source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Compute/availabilitySets',
'?api-version=', COMP_API])
return do_get_next(endpoint, access_token)
|
list_as_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/availabilitySets',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_as_sub",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Compute/images',
'?api-version=', COMP_API])
return do_get_next(endpoint, access_token)
|
list_vm_images_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/images',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vm_images_sub",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachines', '?api-version=',
COMP_API])
return do_get(endpoint, access_token)
|
list_vms
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines', '?api-version=',\n COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vms",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Compute/virtualMachines',
'?api-version=', COMP_API])
return do_get_next(endpoint, access_token)
|
list_vms_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/virtualMachines',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vms_sub",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets',
'?api-version=', COMP_API])
return do_get_next(endpoint, access_token)
|
list_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'/skus', '?api-version=', COMP_API])
return do_get_next(endpoint, access_token)
|
list_vmss_skus
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/skus', '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vmss_skus",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id,
'/providers/Microsoft.Compute/virtualMachineScaleSets',
'?api-version=', COMP_API])
return do_get_next(endpoint, access_token)
|
list_vmss_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/Microsoft.Compute/virtualMachineScaleSets',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vmss_sub",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, link=None):
if link is None:
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/',
vmss_name,
'/virtualMachines?$expand=instanceView&$select=instanceView',
'&api-version=', COMP_API])
else:
endpoint = link
return do_get(endpoint, access_token)
|
list_vmss_vm_instance_view_pg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, link=None):\n if link is None:\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/',\n vmss_name,\n '/virtualMachines?$expand=instanceView&$select=instanceView',\n '&api-version=', COMP_API])\n else:\n endpoint = link\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_vmss_vm_instance_view_pg",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'/powerOff?api-version=', COMP_API])
body = '{"instanceIds" : ["*"]}'
return do_post(endpoint, body, access_token)
|
poweroff_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/powerOff?api-version=', COMP_API])\n body = '{\"instanceIds\" : [\"*\"]}'\n return do_post(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "poweroff_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, instance_ids):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'/powerOff?api-version=', COMP_API])
body = '{"instanceIds" : ' + instance_ids + '}'
return do_post(endpoint, body, access_token)
|
poweroff_vmss_vms
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, instance_ids):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/powerOff?api-version=', COMP_API])\n body = '{\"instanceIds\" : ' + instance_ids + '}'\n return do_post(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "poweroff_vmss_vms",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, vmss_body):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'?api-version=', COMP_API])
body = json.dumps(vmss_body)
return do_put(endpoint, body, access_token)
|
put_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, vmss_body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n body = json.dumps(vmss_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "put_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, vm_id, vm_body
):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'/virtualMachines/', str(vm_id), '?api-version=', COMP_API])
body = json.dumps(vm_body)
return do_put(endpoint, body, access_token)
|
put_vmss_vm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, vm_id, vm_body\n ):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/virtualMachines/', str(vm_id), '?api-version=', COMP_API])\n body = json.dumps(vm_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "put_vmss_vm",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, capacity):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'?api-version=', COMP_API])
body = '{"sku":{"capacity":"' + str(capacity) + '"}}'
return do_patch(endpoint, body, access_token)
|
scale_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, capacity):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n body = '{\"sku\":{\"capacity\":\"' + str(capacity) + '\"}}'\n return do_patch(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "scale_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vm_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachines/', vm_name, '/start',
'?api-version=', COMP_API])
return do_post(endpoint, '', access_token)
|
start_vm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vm_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name, '/start',\n '?api-version=', COMP_API])\n return do_post(endpoint, '', access_token)\n",
"role": "user"
},
{
"content": "start_vm",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vm_name, body):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachines/', vm_name,
'?api-version=', COMP_API])
return do_put(endpoint, body, access_token)
|
update_vm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vm_name, body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "update_vm",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmss_name, body):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,
'?api-version=', COMP_API])
return do_put(endpoint, body, access_token)
|
update_vmss
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmss_name, body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "update_vmss",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, vmssname, updatedomain):
instance_viewlist = azurerm.list_vmss_vm_instance_view(access_token,
subscription_id, resource_group, vmssname)
udinstancelist = []
for instance_view in instance_viewlist['value']:
vmud = instance_view['properties']['instance_view'][
'platformUpdateDomain']
if vmud == updatedomain:
udinstancelist.append(instance_view['instanceId'])
udinstancelist.sort()
return udinstancelist
|
get_vm_ids_by_ud
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, vmssname, updatedomain):\n instance_viewlist = azurerm.list_vmss_vm_instance_view(access_token,\n subscription_id, resource_group, vmssname)\n udinstancelist = []\n for instance_view in instance_viewlist['value']:\n vmud = instance_view['properties']['instance_view'][\n 'platformUpdateDomain']\n if vmud == updatedomain:\n udinstancelist.append(instance_view['instanceId'])\n udinstancelist.sort()\n return udinstancelist\n",
"role": "user"
},
{
"content": "get_vm_ids_by_ud",
"role": "assistant"
}
] |
def x():
if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:
endpoint = os.environ['MSI_ENDPOINT']
else:
return None
headers = {'Metadata': 'true'}
body = {'resource': 'https://' + GRAPH_RESOURCE_HOST + '/'}
ret = requests.post(endpoint, headers=headers, data=body)
return ret.json()['access_token']
|
get_graph_token_from_msi
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n endpoint = os.environ['MSI_ENDPOINT']\n else:\n return None\n headers = {'Metadata': 'true'}\n body = {'resource': 'https://' + GRAPH_RESOURCE_HOST + '/'}\n ret = requests.post(endpoint, headers=headers, data=body)\n return ret.json()['access_token']\n",
"role": "user"
},
{
"content": "get_graph_token_from_msi",
"role": "assistant"
}
] |
def x(access_token=None):
if access_token is None:
access_token = get_graph_token_from_msi()
endpoint = 'https://' + GRAPH_RESOURCE_HOST + '/v1.0/me/'
headers = {'Authorization': 'Bearer ' + access_token, 'Host':
GRAPH_RESOURCE_HOST}
ret = requests.get(endpoint, headers=headers)
return ret.json()['id']
|
get_object_id_from_graph
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token=None):\n if access_token is None:\n access_token = get_graph_token_from_msi()\n endpoint = 'https://' + GRAPH_RESOURCE_HOST + '/v1.0/me/'\n headers = {'Authorization': 'Bearer ' + access_token, 'Host':\n GRAPH_RESOURCE_HOST}\n ret = requests.get(endpoint, headers=headers)\n return ret.json()['id']\n",
"role": "user"
},
{
"content": "get_object_id_from_graph",
"role": "assistant"
}
] |
def x(name=None):
home = os.path.expanduser('~')
azure_profile_path = (home + os.sep + '.azure' + os.sep +
'azureProfile.json')
if os.path.isfile(azure_profile_path) is False:
print('Error from get_subscription_from_cli(): Cannot find ' +
azure_profile_path)
return None
with io.open(azure_profile_path, 'r', encoding='utf-8-sig'
) as azure_profile_fd:
azure_profile = json.load(azure_profile_fd)
for subscription_info in azure_profile['subscriptions']:
if name is None and subscription_info['isDefault'
] is True or subscription_info['name'] == name:
return subscription_info['id']
return None
|
get_subscription_from_cli
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(name=None):\n home = os.path.expanduser('~')\n azure_profile_path = (home + os.sep + '.azure' + os.sep +\n 'azureProfile.json')\n if os.path.isfile(azure_profile_path) is False:\n print('Error from get_subscription_from_cli(): Cannot find ' +\n azure_profile_path)\n return None\n with io.open(azure_profile_path, 'r', encoding='utf-8-sig'\n ) as azure_profile_fd:\n azure_profile = json.load(azure_profile_fd)\n for subscription_info in azure_profile['subscriptions']:\n if name is None and subscription_info['isDefault'\n ] is True or subscription_info['name'] == name:\n return subscription_info['id']\n return None\n",
"role": "user"
},
{
"content": "get_subscription_from_cli",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/locations?api-version=', BASE_API])
return do_get(endpoint, access_token)
|
list_locations
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/locations?api-version=', BASE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_locations",
"role": "assistant"
}
] |
def x():
argparser = argparse.ArgumentParser()
argparser.add_argument('--uri', '-u', required=True, action='store',
help='Template URI')
argparser.add_argument('--params', '-f', required=True, action='store',
help='Parameters json file')
argparser.add_argument('--location', '-l', required=True, action=
'store', help='Location, e.g. eastus')
argparser.add_argument('--rg', '-g', required=False, action='store',
help='Resource Group name')
argparser.add_argument('--sub', '-s', required=False, action='store',
help='Subscription ID')
argparser.add_argument('--genparams', '-p', required=False, action=
'store', help=
'Comma separated list of parameters to generate strings for')
argparser.add_argument('--wait', '-w', required=False, action=
'store_true', default=False, help=
'Wait for deployment to complete and time it')
argparser.add_argument('--debug', '-d', required=False, action=
'store_true', default=False, help=
'Debug mode: print additional deployment')
args = argparser.parse_args()
template_uri = args.uri
params = args.params
rgname = args.rg
location = args.location
subscription_id = args.sub
try:
with open('azurermconfig.json') as configfile:
configdata = json.load(configfile)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = configdata['tenantId']
app_id = configdata['appId']
app_secret = configdata['appSecret']
if subscription_id is None:
subscription_id = configdata['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
try:
with open(params) as params_file:
param_data = json.load(params_file)
except FileNotFoundError:
sys.exit('Error: Expecting ' + params + ' in current folder')
haikunator = Haikunator()
if args.genparams is not None:
newdict = {}
genlist = args.genparams.split(',')
for param in genlist:
newval = haikunator.haikunate(delimiter='-').title()
newdict[param] = {'value': newval}
params = {**param_data, **newdict}
else:
params = param_data
if rgname is None:
rgname = haikunator.haikunate()
ret = azurerm.create_resource_group(access_token, subscription_id,
rgname, location)
print('Creating resource group: ' + rgname + ', location:',
location + ', return code:', ret)
deployment_name = haikunator.haikunate()
start_time = time.time()
deploy_return = azurerm.deploy_template_uri(access_token,
subscription_id, rgname, deployment_name, template_uri, params)
print('Deployment name: ' + deployment_name + ', return code:',
deploy_return)
if 'Response [20' not in str(deploy_return):
print('Return from deployment: ', deploy_return.text)
sys.exit('Deployment failed. Exiting.. ')
if args.debug is True:
print(json.dumps(deploy_return.json(), sort_keys=False, indent=2,
separators=(',', ': ')))
if args.debug is True:
print('Deployment status:')
deploy_return = azurerm.show_deployment(access_token,
subscription_id, rgname, deployment_name)
print(json.dumps(deploy_return, sort_keys=False, indent=2,
separators=(',', ': ')))
if args.wait is True:
print('Waiting for provisioning to complete..')
provisioning_state = ''
try:
while True:
time.sleep(10)
deploy_return = azurerm.show_deployment(access_token,
subscription_id, rgname, deployment_name)
provisioning_state = deploy_return['properties'][
'provisioningState']
if provisioning_state != 'Running':
break
print('Provisioning state:', provisioning_state)
except KeyError:
print('Deployment failure:', deploy_return)
elapsed_time = time.time() - start_time
print('Elapsed time:', elapsed_time)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n argparser = argparse.ArgumentParser()\n argparser.add_argument('--uri', '-u', required=True, action='store',\n help='Template URI')\n argparser.add_argument('--params', '-f', required=True, action='store',\n help='Parameters json file')\n argparser.add_argument('--location', '-l', required=True, action=\n 'store', help='Location, e.g. eastus')\n argparser.add_argument('--rg', '-g', required=False, action='store',\n help='Resource Group name')\n argparser.add_argument('--sub', '-s', required=False, action='store',\n help='Subscription ID')\n argparser.add_argument('--genparams', '-p', required=False, action=\n 'store', help=\n 'Comma separated list of parameters to generate strings for')\n argparser.add_argument('--wait', '-w', required=False, action=\n 'store_true', default=False, help=\n 'Wait for deployment to complete and time it')\n argparser.add_argument('--debug', '-d', required=False, action=\n 'store_true', default=False, help=\n 'Debug mode: print additional deployment')\n args = argparser.parse_args()\n template_uri = args.uri\n params = args.params\n rgname = args.rg\n location = args.location\n subscription_id = args.sub\n try:\n with open('azurermconfig.json') as configfile:\n configdata = json.load(configfile)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = configdata['tenantId']\n app_id = configdata['appId']\n app_secret = configdata['appSecret']\n if subscription_id is None:\n subscription_id = configdata['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n try:\n with open(params) as params_file:\n param_data = json.load(params_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting ' + params + ' in current folder')\n haikunator = Haikunator()\n if args.genparams is not None:\n newdict = {}\n genlist = args.genparams.split(',')\n for param in genlist:\n newval = haikunator.haikunate(delimiter='-').title()\n newdict[param] = {'value': newval}\n params = {**param_data, **newdict}\n else:\n params = param_data\n if rgname is None:\n rgname = haikunator.haikunate()\n ret = azurerm.create_resource_group(access_token, subscription_id,\n rgname, location)\n print('Creating resource group: ' + rgname + ', location:', \n location + ', return code:', ret)\n deployment_name = haikunator.haikunate()\n start_time = time.time()\n deploy_return = azurerm.deploy_template_uri(access_token,\n subscription_id, rgname, deployment_name, template_uri, params)\n print('Deployment name: ' + deployment_name + ', return code:',\n deploy_return)\n if 'Response [20' not in str(deploy_return):\n print('Return from deployment: ', deploy_return.text)\n sys.exit('Deployment failed. Exiting.. ')\n if args.debug is True:\n print(json.dumps(deploy_return.json(), sort_keys=False, indent=2,\n separators=(',', ': ')))\n if args.debug is True:\n print('Deployment status:')\n deploy_return = azurerm.show_deployment(access_token,\n subscription_id, rgname, deployment_name)\n print(json.dumps(deploy_return, sort_keys=False, indent=2,\n separators=(',', ': ')))\n if args.wait is True:\n print('Waiting for provisioning to complete..')\n provisioning_state = ''\n try:\n while True:\n time.sleep(10)\n deploy_return = azurerm.show_deployment(access_token,\n subscription_id, rgname, deployment_name)\n provisioning_state = deploy_return['properties'][\n 'provisioningState']\n if provisioning_state != 'Running':\n break\n print('Provisioning state:', provisioning_state)\n except KeyError:\n print('Deployment failure:', deploy_return)\n elapsed_time = time.time() - start_time\n print('Elapsed time:', elapsed_time)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, account_name, location,
cosmosdb_kind):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.DocumentDB/databaseAccounts/', account_name,
'?api-version=', COSMOSDB_API])
cosmosdb_body = {'location': location, 'kind': cosmosdb_kind,
'properties': {'databaseAccountOfferType': 'Standard', 'locations':
[{'failoverPriority': 0, 'locationName': location}]}}
body = json.dumps(cosmosdb_body)
return do_put(endpoint, body, access_token)
|
create_cosmosdb_account
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, account_name, location,\n cosmosdb_kind):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.DocumentDB/databaseAccounts/', account_name,\n '?api-version=', COSMOSDB_API])\n cosmosdb_body = {'location': location, 'kind': cosmosdb_kind,\n 'properties': {'databaseAccountOfferType': 'Standard', 'locations':\n [{'failoverPriority': 0, 'locationName': location}]}}\n body = json.dumps(cosmosdb_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_cosmosdb_account",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, account_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.DocumentDB/databaseAccounts/', account_name,
'/listKeys', '?api-version=', COSMOSDB_API])
return do_post(endpoint, '', access_token)
|
get_cosmosdb_account_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.DocumentDB/databaseAccounts/', account_name,\n '/listKeys', '?api-version=', COSMOSDB_API])\n return do_post(endpoint, '', access_token)\n",
"role": "user"
},
{
"content": "get_cosmosdb_account_keys",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, vault_name, location,
template_deployment=True, tenant_id=None, object_id=None):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.KeyVault/vaults/', vault_name,
'?api-version=', KEYVAULT_API])
if tenant_id is None:
ret = list_tenants(access_token)
tenant_id = ret['value'][0]['tenantId']
access_policies = [{'tenantId': tenant_id, 'objectId': object_id,
'permissions': {'keys': ['get', 'create', 'delete', 'list',
'update', 'import', 'backup', 'restore', 'recover'], 'secrets': [
'get', 'list', 'set', 'delete', 'backup', 'restore', 'recover'],
'certificates': ['get', 'list', 'delete', 'create', 'import',
'update', 'managecontacts', 'getissuers', 'listissuers',
'setissuers', 'deleteissuers', 'manageissuers', 'recover'],
'storage': ['get', 'list', 'delete', 'set', 'update',
'regeneratekey', 'setsas', 'listsas', 'getsas', 'deletesas']}}]
vault_properties = {'tenantId': tenant_id, 'sku': {'family': 'A',
'name': 'standard'}, 'enabledForTemplateDeployment':
template_deployment, 'accessPolicies': access_policies}
vault_body = {'location': location, 'properties': vault_properties}
body = json.dumps(vault_body)
return do_put(endpoint, body, access_token)
|
create_keyvault
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, vault_name, location,\n template_deployment=True, tenant_id=None, object_id=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults/', vault_name,\n '?api-version=', KEYVAULT_API])\n if tenant_id is None:\n ret = list_tenants(access_token)\n tenant_id = ret['value'][0]['tenantId']\n access_policies = [{'tenantId': tenant_id, 'objectId': object_id,\n 'permissions': {'keys': ['get', 'create', 'delete', 'list',\n 'update', 'import', 'backup', 'restore', 'recover'], 'secrets': [\n 'get', 'list', 'set', 'delete', 'backup', 'restore', 'recover'],\n 'certificates': ['get', 'list', 'delete', 'create', 'import',\n 'update', 'managecontacts', 'getissuers', 'listissuers',\n 'setissuers', 'deleteissuers', 'manageissuers', 'recover'],\n 'storage': ['get', 'list', 'delete', 'set', 'update',\n 'regeneratekey', 'setsas', 'listsas', 'getsas', 'deletesas']}}]\n vault_properties = {'tenantId': tenant_id, 'sku': {'family': 'A',\n 'name': 'standard'}, 'enabledForTemplateDeployment':\n template_deployment, 'accessPolicies': access_policies}\n vault_body = {'location': location, 'properties': vault_properties}\n body = json.dumps(vault_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_keyvault",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, vault_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.KeyVault/vaults/', vault_name,
'?api-version=', KEYVAULT_API])
return do_delete(endpoint, access_token)
|
delete_keyvault
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, vault_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults/', vault_name,\n '?api-version=', KEYVAULT_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_keyvault",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, vault_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.KeyVault/vaults/', vault_name,
'?api-version=', KEYVAULT_API])
return do_get(endpoint, access_token)
|
get_keyvault
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, vault_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults/', vault_name,\n '?api-version=', KEYVAULT_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_keyvault",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname,
'/providers/Microsoft.KeyVault/vaults', '?api-version=', KEYVAULT_API])
return do_get_next(endpoint, access_token)
|
list_keyvaults
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults', '?api-version=', KEYVAULT_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_keyvaults",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.KeyVault/vaults',
'?api-version=', KEYVAULT_API])
return do_get_next(endpoint, access_token)
|
list_keyvaults_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.KeyVault/vaults',\n '?api-version=', KEYVAULT_API])\n return do_get_next(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_keyvaults_sub",
"role": "assistant"
}
] |
def x(access_token, vault_uri, secret_name, secret_value):
endpoint = ''.join([vault_uri, '/secrets/', secret_name,
'?api-version=', '7.0'])
current_time = datetime.datetime.now().isoformat()
attributes = {'created': current_time, 'enabled': True, 'exp': None,
'nbf': None, 'recoveryLevel': 'Purgeable', 'updated': current_time}
secret_body = {'attributes': attributes, 'contentType': None, 'kid':
None, 'managed': None, 'tags': {'file-encoding': 'utf-8'}, 'value':
secret_value}
body = json.dumps(secret_body)
print(body)
return do_put(endpoint, body, access_token)
|
set_keyvault_secret
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, vault_uri, secret_name, secret_value):\n endpoint = ''.join([vault_uri, '/secrets/', secret_name,\n '?api-version=', '7.0'])\n current_time = datetime.datetime.now().isoformat()\n attributes = {'created': current_time, 'enabled': True, 'exp': None,\n 'nbf': None, 'recoveryLevel': 'Purgeable', 'updated': current_time}\n secret_body = {'attributes': attributes, 'contentType': None, 'kid':\n None, 'managed': None, 'tags': {'file-encoding': 'utf-8'}, 'value':\n secret_value}\n body = json.dumps(secret_body)\n print(body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "set_keyvault_secret",
"role": "assistant"
}
] |
def x(access_token, vault_uri, secret_name):
endpoint = ''.join([vault_uri, '/secrets/', secret_name,
'?api-version=', '7.0'])
return do_delete(endpoint, access_token)
|
delete_keyvault_secret
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, vault_uri, secret_name):\n endpoint = ''.join([vault_uri, '/secrets/', secret_name,\n '?api-version=', '7.0'])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_keyvault_secret",
"role": "assistant"
}
] |
def x(subscription_id, resource_group, vmss_name, metric_name, operator,
threshold, direction, change_count, time_grain='PT1M', time_window=
'PT5M', cool_down='PT1M'):
metric_trigger = {'metricName': metric_name}
metric_trigger['metricNamespace'] = ''
metric_trigger['metricResourceUri'] = ('/subscriptions/' +
subscription_id + '/resourceGroups/' + resource_group +
'/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name)
metric_trigger['timeGrain'] = time_grain
metric_trigger['statistic'] = 'Average'
metric_trigger['timeWindow'] = time_window
metric_trigger['timeAggregation'] = 'Average'
metric_trigger['operator'] = operator
metric_trigger['threshold'] = threshold
scale_action = {'direction': direction}
scale_action['type'] = 'ChangeCount'
scale_action['value'] = str(change_count)
scale_action['cooldown'] = cool_down
new_rule = {'metricTrigger': metric_trigger}
new_rule['scaleAction'] = scale_action
return new_rule
|
create_autoscale_rule
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(subscription_id, resource_group, vmss_name, metric_name, operator,\n threshold, direction, change_count, time_grain='PT1M', time_window=\n 'PT5M', cool_down='PT1M'):\n metric_trigger = {'metricName': metric_name}\n metric_trigger['metricNamespace'] = ''\n metric_trigger['metricResourceUri'] = ('/subscriptions/' +\n subscription_id + '/resourceGroups/' + resource_group +\n '/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name)\n metric_trigger['timeGrain'] = time_grain\n metric_trigger['statistic'] = 'Average'\n metric_trigger['timeWindow'] = time_window\n metric_trigger['timeAggregation'] = 'Average'\n metric_trigger['operator'] = operator\n metric_trigger['threshold'] = threshold\n scale_action = {'direction': direction}\n scale_action['type'] = 'ChangeCount'\n scale_action['value'] = str(change_count)\n scale_action['cooldown'] = cool_down\n new_rule = {'metricTrigger': metric_trigger}\n new_rule['scaleAction'] = scale_action\n return new_rule\n",
"role": "user"
},
{
"content": "create_autoscale_rule",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, setting_name,
vmss_name, location, minval, maxval, default, autoscale_rules, notify=None
):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/microsoft.insights/autoscaleSettings/', setting_name,
'?api-version=', INSIGHTS_API])
autoscale_setting = {'location': location}
profile = {'name': 'Profile1'}
capacity = {'minimum': str(minval)}
capacity['maximum'] = str(maxval)
capacity['default'] = str(default)
profile['capacity'] = capacity
profile['rules'] = autoscale_rules
profiles = [profile]
properties = {'name': setting_name}
properties['profiles'] = profiles
properties['targetResourceUri'] = ('/subscriptions/' + subscription_id +
'/resourceGroups/' + resource_group +
'/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name)
properties['enabled'] = True
if notify is not None:
notification = {'operation': 'Scale'}
email = {'sendToSubscriptionAdministrato': False}
email['sendToSubscriptionCoAdministrators'] = False
email['customEmails'] = [notify]
notification = {'email': email}
properties['notifications'] = [notification]
autoscale_setting['properties'] = properties
body = json.dumps(autoscale_setting)
return do_put(endpoint, body, access_token)
|
create_autoscale_setting
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, setting_name,\n vmss_name, location, minval, maxval, default, autoscale_rules, notify=None\n ):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/microsoft.insights/autoscaleSettings/', setting_name,\n '?api-version=', INSIGHTS_API])\n autoscale_setting = {'location': location}\n profile = {'name': 'Profile1'}\n capacity = {'minimum': str(minval)}\n capacity['maximum'] = str(maxval)\n capacity['default'] = str(default)\n profile['capacity'] = capacity\n profile['rules'] = autoscale_rules\n profiles = [profile]\n properties = {'name': setting_name}\n properties['profiles'] = profiles\n properties['targetResourceUri'] = ('/subscriptions/' + subscription_id +\n '/resourceGroups/' + resource_group +\n '/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name)\n properties['enabled'] = True\n if notify is not None:\n notification = {'operation': 'Scale'}\n email = {'sendToSubscriptionAdministrato': False}\n email['sendToSubscriptionCoAdministrators'] = False\n email['customEmails'] = [notify]\n notification = {'email': email}\n properties['notifications'] = [notification]\n autoscale_setting['properties'] = properties\n body = json.dumps(autoscale_setting)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_autoscale_setting",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/microsoft.insights/',
'/autoscaleSettings?api-version=', INSIGHTS_API])
return do_get(endpoint, access_token)
|
list_autoscale_settings
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/microsoft.insights/',\n '/autoscaleSettings?api-version=', INSIGHTS_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_autoscale_settings",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group,
'/providers/microsoft.insights/', '/components?api-version=',
INSIGHTS_COMPONENTS_API])
return do_get(endpoint, access_token)
|
list_insights_components
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/microsoft.insights/', '/components?api-version=',\n INSIGHTS_COMPONENTS_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_insights_components",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, resource_provider,
resource_type, resource_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group, '/providers/',
resource_provider, '/', resource_type, '/', resource_name,
'/providers/microsoft.insights', '/metricdefinitions?api-version=',
INSIGHTS_METRICS_API])
return do_get(endpoint, access_token)
|
list_metric_defs_for_resource
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, resource_provider,\n resource_type, resource_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group, '/providers/',\n resource_provider, '/', resource_type, '/', resource_name,\n '/providers/microsoft.insights', '/metricdefinitions?api-version=',\n INSIGHTS_METRICS_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_metric_defs_for_resource",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, resource_provider,
resource_type, resource_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', resource_group, '/providers/',
resource_provider, '/', resource_type, '/', resource_name,
'/providers/microsoft.insights', '/metrics?api-version=',
INSIGHTS_PREVIEW_API])
return do_get(endpoint, access_token)
|
get_metrics_for_resource
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, resource_provider,\n resource_type, resource_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group, '/providers/',\n resource_provider, '/', resource_type, '/', resource_name,\n '/providers/microsoft.insights', '/metrics?api-version=',\n INSIGHTS_PREVIEW_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_metrics_for_resource",
"role": "assistant"
}
] |
def x(access_token, subscription_id, start_timestamp):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id,
'/providers/microsoft.insights/eventtypes/management/values?api-version='
, INSIGHTS_API, "&$filter=eventTimestamp ge '", start_timestamp, "'"])
return do_get(endpoint, access_token)
|
get_events_for_subscription
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, start_timestamp):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/microsoft.insights/eventtypes/management/values?api-version='\n , INSIGHTS_API, \"&$filter=eventTimestamp ge '\", start_timestamp, \"'\"])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_events_for_subscription",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--name', '-n', required=True, action='store',
help='Name')
arg_parser.add_argument('--rgname', '-g', required=True, action='store',
help='Resource Group Name')
arg_parser.add_argument('--location', '-l', required=True, action=
'store', help='Location, e.g. eastus')
arg_parser.add_argument('--verbose', '-v', action='store_true', default
=False, help='Print operational details')
args = arg_parser.parse_args()
name = args.name
rgname = args.rgname
location = args.location
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
hkn = Haikunator()
nsg_name = name + 'nsg'
print('Creating NSG: ' + nsg_name)
rmreturn = azurerm.create_nsg(access_token, subscription_id, rgname,
nsg_name, location)
nsg_id = rmreturn.json()['id']
print('nsg_id = ' + nsg_id)
nsg_rule = 'ssh'
print('Creating NSG rule: ' + nsg_rule)
rmreturn = azurerm.create_nsg_rule(access_token, subscription_id,
rgname, nsg_name, nsg_rule, description='ssh rule',
destination_range='22')
print(rmreturn)
print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators
=(',', ': ')))
vnetname = name + 'vnet'
print('Creating VNet: ' + vnetname)
rmreturn = azurerm.create_vnet(access_token, subscription_id, rgname,
vnetname, location, nsg_id=nsg_id)
print(rmreturn)
subnet_id = rmreturn.json()['properties']['subnets'][0]['id']
print('subnet_id = ' + subnet_id)
public_ip_name = name + 'ip'
dns_label = name + 'ip'
print('Creating public IP address: ' + public_ip_name)
rmreturn = azurerm.create_public_ip(access_token, subscription_id,
rgname, public_ip_name, dns_label, location)
print(rmreturn)
ip_id = rmreturn.json()['id']
print('ip_id = ' + ip_id)
print('Waiting for IP provisioning..')
waiting = True
while waiting:
ipa = azurerm.get_public_ip(access_token, subscription_id, rgname,
public_ip_name)
if ipa['properties']['provisioningState'] == 'Succeeded':
waiting = False
time.sleep(1)
nic_name = name + 'nic'
print('Creating NIC: ' + nic_name)
rmreturn = azurerm.create_nic(access_token, subscription_id, rgname,
nic_name, ip_id, subnet_id, location)
nic_id = rmreturn.json()['id']
print('Waiting for NIC provisioning..')
waiting = True
while waiting:
nic = azurerm.get_nic(access_token, subscription_id, rgname, nic_name)
if nic['properties']['provisioningState'] == 'Succeeded':
waiting = False
time.sleep(1)
vm_name = name
vm_size = 'Standard_D1'
publisher = 'CoreOS'
offer = 'CoreOS'
sku = 'Stable'
version = 'latest'
username = 'azure'
password = hkn.haikunate(delimiter=',')
print('password = ' + password)
print('Creating VM: ' + vm_name)
rmreturn = azurerm.create_vm(access_token, subscription_id, rgname,
vm_name, vm_size, publisher, offer, sku, version, nic_id, location,
username=username, password=password)
print(rmreturn)
print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators
=(',', ': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--name', '-n', required=True, action='store',\n help='Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--location', '-l', required=True, action=\n 'store', help='Location, e.g. eastus')\n arg_parser.add_argument('--verbose', '-v', action='store_true', default\n =False, help='Print operational details')\n args = arg_parser.parse_args()\n name = args.name\n rgname = args.rgname\n location = args.location\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n hkn = Haikunator()\n nsg_name = name + 'nsg'\n print('Creating NSG: ' + nsg_name)\n rmreturn = azurerm.create_nsg(access_token, subscription_id, rgname,\n nsg_name, location)\n nsg_id = rmreturn.json()['id']\n print('nsg_id = ' + nsg_id)\n nsg_rule = 'ssh'\n print('Creating NSG rule: ' + nsg_rule)\n rmreturn = azurerm.create_nsg_rule(access_token, subscription_id,\n rgname, nsg_name, nsg_rule, description='ssh rule',\n destination_range='22')\n print(rmreturn)\n print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators\n =(',', ': ')))\n vnetname = name + 'vnet'\n print('Creating VNet: ' + vnetname)\n rmreturn = azurerm.create_vnet(access_token, subscription_id, rgname,\n vnetname, location, nsg_id=nsg_id)\n print(rmreturn)\n subnet_id = rmreturn.json()['properties']['subnets'][0]['id']\n print('subnet_id = ' + subnet_id)\n public_ip_name = name + 'ip'\n dns_label = name + 'ip'\n print('Creating public IP address: ' + public_ip_name)\n rmreturn = azurerm.create_public_ip(access_token, subscription_id,\n rgname, public_ip_name, dns_label, location)\n print(rmreturn)\n ip_id = rmreturn.json()['id']\n print('ip_id = ' + ip_id)\n print('Waiting for IP provisioning..')\n waiting = True\n while waiting:\n ipa = azurerm.get_public_ip(access_token, subscription_id, rgname,\n public_ip_name)\n if ipa['properties']['provisioningState'] == 'Succeeded':\n waiting = False\n time.sleep(1)\n nic_name = name + 'nic'\n print('Creating NIC: ' + nic_name)\n rmreturn = azurerm.create_nic(access_token, subscription_id, rgname,\n nic_name, ip_id, subnet_id, location)\n nic_id = rmreturn.json()['id']\n print('Waiting for NIC provisioning..')\n waiting = True\n while waiting:\n nic = azurerm.get_nic(access_token, subscription_id, rgname, nic_name)\n if nic['properties']['provisioningState'] == 'Succeeded':\n waiting = False\n time.sleep(1)\n vm_name = name\n vm_size = 'Standard_D1'\n publisher = 'CoreOS'\n offer = 'CoreOS'\n sku = 'Stable'\n version = 'latest'\n username = 'azure'\n password = hkn.haikunate(delimiter=',')\n print('password = ' + password)\n print('Creating VM: ' + vm_name)\n rmreturn = azurerm.create_vm(access_token, subscription_id, rgname,\n vm_name, vm_size, publisher, offer, sku, version, nic_id, location,\n username=username, password=password)\n print(rmreturn)\n print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators\n =(',', ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
vmlist = azurerm.list_vms_sub(access_token, subscription_id)
print(json.dumps(vmlist, sort_keys=False, indent=2, separators=(',', ': '))
)
"""
for vm in vmlist['value']:
count += 1
name = vm['name']
location = vm['location']
offer = vm['properties']['storageProfile']['imageReference']['offer']
sku = vm['properties']['storageProfile']['imageReference']['sku']
print(''.join([str(count), ': ', name,
# ', RG: ', rgname,
', location: ', location,
', OS: ', offer, ' ', sku]))
"""
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n vmlist = azurerm.list_vms_sub(access_token, subscription_id)\n print(json.dumps(vmlist, sort_keys=False, indent=2, separators=(',', ': '))\n )\n \"\"\"\n for vm in vmlist['value']:\n count += 1\n name = vm['name']\n location = vm['location']\n offer = vm['properties']['storageProfile']['imageReference']['offer']\n sku = vm['properties']['storageProfile']['imageReference']['sku']\n print(''.join([str(count), ': ', name,\n # ', RG: ', rgname,\n ', location: ', location,\n ', OS: ', offer, ' ', sku]))\n \"\"\"\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, deployment_name,
template, parameters):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.Resources/deployments/', deployment_name,
'?api-version=', DEPLOYMENTS_API])
properties = {'template': template}
properties['mode'] = 'Incremental'
properties['parameters'] = parameters
template_body = {'properties': properties}
body = json.dumps(template_body)
return do_put(endpoint, body, access_token)
|
deploy_template
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, deployment_name,\n template, parameters):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '?api-version=', DEPLOYMENTS_API])\n properties = {'template': template}\n properties['mode'] = 'Incremental'\n properties['parameters'] = parameters\n template_body = {'properties': properties}\n body = json.dumps(template_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "deploy_template",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, deployment_name,
template_uri, parameters):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.Resources/deployments/', deployment_name,
'?api-version=', DEPLOYMENTS_API])
properties = {'templateLink': {'uri': template_uri}}
properties['mode'] = 'Incremental'
properties['parameters'] = parameters
template_body = {'properties': properties}
body = json.dumps(template_body)
return do_put(endpoint, body, access_token)
|
deploy_template_uri
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, deployment_name,\n template_uri, parameters):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '?api-version=', DEPLOYMENTS_API])\n properties = {'templateLink': {'uri': template_uri}}\n properties['mode'] = 'Incremental'\n properties['parameters'] = parameters\n template_body = {'properties': properties}\n body = json.dumps(template_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "deploy_template_uri",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, deployment_name,
template_uri, parameters_uri):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.Resources/deployments/', deployment_name,
'?api-version=', DEPLOYMENTS_API])
properties = {'templateLink': {'uri': template_uri}}
properties['mode'] = 'Incremental'
properties['parametersLink'] = {'uri': parameters_uri}
template_body = {'properties': properties}
body = json.dumps(template_body)
return do_put(endpoint, body, access_token)
|
deploy_template_uri_param_uri
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, deployment_name,\n template_uri, parameters_uri):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '?api-version=', DEPLOYMENTS_API])\n properties = {'templateLink': {'uri': template_uri}}\n properties['mode'] = 'Incremental'\n properties['parametersLink'] = {'uri': parameters_uri}\n template_body = {'properties': properties}\n body = json.dumps(template_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "deploy_template_uri_param_uri",
"role": "assistant"
}
] |
def x(subscription, rgname, vmssvm_model, diskname, lun):
disk_id = ('/subscriptions/' + subscription + '/resourceGroups/' +
rgname + '/providers/Microsoft.Compute/disks/' + diskname)
disk_model = {'lun': lun, 'createOption': 'Attach', 'caching': 'None',
'managedDisk': {'storageAccountType': 'Standard_LRS', 'id': disk_id}}
vmssvm_model['properties']['storageProfile']['dataDisks'].append(disk_model
)
return vmssvm_model
|
attach_model
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(subscription, rgname, vmssvm_model, diskname, lun):\n disk_id = ('/subscriptions/' + subscription + '/resourceGroups/' +\n rgname + '/providers/Microsoft.Compute/disks/' + diskname)\n disk_model = {'lun': lun, 'createOption': 'Attach', 'caching': 'None',\n 'managedDisk': {'storageAccountType': 'Standard_LRS', 'id': disk_id}}\n vmssvm_model['properties']['storageProfile']['dataDisks'].append(disk_model\n )\n return vmssvm_model\n",
"role": "user"
},
{
"content": "attach_model",
"role": "assistant"
}
] |
def x(vmssvm_model, lun):
data_disks = vmssvm_model['properties']['storageProfile']['dataDisks']
data_disks[:] = [disk for disk in data_disks if disk.get('lun') != lun]
vmssvm_model['properties']['storageProfile']['dataDisks'] = data_disks
return vmssvm_model
|
detach_model
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(vmssvm_model, lun):\n data_disks = vmssvm_model['properties']['storageProfile']['dataDisks']\n data_disks[:] = [disk for disk in data_disks if disk.get('lun') != lun]\n vmssvm_model['properties']['storageProfile']['dataDisks'] = data_disks\n return vmssvm_model\n",
"role": "user"
},
{
"content": "detach_model",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--vmssname', '-n', required=True, action=
'store', help='Scale set name')
arg_parser.add_argument('--rgname', '-g', required=True, action='store',
help='Resource Group Name')
arg_parser.add_argument('--operation', '-o', required=True, action=
'store', help='Operation (attach/detach)')
arg_parser.add_argument('--vmid', '-i', required=True, action='store',
help='VM id')
arg_parser.add_argument('--lun', '-l', required=True, action='store',
help='lun id')
arg_parser.add_argument('--diskname', '-d', required=False, action=
'store', help='Optional password')
args = arg_parser.parse_args()
vmssname = args.vmssname
rgname = args.rgname
operation = args.operation
vmid = args.vmid
lun = int(args.lun)
diskname = args.diskname
if operation != 'attach' and operation != 'detach':
sys.exit('--operation must be attach or detach')
if diskname is None and operation == 'attach':
sys.exit('--diskname is required for attach operation.')
subscription_id = azurerm.get_subscription_from_cli()
access_token = azurerm.get_access_token_from_cli()
vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id,
rgname, vmssname, vmid)
if operation == 'attach':
new_model = attach_model(subscription_id, rgname, vmssvm_model,
diskname, lun)
elif operation == 'detach':
new_model = detach_model(vmssvm_model, lun)
rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname,
vmssname, vmid, new_model)
if rmreturn.status_code != 201:
sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' +
rmreturn.text)
print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',',
': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='Scale set name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--operation', '-o', required=True, action=\n 'store', help='Operation (attach/detach)')\n arg_parser.add_argument('--vmid', '-i', required=True, action='store',\n help='VM id')\n arg_parser.add_argument('--lun', '-l', required=True, action='store',\n help='lun id')\n arg_parser.add_argument('--diskname', '-d', required=False, action=\n 'store', help='Optional password')\n args = arg_parser.parse_args()\n vmssname = args.vmssname\n rgname = args.rgname\n operation = args.operation\n vmid = args.vmid\n lun = int(args.lun)\n diskname = args.diskname\n if operation != 'attach' and operation != 'detach':\n sys.exit('--operation must be attach or detach')\n if diskname is None and operation == 'attach':\n sys.exit('--diskname is required for attach operation.')\n subscription_id = azurerm.get_subscription_from_cli()\n access_token = azurerm.get_access_token_from_cli()\n vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id,\n rgname, vmssname, vmid)\n if operation == 'attach':\n new_model = attach_model(subscription_id, rgname, vmssvm_model,\n diskname, lun)\n elif operation == 'detach':\n new_model = detach_model(vmssvm_model, lun)\n rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname,\n vmssname, vmid, new_model)\n if rmreturn.status_code != 201:\n sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' +\n rmreturn.text)\n print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',',\n ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(tenant_id, application_id, application_secret):
context = adal.AuthenticationContext(get_auth_endpoint() + tenant_id,
api_version=None)
token_response = context.acquire_token_with_client_credentials(
get_resource_endpoint(), application_id, application_secret)
return token_response.get('accessToken')
|
get_access_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(tenant_id, application_id, application_secret):\n context = adal.AuthenticationContext(get_auth_endpoint() + tenant_id,\n api_version=None)\n token_response = context.acquire_token_with_client_credentials(\n get_resource_endpoint(), application_id, application_secret)\n return token_response.get('accessToken')\n",
"role": "user"
},
{
"content": "get_access_token",
"role": "assistant"
}
] |
def x():
if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:
endpoint = os.environ['MSI_ENDPOINT']
headers = {'Metadata': 'true'}
body = {'resource': 'https://management.azure.com/'}
ret = requests.post(endpoint, headers=headers, data=body)
return ret.json()['access_token']
else:
home = os.path.expanduser('~')
sub_username = ''
azure_profile_path = (home + os.sep + '.azure' + os.sep +
'azureProfile.json')
if os.path.isfile(azure_profile_path) is False:
print('Error from get_access_token_from_cli(): Cannot find ' +
azure_profile_path)
return None
with codecs.open(azure_profile_path, 'r', 'utf-8-sig'
) as azure_profile_fd:
subs = json.load(azure_profile_fd)
for sub in subs['subscriptions']:
if sub['isDefault'] == True:
sub_username = sub['user']['name']
if sub_username == '':
print(
'Error from get_access_token_from_cli(): Default subscription not found in '
+ azure_profile_path)
return None
access_keys_path = (home + os.sep + '.azure' + os.sep +
'accessTokens.json')
if os.path.isfile(access_keys_path) is False:
print('Error from get_access_token_from_cli(): Cannot find ' +
access_keys_path)
return None
with open(access_keys_path, 'r') as access_keys_fd:
keys = json.load(access_keys_fd)
for key in keys:
if key['userId'] == sub_username:
if 'accessToken' not in keys[0]:
print(
'Error from get_access_token_from_cli(): accessToken not found in '
+ access_keys_path)
return None
if 'tokenType' not in keys[0]:
print(
'Error from get_access_token_from_cli(): tokenType not found in '
+ access_keys_path)
return None
if 'expiresOn' not in keys[0]:
print(
'Error from get_access_token_from_cli(): expiresOn not found in '
+ access_keys_path)
return None
expiry_date_str = key['expiresOn']
if 'T' in expiry_date_str:
exp_date = dt.strptime(key['expiresOn'],
'%Y-%m-%dT%H:%M:%S.%fZ')
else:
exp_date = dt.strptime(key['expiresOn'],
'%Y-%m-%d %H:%M:%S.%f')
if exp_date < dt.now():
continue
else:
return key['accessToken']
print(
"Error from get_access_token_from_cli(): token expired. Run 'az login'"
)
return None
|
get_access_token_from_cli
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n endpoint = os.environ['MSI_ENDPOINT']\n headers = {'Metadata': 'true'}\n body = {'resource': 'https://management.azure.com/'}\n ret = requests.post(endpoint, headers=headers, data=body)\n return ret.json()['access_token']\n else:\n home = os.path.expanduser('~')\n sub_username = ''\n azure_profile_path = (home + os.sep + '.azure' + os.sep +\n 'azureProfile.json')\n if os.path.isfile(azure_profile_path) is False:\n print('Error from get_access_token_from_cli(): Cannot find ' +\n azure_profile_path)\n return None\n with codecs.open(azure_profile_path, 'r', 'utf-8-sig'\n ) as azure_profile_fd:\n subs = json.load(azure_profile_fd)\n for sub in subs['subscriptions']:\n if sub['isDefault'] == True:\n sub_username = sub['user']['name']\n if sub_username == '':\n print(\n 'Error from get_access_token_from_cli(): Default subscription not found in '\n + azure_profile_path)\n return None\n access_keys_path = (home + os.sep + '.azure' + os.sep +\n 'accessTokens.json')\n if os.path.isfile(access_keys_path) is False:\n print('Error from get_access_token_from_cli(): Cannot find ' +\n access_keys_path)\n return None\n with open(access_keys_path, 'r') as access_keys_fd:\n keys = json.load(access_keys_fd)\n for key in keys:\n if key['userId'] == sub_username:\n if 'accessToken' not in keys[0]:\n print(\n 'Error from get_access_token_from_cli(): accessToken not found in '\n + access_keys_path)\n return None\n if 'tokenType' not in keys[0]:\n print(\n 'Error from get_access_token_from_cli(): tokenType not found in '\n + access_keys_path)\n return None\n if 'expiresOn' not in keys[0]:\n print(\n 'Error from get_access_token_from_cli(): expiresOn not found in '\n + access_keys_path)\n return None\n expiry_date_str = key['expiresOn']\n if 'T' in expiry_date_str:\n exp_date = dt.strptime(key['expiresOn'],\n '%Y-%m-%dT%H:%M:%S.%fZ')\n else:\n exp_date = dt.strptime(key['expiresOn'],\n '%Y-%m-%d %H:%M:%S.%f')\n if exp_date < dt.now():\n continue\n else:\n return key['accessToken']\n print(\n \"Error from get_access_token_from_cli(): token expired. Run 'az login'\"\n )\n return None\n",
"role": "user"
},
{
"content": "get_access_token_from_cli",
"role": "assistant"
}
] |
def x():
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
count = 0
vmimglist = azurerm.list_vm_images_sub(access_token, subscription_id)
print(json.dumps(vmimglist, sort_keys=False, indent=2, separators=(',',
': ')))
for vm_image in vmimglist['value']:
count += 1
name = vm_image['name']
location = vm_image['location']
offer = vm_image['properties']['storageProfile']['imageReference'][
'offer']
sku = vm_image['properties']['storageProfile']['imageReference']['sku']
print(''.join([str(count), ': ', name, ', location: ', location,
', OS: ', offer, ' ', sku]))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n count = 0\n vmimglist = azurerm.list_vm_images_sub(access_token, subscription_id)\n print(json.dumps(vmimglist, sort_keys=False, indent=2, separators=(',',\n ': ')))\n for vm_image in vmimglist['value']:\n count += 1\n name = vm_image['name']\n location = vm_image['location']\n offer = vm_image['properties']['storageProfile']['imageReference'][\n 'offer']\n sku = vm_image['properties']['storageProfile']['imageReference']['sku']\n print(''.join([str(count), ': ', name, ', location: ', location,\n ', OS: ', offer, ' ', sku]))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(access_token, subscription_id, location, publisher):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Compute/', 'locations/',
location, '/publishers/', publisher,
'/artifacttypes/vmimage/offers?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
list_offers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, location, publisher):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/', 'locations/',\n location, '/publishers/', publisher,\n '/artifacttypes/vmimage/offers?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_offers",
"role": "assistant"
}
] |
def x(access_token, subscription_id, location, publisher, offer):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Compute/', 'locations/',
location, '/publishers/', publisher,
'/artifacttypes/vmimage/offers/', offer, '/skus?api-version=',
COMP_API])
return do_get(endpoint, access_token)
|
list_skus
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, location, publisher, offer):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/', 'locations/',\n location, '/publishers/', publisher,\n '/artifacttypes/vmimage/offers/', offer, '/skus?api-version=',\n COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_skus",
"role": "assistant"
}
] |
def x(access_token, subscription_id, location, publisher, offer, sku):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/providers/Microsoft.Compute/', 'locations/',
location, '/publishers/', publisher,
'/artifacttypes/vmimage/offers/', offer, '/skus/', sku,
'/versions?api-version=', COMP_API])
return do_get(endpoint, access_token)
|
list_sku_versions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, location, publisher, offer, sku):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/', 'locations/',\n location, '/publishers/', publisher,\n '/artifacttypes/vmimage/offers/', offer, '/skus/', sku,\n '/versions?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_sku_versions",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--vmssname', '-n', required=True, action=
'store', help='Scale set name')
arg_parser.add_argument('--rgname', '-g', required=True, action='store',
help='Resource Group Name')
arg_parser.add_argument('--operation', '-o', required=True, action=
'store', help='Operation (attach/detach)')
arg_parser.add_argument('--vmid', '-i', required=True, action='store',
help='VM id')
arg_parser.add_argument('--lun', '-l', required=True, action='store',
help='lun id')
arg_parser.add_argument('--diskname', '-d', required=False, action=
'store', help='Optional password')
args = arg_parser.parse_args()
vmssname = args.vmssname
rgname = args.rgname
operation = args.operation
vmid = args.vmid
lun = int(args.lun)
diskname = args.diskname
if operation != 'attach' and operation != 'detach':
sys.exit('--operation must be attach or detach')
if diskname is None and operation == 'attach':
sys.exit('--diskname is required for attach operation.')
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id,
rgname, vmssname, vmid)
if operation == 'attach':
new_model = attach_model(subscription_id, rgname, vmssvm_model,
diskname, lun)
elif operation == 'detach':
new_model = detach_model(vmssvm_model, lun)
rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname,
vmssname, vmid, new_model)
if rmreturn.status_code != 201 and rmreturn.status_code != 202:
sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' +
rmreturn.text)
print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',',
': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='Scale set name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--operation', '-o', required=True, action=\n 'store', help='Operation (attach/detach)')\n arg_parser.add_argument('--vmid', '-i', required=True, action='store',\n help='VM id')\n arg_parser.add_argument('--lun', '-l', required=True, action='store',\n help='lun id')\n arg_parser.add_argument('--diskname', '-d', required=False, action=\n 'store', help='Optional password')\n args = arg_parser.parse_args()\n vmssname = args.vmssname\n rgname = args.rgname\n operation = args.operation\n vmid = args.vmid\n lun = int(args.lun)\n diskname = args.diskname\n if operation != 'attach' and operation != 'detach':\n sys.exit('--operation must be attach or detach')\n if diskname is None and operation == 'attach':\n sys.exit('--diskname is required for attach operation.')\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id,\n rgname, vmssname, vmid)\n if operation == 'attach':\n new_model = attach_model(subscription_id, rgname, vmssvm_model,\n diskname, lun)\n elif operation == 'detach':\n new_model = detach_model(vmssvm_model, lun)\n rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname,\n vmssname, vmid, new_model)\n if rmreturn.status_code != 201 and rmreturn.status_code != 202:\n sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' +\n rmreturn.text)\n print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',',\n ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
if len(sys.argv) < 3:
usage()
rgname = sys.argv[1]
vmss = sys.argv[2]
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
sub_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
provider = 'Microsoft.Compute'
resource_type = 'virtualMachineScaleSets'
metric_definitions = azurerm.list_metric_defs_for_resource(access_token,
sub_id, rgname, provider, resource_type, vmss)
print(json.dumps(metric_definitions, sort_keys=False, indent=2,
separators=(',', ': ')))
metrics = azurerm.get_metrics_for_resource(access_token, sub_id, rgname,
provider, resource_type, vmss)
print(json.dumps(metrics, sort_keys=False, indent=2, separators=(',',
': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if len(sys.argv) < 3:\n usage()\n rgname = sys.argv[1]\n vmss = sys.argv[2]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n sub_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n provider = 'Microsoft.Compute'\n resource_type = 'virtualMachineScaleSets'\n metric_definitions = azurerm.list_metric_defs_for_resource(access_token,\n sub_id, rgname, provider, resource_type, vmss)\n print(json.dumps(metric_definitions, sort_keys=False, indent=2,\n separators=(',', ': ')))\n metrics = azurerm.get_metrics_for_resource(access_token, sub_id, rgname,\n provider, resource_type, vmss)\n print(json.dumps(metrics, sort_keys=False, indent=2, separators=(',',\n ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--vmssname', '-n', required=True, action=
'store', help='VMSS Name')
arg_parser.add_argument('--rgname', '-g', required=True, action='store',
help='Resource Group Name')
arg_parser.add_argument('--details', '-a', required=False, action=
'store', help='Print all details')
args = arg_parser.parse_args()
name = args.vmssname
rgname = args.rgname
details = args.details
try:
with open('azurermconfig.json') as config_file:
config_data = json.load(config_file)
except FileNotFoundError:
print('Error: Expecting azurermconfig.json in current folder')
sys.exit()
tenant_id = config_data['tenantId']
app_id = config_data['appId']
app_secret = config_data['appSecret']
subscription_id = config_data['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
public_ips = azurerm.get_vmss_public_ips(access_token, subscription_id,
rgname, name)
if details is True:
print(json.dumps(public_ips, sort_keys=False, indent=2, separators=
(',', ': ')))
else:
for pip in public_ips['value']:
vm_id = re.search('Machines/(.*)/networkInt', pip['id']).group(1)
ipaddr = pip['properties']['ipAddress']
print('VM id: ' + vm_id + ', IP: ' + ipaddr)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='VMSS Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--details', '-a', required=False, action=\n 'store', help='Print all details')\n args = arg_parser.parse_args()\n name = args.vmssname\n rgname = args.rgname\n details = args.details\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n print('Error: Expecting azurermconfig.json in current folder')\n sys.exit()\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n public_ips = azurerm.get_vmss_public_ips(access_token, subscription_id,\n rgname, name)\n if details is True:\n print(json.dumps(public_ips, sort_keys=False, indent=2, separators=\n (',', ': ')))\n else:\n for pip in public_ips['value']:\n vm_id = re.search('Machines/(.*)/networkInt', pip['id']).group(1)\n ipaddr = pip['properties']['ipAddress']\n print('VM id: ' + vm_id + ', IP: ' + ipaddr)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x():
if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:
access_token = azurerm.get_access_token_from_cli()
subscription_id = azurerm.get_subscription_from_cli()
else:
try:
with open('azurermconfig.json') as configfile:
configdata = json.load(configfile)
except FileNotFoundError:
sys.exit('Error: Expecting azurermconfig.json in current folder')
tenant_id = configdata['tenantId']
app_id = configdata['appId']
app_secret = configdata['appSecret']
subscription_id = configdata['subscriptionId']
access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)
resource_groups = azurerm.list_resource_groups(access_token,
subscription_id)
for rgname in resource_groups['value']:
print(rgname['name'] + ', ' + rgname['location'])
"""
rg_details = azurerm.get_resource_group(access_token, subscription_id, rgname['name'])
print(json.dumps(rg_details, sort_keys=False, indent=2, separators=(',', ': ')))
"""
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n access_token = azurerm.get_access_token_from_cli()\n subscription_id = azurerm.get_subscription_from_cli()\n else:\n try:\n with open('azurermconfig.json') as configfile:\n configdata = json.load(configfile)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = configdata['tenantId']\n app_id = configdata['appId']\n app_secret = configdata['appSecret']\n subscription_id = configdata['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n resource_groups = azurerm.list_resource_groups(access_token,\n subscription_id)\n for rgname in resource_groups['value']:\n print(rgname['name'] + ', ' + rgname['location'])\n \"\"\"\n rg_details = azurerm.get_resource_group(access_token, subscription_id, rgname['name'])\n print(json.dumps(rg_details, sort_keys=False, indent=2, separators=(',', ': ')))\n \"\"\"\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(container_name, image, port=80, cpu=1.0, memgb=1.5, environment=None):
container = {'name': container_name}
container_properties = {'image': image}
container_properties['ports'] = [{'port': port}]
container_properties['resources'] = {'requests': {'cpu': cpu,
'memoryInGB': memgb}}
container['properties'] = container_properties
if environment is not None:
container_properties['environmentVariables'] = environment
return container
|
create_container_definition
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(container_name, image, port=80, cpu=1.0, memgb=1.5, environment=None):\n container = {'name': container_name}\n container_properties = {'image': image}\n container_properties['ports'] = [{'port': port}]\n container_properties['resources'] = {'requests': {'cpu': cpu,\n 'memoryInGB': memgb}}\n container['properties'] = container_properties\n if environment is not None:\n container_properties['environmentVariables'] = environment\n return container\n",
"role": "user"
},
{
"content": "create_container_definition",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, container_group_name,
container_list, location, ostype='Linux', port=80, iptype='public'):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerInstance/ContainerGroups/',
container_group_name, '?api-version=', CONTAINER_API])
container_group_body = {'location': location}
properties = {'osType': ostype}
properties['containers'] = container_list
ipport = {'protocol': 'TCP'}
ipport['port'] = port
ipaddress = {'ports': [ipport]}
ipaddress['type'] = iptype
properties['ipAddress'] = ipaddress
container_group_body['properties'] = properties
body = json.dumps(container_group_body)
return do_put(endpoint, body, access_token)
|
create_container_instance_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, container_group_name,\n container_list, location, ostype='Linux', port=80, iptype='public'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '?api-version=', CONTAINER_API])\n container_group_body = {'location': location}\n properties = {'osType': ostype}\n properties['containers'] = container_list\n ipport = {'protocol': 'TCP'}\n ipport['port'] = port\n ipaddress = {'ports': [ipport]}\n ipaddress['type'] = iptype\n properties['ipAddress'] = ipaddress\n container_group_body['properties'] = properties\n body = json.dumps(container_group_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_container_instance_group",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, container_group_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerInstance/ContainerGroups/',
container_group_name, '?api-version=', CONTAINER_API])
return do_delete(endpoint, access_token)
|
delete_container_instance_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, container_group_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '?api-version=', CONTAINER_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_container_instance_group",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, container_group_name):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerInstance/ContainerGroups/',
container_group_name, '?api-version=', CONTAINER_API])
return do_get(endpoint, access_token)
|
get_container_instance_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, container_group_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_container_instance_group",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group, container_group_name,
container_name=None):
if container_name is None:
container_name = container_group_name
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerInstance/ContainerGroups/',
container_group_name, '/containers/', container_name,
'/logs?api-version=', CONTAINER_API])
return do_get(endpoint, access_token)
|
get_container_instance_logs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group, container_group_name,\n container_name=None):\n if container_name is None:\n container_name = container_group_name\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '/containers/', container_name,\n '/logs?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_container_instance_logs",
"role": "assistant"
}
] |
def x(access_token, subscription_id, resource_group):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', resource_group,
'/providers/Microsoft.ContainerInstance/ContainerGroups',
'?api-version=', CONTAINER_API])
return do_get(endpoint, access_token)
|
list_container_instance_groups
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups',\n '?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_container_instance_groups",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id,
'/providers/Microsoft.ContainerInstance/ContainerGroups',
'?api-version=', CONTAINER_API])
return do_get(endpoint, access_token)
|
list_container_instance_groups_sub
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/Microsoft.ContainerInstance/ContainerGroups',\n '?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_container_instance_groups_sub",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname, location):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname, '?api-version=',
RESOURCE_API])
rg_body = {'location': location}
body = json.dumps(rg_body)
return do_put(endpoint, body, access_token)
|
create_resource_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname, '?api-version=',\n RESOURCE_API])\n rg_body = {'location': location}\n body = json.dumps(rg_body)\n return do_put(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "create_resource_group",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname, '?api-version=',
RESOURCE_API])
return do_delete(endpoint, access_token)
|
delete_resource_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname, '?api-version=',\n RESOURCE_API])\n return do_delete(endpoint, access_token)\n",
"role": "user"
},
{
"content": "delete_resource_group",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourcegroups/', rgname, '/exportTemplate',
'?api-version=', RESOURCE_API])
rg_body = {'options': 'IncludeParameterDefaultValue', 'resources': ['*']}
body = json.dumps(rg_body)
return do_post(endpoint, body, access_token)
|
export_template
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname, '/exportTemplate',\n '?api-version=', RESOURCE_API])\n rg_body = {'options': 'IncludeParameterDefaultValue', 'resources': ['*']}\n body = json.dumps(rg_body)\n return do_post(endpoint, body, access_token)\n",
"role": "user"
},
{
"content": "export_template",
"role": "assistant"
}
] |
def x(access_token, subscription_id, rgname):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', rgname, '?api-version=',
RESOURCE_API])
return do_get(endpoint, access_token)
|
get_resource_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname, '?api-version=',\n RESOURCE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "get_resource_group",
"role": "assistant"
}
] |
def x(access_token, subscription_id):
endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',
subscription_id, '/resourceGroups/', '?api-version=', RESOURCE_API])
return do_get(endpoint, access_token)
|
list_resource_groups
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', '?api-version=', RESOURCE_API])\n return do_get(endpoint, access_token)\n",
"role": "user"
},
{
"content": "list_resource_groups",
"role": "assistant"
}
] |
def x():
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('--vmssname', '-n', required=True, action=
'store', help='VMSS Name')
arg_parser.add_argument('--rgname', '-g', required=True, action='store',
help='Resource Group Name')
arg_parser.add_argument('--details', '-a', required=False, action=
'store_true', default=False, help='Print all details')
args = arg_parser.parse_args()
name = args.vmssname
rgname = args.rgname
details = args.details
access_token = azurerm.get_access_token_from_cli()
subscription_id = azurerm.get_subscription_from_cli()
upgrade_status = azurerm.get_vmss_rolling_upgrades(access_token,
subscription_id, rgname, name)
if details is True:
print(json.dumps(upgrade_status, sort_keys=False, indent=2,
separators=(',', ': ')))
else:
print(json.dumps(upgrade_status, sort_keys=False, indent=2,
separators=(',', ': ')))
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='VMSS Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--details', '-a', required=False, action=\n 'store_true', default=False, help='Print all details')\n args = arg_parser.parse_args()\n name = args.vmssname\n rgname = args.rgname\n details = args.details\n access_token = azurerm.get_access_token_from_cli()\n subscription_id = azurerm.get_subscription_from_cli()\n upgrade_status = azurerm.get_vmss_rolling_upgrades(access_token,\n subscription_id, rgname, name)\n if details is True:\n print(json.dumps(upgrade_status, sort_keys=False, indent=2,\n separators=(',', ': ')))\n else:\n print(json.dumps(upgrade_status, sort_keys=False, indent=2,\n separators=(',', ': ')))\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(self, orm):
for coupon in orm['coupons.Coupon'].objects.all():
if coupon.user is not None or coupon.redeemed_at is not None:
orm['coupons.CouponUser'].objects.create(coupon=coupon, user=
coupon.user, redeemed_at=coupon.redeemed_at)
|
forwards
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, orm):\n for coupon in orm['coupons.Coupon'].objects.all():\n if coupon.user is not None or coupon.redeemed_at is not None:\n orm['coupons.CouponUser'].objects.create(coupon=coupon, user=\n coupon.user, redeemed_at=coupon.redeemed_at)\n",
"role": "user"
},
{
"content": "forwards",
"role": "assistant"
}
] |
def x(self, requirement):
filename = self.generate_filename(requirement)
for backend in list(self.backends):
try:
pathname = backend.get(filename)
if pathname is not None:
return pathname
except CacheBackendDisabledError as e:
logger.debug('Disabling %s because it requires configuration: %s',
backend, e)
self.backends.remove(backend)
except Exception as e:
logger.exception('Disabling %s because it failed: %s', backend, e)
self.backends.remove(backend)
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement):\n filename = self.generate_filename(requirement)\n for backend in list(self.backends):\n try:\n pathname = backend.get(filename)\n if pathname is not None:\n return pathname\n except CacheBackendDisabledError as e:\n logger.debug('Disabling %s because it requires configuration: %s',\n backend, e)\n self.backends.remove(backend)\n except Exception as e:\n logger.exception('Disabling %s because it failed: %s', backend, e)\n self.backends.remove(backend)\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, requirement, handle):
filename = self.generate_filename(requirement)
for backend in list(self.backends):
handle.seek(0)
try:
backend.put(filename, handle)
except CacheBackendDisabledError as e:
logger.debug('Disabling %s because it requires configuration: %s',
backend, e)
self.backends.remove(backend)
except Exception as e:
logger.exception('Disabling %s because it failed: %s', backend, e)
self.backends.remove(backend)
|
put
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement, handle):\n filename = self.generate_filename(requirement)\n for backend in list(self.backends):\n handle.seek(0)\n try:\n backend.put(filename, handle)\n except CacheBackendDisabledError as e:\n logger.debug('Disabling %s because it requires configuration: %s',\n backend, e)\n self.backends.remove(backend)\n except Exception as e:\n logger.exception('Disabling %s because it failed: %s', backend, e)\n self.backends.remove(backend)\n",
"role": "user"
},
{
"content": "put",
"role": "assistant"
}
] |
def x(self, requirement):
return FILENAME_PATTERN % (self.config.cache_format_revision,
requirement.name, requirement.version, get_python_version())
|
generate_filename
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement):\n return FILENAME_PATTERN % (self.config.cache_format_revision,\n requirement.name, requirement.version, get_python_version())\n",
"role": "user"
},
{
"content": "generate_filename",
"role": "assistant"
}
] |
def x(self, requirement):
install_timer = Timer()
missing_dependencies = self.find_missing_dependencies(requirement)
if missing_dependencies:
install_command = shlex.split(self.install_command
) + missing_dependencies
if not WINDOWS and not is_root():
install_command.insert(0, 'sudo')
logger.info('You seem to be missing %s: %s', pluralize(len(
missing_dependencies), 'dependency', 'dependencies'),
concatenate(missing_dependencies))
logger.info('You can install %s with this command: %s', 'it' if len
(missing_dependencies) == 1 else 'them', ' '.join(install_command))
if self.config.auto_install is False:
self.installation_refused(requirement, missing_dependencies,
'automatic installation is disabled')
if self.config.auto_install:
logger.info(
'Got permission to install %s (via auto_install option).',
pluralize(len(missing_dependencies), 'dependency',
'dependencies'))
elif self.confirm_installation(requirement, missing_dependencies,
install_command):
logger.info(
'Got permission to install %s (via interactive prompt).',
pluralize(len(missing_dependencies), 'dependency',
'dependencies'))
else:
logger.error('Refused installation of missing %s!',
'dependency' if len(missing_dependencies) == 1 else
'dependencies')
self.installation_refused(requirement, missing_dependencies,
'manual installation was refused')
if subprocess.call(install_command) == 0:
logger.info('Successfully installed %s in %s.', pluralize(len(
missing_dependencies), 'dependency', 'dependencies'),
install_timer)
return True
else:
logger.error('Failed to install %s.', pluralize(len(
missing_dependencies), 'dependency', 'dependencies'))
msg = 'Failed to install %s required by Python package %s! (%s)'
raise DependencyInstallationFailed(msg % (pluralize(len(
missing_dependencies), 'system package', 'system packages'),
requirement.name, concatenate(missing_dependencies)))
return False
|
install_dependencies
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement):\n install_timer = Timer()\n missing_dependencies = self.find_missing_dependencies(requirement)\n if missing_dependencies:\n install_command = shlex.split(self.install_command\n ) + missing_dependencies\n if not WINDOWS and not is_root():\n install_command.insert(0, 'sudo')\n logger.info('You seem to be missing %s: %s', pluralize(len(\n missing_dependencies), 'dependency', 'dependencies'),\n concatenate(missing_dependencies))\n logger.info('You can install %s with this command: %s', 'it' if len\n (missing_dependencies) == 1 else 'them', ' '.join(install_command))\n if self.config.auto_install is False:\n self.installation_refused(requirement, missing_dependencies,\n 'automatic installation is disabled')\n if self.config.auto_install:\n logger.info(\n 'Got permission to install %s (via auto_install option).',\n pluralize(len(missing_dependencies), 'dependency',\n 'dependencies'))\n elif self.confirm_installation(requirement, missing_dependencies,\n install_command):\n logger.info(\n 'Got permission to install %s (via interactive prompt).',\n pluralize(len(missing_dependencies), 'dependency',\n 'dependencies'))\n else:\n logger.error('Refused installation of missing %s!', \n 'dependency' if len(missing_dependencies) == 1 else\n 'dependencies')\n self.installation_refused(requirement, missing_dependencies,\n 'manual installation was refused')\n if subprocess.call(install_command) == 0:\n logger.info('Successfully installed %s in %s.', pluralize(len(\n missing_dependencies), 'dependency', 'dependencies'),\n install_timer)\n return True\n else:\n logger.error('Failed to install %s.', pluralize(len(\n missing_dependencies), 'dependency', 'dependencies'))\n msg = 'Failed to install %s required by Python package %s! (%s)'\n raise DependencyInstallationFailed(msg % (pluralize(len(\n missing_dependencies), 'system package', 'system packages'),\n requirement.name, concatenate(missing_dependencies)))\n return False\n",
"role": "user"
},
{
"content": "install_dependencies",
"role": "assistant"
}
] |
def x(self, requirement):
known_dependencies = self.find_known_dependencies(requirement)
if known_dependencies:
installed_packages = self.find_installed_packages()
logger.debug('Checking for missing dependencies of %s ..',
requirement.name)
missing_dependencies = sorted(set(known_dependencies).difference(
installed_packages))
if missing_dependencies:
logger.debug('Found %s: %s', pluralize(len(missing_dependencies
), 'missing dependency', 'missing dependencies'),
concatenate(missing_dependencies))
else:
logger.info('All known dependencies are already installed.')
return missing_dependencies
|
find_missing_dependencies
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement):\n known_dependencies = self.find_known_dependencies(requirement)\n if known_dependencies:\n installed_packages = self.find_installed_packages()\n logger.debug('Checking for missing dependencies of %s ..',\n requirement.name)\n missing_dependencies = sorted(set(known_dependencies).difference(\n installed_packages))\n if missing_dependencies:\n logger.debug('Found %s: %s', pluralize(len(missing_dependencies\n ), 'missing dependency', 'missing dependencies'),\n concatenate(missing_dependencies))\n else:\n logger.info('All known dependencies are already installed.')\n return missing_dependencies\n",
"role": "user"
},
{
"content": "find_missing_dependencies",
"role": "assistant"
}
] |
def x(self, requirement):
logger.info('Checking for known dependencies of %s ..', requirement.name)
known_dependencies = sorted(self.dependencies.get(requirement.name.
lower(), []))
if known_dependencies:
logger.info('Found %s: %s', pluralize(len(known_dependencies),
'known dependency', 'known dependencies'), concatenate(
known_dependencies))
else:
logger.info('No known dependencies... Maybe you have a suggestion?')
return known_dependencies
|
find_known_dependencies
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement):\n logger.info('Checking for known dependencies of %s ..', requirement.name)\n known_dependencies = sorted(self.dependencies.get(requirement.name.\n lower(), []))\n if known_dependencies:\n logger.info('Found %s: %s', pluralize(len(known_dependencies),\n 'known dependency', 'known dependencies'), concatenate(\n known_dependencies))\n else:\n logger.info('No known dependencies... Maybe you have a suggestion?')\n return known_dependencies\n",
"role": "user"
},
{
"content": "find_known_dependencies",
"role": "assistant"
}
] |
def x(self):
list_command = subprocess.Popen(self.list_command, shell=True, stdout=
subprocess.PIPE)
stdout, stderr = list_command.communicate()
if list_command.returncode != 0:
raise SystemDependencyError(
'The command to list the installed system packages failed! ({command})'
, command=self.list_command)
installed_packages = sorted(stdout.decode().split())
logger.debug('Found %i installed system package(s): %s', len(
installed_packages), installed_packages)
return installed_packages
|
find_installed_packages
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n list_command = subprocess.Popen(self.list_command, shell=True, stdout=\n subprocess.PIPE)\n stdout, stderr = list_command.communicate()\n if list_command.returncode != 0:\n raise SystemDependencyError(\n 'The command to list the installed system packages failed! ({command})'\n , command=self.list_command)\n installed_packages = sorted(stdout.decode().split())\n logger.debug('Found %i installed system package(s): %s', len(\n installed_packages), installed_packages)\n return installed_packages\n",
"role": "user"
},
{
"content": "find_installed_packages",
"role": "assistant"
}
] |
def x(self, requirement, missing_dependencies, reason):
msg = 'Missing %s (%s) required by Python package %s (%s) but %s!'
raise DependencyInstallationRefused(msg % (pluralize(len(
missing_dependencies), 'system package', 'system packages'),
concatenate(missing_dependencies), requirement.name, requirement.
version, reason))
|
installation_refused
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement, missing_dependencies, reason):\n msg = 'Missing %s (%s) required by Python package %s (%s) but %s!'\n raise DependencyInstallationRefused(msg % (pluralize(len(\n missing_dependencies), 'system package', 'system packages'),\n concatenate(missing_dependencies), requirement.name, requirement.\n version, reason))\n",
"role": "user"
},
{
"content": "installation_refused",
"role": "assistant"
}
] |
def x(self, requirement, missing_dependencies, install_command):
try:
return prompt_for_confirmation(format(
'Do you want me to install %s %s?', 'this' if len(
missing_dependencies) == 1 else 'these', 'dependency' if len(
missing_dependencies) == 1 else 'dependencies'), default=True)
except KeyboardInterrupt:
return False
|
confirm_installation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, requirement, missing_dependencies, install_command):\n try:\n return prompt_for_confirmation(format(\n 'Do you want me to install %s %s?', 'this' if len(\n missing_dependencies) == 1 else 'these', 'dependency' if len(\n missing_dependencies) == 1 else 'dependencies'), default=True)\n except KeyboardInterrupt:\n return False\n",
"role": "user"
},
{
"content": "confirm_installation",
"role": "assistant"
}
] |
def x(text, **kw):
return '\n\n'.join(' '.join(p.split()) for p in text.split('\n\n')).format(
**kw)
|
compact
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(text, **kw):\n return '\\n\\n'.join(' '.join(p.split()) for p in text.split('\\n\\n')).format(\n **kw)\n",
"role": "user"
},
{
"content": "compact",
"role": "assistant"
}
] |
def x(pathname):
home_directory = find_home_directory()
separators = set([os.sep])
if os.altsep is not None:
separators.add(os.altsep)
if len(pathname) >= 2 and pathname[0] == '~' and pathname[1] in separators:
pathname = os.path.join(home_directory, pathname[2:])
return parse_path(pathname)
|
expand_path
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pathname):\n home_directory = find_home_directory()\n separators = set([os.sep])\n if os.altsep is not None:\n separators.add(os.altsep)\n if len(pathname) >= 2 and pathname[0] == '~' and pathname[1] in separators:\n pathname = os.path.join(home_directory, pathname[2:])\n return parse_path(pathname)\n",
"role": "user"
},
{
"content": "expand_path",
"role": "assistant"
}
] |
def x():
if WINDOWS:
directory = os.environ.get('APPDATA')
if not directory:
directory = os.path.expanduser('~\\Application Data')
else:
import pwd
entry = pwd.getpwuid(os.getuid())
directory = entry.pw_dir
return directory
|
find_home_directory
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if WINDOWS:\n directory = os.environ.get('APPDATA')\n if not directory:\n directory = os.path.expanduser('~\\\\Application Data')\n else:\n import pwd\n entry = pwd.getpwuid(os.getuid())\n directory = entry.pw_dir\n return directory\n",
"role": "user"
},
{
"content": "find_home_directory",
"role": "assistant"
}
] |
def x(path, mode=511):
try:
os.makedirs(path, mode)
return True
except OSError as e:
if e.errno != errno.EEXIST:
raise
return False
|
makedirs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, mode=511):\n try:\n os.makedirs(path, mode)\n return True\n except OSError as e:\n if e.errno != errno.EEXIST:\n raise\n return False\n",
"role": "user"
},
{
"content": "makedirs",
"role": "assistant"
}
] |
def x(path1, path2):
if all(os.path.isdir(p) for p in (path1, path2)):
try:
return os.path.samefile(path1, path2)
except AttributeError:
return os.path.realpath(path1) == os.path.realpath(path2)
else:
return False
|
same_directories
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n if all(os.path.isdir(p) for p in (path1, path2)):\n try:\n return os.path.samefile(path1, path2)\n except AttributeError:\n return os.path.realpath(path1) == os.path.realpath(path2)\n else:\n return False\n",
"role": "user"
},
{
"content": "same_directories",
"role": "assistant"
}
] |
def x(method, *files):
context = hashlib.new(method)
for filename in files:
with open(filename, 'rb') as handle:
while True:
chunk = handle.read(4096)
if not chunk:
break
context.update(chunk)
return context.hexdigest()
|
hash_files
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, *files):\n context = hashlib.new(method)\n for filename in files:\n with open(filename, 'rb') as handle:\n while True:\n chunk = handle.read(4096)\n if not chunk:\n break\n context.update(chunk)\n return context.hexdigest()\n",
"role": "user"
},
{
"content": "hash_files",
"role": "assistant"
}
] |
def x(src, dst):
try:
os.replace(src, dst)
return
except AttributeError:
pass
try:
os.rename(src, dst)
return
except OSError as e:
if e.errno != errno.EEXIST:
raise
os.remove(dst)
os.rename(src, dst)
|
replace_file
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(src, dst):\n try:\n os.replace(src, dst)\n return\n except AttributeError:\n pass\n try:\n os.rename(src, dst)\n return\n except OSError as e:\n if e.errno != errno.EEXIST:\n raise\n os.remove(dst)\n os.rename(src, dst)\n",
"role": "user"
},
{
"content": "replace_file",
"role": "assistant"
}
] |
def x(expr):
required_dist = next(parse_requirements(expr))
try:
installed_dist = get_distribution(required_dist.key)
return installed_dist in required_dist
except DistributionNotFound:
return False
|
requirement_is_installed
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(expr):\n required_dist = next(parse_requirements(expr))\n try:\n installed_dist = get_distribution(required_dist.key)\n return installed_dist in required_dist\n except DistributionNotFound:\n return False\n",
"role": "user"
},
{
"content": "requirement_is_installed",
"role": "assistant"
}
] |
def x(*package_names):
command = UninstallCommand()
opts, args = command.parse_args(['--yes'] + list(package_names))
command.run(opts, args)
|
uninstall
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*package_names):\n command = UninstallCommand()\n opts, args = command.parse_args(['--yes'] + list(package_names))\n command.run(opts, args)\n",
"role": "user"
},
{
"content": "uninstall",
"role": "assistant"
}
] |
def x(argument, short_option, long_option):
return short_option[1] in argument[1:] if is_short_option(argument
) else argument == long_option
|
match_option
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(argument, short_option, long_option):\n return short_option[1] in argument[1:] if is_short_option(argument\n ) else argument == long_option\n",
"role": "user"
},
{
"content": "match_option",
"role": "assistant"
}
] |
def x(arguments, option, value):
return '%s=%s' % (option, value) in arguments or contains_sublist(arguments
, [option, value])
|
match_option_with_value
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(arguments, option, value):\n return '%s=%s' % (option, value) in arguments or contains_sublist(arguments\n , [option, value])\n",
"role": "user"
},
{
"content": "match_option_with_value",
"role": "assistant"
}
] |
def x(lst, sublst):
n = len(sublst)
return any(sublst == lst[i:i + n] for i in range(len(lst) - n + 1))
|
contains_sublist
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(lst, sublst):\n n = len(sublst)\n return any(sublst == lst[i:i + n] for i in range(len(lst) - n + 1))\n",
"role": "user"
},
{
"content": "contains_sublist",
"role": "assistant"
}
] |
def x(file, dtype, count, *args, **kwargs):
try:
return numpy.fromfile(file, *args, dtype=dtype, count=count, **kwargs)
except (TypeError, IOError):
return numpy.frombuffer(file.read(count * numpy.dtype(dtype).
itemsize), *args, dtype=dtype, count=count, **kwargs)
|
fromfile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(file, dtype, count, *args, **kwargs):\n try:\n return numpy.fromfile(file, *args, dtype=dtype, count=count, **kwargs)\n except (TypeError, IOError):\n return numpy.frombuffer(file.read(count * numpy.dtype(dtype).\n itemsize), *args, dtype=dtype, count=count, **kwargs)\n",
"role": "user"
},
{
"content": "fromfile",
"role": "assistant"
}
] |
def x(path, meta_data_only=False, compensate=False, channel_naming='$PnS',
reformat_meta=False, data_set=0, dtype='float32', encoding='utf-8'):
if compensate:
raise ParserFeatureNotImplementedError(
u'Compensation has not been implemented yet.')
read_data = not meta_data_only
fcs_parser = FCSParser(path, read_data=read_data, channel_naming=
channel_naming, data_set=data_set, encoding=encoding)
if reformat_meta:
fcs_parser.reformat_meta()
meta = fcs_parser.annotation
if meta_data_only:
return meta
else:
df = fcs_parser.dataframe
df = df.astype(dtype) if dtype else df
return meta, df
|
parse
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, meta_data_only=False, compensate=False, channel_naming='$PnS',\n reformat_meta=False, data_set=0, dtype='float32', encoding='utf-8'):\n if compensate:\n raise ParserFeatureNotImplementedError(\n u'Compensation has not been implemented yet.')\n read_data = not meta_data_only\n fcs_parser = FCSParser(path, read_data=read_data, channel_naming=\n channel_naming, data_set=data_set, encoding=encoding)\n if reformat_meta:\n fcs_parser.reformat_meta()\n meta = fcs_parser.annotation\n if meta_data_only:\n return meta\n else:\n df = fcs_parser.dataframe\n df = df.astype(dtype) if dtype else df\n return meta, df\n",
"role": "user"
},
{
"content": "parse",
"role": "assistant"
}
] |
def x(self, file_handle, data_set=0, read_data=True):
file_handle.seek(0, 2)
self._file_size = file_handle.tell()
file_handle.seek(0)
data_segments = 0
nextdata_offset = 0
while data_segments <= data_set:
self.read_header(file_handle, nextdata_offset)
self.read_text(file_handle)
if '$NEXTDATA' in self.annotation:
data_segments += 1
nextdata_offset = self.annotation['$NEXTDATA']
file_handle.seek(nextdata_offset)
if nextdata_offset == 0 and data_segments < data_set:
warnings.warn('File does not contain the number of data sets.')
break
else:
if data_segments != 0:
warnings.warn('File does not contain $NEXTDATA information.')
break
if read_data:
self.read_data(file_handle)
|
load_file
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, file_handle, data_set=0, read_data=True):\n file_handle.seek(0, 2)\n self._file_size = file_handle.tell()\n file_handle.seek(0)\n data_segments = 0\n nextdata_offset = 0\n while data_segments <= data_set:\n self.read_header(file_handle, nextdata_offset)\n self.read_text(file_handle)\n if '$NEXTDATA' in self.annotation:\n data_segments += 1\n nextdata_offset = self.annotation['$NEXTDATA']\n file_handle.seek(nextdata_offset)\n if nextdata_offset == 0 and data_segments < data_set:\n warnings.warn('File does not contain the number of data sets.')\n break\n else:\n if data_segments != 0:\n warnings.warn('File does not contain $NEXTDATA information.')\n break\n if read_data:\n self.read_data(file_handle)\n",
"role": "user"
},
{
"content": "load_file",
"role": "assistant"
}
] |
def x(cls, data):
obj = cls()
with contextlib.closing(BytesIO(data)) as file_handle:
obj.load_file(file_handle)
return obj
|
from_data
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, data):\n obj = cls()\n with contextlib.closing(BytesIO(data)) as file_handle:\n obj.load_file(file_handle)\n return obj\n",
"role": "user"
},
{
"content": "from_data",
"role": "assistant"
}
] |
def x(self, file_handle, nextdata_offset=0):
header = {'FCS format': file_handle.read(6)}
file_handle.read(4)
for field in ('text start', 'text end', 'data start', 'data end',
'analysis start', 'analysis end'):
s = file_handle.read(8)
try:
field_value = int(s)
except ValueError:
field_value = 0
header[field] = field_value + nextdata_offset
for k in ('text start', 'text end'):
if header[k] == 0:
raise ValueError(
u'The FCS file "{}" seems corrupted. (Parser cannot locate information about the "{}" segment.)'
.format(self.path, k))
elif header[k] > self._file_size:
raise ValueError(
u'The FCS file "{}" is corrupted. "{}" segment is larger than file size'
.format(self.path, k))
else:
pass
self._data_start = header['data start']
self._data_end = header['data start']
if header['analysis end'] - header['analysis start'] != 0:
warnings.warn(
u'There appears to be some information in the ANALYSIS segment of file {0}. However, it might not be read correctly.'
.format(self.path))
self.annotation['__header__'] = header
|
read_header
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, file_handle, nextdata_offset=0):\n header = {'FCS format': file_handle.read(6)}\n file_handle.read(4)\n for field in ('text start', 'text end', 'data start', 'data end',\n 'analysis start', 'analysis end'):\n s = file_handle.read(8)\n try:\n field_value = int(s)\n except ValueError:\n field_value = 0\n header[field] = field_value + nextdata_offset\n for k in ('text start', 'text end'):\n if header[k] == 0:\n raise ValueError(\n u'The FCS file \"{}\" seems corrupted. (Parser cannot locate information about the \"{}\" segment.)'\n .format(self.path, k))\n elif header[k] > self._file_size:\n raise ValueError(\n u'The FCS file \"{}\" is corrupted. \"{}\" segment is larger than file size'\n .format(self.path, k))\n else:\n pass\n self._data_start = header['data start']\n self._data_end = header['data start']\n if header['analysis end'] - header['analysis start'] != 0:\n warnings.warn(\n u'There appears to be some information in the ANALYSIS segment of file {0}. However, it might not be read correctly.'\n .format(self.path))\n self.annotation['__header__'] = header\n",
"role": "user"
},
{
"content": "read_header",
"role": "assistant"
}
] |
def x(self, raw_text):
delimiter = raw_text[0]
if raw_text[-1] != delimiter:
raw_text = raw_text.strip()
if raw_text[-1] != delimiter:
msg = (
u"""The first two characters were:
{}. The last two characters were: {}
Parser expects the same delimiter character in beginning and end of TEXT segment"""
.format(raw_text[:2], raw_text[-2:]))
raise ParserFeatureNotImplementedError(msg)
nested_split_list = [x.split(delimiter) for x in raw_text[1:-1].split(
delimiter * 2)]
raw_text_elements = nested_split_list[0]
for partial_element_list in nested_split_list[1:]:
raw_text_elements[-1] += delimiter + partial_element_list[0]
raw_text_elements.extend(partial_element_list[1:])
keys, values = raw_text_elements[0::2], raw_text_elements[1::2]
return dict(zip(keys, values))
|
extract_text_dict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, raw_text):\n delimiter = raw_text[0]\n if raw_text[-1] != delimiter:\n raw_text = raw_text.strip()\n if raw_text[-1] != delimiter:\n msg = (\n u\"\"\"The first two characters were:\n {}. The last two characters were: {}\nParser expects the same delimiter character in beginning and end of TEXT segment\"\"\"\n .format(raw_text[:2], raw_text[-2:]))\n raise ParserFeatureNotImplementedError(msg)\n nested_split_list = [x.split(delimiter) for x in raw_text[1:-1].split(\n delimiter * 2)]\n raw_text_elements = nested_split_list[0]\n for partial_element_list in nested_split_list[1:]:\n raw_text_elements[-1] += delimiter + partial_element_list[0]\n raw_text_elements.extend(partial_element_list[1:])\n keys, values = raw_text_elements[0::2], raw_text_elements[1::2]\n return dict(zip(keys, values))\n",
"role": "user"
},
{
"content": "extract_text_dict",
"role": "assistant"
}
] |
def x(self, file_handle):
header = self.annotation['__header__']
file_handle.seek(header['text start'], 0)
raw_text = file_handle.read(header['text end'] - header['text start'] + 1)
try:
raw_text = raw_text.decode(self._encoding)
except UnicodeDecodeError as e:
logger.warning(
u"""Encountered an illegal utf-8 byte in the header.
Illegal utf-8 characters will be ignored.
{}"""
.format(e))
raw_text = raw_text.decode(self._encoding, errors='ignore')
text = self._extract_text_dict(raw_text)
pars = int(text['$PAR'])
if '$P0B' in text.keys():
self.channel_numbers = range(0, pars)
else:
self.channel_numbers = range(1, pars + 1)
try:
names_n = tuple([text['$P{0}N'.format(i)] for i in self.
channel_numbers])
except KeyError:
names_n = []
try:
names_s = tuple([text['$P{0}S'.format(i)] for i in self.
channel_numbers])
except KeyError:
names_s = []
self.channel_names_s = names_s
self.channel_names_n = names_n
keys_encoding_bits = ['$P{0}B'.format(i) for i in self.channel_numbers]
add_keys_to_convert_to_int = ['$NEXTDATA', '$PAR', '$TOT']
keys_to_convert_to_int = keys_encoding_bits + add_keys_to_convert_to_int
for key in keys_to_convert_to_int:
value = text[key]
text[key] = int(value)
self.annotation.update(text)
if self._data_start == 0:
self._data_start = int(text['$BEGINDATA'])
if self._data_end == 0:
self._data_end = int(text['$ENDDATA'])
|
read_text
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, file_handle):\n header = self.annotation['__header__']\n file_handle.seek(header['text start'], 0)\n raw_text = file_handle.read(header['text end'] - header['text start'] + 1)\n try:\n raw_text = raw_text.decode(self._encoding)\n except UnicodeDecodeError as e:\n logger.warning(\n u\"\"\"Encountered an illegal utf-8 byte in the header.\n Illegal utf-8 characters will be ignored.\n{}\"\"\"\n .format(e))\n raw_text = raw_text.decode(self._encoding, errors='ignore')\n text = self._extract_text_dict(raw_text)\n pars = int(text['$PAR'])\n if '$P0B' in text.keys():\n self.channel_numbers = range(0, pars)\n else:\n self.channel_numbers = range(1, pars + 1)\n try:\n names_n = tuple([text['$P{0}N'.format(i)] for i in self.\n channel_numbers])\n except KeyError:\n names_n = []\n try:\n names_s = tuple([text['$P{0}S'.format(i)] for i in self.\n channel_numbers])\n except KeyError:\n names_s = []\n self.channel_names_s = names_s\n self.channel_names_n = names_n\n keys_encoding_bits = ['$P{0}B'.format(i) for i in self.channel_numbers]\n add_keys_to_convert_to_int = ['$NEXTDATA', '$PAR', '$TOT']\n keys_to_convert_to_int = keys_encoding_bits + add_keys_to_convert_to_int\n for key in keys_to_convert_to_int:\n value = text[key]\n text[key] = int(value)\n self.annotation.update(text)\n if self._data_start == 0:\n self._data_start = int(text['$BEGINDATA'])\n if self._data_end == 0:\n self._data_end = int(text['$ENDDATA'])\n",
"role": "user"
},
{
"content": "read_text",
"role": "assistant"
}
] |
def x(self, file_handle):
start = self.annotation['__header__']['analysis start']
end = self.annotation['__header__']['analysis end']
if start != 0 and end != 0:
file_handle.seek(start, 0)
self._analysis = file_handle.read(end - start)
else:
self._analysis = None
|
read_analysis
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, file_handle):\n start = self.annotation['__header__']['analysis start']\n end = self.annotation['__header__']['analysis end']\n if start != 0 and end != 0:\n file_handle.seek(start, 0)\n self._analysis = file_handle.read(end - start)\n else:\n self._analysis = None\n",
"role": "user"
},
{
"content": "read_analysis",
"role": "assistant"
}
] |
def x(self):
text = self.annotation
keys = text.keys()
if '$MODE' not in text or text['$MODE'] != 'L':
raise ParserFeatureNotImplementedError(u'Mode not implemented')
if '$P0B' in keys:
raise ParserFeatureNotImplementedError(
u'Not expecting a parameter starting at 0')
if text['$BYTEORD'] not in ['1,2,3,4', '4,3,2,1', '1,2', '2,1']:
raise ParserFeatureNotImplementedError(u'$BYTEORD {} not implemented'
.format(text['$BYTEORD']))
|
verify_assumptions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n text = self.annotation\n keys = text.keys()\n if '$MODE' not in text or text['$MODE'] != 'L':\n raise ParserFeatureNotImplementedError(u'Mode not implemented')\n if '$P0B' in keys:\n raise ParserFeatureNotImplementedError(\n u'Not expecting a parameter starting at 0')\n if text['$BYTEORD'] not in ['1,2,3,4', '4,3,2,1', '1,2', '2,1']:\n raise ParserFeatureNotImplementedError(u'$BYTEORD {} not implemented'\n .format(text['$BYTEORD']))\n",
"role": "user"
},
{
"content": "verify_assumptions",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.