source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(endpoint, path, body, access_token):
headers = {'Content-Type': json_acceptformat, 'DataServiceVersion':
dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept':
json_acceptformat, 'Accept-Charset': charset, 'Authorization':
'Bearer ' + access_token, 'x-ms-version': xmsversion}
response = requests.patch(endpoint, data=body, headers=headers,
allow_redirects=False)
if response.status_code == 301:
redirected_url = ''.join([response.headers['location'], path])
response = requests.patch(redirected_url, data=body, headers=headers)
return response
|
do_ams_patch
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint, path, body, access_token):\n headers = {'Content-Type': json_acceptformat, 'DataServiceVersion':\n dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept':\n json_acceptformat, 'Accept-Charset': charset, 'Authorization': \n 'Bearer ' + access_token, 'x-ms-version': xmsversion}\n response = requests.patch(endpoint, data=body, headers=headers,\n allow_redirects=False)\n if response.status_code == 301:\n redirected_url = ''.join([response.headers['location'], path])\n response = requests.patch(redirected_url, data=body, headers=headers)\n return response\n",
"role": "user"
},
{
"content": "do_ams_patch",
"role": "assistant"
}
] |
def x(endpoint, path, access_token):
headers = {'DataServiceVersion': dsversion_min, 'MaxDataServiceVersion':
dsversion_max, 'Accept': json_acceptformat, 'Accept-Charset':
charset, 'Authorization': 'Bearer ' + access_token, 'x-ms-version':
xmsversion}
response = requests.delete(endpoint, headers=headers, allow_redirects=False
)
if response.status_code == 301:
redirected_url = ''.join([response.headers['location'], path])
response = requests.delete(redirected_url, headers=headers)
return response
|
do_ams_delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint, path, access_token):\n headers = {'DataServiceVersion': dsversion_min, 'MaxDataServiceVersion':\n dsversion_max, 'Accept': json_acceptformat, 'Accept-Charset':\n charset, 'Authorization': 'Bearer ' + access_token, 'x-ms-version':\n xmsversion}\n response = requests.delete(endpoint, headers=headers, allow_redirects=False\n )\n if response.status_code == 301:\n redirected_url = ''.join([response.headers['location'], path])\n response = requests.delete(redirected_url, headers=headers)\n return response\n",
"role": "user"
},
{
"content": "do_ams_delete",
"role": "assistant"
}
] |
def x(endpoint, body, content_length):
headers = {'Accept': json_acceptformat, 'Accept-Charset': charset,
'x-ms-blob-type': 'BlockBlob', 'x-ms-meta-m1': 'v1', 'x-ms-meta-m2':
'v2', 'x-ms-version': '2015-02-21', 'Content-Length': str(
content_length)}
return requests.put(endpoint, data=body, headers=headers)
|
do_ams_sto_put
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint, body, content_length):\n headers = {'Accept': json_acceptformat, 'Accept-Charset': charset,\n 'x-ms-blob-type': 'BlockBlob', 'x-ms-meta-m1': 'v1', 'x-ms-meta-m2':\n 'v2', 'x-ms-version': '2015-02-21', 'Content-Length': str(\n content_length)}\n return requests.put(endpoint, data=body, headers=headers)\n",
"role": "user"
},
{
"content": "do_ams_sto_put",
"role": "assistant"
}
] |
def x(endpoint, access_token, flag=True):
headers = {'Content-Type': json_acceptformat, 'DataServiceVersion':
dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept':
json_acceptformat, 'Accept-Charset': charset, 'Authorization':
'Bearer ' + access_token, 'x-ms-version': xmsversion}
body = ''
response = requests.get(endpoint, headers=headers, allow_redirects=flag)
if flag:
if response.status_code == 301:
response = requests.get(response.headers['location'], data=body,
headers=headers)
return response
|
do_ams_get_url
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint, access_token, flag=True):\n headers = {'Content-Type': json_acceptformat, 'DataServiceVersion':\n dsversion_min, 'MaxDataServiceVersion': dsversion_max, 'Accept':\n json_acceptformat, 'Accept-Charset': charset, 'Authorization': \n 'Bearer ' + access_token, 'x-ms-version': xmsversion}\n body = ''\n response = requests.get(endpoint, headers=headers, allow_redirects=flag)\n if flag:\n if response.status_code == 301:\n response = requests.get(response.headers['location'], data=body,\n headers=headers)\n return response\n",
"role": "user"
},
{
"content": "do_ams_get_url",
"role": "assistant"
}
] |
def x(operation, ret):
print('Error ' + operation)
sys.exit('Return code: ' + str(ret.status_code) + ' Error: ' + ret.text)
|
handle_bad_update
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(operation, ret):\n print('Error ' + operation)\n sys.exit('Return code: ' + str(ret.status_code) + ' Error: ' + ret.text)\n",
"role": "user"
},
{
"content": "handle_bad_update",
"role": "assistant"
}
] |
def x(end_mark, current_str, str_array, line_num):
if end_mark not in current_str:
reached_end = False
line_num += 1
while reached_end is False:
next_line = str_array[line_num]
if end_mark in next_line:
reached_end = True
else:
line_num += 1
current_str += next_line
clean_str = current_str.split(end_mark)[0]
return {'current_str': clean_str, 'line_num': line_num}
|
extract_code
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(end_mark, current_str, str_array, line_num):\n if end_mark not in current_str:\n reached_end = False\n line_num += 1\n while reached_end is False:\n next_line = str_array[line_num]\n if end_mark in next_line:\n reached_end = True\n else:\n line_num += 1\n current_str += next_line\n clean_str = current_str.split(end_mark)[0]\n return {'current_str': clean_str, 'line_num': line_num}\n",
"role": "user"
},
{
"content": "extract_code",
"role": "assistant"
}
] |
def x(pyfile_name):
print('Processing file: ' + pyfile_name)
with open(pyfile_name) as fpyfile:
pyfile_str = fpyfile.readlines()
file_dict = {'source_file': pyfile_name.replace('\\', '/')}
if pyfile_str[0].startswith("'''"):
file_dict['summary_comment'] = pyfile_str[0][:-1].strip("'")
else:
file_dict['summary_comment'] = pyfile_name
file_dict['functions'] = []
for line in pyfile_str:
if line.startswith('def '):
line_num = pyfile_str.index(line)
fn_def = line[4:]
fn_name = fn_def.split('(')[0]
function_info = {'name': fn_name}
extract = extract_code(':', fn_def, pyfile_str, line_num)
function_info['definition'] = extract['current_str']
line_num = extract['line_num'] + 1
doc_line = pyfile_str[line_num]
if doc_line.startswith(" '''"):
comment_str = doc_line[7:]
extract = extract_code("'''", comment_str, pyfile_str, line_num
)
function_info['comments'] = extract['current_str']
file_dict['functions'].append(function_info)
return file_dict
|
process_file
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pyfile_name):\n print('Processing file: ' + pyfile_name)\n with open(pyfile_name) as fpyfile:\n pyfile_str = fpyfile.readlines()\n file_dict = {'source_file': pyfile_name.replace('\\\\', '/')}\n if pyfile_str[0].startswith(\"'''\"):\n file_dict['summary_comment'] = pyfile_str[0][:-1].strip(\"'\")\n else:\n file_dict['summary_comment'] = pyfile_name\n file_dict['functions'] = []\n for line in pyfile_str:\n if line.startswith('def '):\n line_num = pyfile_str.index(line)\n fn_def = line[4:]\n fn_name = fn_def.split('(')[0]\n function_info = {'name': fn_name}\n extract = extract_code(':', fn_def, pyfile_str, line_num)\n function_info['definition'] = extract['current_str']\n line_num = extract['line_num'] + 1\n doc_line = pyfile_str[line_num]\n if doc_line.startswith(\" '''\"):\n comment_str = doc_line[7:]\n extract = extract_code(\"'''\", comment_str, pyfile_str, line_num\n )\n function_info['comments'] = extract['current_str']\n file_dict['functions'].append(function_info)\n return file_dict\n",
"role": "user"
},
{
"content": "process_file",
"role": "assistant"
}
] |
def x(meta_file, outfile_name, code_links):
doc_str = '# ' + meta_file['header'] + '\n'
doc_str += 'Generated by [py2md](https://github.com/gbowerman/py2md) on '
doc_str += strftime('%Y-%m-%d %H:%M:%S ') + '\n\n'
if len(meta_file['modules']) > 1:
doc_str += '## Contents\n'
chapter_num = 1
for meta_doc in meta_file['modules']:
chapter_name = meta_doc['summary_comment']
chapter_link = chapter_name.lstrip().replace('.', '').replace(' ',
'-').lower()
doc_str += str(chapter_num
) + '. [' + chapter_name + '](#' + chapter_link + ')\n'
chapter_num += 1
for meta_doc in meta_file['modules']:
doc_str += '## ' + meta_doc['summary_comment'] + '\n'
doc_str += '[source file](' + meta_doc['source_file'] + ')' + '\n'
for function_info in meta_doc['functions']:
doc_str += '### ' + function_info['name'] + '\n'
doc_str += function_info['definition'] + '\n\n'
if 'comments' in function_info:
doc_str += '```\n' + function_info['comments'] + '\n```\n\n'
print('Writing file: ' + outfile_name)
out_file = open(outfile_name, 'w')
out_file.write(doc_str)
out_file.close()
|
process_output
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(meta_file, outfile_name, code_links):\n doc_str = '# ' + meta_file['header'] + '\\n'\n doc_str += 'Generated by [py2md](https://github.com/gbowerman/py2md) on '\n doc_str += strftime('%Y-%m-%d %H:%M:%S ') + '\\n\\n'\n if len(meta_file['modules']) > 1:\n doc_str += '## Contents\\n'\n chapter_num = 1\n for meta_doc in meta_file['modules']:\n chapter_name = meta_doc['summary_comment']\n chapter_link = chapter_name.lstrip().replace('.', '').replace(' ',\n '-').lower()\n doc_str += str(chapter_num\n ) + '. [' + chapter_name + '](#' + chapter_link + ')\\n'\n chapter_num += 1\n for meta_doc in meta_file['modules']:\n doc_str += '## ' + meta_doc['summary_comment'] + '\\n'\n doc_str += '[source file](' + meta_doc['source_file'] + ')' + '\\n'\n for function_info in meta_doc['functions']:\n doc_str += '### ' + function_info['name'] + '\\n'\n doc_str += function_info['definition'] + '\\n\\n'\n if 'comments' in function_info:\n doc_str += '```\\n' + function_info['comments'] + '\\n```\\n\\n'\n print('Writing file: ' + outfile_name)\n out_file = open(outfile_name, 'w')\n out_file.write(doc_str)\n out_file.close()\n",
"role": "user"
},
{
"content": "process_output",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--sourcedir', '-s', required=True, action=
'store', help='Source folder containing python files.')
arg_parser.add_argument('--docfile', '-o', required=True, action=
'store', help='Name of markdown file to write output to.')
arg_parser.add_argument('--projectname', '-n', required=False, action=
'store', help=
'Project name (optional, otherwise sourcedir will be used).')
arg_parser.add_argument('--codelinks', '-c', required=False, action=
'store_true', help='Include links to source files (optional).')
args = arg_parser.parse_args()
source_dir = args.sourcedir
doc_file = args.docfile
code_links = args.codelinks
proj_name = args.projectname
if proj_name is None:
proj_name = source_dir
meta_doc = {'header': proj_name + ' Technical Reference Guide'}
meta_doc['modules'] = []
for source_file in glob.glob(source_dir + '/*.py'):
if '__' in source_file:
print('Skipping: ' + source_file)
continue
file_meta_doc = process_file(source_file)
meta_doc['modules'].append(file_meta_doc)
process_output(meta_doc, doc_file, code_links)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--sourcedir', '-s', required=True, action=\n 'store', help='Source folder containing python files.')\n arg_parser.add_argument('--docfile', '-o', required=True, action=\n 'store', help='Name of markdown file to write output to.')\n arg_parser.add_argument('--projectname', '-n', required=False, action=\n 'store', help=\n 'Project name (optional, otherwise sourcedir will be used).')\n arg_parser.add_argument('--codelinks', '-c', required=False, action=\n 'store_true', help='Include links to source files (optional).')\n args = arg_parser.parse_args()\n source_dir = args.sourcedir\n doc_file = args.docfile\n code_links = args.codelinks\n proj_name = args.projectname\n if proj_name is None:\n proj_name = source_dir\n meta_doc = {'header': proj_name + ' Technical Reference Guide'}\n meta_doc['modules'] = []\n for source_file in glob.glob(source_dir + '/*.py'):\n if '__' in source_file:\n print('Skipping: ' + source_file)\n continue\n file_meta_doc = process_file(source_file)\n meta_doc['modules'].append(file_meta_doc)\n process_output(meta_doc, doc_file, code_links)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, service_name,
agent_count, agent_vm_size, agent_dns, master_dns, admin_user, location,
public_key=None, master_count=3, orchestrator='DCOS', app_id=None,
app_secret=None, admin_password=None, ostype='Linux'):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerService/ContainerServices/',
service_name, '?api-version=', ACS_API])
acs_body = {'location': location}
properties = {'orchestratorProfile': {'orchestratorType': orchestrator}}
properties['masterProfile'] = {'count': master_count, 'dnsPrefix':
master_dns}
ap_profile = {'name': 'AgentPool1'}
ap_profile['count'] = agent_count
ap_profile['vmSize'] = agent_vm_size
ap_profile['dnsPrefix'] = agent_dns
properties['agentPoolProfiles'] = [ap_profile]
if ostype == 'Linux':
linux_profile = {'adminUsername': admin_user}
linux_profile['ssh'] = {'publicKeys': [{'keyData': public_key}]}
properties['linuxProfile'] = linux_profile
else:
windows_profile = {'adminUsername': admin_user, 'adminPassword':
admin_password}
properties['windowsProfile'] = windows_profile
if orchestrator == 'Kubernetes':
sp_profile = {'ClientID': app_id}
sp_profile['Secret'] = app_secret
properties['servicePrincipalProfile'] = sp_profile
acs_body['properties'] = properties
body = json.dumps(acs_body)
return do_put(endpoint, body, access_token)
|
create_container_service
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, service_name,\n agent_count, agent_vm_size, agent_dns, master_dns, admin_user, location,\n public_key=None, master_count=3, orchestrator='DCOS', app_id=None,\n app_secret=None, admin_password=None, ostype='Linux'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices/',\n service_name, '?api-version=', ACS_API])\n acs_body = {'location': location}\n properties = {'orchestratorProfile': {'orchestratorType': orchestrator}}\n properties['masterProfile'] = {'count': master_count, 'dnsPrefix':\n master_dns}\n ap_profile = {'name': 'AgentPool1'}\n ap_profile['count'] = agent_count\n ap_profile['vmSize'] = agent_vm_size\n ap_profile['dnsPrefix'] = agent_dns\n properties['agentPoolProfiles'] = [ap_profile]\n if ostype == 'Linux':\n linux_profile = {'adminUsername': admin_user}\n linux_profile['ssh'] = {'publicKeys': [{'keyData': public_key}]}\n properties['linuxProfile'] = linux_profile\n else:\n windows_profile = {'adminUsername': admin_user, 'adminPassword':\n admin_password}\n properties['windowsProfile'] = windows_profile\n if orchestrator == 'Kubernetes':\n sp_profile = {'ClientID': app_id}\n sp_profile['Secret'] = app_secret\n properties['servicePrincipalProfile'] = sp_profile\n acs_body['properties'] = properties\n body = json.dumps(acs_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_container_service",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, service_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerService/ContainerServices/',
service_name, '?api-version=', ACS_API])
return do_delete(endpoint, access_token)
|
delete_container_service
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, service_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices/',\n service_name, '?api-version=', ACS_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_container_service",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, service_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerService/ContainerServices/',
service_name, '?api-version=', ACS_API])
return do_get(endpoint, access_token)
|
get_container_service
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, service_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices/',\n service_name, '?api-version=', ACS_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_container_service",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerService/ContainerServices',
'?api-version=', ACS_API])
return do_get(endpoint, access_token)
|
list_container_services
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerService/ContainerServices',\n '?api-version=', ACS_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_container_services",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id,
'/providers/Microsoft.ContainerService/ContainerServices',
'?api-version=', ACS_API])
return do_get(endpoint, access_token)
|
list_container_services_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/Microsoft.ContainerService/ContainerServices',\n '?api-version=', ACS_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_container_services_sub",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, account_name, location,
storage_type='Standard_LRS'):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.Storage/storageAccounts/', account_name,
'?api-version=', STORAGE_API])
storage_body = {'location': location}
storage_body['sku'] = {'name': storage_type}
storage_body['kind'] = 'Storage'
body = json.dumps(storage_body)
return do_put(endpoint, body, access_token)
|
create_storage_account
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, account_name, location,\n storage_type='Standard_LRS'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '?api-version=', STORAGE_API])\n storage_body = {'location': location}\n storage_body['sku'] = {'name': storage_type}\n storage_body['kind'] = 'Storage'\n body = json.dumps(storage_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_storage_account",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, account_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.Storage/storageAccounts/', account_name,
'?api-version=', STORAGE_API])
return do_delete(endpoint, access_token)
|
delete_storage_account
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '?api-version=', STORAGE_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_storage_account",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, account_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.Storage/storageAccounts/', account_name,
'?api-version=', STORAGE_API])
return do_get(endpoint, access_token)
|
get_storage_account
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '?api-version=', STORAGE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_storage_account",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, account_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.Storage/storageAccounts/', account_name,
'/listKeys', '?api-version=', STORAGE_API])
return do_post(endpoint, '', access_token)
|
get_storage_account_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts/', account_name,\n '/listKeys', '?api-version=', STORAGE_API])\n return do_post(endpoint, '', access_token)\n",
"role": "user"
},
{
"content": "get_storage_account_keys",
"role": "assistant"
}
] |
def x(access_token, subscription_id, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Storage/locations/',
location, '/usages', '?api-version=', STORAGE_API])
return do_get(endpoint, access_token)
|
get_storage_usage
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Storage/locations/',\n location, '/usages', '?api-version=', STORAGE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_storage_usage",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.Storage/storageAccounts', '?api-version=',
STORAGE_API])
return do_get(endpoint, access_token)
|
list_storage_accounts_rg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.Storage/storageAccounts', '?api-version=',\n STORAGE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_storage_accounts_rg",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Storage/storageAccounts',
'?api-version=', STORAGE_API])
return do_get(endpoint, access_token)
|
list_storage_accounts_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Storage/storageAccounts',\n '?api-version=', STORAGE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_storage_accounts_sub",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--add', '-a', action='store_true', default=
False, help='add a key vault')
arg_parser.add_argument('--delete', '-d', action='store_true', default=
False, help='delete a key vault')
arg_parser.add_argument('--name', '-n', required=True, action='store',
help='Name')
arg_parser.add_argument('--rgname', '-g', required=True, action='store',
help='Resource Group Name')
arg_parser.add_argument('--location', '-l', required=True, action=
'store', help='Location, e.g. eastus')
arg_parser.add_argument('--verbose', '-v', action='store_true', default
=False, help='Print operational details')
args = arg_parser.parse_args()
name = args.name
rgname = args.rgname
location = args.location
if args.add is True and args.delete is True:
sys.exit('Specify --add or --delete, not both.')
if args.add is False and args.delete is False:
sys.exit('No operation specified, use --add or --delete.')
if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:
endpoint = os.environ['MSI_ENDPOINT']
else:
sys.exit('Not running in cloud shell or MSI_ENDPOINT not set')
if args.verbose is True:
print('Getting Azure token from MSI endpoint..')
access_token = azurerm.get_access_token_from_cli()
if args.verbose is True:
print('Getting Azure subscription ID from MSI endpoint..')
subscription_id = azurerm.get_subscription_from_cli()
if args.add is True:
if args.verbose is True:
print('Getting list of tenant IDs...')
tenants = azurerm.list_tenants(access_token)
tenant_id = tenants['value'][0]['tenantId']
if args.verbose is True:
print('My tenantId = ' + tenant_id)
if args.verbose is True:
print('Querying graph...')
object_id = azurerm.get_object_id_from_graph()
if args.verbose is True:
print('My object ID = ' + object_id)
ret = azurerm.create_keyvault(access_token, subscription_id, rgname,
name, location, tenant_id=tenant_id, object_id=object_id)
if ret.status_code == 200:
print('Successsfully created key vault: ' + name)
print('Vault URI: ' + ret.json()['properties']['vaultUri'])
else:
print('Return code ' + str(ret.status_code) +
' from create_keyvault().')
print(ret.text)
else:
ret = azurerm.delete_keyvault(access_token, subscription_id, rgname,
name)
if ret.status_code == 200:
print('Successsfully deleted key vault: ' + name)
else:
print('Return code ' + str(ret.status_code) +
' from delete_keyvault().')
print(ret.text)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--add', '-a', action='store_true', default=\n False, help='add a key vault')\n arg_parser.add_argument('--delete', '-d', action='store_true', default=\n False, help='delete a key vault')\n arg_parser.add_argument('--name', '-n', required=True, action='store',\n help='Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--location', '-l', required=True, action=\n 'store', help='Location, e.g. eastus')\n arg_parser.add_argument('--verbose', '-v', action='store_true', default\n =False, help='Print operational details')\n args = arg_parser.parse_args()\n name = args.name\n rgname = args.rgname\n location = args.location\n if args.add is True and args.delete is True:\n sys.exit('Specify --add or --delete, not both.')\n if args.add is False and args.delete is False:\n sys.exit('No operation specified, use --add or --delete.')\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n endpoint = os.environ['MSI_ENDPOINT']\n else:\n sys.exit('Not running in cloud shell or MSI_ENDPOINT not set')\n if args.verbose is True:\n print('Getting Azure token from MSI endpoint..')\n access_token = azurerm.get_access_token_from_cli()\n if args.verbose is True:\n print('Getting Azure subscription ID from MSI endpoint..')\n subscription_id = azurerm.get_subscription_from_cli()\n if args.add is True:\n if args.verbose is True:\n print('Getting list of tenant IDs...')\n tenants = azurerm.list_tenants(access_token)\n tenant_id = tenants['value'][0]['tenantId']\n if args.verbose is True:\n print('My tenantId = ' + tenant_id)\n if args.verbose is True:\n print('Querying graph...')\n object_id = azurerm.get_object_id_from_graph()\n if args.verbose is True:\n print('My object ID = ' + object_id)\n ret = azurerm.create_keyvault(access_token, subscription_id, rgname,\n name, location, tenant_id=tenant_id, object_id=object_id)\n if ret.status_code == 200:\n print('Successsfully created key vault: ' + name)\n print('Vault URI: ' + ret.json()['properties']['vaultUri'])\n else:\n print('Return code ' + str(ret.status_code) +\n ' from create_keyvault().')\n print(ret.text)\n else:\n ret = azurerm.delete_keyvault(access_token, subscription_id, rgname,\n name)\n if ret.status_code == 200:\n print('Successsfully deleted key vault: ' + name)\n else:\n print('Return code ' + str(ret.status_code) +\n ' from delete_keyvault().')\n print(ret.text)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--name', '-n', required=True, action='store',
help='Name of vmss')
arg_parser.add_argument('--capacity', '-c', required=True, action=
'store', help='Number of VMs')
arg_parser.add_argument('--location', '-l', action='store', help=
'Location, e.g. eastus')
arg_parser.add_argument('--verbose', '-v', action='store_true', default
=False, help='Print operational details')
args = arg_parser.parse_args()
name = args.name
location = args.location
capacity = args.capacity
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
print('Error: Expecting azurermconfig.json in current folder')
sys.exit()
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
print('Creating resource group: ' + name)
rmreturn = azurerm.create_resource_group(access_token, subscription_id,
name, location)
print(rmreturn)
nsg_name = name + 'nsg'
print('Creating NSG: ' + nsg_name)
rmreturn = azurerm.create_nsg(access_token, subscription_id, name,
nsg_name, location)
nsg_id = rmreturn.json()['id']
print('nsg_id = ' + nsg_id)
nsg_rule = 'ssh'
print('Creating NSG rule: ' + nsg_rule)
rmreturn = azurerm.create_nsg_rule(access_token, subscription_id, name,
nsg_name, nsg_rule, description='ssh rule', destination_range='22')
vnetname = name + 'vnet'
print('Creating VNet: ' + vnetname)
rmreturn = azurerm.create_vnet(access_token, subscription_id, name,
vnetname, location, nsg_id=nsg_id)
print(rmreturn)
subnet_id = rmreturn.json()['properties']['subnets'][0]['id']
print('subnet_id = ' + subnet_id)
public_ip_name = name + 'ip'
dns_label = name + 'ip'
print('Creating public IP address: ' + public_ip_name)
rmreturn = azurerm.create_public_ip(access_token, subscription_id, name,
public_ip_name, dns_label, location)
print(rmreturn)
ip_id = rmreturn.json()['id']
print('ip_id = ' + ip_id)
lb_name = vnetname + 'lb'
print('Creating load balancer with nat pool: ' + lb_name)
rmreturn = azurerm.create_lb_with_nat_pool(access_token,
subscription_id, name, lb_name, ip_id, '50000', '50100', '22', location
)
be_pool_id = rmreturn.json()['properties']['backendAddressPools'][0]['id']
lb_pool_id = rmreturn.json()['properties']['inboundNatPools'][0]['id']
vmss_name = name
vm_size = 'Standard_D1_v2'
publisher = 'Canonical'
offer = 'UbuntuServer'
sku = '16.04-LTS'
version = 'latest'
username = 'azure'
password = Haikunator().haikunate(delimiter=',')
print('Password = ' + password)
print('Creating VMSS: ' + vmss_name)
rmreturn = azurerm.create_vmss(access_token, subscription_id, name,
vmss_name, vm_size, capacity, publisher, offer, sku, version,
subnet_id, be_pool_id, lb_pool_id, location, username=username,
password=password)
print(rmreturn)
print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators
=(',', ': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--name', '-n', required=True, action='store',\n help='Name of vmss')\n arg_parser.add_argument('--capacity', '-c', required=True, action=\n 'store', help='Number of VMs')\n arg_parser.add_argument('--location', '-l', action='store', help=\n 'Location, e.g. eastus')\n arg_parser.add_argument('--verbose', '-v', action='store_true', default\n =False, help='Print operational details')\n args = arg_parser.parse_args()\n name = args.name\n location = args.location\n capacity = args.capacity\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n print('Error: Expecting azurermconfig.json in current folder')\n sys.exit()\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n print('Creating resource group: ' + name)\n rmreturn = azurerm.create_resource_group(access_token, subscription_id,\n name, location)\n print(rmreturn)\n nsg_name = name + 'nsg'\n print('Creating NSG: ' + nsg_name)\n rmreturn = azurerm.create_nsg(access_token, subscription_id, name,\n nsg_name, location)\n nsg_id = rmreturn.json()['id']\n print('nsg_id = ' + nsg_id)\n nsg_rule = 'ssh'\n print('Creating NSG rule: ' + nsg_rule)\n rmreturn = azurerm.create_nsg_rule(access_token, subscription_id, name,\n nsg_name, nsg_rule, description='ssh rule', destination_range='22')\n vnetname = name + 'vnet'\n print('Creating VNet: ' + vnetname)\n rmreturn = azurerm.create_vnet(access_token, subscription_id, name,\n vnetname, location, nsg_id=nsg_id)\n print(rmreturn)\n subnet_id = rmreturn.json()['properties']['subnets'][0]['id']\n print('subnet_id = ' + subnet_id)\n public_ip_name = name + 'ip'\n dns_label = name + 'ip'\n print('Creating public IP address: ' + public_ip_name)\n rmreturn = azurerm.create_public_ip(access_token, subscription_id, name,\n public_ip_name, dns_label, location)\n print(rmreturn)\n ip_id = rmreturn.json()['id']\n print('ip_id = ' + ip_id)\n lb_name = vnetname + 'lb'\n print('Creating load balancer with nat pool: ' + lb_name)\n rmreturn = azurerm.create_lb_with_nat_pool(access_token,\n subscription_id, name, lb_name, ip_id, '50000', '50100', '22', location\n )\n be_pool_id = rmreturn.json()['properties']['backendAddressPools'][0]['id']\n lb_pool_id = rmreturn.json()['properties']['inboundNatPools'][0]['id']\n vmss_name = name\n vm_size = 'Standard_D1_v2'\n publisher = 'Canonical'\n offer = 'UbuntuServer'\n sku = '16.04-LTS'\n version = 'latest'\n username = 'azure'\n password = Haikunator().haikunate(delimiter=',')\n print('Password = ' + password)\n print('Creating VMSS: ' + vmss_name)\n rmreturn = azurerm.create_vmss(access_token, subscription_id, name,\n vmss_name, vm_size, capacity, publisher, offer, sku, version,\n subnet_id, be_pool_id, lb_pool_id, location, username=username,\n password=password)\n print(rmreturn)\n print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators\n =(',', ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(idstr):
rgidx = idstr.find('resourceGroups/')
providx = idstr.find('/providers/')
return idstr[rgidx + 15:providx]
|
rgfromid
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(idstr):\n rgidx = idstr.find('resourceGroups/')\n providx = idstr.find('/providers/')\n return idstr[rgidx + 15:providx]\n",
"role": "user"
},
{
"content": "rgfromid",
"role": "assistant"
}
] |
def x():
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
sa_list = azurerm.list_storage_accounts_sub(access_token, subscription_id)
for sta in sa_list['value']:
print(sta['name'] + ', ' + sta['properties']['primaryLocation'] +
', ' + rgfromid(sta['id']))
quota_info = azurerm.get_storage_usage(access_token, subscription_id)
used = quota_info['value'][0]['currentValue']
limit = quota_info['value'][0]['limit']
print('\nUsing ' + str(used) + ' accounts out of ' + str(limit) + '.')
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n sa_list = azurerm.list_storage_accounts_sub(access_token, subscription_id)\n for sta in sa_list['value']:\n print(sta['name'] + ', ' + sta['properties']['primaryLocation'] +\n ', ' + rgfromid(sta['id']))\n quota_info = azurerm.get_storage_usage(access_token, subscription_id)\n used = quota_info['value'][0]['currentValue']\n limit = quota_info['value'][0]['limit']\n print('\\nUsing ' + str(used) + ' accounts out of ' + str(limit) + '.')\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
if len(sys.argv) < 3:
usage()
rgname = sys.argv[1]
vmss = sys.argv[2]
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
instances = azurerm.list_vmss_vm_instance_view(access_token,
subscription_id, rgname, vmss)
print(json.dumps(instances, sort_keys=False, indent=2, separators=(',',
': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if len(sys.argv) < 3:\n usage()\n rgname = sys.argv[1]\n vmss = sys.argv[2]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n instances = azurerm.list_vmss_vm_instance_view(access_token,\n subscription_id, rgname, vmss)\n print(json.dumps(instances, sort_keys=False, indent=2, separators=(',',\n ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(access_token, subscription_id, msname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id,
'/providers/microsoft.media/CheckNameAvailability?', 'api-version=',
MEDIA_API])
ms_body = {'name': msname}
ms_body['type'] = 'mediaservices'
body = json.dumps(ms_body)
return do_post(endpoint, body, access_token)
|
check_media_service_name_availability
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/microsoft.media/CheckNameAvailability?', 'api-version=',\n MEDIA_API])\n ms_body = {'name': msname}\n ms_body['type'] = 'mediaservices'\n body = json.dumps(ms_body)\n return do_post(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "check_media_service_name_availability",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, location, stoname, msname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', rgname,
'/providers/microsoft.media/mediaservices/', msname,
'?api-version=', MEDIA_API])
ms_body = {'name': msname}
ms_body['location'] = location
sub_id_str = ('/subscriptions/' + subscription_id + '/resourceGroups/' +
rgname + '/providers/Microsoft.Storage/storageAccounts/' + stoname)
storage_account = {'id': sub_id_str}
storage_account['isPrimary'] = True
properties = {'storageAccounts': [storage_account]}
ms_body['properties'] = properties
body = json.dumps(ms_body)
return do_put(endpoint, body, access_token)
|
create_media_service_rg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, location, stoname, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/mediaservices/', msname,\n '?api-version=', MEDIA_API])\n ms_body = {'name': msname}\n ms_body['location'] = location\n sub_id_str = ('/subscriptions/' + subscription_id + '/resourceGroups/' +\n rgname + '/providers/Microsoft.Storage/storageAccounts/' + stoname)\n storage_account = {'id': sub_id_str}\n storage_account['isPrimary'] = True\n properties = {'storageAccounts': [storage_account]}\n ms_body['properties'] = properties\n body = json.dumps(ms_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_media_service_rg",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, msname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', rgname,
'/providers/microsoft.media/mediaservices/', msname,
'?api-version=', MEDIA_API])
return do_delete(endpoint, access_token)
|
delete_media_service_rg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/mediaservices/', msname,\n '?api-version=', MEDIA_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_media_service_rg",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, msname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', rgname,
'/providers/microsoft.media/', '/mediaservices/', msname,
'/listKeys?api-version=', MEDIA_API])
return do_get(endpoint, access_token)
|
list_media_endpoint_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, msname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/', '/mediaservices/', msname,\n '/listKeys?api-version=', MEDIA_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_media_endpoint_keys",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id,
'/providers/microsoft.media/mediaservices?api-version=', MEDIA_API])
return do_get(endpoint, access_token)
|
list_media_services
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/microsoft.media/mediaservices?api-version=', MEDIA_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_media_services",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', rgname,
'/providers/microsoft.media/mediaservices?api-version=', MEDIA_API])
return do_get(endpoint, access_token)
|
list_media_services_rg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname,\n '/providers/microsoft.media/mediaservices?api-version=', MEDIA_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_media_services_rg",
"role": "assistant"
}
] |
def x(accountname, accountkey):
accountkey_encoded = urllib.parse.quote(accountkey, safe='')
body = ('grant_type=client_credentials&client_id=' + accountname +
'&client_secret=' + accountkey_encoded +
' &scope=urn%3aWindowsAzureMediaServices')
return do_ams_auth(ams_auth_endpoint, body)
|
get_ams_access_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(accountname, accountkey):\n accountkey_encoded = urllib.parse.quote(accountkey, safe='')\n body = ('grant_type=client_credentials&client_id=' + accountname +\n '&client_secret=' + accountkey_encoded +\n ' &scope=urn%3aWindowsAzureMediaServices')\n return do_ams_auth(ams_auth_endpoint, body)\n",
"role": "user"
},
{
"content": "get_ams_access_token",
"role": "assistant"
}
] |
def x(access_token, name, options='0'):
path = '/Assets'
endpoint = ''.join([ams_rest_endpoint, path])
body = '{"Name": "' + name + '", "Options": "' + str(options) + '"}'
return do_ams_post(endpoint, path, body, access_token)
|
create_media_asset
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, name, options='0'):\n path = '/Assets'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = '{\"Name\": \"' + name + '\", \"Options\": \"' + str(options) + '\"}'\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "create_media_asset",
"role": "assistant"
}
] |
def x(access_token, parent_asset_id, name, is_primary='false', is_encrypted
='false', encryption_scheme='None', encryptionkey_id='None'):
path = '/Files'
endpoint = ''.join([ams_rest_endpoint, path])
if encryption_scheme == 'StorageEncryption':
body = ('{ \t\t\t"IsEncrypted": "' + is_encrypted +
'", \t\t\t"EncryptionScheme": "' + encryption_scheme +
'", \t\t\t"EncryptionVersion": "' + '1.0' +
'", \t\t\t"EncryptionKeyId": "' + encryptionkey_id +
'", \t\t\t"IsPrimary": "' + is_primary +
'", \t\t\t"MimeType": "video/mp4", \t\t\t"Name": "' + name +
'", \t\t\t"ParentAssetId": "' + parent_asset_id + '" \t\t}')
else:
body = ('{ \t\t\t"IsPrimary": "' + is_primary +
'", \t\t\t"MimeType": "video/mp4", \t\t\t"Name": "' + name +
'", \t\t\t"ParentAssetId": "' + parent_asset_id + '" \t\t}')
return do_ams_post(endpoint, path, body, access_token)
|
create_media_assetfile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, parent_asset_id, name, is_primary='false', is_encrypted\n ='false', encryption_scheme='None', encryptionkey_id='None'):\n path = '/Files'\n endpoint = ''.join([ams_rest_endpoint, path])\n if encryption_scheme == 'StorageEncryption':\n body = ('{ \\t\\t\\t\"IsEncrypted\": \"' + is_encrypted +\n '\", \\t\\t\\t\"EncryptionScheme\": \"' + encryption_scheme +\n '\", \\t\\t\\t\"EncryptionVersion\": \"' + '1.0' +\n '\", \\t\\t\\t\"EncryptionKeyId\": \"' + encryptionkey_id +\n '\", \\t\\t\\t\"IsPrimary\": \"' + is_primary +\n '\", \\t\\t\\t\"MimeType\": \"video/mp4\", \\t\\t\\t\"Name\": \"' + name +\n '\", \\t\\t\\t\"ParentAssetId\": \"' + parent_asset_id + '\" \\t\\t}')\n else:\n body = ('{ \\t\\t\\t\"IsPrimary\": \"' + is_primary +\n '\", \\t\\t\\t\"MimeType\": \"video/mp4\", \\t\\t\\t\"Name\": \"' + name +\n '\", \\t\\t\\t\"ParentAssetId\": \"' + parent_asset_id + '\" \\t\\t}')\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "create_media_assetfile",
"role": "assistant"
}
] |
def x(access_token, asset_id, accesspolicy_id):
path = '/Locators'
endpoint = ''.join([ams_rest_endpoint, path])
body = ('{ \t\t"AccessPolicyId":"' + accesspolicy_id +
'", \t\t"AssetId":"' + asset_id + '", \t\t"Type":1 \t}')
return do_ams_post(endpoint, path, body, access_token)
|
create_sas_locator
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, asset_id, accesspolicy_id):\n path = '/Locators'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"AccessPolicyId\":\"' + accesspolicy_id +\n '\", \\t\\t\"AssetId\":\"' + asset_id + '\", \\t\\t\"Type\":1 \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "create_sas_locator",
"role": "assistant"
}
] |
def x(access_token, ams_account, key_delivery_url):
path = '/AssetDeliveryPolicies'
endpoint = ''.join([ams_rest_endpoint, path])
body = (
'{ \t\t"Name":"AssetDeliveryPolicy", \t\t"AssetDeliveryProtocol":"4", \t\t"AssetDeliveryPolicyType":"3", \t\t"AssetDeliveryConfiguration":"[{ \t\t\t\\"Key\\":\\"2\\", \t\t\t\\"Value\\":\\"'
+ key_delivery_url + '\\"}]" \t}')
return do_ams_post(endpoint, path, body, access_token)
|
create_asset_delivery_policy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, ams_account, key_delivery_url):\n path = '/AssetDeliveryPolicies'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = (\n '{ \\t\\t\"Name\":\"AssetDeliveryPolicy\", \\t\\t\"AssetDeliveryProtocol\":\"4\", \\t\\t\"AssetDeliveryPolicyType\":\"3\", \\t\\t\"AssetDeliveryConfiguration\":\"[{ \\t\\t\\t\\\\\"Key\\\\\":\\\\\"2\\\\\", \\t\\t\\t\\\\\"Value\\\\\":\\\\\"'\n + key_delivery_url + '\\\\\"}]\" \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "create_asset_delivery_policy",
"role": "assistant"
}
] |
def x(access_token, content):
path = '/ContentKeyAuthorizationPolicies'
endpoint = ''.join([ams_rest_endpoint, path])
body = content
return do_ams_post(endpoint, path, body, access_token)
|
create_contentkey_authorization_policy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, content):\n path = '/ContentKeyAuthorizationPolicies'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = content\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "create_contentkey_authorization_policy",
"role": "assistant"
}
] |
def x(access_token, key_delivery_type='2', name=
'HLS Open Authorization Policy', key_restriction_type='0'):
path = '/ContentKeyAuthorizationPolicyOptions'
endpoint = ''.join([ams_rest_endpoint, path])
body = ('{ \t\t"Name":"policy",\t\t"KeyDeliveryType":"' +
key_delivery_type +
'", \t\t"KeyDeliveryConfiguration":"", \t\t\t"Restrictions":[{ \t\t\t"Name":"'
+ name + '", \t\t\t"KeyRestrictionType":"' + key_restriction_type +
'", \t\t\t"Requirements":null \t\t}] \t}')
return do_ams_post(endpoint, path, body, access_token, 'json_only')
|
create_contentkey_authorization_policy_options
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, key_delivery_type='2', name=\n 'HLS Open Authorization Policy', key_restriction_type='0'):\n path = '/ContentKeyAuthorizationPolicyOptions'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"Name\":\"policy\",\\t\\t\"KeyDeliveryType\":\"' +\n key_delivery_type +\n '\", \\t\\t\"KeyDeliveryConfiguration\":\"\", \\t\\t\\t\"Restrictions\":[{ \\t\\t\\t\"Name\":\"'\n + name + '\", \\t\\t\\t\"KeyRestrictionType\":\"' + key_restriction_type +\n '\", \\t\\t\\t\"Requirements\":null \\t\\t}] \\t}')\n return do_ams_post(endpoint, path, body, access_token, 'json_only')\n",
"role": "user"
},
{
"content": "create_contentkey_authorization_policy_options",
"role": "assistant"
}
] |
def x(access_token, encoded_asset_id, pid, starttime=None):
path = '/Locators'
endpoint = ''.join([ams_rest_endpoint, path])
if starttime is None:
body = ('{ \t\t\t"AccessPolicyId":"' + pid + '", \t\t\t"AssetId":"' +
encoded_asset_id + '", \t\t\t"Type": "2" }')
else:
body = ('{ \t\t\t"AccessPolicyId":"' + pid + '", \t\t\t"AssetId":"' +
encoded_asset_id + '", \t\t\t"StartTime":"' + str(starttime) +
'", \t\t\t"Type": "2" \t\t}')
return do_ams_post(endpoint, path, body, access_token, 'json_only')
|
create_ondemand_streaming_locator
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, encoded_asset_id, pid, starttime=None):\n path = '/Locators'\n endpoint = ''.join([ams_rest_endpoint, path])\n if starttime is None:\n body = ('{ \\t\\t\\t\"AccessPolicyId\":\"' + pid + '\", \\t\\t\\t\"AssetId\":\"' +\n encoded_asset_id + '\", \\t\\t\\t\"Type\": \"2\" }')\n else:\n body = ('{ \\t\\t\\t\"AccessPolicyId\":\"' + pid + '\", \\t\\t\\t\"AssetId\":\"' +\n encoded_asset_id + '\", \\t\\t\\t\"StartTime\":\"' + str(starttime) +\n '\", \\t\\t\\t\"Type\": \"2\" \\t\\t}')\n return do_ams_post(endpoint, path, body, access_token, 'json_only')\n",
"role": "user"
},
{
"content": "create_ondemand_streaming_locator",
"role": "assistant"
}
] |
def x(access_token, name, duration, permission='1'):
path = '/AccessPolicies'
endpoint = ''.join([ams_rest_endpoint, path])
body = ('{ \t\t"Name": "' + str(name) + '", \t\t"DurationInMinutes": "' +
duration + '", \t\t"Permissions": "' + permission + '" \t}')
return do_ams_post(endpoint, path, body, access_token)
|
create_asset_accesspolicy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, name, duration, permission='1'):\n path = '/AccessPolicies'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"Name\": \"' + str(name) + '\", \\t\\t\"DurationInMinutes\": \"' +\n duration + '\", \\t\\t\"Permissions\": \"' + permission + '\" \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "create_asset_accesspolicy",
"role": "assistant"
}
] |
def x(access_token, name, description='New Streaming Endpoint', scale_units='1'
):
path = '/StreamingEndpoints'
endpoint = ''.join([ams_rest_endpoint, path])
body = ('{ \t\t"Id":null, \t\t"Name":"' + name +
'", \t\t"Description":"' + description +
'", \t\t"Created":"0001-01-01T00:00:00", \t\t"LastModified":"0001-01-01T00:00:00", \t\t"State":null, \t\t"HostName":null, \t\t"ScaleUnits":"'
+ scale_units +
'", \t\t"CrossSiteAccessPolicies":{ \t\t\t"ClientAccessPolicy":"<access-policy><cross-domain-access><policy><allow-from http-request-headers=\\"*\\"><domain uri=\\"http://*\\" /></allow-from><grant-to><resource path=\\"/\\" include-subpaths=\\"false\\" /></grant-to></policy></cross-domain-access></access-policy>", \t\t\t"CrossDomainPolicy":"<?xml version=\\"1.0\\"?><!DOCTYPE cross-domain-policy SYSTEM \\"http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd\\"><cross-domain-policy><allow-access-from domain=\\"*\\" /></cross-domain-policy>" \t\t} \t}'
)
return do_ams_post(endpoint, path, body, access_token)
|
create_streaming_endpoint
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, name, description='New Streaming Endpoint', scale_units='1'\n ):\n path = '/StreamingEndpoints'\n endpoint = ''.join([ams_rest_endpoint, path])\n body = ('{ \\t\\t\"Id\":null, \\t\\t\"Name\":\"' + name +\n '\", \\t\\t\"Description\":\"' + description +\n '\", \\t\\t\"Created\":\"0001-01-01T00:00:00\", \\t\\t\"LastModified\":\"0001-01-01T00:00:00\", \\t\\t\"State\":null, \\t\\t\"HostName\":null, \\t\\t\"ScaleUnits\":\"'\n + scale_units +\n '\", \\t\\t\"CrossSiteAccessPolicies\":{ \\t\\t\\t\"ClientAccessPolicy\":\"<access-policy><cross-domain-access><policy><allow-from http-request-headers=\\\\\"*\\\\\"><domain uri=\\\\\"http://*\\\\\" /></allow-from><grant-to><resource path=\\\\\"/\\\\\" include-subpaths=\\\\\"false\\\\\" /></grant-to></policy></cross-domain-access></access-policy>\", \\t\\t\\t\"CrossDomainPolicy\":\"<?xml version=\\\\\"1.0\\\\\"?><!DOCTYPE cross-domain-policy SYSTEM \\\\\"http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd\\\\\"><cross-domain-policy><allow-access-from domain=\\\\\"*\\\\\" /></cross-domain-policy>\" \\t\\t} \\t}'\n )\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "create_streaming_endpoint",
"role": "assistant"
}
] |
def x(access_token, streaming_endpoint_id, scale_units):
path = '/StreamingEndpoints'
full_path = ''.join([path, "('", streaming_endpoint_id, "')", '/Scale'])
full_path_encoded = urllib.parse.quote(full_path, safe='')
endpoint = ''.join([ams_rest_endpoint, full_path_encoded])
body = '{"scaleUnits": "' + str(scale_units) + '"}'
return do_ams_post(endpoint, full_path_encoded, body, access_token)
|
scale_streaming_endpoint
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, streaming_endpoint_id, scale_units):\n path = '/StreamingEndpoints'\n full_path = ''.join([path, \"('\", streaming_endpoint_id, \"')\", '/Scale'])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n body = '{\"scaleUnits\": \"' + str(scale_units) + '\"}'\n return do_ams_post(endpoint, full_path_encoded, body, access_token)\n",
"role": "user"
},
{
"content": "scale_streaming_endpoint",
"role": "assistant"
}
] |
def x(access_token, asset_id, encryptionkey_id, ams_redirected_rest_endpoint):
path = '/Assets'
full_path = ''.join([path, "('", asset_id, "')", '/$links/ContentKeys'])
full_path_encoded = urllib.parse.quote(full_path, safe='')
endpoint = ''.join([ams_rest_endpoint, full_path_encoded])
uri = ''.join([ams_redirected_rest_endpoint, 'ContentKeys', "('",
encryptionkey_id, "')"])
body = '{"uri": "' + uri + '"}'
return do_ams_post(endpoint, full_path_encoded, body, access_token)
|
link_asset_content_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, asset_id, encryptionkey_id, ams_redirected_rest_endpoint):\n path = '/Assets'\n full_path = ''.join([path, \"('\", asset_id, \"')\", '/$links/ContentKeys'])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n uri = ''.join([ams_redirected_rest_endpoint, 'ContentKeys', \"('\",\n encryptionkey_id, \"')\"])\n body = '{\"uri\": \"' + uri + '\"}'\n return do_ams_post(endpoint, full_path_encoded, body, access_token)\n",
"role": "user"
},
{
"content": "link_asset_content_key",
"role": "assistant"
}
] |
def x(access_token, ckap_id, options_id, ams_redirected_rest_endpoint):
path = '/ContentKeyAuthorizationPolicies'
full_path = ''.join([path, "('", ckap_id, "')", '/$links/Options'])
full_path_encoded = urllib.parse.quote(full_path, safe='')
endpoint = ''.join([ams_rest_endpoint, full_path_encoded])
uri = ''.join([ams_redirected_rest_endpoint,
'ContentKeyAuthorizationPolicyOptions', "('", options_id, "')"])
body = '{"uri": "' + uri + '"}'
return do_ams_post(endpoint, full_path_encoded, body, access_token,
'json_only', '1.0;NetFx')
|
link_contentkey_authorization_policy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, ckap_id, options_id, ams_redirected_rest_endpoint):\n path = '/ContentKeyAuthorizationPolicies'\n full_path = ''.join([path, \"('\", ckap_id, \"')\", '/$links/Options'])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n uri = ''.join([ams_redirected_rest_endpoint,\n 'ContentKeyAuthorizationPolicyOptions', \"('\", options_id, \"')\"])\n body = '{\"uri\": \"' + uri + '\"}'\n return do_ams_post(endpoint, full_path_encoded, body, access_token,\n 'json_only', '1.0;NetFx')\n",
"role": "user"
},
{
"content": "link_contentkey_authorization_policy",
"role": "assistant"
}
] |
def x(access_token, ck_id, oid):
path = '/ContentKeys'
body = '{"AuthorizationPolicyId":"' + oid + '"}'
return helper_add(access_token, ck_id, path, body)
|
add_authorization_policy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, ck_id, oid):\n path = '/ContentKeys'\n body = '{\"AuthorizationPolicyId\":\"' + oid + '\"}'\n return helper_add(access_token, ck_id, path, body)\n",
"role": "user"
},
{
"content": "add_authorization_policy",
"role": "assistant"
}
] |
def x(access_token, parent_asset_id, asset_id, content_length, name):
path = '/Files'
full_path = ''.join([path, "('", asset_id, "')"])
full_path_encoded = urllib.parse.quote(full_path, safe='')
endpoint = ''.join([ams_rest_endpoint, full_path_encoded])
body = ('{ \t\t"ContentFileSize": "' + str(content_length) +
'", \t\t"Id": "' + asset_id +
'", \t\t"MimeType": "video/mp4", \t\t"Name": "' + name +
'", \t\t"ParentAssetId": "' + parent_asset_id + '" \t}')
return do_ams_patch(endpoint, full_path_encoded, body, access_token)
|
update_media_assetfile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, parent_asset_id, asset_id, content_length, name):\n path = '/Files'\n full_path = ''.join([path, \"('\", asset_id, \"')\"])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n body = ('{ \\t\\t\"ContentFileSize\": \"' + str(content_length) +\n '\", \\t\\t\"Id\": \"' + asset_id +\n '\", \\t\\t\"MimeType\": \"video/mp4\", \\t\\t\"Name\": \"' + name +\n '\", \\t\\t\"ParentAssetId\": \"' + parent_asset_id + '\" \\t}')\n return do_ams_patch(endpoint, full_path_encoded, body, access_token)\n",
"role": "user"
},
{
"content": "update_media_assetfile",
"role": "assistant"
}
] |
def x(access_token, ck_id, key_type):
path = '/ContentKeys'
full_path = ''.join([path, "('", ck_id, "')", '/GetKeyDeliveryUrl'])
endpoint = ''.join([ams_rest_endpoint, full_path])
body = '{"keyDeliveryType": "' + key_type + '"}'
return do_ams_post(endpoint, full_path, body, access_token)
|
get_key_delivery_url
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, ck_id, key_type):\n path = '/ContentKeys'\n full_path = ''.join([path, \"('\", ck_id, \"')\", '/GetKeyDeliveryUrl'])\n endpoint = ''.join([ams_rest_endpoint, full_path])\n body = '{\"keyDeliveryType\": \"' + key_type + '\"}'\n return do_ams_post(endpoint, full_path, body, access_token)\n",
"role": "user"
},
{
"content": "get_key_delivery_url",
"role": "assistant"
}
] |
def x(access_token, processor_id, asset_id, output_assetname, json_profile):
path = '/Jobs'
endpoint = ''.join([ams_rest_endpoint, path])
assets_path = ''.join(['/Assets', "('", asset_id, "')"])
assets_path_encoded = urllib.parse.quote(assets_path, safe='')
endpoint_assets = ''.join([ams_rest_endpoint, assets_path_encoded])
body = ('{ \t\t"Name":"' + output_assetname +
'", \t\t"InputMediaAssets":[{ \t \t\t"__metadata":{ \t \t\t\t"uri":"'
+ endpoint_assets +
'" \t \t\t} \t \t}], \t\t"Tasks":[{ \t \t\t"Configuration":\''
+ json_profile + '\', \t \t\t"MediaProcessorId":"' +
processor_id +
'", \t \t\t"TaskBody":"<?xml version=\\"1.0\\" encoding=\\"utf-16\\"?><taskBody><inputAsset>JobInputAsset(0)</inputAsset><outputAsset assetCreationOptions=\\"0\\" assetName=\\"'
+ output_assetname +
'\\">JobOutputAsset(0)</outputAsset></taskBody>" \t\t}] \t}')
return do_ams_post(endpoint, path, body, access_token)
|
encode_mezzanine_asset
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, processor_id, asset_id, output_assetname, json_profile):\n path = '/Jobs'\n endpoint = ''.join([ams_rest_endpoint, path])\n assets_path = ''.join(['/Assets', \"('\", asset_id, \"')\"])\n assets_path_encoded = urllib.parse.quote(assets_path, safe='')\n endpoint_assets = ''.join([ams_rest_endpoint, assets_path_encoded])\n body = ('{ \\t\\t\"Name\":\"' + output_assetname +\n '\", \\t\\t\"InputMediaAssets\":[{ \\t \\t\\t\"__metadata\":{ \\t \\t\\t\\t\"uri\":\"'\n + endpoint_assets +\n '\" \\t \\t\\t} \\t \\t}], \\t\\t\"Tasks\":[{ \\t \\t\\t\"Configuration\":\\''\n + json_profile + '\\', \\t \\t\\t\"MediaProcessorId\":\"' +\n processor_id +\n '\", \\t \\t\\t\"TaskBody\":\"<?xml version=\\\\\"1.0\\\\\" encoding=\\\\\"utf-16\\\\\"?><taskBody><inputAsset>JobInputAsset(0)</inputAsset><outputAsset assetCreationOptions=\\\\\"0\\\\\" assetName=\\\\\"'\n + output_assetname +\n '\\\\\">JobOutputAsset(0)</outputAsset></taskBody>\" \\t\\t}] \\t}')\n return do_ams_post(endpoint, path, body, access_token)\n",
"role": "user"
},
{
"content": "encode_mezzanine_asset",
"role": "assistant"
}
] |
def x(access_token, ck_id, path, body):
full_path = ''.join([path, "('", ck_id, "')"])
full_path_encoded = urllib.parse.quote(full_path, safe='')
endpoint = ''.join([ams_rest_endpoint, full_path_encoded])
return do_ams_put(endpoint, full_path_encoded, body, access_token,
'json_only', '1.0;NetFx')
|
helper_add
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, ck_id, path, body):\n full_path = ''.join([path, \"('\", ck_id, \"')\"])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n return do_ams_put(endpoint, full_path_encoded, body, access_token,\n 'json_only', '1.0;NetFx')\n",
"role": "user"
},
{
"content": "helper_add",
"role": "assistant"
}
] |
def x(access_token, oid, path):
if oid != '':
path = ''.join([path, "('", oid, "')"])
endpoint = ''.join([ams_rest_endpoint, path])
return do_ams_get(endpoint, path, access_token)
|
helper_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, oid, path):\n if oid != '':\n path = ''.join([path, \"('\", oid, \"')\"])\n endpoint = ''.join([ams_rest_endpoint, path])\n return do_ams_get(endpoint, path, access_token)\n",
"role": "user"
},
{
"content": "helper_list",
"role": "assistant"
}
] |
def x(access_token, oid, path):
full_path = ''.join([path, "('", oid, "')"])
full_path_encoded = urllib.parse.quote(full_path, safe='')
endpoint = ''.join([ams_rest_endpoint, full_path_encoded])
return do_ams_delete(endpoint, full_path_encoded, access_token)
|
helper_delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, oid, path):\n full_path = ''.join([path, \"('\", oid, \"')\"])\n full_path_encoded = urllib.parse.quote(full_path, safe='')\n endpoint = ''.join([ams_rest_endpoint, full_path_encoded])\n return do_ams_delete(endpoint, full_path_encoded, access_token)\n",
"role": "user"
},
{
"content": "helper_delete",
"role": "assistant"
}
] |
def x(code):
code_description = ''
if code == '0':
code_description = 'Queued'
if code == '1':
code_description = 'Scheduled'
if code == '2':
code_description = 'Processing'
if code == '3':
code_description = 'Finished'
if code == '4':
code_description = 'Error'
if code == '5':
code_description = 'Canceled'
if code == '6':
code_description = 'Canceling'
return code_description
|
translate_job_state
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(code):\n code_description = ''\n if code == '0':\n code_description = 'Queued'\n if code == '1':\n code_description = 'Scheduled'\n if code == '2':\n code_description = 'Processing'\n if code == '3':\n code_description = 'Finished'\n if code == '4':\n code_description = 'Error'\n if code == '5':\n code_description = 'Canceled'\n if code == '6':\n code_description = 'Canceling'\n return code_description\n",
"role": "user"
},
{
"content": "translate_job_state",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rg_name, deployment_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rg_name,
'/providers/Microsoft.Resources/deployments/', deployment_name,
'/operations', '?api-version=', BASE_API])
return do_get(endpoint, access_token)
|
list_deployment_operations
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rg_name, deployment_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rg_name,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '/operations', '?api-version=', BASE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_deployment_operations",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, lb_name, public_ip_id,
fe_start_port, fe_end_port, backend_port, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/loadBalancers/', lb_name,
'?api-version=', NETWORK_API])
lb_body = {'location': location}
frontendipcconfig = {'name': 'LoadBalancerFrontEnd'}
fipc_properties = {'publicIPAddress': {'id': public_ip_id}}
frontendipcconfig['properties'] = fipc_properties
properties = {'frontendIPConfigurations': [frontendipcconfig]}
properties['backendAddressPools'] = [{'name': 'bepool'}]
inbound_natpool = {'name': 'natpool'}
lbfe_id = ('/subscriptions/' + subscription_id + '/resourceGroups/' +
resource_group + '/providers/Microsoft.Network/loadBalancers/' +
lb_name + '/frontendIPConfigurations/LoadBalancerFrontEnd')
ibnp_properties = {'frontendIPConfiguration': {'id': lbfe_id}}
ibnp_properties['protocol'] = 'tcp'
ibnp_properties['frontendPortRangeStart'] = fe_start_port
ibnp_properties['frontendPortRangeEnd'] = fe_end_port
ibnp_properties['backendPort'] = backend_port
inbound_natpool['properties'] = ibnp_properties
properties['inboundNatPools'] = [inbound_natpool]
lb_body['properties'] = properties
body = json.dumps(lb_body)
return do_put(endpoint, body, access_token)
|
create_lb_with_nat_pool
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, lb_name, public_ip_id,\n fe_start_port, fe_end_port, backend_port, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '?api-version=', NETWORK_API])\n lb_body = {'location': location}\n frontendipcconfig = {'name': 'LoadBalancerFrontEnd'}\n fipc_properties = {'publicIPAddress': {'id': public_ip_id}}\n frontendipcconfig['properties'] = fipc_properties\n properties = {'frontendIPConfigurations': [frontendipcconfig]}\n properties['backendAddressPools'] = [{'name': 'bepool'}]\n inbound_natpool = {'name': 'natpool'}\n lbfe_id = ('/subscriptions/' + subscription_id + '/resourceGroups/' +\n resource_group + '/providers/Microsoft.Network/loadBalancers/' +\n lb_name + '/frontendIPConfigurations/LoadBalancerFrontEnd')\n ibnp_properties = {'frontendIPConfiguration': {'id': lbfe_id}}\n ibnp_properties['protocol'] = 'tcp'\n ibnp_properties['frontendPortRangeStart'] = fe_start_port\n ibnp_properties['frontendPortRangeEnd'] = fe_end_port\n ibnp_properties['backendPort'] = backend_port\n inbound_natpool['properties'] = ibnp_properties\n properties['inboundNatPools'] = [inbound_natpool]\n lb_body['properties'] = properties\n body = json.dumps(lb_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_lb_with_nat_pool",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, nic_name, public_ip_id,
subnet_id, location, nsg_id=None):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/networkInterfaces/', nic_name,
'?api-version=', NETWORK_API])
nic_body = {'location': location}
ipconfig = {'name': 'ipconfig1'}
ipc_properties = {'privateIPAllocationMethod': 'Dynamic'}
ipc_properties['publicIPAddress'] = {'id': public_ip_id}
ipc_properties['subnet'] = {'id': subnet_id}
ipconfig['properties'] = ipc_properties
properties = {'ipConfigurations': [ipconfig]}
if nsg_id is not None:
properties['networkSecurityGroup'] = {'id': nsg_id}
nic_body['properties'] = properties
body = json.dumps(nic_body)
return do_put(endpoint, body, access_token)
|
create_nic
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, nic_name, public_ip_id,\n subnet_id, location, nsg_id=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkInterfaces/', nic_name,\n '?api-version=', NETWORK_API])\n nic_body = {'location': location}\n ipconfig = {'name': 'ipconfig1'}\n ipc_properties = {'privateIPAllocationMethod': 'Dynamic'}\n ipc_properties['publicIPAddress'] = {'id': public_ip_id}\n ipc_properties['subnet'] = {'id': subnet_id}\n ipconfig['properties'] = ipc_properties\n properties = {'ipConfigurations': [ipconfig]}\n if nsg_id is not None:\n properties['networkSecurityGroup'] = {'id': nsg_id}\n nic_body['properties'] = properties\n body = json.dumps(nic_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_nic",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, nsg_name, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,
'?api-version=', NETWORK_API])
nsg_body = {'location': location}
body = json.dumps(nsg_body)
return do_put(endpoint, body, access_token)
|
create_nsg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, nsg_name, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '?api-version=', NETWORK_API])\n nsg_body = {'location': location}\n body = json.dumps(nsg_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_nsg",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, nsg_name,
nsg_rule_name, description, protocol='Tcp', source_range='*',
destination_range='*', source_prefix='*', destination_prefix='*',
access='Allow', priority=100, direction='Inbound'):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,
'/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API])
properties = {'description': description}
properties['protocol'] = protocol
properties['sourcePortRange'] = source_range
properties['destinationPortRange'] = destination_range
properties['sourceAddressPrefix'] = source_prefix
properties['destinationAddressPrefix'] = destination_prefix
properties['access'] = access
properties['priority'] = priority
properties['direction'] = direction
ip_body = {'properties': properties}
body = json.dumps(ip_body)
return do_put(endpoint, body, access_token)
|
create_nsg_rule
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, nsg_name,\n nsg_rule_name, description, protocol='Tcp', source_range='*',\n destination_range='*', source_prefix='*', destination_prefix='*',\n access='Allow', priority=100, direction='Inbound'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API])\n properties = {'description': description}\n properties['protocol'] = protocol\n properties['sourcePortRange'] = source_range\n properties['destinationPortRange'] = destination_range\n properties['sourceAddressPrefix'] = source_prefix\n properties['destinationAddressPrefix'] = destination_prefix\n properties['access'] = access\n properties['priority'] = priority\n properties['direction'] = direction\n ip_body = {'properties': properties}\n body = json.dumps(ip_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_nsg_rule",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, public_ip_name,
dns_label, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/publicIPAddresses/', public_ip_name,
'?api-version=', NETWORK_API])
ip_body = {'location': location}
properties = {'publicIPAllocationMethod': 'Dynamic'}
properties['dnsSettings'] = {'domainNameLabel': dns_label}
ip_body['properties'] = properties
body = json.dumps(ip_body)
return do_put(endpoint, body, access_token)
|
create_public_ip
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, public_ip_name,\n dns_label, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/publicIPAddresses/', public_ip_name,\n '?api-version=', NETWORK_API])\n ip_body = {'location': location}\n properties = {'publicIPAllocationMethod': 'Dynamic'}\n properties['dnsSettings'] = {'domainNameLabel': dns_label}\n ip_body['properties'] = properties\n body = json.dumps(ip_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_public_ip",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, name, location,
address_prefix='10.0.0.0/16', subnet_prefix='10.0.0.0/16', nsg_id=None):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/virtualNetworks/', name,
'?api-version=', NETWORK_API])
vnet_body = {'location': location}
properties = {'addressSpace': {'addressPrefixes': [address_prefix]}}
subnet = {'name': 'subnet'}
subnet['properties'] = {'addressPrefix': subnet_prefix}
if nsg_id is not None:
subnet['properties']['networkSecurityGroup'] = {'id': nsg_id}
properties['subnets'] = [subnet]
vnet_body['properties'] = properties
body = json.dumps(vnet_body)
return do_put(endpoint, body, access_token)
|
create_vnet
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, name, location,\n address_prefix='10.0.0.0/16', subnet_prefix='10.0.0.0/16', nsg_id=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', name,\n '?api-version=', NETWORK_API])\n vnet_body = {'location': location}\n properties = {'addressSpace': {'addressPrefixes': [address_prefix]}}\n subnet = {'name': 'subnet'}\n subnet['properties'] = {'addressPrefix': subnet_prefix}\n if nsg_id is not None:\n subnet['properties']['networkSecurityGroup'] = {'id': nsg_id}\n properties['subnets'] = [subnet]\n vnet_body['properties'] = properties\n body = json.dumps(vnet_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_vnet",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, lb_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/loadBalancers/', lb_name,
'?api-version=', NETWORK_API])
return do_delete(endpoint, access_token)
|
delete_load_balancer
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, lb_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_load_balancer",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, nic_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/networkInterfaces/', nic_name,
'?api-version=', NETWORK_API])
return do_delete(endpoint, access_token)
|
delete_nic
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, nic_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkInterfaces/', nic_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_nic",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, nsg_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,
'?api-version=', NETWORK_API])
return do_delete(endpoint, access_token)
|
delete_nsg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, nsg_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_nsg",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, nsg_name, nsg_rule_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,
'/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API])
return do_delete(endpoint, access_token)
|
delete_nsg_rule
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, nsg_name, nsg_rule_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkSecurityGroups/', nsg_name,\n '/securityRules/', nsg_rule_name, '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_nsg_rule",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, public_ip_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/publicIPAddresses/', public_ip_name,
'?api-version=', NETWORK_API])
return do_delete(endpoint, access_token)
|
delete_public_ip
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, public_ip_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/publicIPAddresses/', public_ip_name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_public_ip",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/virtualNetworks/', name,
'?api-version=', NETWORK_API])
return do_delete(endpoint, access_token)
|
delete_vnet
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', name,\n '?api-version=', NETWORK_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_vnet",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, lb_name, rule_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/loadBalancers/', lb_name,
'/inboundNatRules/', rule_name, '?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
get_lb_nat_rule
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, lb_name, rule_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '/inboundNatRules/', rule_name, '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_lb_nat_rule",
"role": "assistant"
}
] |
def x(access_token, subscription_id, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Network/locations/',
location, '/usages?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
get_network_usage
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/locations/',\n location, '/usages?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_network_usage",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, nic_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/networkInterfaces/', nic_name,
'?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
get_nic
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, nic_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/networkInterfaces/', nic_name,\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_nic",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, ip_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/', 'publicIPAddresses/', ip_name,
'?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
get_public_ip
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, ip_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/', 'publicIPAddresses/', ip_name,\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_public_ip",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vnet_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/virtualNetworks/', vnet_name,
'?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
get_vnet
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vnet_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', vnet_name,\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_vnet",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/virtualNetworks/', '?api-version=',
NETWORK_API])
return do_get(endpoint, access_token)
|
list_asgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/virtualNetworks/', '?api-version=',\n NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_asgs",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Network/virtualNetworks/',
'?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
list_asgs_all
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/virtualNetworks/',\n '?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_asgs_all",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, lb_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/loadBalancers/', lb_name,
'inboundNatRules?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
list_lb_nat_rules
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, lb_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n 'inboundNatRules?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_lb_nat_rules",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Network/',
'/loadBalancers?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
list_load_balancers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n '/loadBalancers?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_load_balancers",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Network/',
'/networkInterfaces?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
list_nics
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n '/networkInterfaces?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_nics",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Network/',
'networkSEcurityGroups?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
list_nsgs_all
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n 'networkSEcurityGroups?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_nsgs_all",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Network/',
'/virtualNetworks?api-version=', NETWORK_API])
return do_get(endpoint, access_token)
|
list_vnets
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Network/',\n '/virtualNetworks?api-version=', NETWORK_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vnets",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, lb_name, body):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Network/loadBalancers/', lb_name,
'?api-version=', NETWORK_API])
return do_put(endpoint, body, access_token)
|
update_load_balancer
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, lb_name, body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Network/loadBalancers/', lb_name,\n '?api-version=', NETWORK_API])\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "update_load_balancer",
"role": "assistant"
}
] |
def x(access_token, sub_id, region):
print(region + ':')
quota = azurerm.get_compute_usage(access_token, sub_id, region)
if SUMMARY is False:
print(json.dumps(quota, sort_keys=False, indent=2, separators=(',',
': ')))
try:
for resource in quota['value']:
if resource['name']['value'] == 'cores':
print(' Current: ' + str(resource['currentValue']) +
', limit: ' + str(resource['limit']))
break
except KeyError:
print('Invalid data for region: ' + region)
|
print_region_quota
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, sub_id, region):\n print(region + ':')\n quota = azurerm.get_compute_usage(access_token, sub_id, region)\n if SUMMARY is False:\n print(json.dumps(quota, sort_keys=False, indent=2, separators=(',',\n ': ')))\n try:\n for resource in quota['value']:\n if resource['name']['value'] == 'cores':\n print(' Current: ' + str(resource['currentValue']) +\n ', limit: ' + str(resource['limit']))\n break\n except KeyError:\n print('Invalid data for region: ' + region)\n",
"role": "user"
},
{
"content": "print_region_quota",
"role": "assistant"
}
] |
def x():
if len(sys.argv) != 2:
region = 'all'
else:
region = sys.argv[1]
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
sub_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
if region == 'all':
locations = azurerm.list_locations(access_token, sub_id)
for location in locations['value']:
print_region_quota(access_token, sub_id, location['name'])
else:
print_region_quota(access_token, sub_id, region)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if len(sys.argv) != 2:\n region = 'all'\n else:\n region = sys.argv[1]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n sub_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n if region == 'all':\n locations = azurerm.list_locations(access_token, sub_id)\n for location in locations['value']:\n print_region_quota(access_token, sub_id, location['name'])\n else:\n print_region_quota(access_token, sub_id, region)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermonfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
"""
pubs = azurerm.list_publishers(access_token, subscription_id, 'southeastasia')
for pub in pubs:
# print(json.dumps(pub, sort_keys=False, indent=2, separators=(',', ': ')))
print(pub['name'])
offers = azurerm.list_offers(access_token, subscription_id, 'southeastasia', 'rancher')
for offer in offers:
print(json.dumps(offer, sort_keys=False, indent=2, separators=(',', ': ')))
skus = azurerm.list_skus(access_token, subscription_id, 'southeastasia', 'rancher', 'rancheros')
for sku in skus:
print(sku['name'])
"""
versions = azurerm.list_sku_versions(access_token, subscription_id,
'eastus2', 'Canonical', 'UbuntuServer', '16.04-LTS')
for version in versions:
print(version['name'])
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermonfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n \"\"\"\n pubs = azurerm.list_publishers(access_token, subscription_id, 'southeastasia')\n for pub in pubs:\n # print(json.dumps(pub, sort_keys=False, indent=2, separators=(',', ': ')))\n print(pub['name'])\n\n offers = azurerm.list_offers(access_token, subscription_id, 'southeastasia', 'rancher')\n for offer in offers:\n print(json.dumps(offer, sort_keys=False, indent=2, separators=(',', ': ')))\n\n skus = azurerm.list_skus(access_token, subscription_id, 'southeastasia', 'rancher', 'rancheros')\n for sku in skus:\n print(sku['name'])\n \"\"\"\n versions = azurerm.list_sku_versions(access_token, subscription_id,\n 'eastus2', 'Canonical', 'UbuntuServer', '16.04-LTS')\n for version in versions:\n print(version['name'])\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--uri', '-u', required=True, action='store',
help='Template URI')
arg_parser.add_argument('--params', '-p', required=True, action='store',
help='Parameters json file')
arg_parser.add_argument('--rg', '-g', required=True, action='store',
help='Resource Group name')
arg_parser.add_argument('--sub', '-s', required=False, action='store',
help='subscription id (optional)')
args = arg_parser.parse_args()
template_uri = args.uri
params = args.params
rgname = args.rg
subscription_id = args.sub
try:
with open(params) as params_file:
param_data = json.load(params_file)
except FileNotFoundError:
print('Error: Expecting ' + params + ' in current folder')
sys.exit()
access_token = azurerm.get_access_token_from_cli()
if subscription_id is None:
subscription_id = azurerm.get_subscription_from_cli()
deployment_name = Haikunator().haikunate()
print('Deployment name:' + deployment_name)
deploy_return = azurerm.deploy_template_uri(access_token,
subscription_id, rgname, deployment_name, template_uri, param_data)
print(json.dumps(deploy_return.json(), sort_keys=False, indent=2,
separators=(',', ': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--uri', '-u', required=True, action='store',\n help='Template URI')\n arg_parser.add_argument('--params', '-p', required=True, action='store',\n help='Parameters json file')\n arg_parser.add_argument('--rg', '-g', required=True, action='store',\n help='Resource Group name')\n arg_parser.add_argument('--sub', '-s', required=False, action='store',\n help='subscription id (optional)')\n args = arg_parser.parse_args()\n template_uri = args.uri\n params = args.params\n rgname = args.rg\n subscription_id = args.sub\n try:\n with open(params) as params_file:\n param_data = json.load(params_file)\n except FileNotFoundError:\n print('Error: Expecting ' + params + ' in current folder')\n sys.exit()\n access_token = azurerm.get_access_token_from_cli()\n if subscription_id is None:\n subscription_id = azurerm.get_subscription_from_cli()\n deployment_name = Haikunator().haikunate()\n print('Deployment name:' + deployment_name)\n deploy_return = azurerm.deploy_template_uri(access_token,\n subscription_id, rgname, deployment_name, template_uri, param_data)\n print(json.dumps(deploy_return.json(), sort_keys=False, indent=2,\n separators=(',', ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
if len(sys.argv) != 2:
sys.exit('Usage: python ' + sys.argv[0] + ' rg_name')
rgname = sys.argv[1]
if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:
access_token = azurerm.get_access_token_from_cli()
subscription_id = azurerm.get_subscription_from_cli()
else:
try:
with open('azurermconfig.json') as configfile:
configdata = json.load(configfile)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = configdata['tenantId']
app_id = configdata['appId']
app_secret = configdata['appSecret']
subscription_id = configdata['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
rgreturn = azurerm.delete_resource_group(access_token, subscription_id,
rgname)
print(rgreturn)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if len(sys.argv) != 2:\n sys.exit('Usage: python ' + sys.argv[0] + ' rg_name')\n rgname = sys.argv[1]\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n access_token = azurerm.get_access_token_from_cli()\n subscription_id = azurerm.get_subscription_from_cli()\n else:\n try:\n with open('azurermconfig.json') as configfile:\n configdata = json.load(configfile)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = configdata['tenantId']\n app_id = configdata['appId']\n app_secret = configdata['appSecret']\n subscription_id = configdata['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n rgreturn = azurerm.delete_resource_group(access_token, subscription_id,\n rgname)\n print(rgreturn)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
locations = azurerm.list_locations(access_token, subscription_id)
for location in locations['value']:
print(location['name'] + ', Display Name: ' + location[
'displayName'] + ', Coords: ' + location['latitude'] + ', ' +
location['longitude'])
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n locations = azurerm.list_locations(access_token, subscription_id)\n for location in locations['value']:\n print(location['name'] + ', Display Name: ' + location[\n 'displayName'] + ', Coords: ' + location['latitude'] + ', ' +\n location['longitude'])\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
if len(sys.argv) < 4:
usage()
rgname = sys.argv[1]
vmss_name = sys.argv[2]
capacity = sys.argv[3]
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
print('Error: Expecting azurermconfig.json in current folder')
sys.exit()
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
scaleoutput = azurerm.scale_vmss(access_token, subscription_id, rgname,
vmss_name, capacity)
print(scaleoutput.text)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if len(sys.argv) < 4:\n usage()\n rgname = sys.argv[1]\n vmss_name = sys.argv[2]\n capacity = sys.argv[3]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n print('Error: Expecting azurermconfig.json in current folder')\n sys.exit()\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n scaleoutput = azurerm.scale_vmss(access_token, subscription_id, rgname,\n vmss_name, capacity)\n print(scaleoutput.text)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
if len(sys.argv) < 3:
usage()
rgname = sys.argv[1]
vmss_name = sys.argv[2]
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermonfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
instanceviewlist = azurerm.list_vmss_vm_instance_view(access_token,
subscription_id, rgname, vmss_name)
for vmi in instanceviewlist['value']:
instance_id = vmi['instanceId']
upgrade_domain = vmi['properties']['instanceView'][
'platformUpdateDomain']
fault_domain = vmi['properties']['instanceView']['platformFaultDomain']
print('Instance ID: ' + instance_id + ', UD: ' + str(upgrade_domain
) + ', FD: ' + str(fault_domain))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if len(sys.argv) < 3:\n usage()\n rgname = sys.argv[1]\n vmss_name = sys.argv[2]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermonfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n instanceviewlist = azurerm.list_vmss_vm_instance_view(access_token,\n subscription_id, rgname, vmss_name)\n for vmi in instanceviewlist['value']:\n instance_id = vmi['instanceId']\n upgrade_domain = vmi['properties']['instanceView'][\n 'platformUpdateDomain']\n fault_domain = vmi['properties']['instanceView']['platformFaultDomain']\n print('Instance ID: ' + instance_id + ', UD: ' + str(upgrade_domain\n ) + ', FD: ' + str(fault_domain))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, as_name,
update_domains, fault_domains, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/availabilitySets/', as_name,
'?api-version=', COMP_API])
as_body = {'location': location}
properties = {'platformUpdateDomainCount': update_domains}
properties['platformFaultDomainCount'] = fault_domains
as_body['properties'] = properties
body = json.dumps(as_body)
return do_put(endpoint, body, access_token)
|
create_as
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, as_name,\n update_domains, fault_domains, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/availabilitySets/', as_name,\n '?api-version=', COMP_API])\n as_body = {'location': location}\n properties = {'platformUpdateDomainCount': update_domains}\n properties['platformFaultDomainCount'] = fault_domains\n as_body['properties'] = properties\n body = json.dumps(as_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_as",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vm_name, vm_size,
publisher, offer, sku, version, nic_id, location, storage_type=
'Standard_LRS', osdisk_name=None, username='azure', password=None,
public_key=None):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachines/', vm_name,
'?api-version=', COMP_API])
if osdisk_name is None:
osdisk_name = vm_name + 'osdisk'
vm_body = {'name': vm_name}
vm_body['location'] = location
properties = {'hardwareProfile': {'vmSize': vm_size}}
image_reference = {'publisher': publisher, 'offer': offer, 'sku': sku,
'version': version}
storage_profile = {'imageReference': image_reference}
os_disk = {'name': osdisk_name}
os_disk['managedDisk'] = {'storageAccountType': storage_type}
os_disk['caching'] = 'ReadWrite'
os_disk['createOption'] = 'fromImage'
storage_profile['osDisk'] = os_disk
properties['storageProfile'] = storage_profile
os_profile = {'computerName': vm_name}
os_profile['adminUsername'] = username
if password is not None:
os_profile['adminPassword'] = password
if public_key is not None:
if password is None:
disable_pswd = True
else:
disable_pswd = False
linux_config = {'disablePasswordAuthentication': disable_pswd}
pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'}
pub_key['keyData'] = public_key
linux_config['ssh'] = {'publicKeys': [pub_key]}
os_profile['linuxConfiguration'] = linux_config
properties['osProfile'] = os_profile
network_profile = {'networkInterfaces': [{'id': nic_id, 'properties': {
'primary': True}}]}
properties['networkProfile'] = network_profile
vm_body['properties'] = properties
body = json.dumps(vm_body)
return do_put(endpoint, body, access_token)
|
create_vm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vm_name, vm_size,\n publisher, offer, sku, version, nic_id, location, storage_type=\n 'Standard_LRS', osdisk_name=None, username='azure', password=None,\n public_key=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n if osdisk_name is None:\n osdisk_name = vm_name + 'osdisk'\n vm_body = {'name': vm_name}\n vm_body['location'] = location\n properties = {'hardwareProfile': {'vmSize': vm_size}}\n image_reference = {'publisher': publisher, 'offer': offer, 'sku': sku,\n 'version': version}\n storage_profile = {'imageReference': image_reference}\n os_disk = {'name': osdisk_name}\n os_disk['managedDisk'] = {'storageAccountType': storage_type}\n os_disk['caching'] = 'ReadWrite'\n os_disk['createOption'] = 'fromImage'\n storage_profile['osDisk'] = os_disk\n properties['storageProfile'] = storage_profile\n os_profile = {'computerName': vm_name}\n os_profile['adminUsername'] = username\n if password is not None:\n os_profile['adminPassword'] = password\n if public_key is not None:\n if password is None:\n disable_pswd = True\n else:\n disable_pswd = False\n linux_config = {'disablePasswordAuthentication': disable_pswd}\n pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'}\n pub_key['keyData'] = public_key\n linux_config['ssh'] = {'publicKeys': [pub_key]}\n os_profile['linuxConfiguration'] = linux_config\n properties['osProfile'] = os_profile\n network_profile = {'networkInterfaces': [{'id': nic_id, 'properties': {\n 'primary': True}}]}\n properties['networkProfile'] = network_profile\n vm_body['properties'] = properties\n body = json.dumps(vm_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_vm",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, vm_size,
capacity, publisher, offer, sku, version, subnet_id, location,
be_pool_id=None, lb_pool_id=None, storage_type='Standard_LRS', username
='azure', password=None, public_key=None, overprovision=True,
upgrade_policy='Manual', public_ip_per_vm=False):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'?api-version=', COMP_API])
vmss_body = {'location': location}
vmss_sku = {'name': vm_size, 'tier': 'Standard', 'capacity': capacity}
vmss_body['sku'] = vmss_sku
properties = {'overprovision': overprovision}
properties['upgradePolicy'] = {'mode': upgrade_policy}
os_profile = {'computerNamePrefix': vmss_name}
os_profile['adminUsername'] = username
if password is not None:
os_profile['adminPassword'] = password
if public_key is not None:
if password is None:
disable_pswd = True
else:
disable_pswd = False
linux_config = {'disablePasswordAuthentication': disable_pswd}
pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'}
pub_key['keyData'] = public_key
linux_config['ssh'] = {'publicKeys': [pub_key]}
os_profile['linuxConfiguration'] = linux_config
vm_profile = {'osProfile': os_profile}
os_disk = {'createOption': 'fromImage'}
os_disk['managedDisk'] = {'storageAccountType': storage_type}
os_disk['caching'] = 'ReadWrite'
storage_profile = {'osDisk': os_disk}
storage_profile['imageReference'] = {'publisher': publisher, 'offer':
offer, 'sku': sku, 'version': version}
vm_profile['storageProfile'] = storage_profile
nic = {'name': vmss_name}
ip_config = {'name': vmss_name}
ip_properties = {'subnet': {'id': subnet_id}}
if be_pool_id is not None:
ip_properties['loadBalancerBackendAddressPools'] = [{'id': be_pool_id}]
if lb_pool_id is not None:
ip_properties['loadBalancerInboundNatPools'] = [{'id': lb_pool_id}]
if public_ip_per_vm is True:
ip_properties['publicIpAddressConfiguration'] = {'name': 'pubip',
'properties': {'idleTimeoutInMinutes': 15}}
ip_config['properties'] = ip_properties
nic['properties'] = {'primary': True, 'ipConfigurations': [ip_config]}
network_profile = {'networkInterfaceConfigurations': [nic]}
vm_profile['networkProfile'] = network_profile
properties['virtualMachineProfile'] = vm_profile
vmss_body['properties'] = properties
body = json.dumps(vmss_body)
return do_put(endpoint, body, access_token)
|
create_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, vm_size,\n capacity, publisher, offer, sku, version, subnet_id, location,\n be_pool_id=None, lb_pool_id=None, storage_type='Standard_LRS', username\n ='azure', password=None, public_key=None, overprovision=True,\n upgrade_policy='Manual', public_ip_per_vm=False):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n vmss_body = {'location': location}\n vmss_sku = {'name': vm_size, 'tier': 'Standard', 'capacity': capacity}\n vmss_body['sku'] = vmss_sku\n properties = {'overprovision': overprovision}\n properties['upgradePolicy'] = {'mode': upgrade_policy}\n os_profile = {'computerNamePrefix': vmss_name}\n os_profile['adminUsername'] = username\n if password is not None:\n os_profile['adminPassword'] = password\n if public_key is not None:\n if password is None:\n disable_pswd = True\n else:\n disable_pswd = False\n linux_config = {'disablePasswordAuthentication': disable_pswd}\n pub_key = {'path': '/home/' + username + '/.ssh/authorized_keys'}\n pub_key['keyData'] = public_key\n linux_config['ssh'] = {'publicKeys': [pub_key]}\n os_profile['linuxConfiguration'] = linux_config\n vm_profile = {'osProfile': os_profile}\n os_disk = {'createOption': 'fromImage'}\n os_disk['managedDisk'] = {'storageAccountType': storage_type}\n os_disk['caching'] = 'ReadWrite'\n storage_profile = {'osDisk': os_disk}\n storage_profile['imageReference'] = {'publisher': publisher, 'offer':\n offer, 'sku': sku, 'version': version}\n vm_profile['storageProfile'] = storage_profile\n nic = {'name': vmss_name}\n ip_config = {'name': vmss_name}\n ip_properties = {'subnet': {'id': subnet_id}}\n if be_pool_id is not None:\n ip_properties['loadBalancerBackendAddressPools'] = [{'id': be_pool_id}]\n if lb_pool_id is not None:\n ip_properties['loadBalancerInboundNatPools'] = [{'id': lb_pool_id}]\n if public_ip_per_vm is True:\n ip_properties['publicIpAddressConfiguration'] = {'name': 'pubip',\n 'properties': {'idleTimeoutInMinutes': 15}}\n ip_config['properties'] = ip_properties\n nic['properties'] = {'primary': True, 'ipConfigurations': [ip_config]}\n network_profile = {'networkInterfaceConfigurations': [nic]}\n vm_profile['networkProfile'] = network_profile\n properties['virtualMachineProfile'] = vm_profile\n vmss_body['properties'] = properties\n body = json.dumps(vmss_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, as_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/availabilitySets/', as_name,
'?api-version=', COMP_API])
return do_delete(endpoint, access_token)
|
delete_as
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, as_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/availabilitySets/', as_name,\n '?api-version=', COMP_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_as",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vm_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachines/', vm_name,
'?api-version=', COMP_API])
return do_delete(endpoint, access_token)
|
delete_vm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vm_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_vm",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'?api-version=', COMP_API])
return do_delete(endpoint, access_token)
|
delete_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, vm_ids):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'/delete?api-version=', COMP_API])
body = '{"instanceIds" : ' + vm_ids + '}'
return do_post(endpoint, body, access_token)
|
delete_vmss_vms
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, vm_ids):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/delete?api-version=', COMP_API])\n body = '{\"instanceIds\" : ' + vm_ids + '}'\n return do_post(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "delete_vmss_vms",
"role": "assistant"
}
] |
def x(access_token, subscription_id, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.compute/locations/',
location, '/usages?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
get_compute_usage
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.compute/locations/',\n location, '/usages?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_compute_usage",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vm_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachines/', vm_name,
'?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
get_vm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vm_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_vm",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vm_name, extension_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachines/', vm_name,
'/extensions/', extension_name, '?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
get_vm_extension
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vm_name, extension_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '/extensions/', extension_name, '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_vm_extension",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
get_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, instance_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'/virtualMachines/', str(instance_id), '?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
get_vmss_vm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, instance_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/virtualMachines/', str(instance_id), '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_vmss_vm",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, as_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/availabilitySets/', as_name,
'?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
get_as
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, as_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/availabilitySets/', as_name,\n '?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_as",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.