source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(endpoint, path, body, access_token): headers = {'Content-Type': json_acceptformat, 'DataServiceVersion': dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept': json_acceptformat, 'Accept-Charset': charset, 'Authorization': 'Bearer ' + access_token, 'x-ms-version': xmsversion} response = requests.patch(endpoint, data=body, headers=headers, allow_redirects=False) if response.status_code == 301: redirected_url = ''.join([response.headers['location'], path]) response = requests.patch(redirected_url, data=body, headers=headers) return response
do_ams_patch
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(endpoint, path, body, access_token):\n headers = {'Content-Type': json_acceptformat, 'DataServiceVersion':\n dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept':\n json_acceptformat, 'Accept-Charset': charset, 'Authorization': \n 'Bearer ' + access_token, 'x-ms-version': xmsversion}\n response = requests.patch(endpoint, data=body, headers=headers,\n allow_redirects=False)\n if response.status_code == 301:\n redirected_url = ''.join([response.headers['location'], path])\n response = requests.patch(redirected_url, data=body, headers=headers)\n return response\n", "role": "user" }, { "content": "do_ams_patch", "role": "assistant" } ]
def x(endpoint, path, access_token): headers = {'DataServiceVersion': dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept': json_acceptformat, 'Accept-Charset': charset, 'Authorization': 'Bearer ' + access_token, 'x-ms-version': xmsversion} response = requests.delete(endpoint, headers=headers, allow_redirects=False ) if response.status_code == 301: redirected_url = ''.join([response.headers['location'], path]) response = requests.delete(redirected_url, headers=headers) return response
do_ams_delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(endpoint, path, access_token):\n headers = {'DataServiceVersion': dsversion_min, 'MaxDataServiceVersion':\n dsversion_max, 'Accept': json_acceptformat, 'Accept-Charset':\n charset, 'Authorization': 'Bearer ' + access_token, 'x-ms-version':\n xmsversion}\n response = requests.delete(endpoint, headers=headers, allow_redirects=False\n )\n if response.status_code == 301:\n redirected_url = ''.join([response.headers['location'], path])\n response = requests.delete(redirected_url, headers=headers)\n return response\n", "role": "user" }, { "content": "do_ams_delete", "role": "assistant" } ]
def x(endpoint, body, content_length): headers = {'Accept': json_acceptformat, 'Accept-Charset': charset, 'x-ms-blob-type': 'BlockBlob', 'x-ms-meta-m1': 'v1', 'x-ms-meta-m2': 'v2', 'x-ms-version': '2015-02-21', 'Content-Length': str( content_length)} return requests.put(endpoint, data=body, headers=headers)
do_ams_sto_put
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(endpoint, body, content_length):\n headers = {'Accept': json_acceptformat, 'Accept-Charset': charset,\n 'x-ms-blob-type': 'BlockBlob', 'x-ms-meta-m1': 'v1', 'x-ms-meta-m2':\n 'v2', 'x-ms-version': '2015-02-21', 'Content-Length': str(\n content_length)}\n return requests.put(endpoint, data=body, headers=headers)\n", "role": "user" }, { "content": "do_ams_sto_put", "role": "assistant" } ]
def x(endpoint, access_token, flag=True): headers = {'Content-Type': json_acceptformat, 'DataServiceVersion': dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept': json_acceptformat, 'Accept-Charset': charset, 'Authorization': 'Bearer ' + access_token, 'x-ms-version': xmsversion} body = '' response = requests.get(endpoint, headers=headers, allow_redirects=flag) if flag: if response.status_code == 301: response = requests.get(response.headers['location'], data=body, headers=headers) return response
do_ams_get_url
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(endpoint, access_token, flag=True):\n headers = {'Content-Type': json_acceptformat, 'DataServiceVersion':\n dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept':\n json_acceptformat, 'Accept-Charset': charset, 'Authorization': \n 'Bearer ' + access_token, 'x-ms-version': xmsversion}\n body = ''\n response = requests.get(endpoint, headers=headers, allow_redirects=flag)\n if flag:\n if response.status_code == 301:\n response = requests.get(response.headers['location'], data=body,\n headers=headers)\n return response\n", "role": "user" }, { "content": "do_ams_get_url", "role": "assistant" } ]
def x(operation, ret): print('Error ' + operation) sys.exit('Return code: ' + str(ret.status_code) + ' Error: ' + ret.text)
handle_bad_update
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(operation, ret):\n print('Error ' + operation)\n sys.exit('Return code: ' + str(ret.status_code) + ' Error: ' + ret.text)\n", "role": "user" }, { "content": "handle_bad_update", "role": "assistant" } ]
def x(end_mark, current_str, str_array, line_num): if end_mark not in current_str: reached_end = False line_num += 1 while reached_end is False: next_line = str_array[line_num] if end_mark in next_line: reached_end = True else: line_num += 1 current_str += next_line clean_str = current_str.split(end_mark)[0] return {'current_str': clean_str, 'line_num': line_num}
extract_code
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(end_mark, current_str, str_array, line_num):\n if end_mark not in current_str:\n reached_end = False\n line_num += 1\n while reached_end is False:\n next_line = str_array[line_num]\n if end_mark in next_line:\n reached_end = True\n else:\n line_num += 1\n current_str += next_line\n clean_str = current_str.split(end_mark)[0]\n return {'current_str': clean_str, 'line_num': line_num}\n", "role": "user" }, { "content": "extract_code", "role": "assistant" } ]
def x(pyfile_name): print('Processing file: ' + pyfile_name) with open(pyfile_name) as fpyfile: pyfile_str = fpyfile.readlines() file_dict = {'source_file': pyfile_name.replace('\\', '/')} if pyfile_str[0].startswith("'''"): file_dict['summary_comment'] = pyfile_str[0][:-1].strip("'") else: file_dict['summary_comment'] = pyfile_name file_dict['functions'] = [] for line in pyfile_str: if line.startswith('def '): line_num = pyfile_str.index(line) fn_def = line[4:] fn_name = fn_def.split('(')[0] function_info = {'name': fn_name} extract = extract_code(':', fn_def, pyfile_str, line_num) function_info['definition'] = extract['current_str'] line_num = extract['line_num'] + 1 doc_line = pyfile_str[line_num] if doc_line.startswith(" '''"): comment_str = doc_line[7:] extract = extract_code("'''", comment_str, pyfile_str, line_num ) function_info['comments'] = extract['current_str'] file_dict['functions'].append(function_info) return file_dict
process_file
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pyfile_name):\n print('Processing file: ' + pyfile_name)\n with open(pyfile_name) as fpyfile:\n pyfile_str = fpyfile.readlines()\n file_dict = {'source_file': pyfile_name.replace('\\\\', '/')}\n if pyfile_str[0].startswith(\"'''\"):\n file_dict['summary_comment'] = pyfile_str[0][:-1].strip(\"'\")\n else:\n file_dict['summary_comment'] = pyfile_name\n file_dict['functions'] = []\n for line in pyfile_str:\n if line.startswith('def '):\n line_num = pyfile_str.index(line)\n fn_def = line[4:]\n fn_name = fn_def.split('(')[0]\n function_info = {'name': fn_name}\n extract = extract_code(':', fn_def, pyfile_str, line_num)\n function_info['definition'] = extract['current_str']\n line_num = extract['line_num'] + 1\n doc_line = pyfile_str[line_num]\n if doc_line.startswith(\" '''\"):\n comment_str = doc_line[7:]\n extract = extract_code(\"'''\", comment_str, pyfile_str, line_num\n )\n function_info['comments'] = extract['current_str']\n file_dict['functions'].append(function_info)\n return file_dict\n", "role": "user" }, { "content": "process_file", "role": "assistant" } ]
def x(meta_file, outfile_name, code_links): doc_str = '# ' + meta_file['header'] + '\n' doc_str += 'Generated by [py2md](https://github.com/gbowerman/py2md) on ' doc_str += strftime('%Y-%m-%d %H:%M:%S ') + '\n\n' if len(meta_file['modules']) > 1: doc_str += '## Contents\n' chapter_num = 1 for meta_doc in meta_file['modules']: chapter_name = meta_doc['summary_comment'] chapter_link = chapter_name.lstrip().replace('.', '').replace(' ', '-').lower() doc_str += str(chapter_num ) + '. [' + chapter_name + '](#' + chapter_link + ')\n' chapter_num += 1 for meta_doc in meta_file['modules']: doc_str += '## ' + meta_doc['summary_comment'] + '\n' doc_str += '[source file](' + meta_doc['source_file'] + ')' + '\n' for function_info in meta_doc['functions']: doc_str += '### ' + function_info['name'] + '\n' doc_str += function_info['definition'] + '\n\n' if 'comments' in function_info: doc_str += '```\n' + function_info['comments'] + '\n```\n\n' print('Writing file: ' + outfile_name) out_file = open(outfile_name, 'w') out_file.write(doc_str) out_file.close()
process_output
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(meta_file, outfile_name, code_links):\n doc_str = '# ' + meta_file['header'] + '\\n'\n doc_str += 'Generated by [py2md](https://github.com/gbowerman/py2md) on '\n doc_str += strftime('%Y-%m-%d %H:%M:%S ') + '\\n\\n'\n if len(meta_file['modules']) > 1:\n doc_str += '## Contents\\n'\n chapter_num = 1\n for meta_doc in meta_file['modules']:\n chapter_name = meta_doc['summary_comment']\n chapter_link = chapter_name.lstrip().replace('.', '').replace(' ',\n '-').lower()\n doc_str += str(chapter_num\n ) + '. [' + chapter_name + '](#' + chapter_link + ')\\n'\n chapter_num += 1\n for meta_doc in meta_file['modules']:\n doc_str += '## ' + meta_doc['summary_comment'] + '\\n'\n doc_str += '[source file](' + meta_doc['source_file'] + ')' + '\\n'\n for function_info in meta_doc['functions']:\n doc_str += '### ' + function_info['name'] + '\\n'\n doc_str += function_info['definition'] + '\\n\\n'\n if 'comments' in function_info:\n doc_str += '```\\n' + function_info['comments'] + '\\n```\\n\\n'\n print('Writing file: ' + outfile_name)\n out_file = open(outfile_name, 'w')\n out_file.write(doc_str)\n out_file.close()\n", "role": "user" }, { "content": "process_output", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--sourcedir', '-s', required=True, action= 'store', help='Source folder containing python files.') arg_parser.add_argument('--docfile', '-o', required=True, action= 'store', help='Name of markdown file to write output to.') arg_parser.add_argument('--projectname', '-n', required=False, action= 'store', help= 'Project name (optional, otherwise sourcedir will be used).') arg_parser.add_argument('--codelinks', '-c', required=False, action= 'store_true', help='Include links to source files (optional).') args = arg_parser.parse_args() source_dir = args.sourcedir doc_file = args.docfile code_links = args.codelinks proj_name = args.projectname if proj_name is None: proj_name = source_dir meta_doc = {'header': proj_name + ' Technical Reference Guide'} meta_doc['modules'] = [] for source_file in glob.glob(source_dir + '/*.py'): if '__' in source_file: print('Skipping: ' + source_file) continue file_meta_doc = process_file(source_file) meta_doc['modules'].append(file_meta_doc) process_output(meta_doc, doc_file, code_links)
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--sourcedir', '-s', required=True, action=\n 'store', help='Source folder containing python files.')\n arg_parser.add_argument('--docfile', '-o', required=True, action=\n 'store', help='Name of markdown file to write output to.')\n arg_parser.add_argument('--projectname', '-n', required=False, action=\n 'store', help=\n 'Project name (optional, otherwise sourcedir will be used).')\n arg_parser.add_argument('--codelinks', '-c', required=False, action=\n 'store_true', help='Include links to source files (optional).')\n args = arg_parser.parse_args()\n source_dir = args.sourcedir\n doc_file = args.docfile\n code_links = args.codelinks\n proj_name = args.projectname\n if proj_name is None:\n proj_name = source_dir\n meta_doc = {'header': proj_name + ' Technical Reference Guide'}\n meta_doc['modules'] = []\n for source_file in glob.glob(source_dir + '/*.py'):\n if '__' in source_file:\n print('Skipping: ' + source_file)\n continue\n file_meta_doc = process_file(source_file)\n meta_doc['modules'].append(file_meta_doc)\n process_output(meta_doc, doc_file, code_links)\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, service_name, agent_count, agent_vm_size, agent_dns, master_dns, admin_user, location, public_key=None, master_count=3, orchestrator='DCOS', app_id=None, app_secret=None, admin_password=None, ostype='Linux'): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerService/ContainerServices/', service_name, '?api-version=', ACS_API]) acs_body = {'location': location} properties = {'orchestratorProfile': {'orchestratorType': orchestrator}} properties['masterProfile'] = {'count': master_count, 'dnsPrefix': master_dns} ap_profile = {'name': 'AgentPool1'} ap_profile['count'] = agent_count ap_profile['vmSize'] = agent_vm_size ap_profile['dnsPrefix'] = agent_dns properties['agentPoolProfiles'] = [ap_profile] if ostype == 'Linux': linux_profile = {'adminUsername': admin_user} linux_profile['ssh'] = {'publicKeys': [{'keyData': public_key}]} properties['linuxProfile'] = linux_profile else: windows_profile = {'adminUsername': admin_user, 'adminPassword': admin_password} properties['windowsProfile'] = windows_profile if orchestrator == 'Kubernetes': sp_profile = {'ClientID': app_id} sp_profile['Secret'] = app_secret properties['servicePrincipalProfile'] = sp_profile acs_body['properties'] = properties body = json.dumps(acs_body) return do_put(endpoint, body, access_token)
create_container_service
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, service_name,\n agent_count, agent_vm_size, agent_dns, master_dns, admin_user, location,\n public_key=None, master_count=3, orchestrator='DCOS', app_id=None,\n app_secret=None, admin_password=None, ostype='Linux'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices/',\n service_name, '?api-version=', ACS_API])\n acs_body = {'location': location}\n properties = {'orchestratorProfile': {'orchestratorType': orchestrator}}\n properties['masterProfile'] = {'count': master_count, 'dnsPrefix':\n master_dns}\n ap_profile = {'name': 'AgentPool1'}\n ap_profile['count'] = agent_count\n ap_profile['vmSize'] = agent_vm_size\n ap_profile['dnsPrefix'] = agent_dns\n properties['agentPoolProfiles'] = [ap_profile]\n if ostype == 'Linux':\n linux_profile = {'adminUsername': admin_user}\n linux_profile['ssh'] = {'publicKeys': [{'keyData': public_key}]}\n properties['linuxProfile'] = linux_profile\n else:\n windows_profile = {'adminUsername': admin_user, 'adminPassword':\n admin_password}\n properties['windowsProfile'] = windows_profile\n if orchestrator == 'Kubernetes':\n sp_profile = {'ClientID': app_id}\n sp_profile['Secret'] = app_secret\n properties['servicePrincipalProfile'] = sp_profile\n acs_body['properties'] = properties\n body = json.dumps(acs_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_container_service", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, service_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerService/ContainerServices/', service_name, '?api-version=', ACS_API]) return do_delete(endpoint, access_token)
delete_container_service
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, service_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices/',\n service_name, '?api-version=', ACS_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_container_service", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, service_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerService/ContainerServices/', service_name, '?api-version=', ACS_API]) return do_get(endpoint, access_token)
get_container_service
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, service_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices/',\n service_name, '?api-version=', ACS_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_container_service", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerService/ContainerServices', '?api-version=', ACS_API]) return do_get(endpoint, access_token)
list_container_services
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices',\n '?api-version=', ACS_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_container_services", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.ContainerService/ContainerServices', '?api-version=', ACS_API]) return do_get(endpoint, access_token)
list_container_services_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/Microsoft.ContainerService/ContainerServices',\n '?api-version=', ACS_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_container_services_sub", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, account_name, location, storage_type='Standard_LRS'): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.Storage/storageAccounts/', account_name, '?api-version=', STORAGE_API]) storage_body = {'location': location} storage_body['sku'] = {'name': storage_type} storage_body['kind'] = 'Storage' body = json.dumps(storage_body) return do_put(endpoint, body, access_token)
create_storage_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, account_name, location,\n storage_type='Standard_LRS'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '?api-version=', STORAGE_API])\n storage_body = {'location': location}\n storage_body['sku'] = {'name': storage_type}\n storage_body['kind'] = 'Storage'\n body = json.dumps(storage_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_storage_account", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, account_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.Storage/storageAccounts/', account_name, '?api-version=', STORAGE_API]) return do_delete(endpoint, access_token)
delete_storage_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '?api-version=', STORAGE_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_storage_account", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, account_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.Storage/storageAccounts/', account_name, '?api-version=', STORAGE_API]) return do_get(endpoint, access_token)
get_storage_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '?api-version=', STORAGE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_storage_account", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, account_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.Storage/storageAccounts/', account_name, '/listKeys', '?api-version=', STORAGE_API]) return do_post(endpoint, '', access_token)
get_storage_account_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '/listKeys', '?api-version=', STORAGE_API])\n return do_post(endpoint, '', access_token)\n", "role": "user" }, { "content": "get_storage_account_keys", "role": "assistant" } ]
def x(access_token, subscription_id, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Storage/locations/', location, '/usages', '?api-version=', STORAGE_API]) return do_get(endpoint, access_token)
get_storage_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Storage/locations/',\n location, '/usages', '?api-version=', STORAGE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_storage_usage", "role": "assistant" } ]
def x(access_token, subscription_id, rgname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.Storage/storageAccounts', '?api-version=', STORAGE_API]) return do_get(endpoint, access_token)
list_storage_accounts_rg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts', '?api-version=',\n STORAGE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_storage_accounts_rg", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Storage/storageAccounts', '?api-version=', STORAGE_API]) return do_get(endpoint, access_token)
list_storage_accounts_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Storage/storageAccounts',\n '?api-version=', STORAGE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_storage_accounts_sub", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--add', '-a', action='store_true', default= False, help='add a key vault') arg_parser.add_argument('--delete', '-d', action='store_true', default= False, help='delete a key vault') arg_parser.add_argument('--name', '-n', required=True, action='store', help='Name') arg_parser.add_argument('--rgname', '-g', required=True, action='store', help='Resource Group Name') arg_parser.add_argument('--location', '-l', required=True, action= 'store', help='Location, e.g. eastus') arg_parser.add_argument('--verbose', '-v', action='store_true', default =False, help='Print operational details') args = arg_parser.parse_args() name = args.name rgname = args.rgname location = args.location if args.add is True and args.delete is True: sys.exit('Specify --add or --delete, not both.') if args.add is False and args.delete is False: sys.exit('No operation specified, use --add or --delete.') if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ: endpoint = os.environ['MSI_ENDPOINT'] else: sys.exit('Not running in cloud shell or MSI_ENDPOINT not set') if args.verbose is True: print('Getting Azure token from MSI endpoint..') access_token = azurerm.get_access_token_from_cli() if args.verbose is True: print('Getting Azure subscription ID from MSI endpoint..') subscription_id = azurerm.get_subscription_from_cli() if args.add is True: if args.verbose is True: print('Getting list of tenant IDs...') tenants = azurerm.list_tenants(access_token) tenant_id = tenants['value'][0]['tenantId'] if args.verbose is True: print('My tenantId = ' + tenant_id) if args.verbose is True: print('Querying graph...') object_id = azurerm.get_object_id_from_graph() if args.verbose is True: print('My object ID = ' + object_id) ret = azurerm.create_keyvault(access_token, subscription_id, rgname, name, location, tenant_id=tenant_id, object_id=object_id) if ret.status_code == 200: print('Successsfully created key vault: ' + name) print('Vault URI: ' + ret.json()['properties']['vaultUri']) else: print('Return code ' + str(ret.status_code) + ' from create_keyvault().') print(ret.text) else: ret = azurerm.delete_keyvault(access_token, subscription_id, rgname, name) if ret.status_code == 200: print('Successsfully deleted key vault: ' + name) else: print('Return code ' + str(ret.status_code) + ' from delete_keyvault().') print(ret.text)
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--add', '-a', action='store_true', default=\n False, help='add a key vault')\n arg_parser.add_argument('--delete', '-d', action='store_true', default=\n False, help='delete a key vault')\n arg_parser.add_argument('--name', '-n', required=True, action='store',\n help='Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--location', '-l', required=True, action=\n 'store', help='Location, e.g. eastus')\n arg_parser.add_argument('--verbose', '-v', action='store_true', default\n =False, help='Print operational details')\n args = arg_parser.parse_args()\n name = args.name\n rgname = args.rgname\n location = args.location\n if args.add is True and args.delete is True:\n sys.exit('Specify --add or --delete, not both.')\n if args.add is False and args.delete is False:\n sys.exit('No operation specified, use --add or --delete.')\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n endpoint = os.environ['MSI_ENDPOINT']\n else:\n sys.exit('Not running in cloud shell or MSI_ENDPOINT not set')\n if args.verbose is True:\n print('Getting Azure token from MSI endpoint..')\n access_token = azurerm.get_access_token_from_cli()\n if args.verbose is True:\n print('Getting Azure subscription ID from MSI endpoint..')\n subscription_id = azurerm.get_subscription_from_cli()\n if args.add is True:\n if args.verbose is True:\n print('Getting list of tenant IDs...')\n tenants = azurerm.list_tenants(access_token)\n tenant_id = tenants['value'][0]['tenantId']\n if args.verbose is True:\n print('My tenantId = ' + tenant_id)\n if args.verbose is True:\n print('Querying graph...')\n object_id = azurerm.get_object_id_from_graph()\n if args.verbose is True:\n print('My object ID = ' + object_id)\n ret = azurerm.create_keyvault(access_token, subscription_id, rgname,\n name, location, tenant_id=tenant_id, object_id=object_id)\n if ret.status_code == 200:\n print('Successsfully created key vault: ' + name)\n print('Vault URI: ' + ret.json()['properties']['vaultUri'])\n else:\n print('Return code ' + str(ret.status_code) +\n ' from create_keyvault().')\n print(ret.text)\n else:\n ret = azurerm.delete_keyvault(access_token, subscription_id, rgname,\n name)\n if ret.status_code == 200:\n print('Successsfully deleted key vault: ' + name)\n else:\n print('Return code ' + str(ret.status_code) +\n ' from delete_keyvault().')\n print(ret.text)\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--name', '-n', required=True, action='store', help='Name of vmss') arg_parser.add_argument('--capacity', '-c', required=True, action= 'store', help='Number of VMs') arg_parser.add_argument('--location', '-l', action='store', help= 'Location, e.g. eastus') arg_parser.add_argument('--verbose', '-v', action='store_true', default =False, help='Print operational details') args = arg_parser.parse_args() name = args.name location = args.location capacity = args.capacity try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: print('Error: Expecting azurermconfig.json in current folder') sys.exit() tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) print('Creating resource group: ' + name) rmreturn = azurerm.create_resource_group(access_token, subscription_id, name, location) print(rmreturn) nsg_name = name + 'nsg' print('Creating NSG: ' + nsg_name) rmreturn = azurerm.create_nsg(access_token, subscription_id, name, nsg_name, location) nsg_id = rmreturn.json()['id'] print('nsg_id = ' + nsg_id) nsg_rule = 'ssh' print('Creating NSG rule: ' + nsg_rule) rmreturn = azurerm.create_nsg_rule(access_token, subscription_id, name, nsg_name, nsg_rule, description='ssh rule', destination_range='22') vnetname = name + 'vnet' print('Creating VNet: ' + vnetname) rmreturn = azurerm.create_vnet(access_token, subscription_id, name, vnetname, location, nsg_id=nsg_id) print(rmreturn) subnet_id = rmreturn.json()['properties']['subnets'][0]['id'] print('subnet_id = ' + subnet_id) public_ip_name = name + 'ip' dns_label = name + 'ip' print('Creating public IP address: ' + public_ip_name) rmreturn = azurerm.create_public_ip(access_token, subscription_id, name, public_ip_name, dns_label, location) print(rmreturn) ip_id = rmreturn.json()['id'] print('ip_id = ' + ip_id) lb_name = vnetname + 'lb' print('Creating load balancer with nat pool: ' + lb_name) rmreturn = azurerm.create_lb_with_nat_pool(access_token, subscription_id, name, lb_name, ip_id, '50000', '50100', '22', location ) be_pool_id = rmreturn.json()['properties']['backendAddressPools'][0]['id'] lb_pool_id = rmreturn.json()['properties']['inboundNatPools'][0]['id'] vmss_name = name vm_size = 'Standard_D1_v2' publisher = 'Canonical' offer = 'UbuntuServer' sku = '16.04-LTS' version = 'latest' username = 'azure' password = Haikunator().haikunate(delimiter=',') print('Password = ' + password) print('Creating VMSS: ' + vmss_name) rmreturn = azurerm.create_vmss(access_token, subscription_id, name, vmss_name, vm_size, capacity, publisher, offer, sku, version, subnet_id, be_pool_id, lb_pool_id, location, username=username, password=password) print(rmreturn) print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators =(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--name', '-n', required=True, action='store',\n help='Name of vmss')\n arg_parser.add_argument('--capacity', '-c', required=True, action=\n 'store', help='Number of VMs')\n arg_parser.add_argument('--location', '-l', action='store', help=\n 'Location, e.g. eastus')\n arg_parser.add_argument('--verbose', '-v', action='store_true', default\n =False, help='Print operational details')\n args = arg_parser.parse_args()\n name = args.name\n location = args.location\n capacity = args.capacity\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n print('Error: Expecting azurermconfig.json in current folder')\n sys.exit()\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n print('Creating resource group: ' + name)\n rmreturn = azurerm.create_resource_group(access_token, subscription_id,\n name, location)\n print(rmreturn)\n nsg_name = name + 'nsg'\n print('Creating NSG: ' + nsg_name)\n rmreturn = azurerm.create_nsg(access_token, subscription_id, name,\n nsg_name, location)\n nsg_id = rmreturn.json()['id']\n print('nsg_id = ' + nsg_id)\n nsg_rule = 'ssh'\n print('Creating NSG rule: ' + nsg_rule)\n rmreturn = azurerm.create_nsg_rule(access_token, subscription_id, name,\n nsg_name, nsg_rule, description='ssh rule', destination_range='22')\n vnetname = name + 'vnet'\n print('Creating VNet: ' + vnetname)\n rmreturn = azurerm.create_vnet(access_token, subscription_id, name,\n vnetname, location, nsg_id=nsg_id)\n print(rmreturn)\n subnet_id = rmreturn.json()['properties']['subnets'][0]['id']\n print('subnet_id = ' + subnet_id)\n public_ip_name = name + 'ip'\n dns_label = name + 'ip'\n print('Creating public IP address: ' + public_ip_name)\n rmreturn = azurerm.create_public_ip(access_token, subscription_id, name,\n public_ip_name, dns_label, location)\n print(rmreturn)\n ip_id = rmreturn.json()['id']\n print('ip_id = ' + ip_id)\n lb_name = vnetname + 'lb'\n print('Creating load balancer with nat pool: ' + lb_name)\n rmreturn = azurerm.create_lb_with_nat_pool(access_token,\n subscription_id, name, lb_name, ip_id, '50000', '50100', '22', location\n )\n be_pool_id = rmreturn.json()['properties']['backendAddressPools'][0]['id']\n lb_pool_id = rmreturn.json()['properties']['inboundNatPools'][0]['id']\n vmss_name = name\n vm_size = 'Standard_D1_v2'\n publisher = 'Canonical'\n offer = 'UbuntuServer'\n sku = '16.04-LTS'\n version = 'latest'\n username = 'azure'\n password = Haikunator().haikunate(delimiter=',')\n print('Password = ' + password)\n print('Creating VMSS: ' + vmss_name)\n rmreturn = azurerm.create_vmss(access_token, subscription_id, name,\n vmss_name, vm_size, capacity, publisher, offer, sku, version,\n subnet_id, be_pool_id, lb_pool_id, location, username=username,\n password=password)\n print(rmreturn)\n print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators\n =(',', ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(idstr): rgidx = idstr.find('resourceGroups/') providx = idstr.find('/providers/') return idstr[rgidx + 15:providx]
rgfromid
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(idstr):\n rgidx = idstr.find('resourceGroups/')\n providx = idstr.find('/providers/')\n return idstr[rgidx + 15:providx]\n", "role": "user" }, { "content": "rgfromid", "role": "assistant" } ]
def x(): try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) sa_list = azurerm.list_storage_accounts_sub(access_token, subscription_id) for sta in sa_list['value']: print(sta['name'] + ', ' + sta['properties']['primaryLocation'] + ', ' + rgfromid(sta['id'])) quota_info = azurerm.get_storage_usage(access_token, subscription_id) used = quota_info['value'][0]['currentValue'] limit = quota_info['value'][0]['limit'] print('\nUsing ' + str(used) + ' accounts out of ' + str(limit) + '.')
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n sa_list = azurerm.list_storage_accounts_sub(access_token, subscription_id)\n for sta in sa_list['value']:\n print(sta['name'] + ', ' + sta['properties']['primaryLocation'] +\n ', ' + rgfromid(sta['id']))\n quota_info = azurerm.get_storage_usage(access_token, subscription_id)\n used = quota_info['value'][0]['currentValue']\n limit = quota_info['value'][0]['limit']\n print('\\nUsing ' + str(used) + ' accounts out of ' + str(limit) + '.')\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): if len(sys.argv) < 3: usage() rgname = sys.argv[1] vmss = sys.argv[2] try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) instances = azurerm.list_vmss_vm_instance_view(access_token, subscription_id, rgname, vmss) print(json.dumps(instances, sort_keys=False, indent=2, separators=(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if len(sys.argv) < 3:\n usage()\n rgname = sys.argv[1]\n vmss = sys.argv[2]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n instances = azurerm.list_vmss_vm_instance_view(access_token,\n subscription_id, rgname, vmss)\n print(json.dumps(instances, sort_keys=False, indent=2, separators=(',',\n ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(access_token, subscription_id, msname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/microsoft.media/CheckNameAvailability?', 'api-version=', MEDIA_API]) ms_body = {'name': msname} ms_body['type'] = 'mediaservices' body = json.dumps(ms_body) return do_post(endpoint, body, access_token)
check_media_service_name_availability
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/microsoft.media/CheckNameAvailability?', 'api-version=',\n MEDIA_API])\n ms_body = {'name': msname}\n ms_body['type'] = 'mediaservices'\n body = json.dumps(ms_body)\n return do_post(endpoint, body, access_token)\n", "role": "user" }, { "content": "check_media_service_name_availability", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, location, stoname, msname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', rgname, '/providers/microsoft.media/mediaservices/', msname, '?api-version=', MEDIA_API]) ms_body = {'name': msname} ms_body['location'] = location sub_id_str = ('/subscriptions/' + subscription_id + '/resourceGroups/' + rgname + '/providers/Microsoft.Storage/storageAccounts/' + stoname) storage_account = {'id': sub_id_str} storage_account['isPrimary'] = True properties = {'storageAccounts': [storage_account]} ms_body['properties'] = properties body = json.dumps(ms_body) return do_put(endpoint, body, access_token)
create_media_service_rg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, location, stoname, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/mediaservices/', msname,\n '?api-version=', MEDIA_API])\n ms_body = {'name': msname}\n ms_body['location'] = location\n sub_id_str = ('/subscriptions/' + subscription_id + '/resourceGroups/' +\n rgname + '/providers/Microsoft.Storage/storageAccounts/' + stoname)\n storage_account = {'id': sub_id_str}\n storage_account['isPrimary'] = True\n properties = {'storageAccounts': [storage_account]}\n ms_body['properties'] = properties\n body = json.dumps(ms_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_media_service_rg", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, msname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', rgname, '/providers/microsoft.media/mediaservices/', msname, '?api-version=', MEDIA_API]) return do_delete(endpoint, access_token)
delete_media_service_rg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/mediaservices/', msname,\n '?api-version=', MEDIA_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_media_service_rg", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, msname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', rgname, '/providers/microsoft.media/', '/mediaservices/', msname, '/listKeys?api-version=', MEDIA_API]) return do_get(endpoint, access_token)
list_media_endpoint_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/', '/mediaservices/', msname,\n '/listKeys?api-version=', MEDIA_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_media_endpoint_keys", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/microsoft.media/mediaservices?api-version=', MEDIA_API]) return do_get(endpoint, access_token)
list_media_services
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/microsoft.media/mediaservices?api-version=', MEDIA_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_media_services", "role": "assistant" } ]
def x(access_token, subscription_id, rgname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', rgname, '/providers/microsoft.media/mediaservices?api-version=', MEDIA_API]) return do_get(endpoint, access_token)
list_media_services_rg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/mediaservices?api-version=', MEDIA_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_media_services_rg", "role": "assistant" } ]
def x(accountname, accountkey): accountkey_encoded = urllib.parse.quote(accountkey, safe='') body = ('grant_type=client_credentials&client_id=' + accountname + '&client_secret=' + accountkey_encoded + ' &scope=urn%3aWindowsAzureMediaServices') return do_ams_auth(ams_auth_endpoint, body)
get_ams_access_token
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(accountname, accountkey):\n accountkey_encoded = urllib.parse.quote(accountkey, safe='')\n body = ('grant_type=client_credentials&client_id=' + accountname +\n '&client_secret=' + accountkey_encoded +\n ' &scope=urn%3aWindowsAzureMediaServices')\n return do_ams_auth(ams_auth_endpoint, body)\n", "role": "user" }, { "content": "get_ams_access_token", "role": "assistant" } ]
def x(access_token, name, options='0'): path = '/Assets' endpoint = ''.join([ams_rest_endpoint, path]) body = '{"Name": "' + name + '", "Options": "' + str(options) + '"}' return do_ams_post(endpoint, path, body, access_token)
create_media_asset
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, name, options='0'):\n path = '/Assets'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = '{\"Name\": \"' + name + '\", \"Options\": \"' + str(options) + '\"}'\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "create_media_asset", "role": "assistant" } ]
def x(access_token, parent_asset_id, name, is_primary='false', is_encrypted ='false', encryption_scheme='None', encryptionkey_id='None'): path = '/Files' endpoint = ''.join([ams_rest_endpoint, path]) if encryption_scheme == 'StorageEncryption': body = ('{ \t\t\t"IsEncrypted": "' + is_encrypted + '", \t\t\t"EncryptionScheme": "' + encryption_scheme + '", \t\t\t"EncryptionVersion": "' + '1.0' + '", \t\t\t"EncryptionKeyId": "' + encryptionkey_id + '", \t\t\t"IsPrimary": "' + is_primary + '", \t\t\t"MimeType": "video/mp4", \t\t\t"Name": "' + name + '", \t\t\t"ParentAssetId": "' + parent_asset_id + '" \t\t}') else: body = ('{ \t\t\t"IsPrimary": "' + is_primary + '", \t\t\t"MimeType": "video/mp4", \t\t\t"Name": "' + name + '", \t\t\t"ParentAssetId": "' + parent_asset_id + '" \t\t}') return do_ams_post(endpoint, path, body, access_token)
create_media_assetfile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, parent_asset_id, name, is_primary='false', is_encrypted\n ='false', encryption_scheme='None', encryptionkey_id='None'):\n path = '/Files'\n endpoint = ''.join([ams_rest_endpoint, path])\n if encryption_scheme == 'StorageEncryption':\n body = ('{ \\t\\t\\t\"IsEncrypted\": \"' + is_encrypted +\n '\", \\t\\t\\t\"EncryptionScheme\": \"' + encryption_scheme +\n '\", \\t\\t\\t\"EncryptionVersion\": \"' + '1.0' +\n '\", \\t\\t\\t\"EncryptionKeyId\": \"' + encryptionkey_id +\n '\", \\t\\t\\t\"IsPrimary\": \"' + is_primary +\n '\", \\t\\t\\t\"MimeType\": \"video/mp4\", \\t\\t\\t\"Name\": \"' + name +\n '\", \\t\\t\\t\"ParentAssetId\": \"' + parent_asset_id + '\" \\t\\t}')\n else:\n body = ('{ \\t\\t\\t\"IsPrimary\": \"' + is_primary +\n '\", \\t\\t\\t\"MimeType\": \"video/mp4\", \\t\\t\\t\"Name\": \"' + name +\n '\", \\t\\t\\t\"ParentAssetId\": \"' + parent_asset_id + '\" \\t\\t}')\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "create_media_assetfile", "role": "assistant" } ]
def x(access_token, asset_id, accesspolicy_id): path = '/Locators' endpoint = ''.join([ams_rest_endpoint, path]) body = ('{ \t\t"AccessPolicyId":"' + accesspolicy_id + '", \t\t"AssetId":"' + asset_id + '", \t\t"Type":1 \t}') return do_ams_post(endpoint, path, body, access_token)
create_sas_locator
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, asset_id, accesspolicy_id):\n path = '/Locators'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"AccessPolicyId\":\"' + accesspolicy_id +\n '\", \\t\\t\"AssetId\":\"' + asset_id + '\", \\t\\t\"Type\":1 \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "create_sas_locator", "role": "assistant" } ]
def x(access_token, ams_account, key_delivery_url): path = '/AssetDeliveryPolicies' endpoint = ''.join([ams_rest_endpoint, path]) body = ( '{ \t\t"Name":"AssetDeliveryPolicy", \t\t"AssetDeliveryProtocol":"4", \t\t"AssetDeliveryPolicyType":"3", \t\t"AssetDeliveryConfiguration":"[{ \t\t\t\\"Key\\":\\"2\\", \t\t\t\\"Value\\":\\"' + key_delivery_url + '\\"}]" \t}') return do_ams_post(endpoint, path, body, access_token)
create_asset_delivery_policy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, ams_account, key_delivery_url):\n path = '/AssetDeliveryPolicies'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = (\n '{ \\t\\t\"Name\":\"AssetDeliveryPolicy\", \\t\\t\"AssetDeliveryProtocol\":\"4\", \\t\\t\"AssetDeliveryPolicyType\":\"3\", \\t\\t\"AssetDeliveryConfiguration\":\"[{ \\t\\t\\t\\\\\"Key\\\\\":\\\\\"2\\\\\", \\t\\t\\t\\\\\"Value\\\\\":\\\\\"'\n + key_delivery_url + '\\\\\"}]\" \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "create_asset_delivery_policy", "role": "assistant" } ]
def x(access_token, content): path = '/ContentKeyAuthorizationPolicies' endpoint = ''.join([ams_rest_endpoint, path]) body = content return do_ams_post(endpoint, path, body, access_token)
create_contentkey_authorization_policy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, content):\n path = '/ContentKeyAuthorizationPolicies'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = content\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "create_contentkey_authorization_policy", "role": "assistant" } ]
def x(access_token, key_delivery_type='2', name= 'HLS Open Authorization Policy', key_restriction_type='0'): path = '/ContentKeyAuthorizationPolicyOptions' endpoint = ''.join([ams_rest_endpoint, path]) body = ('{ \t\t"Name":"policy",\t\t"KeyDeliveryType":"' + key_delivery_type + '", \t\t"KeyDeliveryConfiguration":"", \t\t\t"Restrictions":[{ \t\t\t"Name":"' + name + '", \t\t\t"KeyRestrictionType":"' + key_restriction_type + '", \t\t\t"Requirements":null \t\t}] \t}') return do_ams_post(endpoint, path, body, access_token, 'json_only')
create_contentkey_authorization_policy_options
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, key_delivery_type='2', name=\n 'HLS Open Authorization Policy', key_restriction_type='0'):\n path = '/ContentKeyAuthorizationPolicyOptions'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"Name\":\"policy\",\\t\\t\"KeyDeliveryType\":\"' +\n key_delivery_type +\n '\", \\t\\t\"KeyDeliveryConfiguration\":\"\", \\t\\t\\t\"Restrictions\":[{ \\t\\t\\t\"Name\":\"'\n + name + '\", \\t\\t\\t\"KeyRestrictionType\":\"' + key_restriction_type +\n '\", \\t\\t\\t\"Requirements\":null \\t\\t}] \\t}')\n return do_ams_post(endpoint, path, body, access_token, 'json_only')\n", "role": "user" }, { "content": "create_contentkey_authorization_policy_options", "role": "assistant" } ]
def x(access_token, encoded_asset_id, pid, starttime=None): path = '/Locators' endpoint = ''.join([ams_rest_endpoint, path]) if starttime is None: body = ('{ \t\t\t"AccessPolicyId":"' + pid + '", \t\t\t"AssetId":"' + encoded_asset_id + '", \t\t\t"Type": "2" }') else: body = ('{ \t\t\t"AccessPolicyId":"' + pid + '", \t\t\t"AssetId":"' + encoded_asset_id + '", \t\t\t"StartTime":"' + str(starttime) + '", \t\t\t"Type": "2" \t\t}') return do_ams_post(endpoint, path, body, access_token, 'json_only')
create_ondemand_streaming_locator
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, encoded_asset_id, pid, starttime=None):\n path = '/Locators'\n endpoint = ''.join([ams_rest_endpoint, path])\n if starttime is None:\n body = ('{ \\t\\t\\t\"AccessPolicyId\":\"' + pid + '\", \\t\\t\\t\"AssetId\":\"' +\n encoded_asset_id + '\", \\t\\t\\t\"Type\": \"2\" }')\n else:\n body = ('{ \\t\\t\\t\"AccessPolicyId\":\"' + pid + '\", \\t\\t\\t\"AssetId\":\"' +\n encoded_asset_id + '\", \\t\\t\\t\"StartTime\":\"' + str(starttime) +\n '\", \\t\\t\\t\"Type\": \"2\" \\t\\t}')\n return do_ams_post(endpoint, path, body, access_token, 'json_only')\n", "role": "user" }, { "content": "create_ondemand_streaming_locator", "role": "assistant" } ]
def x(access_token, name, duration, permission='1'): path = '/AccessPolicies' endpoint = ''.join([ams_rest_endpoint, path]) body = ('{ \t\t"Name": "' + str(name) + '", \t\t"DurationInMinutes": "' + duration + '", \t\t"Permissions": "' + permission + '" \t}') return do_ams_post(endpoint, path, body, access_token)
create_asset_accesspolicy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, name, duration, permission='1'):\n path = '/AccessPolicies'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"Name\": \"' + str(name) + '\", \\t\\t\"DurationInMinutes\": \"' +\n duration + '\", \\t\\t\"Permissions\": \"' + permission + '\" \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "create_asset_accesspolicy", "role": "assistant" } ]
def x(access_token, name, description='New Streaming Endpoint', scale_units='1' ): path = '/StreamingEndpoints' endpoint = ''.join([ams_rest_endpoint, path]) body = ('{ \t\t"Id":null, \t\t"Name":"' + name + '", \t\t"Description":"' + description + '", \t\t"Created":"0001-01-01T00:00:00", \t\t"LastModified":"0001-01-01T00:00:00", \t\t"State":null, \t\t"HostName":null, \t\t"ScaleUnits":"' + scale_units + '", \t\t"CrossSiteAccessPolicies":{ \t\t\t"ClientAccessPolicy":"<access-policy><cross-domain-access><policy><allow-from http-request-headers=\\"*\\"><domain uri=\\"http://*\\" /></allow-from><grant-to><resource path=\\"/\\" include-subpaths=\\"false\\" /></grant-to></policy></cross-domain-access></access-policy>", \t\t\t"CrossDomainPolicy":"<?xml version=\\"1.0\\"?><!DOCTYPE cross-domain-policy SYSTEM \\"http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd\\"><cross-domain-policy><allow-access-from domain=\\"*\\" /></cross-domain-policy>" \t\t} \t}' ) return do_ams_post(endpoint, path, body, access_token)
create_streaming_endpoint
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, name, description='New Streaming Endpoint', scale_units='1'\n ):\n path = '/StreamingEndpoints'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"Id\":null, \\t\\t\"Name\":\"' + name +\n '\", \\t\\t\"Description\":\"' + description +\n '\", \\t\\t\"Created\":\"0001-01-01T00:00:00\", \\t\\t\"LastModified\":\"0001-01-01T00:00:00\", \\t\\t\"State\":null, \\t\\t\"HostName\":null, \\t\\t\"ScaleUnits\":\"'\n + scale_units +\n '\", \\t\\t\"CrossSiteAccessPolicies\":{ \\t\\t\\t\"ClientAccessPolicy\":\"<access-policy><cross-domain-access><policy><allow-from http-request-headers=\\\\\"*\\\\\"><domain uri=\\\\\"http://*\\\\\" /></allow-from><grant-to><resource path=\\\\\"/\\\\\" include-subpaths=\\\\\"false\\\\\" /></grant-to></policy></cross-domain-access></access-policy>\", \\t\\t\\t\"CrossDomainPolicy\":\"<?xml version=\\\\\"1.0\\\\\"?><!DOCTYPE cross-domain-policy SYSTEM \\\\\"http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd\\\\\"><cross-domain-policy><allow-access-from domain=\\\\\"*\\\\\" /></cross-domain-policy>\" \\t\\t} \\t}'\n )\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "create_streaming_endpoint", "role": "assistant" } ]
def x(access_token, streaming_endpoint_id, scale_units): path = '/StreamingEndpoints' full_path = ''.join([path, "('", streaming_endpoint_id, "')", '/Scale']) full_path_encoded = urllib.parse.quote(full_path, safe='') endpoint = ''.join([ams_rest_endpoint, full_path_encoded]) body = '{"scaleUnits": "' + str(scale_units) + '"}' return do_ams_post(endpoint, full_path_encoded, body, access_token)
scale_streaming_endpoint
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, streaming_endpoint_id, scale_units):\n path = '/StreamingEndpoints'\n full_path = ''.join([path, \"('\", streaming_endpoint_id, \"')\", '/Scale'])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n body = '{\"scaleUnits\": \"' + str(scale_units) + '\"}'\n return do_ams_post(endpoint, full_path_encoded, body, access_token)\n", "role": "user" }, { "content": "scale_streaming_endpoint", "role": "assistant" } ]
def x(access_token, asset_id, encryptionkey_id, ams_redirected_rest_endpoint): path = '/Assets' full_path = ''.join([path, "('", asset_id, "')", '/$links/ContentKeys']) full_path_encoded = urllib.parse.quote(full_path, safe='') endpoint = ''.join([ams_rest_endpoint, full_path_encoded]) uri = ''.join([ams_redirected_rest_endpoint, 'ContentKeys', "('", encryptionkey_id, "')"]) body = '{"uri": "' + uri + '"}' return do_ams_post(endpoint, full_path_encoded, body, access_token)
link_asset_content_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, asset_id, encryptionkey_id, ams_redirected_rest_endpoint):\n path = '/Assets'\n full_path = ''.join([path, \"('\", asset_id, \"')\", '/$links/ContentKeys'])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n uri = ''.join([ams_redirected_rest_endpoint, 'ContentKeys', \"('\",\n encryptionkey_id, \"')\"])\n body = '{\"uri\": \"' + uri + '\"}'\n return do_ams_post(endpoint, full_path_encoded, body, access_token)\n", "role": "user" }, { "content": "link_asset_content_key", "role": "assistant" } ]
def x(access_token, ckap_id, options_id, ams_redirected_rest_endpoint): path = '/ContentKeyAuthorizationPolicies' full_path = ''.join([path, "('", ckap_id, "')", '/$links/Options']) full_path_encoded = urllib.parse.quote(full_path, safe='') endpoint = ''.join([ams_rest_endpoint, full_path_encoded]) uri = ''.join([ams_redirected_rest_endpoint, 'ContentKeyAuthorizationPolicyOptions', "('", options_id, "')"]) body = '{"uri": "' + uri + '"}' return do_ams_post(endpoint, full_path_encoded, body, access_token, 'json_only', '1.0;NetFx')
link_contentkey_authorization_policy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, ckap_id, options_id, ams_redirected_rest_endpoint):\n path = '/ContentKeyAuthorizationPolicies'\n full_path = ''.join([path, \"('\", ckap_id, \"')\", '/$links/Options'])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n uri = ''.join([ams_redirected_rest_endpoint,\n 'ContentKeyAuthorizationPolicyOptions', \"('\", options_id, \"')\"])\n body = '{\"uri\": \"' + uri + '\"}'\n return do_ams_post(endpoint, full_path_encoded, body, access_token,\n 'json_only', '1.0;NetFx')\n", "role": "user" }, { "content": "link_contentkey_authorization_policy", "role": "assistant" } ]
def x(access_token, ck_id, oid): path = '/ContentKeys' body = '{"AuthorizationPolicyId":"' + oid + '"}' return helper_add(access_token, ck_id, path, body)
add_authorization_policy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, ck_id, oid):\n path = '/ContentKeys'\n body = '{\"AuthorizationPolicyId\":\"' + oid + '\"}'\n return helper_add(access_token, ck_id, path, body)\n", "role": "user" }, { "content": "add_authorization_policy", "role": "assistant" } ]
def x(access_token, parent_asset_id, asset_id, content_length, name): path = '/Files' full_path = ''.join([path, "('", asset_id, "')"]) full_path_encoded = urllib.parse.quote(full_path, safe='') endpoint = ''.join([ams_rest_endpoint, full_path_encoded]) body = ('{ \t\t"ContentFileSize": "' + str(content_length) + '", \t\t"Id": "' + asset_id + '", \t\t"MimeType": "video/mp4", \t\t"Name": "' + name + '", \t\t"ParentAssetId": "' + parent_asset_id + '" \t}') return do_ams_patch(endpoint, full_path_encoded, body, access_token)
update_media_assetfile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, parent_asset_id, asset_id, content_length, name):\n path = '/Files'\n full_path = ''.join([path, \"('\", asset_id, \"')\"])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n body = ('{ \\t\\t\"ContentFileSize\": \"' + str(content_length) +\n '\", \\t\\t\"Id\": \"' + asset_id +\n '\", \\t\\t\"MimeType\": \"video/mp4\", \\t\\t\"Name\": \"' + name +\n '\", \\t\\t\"ParentAssetId\": \"' + parent_asset_id + '\" \\t}')\n return do_ams_patch(endpoint, full_path_encoded, body, access_token)\n", "role": "user" }, { "content": "update_media_assetfile", "role": "assistant" } ]
def x(access_token, ck_id, key_type): path = '/ContentKeys' full_path = ''.join([path, "('", ck_id, "')", '/GetKeyDeliveryUrl']) endpoint = ''.join([ams_rest_endpoint, full_path]) body = '{"keyDeliveryType": "' + key_type + '"}' return do_ams_post(endpoint, full_path, body, access_token)
get_key_delivery_url
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, ck_id, key_type):\n path = '/ContentKeys'\n full_path = ''.join([path, \"('\", ck_id, \"')\", '/GetKeyDeliveryUrl'])\n endpoint = ''.join([ams_rest_endpoint, full_path])\n body = '{\"keyDeliveryType\": \"' + key_type + '\"}'\n return do_ams_post(endpoint, full_path, body, access_token)\n", "role": "user" }, { "content": "get_key_delivery_url", "role": "assistant" } ]
def x(access_token, processor_id, asset_id, output_assetname, json_profile): path = '/Jobs' endpoint = ''.join([ams_rest_endpoint, path]) assets_path = ''.join(['/Assets', "('", asset_id, "')"]) assets_path_encoded = urllib.parse.quote(assets_path, safe='') endpoint_assets = ''.join([ams_rest_endpoint, assets_path_encoded]) body = ('{ \t\t"Name":"' + output_assetname + '", \t\t"InputMediaAssets":[{ \t \t\t"__metadata":{ \t \t\t\t"uri":"' + endpoint_assets + '" \t \t\t} \t \t}], \t\t"Tasks":[{ \t \t\t"Configuration":\'' + json_profile + '\', \t \t\t"MediaProcessorId":"' + processor_id + '", \t \t\t"TaskBody":"<?xml version=\\"1.0\\" encoding=\\"utf-16\\"?><taskBody><inputAsset>JobInputAsset(0)</inputAsset><outputAsset assetCreationOptions=\\"0\\" assetName=\\"' + output_assetname + '\\">JobOutputAsset(0)</outputAsset></taskBody>" \t\t}] \t}') return do_ams_post(endpoint, path, body, access_token)
encode_mezzanine_asset
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, processor_id, asset_id, output_assetname, json_profile):\n path = '/Jobs'\n endpoint = ''.join([ams_rest_endpoint, path])\n assets_path = ''.join(['/Assets', \"('\", asset_id, \"')\"])\n assets_path_encoded = urllib.parse.quote(assets_path, safe='')\n endpoint_assets = ''.join([ams_rest_endpoint, assets_path_encoded])\n body = ('{ \\t\\t\"Name\":\"' + output_assetname +\n '\", \\t\\t\"InputMediaAssets\":[{ \\t \\t\\t\"__metadata\":{ \\t \\t\\t\\t\"uri\":\"'\n + endpoint_assets +\n '\" \\t \\t\\t} \\t \\t}], \\t\\t\"Tasks\":[{ \\t \\t\\t\"Configuration\":\\''\n + json_profile + '\\', \\t \\t\\t\"MediaProcessorId\":\"' +\n processor_id +\n '\", \\t \\t\\t\"TaskBody\":\"<?xml version=\\\\\"1.0\\\\\" encoding=\\\\\"utf-16\\\\\"?><taskBody><inputAsset>JobInputAsset(0)</inputAsset><outputAsset assetCreationOptions=\\\\\"0\\\\\" assetName=\\\\\"'\n + output_assetname +\n '\\\\\">JobOutputAsset(0)</outputAsset></taskBody>\" \\t\\t}] \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n", "role": "user" }, { "content": "encode_mezzanine_asset", "role": "assistant" } ]
def x(access_token, ck_id, path, body): full_path = ''.join([path, "('", ck_id, "')"]) full_path_encoded = urllib.parse.quote(full_path, safe='') endpoint = ''.join([ams_rest_endpoint, full_path_encoded]) return do_ams_put(endpoint, full_path_encoded, body, access_token, 'json_only', '1.0;NetFx')
helper_add
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, ck_id, path, body):\n full_path = ''.join([path, \"('\", ck_id, \"')\"])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n return do_ams_put(endpoint, full_path_encoded, body, access_token,\n 'json_only', '1.0;NetFx')\n", "role": "user" }, { "content": "helper_add", "role": "assistant" } ]
def x(access_token, oid, path): if oid != '': path = ''.join([path, "('", oid, "')"]) endpoint = ''.join([ams_rest_endpoint, path]) return do_ams_get(endpoint, path, access_token)
helper_list
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, oid, path):\n if oid != '':\n path = ''.join([path, \"('\", oid, \"')\"])\n endpoint = ''.join([ams_rest_endpoint, path])\n return do_ams_get(endpoint, path, access_token)\n", "role": "user" }, { "content": "helper_list", "role": "assistant" } ]
def x(access_token, oid, path): full_path = ''.join([path, "('", oid, "')"]) full_path_encoded = urllib.parse.quote(full_path, safe='') endpoint = ''.join([ams_rest_endpoint, full_path_encoded]) return do_ams_delete(endpoint, full_path_encoded, access_token)
helper_delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, oid, path):\n full_path = ''.join([path, \"('\", oid, \"')\"])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n return do_ams_delete(endpoint, full_path_encoded, access_token)\n", "role": "user" }, { "content": "helper_delete", "role": "assistant" } ]
def x(code): code_description = '' if code == '0': code_description = 'Queued' if code == '1': code_description = 'Scheduled' if code == '2': code_description = 'Processing' if code == '3': code_description = 'Finished' if code == '4': code_description = 'Error' if code == '5': code_description = 'Canceled' if code == '6': code_description = 'Canceling' return code_description
translate_job_state
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(code):\n code_description = ''\n if code == '0':\n code_description = 'Queued'\n if code == '1':\n code_description = 'Scheduled'\n if code == '2':\n code_description = 'Processing'\n if code == '3':\n code_description = 'Finished'\n if code == '4':\n code_description = 'Error'\n if code == '5':\n code_description = 'Canceled'\n if code == '6':\n code_description = 'Canceling'\n return code_description\n", "role": "user" }, { "content": "translate_job_state", "role": "assistant" } ]
def x(access_token, subscription_id, rg_name, deployment_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rg_name, '/providers/Microsoft.Resources/deployments/', deployment_name, '/operations', '?api-version=', BASE_API]) return do_get(endpoint, access_token)
list_deployment_operations
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rg_name, deployment_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rg_name,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '/operations', '?api-version=', BASE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_deployment_operations", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, lb_name, public_ip_id, fe_start_port, fe_end_port, backend_port, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/loadBalancers/', lb_name, '?api-version=', NETWORK_API]) lb_body = {'location': location} frontendipcconfig = {'name': 'LoadBalancerFrontEnd'} fipc_properties = {'publicIPAddress': {'id': public_ip_id}} frontendipcconfig['properties'] = fipc_properties properties = {'frontendIPConfigurations': [frontendipcconfig]} properties['backendAddressPools'] = [{'name': 'bepool'}] inbound_natpool = {'name': 'natpool'} lbfe_id = ('/subscriptions/' + subscription_id + '/resourceGroups/' + resource_group + '/providers/Microsoft.Network/loadBalancers/' + lb_name + '/frontendIPConfigurations/LoadBalancerFrontEnd') ibnp_properties = {'frontendIPConfiguration': {'id': lbfe_id}} ibnp_properties['protocol'] = 'tcp' ibnp_properties['frontendPortRangeStart'] = fe_start_port ibnp_properties['frontendPortRangeEnd'] = fe_end_port ibnp_properties['backendPort'] = backend_port inbound_natpool['properties'] = ibnp_properties properties['inboundNatPools'] = [inbound_natpool] lb_body['properties'] = properties body = json.dumps(lb_body) return do_put(endpoint, body, access_token)
create_lb_with_nat_pool
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, lb_name, public_ip_id,\n fe_start_port, fe_end_port, backend_port, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '?api-version=', NETWORK_API])\n lb_body = {'location': location}\n frontendipcconfig = {'name': 'LoadBalancerFrontEnd'}\n fipc_properties = {'publicIPAddress': {'id': public_ip_id}}\n frontendipcconfig['properties'] = fipc_properties\n properties = {'frontendIPConfigurations': [frontendipcconfig]}\n properties['backendAddressPools'] = [{'name': 'bepool'}]\n inbound_natpool = {'name': 'natpool'}\n lbfe_id = ('/subscriptions/' + subscription_id + '/resourceGroups/' +\n resource_group + '/providers/Microsoft.Network/loadBalancers/' +\n lb_name + '/frontendIPConfigurations/LoadBalancerFrontEnd')\n ibnp_properties = {'frontendIPConfiguration': {'id': lbfe_id}}\n ibnp_properties['protocol'] = 'tcp'\n ibnp_properties['frontendPortRangeStart'] = fe_start_port\n ibnp_properties['frontendPortRangeEnd'] = fe_end_port\n ibnp_properties['backendPort'] = backend_port\n inbound_natpool['properties'] = ibnp_properties\n properties['inboundNatPools'] = [inbound_natpool]\n lb_body['properties'] = properties\n body = json.dumps(lb_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_lb_with_nat_pool", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, nic_name, public_ip_id, subnet_id, location, nsg_id=None): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/networkInterfaces/', nic_name, '?api-version=', NETWORK_API]) nic_body = {'location': location} ipconfig = {'name': 'ipconfig1'} ipc_properties = {'privateIPAllocationMethod': 'Dynamic'} ipc_properties['publicIPAddress'] = {'id': public_ip_id} ipc_properties['subnet'] = {'id': subnet_id} ipconfig['properties'] = ipc_properties properties = {'ipConfigurations': [ipconfig]} if nsg_id is not None: properties['networkSecurityGroup'] = {'id': nsg_id} nic_body['properties'] = properties body = json.dumps(nic_body) return do_put(endpoint, body, access_token)
create_nic
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, nic_name, public_ip_id,\n subnet_id, location, nsg_id=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkInterfaces/', nic_name,\n '?api-version=', NETWORK_API])\n nic_body = {'location': location}\n ipconfig = {'name': 'ipconfig1'}\n ipc_properties = {'privateIPAllocationMethod': 'Dynamic'}\n ipc_properties['publicIPAddress'] = {'id': public_ip_id}\n ipc_properties['subnet'] = {'id': subnet_id}\n ipconfig['properties'] = ipc_properties\n properties = {'ipConfigurations': [ipconfig]}\n if nsg_id is not None:\n properties['networkSecurityGroup'] = {'id': nsg_id}\n nic_body['properties'] = properties\n body = json.dumps(nic_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_nic", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, nsg_name, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name, '?api-version=', NETWORK_API]) nsg_body = {'location': location} body = json.dumps(nsg_body) return do_put(endpoint, body, access_token)
create_nsg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, nsg_name, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '?api-version=', NETWORK_API])\n nsg_body = {'location': location}\n body = json.dumps(nsg_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_nsg", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, nsg_name, nsg_rule_name, description, protocol='Tcp', source_range='*', destination_range='*', source_prefix='*', destination_prefix='*', access='Allow', priority=100, direction='Inbound'): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name, '/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API]) properties = {'description': description} properties['protocol'] = protocol properties['sourcePortRange'] = source_range properties['destinationPortRange'] = destination_range properties['sourceAddressPrefix'] = source_prefix properties['destinationAddressPrefix'] = destination_prefix properties['access'] = access properties['priority'] = priority properties['direction'] = direction ip_body = {'properties': properties} body = json.dumps(ip_body) return do_put(endpoint, body, access_token)
create_nsg_rule
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, nsg_name,\n nsg_rule_name, description, protocol='Tcp', source_range='*',\n destination_range='*', source_prefix='*', destination_prefix='*',\n access='Allow', priority=100, direction='Inbound'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API])\n properties = {'description': description}\n properties['protocol'] = protocol\n properties['sourcePortRange'] = source_range\n properties['destinationPortRange'] = destination_range\n properties['sourceAddressPrefix'] = source_prefix\n properties['destinationAddressPrefix'] = destination_prefix\n properties['access'] = access\n properties['priority'] = priority\n properties['direction'] = direction\n ip_body = {'properties': properties}\n body = json.dumps(ip_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_nsg_rule", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, public_ip_name, dns_label, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/publicIPAddresses/', public_ip_name, '?api-version=', NETWORK_API]) ip_body = {'location': location} properties = {'publicIPAllocationMethod': 'Dynamic'} properties['dnsSettings'] = {'domainNameLabel': dns_label} ip_body['properties'] = properties body = json.dumps(ip_body) return do_put(endpoint, body, access_token)
create_public_ip
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, public_ip_name,\n dns_label, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/publicIPAddresses/', public_ip_name,\n '?api-version=', NETWORK_API])\n ip_body = {'location': location}\n properties = {'publicIPAllocationMethod': 'Dynamic'}\n properties['dnsSettings'] = {'domainNameLabel': dns_label}\n ip_body['properties'] = properties\n body = json.dumps(ip_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_public_ip", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, name, location, address_prefix='10.0.0.0/16', subnet_prefix='10.0.0.0/16', nsg_id=None): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/virtualNetworks/', name, '?api-version=', NETWORK_API]) vnet_body = {'location': location} properties = {'addressSpace': {'addressPrefixes': [address_prefix]}} subnet = {'name': 'subnet'} subnet['properties'] = {'addressPrefix': subnet_prefix} if nsg_id is not None: subnet['properties']['networkSecurityGroup'] = {'id': nsg_id} properties['subnets'] = [subnet] vnet_body['properties'] = properties body = json.dumps(vnet_body) return do_put(endpoint, body, access_token)
create_vnet
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, name, location,\n address_prefix='10.0.0.0/16', subnet_prefix='10.0.0.0/16', nsg_id=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', name,\n '?api-version=', NETWORK_API])\n vnet_body = {'location': location}\n properties = {'addressSpace': {'addressPrefixes': [address_prefix]}}\n subnet = {'name': 'subnet'}\n subnet['properties'] = {'addressPrefix': subnet_prefix}\n if nsg_id is not None:\n subnet['properties']['networkSecurityGroup'] = {'id': nsg_id}\n properties['subnets'] = [subnet]\n vnet_body['properties'] = properties\n body = json.dumps(vnet_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_vnet", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, lb_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/loadBalancers/', lb_name, '?api-version=', NETWORK_API]) return do_delete(endpoint, access_token)
delete_load_balancer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, lb_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_load_balancer", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, nic_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/networkInterfaces/', nic_name, '?api-version=', NETWORK_API]) return do_delete(endpoint, access_token)
delete_nic
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, nic_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkInterfaces/', nic_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_nic", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, nsg_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name, '?api-version=', NETWORK_API]) return do_delete(endpoint, access_token)
delete_nsg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, nsg_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_nsg", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, nsg_name, nsg_rule_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name, '/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API]) return do_delete(endpoint, access_token)
delete_nsg_rule
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, nsg_name, nsg_rule_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_nsg_rule", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, public_ip_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/publicIPAddresses/', public_ip_name, '?api-version=', NETWORK_API]) return do_delete(endpoint, access_token)
delete_public_ip
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, public_ip_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/publicIPAddresses/', public_ip_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_public_ip", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/virtualNetworks/', name, '?api-version=', NETWORK_API]) return do_delete(endpoint, access_token)
delete_vnet
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_vnet", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, lb_name, rule_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/loadBalancers/', lb_name, '/inboundNatRules/', rule_name, '?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
get_lb_nat_rule
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, lb_name, rule_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '/inboundNatRules/', rule_name, '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_lb_nat_rule", "role": "assistant" } ]
def x(access_token, subscription_id, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Network/locations/', location, '/usages?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
get_network_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/locations/',\n location, '/usages?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_network_usage", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, nic_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/networkInterfaces/', nic_name, '?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
get_nic
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, nic_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkInterfaces/', nic_name,\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_nic", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, ip_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/', 'publicIPAddresses/', ip_name, '?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
get_public_ip
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, ip_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/', 'publicIPAddresses/', ip_name,\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_public_ip", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vnet_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/virtualNetworks/', vnet_name, '?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
get_vnet
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vnet_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', vnet_name,\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_vnet", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/virtualNetworks/', '?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
list_asgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', '?api-version=',\n NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_asgs", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Network/virtualNetworks/', '?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
list_asgs_all
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/virtualNetworks/',\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_asgs_all", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, lb_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/loadBalancers/', lb_name, 'inboundNatRules?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
list_lb_nat_rules
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, lb_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n 'inboundNatRules?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_lb_nat_rules", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Network/', '/loadBalancers?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
list_load_balancers
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n '/loadBalancers?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_load_balancers", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Network/', '/networkInterfaces?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
list_nics
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n '/networkInterfaces?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_nics", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Network/', 'networkSEcurityGroups?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
list_nsgs_all
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n 'networkSEcurityGroups?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_nsgs_all", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Network/', '/virtualNetworks?api-version=', NETWORK_API]) return do_get(endpoint, access_token)
list_vnets
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n '/virtualNetworks?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_vnets", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, lb_name, body): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Network/loadBalancers/', lb_name, '?api-version=', NETWORK_API]) return do_put(endpoint, body, access_token)
update_load_balancer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, lb_name, body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '?api-version=', NETWORK_API])\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "update_load_balancer", "role": "assistant" } ]
def x(access_token, sub_id, region): print(region + ':') quota = azurerm.get_compute_usage(access_token, sub_id, region) if SUMMARY is False: print(json.dumps(quota, sort_keys=False, indent=2, separators=(',', ': '))) try: for resource in quota['value']: if resource['name']['value'] == 'cores': print(' Current: ' + str(resource['currentValue']) + ', limit: ' + str(resource['limit'])) break except KeyError: print('Invalid data for region: ' + region)
print_region_quota
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, sub_id, region):\n print(region + ':')\n quota = azurerm.get_compute_usage(access_token, sub_id, region)\n if SUMMARY is False:\n print(json.dumps(quota, sort_keys=False, indent=2, separators=(',',\n ': ')))\n try:\n for resource in quota['value']:\n if resource['name']['value'] == 'cores':\n print(' Current: ' + str(resource['currentValue']) +\n ', limit: ' + str(resource['limit']))\n break\n except KeyError:\n print('Invalid data for region: ' + region)\n", "role": "user" }, { "content": "print_region_quota", "role": "assistant" } ]
def x(): if len(sys.argv) != 2: region = 'all' else: region = sys.argv[1] try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] sub_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) if region == 'all': locations = azurerm.list_locations(access_token, sub_id) for location in locations['value']: print_region_quota(access_token, sub_id, location['name']) else: print_region_quota(access_token, sub_id, region)
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if len(sys.argv) != 2:\n region = 'all'\n else:\n region = sys.argv[1]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n sub_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n if region == 'all':\n locations = azurerm.list_locations(access_token, sub_id)\n for location in locations['value']:\n print_region_quota(access_token, sub_id, location['name'])\n else:\n print_region_quota(access_token, sub_id, region)\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermonfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) """ pubs = azurerm.list_publishers(access_token, subscription_id, 'southeastasia') for pub in pubs: # print(json.dumps(pub, sort_keys=False, indent=2, separators=(',', ': '))) print(pub['name']) offers = azurerm.list_offers(access_token, subscription_id, 'southeastasia', 'rancher') for offer in offers: print(json.dumps(offer, sort_keys=False, indent=2, separators=(',', ': '))) skus = azurerm.list_skus(access_token, subscription_id, 'southeastasia', 'rancher', 'rancheros') for sku in skus: print(sku['name']) """ versions = azurerm.list_sku_versions(access_token, subscription_id, 'eastus2', 'Canonical', 'UbuntuServer', '16.04-LTS') for version in versions: print(version['name'])
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermonfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n \"\"\"\n pubs = azurerm.list_publishers(access_token, subscription_id, 'southeastasia')\n for pub in pubs:\n # print(json.dumps(pub, sort_keys=False, indent=2, separators=(',', ': ')))\n print(pub['name'])\n\n offers = azurerm.list_offers(access_token, subscription_id, 'southeastasia', 'rancher')\n for offer in offers:\n print(json.dumps(offer, sort_keys=False, indent=2, separators=(',', ': ')))\n\n skus = azurerm.list_skus(access_token, subscription_id, 'southeastasia', 'rancher', 'rancheros')\n for sku in skus:\n print(sku['name'])\n \"\"\"\n versions = azurerm.list_sku_versions(access_token, subscription_id,\n 'eastus2', 'Canonical', 'UbuntuServer', '16.04-LTS')\n for version in versions:\n print(version['name'])\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--uri', '-u', required=True, action='store', help='Template URI') arg_parser.add_argument('--params', '-p', required=True, action='store', help='Parameters json file') arg_parser.add_argument('--rg', '-g', required=True, action='store', help='Resource Group name') arg_parser.add_argument('--sub', '-s', required=False, action='store', help='subscription id (optional)') args = arg_parser.parse_args() template_uri = args.uri params = args.params rgname = args.rg subscription_id = args.sub try: with open(params) as params_file: param_data = json.load(params_file) except FileNotFoundError: print('Error: Expecting ' + params + ' in current folder') sys.exit() access_token = azurerm.get_access_token_from_cli() if subscription_id is None: subscription_id = azurerm.get_subscription_from_cli() deployment_name = Haikunator().haikunate() print('Deployment name:' + deployment_name) deploy_return = azurerm.deploy_template_uri(access_token, subscription_id, rgname, deployment_name, template_uri, param_data) print(json.dumps(deploy_return.json(), sort_keys=False, indent=2, separators=(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--uri', '-u', required=True, action='store',\n help='Template URI')\n arg_parser.add_argument('--params', '-p', required=True, action='store',\n help='Parameters json file')\n arg_parser.add_argument('--rg', '-g', required=True, action='store',\n help='Resource Group name')\n arg_parser.add_argument('--sub', '-s', required=False, action='store',\n help='subscription id (optional)')\n args = arg_parser.parse_args()\n template_uri = args.uri\n params = args.params\n rgname = args.rg\n subscription_id = args.sub\n try:\n with open(params) as params_file:\n param_data = json.load(params_file)\n except FileNotFoundError:\n print('Error: Expecting ' + params + ' in current folder')\n sys.exit()\n access_token = azurerm.get_access_token_from_cli()\n if subscription_id is None:\n subscription_id = azurerm.get_subscription_from_cli()\n deployment_name = Haikunator().haikunate()\n print('Deployment name:' + deployment_name)\n deploy_return = azurerm.deploy_template_uri(access_token,\n subscription_id, rgname, deployment_name, template_uri, param_data)\n print(json.dumps(deploy_return.json(), sort_keys=False, indent=2,\n separators=(',', ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): if len(sys.argv) != 2: sys.exit('Usage: python ' + sys.argv[0] + ' rg_name') rgname = sys.argv[1] if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ: access_token = azurerm.get_access_token_from_cli() subscription_id = azurerm.get_subscription_from_cli() else: try: with open('azurermconfig.json') as configfile: configdata = json.load(configfile) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = configdata['tenantId'] app_id = configdata['appId'] app_secret = configdata['appSecret'] subscription_id = configdata['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) rgreturn = azurerm.delete_resource_group(access_token, subscription_id, rgname) print(rgreturn)
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if len(sys.argv) != 2:\n sys.exit('Usage: python ' + sys.argv[0] + ' rg_name')\n rgname = sys.argv[1]\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n access_token = azurerm.get_access_token_from_cli()\n subscription_id = azurerm.get_subscription_from_cli()\n else:\n try:\n with open('azurermconfig.json') as configfile:\n configdata = json.load(configfile)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = configdata['tenantId']\n app_id = configdata['appId']\n app_secret = configdata['appSecret']\n subscription_id = configdata['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n rgreturn = azurerm.delete_resource_group(access_token, subscription_id,\n rgname)\n print(rgreturn)\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) locations = azurerm.list_locations(access_token, subscription_id) for location in locations['value']: print(location['name'] + ', Display Name: ' + location[ 'displayName'] + ', Coords: ' + location['latitude'] + ', ' + location['longitude'])
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n locations = azurerm.list_locations(access_token, subscription_id)\n for location in locations['value']:\n print(location['name'] + ', Display Name: ' + location[\n 'displayName'] + ', Coords: ' + location['latitude'] + ', ' +\n location['longitude'])\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): if len(sys.argv) < 4: usage() rgname = sys.argv[1] vmss_name = sys.argv[2] capacity = sys.argv[3] try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: print('Error: Expecting azurermconfig.json in current folder') sys.exit() tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) scaleoutput = azurerm.scale_vmss(access_token, subscription_id, rgname, vmss_name, capacity) print(scaleoutput.text)
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if len(sys.argv) < 4:\n usage()\n rgname = sys.argv[1]\n vmss_name = sys.argv[2]\n capacity = sys.argv[3]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n print('Error: Expecting azurermconfig.json in current folder')\n sys.exit()\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n scaleoutput = azurerm.scale_vmss(access_token, subscription_id, rgname,\n vmss_name, capacity)\n print(scaleoutput.text)\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): if len(sys.argv) < 3: usage() rgname = sys.argv[1] vmss_name = sys.argv[2] try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermonfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) instanceviewlist = azurerm.list_vmss_vm_instance_view(access_token, subscription_id, rgname, vmss_name) for vmi in instanceviewlist['value']: instance_id = vmi['instanceId'] upgrade_domain = vmi['properties']['instanceView'][ 'platformUpdateDomain'] fault_domain = vmi['properties']['instanceView']['platformFaultDomain'] print('Instance ID: ' + instance_id + ', UD: ' + str(upgrade_domain ) + ', FD: ' + str(fault_domain))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if len(sys.argv) < 3:\n usage()\n rgname = sys.argv[1]\n vmss_name = sys.argv[2]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermonfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n instanceviewlist = azurerm.list_vmss_vm_instance_view(access_token,\n subscription_id, rgname, vmss_name)\n for vmi in instanceviewlist['value']:\n instance_id = vmi['instanceId']\n upgrade_domain = vmi['properties']['instanceView'][\n 'platformUpdateDomain']\n fault_domain = vmi['properties']['instanceView']['platformFaultDomain']\n print('Instance ID: ' + instance_id + ', UD: ' + str(upgrade_domain\n ) + ', FD: ' + str(fault_domain))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, as_name, update_domains, fault_domains, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/availabilitySets/', as_name, '?api-version=', COMP_API]) as_body = {'location': location} properties = {'platformUpdateDomainCount': update_domains} properties['platformFaultDomainCount'] = fault_domains as_body['properties'] = properties body = json.dumps(as_body) return do_put(endpoint, body, access_token)
create_as
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, as_name,\n update_domains, fault_domains, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/availabilitySets/', as_name,\n '?api-version=', COMP_API])\n as_body = {'location': location}\n properties = {'platformUpdateDomainCount': update_domains}\n properties['platformFaultDomainCount'] = fault_domains\n as_body['properties'] = properties\n body = json.dumps(as_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_as", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vm_name, vm_size, publisher, offer, sku, version, nic_id, location, storage_type= 'Standard_LRS', osdisk_name=None, username='azure', password=None, public_key=None): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachines/', vm_name, '?api-version=', COMP_API]) if osdisk_name is None: osdisk_name = vm_name + 'osdisk' vm_body = {'name': vm_name} vm_body['location'] = location properties = {'hardwareProfile': {'vmSize': vm_size}} image_reference = {'publisher': publisher, 'offer': offer, 'sku': sku, 'version': version} storage_profile = {'imageReference': image_reference} os_disk = {'name': osdisk_name} os_disk['managedDisk'] = {'storageAccountType': storage_type} os_disk['caching'] = 'ReadWrite' os_disk['createOption'] = 'fromImage' storage_profile['osDisk'] = os_disk properties['storageProfile'] = storage_profile os_profile = {'computerName': vm_name} os_profile['adminUsername'] = username if password is not None: os_profile['adminPassword'] = password if public_key is not None: if password is None: disable_pswd = True else: disable_pswd = False linux_config = {'disablePasswordAuthentication': disable_pswd} pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'} pub_key['keyData'] = public_key linux_config['ssh'] = {'publicKeys': [pub_key]} os_profile['linuxConfiguration'] = linux_config properties['osProfile'] = os_profile network_profile = {'networkInterfaces': [{'id': nic_id, 'properties': { 'primary': True}}]} properties['networkProfile'] = network_profile vm_body['properties'] = properties body = json.dumps(vm_body) return do_put(endpoint, body, access_token)
create_vm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vm_name, vm_size,\n publisher, offer, sku, version, nic_id, location, storage_type=\n 'Standard_LRS', osdisk_name=None, username='azure', password=None,\n public_key=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n if osdisk_name is None:\n osdisk_name = vm_name + 'osdisk'\n vm_body = {'name': vm_name}\n vm_body['location'] = location\n properties = {'hardwareProfile': {'vmSize': vm_size}}\n image_reference = {'publisher': publisher, 'offer': offer, 'sku': sku,\n 'version': version}\n storage_profile = {'imageReference': image_reference}\n os_disk = {'name': osdisk_name}\n os_disk['managedDisk'] = {'storageAccountType': storage_type}\n os_disk['caching'] = 'ReadWrite'\n os_disk['createOption'] = 'fromImage'\n storage_profile['osDisk'] = os_disk\n properties['storageProfile'] = storage_profile\n os_profile = {'computerName': vm_name}\n os_profile['adminUsername'] = username\n if password is not None:\n os_profile['adminPassword'] = password\n if public_key is not None:\n if password is None:\n disable_pswd = True\n else:\n disable_pswd = False\n linux_config = {'disablePasswordAuthentication': disable_pswd}\n pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'}\n pub_key['keyData'] = public_key\n linux_config['ssh'] = {'publicKeys': [pub_key]}\n os_profile['linuxConfiguration'] = linux_config\n properties['osProfile'] = os_profile\n network_profile = {'networkInterfaces': [{'id': nic_id, 'properties': {\n 'primary': True}}]}\n properties['networkProfile'] = network_profile\n vm_body['properties'] = properties\n body = json.dumps(vm_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_vm", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, vm_size, capacity, publisher, offer, sku, version, subnet_id, location, be_pool_id=None, lb_pool_id=None, storage_type='Standard_LRS', username ='azure', password=None, public_key=None, overprovision=True, upgrade_policy='Manual', public_ip_per_vm=False): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '?api-version=', COMP_API]) vmss_body = {'location': location} vmss_sku = {'name': vm_size, 'tier': 'Standard', 'capacity': capacity} vmss_body['sku'] = vmss_sku properties = {'overprovision': overprovision} properties['upgradePolicy'] = {'mode': upgrade_policy} os_profile = {'computerNamePrefix': vmss_name} os_profile['adminUsername'] = username if password is not None: os_profile['adminPassword'] = password if public_key is not None: if password is None: disable_pswd = True else: disable_pswd = False linux_config = {'disablePasswordAuthentication': disable_pswd} pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'} pub_key['keyData'] = public_key linux_config['ssh'] = {'publicKeys': [pub_key]} os_profile['linuxConfiguration'] = linux_config vm_profile = {'osProfile': os_profile} os_disk = {'createOption': 'fromImage'} os_disk['managedDisk'] = {'storageAccountType': storage_type} os_disk['caching'] = 'ReadWrite' storage_profile = {'osDisk': os_disk} storage_profile['imageReference'] = {'publisher': publisher, 'offer': offer, 'sku': sku, 'version': version} vm_profile['storageProfile'] = storage_profile nic = {'name': vmss_name} ip_config = {'name': vmss_name} ip_properties = {'subnet': {'id': subnet_id}} if be_pool_id is not None: ip_properties['loadBalancerBackendAddressPools'] = [{'id': be_pool_id}] if lb_pool_id is not None: ip_properties['loadBalancerInboundNatPools'] = [{'id': lb_pool_id}] if public_ip_per_vm is True: ip_properties['publicIpAddressConfiguration'] = {'name': 'pubip', 'properties': {'idleTimeoutInMinutes': 15}} ip_config['properties'] = ip_properties nic['properties'] = {'primary': True, 'ipConfigurations': [ip_config]} network_profile = {'networkInterfaceConfigurations': [nic]} vm_profile['networkProfile'] = network_profile properties['virtualMachineProfile'] = vm_profile vmss_body['properties'] = properties body = json.dumps(vmss_body) return do_put(endpoint, body, access_token)
create_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, vm_size,\n capacity, publisher, offer, sku, version, subnet_id, location,\n be_pool_id=None, lb_pool_id=None, storage_type='Standard_LRS', username\n ='azure', password=None, public_key=None, overprovision=True,\n upgrade_policy='Manual', public_ip_per_vm=False):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n vmss_body = {'location': location}\n vmss_sku = {'name': vm_size, 'tier': 'Standard', 'capacity': capacity}\n vmss_body['sku'] = vmss_sku\n properties = {'overprovision': overprovision}\n properties['upgradePolicy'] = {'mode': upgrade_policy}\n os_profile = {'computerNamePrefix': vmss_name}\n os_profile['adminUsername'] = username\n if password is not None:\n os_profile['adminPassword'] = password\n if public_key is not None:\n if password is None:\n disable_pswd = True\n else:\n disable_pswd = False\n linux_config = {'disablePasswordAuthentication': disable_pswd}\n pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'}\n pub_key['keyData'] = public_key\n linux_config['ssh'] = {'publicKeys': [pub_key]}\n os_profile['linuxConfiguration'] = linux_config\n vm_profile = {'osProfile': os_profile}\n os_disk = {'createOption': 'fromImage'}\n os_disk['managedDisk'] = {'storageAccountType': storage_type}\n os_disk['caching'] = 'ReadWrite'\n storage_profile = {'osDisk': os_disk}\n storage_profile['imageReference'] = {'publisher': publisher, 'offer':\n offer, 'sku': sku, 'version': version}\n vm_profile['storageProfile'] = storage_profile\n nic = {'name': vmss_name}\n ip_config = {'name': vmss_name}\n ip_properties = {'subnet': {'id': subnet_id}}\n if be_pool_id is not None:\n ip_properties['loadBalancerBackendAddressPools'] = [{'id': be_pool_id}]\n if lb_pool_id is not None:\n ip_properties['loadBalancerInboundNatPools'] = [{'id': lb_pool_id}]\n if public_ip_per_vm is True:\n ip_properties['publicIpAddressConfiguration'] = {'name': 'pubip',\n 'properties': {'idleTimeoutInMinutes': 15}}\n ip_config['properties'] = ip_properties\n nic['properties'] = {'primary': True, 'ipConfigurations': [ip_config]}\n network_profile = {'networkInterfaceConfigurations': [nic]}\n vm_profile['networkProfile'] = network_profile\n properties['virtualMachineProfile'] = vm_profile\n vmss_body['properties'] = properties\n body = json.dumps(vmss_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, as_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/availabilitySets/', as_name, '?api-version=', COMP_API]) return do_delete(endpoint, access_token)
delete_as
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, as_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/availabilitySets/', as_name,\n '?api-version=', COMP_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_as", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vm_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachines/', vm_name, '?api-version=', COMP_API]) return do_delete(endpoint, access_token)
delete_vm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vm_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_vm", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '?api-version=', COMP_API]) return do_delete(endpoint, access_token)
delete_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, vm_ids): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '/delete?api-version=', COMP_API]) body = '{"instanceIds" : ' + vm_ids + '}' return do_post(endpoint, body, access_token)
delete_vmss_vms
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, vm_ids):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/delete?api-version=', COMP_API])\n body = '{\"instanceIds\" : ' + vm_ids + '}'\n return do_post(endpoint, body, access_token)\n", "role": "user" }, { "content": "delete_vmss_vms", "role": "assistant" } ]
def x(access_token, subscription_id, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.compute/locations/', location, '/usages?api-version=', COMP_API]) return do_get(endpoint, access_token)
get_compute_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.compute/locations/',\n location, '/usages?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_compute_usage", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vm_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachines/', vm_name, '?api-version=', COMP_API]) return do_get(endpoint, access_token)
get_vm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vm_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_vm", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vm_name, extension_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachines/', vm_name, '/extensions/', extension_name, '?api-version=', COMP_API]) return do_get(endpoint, access_token)
get_vm_extension
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vm_name, extension_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '/extensions/', extension_name, '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_vm_extension", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '?api-version=', COMP_API]) return do_get(endpoint, access_token)
get_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, instance_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '/virtualMachines/', str(instance_id), '?api-version=', COMP_API]) return do_get(endpoint, access_token)
get_vmss_vm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, instance_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/virtualMachines/', str(instance_id), '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_vmss_vm", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, as_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/availabilitySets/', as_name, '?api-version=', COMP_API]) return do_get(endpoint, access_token)
get_as
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, as_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/availabilitySets/', as_name,\n '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_as", "role": "assistant" } ]