistant"
}
] |
def x(self):
logger.info('Querying Route53 GetHostedZoneLimits for limits')
self.connect()
self._find_limit_hosted_zone()
logger.debug('Done setting limits from API.')
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.info('Querying Route53 GetHostedZoneLimits for limits')\n self.connect()\n self._find_limit_hosted_zone()\n logger.debug('Done setting limits from API.')\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(self):
if not self.limits:
self.limits = {}
for item in [self.MAX_RRSETS_BY_ZONE, self.MAX_VPCS_ASSOCIATED_BY_ZONE
]:
self.limits[item['name']] = AwsLimit(item['name'], self, item[
'default_limit'], self.warning_threshold, self.
critical_threshold, limit_type='AWS::Route53::HostedZone',
limit_subtype=item['name'])
return self.limits
| get_limits | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.limits:\n self.limits = {}\n for item in [self.MAX_RRSETS_BY_ZONE, self.MAX_VPCS_ASSOCIATED_BY_ZONE\n ]:\n self.limits[item['name']] = AwsLimit(item['name'], self, item[\n 'default_limit'], self.warning_threshold, self.\n critical_threshold, limit_type='AWS::Route53::HostedZone',\n limit_subtype=item['name'])\n return self.limits\n",
"role": "user"
},
{
"content": "get_limits",
"role": "assistant"
}
] |
def x(self):
results = paginate_dict(self.conn.list_hosted_zones, alc_marker_path=[
'NextMarker'], alc_data_path=['HostedZones'], alc_marker_param='Marker'
)
return results['HostedZones']
| get_hosted_zones | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n results = paginate_dict(self.conn.list_hosted_zones, alc_marker_path=[\n 'NextMarker'], alc_data_path=['HostedZones'], alc_marker_param='Marker'\n )\n return results['HostedZones']\n",
"role": "user"
},
{
"content": "get_hosted_zones",
"role": "assistant"
}
] |
def x(self, limit_type, hosted_zone_id):
result = self.conn.get_hosted_zone_limit(Type=limit_type, HostedZoneId=
hosted_zone_id)
return result
| get_hosted_zone_limit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, limit_type, hosted_zone_id):\n result = self.conn.get_hosted_zone_limit(Type=limit_type, HostedZoneId=\n hosted_zone_id)\n return result\n",
"role": "user"
},
{
"content": "get_hosted_zone_limit",
"role": "assistant"
}
] |
def x(self):
for limit_type in [self.MAX_RRSETS_BY_ZONE, self.
MAX_VPCS_ASSOCIATED_BY_ZONE]:
self.limits[limit_type['name']]._reset_usage()
for hosted_zone in self._get_hosted_zones():
for limit_type in [self.MAX_RRSETS_BY_ZONE, self.
MAX_VPCS_ASSOCIATED_BY_ZONE]:
if (limit_type == self.MAX_VPCS_ASSOCIATED_BY_ZONE and not
hosted_zone['Config']['PrivateZone']):
continue
limit = self._get_hosted_zone_limit(limit_type['type'],
hosted_zone['Id'])
self.limits[limit_type['name']]._add_current_usage(int(limit[
'Count']), maximum=int(limit['Limit']['Value']), aws_type=
'AWS::Route53::HostedZone', resource_id=hosted_zone['Name'])
| find_limit_hosted_zone | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for limit_type in [self.MAX_RRSETS_BY_ZONE, self.\n MAX_VPCS_ASSOCIATED_BY_ZONE]:\n self.limits[limit_type['name']]._reset_usage()\n for hosted_zone in self._get_hosted_zones():\n for limit_type in [self.MAX_RRSETS_BY_ZONE, self.\n MAX_VPCS_ASSOCIATED_BY_ZONE]:\n if (limit_type == self.MAX_VPCS_ASSOCIATED_BY_ZONE and not\n hosted_zone['Config']['PrivateZone']):\n continue\n limit = self._get_hosted_zone_limit(limit_type['type'],\n hosted_zone['Id'])\n self.limits[limit_type['name']]._add_current_usage(int(limit[\n 'Count']), maximum=int(limit['Limit']['Value']), aws_type=\n 'AWS::Route53::HostedZone', resource_id=hosted_zone['Name'])\n",
"role": "user"
},
{
"content": "find_limit_hosted_zone",
"role": "assistant"
}
] |
def x(self):
checker = AwsLimitChecker()
policy = checker.get_required_iam_policy()
return json.dumps(policy, sort_keys=True, indent=2)
| get_iam_policy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n checker = AwsLimitChecker()\n policy = checker.get_required_iam_policy()\n return json.dumps(policy, sort_keys=True, indent=2)\n",
"role": "user"
},
{
"content": "get_iam_policy",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
self.connect_resource()
for lim in self.limits.values():
lim._reset_usage()
count = 0
for bkt in self.resource_conn.buckets.all():
count += 1
self.limits['Buckets']._add_current_usage(count, aws_type='AWS::S3::Bucket'
)
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect_resource()\n for lim in self.limits.values():\n lim._reset_usage()\n count = 0\n for bkt in self.resource_conn.buckets.all():\n count += 1\n self.limits['Buckets']._add_current_usage(count, aws_type='AWS::S3::Bucket'\n )\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self, version):
for rel in self._repo.releases():
if rel.tag_name == version:
return rel.name, rel.html_url
return None, None
| get_tag | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, version):\n for rel in self._repo.releases():\n if rel.tag_name == version:\n return rel.name, rel.html_url\n return None, None\n",
"role": "user"
},
{
"content": "get_tag",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
for lim in self.limits.values():
lim._reset_usage()
try:
self.connect()
resp = self.conn.get_send_quota()
except EndpointConnectionError as ex:
logger.warning('Skipping SES: %s', str(ex))
return
except ClientError as ex:
if ex.response['Error']['Code'] in ['AccessDenied', '503']:
logger.warning('Skipping SES: %s', ex)
return
raise
self.limits['Daily sending quota']._add_current_usage(resp[
'SentLast24Hours'])
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n for lim in self.limits.values():\n lim._reset_usage()\n try:\n self.connect()\n resp = self.conn.get_send_quota()\n except EndpointConnectionError as ex:\n logger.warning('Skipping SES: %s', str(ex))\n return\n except ClientError as ex:\n if ex.response['Error']['Code'] in ['AccessDenied', '503']:\n logger.warning('Skipping SES: %s', ex)\n return\n raise\n self.limits['Daily sending quota']._add_current_usage(resp[\n 'SentLast24Hours'])\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
try:
self.connect()
resp = self.conn.get_send_quota()
except EndpointConnectionError as ex:
logger.warning('Skipping SES: %s', str(ex))
return
except ClientError as ex:
if ex.response['Error']['Code'] in ['AccessDenied', '503']:
logger.warning('Skipping SES: %s', ex)
return
raise
self.limits['Daily sending quota']._set_api_limit(resp['Max24HourSend'])
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n try:\n self.connect()\n resp = self.conn.get_send_quota()\n except EndpointConnectionError as ex:\n logger.warning('Skipping SES: %s', str(ex))\n return\n except ClientError as ex:\n if ex.response['Error']['Code'] in ['AccessDenied', '503']:\n logger.warning('Skipping SES: %s', ex)\n return\n raise\n self.limits['Daily sending quota']._set_api_limit(resp['Max24HourSend'])\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(self):
if self.conn is not None:
return
kwargs = self._boto3_connection_kwargs
self.conn = boto3.client(self.api_name, **kwargs)
logger.info('Connected to %s in region %s', self.api_name, self.conn.
_client_config.region_name)
| connect | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.conn is not None:\n return\n kwargs = self._boto3_connection_kwargs\n self.conn = boto3.client(self.api_name, **kwargs)\n logger.info('Connected to %s in region %s', self.api_name, self.conn.\n _client_config.region_name)\n",
"role": "user"
},
{
"content": "connect",
"role": "assistant"
}
] |
def x(self):
if self.resource_conn is not None:
return
kwargs = self._boto3_connection_kwargs
self.resource_conn = boto3.resource(self.api_name, **kwargs)
logger.info('Connected to %s (resource) in region %s', self.api_name,
self.resource_conn.meta.client._client_config.region_name)
| connect_resource | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.resource_conn is not None:\n return\n kwargs = self._boto3_connection_kwargs\n self.resource_conn = boto3.resource(self.api_name, **kwargs)\n logger.info('Connected to %s (resource) in region %s', self.api_name,\n self.resource_conn.meta.client._client_config.region_name)\n",
"role": "user"
},
{
"content": "connect_resource",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
self.connect_resource()
for lim in self.limits.values():
lim._reset_usage()
self._find_usage_dynamodb()
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect_resource()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_dynamodb()\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
table_count = 0
region_read_capacity = 0
region_write_capacity = 0
logger.debug('Getting usage for DynamoDB tables')
for table in self.resource_conn.tables.all():
table_count += 1
gsi_write = 0
gsi_read = 0
gsi_count = 0
if table.global_secondary_indexes is not None:
for gsi in table.global_secondary_indexes:
gsi_count += 1
gsi_read += gsi['ProvisionedThroughput']['ReadCapacityUnits']
gsi_write += gsi['ProvisionedThroughput']['WriteCapacityUnits']
table_write_capacity = table.provisioned_throughput[
'WriteCapacityUnits'] + gsi_write
table_read_capacity = table.provisioned_throughput['ReadCapacityUnits'
] + gsi_read
region_write_capacity += table_write_capacity
region_read_capacity += table_read_capacity
self.limits['Global Secondary Indexes']._add_current_usage(gsi_count,
resource_id=table.name, aws_type='AWS::DynamoDB::Table')
self.limits['Local Secondary Indexes']._add_current_usage(len(table
.local_secondary_indexes) if table.local_secondary_indexes is not
None else 0, resource_id=table.name, aws_type=
'AWS::DynamoDB::Table')
self.limits['Table Max Write Capacity Units']._add_current_usage(
table_write_capacity, resource_id=table.name, aws_type=
'AWS::DynamoDB::Table')
self.limits['Table Max Read Capacity Units']._add_current_usage(
table_read_capacity, resource_id=table.name, aws_type=
'AWS::DynamoDB::Table')
self.limits['Tables Per Region']._add_current_usage(table_count,
aws_type='AWS::DynamoDB::Table')
self.limits['Account Max Write Capacity Units']._add_current_usage(
region_write_capacity, aws_type='AWS::DynamoDB::Table')
self.limits['Account Max Read Capacity Units']._add_current_usage(
region_read_capacity, aws_type='AWS::DynamoDB::Table')
| find_usage_dynamodb | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n table_count = 0\n region_read_capacity = 0\n region_write_capacity = 0\n logger.debug('Getting usage for DynamoDB tables')\n for table in self.resource_conn.tables.all():\n table_count += 1\n gsi_write = 0\n gsi_read = 0\n gsi_count = 0\n if table.global_secondary_indexes is not None:\n for gsi in table.global_secondary_indexes:\n gsi_count += 1\n gsi_read += gsi['ProvisionedThroughput']['ReadCapacityUnits']\n gsi_write += gsi['ProvisionedThroughput']['WriteCapacityUnits']\n table_write_capacity = table.provisioned_throughput[\n 'WriteCapacityUnits'] + gsi_write\n table_read_capacity = table.provisioned_throughput['ReadCapacityUnits'\n ] + gsi_read\n region_write_capacity += table_write_capacity\n region_read_capacity += table_read_capacity\n self.limits['Global Secondary Indexes']._add_current_usage(gsi_count,\n resource_id=table.name, aws_type='AWS::DynamoDB::Table')\n self.limits['Local Secondary Indexes']._add_current_usage(len(table\n .local_secondary_indexes) if table.local_secondary_indexes is not\n None else 0, resource_id=table.name, aws_type=\n 'AWS::DynamoDB::Table')\n self.limits['Table Max Write Capacity Units']._add_current_usage(\n table_write_capacity, resource_id=table.name, aws_type=\n 'AWS::DynamoDB::Table')\n self.limits['Table Max Read Capacity Units']._add_current_usage(\n table_read_capacity, resource_id=table.name, aws_type=\n 'AWS::DynamoDB::Table')\n self.limits['Tables Per Region']._add_current_usage(table_count,\n aws_type='AWS::DynamoDB::Table')\n self.limits['Account Max Write Capacity Units']._add_current_usage(\n region_write_capacity, aws_type='AWS::DynamoDB::Table')\n self.limits['Account Max Read Capacity Units']._add_current_usage(\n region_read_capacity, aws_type='AWS::DynamoDB::Table')\n",
"role": "user"
},
{
"content": "find_usage_dynamodb",
"role": "assistant"
}
] |
def x(self):
self.connect()
region_name = self.conn._client_config.region_name
if self.limits != {}:
return self.limits
limits = {}
limits['Tables Per Region'] = AwsLimit('Tables Per Region', self, 256,
self.warning_threshold, self.critical_threshold, limit_type=
'AWS::DynamoDB::Table')
limits['Account Max Write Capacity Units'] = AwsLimit(
'Account Max Write Capacity Units', self, 80000 if region_name ==
'us-east-1' else 20000, self.warning_threshold, self.
critical_threshold, limit_type='AWS::DynamoDB::Table')
limits['Table Max Write Capacity Units'] = AwsLimit(
'Table Max Write Capacity Units', self, 40000 if region_name ==
'us-east-1' else 10000, self.warning_threshold, self.
critical_threshold, limit_type='AWS::DynamoDB::Table')
limits['Account Max Read Capacity Units'] = AwsLimit(
'Account Max Read Capacity Units', self, 80000 if region_name ==
'us-east-1' else 20000, self.warning_threshold, self.
critical_threshold, limit_type='AWS::DynamoDB::Table')
limits['Table Max Read Capacity Units'] = AwsLimit(
'Table Max Read Capacity Units', self, 40000 if region_name ==
'us-east-1' else 10000, self.warning_threshold, self.
critical_threshold, limit_type='AWS::DynamoDB::Table')
limits['Global Secondary Indexes'] = AwsLimit('Global Secondary Indexes',
self, 20, self.warning_threshold, self.critical_threshold,
limit_type='AWS::DynamoDB::Table')
limits['Local Secondary Indexes'] = AwsLimit('Local Secondary Indexes',
self, 5, self.warning_threshold, self.critical_threshold,
limit_type='AWS::DynamoDB::Table')
self.limits = limits
return limits
| get_limits | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.connect()\n region_name = self.conn._client_config.region_name\n if self.limits != {}:\n return self.limits\n limits = {}\n limits['Tables Per Region'] = AwsLimit('Tables Per Region', self, 256,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::DynamoDB::Table')\n limits['Account Max Write Capacity Units'] = AwsLimit(\n 'Account Max Write Capacity Units', self, 80000 if region_name ==\n 'us-east-1' else 20000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Table Max Write Capacity Units'] = AwsLimit(\n 'Table Max Write Capacity Units', self, 40000 if region_name ==\n 'us-east-1' else 10000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Account Max Read Capacity Units'] = AwsLimit(\n 'Account Max Read Capacity Units', self, 80000 if region_name ==\n 'us-east-1' else 20000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Table Max Read Capacity Units'] = AwsLimit(\n 'Table Max Read Capacity Units', self, 40000 if region_name ==\n 'us-east-1' else 10000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Global Secondary Indexes'] = AwsLimit('Global Secondary Indexes',\n self, 20, self.warning_threshold, self.critical_threshold,\n limit_type='AWS::DynamoDB::Table')\n limits['Local Secondary Indexes'] = AwsLimit('Local Secondary Indexes',\n self, 5, self.warning_threshold, self.critical_threshold,\n limit_type='AWS::DynamoDB::Table')\n self.limits = limits\n return limits\n",
"role": "user"
},
{
"content": "get_limits",
"role": "assistant"
}
] |
def x(self):
self.connect()
logger.info('Querying DynamoDB DescribeLimits for limits')
lims = self.conn.describe_limits()
self.limits['Account Max Read Capacity Units']._set_api_limit(lims[
'AccountMaxReadCapacityUnits'])
self.limits['Account Max Write Capacity Units']._set_api_limit(lims[
'AccountMaxWriteCapacityUnits'])
self.limits['Table Max Read Capacity Units']._set_api_limit(lims[
'TableMaxReadCapacityUnits'])
self.limits['Table Max Write Capacity Units']._set_api_limit(lims[
'TableMaxWriteCapacityUnits'])
logger.debug('Done setting limits from API')
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.connect()\n logger.info('Querying DynamoDB DescribeLimits for limits')\n lims = self.conn.describe_limits()\n self.limits['Account Max Read Capacity Units']._set_api_limit(lims[\n 'AccountMaxReadCapacityUnits'])\n self.limits['Account Max Write Capacity Units']._set_api_limit(lims[\n 'AccountMaxWriteCapacityUnits'])\n self.limits['Table Max Read Capacity Units']._set_api_limit(lims[\n 'TableMaxReadCapacityUnits'])\n self.limits['Table Max Write Capacity Units']._set_api_limit(lims[\n 'TableMaxWriteCapacityUnits'])\n logger.debug('Done setting limits from API')\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x():
if os.environ.get('VERSIONCHECK_DEBUG', '') != 'true':
for lname in ['versionfinder', 'pip', 'git']:
l = logging.getLogger(lname)
l.setLevel(logging.CRITICAL)
l.propagate = True
try:
vinfo = find_version('awslimitchecker')
dirty = ''
if vinfo.git_is_dirty:
dirty = '*'
tag = vinfo.git_tag
if tag is not None:
tag += dirty
commit = vinfo.git_commit
if commit is not None:
if len(commit) > 7:
commit = commit[:8]
commit += dirty
return AWSLimitCheckerVersion(vinfo.version, vinfo.url, tag=tag,
commit=commit)
except Exception:
logger.exception(
'Error checking installed version; this installation may not be in compliance with the AGPLv3 license:'
)
return AWSLimitCheckerVersion(_VERSION, _PROJECT_URL)
| get_version_info | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if os.environ.get('VERSIONCHECK_DEBUG', '') != 'true':\n for lname in ['versionfinder', 'pip', 'git']:\n l = logging.getLogger(lname)\n l.setLevel(logging.CRITICAL)\n l.propagate = True\n try:\n vinfo = find_version('awslimitchecker')\n dirty = ''\n if vinfo.git_is_dirty:\n dirty = '*'\n tag = vinfo.git_tag\n if tag is not None:\n tag += dirty\n commit = vinfo.git_commit\n if commit is not None:\n if len(commit) > 7:\n commit = commit[:8]\n commit += dirty\n return AWSLimitCheckerVersion(vinfo.version, vinfo.url, tag=tag,\n commit=commit)\n except Exception:\n logger.exception(\n 'Error checking installed version; this installation may not be in compliance with the AGPLv3 license:'\n )\n return AWSLimitCheckerVersion(_VERSION, _PROJECT_URL)\n",
"role": "user"
},
{
"content": "get_version_info",
"role": "assistant"
}
] |
def x(self):
vs = str(self.release)
if self.tag is not None:
vs += '@{t}'.format(t=self.tag)
elif self.commit is not None:
vs += '@{c}'.format(c=self.commit)
return vs
| version_str | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vs = str(self.release)\n if self.tag is not None:\n vs += '@{t}'.format(t=self.tag)\n elif self.commit is not None:\n vs += '@{c}'.format(c=self.commit)\n return vs\n",
"role": "user"
},
{
"content": "version_str",
"role": "assistant"
}
] |
def x(self):
logger.debug('Listing per-account config subdirectories in %s', self.
_conf_dir)
for acct_id in os.listdir(self._conf_dir):
path = os.path.join(self._conf_dir, acct_id)
if not os.path.isdir(path):
continue
if not self.acct_id_re.match(acct_id):
continue
self._load_account(acct_id, path)
for acct_id, data in self._config.items():
if data['name'] is None:
continue
self._acct_name_to_id[data['name']] = acct_id
| load_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Listing per-account config subdirectories in %s', self.\n _conf_dir)\n for acct_id in os.listdir(self._conf_dir):\n path = os.path.join(self._conf_dir, acct_id)\n if not os.path.isdir(path):\n continue\n if not self.acct_id_re.match(acct_id):\n continue\n self._load_account(acct_id, path)\n for acct_id, data in self._config.items():\n if data['name'] is None:\n continue\n self._acct_name_to_id[data['name']] = acct_id\n",
"role": "user"
},
{
"content": "load_config",
"role": "assistant"
}
] |
def x(self, acct_id, acct_dir_path):
self._config[acct_id] = {'name': None, 'role_name': DEFAULT_ROLE_NAME,
'regions': {}}
with open(os.path.join(acct_dir_path, 'config.json'), 'r') as fh:
acct_conf = json.loads(fh.read())
self._config[acct_id].update(acct_conf)
for region_name in os.listdir(acct_dir_path):
path = os.path.join(acct_dir_path, region_name)
if not os.path.isdir(path):
continue
self._load_region(acct_id, region_name, path)
| load_account | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, acct_id, acct_dir_path):\n self._config[acct_id] = {'name': None, 'role_name': DEFAULT_ROLE_NAME,\n 'regions': {}}\n with open(os.path.join(acct_dir_path, 'config.json'), 'r') as fh:\n acct_conf = json.loads(fh.read())\n self._config[acct_id].update(acct_conf)\n for region_name in os.listdir(acct_dir_path):\n path = os.path.join(acct_dir_path, region_name)\n if not os.path.isdir(path):\n continue\n self._load_region(acct_id, region_name, path)\n",
"role": "user"
},
{
"content": "load_account",
"role": "assistant"
}
] |
def x(self, acct_id, region_name, path):
lim_path = os.path.join(path, 'limit_overrides.json')
thresh_path = os.path.join(path, 'threshold_overrides.json')
res = {'limit_overrides': {}, 'threshold_overrides': {}}
if os.path.exists(lim_path):
with open(lim_path, 'r') as fh:
res['limit_overrides'] = json.loads(fh.read())
if os.path.exists(thresh_path):
with open(thresh_path, 'r') as fh:
res['threshold_overrides'] = json.loads(fh.read())
self._config[acct_id]['regions'][region_name] = res
| load_region | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, acct_id, region_name, path):\n lim_path = os.path.join(path, 'limit_overrides.json')\n thresh_path = os.path.join(path, 'threshold_overrides.json')\n res = {'limit_overrides': {}, 'threshold_overrides': {}}\n if os.path.exists(lim_path):\n with open(lim_path, 'r') as fh:\n res['limit_overrides'] = json.loads(fh.read())\n if os.path.exists(thresh_path):\n with open(thresh_path, 'r') as fh:\n res['threshold_overrides'] = json.loads(fh.read())\n self._config[acct_id]['regions'][region_name] = res\n",
"role": "user"
},
{
"content": "load_region",
"role": "assistant"
}
] |
def x(self, id_or_name):
if id_or_name in self._config:
return self._config[id_or_name]
if id_or_name in self._acct_name_to_id:
return self._config[self._acct_name_to_id[id_or_name]]
raise RuntimeError('ERROR: Unknown account ID or name')
| get_account_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, id_or_name):\n if id_or_name in self._config:\n return self._config[id_or_name]\n if id_or_name in self._acct_name_to_id:\n return self._config[self._acct_name_to_id[id_or_name]]\n raise RuntimeError('ERROR: Unknown account ID or name')\n",
"role": "user"
},
{
"content": "get_account_config",
"role": "assistant"
}
] |
def x(self, acct_id, region_name, role_name=None, limit_overrides={},
threshold_overrides={}):
if role_name is not None:
checker = AwsLimitChecker(account_id=acct_id, region=region_name,
account_role=role_name)
else:
checker = AwsLimitChecker(region=region_name)
if len(threshold_overrides) > 0:
checker.set_threshold_overrides(threshold_overrides)
if len(limit_overrides) > 0:
checker.set_limit_overrides(limit_overrides)
checker.check_thresholds()
warnings = []
criticals = []
for service, svc_limits in sorted(checker.get_limits().items()):
for limit_name, limit in sorted(svc_limits.items()):
for warn in limit.get_warnings():
warnings.append(colored(
"{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})"
.format(service=service, limit_name=limit_name, u=str(
warn), l=limit.get_limit()), 'yellow'))
for crit in limit.get_criticals():
criticals.append(colored(
"{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})"
.format(service=service, limit_name=limit_name, u=str(
crit), l=limit.get_limit()), 'red'))
return warnings, criticals
| check_limits | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, acct_id, region_name, role_name=None, limit_overrides={},\n threshold_overrides={}):\n if role_name is not None:\n checker = AwsLimitChecker(account_id=acct_id, region=region_name,\n account_role=role_name)\n else:\n checker = AwsLimitChecker(region=region_name)\n if len(threshold_overrides) > 0:\n checker.set_threshold_overrides(threshold_overrides)\n if len(limit_overrides) > 0:\n checker.set_limit_overrides(limit_overrides)\n checker.check_thresholds()\n warnings = []\n criticals = []\n for service, svc_limits in sorted(checker.get_limits().items()):\n for limit_name, limit in sorted(svc_limits.items()):\n for warn in limit.get_warnings():\n warnings.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n warn), l=limit.get_limit()), 'yellow'))\n for crit in limit.get_criticals():\n criticals.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n crit), l=limit.get_limit()), 'red'))\n return warnings, criticals\n",
"role": "user"
},
{
"content": "check_limits",
"role": "assistant"
}
] |
def x(self, error_on_warning=False, region=None, accounts=[]):
all_warnings = []
all_criticals = []
if len(accounts) == 0:
accounts = self._conf.list_account_ids
for acct_id in accounts:
acct_conf = self._conf.get_account_config(acct_id)
if region is None:
regions = list(acct_conf['regions'].keys())
elif region in acct_conf['regions']:
regions = [region]
else:
print('\nAccount %s is not configured for region %s' % (acct_id,
region))
regions = []
for rname in regions:
print('\n%s (%s) %s' % (acct_id, acct_conf['name'], rname))
warnings, criticals = self.check_limits(acct_id, rname,
role_name=acct_conf['role_name'], limit_overrides=acct_conf
['regions'][rname]['limit_overrides'], threshold_overrides=
acct_conf['regions'][rname]['threshold_overrides'])
for w in warnings:
print('\tWARNING: %s' % w)
all_warnings.append(w)
for c in criticals:
print('\tCRITICAL: %s' % c)
all_criticals.append(c)
if len(warnings) == 0 and len(criticals) == 0:
print('\tNo problems found.')
if len(all_warnings) > 0 or len(all_criticals) > 0:
print(
'\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold'
.format(c=len(all_criticals), w=len(all_warnings)))
else:
print('All limits are within thresholds.')
if len(all_warnings) > 0 and error_on_warning or len(all_criticals) > 0:
print('PROBLEMS FOUND. See above output for details.')
raise SystemExit(1)
| run | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, error_on_warning=False, region=None, accounts=[]):\n all_warnings = []\n all_criticals = []\n if len(accounts) == 0:\n accounts = self._conf.list_account_ids\n for acct_id in accounts:\n acct_conf = self._conf.get_account_config(acct_id)\n if region is None:\n regions = list(acct_conf['regions'].keys())\n elif region in acct_conf['regions']:\n regions = [region]\n else:\n print('\\nAccount %s is not configured for region %s' % (acct_id,\n region))\n regions = []\n for rname in regions:\n print('\\n%s (%s) %s' % (acct_id, acct_conf['name'], rname))\n warnings, criticals = self.check_limits(acct_id, rname,\n role_name=acct_conf['role_name'], limit_overrides=acct_conf\n ['regions'][rname]['limit_overrides'], threshold_overrides=\n acct_conf['regions'][rname]['threshold_overrides'])\n for w in warnings:\n print('\\tWARNING: %s' % w)\n all_warnings.append(w)\n for c in criticals:\n print('\\tCRITICAL: %s' % c)\n all_criticals.append(c)\n if len(warnings) == 0 and len(criticals) == 0:\n print('\\tNo problems found.')\n if len(all_warnings) > 0 or len(all_criticals) > 0:\n print(\n '\\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold'\n .format(c=len(all_criticals), w=len(all_warnings)))\n else:\n print('All limits are within thresholds.')\n if len(all_warnings) > 0 and error_on_warning or len(all_criticals) > 0:\n print('PROBLEMS FOUND. See above output for details.')\n raise SystemExit(1)\n",
"role": "user"
},
{
"content": "run",
"role": "assistant"
}
] |
def x(self):
vols = 0
piops = 0
piops_gb = 0
gp_gb = 0
mag_gb = 0
st_gb = 0
sc_gb = 0
logger.debug('Getting usage for EBS volumes')
results = paginate_dict(self.conn.describe_volumes, alc_marker_path=[
'NextToken'], alc_data_path=['Volumes'], alc_marker_param='NextToken')
for vol in results['Volumes']:
vols += 1
if vol['VolumeType'] == 'io1':
piops_gb += vol['Size']
piops += vol['Iops']
elif vol['VolumeType'] == 'gp2':
gp_gb += vol['Size']
elif vol['VolumeType'] == 'standard':
mag_gb += vol['Size']
elif vol['VolumeType'] == 'st1':
st_gb += vol['Size']
elif vol['VolumeType'] == 'sc1':
sc_gb += vol['Size']
else:
logger.error(
"ERROR - unknown volume type '%s' for volume %s; not counting",
vol['VolumeType'], vol['VolumeId'])
self.limits['Provisioned IOPS']._add_current_usage(piops, aws_type=
'AWS::EC2::Volume')
self.limits['Provisioned IOPS (SSD) storage (GiB)']._add_current_usage(
piops_gb, aws_type='AWS::EC2::Volume')
self.limits['General Purpose (SSD) volume storage (GiB)'
]._add_current_usage(gp_gb, aws_type='AWS::EC2::Volume')
self.limits['Magnetic volume storage (GiB)']._add_current_usage(mag_gb,
aws_type='AWS::EC2::Volume')
self.limits['Throughput Optimized (HDD) volume storage (GiB)'
]._add_current_usage(st_gb, aws_type='AWS::EC2::Volume')
self.limits['Cold (HDD) volume storage (GiB)']._add_current_usage(sc_gb,
aws_type='AWS::EC2::Volume')
self.limits['Active volumes']._add_current_usage(vols, aws_type=
'AWS::EC2::Volume')
| find_usage_ebs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vols = 0\n piops = 0\n piops_gb = 0\n gp_gb = 0\n mag_gb = 0\n st_gb = 0\n sc_gb = 0\n logger.debug('Getting usage for EBS volumes')\n results = paginate_dict(self.conn.describe_volumes, alc_marker_path=[\n 'NextToken'], alc_data_path=['Volumes'], alc_marker_param='NextToken')\n for vol in results['Volumes']:\n vols += 1\n if vol['VolumeType'] == 'io1':\n piops_gb += vol['Size']\n piops += vol['Iops']\n elif vol['VolumeType'] == 'gp2':\n gp_gb += vol['Size']\n elif vol['VolumeType'] == 'standard':\n mag_gb += vol['Size']\n elif vol['VolumeType'] == 'st1':\n st_gb += vol['Size']\n elif vol['VolumeType'] == 'sc1':\n sc_gb += vol['Size']\n else:\n logger.error(\n \"ERROR - unknown volume type '%s' for volume %s; not counting\",\n vol['VolumeType'], vol['VolumeId'])\n self.limits['Provisioned IOPS']._add_current_usage(piops, aws_type=\n 'AWS::EC2::Volume')\n self.limits['Provisioned IOPS (SSD) storage (GiB)']._add_current_usage(\n piops_gb, aws_type='AWS::EC2::Volume')\n self.limits['General Purpose (SSD) volume storage (GiB)'\n ]._add_current_usage(gp_gb, aws_type='AWS::EC2::Volume')\n self.limits['Magnetic volume storage (GiB)']._add_current_usage(mag_gb,\n aws_type='AWS::EC2::Volume')\n self.limits['Throughput Optimized (HDD) volume storage (GiB)'\n ]._add_current_usage(st_gb, aws_type='AWS::EC2::Volume')\n self.limits['Cold (HDD) volume storage (GiB)']._add_current_usage(sc_gb,\n aws_type='AWS::EC2::Volume')\n self.limits['Active volumes']._add_current_usage(vols, aws_type=\n 'AWS::EC2::Volume')\n",
"role": "user"
},
{
"content": "find_usage_ebs",
"role": "assistant"
}
] |
def x(self):
logger.debug('Getting usage for EBS snapshots')
snaps = paginate_dict(self.conn.describe_snapshots, OwnerIds=['self'],
alc_marker_path=['NextToken'], alc_data_path=['Snapshots'],
alc_marker_param='NextToken')
self.limits['Active snapshots']._add_current_usage(len(snaps[
'Snapshots']), aws_type='AWS::EC2::VolumeSnapshot')
| find_usage_snapshots | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Getting usage for EBS snapshots')\n snaps = paginate_dict(self.conn.describe_snapshots, OwnerIds=['self'],\n alc_marker_path=['NextToken'], alc_data_path=['Snapshots'],\n alc_marker_param='NextToken')\n self.limits['Active snapshots']._add_current_usage(len(snaps[\n 'Snapshots']), aws_type='AWS::EC2::VolumeSnapshot')\n",
"role": "user"
},
{
"content": "find_usage_snapshots",
"role": "assistant"
}
] |
def x(self):
if self.limits != {}:
return self.limits
limits = {}
limits.update(self._get_limits_ebs())
self.limits = limits
return limits
| get_limits | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.limits != {}:\n return self.limits\n limits = {}\n limits.update(self._get_limits_ebs())\n self.limits = limits\n return limits\n",
"role": "user"
},
{
"content": "get_limits",
"role": "assistant"
}
] |
def x(self):
limits = {}
limits['Provisioned IOPS'] = AwsLimit('Provisioned IOPS', self, 200000,
self.warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::Volume', limit_subtype='io1')
limits['Provisioned IOPS (SSD) storage (GiB)'] = AwsLimit(
'Provisioned IOPS (SSD) storage (GiB)', self, 102400, self.
warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::Volume', limit_subtype='io1')
limits['General Purpose (SSD) volume storage (GiB)'] = AwsLimit(
'General Purpose (SSD) volume storage (GiB)', self, 102400, self.
warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::Volume', limit_subtype='gp2', ta_limit_name=
'General Purpose SSD (gp2) volume storage (GiB)')
limits['Magnetic volume storage (GiB)'] = AwsLimit(
'Magnetic volume storage (GiB)', self, 20480, self.
warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::Volume', limit_subtype='standard', ta_limit_name=
'Magnetic (standard) volume storage (GiB)')
limits['Throughput Optimized (HDD) volume storage (GiB)'] = AwsLimit(
'Throughput Optimized (HDD) volume storage (GiB)', self, 307200,
self.warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::Volume', limit_subtype='st1')
limits['Cold (HDD) volume storage (GiB)'] = AwsLimit(
'Cold (HDD) volume storage (GiB)', self, 307200, self.
warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::Volume', limit_subtype='sc1')
limits['Active snapshots'] = AwsLimit('Active snapshots', self, 10000,
self.warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::VolumeSnapshot')
limits['Active volumes'] = AwsLimit('Active volumes', self, 5000, self.
warning_threshold, self.critical_threshold, limit_type=
'AWS::EC2::Volume')
return limits
| get_limits_ebs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n limits = {}\n limits['Provisioned IOPS'] = AwsLimit('Provisioned IOPS', self, 200000,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='io1')\n limits['Provisioned IOPS (SSD) storage (GiB)'] = AwsLimit(\n 'Provisioned IOPS (SSD) storage (GiB)', self, 102400, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='io1')\n limits['General Purpose (SSD) volume storage (GiB)'] = AwsLimit(\n 'General Purpose (SSD) volume storage (GiB)', self, 102400, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='gp2', ta_limit_name=\n 'General Purpose SSD (gp2) volume storage (GiB)')\n limits['Magnetic volume storage (GiB)'] = AwsLimit(\n 'Magnetic volume storage (GiB)', self, 20480, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='standard', ta_limit_name=\n 'Magnetic (standard) volume storage (GiB)')\n limits['Throughput Optimized (HDD) volume storage (GiB)'] = AwsLimit(\n 'Throughput Optimized (HDD) volume storage (GiB)', self, 307200,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='st1')\n limits['Cold (HDD) volume storage (GiB)'] = AwsLimit(\n 'Cold (HDD) volume storage (GiB)', self, 307200, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='sc1')\n limits['Active snapshots'] = AwsLimit('Active snapshots', self, 10000,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::VolumeSnapshot')\n limits['Active volumes'] = AwsLimit('Active volumes', self, 5000, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume')\n return limits\n",
"role": "user"
},
{
"content": "get_limits_ebs",
"role": "assistant"
}
] |
def x(self, verbose=False):
checker = AwsLimitChecker()
checker.set_threshold_overrides(AWS_THRESHOLD_OVERRIDES)
checker.set_limit_overrides(AWS_LIMIT_OVERRIDES)
print(
'Checking AWS resource usage; WARNING threshold {w}% of limit, CRITICAL threshold {c}% of limit'
.format(w=checker.warning_threshold, c=checker.critical_threshold))
checker.check_thresholds()
warnings = []
criticals = []
for service, svc_limits in sorted(checker.get_limits().items()):
for limit_name, limit in sorted(svc_limits.items()):
have_alarms = False
for warn in limit.get_warnings():
warnings.append(colored(
"{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})"
.format(service=service, limit_name=limit_name, u=str(
warn), l=limit.get_limit()), 'yellow'))
have_alarms = True
for crit in limit.get_criticals():
criticals.append(colored(
"{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})"
.format(service=service, limit_name=limit_name, u=str(
crit), l=limit.get_limit()), 'red'))
have_alarms = True
if not have_alarms and verbose:
print("{service} '{limit_name}' OK: {u} (limit={l})".format
(service=service, limit_name=limit_name, u=limit.
get_current_usage_str(), l=limit.get_limit()))
if verbose:
print('\n\n')
return warnings, criticals
| check_limits | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, verbose=False):\n checker = AwsLimitChecker()\n checker.set_threshold_overrides(AWS_THRESHOLD_OVERRIDES)\n checker.set_limit_overrides(AWS_LIMIT_OVERRIDES)\n print(\n 'Checking AWS resource usage; WARNING threshold {w}% of limit, CRITICAL threshold {c}% of limit'\n .format(w=checker.warning_threshold, c=checker.critical_threshold))\n checker.check_thresholds()\n warnings = []\n criticals = []\n for service, svc_limits in sorted(checker.get_limits().items()):\n for limit_name, limit in sorted(svc_limits.items()):\n have_alarms = False\n for warn in limit.get_warnings():\n warnings.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n warn), l=limit.get_limit()), 'yellow'))\n have_alarms = True\n for crit in limit.get_criticals():\n criticals.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n crit), l=limit.get_limit()), 'red'))\n have_alarms = True\n if not have_alarms and verbose:\n print(\"{service} '{limit_name}' OK: {u} (limit={l})\".format\n (service=service, limit_name=limit_name, u=limit.\n get_current_usage_str(), l=limit.get_limit()))\n if verbose:\n print('\\n\\n')\n return warnings, criticals\n",
"role": "user"
},
{
"content": "check_limits",
"role": "assistant"
}
] |
def x(self, error_on_warning=False, verbose=False):
warnings, criticals = self.check_limits(verbose=verbose)
if len(warnings) > 0:
print('\nWARNING:\n')
for w in warnings:
print(w)
if len(criticals) > 0:
print('\nCRITICAL:\n')
for c in criticals:
print(c)
if len(warnings) > 0 or len(criticals) > 0:
print(
'\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold'
.format(c=len(criticals), w=len(warnings)))
else:
print('All limits are within thresholds.')
if len(warnings) > 0 and error_on_warning or len(criticals) > 0:
raise SystemExit(1)
| run | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, error_on_warning=False, verbose=False):\n warnings, criticals = self.check_limits(verbose=verbose)\n if len(warnings) > 0:\n print('\\nWARNING:\\n')\n for w in warnings:\n print(w)\n if len(criticals) > 0:\n print('\\nCRITICAL:\\n')\n for c in criticals:\n print(c)\n if len(warnings) > 0 or len(criticals) > 0:\n print(\n '\\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold'\n .format(c=len(criticals), w=len(warnings)))\n else:\n print('All limits are within thresholds.')\n if len(warnings) > 0 and error_on_warning or len(criticals) > 0:\n raise SystemExit(1)\n",
"role": "user"
},
{
"content": "run",
"role": "assistant"
}
] |
def x(self, limit_name, value, override_ta=True):
try:
self.limits[limit_name].set_limit_override(value, override_ta=
override_ta)
logger.debug('Overriding %s limit %s; default=%d override=%d', self
.service_name, limit_name, value, self.limits[limit_name].
default_limit)
except KeyError:
raise ValueError("{s} service has no '{l}' limit".format(s=self.
service_name, l=limit_name))
| set_limit_override | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, limit_name, value, override_ta=True):\n try:\n self.limits[limit_name].set_limit_override(value, override_ta=\n override_ta)\n logger.debug('Overriding %s limit %s; default=%d override=%d', self\n .service_name, limit_name, value, self.limits[limit_name].\n default_limit)\n except KeyError:\n raise ValueError(\"{s} service has no '{l}' limit\".format(s=self.\n service_name, l=limit_name))\n",
"role": "user"
},
{
"content": "set_limit_override",
"role": "assistant"
}
] |
def x(self, limit_name, value):
try:
self.limits[limit_name]._set_ta_limit(value)
logger.debug('Setting %s limit %s TA limit to %d', self.
service_name, limit_name, value)
except KeyError:
raise ValueError("{s} service has no '{l}' limit".format(s=self.
service_name, l=limit_name))
| set_ta_limit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, limit_name, value):\n try:\n self.limits[limit_name]._set_ta_limit(value)\n logger.debug('Setting %s limit %s TA limit to %d', self.\n service_name, limit_name, value)\n except KeyError:\n raise ValueError(\"{s} service has no '{l}' limit\".format(s=self.\n service_name, l=limit_name))\n",
"role": "user"
},
{
"content": "set_ta_limit",
"role": "assistant"
}
] |
def x(self, limit_name, warn_percent=None, warn_count=None, crit_percent=
None, crit_count=None):
try:
self.limits[limit_name].set_threshold_override(warn_percent=
warn_percent, warn_count=warn_count, crit_percent=crit_percent,
crit_count=crit_count)
except KeyError:
raise ValueError("{s} service has no '{l}' limit".format(s=self.
service_name, l=limit_name))
| set_threshold_override | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, limit_name, warn_percent=None, warn_count=None, crit_percent=\n None, crit_count=None):\n try:\n self.limits[limit_name].set_threshold_override(warn_percent=\n warn_percent, warn_count=warn_count, crit_percent=crit_percent,\n crit_count=crit_count)\n except KeyError:\n raise ValueError(\"{s} service has no '{l}' limit\".format(s=self.\n service_name, l=limit_name))\n",
"role": "user"
},
{
"content": "set_threshold_override",
"role": "assistant"
}
] |
def x(self):
if not self._have_usage:
self.find_usage()
ret = {}
for name, limit in self.limits.items():
if limit.check_thresholds() is False:
ret[name] = limit
return ret
| check_thresholds | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._have_usage:\n self.find_usage()\n ret = {}\n for name, limit in self.limits.items():\n if limit.check_thresholds() is False:\n ret[name] = limit\n return ret\n",
"role": "user"
},
{
"content": "check_thresholds",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
self.connect()
for lim in self.limits.values():
lim._reset_usage()
self._find_cluster_manual_snapshots()
self._find_cluster_subnet_groups()
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_cluster_manual_snapshots()\n self._find_cluster_subnet_groups()\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(docname, ref_to, title):
txt = Text(title, rawsource=title)
newchild = inline(':ref:`%s`' % ref_to, '', txt, classes=['xref', 'std',
'std-ref'])
newnode = pending_xref(':ref:`%s`' % ref_to, newchild, reftype='ref',
refwarn='True', reftarget=ref_to, refexplicit='False', refdomain=
'std', refdoc=docname)
return newnode
| label_ref_node | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(docname, ref_to, title):\n txt = Text(title, rawsource=title)\n newchild = inline(':ref:`%s`' % ref_to, '', txt, classes=['xref', 'std',\n 'std-ref'])\n newnode = pending_xref(':ref:`%s`' % ref_to, newchild, reftype='ref',\n refwarn='True', reftarget=ref_to, refexplicit='False', refdomain=\n 'std', refdoc=docname)\n return newnode\n",
"role": "user"
},
{
"content": "label_ref_node",
"role": "assistant"
}
] |
def x(_, doctree):
docname = os.path.splitext(os.path.basename(doctree.attributes['source']))[
0]
if docname == 'changes':
ref_mapping = {
'http://awslimitchecker.readthedocs.io/en/latest/limits.html#ec2':
[label_ref_node, docname, 'limits.ec2',
'the EC2 limit documentation'],
'https://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.limit.html#awslimitchecker.limit.AwsLimit.get_limit'
: [meth_ref_node, docname,
'awslimitchecker.limit.AwsLimit.get_limit'],
'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor'
: [label_ref_node, docname, 'getting_started.trusted_advisor',
'Getting Started - Trusted Advisor'],
'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.check_thresholds'
: [meth_ref_node, docname,
'awslimitchecker.checker.AwsLimitChecker.check_thresholds'],
'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.find_usage'
: [meth_ref_node, docname,
'awslimitchecker.checker.AwsLimitChecker.find_usage'],
'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.get_limits'
: [meth_ref_node, docname,
'awslimitchecker.checker.AwsLimitChecker.get_limits']}
doctree.walk(LinkToRefVisitor(doctree, ref_mapping))
if docname == 'index':
ref_mapping = {
'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html'
: [label_ref_node, docname, 'getting_started',
'Getting Started'],
'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#credentials'
: [label_ref_node, docname, 'getting_started.credentials',
'Credentials'],
'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html'
: [label_ref_node, docname, 'getting_help', 'Getting Help'],
'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html#enterprise-support-agreements-and-contract-development'
: [label_ref_node, docname, 'getting_help.paid_support',
'Enterprise Support Agreements and Contract Development'],
'http://awslimitchecker.readthedocs.io/en/latest/changes.html':
[label_ref_node, docname, 'changes', 'Changelog'],
'http://awslimitchecker.readthedocs.io/en/latest/development.html#agpl-license'
: [label_ref_node, docname, 'development.agpl',
'Development / AGPL'],
'http://awslimitchecker.readthedocs.org/en/latest/development.html#pull-requests'
: [label_ref_node, docname, 'development.pull_requests',
'development documentation'],
'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor'
: [label_ref_node, docname, 'getting_started.trusted_advisor',
'Getting Started - Trusted Advisor']}
doctree.walk(LinkToRefVisitor(doctree, ref_mapping))
| on_doctree_read | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(_, doctree):\n docname = os.path.splitext(os.path.basename(doctree.attributes['source']))[\n 0]\n if docname == 'changes':\n ref_mapping = {\n 'http://awslimitchecker.readthedocs.io/en/latest/limits.html#ec2':\n [label_ref_node, docname, 'limits.ec2',\n 'the EC2 limit documentation'],\n 'https://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.limit.html#awslimitchecker.limit.AwsLimit.get_limit'\n : [meth_ref_node, docname,\n 'awslimitchecker.limit.AwsLimit.get_limit'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor'\n : [label_ref_node, docname, 'getting_started.trusted_advisor',\n 'Getting Started - Trusted Advisor'],\n 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.check_thresholds'\n : [meth_ref_node, docname,\n 'awslimitchecker.checker.AwsLimitChecker.check_thresholds'],\n 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.find_usage'\n : [meth_ref_node, docname,\n 'awslimitchecker.checker.AwsLimitChecker.find_usage'],\n 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.get_limits'\n : [meth_ref_node, docname,\n 'awslimitchecker.checker.AwsLimitChecker.get_limits']}\n doctree.walk(LinkToRefVisitor(doctree, ref_mapping))\n if docname == 'index':\n ref_mapping = {\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html'\n : [label_ref_node, docname, 'getting_started',\n 'Getting Started'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#credentials'\n : [label_ref_node, docname, 'getting_started.credentials',\n 'Credentials'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html'\n : [label_ref_node, docname, 'getting_help', 'Getting Help'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html#enterprise-support-agreements-and-contract-development'\n : [label_ref_node, docname, 'getting_help.paid_support',\n 'Enterprise Support Agreements and Contract Development'],\n 'http://awslimitchecker.readthedocs.io/en/latest/changes.html':\n [label_ref_node, docname, 'changes', 'Changelog'],\n 'http://awslimitchecker.readthedocs.io/en/latest/development.html#agpl-license'\n : [label_ref_node, docname, 'development.agpl',\n 'Development / AGPL'],\n 'http://awslimitchecker.readthedocs.org/en/latest/development.html#pull-requests'\n : [label_ref_node, docname, 'development.pull_requests',\n 'development documentation'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor'\n : [label_ref_node, docname, 'getting_started.trusted_advisor',\n 'Getting Started - Trusted Advisor']}\n doctree.walk(LinkToRefVisitor(doctree, ref_mapping))\n",
"role": "user"
},
{
"content": "on_doctree_read",
"role": "assistant"
}
] |
def x(self, node):
if self.lastref is None:
return
if self.lastref.attributes['name'].lower() not in node.attributes['names'
] and self.lastref.attributes['name'].lower() not in node.attributes[
'dupnames']:
return
if node.attributes['refuri'] not in self.replacements:
return
params = self.replacements[node.attributes['refuri']]
meth = params[0]
args = params[1:]
node.parent.remove(node)
self.lastref.parent.replace(self.lastref, meth(*args))
| visit_target | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, node):\n if self.lastref is None:\n return\n if self.lastref.attributes['name'].lower() not in node.attributes['names'\n ] and self.lastref.attributes['name'].lower() not in node.attributes[\n 'dupnames']:\n return\n if node.attributes['refuri'] not in self.replacements:\n return\n params = self.replacements[node.attributes['refuri']]\n meth = params[0]\n args = params[1:]\n node.parent.remove(node)\n self.lastref.parent.replace(self.lastref, meth(*args))\n",
"role": "user"
},
{
"content": "visit_target",
"role": "assistant"
}
] |
def x(self):
logger.debug('Checking usage for service %s', self.service_name)
self.connect()
self.connect_resource()
for lim in self.limits.values():
lim._reset_usage()
self._find_usage_instances()
self._find_usage_networking_sgs()
self._find_usage_networking_eips()
self._find_usage_networking_eni_sg()
self._find_usage_spot_instances()
self._find_usage_spot_fleets()
self._have_usage = True
logger.debug('Done checking usage.')
| find_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n self.connect_resource()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_instances()\n self._find_usage_networking_sgs()\n self._find_usage_networking_eips()\n self._find_usage_networking_eni_sg()\n self._find_usage_spot_instances()\n self._find_usage_spot_fleets()\n self._have_usage = True\n logger.debug('Done checking usage.')\n",
"role": "user"
},
{
"content": "find_usage",
"role": "assistant"
}
] |
def x(self):
inst_usage = self._instance_usage()
res_usage = self._get_reserved_instance_count()
logger.debug('Reserved instance count: %s', res_usage)
total_ris = 0
running_ris = 0
ondemand_usage = defaultdict(int)
for az in inst_usage:
if az not in res_usage:
for i_type, count in inst_usage[az].items():
ondemand_usage[i_type] += count
continue
for i_type, count in inst_usage[az].items():
if i_type not in res_usage[az]:
ondemand_usage[i_type] += count
continue
od = count - res_usage[az][i_type]
total_ris += res_usage[az][i_type]
if count < res_usage[az][i_type]:
running_ris += count
else:
running_ris += res_usage[az][i_type]
if od < 0:
continue
ondemand_usage[i_type] += od
logger.debug('Found %d total RIs and %d running/used RIs', total_ris,
running_ris)
total_instances = 0
for i_type, usage in ondemand_usage.items():
key = 'Running On-Demand {t} instances'.format(t=i_type)
self.limits[key]._add_current_usage(usage, aws_type=
'AWS::EC2::Instance')
total_instances += usage
key = 'Running On-Demand EC2 instances'
self.limits[key]._add_current_usage(total_instances, aws_type=
'AWS::EC2::Instance')
| find_usage_instances | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n inst_usage = self._instance_usage()\n res_usage = self._get_reserved_instance_count()\n logger.debug('Reserved instance count: %s', res_usage)\n total_ris = 0\n running_ris = 0\n ondemand_usage = defaultdict(int)\n for az in inst_usage:\n if az not in res_usage:\n for i_type, count in inst_usage[az].items():\n ondemand_usage[i_type] += count\n continue\n for i_type, count in inst_usage[az].items():\n if i_type not in res_usage[az]:\n ondemand_usage[i_type] += count\n continue\n od = count - res_usage[az][i_type]\n total_ris += res_usage[az][i_type]\n if count < res_usage[az][i_type]:\n running_ris += count\n else:\n running_ris += res_usage[az][i_type]\n if od < 0:\n continue\n ondemand_usage[i_type] += od\n logger.debug('Found %d total RIs and %d running/used RIs', total_ris,\n running_ris)\n total_instances = 0\n for i_type, usage in ondemand_usage.items():\n key = 'Running On-Demand {t} instances'.format(t=i_type)\n self.limits[key]._add_current_usage(usage, aws_type=\n 'AWS::EC2::Instance')\n total_instances += usage\n key = 'Running On-Demand EC2 instances'\n self.limits[key]._add_current_usage(total_instances, aws_type=\n 'AWS::EC2::Instance')\n",
"role": "user"
},
{
"content": "find_usage_instances",
"role": "assistant"
}
] |
def x(self):
logger.debug('Getting spot instance request usage')
try:
res = self.conn.describe_spot_instance_requests()
except botocore.exceptions.ClientError as e:
if e.response['Error']['Code'] == 'UnsupportedOperation':
return
raise
count = 0
for req in res['SpotInstanceRequests']:
if req['State'] in ['open', 'active']:
count += 1
logger.debug('Counting spot instance request %s state=%s', req[
'SpotInstanceRequestId'], req['State'])
else:
logger.debug('NOT counting spot instance request %s state=%s',
req['SpotInstanceRequestId'], req['State'])
self.limits['Max spot instance requests per region']._add_current_usage(
count, aws_type='AWS::EC2::SpotInstanceRequest')
| find_usage_spot_instances | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Getting spot instance request usage')\n try:\n res = self.conn.describe_spot_instance_requests()\n except botocore.exceptions.ClientError as e:\n if e.response['Error']['Code'] == 'UnsupportedOperation':\n return\n raise\n count = 0\n for req in res['SpotInstanceRequests']:\n if req['State'] in ['open', 'active']:\n count += 1\n logger.debug('Counting spot instance request %s state=%s', req[\n 'SpotInstanceRequestId'], req['State'])\n else:\n logger.debug('NOT counting spot instance request %s state=%s',\n req['SpotInstanceRequestId'], req['State'])\n self.limits['Max spot instance requests per region']._add_current_usage(\n count, aws_type='AWS::EC2::SpotInstanceRequest')\n",
"role": "user"
},
{
"content": "find_usage_spot_instances",
"role": "assistant"
}
] |
def x(self):
logger.debug('Getting spot fleet request usage')
try:
res = self.conn.describe_spot_fleet_requests()
except botocore.exceptions.ClientError as e:
if e.response['Error']['Code'] == 'UnsupportedOperation':
return
raise
if 'NextToken' in res:
logger.error(
'Error: describe_spot_fleet_requests() response includes pagination token, but pagination not configured in awslimitchecker.'
)
active_fleets = 0
total_target_cap = 0
lim_cap_per_fleet = self.limits['Max target capacity per spot fleet']
lim_launch_specs = self.limits['Max launch specifications per spot fleet']
for fleet in res['SpotFleetRequestConfigs']:
_id = fleet['SpotFleetRequestId']
if fleet['SpotFleetRequestState'] != 'active':
logger.debug('Skipping spot fleet request %s in state %s', _id,
fleet['SpotFleetRequestState'])
continue
active_fleets += 1
cap = fleet['SpotFleetRequestConfig']['TargetCapacity']
launch_specs = len(fleet['SpotFleetRequestConfig'][
'LaunchSpecifications'])
total_target_cap += cap
lim_cap_per_fleet._add_current_usage(cap, resource_id=_id, aws_type
='AWS::EC2::SpotFleetRequest')
lim_launch_specs._add_current_usage(launch_specs, resource_id=_id,
aws_type='AWS::EC2::SpotFleetRequest')
self.limits['Max active spot fleets per region']._add_current_usage(
active_fleets, aws_type='AWS::EC2::SpotFleetRequest')
self.limits['Max target capacity for all spot fleets in region'
]._add_current_usage(total_target_cap, aws_type=
'AWS::EC2::SpotFleetRequest')
| find_usage_spot_fleets | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Getting spot fleet request usage')\n try:\n res = self.conn.describe_spot_fleet_requests()\n except botocore.exceptions.ClientError as e:\n if e.response['Error']['Code'] == 'UnsupportedOperation':\n return\n raise\n if 'NextToken' in res:\n logger.error(\n 'Error: describe_spot_fleet_requests() response includes pagination token, but pagination not configured in awslimitchecker.'\n )\n active_fleets = 0\n total_target_cap = 0\n lim_cap_per_fleet = self.limits['Max target capacity per spot fleet']\n lim_launch_specs = self.limits['Max launch specifications per spot fleet']\n for fleet in res['SpotFleetRequestConfigs']:\n _id = fleet['SpotFleetRequestId']\n if fleet['SpotFleetRequestState'] != 'active':\n logger.debug('Skipping spot fleet request %s in state %s', _id,\n fleet['SpotFleetRequestState'])\n continue\n active_fleets += 1\n cap = fleet['SpotFleetRequestConfig']['TargetCapacity']\n launch_specs = len(fleet['SpotFleetRequestConfig'][\n 'LaunchSpecifications'])\n total_target_cap += cap\n lim_cap_per_fleet._add_current_usage(cap, resource_id=_id, aws_type\n ='AWS::EC2::SpotFleetRequest')\n lim_launch_specs._add_current_usage(launch_specs, resource_id=_id,\n aws_type='AWS::EC2::SpotFleetRequest')\n self.limits['Max active spot fleets per region']._add_current_usage(\n active_fleets, aws_type='AWS::EC2::SpotFleetRequest')\n self.limits['Max target capacity for all spot fleets in region'\n ]._add_current_usage(total_target_cap, aws_type=\n 'AWS::EC2::SpotFleetRequest')\n",
"role": "user"
},
{
"content": "find_usage_spot_fleets",
"role": "assistant"
}
] |
def x(self):
reservations = defaultdict(int)
az_to_res = {}
logger.debug('Getting reserved instance information')
res = self.conn.describe_reserved_instances()
for x in res['ReservedInstances']:
if x['State'] != 'active':
logger.debug('Skipping ReservedInstance %s with state %s', x[
'ReservedInstancesId'], x['State'])
continue
if 'AvailabilityZone' not in x:
x['AvailabilityZone'] = RI_NO_AZ
if x['AvailabilityZone'] not in az_to_res:
az_to_res[x['AvailabilityZone']] = deepcopy(reservations)
az_to_res[x['AvailabilityZone']][x['InstanceType']] += x[
'InstanceCount']
for x in az_to_res:
az_to_res[x] = dict(az_to_res[x])
return az_to_res
| get_reserved_instance_count | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n reservations = defaultdict(int)\n az_to_res = {}\n logger.debug('Getting reserved instance information')\n res = self.conn.describe_reserved_instances()\n for x in res['ReservedInstances']:\n if x['State'] != 'active':\n logger.debug('Skipping ReservedInstance %s with state %s', x[\n 'ReservedInstancesId'], x['State'])\n continue\n if 'AvailabilityZone' not in x:\n x['AvailabilityZone'] = RI_NO_AZ\n if x['AvailabilityZone'] not in az_to_res:\n az_to_res[x['AvailabilityZone']] = deepcopy(reservations)\n az_to_res[x['AvailabilityZone']][x['InstanceType']] += x[\n 'InstanceCount']\n for x in az_to_res:\n az_to_res[x] = dict(az_to_res[x])\n return az_to_res\n",
"role": "user"
},
{
"content": "get_reserved_instance_count",
"role": "assistant"
}
] |
def x(self):
ondemand = {}
for t in self._instance_types():
ondemand[t] = 0
az_to_inst = {}
logger.debug('Getting usage for on-demand instances')
for inst in self.resource_conn.instances.all():
if inst.spot_instance_request_id:
logger.info(
'Spot instance found (%s); skipping from Running On-Demand Instances count'
, inst.id)
continue
if inst.state['Name'] in ['stopped', 'terminated']:
logger.debug('Ignoring instance %s in state %s', inst.id, inst.
state['Name'])
continue
if inst.placement['AvailabilityZone'] not in az_to_inst:
az_to_inst[inst.placement['AvailabilityZone']] = deepcopy(ondemand)
try:
az_to_inst[inst.placement['AvailabilityZone']][inst.instance_type
] += 1
except KeyError:
logger.error("ERROR - unknown instance type '%s'; not counting",
inst.instance_type)
return az_to_inst
| instance_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n ondemand = {}\n for t in self._instance_types():\n ondemand[t] = 0\n az_to_inst = {}\n logger.debug('Getting usage for on-demand instances')\n for inst in self.resource_conn.instances.all():\n if inst.spot_instance_request_id:\n logger.info(\n 'Spot instance found (%s); skipping from Running On-Demand Instances count'\n , inst.id)\n continue\n if inst.state['Name'] in ['stopped', 'terminated']:\n logger.debug('Ignoring instance %s in state %s', inst.id, inst.\n state['Name'])\n continue\n if inst.placement['AvailabilityZone'] not in az_to_inst:\n az_to_inst[inst.placement['AvailabilityZone']] = deepcopy(ondemand)\n try:\n az_to_inst[inst.placement['AvailabilityZone']][inst.instance_type\n ] += 1\n except KeyError:\n logger.error(\"ERROR - unknown instance type '%s'; not counting\",\n inst.instance_type)\n return az_to_inst\n",
"role": "user"
},
{
"content": "instance_usage",
"role": "assistant"
}
] |
def x(self):
if self.limits != {}:
return self.limits
limits = {}
limits.update(self._get_limits_instances())
limits.update(self._get_limits_networking())
limits.update(self._get_limits_spot())
self.limits = limits
return self.limits
| get_limits | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.limits != {}:\n return self.limits\n limits = {}\n limits.update(self._get_limits_instances())\n limits.update(self._get_limits_networking())\n limits.update(self._get_limits_spot())\n self.limits = limits\n return self.limits\n",
"role": "user"
},
{
"content": "get_limits",
"role": "assistant"
}
] |
def x(self):
self.connect()
self.connect_resource()
logger.info('Querying EC2 DescribeAccountAttributes for limits')
attribs = self.conn.describe_account_attributes()
for attrib in attribs['AccountAttributes']:
aname = attrib['AttributeName']
val = attrib['AttributeValues'][0]['AttributeValue']
lname = None
if aname == 'max-elastic-ips':
lname = 'Elastic IP addresses (EIPs)'
elif aname == 'max-instances':
lname = 'Running On-Demand EC2 instances'
elif aname == 'vpc-max-elastic-ips':
lname = 'VPC Elastic IP addresses (EIPs)'
elif aname == 'vpc-max-security-groups-per-interface':
lname = 'VPC security groups per elastic network interface'
if lname is not None:
if int(val) == 0:
continue
self.limits[lname]._set_api_limit(int(val))
logger.debug('Done setting limits from API')
| update_limits_from_api | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.connect()\n self.connect_resource()\n logger.info('Querying EC2 DescribeAccountAttributes for limits')\n attribs = self.conn.describe_account_attributes()\n for attrib in attribs['AccountAttributes']:\n aname = attrib['AttributeName']\n val = attrib['AttributeValues'][0]['AttributeValue']\n lname = None\n if aname == 'max-elastic-ips':\n lname = 'Elastic IP addresses (EIPs)'\n elif aname == 'max-instances':\n lname = 'Running On-Demand EC2 instances'\n elif aname == 'vpc-max-elastic-ips':\n lname = 'VPC Elastic IP addresses (EIPs)'\n elif aname == 'vpc-max-security-groups-per-interface':\n lname = 'VPC security groups per elastic network interface'\n if lname is not None:\n if int(val) == 0:\n continue\n self.limits[lname]._set_api_limit(int(val))\n logger.debug('Done setting limits from API')\n",
"role": "user"
},
{
"content": "update_limits_from_api",
"role": "assistant"
}
] |
def x(self):
default_limits = 20, 20, 5
special_limits = {'c4.4xlarge': (10, 20, 5), 'c4.8xlarge': (5, 20, 5),
'c5.4xlarge': (10, 20, 5), 'c5.9xlarge': (5, 20, 5), 'c5.18xlarge':
(5, 20, 5), 'cg1.4xlarge': (2, 20, 5), 'cr1.8xlarge': (2, 20, 5),
'd2.4xlarge': (10, 20, 5), 'd2.8xlarge': (5, 20, 5), 'g2.2xlarge':
(5, 20, 5), 'g2.8xlarge': (2, 20, 5), 'g3.4xlarge': (1, 20, 5),
'g3.8xlarge': (1, 20, 5), 'g3.16xlarge': (1, 20, 5), 'h1.8xlarge':
(10, 20, 5), 'h1.16xlarge': (5, 20, 5), 'hi1.4xlarge': (2, 20, 5),
'hs1.8xlarge': (2, 20, 0), 'i2.2xlarge': (8, 20, 0), 'i2.4xlarge':
(4, 20, 0), 'i2.8xlarge': (2, 20, 0), 'i2.xlarge': (8, 20, 0),
'i3.2xlarge': (2, 20, 0), 'i3.4xlarge': (2, 20, 0), 'i3.8xlarge': (
2, 20, 0), 'i3.16xlarge': (2, 20, 0), 'i3.large': (2, 20, 0),
'i3.xlarge': (2, 20, 0), 'm4.4xlarge': (10, 20, 5), 'm4.10xlarge':
(5, 20, 5), 'm4.16xlarge': (5, 20, 5), 'm5.4xlarge': (10, 20, 5),
'm5.12xlarge': (5, 20, 5), 'm5.24xlarge': (5, 20, 5), 'p2.8xlarge':
(1, 20, 5), 'p2.16xlarge': (1, 20, 5), 'p2.xlarge': (1, 20, 5),
'p3.2xlarge': (1, 20, 5), 'p3.8xlarge': (1, 20, 5), 'p3.16xlarge':
(1, 20, 5), 'p3dn.24xlarge': (1, 20, 5), 'r3.4xlarge': (10, 20, 5),
'r3.8xlarge': (5, 20, 5), 'r4.4xlarge': (10, 20, 5), 'r4.8xlarge':
(5, 20, 5), 'r4.16xlarge': (1, 20, 5)}
limits = {}
for i_type in self._instance_types():
key = 'Running On-Demand {t} instances'.format(t=i_type)
lim = default_limits[0]
if i_type in special_limits:
lim = special_limits[i_type][0]
limits[key] = AwsLimit(key, self, lim, self.warning_threshold, self
.critical_threshold, limit_type='On-Demand instances',
limit_subtype=i_type, ta_limit_name='On-Demand instances - %s' %
i_type)
key = 'Running On-Demand EC2 instances'
limits[key] = AwsLimit(key, self, default_limits[0], self.
warning_threshold, self.critical_threshold, limit_type=
'On-Demand instances')
return limits
| get_limits_instances | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n default_limits = 20, 20, 5\n special_limits = {'c4.4xlarge': (10, 20, 5), 'c4.8xlarge': (5, 20, 5),\n 'c5.4xlarge': (10, 20, 5), 'c5.9xlarge': (5, 20, 5), 'c5.18xlarge':\n (5, 20, 5), 'cg1.4xlarge': (2, 20, 5), 'cr1.8xlarge': (2, 20, 5),\n 'd2.4xlarge': (10, 20, 5), 'd2.8xlarge': (5, 20, 5), 'g2.2xlarge':\n (5, 20, 5), 'g2.8xlarge': (2, 20, 5), 'g3.4xlarge': (1, 20, 5),\n 'g3.8xlarge': (1, 20, 5), 'g3.16xlarge': (1, 20, 5), 'h1.8xlarge':\n (10, 20, 5), 'h1.16xlarge': (5, 20, 5), 'hi1.4xlarge': (2, 20, 5),\n 'hs1.8xlarge': (2, 20, 0), 'i2.2xlarge': (8, 20, 0), 'i2.4xlarge':\n (4, 20, 0), 'i2.8xlarge': (2, 20, 0), 'i2.xlarge': (8, 20, 0),\n 'i3.2xlarge': (2, 20, 0), 'i3.4xlarge': (2, 20, 0), 'i3.8xlarge': (\n 2, 20, 0), 'i3.16xlarge': (2, 20, 0), 'i3.large': (2, 20, 0),\n 'i3.xlarge': (2, 20, 0), 'm4.4xlarge': (10, 20, 5), 'm4.10xlarge':\n (5, 20, 5), 'm4.16xlarge': (5, 20, 5), 'm5.4xlarge': (10, 20, 5),\n 'm5.12xlarge': (5, 20, 5), 'm5.24xlarge': (5, 20, 5), 'p2.8xlarge':\n (1, 20, 5), 'p2.16xlarge': (1, 20, 5), 'p2.xlarge': (1, 20, 5),\n 'p3.2xlarge': (1, 20, 5), 'p3.8xlarge': (1, 20, 5), 'p3.16xlarge':\n (1, 20, 5), 'p3dn.24xlarge': (1, 20, 5), 'r3.4xlarge': (10, 20, 5),\n 'r3.8xlarge': (5, 20, 5), 'r4.4xlarge': (10, 20, 5), 'r4.8xlarge':\n (5, 20, 5), 'r4.16xlarge': (1, 20, 5)}\n limits = {}\n for i_type in self._instance_types():\n key = 'Running On-Demand {t} instances'.format(t=i_type)\n lim = default_limits[0]\n if i_type in special_limits:\n lim = special_limits[i_type][0]\n limits[key] = AwsLimit(key, self, lim, self.warning_threshold, self\n .critical_threshold, limit_type='On-Demand instances',\n limit_subtype=i_type, ta_limit_name='On-Demand instances - %s' %\n i_type)\n key = 'Running On-Demand EC2 instances'\n limits[key] = AwsLimit(key, self, default_limits[0], self.\n warning_threshold, self.critical_threshold, limit_type=\n 'On-Demand instances')\n return limits\n",
"role": "user"
},
{
"content": "get_limits_instances",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.