source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Compute/availabilitySets', '?api-version=', COMP_API]) return do_get_next(endpoint, access_token)
list_as_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/availabilitySets',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_as_sub", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Compute/images', '?api-version=', COMP_API]) return do_get_next(endpoint, access_token)
list_vm_images_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/images',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_vm_images_sub", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachines', '?api-version=', COMP_API]) return do_get(endpoint, access_token)
list_vms
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines', '?api-version=',\n COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_vms", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Compute/virtualMachines', '?api-version=', COMP_API]) return do_get_next(endpoint, access_token)
list_vms_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/virtualMachines',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_vms_sub", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets', '?api-version=', COMP_API]) return do_get_next(endpoint, access_token)
list_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '/skus', '?api-version=', COMP_API]) return do_get_next(endpoint, access_token)
list_vmss_skus
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/skus', '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_vmss_skus", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Compute/virtualMachineScaleSets', '?api-version=', COMP_API]) return do_get_next(endpoint, access_token)
list_vmss_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/Microsoft.Compute/virtualMachineScaleSets',\n '?api-version=', COMP_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_vmss_sub", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, link=None): if link is None: endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '/virtualMachines?$expand=instanceView&$select=instanceView', '&api-version=', COMP_API]) else: endpoint = link return do_get(endpoint, access_token)
list_vmss_vm_instance_view_pg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, link=None):\n if link is None:\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/',\n vmss_name,\n '/virtualMachines?$expand=instanceView&$select=instanceView',\n '&api-version=', COMP_API])\n else:\n endpoint = link\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_vmss_vm_instance_view_pg", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '/powerOff?api-version=', COMP_API]) body = '{"instanceIds" : ["*"]}' return do_post(endpoint, body, access_token)
poweroff_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/powerOff?api-version=', COMP_API])\n body = '{\"instanceIds\" : [\"*\"]}'\n return do_post(endpoint, body, access_token)\n", "role": "user" }, { "content": "poweroff_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, instance_ids): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '/powerOff?api-version=', COMP_API]) body = '{"instanceIds" : ' + instance_ids + '}' return do_post(endpoint, body, access_token)
poweroff_vmss_vms
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, instance_ids):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/powerOff?api-version=', COMP_API])\n body = '{\"instanceIds\" : ' + instance_ids + '}'\n return do_post(endpoint, body, access_token)\n", "role": "user" }, { "content": "poweroff_vmss_vms", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, vmss_body): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '?api-version=', COMP_API]) body = json.dumps(vmss_body) return do_put(endpoint, body, access_token)
put_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, vmss_body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n body = json.dumps(vmss_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "put_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, vm_id, vm_body ): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '/virtualMachines/', str(vm_id), '?api-version=', COMP_API]) body = json.dumps(vm_body) return do_put(endpoint, body, access_token)
put_vmss_vm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, vm_id, vm_body\n ):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '/virtualMachines/', str(vm_id), '?api-version=', COMP_API])\n body = json.dumps(vm_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "put_vmss_vm", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, capacity): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '?api-version=', COMP_API]) body = '{"sku":{"capacity":"' + str(capacity) + '"}}' return do_patch(endpoint, body, access_token)
scale_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, capacity):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n body = '{\"sku\":{\"capacity\":\"' + str(capacity) + '\"}}'\n return do_patch(endpoint, body, access_token)\n", "role": "user" }, { "content": "scale_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vm_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachines/', vm_name, '/start', '?api-version=', COMP_API]) return do_post(endpoint, '', access_token)
start_vm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vm_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name, '/start',\n '?api-version=', COMP_API])\n return do_post(endpoint, '', access_token)\n", "role": "user" }, { "content": "start_vm", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vm_name, body): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachines/', vm_name, '?api-version=', COMP_API]) return do_put(endpoint, body, access_token)
update_vm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vm_name, body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachines/', vm_name,\n '?api-version=', COMP_API])\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "update_vm", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmss_name, body): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name, '?api-version=', COMP_API]) return do_put(endpoint, body, access_token)
update_vmss
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmss_name, body):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/Microsoft.Compute/virtualMachineScaleSets/', vmss_name,\n '?api-version=', COMP_API])\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "update_vmss", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, vmssname, updatedomain): instance_viewlist = azurerm.list_vmss_vm_instance_view(access_token, subscription_id, resource_group, vmssname) udinstancelist = [] for instance_view in instance_viewlist['value']: vmud = instance_view['properties']['instance_view'][ 'platformUpdateDomain'] if vmud == updatedomain: udinstancelist.append(instance_view['instanceId']) udinstancelist.sort() return udinstancelist
get_vm_ids_by_ud
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, vmssname, updatedomain):\n instance_viewlist = azurerm.list_vmss_vm_instance_view(access_token,\n subscription_id, resource_group, vmssname)\n udinstancelist = []\n for instance_view in instance_viewlist['value']:\n vmud = instance_view['properties']['instance_view'][\n 'platformUpdateDomain']\n if vmud == updatedomain:\n udinstancelist.append(instance_view['instanceId'])\n udinstancelist.sort()\n return udinstancelist\n", "role": "user" }, { "content": "get_vm_ids_by_ud", "role": "assistant" } ]
def x(): if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ: endpoint = os.environ['MSI_ENDPOINT'] else: return None headers = {'Metadata': 'true'} body = {'resource': 'https://' + GRAPH_RESOURCE_HOST + '/'} ret = requests.post(endpoint, headers=headers, data=body) return ret.json()['access_token']
get_graph_token_from_msi
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n endpoint = os.environ['MSI_ENDPOINT']\n else:\n return None\n headers = {'Metadata': 'true'}\n body = {'resource': 'https://' + GRAPH_RESOURCE_HOST + '/'}\n ret = requests.post(endpoint, headers=headers, data=body)\n return ret.json()['access_token']\n", "role": "user" }, { "content": "get_graph_token_from_msi", "role": "assistant" } ]
def x(access_token=None): if access_token is None: access_token = get_graph_token_from_msi() endpoint = 'https://' + GRAPH_RESOURCE_HOST + '/v1.0/me/' headers = {'Authorization': 'Bearer ' + access_token, 'Host': GRAPH_RESOURCE_HOST} ret = requests.get(endpoint, headers=headers) return ret.json()['id']
get_object_id_from_graph
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token=None):\n if access_token is None:\n access_token = get_graph_token_from_msi()\n endpoint = 'https://' + GRAPH_RESOURCE_HOST + '/v1.0/me/'\n headers = {'Authorization': 'Bearer ' + access_token, 'Host':\n GRAPH_RESOURCE_HOST}\n ret = requests.get(endpoint, headers=headers)\n return ret.json()['id']\n", "role": "user" }, { "content": "get_object_id_from_graph", "role": "assistant" } ]
def x(name=None): home = os.path.expanduser('~') azure_profile_path = (home + os.sep + '.azure' + os.sep + 'azureProfile.json') if os.path.isfile(azure_profile_path) is False: print('Error from get_subscription_from_cli(): Cannot find ' + azure_profile_path) return None with io.open(azure_profile_path, 'r', encoding='utf-8-sig' ) as azure_profile_fd: azure_profile = json.load(azure_profile_fd) for subscription_info in azure_profile['subscriptions']: if name is None and subscription_info['isDefault' ] is True or subscription_info['name'] == name: return subscription_info['id'] return None
get_subscription_from_cli
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(name=None):\n home = os.path.expanduser('~')\n azure_profile_path = (home + os.sep + '.azure' + os.sep +\n 'azureProfile.json')\n if os.path.isfile(azure_profile_path) is False:\n print('Error from get_subscription_from_cli(): Cannot find ' +\n azure_profile_path)\n return None\n with io.open(azure_profile_path, 'r', encoding='utf-8-sig'\n ) as azure_profile_fd:\n azure_profile = json.load(azure_profile_fd)\n for subscription_info in azure_profile['subscriptions']:\n if name is None and subscription_info['isDefault'\n ] is True or subscription_info['name'] == name:\n return subscription_info['id']\n return None\n", "role": "user" }, { "content": "get_subscription_from_cli", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/locations?api-version=', BASE_API]) return do_get(endpoint, access_token)
list_locations
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/locations?api-version=', BASE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_locations", "role": "assistant" } ]
def x(): argparser = argparse.ArgumentParser() argparser.add_argument('--uri', '-u', required=True, action='store', help='Template URI') argparser.add_argument('--params', '-f', required=True, action='store', help='Parameters json file') argparser.add_argument('--location', '-l', required=True, action= 'store', help='Location, e.g. eastus') argparser.add_argument('--rg', '-g', required=False, action='store', help='Resource Group name') argparser.add_argument('--sub', '-s', required=False, action='store', help='Subscription ID') argparser.add_argument('--genparams', '-p', required=False, action= 'store', help= 'Comma separated list of parameters to generate strings for') argparser.add_argument('--wait', '-w', required=False, action= 'store_true', default=False, help= 'Wait for deployment to complete and time it') argparser.add_argument('--debug', '-d', required=False, action= 'store_true', default=False, help= 'Debug mode: print additional deployment') args = argparser.parse_args() template_uri = args.uri params = args.params rgname = args.rg location = args.location subscription_id = args.sub try: with open('azurermconfig.json') as configfile: configdata = json.load(configfile) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = configdata['tenantId'] app_id = configdata['appId'] app_secret = configdata['appSecret'] if subscription_id is None: subscription_id = configdata['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) try: with open(params) as params_file: param_data = json.load(params_file) except FileNotFoundError: sys.exit('Error: Expecting ' + params + ' in current folder') haikunator = Haikunator() if args.genparams is not None: newdict = {} genlist = args.genparams.split(',') for param in genlist: newval = haikunator.haikunate(delimiter='-').title() newdict[param] = {'value': newval} params = {**param_data, **newdict} else: params = param_data if rgname is None: rgname = haikunator.haikunate() ret = azurerm.create_resource_group(access_token, subscription_id, rgname, location) print('Creating resource group: ' + rgname + ', location:', location + ', return code:', ret) deployment_name = haikunator.haikunate() start_time = time.time() deploy_return = azurerm.deploy_template_uri(access_token, subscription_id, rgname, deployment_name, template_uri, params) print('Deployment name: ' + deployment_name + ', return code:', deploy_return) if 'Response [20' not in str(deploy_return): print('Return from deployment: ', deploy_return.text) sys.exit('Deployment failed. Exiting.. ') if args.debug is True: print(json.dumps(deploy_return.json(), sort_keys=False, indent=2, separators=(',', ': '))) if args.debug is True: print('Deployment status:') deploy_return = azurerm.show_deployment(access_token, subscription_id, rgname, deployment_name) print(json.dumps(deploy_return, sort_keys=False, indent=2, separators=(',', ': '))) if args.wait is True: print('Waiting for provisioning to complete..') provisioning_state = '' try: while True: time.sleep(10) deploy_return = azurerm.show_deployment(access_token, subscription_id, rgname, deployment_name) provisioning_state = deploy_return['properties'][ 'provisioningState'] if provisioning_state != 'Running': break print('Provisioning state:', provisioning_state) except KeyError: print('Deployment failure:', deploy_return) elapsed_time = time.time() - start_time print('Elapsed time:', elapsed_time)
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n argparser = argparse.ArgumentParser()\n argparser.add_argument('--uri', '-u', required=True, action='store',\n help='Template URI')\n argparser.add_argument('--params', '-f', required=True, action='store',\n help='Parameters json file')\n argparser.add_argument('--location', '-l', required=True, action=\n 'store', help='Location, e.g. eastus')\n argparser.add_argument('--rg', '-g', required=False, action='store',\n help='Resource Group name')\n argparser.add_argument('--sub', '-s', required=False, action='store',\n help='Subscription ID')\n argparser.add_argument('--genparams', '-p', required=False, action=\n 'store', help=\n 'Comma separated list of parameters to generate strings for')\n argparser.add_argument('--wait', '-w', required=False, action=\n 'store_true', default=False, help=\n 'Wait for deployment to complete and time it')\n argparser.add_argument('--debug', '-d', required=False, action=\n 'store_true', default=False, help=\n 'Debug mode: print additional deployment')\n args = argparser.parse_args()\n template_uri = args.uri\n params = args.params\n rgname = args.rg\n location = args.location\n subscription_id = args.sub\n try:\n with open('azurermconfig.json') as configfile:\n configdata = json.load(configfile)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = configdata['tenantId']\n app_id = configdata['appId']\n app_secret = configdata['appSecret']\n if subscription_id is None:\n subscription_id = configdata['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n try:\n with open(params) as params_file:\n param_data = json.load(params_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting ' + params + ' in current folder')\n haikunator = Haikunator()\n if args.genparams is not None:\n newdict = {}\n genlist = args.genparams.split(',')\n for param in genlist:\n newval = haikunator.haikunate(delimiter='-').title()\n newdict[param] = {'value': newval}\n params = {**param_data, **newdict}\n else:\n params = param_data\n if rgname is None:\n rgname = haikunator.haikunate()\n ret = azurerm.create_resource_group(access_token, subscription_id,\n rgname, location)\n print('Creating resource group: ' + rgname + ', location:', \n location + ', return code:', ret)\n deployment_name = haikunator.haikunate()\n start_time = time.time()\n deploy_return = azurerm.deploy_template_uri(access_token,\n subscription_id, rgname, deployment_name, template_uri, params)\n print('Deployment name: ' + deployment_name + ', return code:',\n deploy_return)\n if 'Response [20' not in str(deploy_return):\n print('Return from deployment: ', deploy_return.text)\n sys.exit('Deployment failed. Exiting.. ')\n if args.debug is True:\n print(json.dumps(deploy_return.json(), sort_keys=False, indent=2,\n separators=(',', ': ')))\n if args.debug is True:\n print('Deployment status:')\n deploy_return = azurerm.show_deployment(access_token,\n subscription_id, rgname, deployment_name)\n print(json.dumps(deploy_return, sort_keys=False, indent=2,\n separators=(',', ': ')))\n if args.wait is True:\n print('Waiting for provisioning to complete..')\n provisioning_state = ''\n try:\n while True:\n time.sleep(10)\n deploy_return = azurerm.show_deployment(access_token,\n subscription_id, rgname, deployment_name)\n provisioning_state = deploy_return['properties'][\n 'provisioningState']\n if provisioning_state != 'Running':\n break\n print('Provisioning state:', provisioning_state)\n except KeyError:\n print('Deployment failure:', deploy_return)\n elapsed_time = time.time() - start_time\n print('Elapsed time:', elapsed_time)\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, account_name, location, cosmosdb_kind): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.DocumentDB/databaseAccounts/', account_name, '?api-version=', COSMOSDB_API]) cosmosdb_body = {'location': location, 'kind': cosmosdb_kind, 'properties': {'databaseAccountOfferType': 'Standard', 'locations': [{'failoverPriority': 0, 'locationName': location}]}} body = json.dumps(cosmosdb_body) return do_put(endpoint, body, access_token)
create_cosmosdb_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, account_name, location,\n cosmosdb_kind):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.DocumentDB/databaseAccounts/', account_name,\n '?api-version=', COSMOSDB_API])\n cosmosdb_body = {'location': location, 'kind': cosmosdb_kind,\n 'properties': {'databaseAccountOfferType': 'Standard', 'locations':\n [{'failoverPriority': 0, 'locationName': location}]}}\n body = json.dumps(cosmosdb_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_cosmosdb_account", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, account_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.DocumentDB/databaseAccounts/', account_name, '/listKeys', '?api-version=', COSMOSDB_API]) return do_post(endpoint, '', access_token)
get_cosmosdb_account_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, account_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.DocumentDB/databaseAccounts/', account_name,\n '/listKeys', '?api-version=', COSMOSDB_API])\n return do_post(endpoint, '', access_token)\n", "role": "user" }, { "content": "get_cosmosdb_account_keys", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, vault_name, location, template_deployment=True, tenant_id=None, object_id=None): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.KeyVault/vaults/', vault_name, '?api-version=', KEYVAULT_API]) if tenant_id is None: ret = list_tenants(access_token) tenant_id = ret['value'][0]['tenantId'] access_policies = [{'tenantId': tenant_id, 'objectId': object_id, 'permissions': {'keys': ['get', 'create', 'delete', 'list', 'update', 'import', 'backup', 'restore', 'recover'], 'secrets': [ 'get', 'list', 'set', 'delete', 'backup', 'restore', 'recover'], 'certificates': ['get', 'list', 'delete', 'create', 'import', 'update', 'managecontacts', 'getissuers', 'listissuers', 'setissuers', 'deleteissuers', 'manageissuers', 'recover'], 'storage': ['get', 'list', 'delete', 'set', 'update', 'regeneratekey', 'setsas', 'listsas', 'getsas', 'deletesas']}}] vault_properties = {'tenantId': tenant_id, 'sku': {'family': 'A', 'name': 'standard'}, 'enabledForTemplateDeployment': template_deployment, 'accessPolicies': access_policies} vault_body = {'location': location, 'properties': vault_properties} body = json.dumps(vault_body) return do_put(endpoint, body, access_token)
create_keyvault
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, vault_name, location,\n template_deployment=True, tenant_id=None, object_id=None):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults/', vault_name,\n '?api-version=', KEYVAULT_API])\n if tenant_id is None:\n ret = list_tenants(access_token)\n tenant_id = ret['value'][0]['tenantId']\n access_policies = [{'tenantId': tenant_id, 'objectId': object_id,\n 'permissions': {'keys': ['get', 'create', 'delete', 'list',\n 'update', 'import', 'backup', 'restore', 'recover'], 'secrets': [\n 'get', 'list', 'set', 'delete', 'backup', 'restore', 'recover'],\n 'certificates': ['get', 'list', 'delete', 'create', 'import',\n 'update', 'managecontacts', 'getissuers', 'listissuers',\n 'setissuers', 'deleteissuers', 'manageissuers', 'recover'],\n 'storage': ['get', 'list', 'delete', 'set', 'update',\n 'regeneratekey', 'setsas', 'listsas', 'getsas', 'deletesas']}}]\n vault_properties = {'tenantId': tenant_id, 'sku': {'family': 'A',\n 'name': 'standard'}, 'enabledForTemplateDeployment':\n template_deployment, 'accessPolicies': access_policies}\n vault_body = {'location': location, 'properties': vault_properties}\n body = json.dumps(vault_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_keyvault", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, vault_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.KeyVault/vaults/', vault_name, '?api-version=', KEYVAULT_API]) return do_delete(endpoint, access_token)
delete_keyvault
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, vault_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults/', vault_name,\n '?api-version=', KEYVAULT_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_keyvault", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, vault_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.KeyVault/vaults/', vault_name, '?api-version=', KEYVAULT_API]) return do_get(endpoint, access_token)
get_keyvault
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, vault_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults/', vault_name,\n '?api-version=', KEYVAULT_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_keyvault", "role": "assistant" } ]
def x(access_token, subscription_id, rgname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/providers/Microsoft.KeyVault/vaults', '?api-version=', KEYVAULT_API]) return do_get_next(endpoint, access_token)
list_keyvaults
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname,\n '/providers/Microsoft.KeyVault/vaults', '?api-version=', KEYVAULT_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_keyvaults", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.KeyVault/vaults', '?api-version=', KEYVAULT_API]) return do_get_next(endpoint, access_token)
list_keyvaults_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.KeyVault/vaults',\n '?api-version=', KEYVAULT_API])\n return do_get_next(endpoint, access_token)\n", "role": "user" }, { "content": "list_keyvaults_sub", "role": "assistant" } ]
def x(access_token, vault_uri, secret_name, secret_value): endpoint = ''.join([vault_uri, '/secrets/', secret_name, '?api-version=', '7.0']) current_time = datetime.datetime.now().isoformat() attributes = {'created': current_time, 'enabled': True, 'exp': None, 'nbf': None, 'recoveryLevel': 'Purgeable', 'updated': current_time} secret_body = {'attributes': attributes, 'contentType': None, 'kid': None, 'managed': None, 'tags': {'file-encoding': 'utf-8'}, 'value': secret_value} body = json.dumps(secret_body) print(body) return do_put(endpoint, body, access_token)
set_keyvault_secret
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, vault_uri, secret_name, secret_value):\n endpoint = ''.join([vault_uri, '/secrets/', secret_name,\n '?api-version=', '7.0'])\n current_time = datetime.datetime.now().isoformat()\n attributes = {'created': current_time, 'enabled': True, 'exp': None,\n 'nbf': None, 'recoveryLevel': 'Purgeable', 'updated': current_time}\n secret_body = {'attributes': attributes, 'contentType': None, 'kid':\n None, 'managed': None, 'tags': {'file-encoding': 'utf-8'}, 'value':\n secret_value}\n body = json.dumps(secret_body)\n print(body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "set_keyvault_secret", "role": "assistant" } ]
def x(access_token, vault_uri, secret_name): endpoint = ''.join([vault_uri, '/secrets/', secret_name, '?api-version=', '7.0']) return do_delete(endpoint, access_token)
delete_keyvault_secret
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, vault_uri, secret_name):\n endpoint = ''.join([vault_uri, '/secrets/', secret_name,\n '?api-version=', '7.0'])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_keyvault_secret", "role": "assistant" } ]
def x(subscription_id, resource_group, vmss_name, metric_name, operator, threshold, direction, change_count, time_grain='PT1M', time_window= 'PT5M', cool_down='PT1M'): metric_trigger = {'metricName': metric_name} metric_trigger['metricNamespace'] = '' metric_trigger['metricResourceUri'] = ('/subscriptions/' + subscription_id + '/resourceGroups/' + resource_group + '/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name) metric_trigger['timeGrain'] = time_grain metric_trigger['statistic'] = 'Average' metric_trigger['timeWindow'] = time_window metric_trigger['timeAggregation'] = 'Average' metric_trigger['operator'] = operator metric_trigger['threshold'] = threshold scale_action = {'direction': direction} scale_action['type'] = 'ChangeCount' scale_action['value'] = str(change_count) scale_action['cooldown'] = cool_down new_rule = {'metricTrigger': metric_trigger} new_rule['scaleAction'] = scale_action return new_rule
create_autoscale_rule
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(subscription_id, resource_group, vmss_name, metric_name, operator,\n threshold, direction, change_count, time_grain='PT1M', time_window=\n 'PT5M', cool_down='PT1M'):\n metric_trigger = {'metricName': metric_name}\n metric_trigger['metricNamespace'] = ''\n metric_trigger['metricResourceUri'] = ('/subscriptions/' +\n subscription_id + '/resourceGroups/' + resource_group +\n '/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name)\n metric_trigger['timeGrain'] = time_grain\n metric_trigger['statistic'] = 'Average'\n metric_trigger['timeWindow'] = time_window\n metric_trigger['timeAggregation'] = 'Average'\n metric_trigger['operator'] = operator\n metric_trigger['threshold'] = threshold\n scale_action = {'direction': direction}\n scale_action['type'] = 'ChangeCount'\n scale_action['value'] = str(change_count)\n scale_action['cooldown'] = cool_down\n new_rule = {'metricTrigger': metric_trigger}\n new_rule['scaleAction'] = scale_action\n return new_rule\n", "role": "user" }, { "content": "create_autoscale_rule", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, setting_name, vmss_name, location, minval, maxval, default, autoscale_rules, notify=None ): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/microsoft.insights/autoscaleSettings/', setting_name, '?api-version=', INSIGHTS_API]) autoscale_setting = {'location': location} profile = {'name': 'Profile1'} capacity = {'minimum': str(minval)} capacity['maximum'] = str(maxval) capacity['default'] = str(default) profile['capacity'] = capacity profile['rules'] = autoscale_rules profiles = [profile] properties = {'name': setting_name} properties['profiles'] = profiles properties['targetResourceUri'] = ('/subscriptions/' + subscription_id + '/resourceGroups/' + resource_group + '/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name) properties['enabled'] = True if notify is not None: notification = {'operation': 'Scale'} email = {'sendToSubscriptionAdministrato': False} email['sendToSubscriptionCoAdministrators'] = False email['customEmails'] = [notify] notification = {'email': email} properties['notifications'] = [notification] autoscale_setting['properties'] = properties body = json.dumps(autoscale_setting) return do_put(endpoint, body, access_token)
create_autoscale_setting
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, setting_name,\n vmss_name, location, minval, maxval, default, autoscale_rules, notify=None\n ):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/microsoft.insights/autoscaleSettings/', setting_name,\n '?api-version=', INSIGHTS_API])\n autoscale_setting = {'location': location}\n profile = {'name': 'Profile1'}\n capacity = {'minimum': str(minval)}\n capacity['maximum'] = str(maxval)\n capacity['default'] = str(default)\n profile['capacity'] = capacity\n profile['rules'] = autoscale_rules\n profiles = [profile]\n properties = {'name': setting_name}\n properties['profiles'] = profiles\n properties['targetResourceUri'] = ('/subscriptions/' + subscription_id +\n '/resourceGroups/' + resource_group +\n '/providers/Microsoft.Compute/virtualMachineScaleSets/' + vmss_name)\n properties['enabled'] = True\n if notify is not None:\n notification = {'operation': 'Scale'}\n email = {'sendToSubscriptionAdministrato': False}\n email['sendToSubscriptionCoAdministrators'] = False\n email['customEmails'] = [notify]\n notification = {'email': email}\n properties['notifications'] = [notification]\n autoscale_setting['properties'] = properties\n body = json.dumps(autoscale_setting)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_autoscale_setting", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/microsoft.insights/', '/autoscaleSettings?api-version=', INSIGHTS_API]) return do_get(endpoint, access_token)
list_autoscale_settings
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/microsoft.insights/',\n '/autoscaleSettings?api-version=', INSIGHTS_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_autoscale_settings", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/microsoft.insights/', '/components?api-version=', INSIGHTS_COMPONENTS_API]) return do_get(endpoint, access_token)
list_insights_components
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group,\n '/providers/microsoft.insights/', '/components?api-version=',\n INSIGHTS_COMPONENTS_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_insights_components", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, resource_provider, resource_type, resource_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/', resource_provider, '/', resource_type, '/', resource_name, '/providers/microsoft.insights', '/metricdefinitions?api-version=', INSIGHTS_METRICS_API]) return do_get(endpoint, access_token)
list_metric_defs_for_resource
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, resource_provider,\n resource_type, resource_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group, '/providers/',\n resource_provider, '/', resource_type, '/', resource_name,\n '/providers/microsoft.insights', '/metricdefinitions?api-version=',\n INSIGHTS_METRICS_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_metric_defs_for_resource", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, resource_provider, resource_type, resource_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', resource_group, '/providers/', resource_provider, '/', resource_type, '/', resource_name, '/providers/microsoft.insights', '/metrics?api-version=', INSIGHTS_PREVIEW_API]) return do_get(endpoint, access_token)
get_metrics_for_resource
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, resource_provider,\n resource_type, resource_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', resource_group, '/providers/',\n resource_provider, '/', resource_type, '/', resource_name,\n '/providers/microsoft.insights', '/metrics?api-version=',\n INSIGHTS_PREVIEW_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_metrics_for_resource", "role": "assistant" } ]
def x(access_token, subscription_id, start_timestamp): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/microsoft.insights/eventtypes/management/values?api-version=' , INSIGHTS_API, "&$filter=eventTimestamp ge '", start_timestamp, "'"]) return do_get(endpoint, access_token)
get_events_for_subscription
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, start_timestamp):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/microsoft.insights/eventtypes/management/values?api-version='\n , INSIGHTS_API, \"&$filter=eventTimestamp ge '\", start_timestamp, \"'\"])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_events_for_subscription", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--name', '-n', required=True, action='store', help='Name') arg_parser.add_argument('--rgname', '-g', required=True, action='store', help='Resource Group Name') arg_parser.add_argument('--location', '-l', required=True, action= 'store', help='Location, e.g. eastus') arg_parser.add_argument('--verbose', '-v', action='store_true', default =False, help='Print operational details') args = arg_parser.parse_args() name = args.name rgname = args.rgname location = args.location try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) hkn = Haikunator() nsg_name = name + 'nsg' print('Creating NSG: ' + nsg_name) rmreturn = azurerm.create_nsg(access_token, subscription_id, rgname, nsg_name, location) nsg_id = rmreturn.json()['id'] print('nsg_id = ' + nsg_id) nsg_rule = 'ssh' print('Creating NSG rule: ' + nsg_rule) rmreturn = azurerm.create_nsg_rule(access_token, subscription_id, rgname, nsg_name, nsg_rule, description='ssh rule', destination_range='22') print(rmreturn) print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators =(',', ': '))) vnetname = name + 'vnet' print('Creating VNet: ' + vnetname) rmreturn = azurerm.create_vnet(access_token, subscription_id, rgname, vnetname, location, nsg_id=nsg_id) print(rmreturn) subnet_id = rmreturn.json()['properties']['subnets'][0]['id'] print('subnet_id = ' + subnet_id) public_ip_name = name + 'ip' dns_label = name + 'ip' print('Creating public IP address: ' + public_ip_name) rmreturn = azurerm.create_public_ip(access_token, subscription_id, rgname, public_ip_name, dns_label, location) print(rmreturn) ip_id = rmreturn.json()['id'] print('ip_id = ' + ip_id) print('Waiting for IP provisioning..') waiting = True while waiting: ipa = azurerm.get_public_ip(access_token, subscription_id, rgname, public_ip_name) if ipa['properties']['provisioningState'] == 'Succeeded': waiting = False time.sleep(1) nic_name = name + 'nic' print('Creating NIC: ' + nic_name) rmreturn = azurerm.create_nic(access_token, subscription_id, rgname, nic_name, ip_id, subnet_id, location) nic_id = rmreturn.json()['id'] print('Waiting for NIC provisioning..') waiting = True while waiting: nic = azurerm.get_nic(access_token, subscription_id, rgname, nic_name) if nic['properties']['provisioningState'] == 'Succeeded': waiting = False time.sleep(1) vm_name = name vm_size = 'Standard_D1' publisher = 'CoreOS' offer = 'CoreOS' sku = 'Stable' version = 'latest' username = 'azure' password = hkn.haikunate(delimiter=',') print('password = ' + password) print('Creating VM: ' + vm_name) rmreturn = azurerm.create_vm(access_token, subscription_id, rgname, vm_name, vm_size, publisher, offer, sku, version, nic_id, location, username=username, password=password) print(rmreturn) print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators =(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--name', '-n', required=True, action='store',\n help='Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--location', '-l', required=True, action=\n 'store', help='Location, e.g. eastus')\n arg_parser.add_argument('--verbose', '-v', action='store_true', default\n =False, help='Print operational details')\n args = arg_parser.parse_args()\n name = args.name\n rgname = args.rgname\n location = args.location\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n hkn = Haikunator()\n nsg_name = name + 'nsg'\n print('Creating NSG: ' + nsg_name)\n rmreturn = azurerm.create_nsg(access_token, subscription_id, rgname,\n nsg_name, location)\n nsg_id = rmreturn.json()['id']\n print('nsg_id = ' + nsg_id)\n nsg_rule = 'ssh'\n print('Creating NSG rule: ' + nsg_rule)\n rmreturn = azurerm.create_nsg_rule(access_token, subscription_id,\n rgname, nsg_name, nsg_rule, description='ssh rule',\n destination_range='22')\n print(rmreturn)\n print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators\n =(',', ': ')))\n vnetname = name + 'vnet'\n print('Creating VNet: ' + vnetname)\n rmreturn = azurerm.create_vnet(access_token, subscription_id, rgname,\n vnetname, location, nsg_id=nsg_id)\n print(rmreturn)\n subnet_id = rmreturn.json()['properties']['subnets'][0]['id']\n print('subnet_id = ' + subnet_id)\n public_ip_name = name + 'ip'\n dns_label = name + 'ip'\n print('Creating public IP address: ' + public_ip_name)\n rmreturn = azurerm.create_public_ip(access_token, subscription_id,\n rgname, public_ip_name, dns_label, location)\n print(rmreturn)\n ip_id = rmreturn.json()['id']\n print('ip_id = ' + ip_id)\n print('Waiting for IP provisioning..')\n waiting = True\n while waiting:\n ipa = azurerm.get_public_ip(access_token, subscription_id, rgname,\n public_ip_name)\n if ipa['properties']['provisioningState'] == 'Succeeded':\n waiting = False\n time.sleep(1)\n nic_name = name + 'nic'\n print('Creating NIC: ' + nic_name)\n rmreturn = azurerm.create_nic(access_token, subscription_id, rgname,\n nic_name, ip_id, subnet_id, location)\n nic_id = rmreturn.json()['id']\n print('Waiting for NIC provisioning..')\n waiting = True\n while waiting:\n nic = azurerm.get_nic(access_token, subscription_id, rgname, nic_name)\n if nic['properties']['provisioningState'] == 'Succeeded':\n waiting = False\n time.sleep(1)\n vm_name = name\n vm_size = 'Standard_D1'\n publisher = 'CoreOS'\n offer = 'CoreOS'\n sku = 'Stable'\n version = 'latest'\n username = 'azure'\n password = hkn.haikunate(delimiter=',')\n print('password = ' + password)\n print('Creating VM: ' + vm_name)\n rmreturn = azurerm.create_vm(access_token, subscription_id, rgname,\n vm_name, vm_size, publisher, offer, sku, version, nic_id, location,\n username=username, password=password)\n print(rmreturn)\n print(json.dumps(rmreturn.json(), sort_keys=False, indent=2, separators\n =(',', ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) vmlist = azurerm.list_vms_sub(access_token, subscription_id) print(json.dumps(vmlist, sort_keys=False, indent=2, separators=(',', ': ')) ) """ for vm in vmlist['value']: count += 1 name = vm['name'] location = vm['location'] offer = vm['properties']['storageProfile']['imageReference']['offer'] sku = vm['properties']['storageProfile']['imageReference']['sku'] print(''.join([str(count), ': ', name, # ', RG: ', rgname, ', location: ', location, ', OS: ', offer, ' ', sku])) """
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n vmlist = azurerm.list_vms_sub(access_token, subscription_id)\n print(json.dumps(vmlist, sort_keys=False, indent=2, separators=(',', ': '))\n )\n \"\"\"\n for vm in vmlist['value']:\n count += 1\n name = vm['name']\n location = vm['location']\n offer = vm['properties']['storageProfile']['imageReference']['offer']\n sku = vm['properties']['storageProfile']['imageReference']['sku']\n print(''.join([str(count), ': ', name,\n # ', RG: ', rgname,\n ', location: ', location,\n ', OS: ', offer, ' ', sku]))\n \"\"\"\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, deployment_name, template, parameters): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.Resources/deployments/', deployment_name, '?api-version=', DEPLOYMENTS_API]) properties = {'template': template} properties['mode'] = 'Incremental' properties['parameters'] = parameters template_body = {'properties': properties} body = json.dumps(template_body) return do_put(endpoint, body, access_token)
deploy_template
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, deployment_name,\n template, parameters):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '?api-version=', DEPLOYMENTS_API])\n properties = {'template': template}\n properties['mode'] = 'Incremental'\n properties['parameters'] = parameters\n template_body = {'properties': properties}\n body = json.dumps(template_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "deploy_template", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, deployment_name, template_uri, parameters): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.Resources/deployments/', deployment_name, '?api-version=', DEPLOYMENTS_API]) properties = {'templateLink': {'uri': template_uri}} properties['mode'] = 'Incremental' properties['parameters'] = parameters template_body = {'properties': properties} body = json.dumps(template_body) return do_put(endpoint, body, access_token)
deploy_template_uri
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, deployment_name,\n template_uri, parameters):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '?api-version=', DEPLOYMENTS_API])\n properties = {'templateLink': {'uri': template_uri}}\n properties['mode'] = 'Incremental'\n properties['parameters'] = parameters\n template_body = {'properties': properties}\n body = json.dumps(template_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "deploy_template_uri", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, deployment_name, template_uri, parameters_uri): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.Resources/deployments/', deployment_name, '?api-version=', DEPLOYMENTS_API]) properties = {'templateLink': {'uri': template_uri}} properties['mode'] = 'Incremental' properties['parametersLink'] = {'uri': parameters_uri} template_body = {'properties': properties} body = json.dumps(template_body) return do_put(endpoint, body, access_token)
deploy_template_uri_param_uri
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, deployment_name,\n template_uri, parameters_uri):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.Resources/deployments/', deployment_name,\n '?api-version=', DEPLOYMENTS_API])\n properties = {'templateLink': {'uri': template_uri}}\n properties['mode'] = 'Incremental'\n properties['parametersLink'] = {'uri': parameters_uri}\n template_body = {'properties': properties}\n body = json.dumps(template_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "deploy_template_uri_param_uri", "role": "assistant" } ]
def x(subscription, rgname, vmssvm_model, diskname, lun): disk_id = ('/subscriptions/' + subscription + '/resourceGroups/' + rgname + '/providers/Microsoft.Compute/disks/' + diskname) disk_model = {'lun': lun, 'createOption': 'Attach', 'caching': 'None', 'managedDisk': {'storageAccountType': 'Standard_LRS', 'id': disk_id}} vmssvm_model['properties']['storageProfile']['dataDisks'].append(disk_model ) return vmssvm_model
attach_model
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(subscription, rgname, vmssvm_model, diskname, lun):\n disk_id = ('/subscriptions/' + subscription + '/resourceGroups/' +\n rgname + '/providers/Microsoft.Compute/disks/' + diskname)\n disk_model = {'lun': lun, 'createOption': 'Attach', 'caching': 'None',\n 'managedDisk': {'storageAccountType': 'Standard_LRS', 'id': disk_id}}\n vmssvm_model['properties']['storageProfile']['dataDisks'].append(disk_model\n )\n return vmssvm_model\n", "role": "user" }, { "content": "attach_model", "role": "assistant" } ]
def x(vmssvm_model, lun): data_disks = vmssvm_model['properties']['storageProfile']['dataDisks'] data_disks[:] = [disk for disk in data_disks if disk.get('lun') != lun] vmssvm_model['properties']['storageProfile']['dataDisks'] = data_disks return vmssvm_model
detach_model
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(vmssvm_model, lun):\n data_disks = vmssvm_model['properties']['storageProfile']['dataDisks']\n data_disks[:] = [disk for disk in data_disks if disk.get('lun') != lun]\n vmssvm_model['properties']['storageProfile']['dataDisks'] = data_disks\n return vmssvm_model\n", "role": "user" }, { "content": "detach_model", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--vmssname', '-n', required=True, action= 'store', help='Scale set name') arg_parser.add_argument('--rgname', '-g', required=True, action='store', help='Resource Group Name') arg_parser.add_argument('--operation', '-o', required=True, action= 'store', help='Operation (attach/detach)') arg_parser.add_argument('--vmid', '-i', required=True, action='store', help='VM id') arg_parser.add_argument('--lun', '-l', required=True, action='store', help='lun id') arg_parser.add_argument('--diskname', '-d', required=False, action= 'store', help='Optional password') args = arg_parser.parse_args() vmssname = args.vmssname rgname = args.rgname operation = args.operation vmid = args.vmid lun = int(args.lun) diskname = args.diskname if operation != 'attach' and operation != 'detach': sys.exit('--operation must be attach or detach') if diskname is None and operation == 'attach': sys.exit('--diskname is required for attach operation.') subscription_id = azurerm.get_subscription_from_cli() access_token = azurerm.get_access_token_from_cli() vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id, rgname, vmssname, vmid) if operation == 'attach': new_model = attach_model(subscription_id, rgname, vmssvm_model, diskname, lun) elif operation == 'detach': new_model = detach_model(vmssvm_model, lun) rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname, vmssname, vmid, new_model) if rmreturn.status_code != 201: sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' + rmreturn.text) print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='Scale set name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--operation', '-o', required=True, action=\n 'store', help='Operation (attach/detach)')\n arg_parser.add_argument('--vmid', '-i', required=True, action='store',\n help='VM id')\n arg_parser.add_argument('--lun', '-l', required=True, action='store',\n help='lun id')\n arg_parser.add_argument('--diskname', '-d', required=False, action=\n 'store', help='Optional password')\n args = arg_parser.parse_args()\n vmssname = args.vmssname\n rgname = args.rgname\n operation = args.operation\n vmid = args.vmid\n lun = int(args.lun)\n diskname = args.diskname\n if operation != 'attach' and operation != 'detach':\n sys.exit('--operation must be attach or detach')\n if diskname is None and operation == 'attach':\n sys.exit('--diskname is required for attach operation.')\n subscription_id = azurerm.get_subscription_from_cli()\n access_token = azurerm.get_access_token_from_cli()\n vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id,\n rgname, vmssname, vmid)\n if operation == 'attach':\n new_model = attach_model(subscription_id, rgname, vmssvm_model,\n diskname, lun)\n elif operation == 'detach':\n new_model = detach_model(vmssvm_model, lun)\n rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname,\n vmssname, vmid, new_model)\n if rmreturn.status_code != 201:\n sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' +\n rmreturn.text)\n print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',',\n ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(tenant_id, application_id, application_secret): context = adal.AuthenticationContext(get_auth_endpoint() + tenant_id, api_version=None) token_response = context.acquire_token_with_client_credentials( get_resource_endpoint(), application_id, application_secret) return token_response.get('accessToken')
get_access_token
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(tenant_id, application_id, application_secret):\n context = adal.AuthenticationContext(get_auth_endpoint() + tenant_id,\n api_version=None)\n token_response = context.acquire_token_with_client_credentials(\n get_resource_endpoint(), application_id, application_secret)\n return token_response.get('accessToken')\n", "role": "user" }, { "content": "get_access_token", "role": "assistant" } ]
def x(): if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ: endpoint = os.environ['MSI_ENDPOINT'] headers = {'Metadata': 'true'} body = {'resource': 'https://management.azure.com/'} ret = requests.post(endpoint, headers=headers, data=body) return ret.json()['access_token'] else: home = os.path.expanduser('~') sub_username = '' azure_profile_path = (home + os.sep + '.azure' + os.sep + 'azureProfile.json') if os.path.isfile(azure_profile_path) is False: print('Error from get_access_token_from_cli(): Cannot find ' + azure_profile_path) return None with codecs.open(azure_profile_path, 'r', 'utf-8-sig' ) as azure_profile_fd: subs = json.load(azure_profile_fd) for sub in subs['subscriptions']: if sub['isDefault'] == True: sub_username = sub['user']['name'] if sub_username == '': print( 'Error from get_access_token_from_cli(): Default subscription not found in ' + azure_profile_path) return None access_keys_path = (home + os.sep + '.azure' + os.sep + 'accessTokens.json') if os.path.isfile(access_keys_path) is False: print('Error from get_access_token_from_cli(): Cannot find ' + access_keys_path) return None with open(access_keys_path, 'r') as access_keys_fd: keys = json.load(access_keys_fd) for key in keys: if key['userId'] == sub_username: if 'accessToken' not in keys[0]: print( 'Error from get_access_token_from_cli(): accessToken not found in ' + access_keys_path) return None if 'tokenType' not in keys[0]: print( 'Error from get_access_token_from_cli(): tokenType not found in ' + access_keys_path) return None if 'expiresOn' not in keys[0]: print( 'Error from get_access_token_from_cli(): expiresOn not found in ' + access_keys_path) return None expiry_date_str = key['expiresOn'] if 'T' in expiry_date_str: exp_date = dt.strptime(key['expiresOn'], '%Y-%m-%dT%H:%M:%S.%fZ') else: exp_date = dt.strptime(key['expiresOn'], '%Y-%m-%d %H:%M:%S.%f') if exp_date < dt.now(): continue else: return key['accessToken'] print( "Error from get_access_token_from_cli(): token expired. Run 'az login'" ) return None
get_access_token_from_cli
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n endpoint = os.environ['MSI_ENDPOINT']\n headers = {'Metadata': 'true'}\n body = {'resource': 'https://management.azure.com/'}\n ret = requests.post(endpoint, headers=headers, data=body)\n return ret.json()['access_token']\n else:\n home = os.path.expanduser('~')\n sub_username = ''\n azure_profile_path = (home + os.sep + '.azure' + os.sep +\n 'azureProfile.json')\n if os.path.isfile(azure_profile_path) is False:\n print('Error from get_access_token_from_cli(): Cannot find ' +\n azure_profile_path)\n return None\n with codecs.open(azure_profile_path, 'r', 'utf-8-sig'\n ) as azure_profile_fd:\n subs = json.load(azure_profile_fd)\n for sub in subs['subscriptions']:\n if sub['isDefault'] == True:\n sub_username = sub['user']['name']\n if sub_username == '':\n print(\n 'Error from get_access_token_from_cli(): Default subscription not found in '\n + azure_profile_path)\n return None\n access_keys_path = (home + os.sep + '.azure' + os.sep +\n 'accessTokens.json')\n if os.path.isfile(access_keys_path) is False:\n print('Error from get_access_token_from_cli(): Cannot find ' +\n access_keys_path)\n return None\n with open(access_keys_path, 'r') as access_keys_fd:\n keys = json.load(access_keys_fd)\n for key in keys:\n if key['userId'] == sub_username:\n if 'accessToken' not in keys[0]:\n print(\n 'Error from get_access_token_from_cli(): accessToken not found in '\n + access_keys_path)\n return None\n if 'tokenType' not in keys[0]:\n print(\n 'Error from get_access_token_from_cli(): tokenType not found in '\n + access_keys_path)\n return None\n if 'expiresOn' not in keys[0]:\n print(\n 'Error from get_access_token_from_cli(): expiresOn not found in '\n + access_keys_path)\n return None\n expiry_date_str = key['expiresOn']\n if 'T' in expiry_date_str:\n exp_date = dt.strptime(key['expiresOn'],\n '%Y-%m-%dT%H:%M:%S.%fZ')\n else:\n exp_date = dt.strptime(key['expiresOn'],\n '%Y-%m-%d %H:%M:%S.%f')\n if exp_date < dt.now():\n continue\n else:\n return key['accessToken']\n print(\n \"Error from get_access_token_from_cli(): token expired. Run 'az login'\"\n )\n return None\n", "role": "user" }, { "content": "get_access_token_from_cli", "role": "assistant" } ]
def x(): try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) count = 0 vmimglist = azurerm.list_vm_images_sub(access_token, subscription_id) print(json.dumps(vmimglist, sort_keys=False, indent=2, separators=(',', ': '))) for vm_image in vmimglist['value']: count += 1 name = vm_image['name'] location = vm_image['location'] offer = vm_image['properties']['storageProfile']['imageReference'][ 'offer'] sku = vm_image['properties']['storageProfile']['imageReference']['sku'] print(''.join([str(count), ': ', name, ', location: ', location, ', OS: ', offer, ' ', sku]))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n count = 0\n vmimglist = azurerm.list_vm_images_sub(access_token, subscription_id)\n print(json.dumps(vmimglist, sort_keys=False, indent=2, separators=(',',\n ': ')))\n for vm_image in vmimglist['value']:\n count += 1\n name = vm_image['name']\n location = vm_image['location']\n offer = vm_image['properties']['storageProfile']['imageReference'][\n 'offer']\n sku = vm_image['properties']['storageProfile']['imageReference']['sku']\n print(''.join([str(count), ': ', name, ', location: ', location,\n ', OS: ', offer, ' ', sku]))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(access_token, subscription_id, location, publisher): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Compute/', 'locations/', location, '/publishers/', publisher, '/artifacttypes/vmimage/offers?api-version=', COMP_API]) return do_get(endpoint, access_token)
list_offers
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, location, publisher):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/', 'locations/',\n location, '/publishers/', publisher,\n '/artifacttypes/vmimage/offers?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_offers", "role": "assistant" } ]
def x(access_token, subscription_id, location, publisher, offer): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Compute/', 'locations/', location, '/publishers/', publisher, '/artifacttypes/vmimage/offers/', offer, '/skus?api-version=', COMP_API]) return do_get(endpoint, access_token)
list_skus
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, location, publisher, offer):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/', 'locations/',\n location, '/publishers/', publisher,\n '/artifacttypes/vmimage/offers/', offer, '/skus?api-version=',\n COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_skus", "role": "assistant" } ]
def x(access_token, subscription_id, location, publisher, offer, sku): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.Compute/', 'locations/', location, '/publishers/', publisher, '/artifacttypes/vmimage/offers/', offer, '/skus/', sku, '/versions?api-version=', COMP_API]) return do_get(endpoint, access_token)
list_sku_versions
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, location, publisher, offer, sku):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/providers/Microsoft.Compute/', 'locations/',\n location, '/publishers/', publisher,\n '/artifacttypes/vmimage/offers/', offer, '/skus/', sku,\n '/versions?api-version=', COMP_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_sku_versions", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--vmssname', '-n', required=True, action= 'store', help='Scale set name') arg_parser.add_argument('--rgname', '-g', required=True, action='store', help='Resource Group Name') arg_parser.add_argument('--operation', '-o', required=True, action= 'store', help='Operation (attach/detach)') arg_parser.add_argument('--vmid', '-i', required=True, action='store', help='VM id') arg_parser.add_argument('--lun', '-l', required=True, action='store', help='lun id') arg_parser.add_argument('--diskname', '-d', required=False, action= 'store', help='Optional password') args = arg_parser.parse_args() vmssname = args.vmssname rgname = args.rgname operation = args.operation vmid = args.vmid lun = int(args.lun) diskname = args.diskname if operation != 'attach' and operation != 'detach': sys.exit('--operation must be attach or detach') if diskname is None and operation == 'attach': sys.exit('--diskname is required for attach operation.') try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id, rgname, vmssname, vmid) if operation == 'attach': new_model = attach_model(subscription_id, rgname, vmssvm_model, diskname, lun) elif operation == 'detach': new_model = detach_model(vmssvm_model, lun) rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname, vmssname, vmid, new_model) if rmreturn.status_code != 201 and rmreturn.status_code != 202: sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' + rmreturn.text) print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='Scale set name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--operation', '-o', required=True, action=\n 'store', help='Operation (attach/detach)')\n arg_parser.add_argument('--vmid', '-i', required=True, action='store',\n help='VM id')\n arg_parser.add_argument('--lun', '-l', required=True, action='store',\n help='lun id')\n arg_parser.add_argument('--diskname', '-d', required=False, action=\n 'store', help='Optional password')\n args = arg_parser.parse_args()\n vmssname = args.vmssname\n rgname = args.rgname\n operation = args.operation\n vmid = args.vmid\n lun = int(args.lun)\n diskname = args.diskname\n if operation != 'attach' and operation != 'detach':\n sys.exit('--operation must be attach or detach')\n if diskname is None and operation == 'attach':\n sys.exit('--diskname is required for attach operation.')\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n vmssvm_model = azurerm.get_vmss_vm(access_token, subscription_id,\n rgname, vmssname, vmid)\n if operation == 'attach':\n new_model = attach_model(subscription_id, rgname, vmssvm_model,\n diskname, lun)\n elif operation == 'detach':\n new_model = detach_model(vmssvm_model, lun)\n rmreturn = azurerm.put_vmss_vm(access_token, subscription_id, rgname,\n vmssname, vmid, new_model)\n if rmreturn.status_code != 201 and rmreturn.status_code != 202:\n sys.exit('Error ' + str(rmreturn.status_code) + ' creating VM. ' +\n rmreturn.text)\n print(json.dumps(rmreturn, sort_keys=False, indent=2, separators=(',',\n ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): if len(sys.argv) < 3: usage() rgname = sys.argv[1] vmss = sys.argv[2] try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] sub_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) provider = 'Microsoft.Compute' resource_type = 'virtualMachineScaleSets' metric_definitions = azurerm.list_metric_defs_for_resource(access_token, sub_id, rgname, provider, resource_type, vmss) print(json.dumps(metric_definitions, sort_keys=False, indent=2, separators=(',', ': '))) metrics = azurerm.get_metrics_for_resource(access_token, sub_id, rgname, provider, resource_type, vmss) print(json.dumps(metrics, sort_keys=False, indent=2, separators=(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if len(sys.argv) < 3:\n usage()\n rgname = sys.argv[1]\n vmss = sys.argv[2]\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n sub_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n provider = 'Microsoft.Compute'\n resource_type = 'virtualMachineScaleSets'\n metric_definitions = azurerm.list_metric_defs_for_resource(access_token,\n sub_id, rgname, provider, resource_type, vmss)\n print(json.dumps(metric_definitions, sort_keys=False, indent=2,\n separators=(',', ': ')))\n metrics = azurerm.get_metrics_for_resource(access_token, sub_id, rgname,\n provider, resource_type, vmss)\n print(json.dumps(metrics, sort_keys=False, indent=2, separators=(',',\n ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--vmssname', '-n', required=True, action= 'store', help='VMSS Name') arg_parser.add_argument('--rgname', '-g', required=True, action='store', help='Resource Group Name') arg_parser.add_argument('--details', '-a', required=False, action= 'store', help='Print all details') args = arg_parser.parse_args() name = args.vmssname rgname = args.rgname details = args.details try: with open('azurermconfig.json') as config_file: config_data = json.load(config_file) except FileNotFoundError: print('Error: Expecting azurermconfig.json in current folder') sys.exit() tenant_id = config_data['tenantId'] app_id = config_data['appId'] app_secret = config_data['appSecret'] subscription_id = config_data['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) public_ips = azurerm.get_vmss_public_ips(access_token, subscription_id, rgname, name) if details is True: print(json.dumps(public_ips, sort_keys=False, indent=2, separators= (',', ': '))) else: for pip in public_ips['value']: vm_id = re.search('Machines/(.*)/networkInt', pip['id']).group(1) ipaddr = pip['properties']['ipAddress'] print('VM id: ' + vm_id + ', IP: ' + ipaddr)
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='VMSS Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--details', '-a', required=False, action=\n 'store', help='Print all details')\n args = arg_parser.parse_args()\n name = args.vmssname\n rgname = args.rgname\n details = args.details\n try:\n with open('azurermconfig.json') as config_file:\n config_data = json.load(config_file)\n except FileNotFoundError:\n print('Error: Expecting azurermconfig.json in current folder')\n sys.exit()\n tenant_id = config_data['tenantId']\n app_id = config_data['appId']\n app_secret = config_data['appSecret']\n subscription_id = config_data['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n public_ips = azurerm.get_vmss_public_ips(access_token, subscription_id,\n rgname, name)\n if details is True:\n print(json.dumps(public_ips, sort_keys=False, indent=2, separators=\n (',', ': ')))\n else:\n for pip in public_ips['value']:\n vm_id = re.search('Machines/(.*)/networkInt', pip['id']).group(1)\n ipaddr = pip['properties']['ipAddress']\n print('VM id: ' + vm_id + ', IP: ' + ipaddr)\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(): if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ: access_token = azurerm.get_access_token_from_cli() subscription_id = azurerm.get_subscription_from_cli() else: try: with open('azurermconfig.json') as configfile: configdata = json.load(configfile) except FileNotFoundError: sys.exit('Error: Expecting azurermconfig.json in current folder') tenant_id = configdata['tenantId'] app_id = configdata['appId'] app_secret = configdata['appSecret'] subscription_id = configdata['subscriptionId'] access_token = azurerm.get_access_token(tenant_id, app_id, app_secret) resource_groups = azurerm.list_resource_groups(access_token, subscription_id) for rgname in resource_groups['value']: print(rgname['name'] + ', ' + rgname['location']) """ rg_details = azurerm.get_resource_group(access_token, subscription_id, rgname['name']) print(json.dumps(rg_details, sort_keys=False, indent=2, separators=(',', ': '))) """
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if 'ACC_CLOUD' in os.environ and 'MSI_ENDPOINT' in os.environ:\n access_token = azurerm.get_access_token_from_cli()\n subscription_id = azurerm.get_subscription_from_cli()\n else:\n try:\n with open('azurermconfig.json') as configfile:\n configdata = json.load(configfile)\n except FileNotFoundError:\n sys.exit('Error: Expecting azurermconfig.json in current folder')\n tenant_id = configdata['tenantId']\n app_id = configdata['appId']\n app_secret = configdata['appSecret']\n subscription_id = configdata['subscriptionId']\n access_token = azurerm.get_access_token(tenant_id, app_id, app_secret)\n resource_groups = azurerm.list_resource_groups(access_token,\n subscription_id)\n for rgname in resource_groups['value']:\n print(rgname['name'] + ', ' + rgname['location'])\n \"\"\"\n rg_details = azurerm.get_resource_group(access_token, subscription_id, rgname['name'])\n print(json.dumps(rg_details, sort_keys=False, indent=2, separators=(',', ': ')))\n \"\"\"\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(container_name, image, port=80, cpu=1.0, memgb=1.5, environment=None): container = {'name': container_name} container_properties = {'image': image} container_properties['ports'] = [{'port': port}] container_properties['resources'] = {'requests': {'cpu': cpu, 'memoryInGB': memgb}} container['properties'] = container_properties if environment is not None: container_properties['environmentVariables'] = environment return container
create_container_definition
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(container_name, image, port=80, cpu=1.0, memgb=1.5, environment=None):\n container = {'name': container_name}\n container_properties = {'image': image}\n container_properties['ports'] = [{'port': port}]\n container_properties['resources'] = {'requests': {'cpu': cpu,\n 'memoryInGB': memgb}}\n container['properties'] = container_properties\n if environment is not None:\n container_properties['environmentVariables'] = environment\n return container\n", "role": "user" }, { "content": "create_container_definition", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, container_group_name, container_list, location, ostype='Linux', port=80, iptype='public'): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerInstance/ContainerGroups/', container_group_name, '?api-version=', CONTAINER_API]) container_group_body = {'location': location} properties = {'osType': ostype} properties['containers'] = container_list ipport = {'protocol': 'TCP'} ipport['port'] = port ipaddress = {'ports': [ipport]} ipaddress['type'] = iptype properties['ipAddress'] = ipaddress container_group_body['properties'] = properties body = json.dumps(container_group_body) return do_put(endpoint, body, access_token)
create_container_instance_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, container_group_name,\n container_list, location, ostype='Linux', port=80, iptype='public'):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '?api-version=', CONTAINER_API])\n container_group_body = {'location': location}\n properties = {'osType': ostype}\n properties['containers'] = container_list\n ipport = {'protocol': 'TCP'}\n ipport['port'] = port\n ipaddress = {'ports': [ipport]}\n ipaddress['type'] = iptype\n properties['ipAddress'] = ipaddress\n container_group_body['properties'] = properties\n body = json.dumps(container_group_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_container_instance_group", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, container_group_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerInstance/ContainerGroups/', container_group_name, '?api-version=', CONTAINER_API]) return do_delete(endpoint, access_token)
delete_container_instance_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, container_group_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '?api-version=', CONTAINER_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_container_instance_group", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, container_group_name): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerInstance/ContainerGroups/', container_group_name, '?api-version=', CONTAINER_API]) return do_get(endpoint, access_token)
get_container_instance_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, container_group_name):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_container_instance_group", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group, container_group_name, container_name=None): if container_name is None: container_name = container_group_name endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerInstance/ContainerGroups/', container_group_name, '/containers/', container_name, '/logs?api-version=', CONTAINER_API]) return do_get(endpoint, access_token)
get_container_instance_logs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group, container_group_name,\n container_name=None):\n if container_name is None:\n container_name = container_group_name\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups/',\n container_group_name, '/containers/', container_name,\n '/logs?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_container_instance_logs", "role": "assistant" } ]
def x(access_token, subscription_id, resource_group): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', resource_group, '/providers/Microsoft.ContainerInstance/ContainerGroups', '?api-version=', CONTAINER_API]) return do_get(endpoint, access_token)
list_container_instance_groups
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, resource_group):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', resource_group,\n '/providers/Microsoft.ContainerInstance/ContainerGroups',\n '?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_container_instance_groups", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/providers/Microsoft.ContainerInstance/ContainerGroups', '?api-version=', CONTAINER_API]) return do_get(endpoint, access_token)
list_container_instance_groups_sub
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id,\n '/providers/Microsoft.ContainerInstance/ContainerGroups',\n '?api-version=', CONTAINER_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_container_instance_groups_sub", "role": "assistant" } ]
def x(access_token, subscription_id, rgname, location): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '?api-version=', RESOURCE_API]) rg_body = {'location': location} body = json.dumps(rg_body) return do_put(endpoint, body, access_token)
create_resource_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname, location):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname, '?api-version=',\n RESOURCE_API])\n rg_body = {'location': location}\n body = json.dumps(rg_body)\n return do_put(endpoint, body, access_token)\n", "role": "user" }, { "content": "create_resource_group", "role": "assistant" } ]
def x(access_token, subscription_id, rgname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '?api-version=', RESOURCE_API]) return do_delete(endpoint, access_token)
delete_resource_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname, '?api-version=',\n RESOURCE_API])\n return do_delete(endpoint, access_token)\n", "role": "user" }, { "content": "delete_resource_group", "role": "assistant" } ]
def x(access_token, subscription_id, rgname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourcegroups/', rgname, '/exportTemplate', '?api-version=', RESOURCE_API]) rg_body = {'options': 'IncludeParameterDefaultValue', 'resources': ['*']} body = json.dumps(rg_body) return do_post(endpoint, body, access_token)
export_template
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourcegroups/', rgname, '/exportTemplate',\n '?api-version=', RESOURCE_API])\n rg_body = {'options': 'IncludeParameterDefaultValue', 'resources': ['*']}\n body = json.dumps(rg_body)\n return do_post(endpoint, body, access_token)\n", "role": "user" }, { "content": "export_template", "role": "assistant" } ]
def x(access_token, subscription_id, rgname): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', rgname, '?api-version=', RESOURCE_API]) return do_get(endpoint, access_token)
get_resource_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id, rgname):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', rgname, '?api-version=',\n RESOURCE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "get_resource_group", "role": "assistant" } ]
def x(access_token, subscription_id): endpoint = ''.join([get_rm_endpoint(), '/subscriptions/', subscription_id, '/resourceGroups/', '?api-version=', RESOURCE_API]) return do_get(endpoint, access_token)
list_resource_groups
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(access_token, subscription_id):\n endpoint = ''.join([get_rm_endpoint(), '/subscriptions/',\n subscription_id, '/resourceGroups/', '?api-version=', RESOURCE_API])\n return do_get(endpoint, access_token)\n", "role": "user" }, { "content": "list_resource_groups", "role": "assistant" } ]
def x(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('--vmssname', '-n', required=True, action= 'store', help='VMSS Name') arg_parser.add_argument('--rgname', '-g', required=True, action='store', help='Resource Group Name') arg_parser.add_argument('--details', '-a', required=False, action= 'store_true', default=False, help='Print all details') args = arg_parser.parse_args() name = args.vmssname rgname = args.rgname details = args.details access_token = azurerm.get_access_token_from_cli() subscription_id = azurerm.get_subscription_from_cli() upgrade_status = azurerm.get_vmss_rolling_upgrades(access_token, subscription_id, rgname, name) if details is True: print(json.dumps(upgrade_status, sort_keys=False, indent=2, separators=(',', ': '))) else: print(json.dumps(upgrade_status, sort_keys=False, indent=2, separators=(',', ': ')))
main
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n arg_parser = argparse.ArgumentParser()\n arg_parser.add_argument('--vmssname', '-n', required=True, action=\n 'store', help='VMSS Name')\n arg_parser.add_argument('--rgname', '-g', required=True, action='store',\n help='Resource Group Name')\n arg_parser.add_argument('--details', '-a', required=False, action=\n 'store_true', default=False, help='Print all details')\n args = arg_parser.parse_args()\n name = args.vmssname\n rgname = args.rgname\n details = args.details\n access_token = azurerm.get_access_token_from_cli()\n subscription_id = azurerm.get_subscription_from_cli()\n upgrade_status = azurerm.get_vmss_rolling_upgrades(access_token,\n subscription_id, rgname, name)\n if details is True:\n print(json.dumps(upgrade_status, sort_keys=False, indent=2,\n separators=(',', ': ')))\n else:\n print(json.dumps(upgrade_status, sort_keys=False, indent=2,\n separators=(',', ': ')))\n", "role": "user" }, { "content": "main", "role": "assistant" } ]
def x(self, orm): for coupon in orm['coupons.Coupon'].objects.all(): if coupon.user is not None or coupon.redeemed_at is not None: orm['coupons.CouponUser'].objects.create(coupon=coupon, user= coupon.user, redeemed_at=coupon.redeemed_at)
forwards
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, orm):\n for coupon in orm['coupons.Coupon'].objects.all():\n if coupon.user is not None or coupon.redeemed_at is not None:\n orm['coupons.CouponUser'].objects.create(coupon=coupon, user=\n coupon.user, redeemed_at=coupon.redeemed_at)\n", "role": "user" }, { "content": "forwards", "role": "assistant" } ]
def x(self, requirement): filename = self.generate_filename(requirement) for backend in list(self.backends): try: pathname = backend.get(filename) if pathname is not None: return pathname except CacheBackendDisabledError as e: logger.debug('Disabling %s because it requires configuration: %s', backend, e) self.backends.remove(backend) except Exception as e: logger.exception('Disabling %s because it failed: %s', backend, e) self.backends.remove(backend)
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement):\n filename = self.generate_filename(requirement)\n for backend in list(self.backends):\n try:\n pathname = backend.get(filename)\n if pathname is not None:\n return pathname\n except CacheBackendDisabledError as e:\n logger.debug('Disabling %s because it requires configuration: %s',\n backend, e)\n self.backends.remove(backend)\n except Exception as e:\n logger.exception('Disabling %s because it failed: %s', backend, e)\n self.backends.remove(backend)\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, requirement, handle): filename = self.generate_filename(requirement) for backend in list(self.backends): handle.seek(0) try: backend.put(filename, handle) except CacheBackendDisabledError as e: logger.debug('Disabling %s because it requires configuration: %s', backend, e) self.backends.remove(backend) except Exception as e: logger.exception('Disabling %s because it failed: %s', backend, e) self.backends.remove(backend)
put
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement, handle):\n filename = self.generate_filename(requirement)\n for backend in list(self.backends):\n handle.seek(0)\n try:\n backend.put(filename, handle)\n except CacheBackendDisabledError as e:\n logger.debug('Disabling %s because it requires configuration: %s',\n backend, e)\n self.backends.remove(backend)\n except Exception as e:\n logger.exception('Disabling %s because it failed: %s', backend, e)\n self.backends.remove(backend)\n", "role": "user" }, { "content": "put", "role": "assistant" } ]
def x(self, requirement): return FILENAME_PATTERN % (self.config.cache_format_revision, requirement.name, requirement.version, get_python_version())
generate_filename
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement):\n return FILENAME_PATTERN % (self.config.cache_format_revision,\n requirement.name, requirement.version, get_python_version())\n", "role": "user" }, { "content": "generate_filename", "role": "assistant" } ]
def x(self, requirement): install_timer = Timer() missing_dependencies = self.find_missing_dependencies(requirement) if missing_dependencies: install_command = shlex.split(self.install_command ) + missing_dependencies if not WINDOWS and not is_root(): install_command.insert(0, 'sudo') logger.info('You seem to be missing %s: %s', pluralize(len( missing_dependencies), 'dependency', 'dependencies'), concatenate(missing_dependencies)) logger.info('You can install %s with this command: %s', 'it' if len (missing_dependencies) == 1 else 'them', ' '.join(install_command)) if self.config.auto_install is False: self.installation_refused(requirement, missing_dependencies, 'automatic installation is disabled') if self.config.auto_install: logger.info( 'Got permission to install %s (via auto_install option).', pluralize(len(missing_dependencies), 'dependency', 'dependencies')) elif self.confirm_installation(requirement, missing_dependencies, install_command): logger.info( 'Got permission to install %s (via interactive prompt).', pluralize(len(missing_dependencies), 'dependency', 'dependencies')) else: logger.error('Refused installation of missing %s!', 'dependency' if len(missing_dependencies) == 1 else 'dependencies') self.installation_refused(requirement, missing_dependencies, 'manual installation was refused') if subprocess.call(install_command) == 0: logger.info('Successfully installed %s in %s.', pluralize(len( missing_dependencies), 'dependency', 'dependencies'), install_timer) return True else: logger.error('Failed to install %s.', pluralize(len( missing_dependencies), 'dependency', 'dependencies')) msg = 'Failed to install %s required by Python package %s! (%s)' raise DependencyInstallationFailed(msg % (pluralize(len( missing_dependencies), 'system package', 'system packages'), requirement.name, concatenate(missing_dependencies))) return False
install_dependencies
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement):\n install_timer = Timer()\n missing_dependencies = self.find_missing_dependencies(requirement)\n if missing_dependencies:\n install_command = shlex.split(self.install_command\n ) + missing_dependencies\n if not WINDOWS and not is_root():\n install_command.insert(0, 'sudo')\n logger.info('You seem to be missing %s: %s', pluralize(len(\n missing_dependencies), 'dependency', 'dependencies'),\n concatenate(missing_dependencies))\n logger.info('You can install %s with this command: %s', 'it' if len\n (missing_dependencies) == 1 else 'them', ' '.join(install_command))\n if self.config.auto_install is False:\n self.installation_refused(requirement, missing_dependencies,\n 'automatic installation is disabled')\n if self.config.auto_install:\n logger.info(\n 'Got permission to install %s (via auto_install option).',\n pluralize(len(missing_dependencies), 'dependency',\n 'dependencies'))\n elif self.confirm_installation(requirement, missing_dependencies,\n install_command):\n logger.info(\n 'Got permission to install %s (via interactive prompt).',\n pluralize(len(missing_dependencies), 'dependency',\n 'dependencies'))\n else:\n logger.error('Refused installation of missing %s!', \n 'dependency' if len(missing_dependencies) == 1 else\n 'dependencies')\n self.installation_refused(requirement, missing_dependencies,\n 'manual installation was refused')\n if subprocess.call(install_command) == 0:\n logger.info('Successfully installed %s in %s.', pluralize(len(\n missing_dependencies), 'dependency', 'dependencies'),\n install_timer)\n return True\n else:\n logger.error('Failed to install %s.', pluralize(len(\n missing_dependencies), 'dependency', 'dependencies'))\n msg = 'Failed to install %s required by Python package %s! (%s)'\n raise DependencyInstallationFailed(msg % (pluralize(len(\n missing_dependencies), 'system package', 'system packages'),\n requirement.name, concatenate(missing_dependencies)))\n return False\n", "role": "user" }, { "content": "install_dependencies", "role": "assistant" } ]
def x(self, requirement): known_dependencies = self.find_known_dependencies(requirement) if known_dependencies: installed_packages = self.find_installed_packages() logger.debug('Checking for missing dependencies of %s ..', requirement.name) missing_dependencies = sorted(set(known_dependencies).difference( installed_packages)) if missing_dependencies: logger.debug('Found %s: %s', pluralize(len(missing_dependencies ), 'missing dependency', 'missing dependencies'), concatenate(missing_dependencies)) else: logger.info('All known dependencies are already installed.') return missing_dependencies
find_missing_dependencies
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement):\n known_dependencies = self.find_known_dependencies(requirement)\n if known_dependencies:\n installed_packages = self.find_installed_packages()\n logger.debug('Checking for missing dependencies of %s ..',\n requirement.name)\n missing_dependencies = sorted(set(known_dependencies).difference(\n installed_packages))\n if missing_dependencies:\n logger.debug('Found %s: %s', pluralize(len(missing_dependencies\n ), 'missing dependency', 'missing dependencies'),\n concatenate(missing_dependencies))\n else:\n logger.info('All known dependencies are already installed.')\n return missing_dependencies\n", "role": "user" }, { "content": "find_missing_dependencies", "role": "assistant" } ]
def x(self, requirement): logger.info('Checking for known dependencies of %s ..', requirement.name) known_dependencies = sorted(self.dependencies.get(requirement.name. lower(), [])) if known_dependencies: logger.info('Found %s: %s', pluralize(len(known_dependencies), 'known dependency', 'known dependencies'), concatenate( known_dependencies)) else: logger.info('No known dependencies... Maybe you have a suggestion?') return known_dependencies
find_known_dependencies
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement):\n logger.info('Checking for known dependencies of %s ..', requirement.name)\n known_dependencies = sorted(self.dependencies.get(requirement.name.\n lower(), []))\n if known_dependencies:\n logger.info('Found %s: %s', pluralize(len(known_dependencies),\n 'known dependency', 'known dependencies'), concatenate(\n known_dependencies))\n else:\n logger.info('No known dependencies... Maybe you have a suggestion?')\n return known_dependencies\n", "role": "user" }, { "content": "find_known_dependencies", "role": "assistant" } ]
def x(self): list_command = subprocess.Popen(self.list_command, shell=True, stdout= subprocess.PIPE) stdout, stderr = list_command.communicate() if list_command.returncode != 0: raise SystemDependencyError( 'The command to list the installed system packages failed! ({command})' , command=self.list_command) installed_packages = sorted(stdout.decode().split()) logger.debug('Found %i installed system package(s): %s', len( installed_packages), installed_packages) return installed_packages
find_installed_packages
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n list_command = subprocess.Popen(self.list_command, shell=True, stdout=\n subprocess.PIPE)\n stdout, stderr = list_command.communicate()\n if list_command.returncode != 0:\n raise SystemDependencyError(\n 'The command to list the installed system packages failed! ({command})'\n , command=self.list_command)\n installed_packages = sorted(stdout.decode().split())\n logger.debug('Found %i installed system package(s): %s', len(\n installed_packages), installed_packages)\n return installed_packages\n", "role": "user" }, { "content": "find_installed_packages", "role": "assistant" } ]
def x(self, requirement, missing_dependencies, reason): msg = 'Missing %s (%s) required by Python package %s (%s) but %s!' raise DependencyInstallationRefused(msg % (pluralize(len( missing_dependencies), 'system package', 'system packages'), concatenate(missing_dependencies), requirement.name, requirement. version, reason))
installation_refused
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement, missing_dependencies, reason):\n msg = 'Missing %s (%s) required by Python package %s (%s) but %s!'\n raise DependencyInstallationRefused(msg % (pluralize(len(\n missing_dependencies), 'system package', 'system packages'),\n concatenate(missing_dependencies), requirement.name, requirement.\n version, reason))\n", "role": "user" }, { "content": "installation_refused", "role": "assistant" } ]
def x(self, requirement, missing_dependencies, install_command): try: return prompt_for_confirmation(format( 'Do you want me to install %s %s?', 'this' if len( missing_dependencies) == 1 else 'these', 'dependency' if len( missing_dependencies) == 1 else 'dependencies'), default=True) except KeyboardInterrupt: return False
confirm_installation
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, requirement, missing_dependencies, install_command):\n try:\n return prompt_for_confirmation(format(\n 'Do you want me to install %s %s?', 'this' if len(\n missing_dependencies) == 1 else 'these', 'dependency' if len(\n missing_dependencies) == 1 else 'dependencies'), default=True)\n except KeyboardInterrupt:\n return False\n", "role": "user" }, { "content": "confirm_installation", "role": "assistant" } ]
def x(text, **kw): return '\n\n'.join(' '.join(p.split()) for p in text.split('\n\n')).format( **kw)
compact
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(text, **kw):\n return '\\n\\n'.join(' '.join(p.split()) for p in text.split('\\n\\n')).format(\n **kw)\n", "role": "user" }, { "content": "compact", "role": "assistant" } ]
def x(pathname): home_directory = find_home_directory() separators = set([os.sep]) if os.altsep is not None: separators.add(os.altsep) if len(pathname) >= 2 and pathname[0] == '~' and pathname[1] in separators: pathname = os.path.join(home_directory, pathname[2:]) return parse_path(pathname)
expand_path
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pathname):\n home_directory = find_home_directory()\n separators = set([os.sep])\n if os.altsep is not None:\n separators.add(os.altsep)\n if len(pathname) >= 2 and pathname[0] == '~' and pathname[1] in separators:\n pathname = os.path.join(home_directory, pathname[2:])\n return parse_path(pathname)\n", "role": "user" }, { "content": "expand_path", "role": "assistant" } ]
def x(): if WINDOWS: directory = os.environ.get('APPDATA') if not directory: directory = os.path.expanduser('~\\Application Data') else: import pwd entry = pwd.getpwuid(os.getuid()) directory = entry.pw_dir return directory
find_home_directory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if WINDOWS:\n directory = os.environ.get('APPDATA')\n if not directory:\n directory = os.path.expanduser('~\\\\Application Data')\n else:\n import pwd\n entry = pwd.getpwuid(os.getuid())\n directory = entry.pw_dir\n return directory\n", "role": "user" }, { "content": "find_home_directory", "role": "assistant" } ]
def x(path, mode=511): try: os.makedirs(path, mode) return True except OSError as e: if e.errno != errno.EEXIST: raise return False
makedirs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, mode=511):\n try:\n os.makedirs(path, mode)\n return True\n except OSError as e:\n if e.errno != errno.EEXIST:\n raise\n return False\n", "role": "user" }, { "content": "makedirs", "role": "assistant" } ]
def x(path1, path2): if all(os.path.isdir(p) for p in (path1, path2)): try: return os.path.samefile(path1, path2) except AttributeError: return os.path.realpath(path1) == os.path.realpath(path2) else: return False
same_directories
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path1, path2):\n if all(os.path.isdir(p) for p in (path1, path2)):\n try:\n return os.path.samefile(path1, path2)\n except AttributeError:\n return os.path.realpath(path1) == os.path.realpath(path2)\n else:\n return False\n", "role": "user" }, { "content": "same_directories", "role": "assistant" } ]
def x(method, *files): context = hashlib.new(method) for filename in files: with open(filename, 'rb') as handle: while True: chunk = handle.read(4096) if not chunk: break context.update(chunk) return context.hexdigest()
hash_files
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, *files):\n context = hashlib.new(method)\n for filename in files:\n with open(filename, 'rb') as handle:\n while True:\n chunk = handle.read(4096)\n if not chunk:\n break\n context.update(chunk)\n return context.hexdigest()\n", "role": "user" }, { "content": "hash_files", "role": "assistant" } ]
def x(src, dst): try: os.replace(src, dst) return except AttributeError: pass try: os.rename(src, dst) return except OSError as e: if e.errno != errno.EEXIST: raise os.remove(dst) os.rename(src, dst)
replace_file
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(src, dst):\n try:\n os.replace(src, dst)\n return\n except AttributeError:\n pass\n try:\n os.rename(src, dst)\n return\n except OSError as e:\n if e.errno != errno.EEXIST:\n raise\n os.remove(dst)\n os.rename(src, dst)\n", "role": "user" }, { "content": "replace_file", "role": "assistant" } ]
def x(expr): required_dist = next(parse_requirements(expr)) try: installed_dist = get_distribution(required_dist.key) return installed_dist in required_dist except DistributionNotFound: return False
requirement_is_installed
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(expr):\n required_dist = next(parse_requirements(expr))\n try:\n installed_dist = get_distribution(required_dist.key)\n return installed_dist in required_dist\n except DistributionNotFound:\n return False\n", "role": "user" }, { "content": "requirement_is_installed", "role": "assistant" } ]
def x(*package_names): command = UninstallCommand() opts, args = command.parse_args(['--yes'] + list(package_names)) command.run(opts, args)
uninstall
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(*package_names):\n command = UninstallCommand()\n opts, args = command.parse_args(['--yes'] + list(package_names))\n command.run(opts, args)\n", "role": "user" }, { "content": "uninstall", "role": "assistant" } ]
def x(argument, short_option, long_option): return short_option[1] in argument[1:] if is_short_option(argument ) else argument == long_option
match_option
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(argument, short_option, long_option):\n return short_option[1] in argument[1:] if is_short_option(argument\n ) else argument == long_option\n", "role": "user" }, { "content": "match_option", "role": "assistant" } ]
def x(arguments, option, value): return '%s=%s' % (option, value) in arguments or contains_sublist(arguments , [option, value])
match_option_with_value
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(arguments, option, value):\n return '%s=%s' % (option, value) in arguments or contains_sublist(arguments\n , [option, value])\n", "role": "user" }, { "content": "match_option_with_value", "role": "assistant" } ]
def x(lst, sublst): n = len(sublst) return any(sublst == lst[i:i + n] for i in range(len(lst) - n + 1))
contains_sublist
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(lst, sublst):\n n = len(sublst)\n return any(sublst == lst[i:i + n] for i in range(len(lst) - n + 1))\n", "role": "user" }, { "content": "contains_sublist", "role": "assistant" } ]
def x(file, dtype, count, *args, **kwargs): try: return numpy.fromfile(file, *args, dtype=dtype, count=count, **kwargs) except (TypeError, IOError): return numpy.frombuffer(file.read(count * numpy.dtype(dtype). itemsize), *args, dtype=dtype, count=count, **kwargs)
fromfile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(file, dtype, count, *args, **kwargs):\n try:\n return numpy.fromfile(file, *args, dtype=dtype, count=count, **kwargs)\n except (TypeError, IOError):\n return numpy.frombuffer(file.read(count * numpy.dtype(dtype).\n itemsize), *args, dtype=dtype, count=count, **kwargs)\n", "role": "user" }, { "content": "fromfile", "role": "assistant" } ]
def x(path, meta_data_only=False, compensate=False, channel_naming='$PnS', reformat_meta=False, data_set=0, dtype='float32', encoding='utf-8'): if compensate: raise ParserFeatureNotImplementedError( u'Compensation has not been implemented yet.') read_data = not meta_data_only fcs_parser = FCSParser(path, read_data=read_data, channel_naming= channel_naming, data_set=data_set, encoding=encoding) if reformat_meta: fcs_parser.reformat_meta() meta = fcs_parser.annotation if meta_data_only: return meta else: df = fcs_parser.dataframe df = df.astype(dtype) if dtype else df return meta, df
parse
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, meta_data_only=False, compensate=False, channel_naming='$PnS',\n reformat_meta=False, data_set=0, dtype='float32', encoding='utf-8'):\n if compensate:\n raise ParserFeatureNotImplementedError(\n u'Compensation has not been implemented yet.')\n read_data = not meta_data_only\n fcs_parser = FCSParser(path, read_data=read_data, channel_naming=\n channel_naming, data_set=data_set, encoding=encoding)\n if reformat_meta:\n fcs_parser.reformat_meta()\n meta = fcs_parser.annotation\n if meta_data_only:\n return meta\n else:\n df = fcs_parser.dataframe\n df = df.astype(dtype) if dtype else df\n return meta, df\n", "role": "user" }, { "content": "parse", "role": "assistant" } ]
def x(self, file_handle, data_set=0, read_data=True): file_handle.seek(0, 2) self._file_size = file_handle.tell() file_handle.seek(0) data_segments = 0 nextdata_offset = 0 while data_segments <= data_set: self.read_header(file_handle, nextdata_offset) self.read_text(file_handle) if '$NEXTDATA' in self.annotation: data_segments += 1 nextdata_offset = self.annotation['$NEXTDATA'] file_handle.seek(nextdata_offset) if nextdata_offset == 0 and data_segments < data_set: warnings.warn('File does not contain the number of data sets.') break else: if data_segments != 0: warnings.warn('File does not contain $NEXTDATA information.') break if read_data: self.read_data(file_handle)
load_file
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, file_handle, data_set=0, read_data=True):\n file_handle.seek(0, 2)\n self._file_size = file_handle.tell()\n file_handle.seek(0)\n data_segments = 0\n nextdata_offset = 0\n while data_segments <= data_set:\n self.read_header(file_handle, nextdata_offset)\n self.read_text(file_handle)\n if '$NEXTDATA' in self.annotation:\n data_segments += 1\n nextdata_offset = self.annotation['$NEXTDATA']\n file_handle.seek(nextdata_offset)\n if nextdata_offset == 0 and data_segments < data_set:\n warnings.warn('File does not contain the number of data sets.')\n break\n else:\n if data_segments != 0:\n warnings.warn('File does not contain $NEXTDATA information.')\n break\n if read_data:\n self.read_data(file_handle)\n", "role": "user" }, { "content": "load_file", "role": "assistant" } ]
def x(cls, data): obj = cls() with contextlib.closing(BytesIO(data)) as file_handle: obj.load_file(file_handle) return obj
from_data
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, data):\n obj = cls()\n with contextlib.closing(BytesIO(data)) as file_handle:\n obj.load_file(file_handle)\n return obj\n", "role": "user" }, { "content": "from_data", "role": "assistant" } ]
def x(self, file_handle, nextdata_offset=0): header = {'FCS format': file_handle.read(6)} file_handle.read(4) for field in ('text start', 'text end', 'data start', 'data end', 'analysis start', 'analysis end'): s = file_handle.read(8) try: field_value = int(s) except ValueError: field_value = 0 header[field] = field_value + nextdata_offset for k in ('text start', 'text end'): if header[k] == 0: raise ValueError( u'The FCS file "{}" seems corrupted. (Parser cannot locate information about the "{}" segment.)' .format(self.path, k)) elif header[k] > self._file_size: raise ValueError( u'The FCS file "{}" is corrupted. "{}" segment is larger than file size' .format(self.path, k)) else: pass self._data_start = header['data start'] self._data_end = header['data start'] if header['analysis end'] - header['analysis start'] != 0: warnings.warn( u'There appears to be some information in the ANALYSIS segment of file {0}. However, it might not be read correctly.' .format(self.path)) self.annotation['__header__'] = header
read_header
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, file_handle, nextdata_offset=0):\n header = {'FCS format': file_handle.read(6)}\n file_handle.read(4)\n for field in ('text start', 'text end', 'data start', 'data end',\n 'analysis start', 'analysis end'):\n s = file_handle.read(8)\n try:\n field_value = int(s)\n except ValueError:\n field_value = 0\n header[field] = field_value + nextdata_offset\n for k in ('text start', 'text end'):\n if header[k] == 0:\n raise ValueError(\n u'The FCS file \"{}\" seems corrupted. (Parser cannot locate information about the \"{}\" segment.)'\n .format(self.path, k))\n elif header[k] > self._file_size:\n raise ValueError(\n u'The FCS file \"{}\" is corrupted. \"{}\" segment is larger than file size'\n .format(self.path, k))\n else:\n pass\n self._data_start = header['data start']\n self._data_end = header['data start']\n if header['analysis end'] - header['analysis start'] != 0:\n warnings.warn(\n u'There appears to be some information in the ANALYSIS segment of file {0}. However, it might not be read correctly.'\n .format(self.path))\n self.annotation['__header__'] = header\n", "role": "user" }, { "content": "read_header", "role": "assistant" } ]
def x(self, raw_text): delimiter = raw_text[0] if raw_text[-1] != delimiter: raw_text = raw_text.strip() if raw_text[-1] != delimiter: msg = ( u"""The first two characters were: {}. The last two characters were: {} Parser expects the same delimiter character in beginning and end of TEXT segment""" .format(raw_text[:2], raw_text[-2:])) raise ParserFeatureNotImplementedError(msg) nested_split_list = [x.split(delimiter) for x in raw_text[1:-1].split( delimiter * 2)] raw_text_elements = nested_split_list[0] for partial_element_list in nested_split_list[1:]: raw_text_elements[-1] += delimiter + partial_element_list[0] raw_text_elements.extend(partial_element_list[1:]) keys, values = raw_text_elements[0::2], raw_text_elements[1::2] return dict(zip(keys, values))
extract_text_dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, raw_text):\n delimiter = raw_text[0]\n if raw_text[-1] != delimiter:\n raw_text = raw_text.strip()\n if raw_text[-1] != delimiter:\n msg = (\n u\"\"\"The first two characters were:\n {}. The last two characters were: {}\nParser expects the same delimiter character in beginning and end of TEXT segment\"\"\"\n .format(raw_text[:2], raw_text[-2:]))\n raise ParserFeatureNotImplementedError(msg)\n nested_split_list = [x.split(delimiter) for x in raw_text[1:-1].split(\n delimiter * 2)]\n raw_text_elements = nested_split_list[0]\n for partial_element_list in nested_split_list[1:]:\n raw_text_elements[-1] += delimiter + partial_element_list[0]\n raw_text_elements.extend(partial_element_list[1:])\n keys, values = raw_text_elements[0::2], raw_text_elements[1::2]\n return dict(zip(keys, values))\n", "role": "user" }, { "content": "extract_text_dict", "role": "assistant" } ]
def x(self, file_handle): header = self.annotation['__header__'] file_handle.seek(header['text start'], 0) raw_text = file_handle.read(header['text end'] - header['text start'] + 1) try: raw_text = raw_text.decode(self._encoding) except UnicodeDecodeError as e: logger.warning( u"""Encountered an illegal utf-8 byte in the header. Illegal utf-8 characters will be ignored. {}""" .format(e)) raw_text = raw_text.decode(self._encoding, errors='ignore') text = self._extract_text_dict(raw_text) pars = int(text['$PAR']) if '$P0B' in text.keys(): self.channel_numbers = range(0, pars) else: self.channel_numbers = range(1, pars + 1) try: names_n = tuple([text['$P{0}N'.format(i)] for i in self. channel_numbers]) except KeyError: names_n = [] try: names_s = tuple([text['$P{0}S'.format(i)] for i in self. channel_numbers]) except KeyError: names_s = [] self.channel_names_s = names_s self.channel_names_n = names_n keys_encoding_bits = ['$P{0}B'.format(i) for i in self.channel_numbers] add_keys_to_convert_to_int = ['$NEXTDATA', '$PAR', '$TOT'] keys_to_convert_to_int = keys_encoding_bits + add_keys_to_convert_to_int for key in keys_to_convert_to_int: value = text[key] text[key] = int(value) self.annotation.update(text) if self._data_start == 0: self._data_start = int(text['$BEGINDATA']) if self._data_end == 0: self._data_end = int(text['$ENDDATA'])
read_text
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, file_handle):\n header = self.annotation['__header__']\n file_handle.seek(header['text start'], 0)\n raw_text = file_handle.read(header['text end'] - header['text start'] + 1)\n try:\n raw_text = raw_text.decode(self._encoding)\n except UnicodeDecodeError as e:\n logger.warning(\n u\"\"\"Encountered an illegal utf-8 byte in the header.\n Illegal utf-8 characters will be ignored.\n{}\"\"\"\n .format(e))\n raw_text = raw_text.decode(self._encoding, errors='ignore')\n text = self._extract_text_dict(raw_text)\n pars = int(text['$PAR'])\n if '$P0B' in text.keys():\n self.channel_numbers = range(0, pars)\n else:\n self.channel_numbers = range(1, pars + 1)\n try:\n names_n = tuple([text['$P{0}N'.format(i)] for i in self.\n channel_numbers])\n except KeyError:\n names_n = []\n try:\n names_s = tuple([text['$P{0}S'.format(i)] for i in self.\n channel_numbers])\n except KeyError:\n names_s = []\n self.channel_names_s = names_s\n self.channel_names_n = names_n\n keys_encoding_bits = ['$P{0}B'.format(i) for i in self.channel_numbers]\n add_keys_to_convert_to_int = ['$NEXTDATA', '$PAR', '$TOT']\n keys_to_convert_to_int = keys_encoding_bits + add_keys_to_convert_to_int\n for key in keys_to_convert_to_int:\n value = text[key]\n text[key] = int(value)\n self.annotation.update(text)\n if self._data_start == 0:\n self._data_start = int(text['$BEGINDATA'])\n if self._data_end == 0:\n self._data_end = int(text['$ENDDATA'])\n", "role": "user" }, { "content": "read_text", "role": "assistant" } ]
def x(self, file_handle): start = self.annotation['__header__']['analysis start'] end = self.annotation['__header__']['analysis end'] if start != 0 and end != 0: file_handle.seek(start, 0) self._analysis = file_handle.read(end - start) else: self._analysis = None
read_analysis
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, file_handle):\n start = self.annotation['__header__']['analysis start']\n end = self.annotation['__header__']['analysis end']\n if start != 0 and end != 0:\n file_handle.seek(start, 0)\n self._analysis = file_handle.read(end - start)\n else:\n self._analysis = None\n", "role": "user" }, { "content": "read_analysis", "role": "assistant" } ]
def x(self): text = self.annotation keys = text.keys() if '$MODE' not in text or text['$MODE'] != 'L': raise ParserFeatureNotImplementedError(u'Mode not implemented') if '$P0B' in keys: raise ParserFeatureNotImplementedError( u'Not expecting a parameter starting at 0') if text['$BYTEORD'] not in ['1,2,3,4', '4,3,2,1', '1,2', '2,1']: raise ParserFeatureNotImplementedError(u'$BYTEORD {} not implemented' .format(text['$BYTEORD']))
verify_assumptions
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n text = self.annotation\n keys = text.keys()\n if '$MODE' not in text or text['$MODE'] != 'L':\n raise ParserFeatureNotImplementedError(u'Mode not implemented')\n if '$P0B' in keys:\n raise ParserFeatureNotImplementedError(\n u'Not expecting a parameter starting at 0')\n if text['$BYTEORD'] not in ['1,2,3,4', '4,3,2,1', '1,2', '2,1']:\n raise ParserFeatureNotImplementedError(u'$BYTEORD {} not implemented'\n .format(text['$BYTEORD']))\n", "role": "user" }, { "content": "verify_assumptions", "role": "assistant" } ]