source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(value, parameter):
conf = get_config_obj()
section = 'cli'
if '.' in parameter:
section, parameter = parameter.split('.', 1)
if section not in conf:
conf[section] = {}
conf[section][parameter] = value
safeprint('Writing updated config to {}'.format(conf.filename))
conf.write()
|
set_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(value, parameter):\n conf = get_config_obj()\n section = 'cli'\n if '.' in parameter:\n section, parameter = parameter.split('.', 1)\n if section not in conf:\n conf[section] = {}\n conf[section][parameter] = value\n safeprint('Writing updated config to {}'.format(conf.filename))\n conf.write()\n",
"role": "user"
},
{
"content": "set_command",
"role": "assistant"
}
] |
def x(process_command, helptext):
if sys.stdin.isatty():
safeprint('{}\n'.format(helptext) +
"""Lines are split with shlex in POSIX mode: https://docs.python.org/library/shlex.html#parsing-rules
Terminate input with Ctrl+D or <EOF>
"""
, write_to_stderr=True)
for line in sys.stdin.readlines():
argv = shlex.split(line, comments=True)
if argv:
try:
process_command.main(args=argv)
except SystemExit as e:
if e.code != 0:
raise
|
shlex_process_stdin
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(process_command, helptext):\n if sys.stdin.isatty():\n safeprint('{}\\n'.format(helptext) +\n \"\"\"Lines are split with shlex in POSIX mode: https://docs.python.org/library/shlex.html#parsing-rules\nTerminate input with Ctrl+D or <EOF>\n\"\"\"\n , write_to_stderr=True)\n for line in sys.stdin.readlines():\n argv = shlex.split(line, comments=True)\n if argv:\n try:\n process_command.main(args=argv)\n except SystemExit as e:\n if e.code != 0:\n raise\n",
"role": "user"
},
{
"content": "shlex_process_stdin",
"role": "assistant"
}
] |
def x(personal):
if personal:
try:
ep_id = LocalGlobusConnectPersonal().endpoint_id
except IOError as e:
safeprint(e, write_to_stderr=True)
click.get_current_context().exit(1)
if ep_id is not None:
safeprint(ep_id)
else:
safeprint('No Globus Connect Personal installation found.')
click.get_current_context().exit(1)
|
local_id
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(personal):\n if personal:\n try:\n ep_id = LocalGlobusConnectPersonal().endpoint_id\n except IOError as e:\n safeprint(e, write_to_stderr=True)\n click.get_current_context().exit(1)\n if ep_id is not None:\n safeprint(ep_id)\n else:\n safeprint('No Globus Connect Personal installation found.')\n click.get_current_context().exit(1)\n",
"role": "user"
},
{
"content": "local_id",
"role": "assistant"
}
] |
def x(endpoint_id, myproxy, myproxy_username, myproxy_password,
myproxy_lifetime, web, no_browser, delegate_proxy, proxy_lifetime,
no_autoactivate, force):
default_myproxy_username = lookup_option(MYPROXY_USERNAME_OPTNAME)
client = get_client()
if web + myproxy + bool(delegate_proxy) > 1:
raise click.UsageError(
'--web, --myproxy, and --delegate-proxy are mutually exclusive.')
if no_autoactivate and not (myproxy or web or delegate_proxy):
raise click.UsageError(
'--no-autoactivate requires another activation method be given.')
if myproxy_username and not myproxy:
raise click.UsageError('--myproxy-username requires --myproxy.')
if myproxy_password and not myproxy:
raise click.UsageError('--myproxy-password requires --myproxy.')
if myproxy_lifetime is not None and not myproxy:
raise click.UsageError('--myproxy-lifetime requires --myproxy.')
if no_browser and not web:
raise click.UsageError('--no-browser requires --web.')
if proxy_lifetime and not delegate_proxy:
raise click.UsageError('--proxy-lifetime requires --delegate-proxy.')
if not force:
res = client.endpoint_autoactivate(endpoint_id, if_expires_in=60)
if 'AlreadyActivated' == res['code']:
formatted_print(res, simple_text=
'Endpoint is already activated. Activation expires at {}'.
format(res['expire_time']))
return
if not no_autoactivate:
res = client.endpoint_autoactivate(endpoint_id)
if 'AutoActivated' in res['code']:
formatted_print(res, simple_text=
'Autoactivation succeeded with message: {}'.format(res[
'message']))
return
else:
message = ('The endpoint could not be auto-activated.\n\n' +
activation_requirements_help_text(res, endpoint_id))
res = {'message': message}
if myproxy:
if not (myproxy_username or default_myproxy_username):
myproxy_username = click.prompt('Myproxy username')
if not myproxy_password:
myproxy_password = click.prompt('Myproxy password', hide_input=True
)
no_server_msg = (
'This endpoint has no myproxy server and so cannot be activated through myproxy'
)
requirements_data = client.endpoint_get_activation_requirements(
endpoint_id).data
if not len(requirements_data['DATA']):
raise click.ClickException(no_server_msg)
for data in requirements_data['DATA']:
if data['type'] != 'myproxy':
continue
if data['name'] == 'passphrase':
data['value'] = myproxy_password
if data['name'] == 'username':
data['value'] = myproxy_username or default_myproxy_username
if data['name'] == 'hostname' and data['value'] is None:
raise click.ClickException(no_server_msg)
if data['name'
] == 'lifetime_in_hours' and myproxy_lifetime is not None:
data['value'] = str(myproxy_lifetime)
res = client.endpoint_activate(endpoint_id, requirements_data)
elif web:
url = 'https://app.globus.org/file-manager?origin_id={}'.format(
endpoint_id)
if no_browser or is_remote_session():
res = {'message': 'Web activation url: {}'.format(url), 'url': url}
else:
webbrowser.open(url, new=1)
res = {'message': 'Browser opened to web activation page',
'url': url}
elif delegate_proxy:
requirements_data = client.endpoint_get_activation_requirements(
endpoint_id).data
filled_requirements_data = fill_delegate_proxy_activation_requirements(
requirements_data, delegate_proxy, lifetime_hours=
proxy_lifetime or 12)
res = client.endpoint_activate(endpoint_id, filled_requirements_data)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
endpoint_activate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id, myproxy, myproxy_username, myproxy_password,\n myproxy_lifetime, web, no_browser, delegate_proxy, proxy_lifetime,\n no_autoactivate, force):\n default_myproxy_username = lookup_option(MYPROXY_USERNAME_OPTNAME)\n client = get_client()\n if web + myproxy + bool(delegate_proxy) > 1:\n raise click.UsageError(\n '--web, --myproxy, and --delegate-proxy are mutually exclusive.')\n if no_autoactivate and not (myproxy or web or delegate_proxy):\n raise click.UsageError(\n '--no-autoactivate requires another activation method be given.')\n if myproxy_username and not myproxy:\n raise click.UsageError('--myproxy-username requires --myproxy.')\n if myproxy_password and not myproxy:\n raise click.UsageError('--myproxy-password requires --myproxy.')\n if myproxy_lifetime is not None and not myproxy:\n raise click.UsageError('--myproxy-lifetime requires --myproxy.')\n if no_browser and not web:\n raise click.UsageError('--no-browser requires --web.')\n if proxy_lifetime and not delegate_proxy:\n raise click.UsageError('--proxy-lifetime requires --delegate-proxy.')\n if not force:\n res = client.endpoint_autoactivate(endpoint_id, if_expires_in=60)\n if 'AlreadyActivated' == res['code']:\n formatted_print(res, simple_text=\n 'Endpoint is already activated. Activation expires at {}'.\n format(res['expire_time']))\n return\n if not no_autoactivate:\n res = client.endpoint_autoactivate(endpoint_id)\n if 'AutoActivated' in res['code']:\n formatted_print(res, simple_text=\n 'Autoactivation succeeded with message: {}'.format(res[\n 'message']))\n return\n else:\n message = ('The endpoint could not be auto-activated.\\n\\n' +\n activation_requirements_help_text(res, endpoint_id))\n res = {'message': message}\n if myproxy:\n if not (myproxy_username or default_myproxy_username):\n myproxy_username = click.prompt('Myproxy username')\n if not myproxy_password:\n myproxy_password = click.prompt('Myproxy password', hide_input=True\n )\n no_server_msg = (\n 'This endpoint has no myproxy server and so cannot be activated through myproxy'\n )\n requirements_data = client.endpoint_get_activation_requirements(\n endpoint_id).data\n if not len(requirements_data['DATA']):\n raise click.ClickException(no_server_msg)\n for data in requirements_data['DATA']:\n if data['type'] != 'myproxy':\n continue\n if data['name'] == 'passphrase':\n data['value'] = myproxy_password\n if data['name'] == 'username':\n data['value'] = myproxy_username or default_myproxy_username\n if data['name'] == 'hostname' and data['value'] is None:\n raise click.ClickException(no_server_msg)\n if data['name'\n ] == 'lifetime_in_hours' and myproxy_lifetime is not None:\n data['value'] = str(myproxy_lifetime)\n res = client.endpoint_activate(endpoint_id, requirements_data)\n elif web:\n url = 'https://app.globus.org/file-manager?origin_id={}'.format(\n endpoint_id)\n if no_browser or is_remote_session():\n res = {'message': 'Web activation url: {}'.format(url), 'url': url}\n else:\n webbrowser.open(url, new=1)\n res = {'message': 'Browser opened to web activation page',\n 'url': url}\n elif delegate_proxy:\n requirements_data = client.endpoint_get_activation_requirements(\n endpoint_id).data\n filled_requirements_data = fill_delegate_proxy_activation_requirements(\n requirements_data, delegate_proxy, lifetime_hours=\n proxy_lifetime or 12)\n res = client.endpoint_activate(endpoint_id, filled_requirements_data)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "endpoint_activate",
"role": "assistant"
}
] |
def x(*args, **kwargs):
def x(f):
f = click.group(*args, cls=GlobusCommandGroup, **kwargs)(f)
f = common_options(f)
return f
return inner_decorator
|
globus_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n\n def x(f):\n f = click.group(*args, cls=GlobusCommandGroup, **kwargs)(f)\n f = common_options(f)\n return f\n return inner_decorator\n",
"role": "user"
},
{
"content": "globus_group",
"role": "assistant"
}
] |
def x():
moddata = []
modlist = ('click', 'configobj', 'cryptography', 'globus_cli',
'globus_sdk', 'jmespath', 'requests', 'six')
if verbosity() < 2:
modlist = 'globus_cli', 'globus_sdk', 'requests'
for mod in modlist:
cur = [mod]
try:
loaded_mod = __import__(mod)
except ImportError:
loaded_mod = None
for attr in ('__version__', '__file__', '__path__'):
if loaded_mod is None:
cur.append('[import failed]')
continue
try:
attrval = getattr(loaded_mod, attr)
except AttributeError:
attrval = ''
cur.append(attrval)
moddata.append(cur)
return moddata
|
get_package_data
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n moddata = []\n modlist = ('click', 'configobj', 'cryptography', 'globus_cli',\n 'globus_sdk', 'jmespath', 'requests', 'six')\n if verbosity() < 2:\n modlist = 'globus_cli', 'globus_sdk', 'requests'\n for mod in modlist:\n cur = [mod]\n try:\n loaded_mod = __import__(mod)\n except ImportError:\n loaded_mod = None\n for attr in ('__version__', '__file__', '__path__'):\n if loaded_mod is None:\n cur.append('[import failed]')\n continue\n try:\n attrval = getattr(loaded_mod, attr)\n except AttributeError:\n attrval = ''\n cur.append(attrval)\n moddata.append(cur)\n return moddata\n",
"role": "user"
},
{
"content": "get_package_data",
"role": "assistant"
}
] |
def x():
latest, current = get_versions()
if latest is None:
safeprint('Installed Version: {0}\nFailed to lookup latest version.'
.format(current))
else:
safeprint('Installed Version: {0}\nLatest Version: {1}\n\n{2}'.
format(current, latest,
'You are running the latest version of the Globus CLI' if
current == latest else
"""You should update your version of the Globus CLI with
globus update"""
if current < latest else
'You are running a preview version of the Globus CLI'))
if is_verbose():
moddata = _get_package_data()
safeprint('\nVerbose Data\n---')
safeprint('platform:')
safeprint(' platform: {}'.format(platform.platform()))
safeprint(' py_implementation: {}'.format(platform.
python_implementation()))
safeprint(' py_version: {}'.format(platform.python_version()))
safeprint(' sys.executable: {}'.format(sys.executable))
safeprint(' site.USER_BASE: {}'.format(site.USER_BASE))
safeprint('modules:')
for mod, modversion, modfile, modpath in moddata:
safeprint(' {}:'.format(mod))
safeprint(' __version__: {}'.format(modversion))
safeprint(' __file__: {}'.format(modfile))
safeprint(' __path__: {}'.format(modpath))
|
print_version
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n latest, current = get_versions()\n if latest is None:\n safeprint('Installed Version: {0}\\nFailed to lookup latest version.'\n .format(current))\n else:\n safeprint('Installed Version: {0}\\nLatest Version: {1}\\n\\n{2}'.\n format(current, latest, \n 'You are running the latest version of the Globus CLI' if \n current == latest else \n \"\"\"You should update your version of the Globus CLI with\n globus update\"\"\"\n if current < latest else\n 'You are running a preview version of the Globus CLI'))\n if is_verbose():\n moddata = _get_package_data()\n safeprint('\\nVerbose Data\\n---')\n safeprint('platform:')\n safeprint(' platform: {}'.format(platform.platform()))\n safeprint(' py_implementation: {}'.format(platform.\n python_implementation()))\n safeprint(' py_version: {}'.format(platform.python_version()))\n safeprint(' sys.executable: {}'.format(sys.executable))\n safeprint(' site.USER_BASE: {}'.format(site.USER_BASE))\n safeprint('modules:')\n for mod, modversion, modfile, modpath in moddata:\n safeprint(' {}:'.format(mod))\n safeprint(' __version__: {}'.format(modversion))\n safeprint(' __file__: {}'.format(modfile))\n safeprint(' __path__: {}'.format(modpath))\n",
"role": "user"
},
{
"content": "print_version",
"role": "assistant"
}
] |
def x(*args):
all_args = [sys.executable, '-m', 'pip'] + list(args)
print('> {}'.format(' '.join(all_args)))
subprocess.check_call(all_args)
|
call_pip
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args):\n all_args = [sys.executable, '-m', 'pip'] + list(args)\n print('> {}'.format(' '.join(all_args)))\n subprocess.check_call(all_args)\n",
"role": "user"
},
{
"content": "call_pip",
"role": "assistant"
}
] |
def x():
try:
subprocess.check_output([sys.executable, '-m', 'pip', '--version'],
stderr=subprocess.STDOUT)
return True
except subprocess.CalledProcessError:
return False
|
check_pip_installed
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n try:\n subprocess.check_output([sys.executable, '-m', 'pip', '--version'],\n stderr=subprocess.STDOUT)\n return True\n except subprocess.CalledProcessError:\n return False\n",
"role": "user"
},
{
"content": "check_pip_installed",
"role": "assistant"
}
] |
def x(yes, development, development_version):
if not _check_pip_installed():
safeprint(
'`globus update` requires pip. Please install pip and try again')
click.get_current_context().exit(1)
development = development or development_version is not None
if development:
development_version = development_version or 'master'
target_version = (
'https://github.com/globus/globus-cli/archive/{}.tar.gz#egg=globus-cli'
.format(development_version))
else:
latest, current = get_versions()
if latest is None:
safeprint('Failed to lookup latest version. Aborting.')
click.get_current_context().exit(1)
if current == latest:
safeprint('You are already running the latest version: {}'.
format(current))
return
else:
safeprint(
'You are already running version {0}\nThe latest version is {1}'
.format(current, latest))
if not yes and not click.confirm('Continue with the upgrade?',
default=True):
click.get_current_context().exit(1)
target_version = 'globus-cli=={}'.format(latest)
safeprint(
"""The Globus CLI will now update itself.
In the event that an error occurs or the update is interrupted, we recommend uninstalling and reinstalling the CLI.
Update Target: {}
"""
.format(target_version))
@atexit.register
def x():
install_args = ['install', '--upgrade', target_version]
if IS_USER_INSTALL:
install_args.insert(1, '--user')
_call_pip(*install_args)
|
update_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(yes, development, development_version):\n if not _check_pip_installed():\n safeprint(\n '`globus update` requires pip. Please install pip and try again')\n click.get_current_context().exit(1)\n development = development or development_version is not None\n if development:\n development_version = development_version or 'master'\n target_version = (\n 'https://github.com/globus/globus-cli/archive/{}.tar.gz#egg=globus-cli'\n .format(development_version))\n else:\n latest, current = get_versions()\n if latest is None:\n safeprint('Failed to lookup latest version. Aborting.')\n click.get_current_context().exit(1)\n if current == latest:\n safeprint('You are already running the latest version: {}'.\n format(current))\n return\n else:\n safeprint(\n 'You are already running version {0}\\nThe latest version is {1}'\n .format(current, latest))\n if not yes and not click.confirm('Continue with the upgrade?',\n default=True):\n click.get_current_context().exit(1)\n target_version = 'globus-cli=={}'.format(latest)\n safeprint(\n \"\"\"The Globus CLI will now update itself.\nIn the event that an error occurs or the update is interrupted, we recommend uninstalling and reinstalling the CLI.\nUpdate Target: {}\n\"\"\"\n .format(target_version))\n\n @atexit.register\n def x():\n install_args = ['install', '--upgrade', target_version]\n if IS_USER_INSTALL:\n install_args.insert(1, '--user')\n _call_pip(*install_args)\n",
"role": "user"
},
{
"content": "update_command",
"role": "assistant"
}
] |
def x(linked_identities):
client = get_auth_client()
try:
res = client.oauth2_userinfo()
except AuthAPIError:
safeprint(
'Unable to get user information. Please try logging in again.',
write_to_stderr=True)
click.get_current_context().exit(1)
print_command_hint(
"""For information on which identities are in session see
globus session show
"""
)
if linked_identities:
try:
formatted_print(res['identity_set'], fields=[('Username',
'username'), ('Name', 'name'), ('ID', 'sub'), ('Email',
'email')], simple_text=None if is_verbose() else '\n'.join(
[x['username'] for x in res['identity_set']]))
except KeyError:
safeprint(
'Your current login does not have the consents required to view your full identity set. Please log in again to agree to the required consents.'
, write_to_stderr=True)
else:
formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=[(
'Username', 'preferred_username'), ('Name', 'name'), ('ID',
'sub'), ('Email', 'email')], simple_text=None if is_verbose() else
res['preferred_username'])
|
whoami_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(linked_identities):\n client = get_auth_client()\n try:\n res = client.oauth2_userinfo()\n except AuthAPIError:\n safeprint(\n 'Unable to get user information. Please try logging in again.',\n write_to_stderr=True)\n click.get_current_context().exit(1)\n print_command_hint(\n \"\"\"For information on which identities are in session see\n globus session show\n\"\"\"\n )\n if linked_identities:\n try:\n formatted_print(res['identity_set'], fields=[('Username',\n 'username'), ('Name', 'name'), ('ID', 'sub'), ('Email',\n 'email')], simple_text=None if is_verbose() else '\\n'.join(\n [x['username'] for x in res['identity_set']]))\n except KeyError:\n safeprint(\n 'Your current login does not have the consents required to view your full identity set. Please log in again to agree to the required consents.'\n , write_to_stderr=True)\n else:\n formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=[(\n 'Username', 'preferred_username'), ('Name', 'name'), ('ID',\n 'sub'), ('Email', 'email')], simple_text=None if is_verbose() else\n res['preferred_username'])\n",
"role": "user"
},
{
"content": "whoami_command",
"role": "assistant"
}
] |
def x(args):
root_command = click.get_current_context().find_root().command
ctx = root_command.make_context('globus', list(args), resilient_parsing
=True)
while isinstance(ctx.command, click.MultiCommand) and args:
args = ctx.protected_args + ctx.args
if not args:
break
command = ctx.command.get_command(ctx, args[0])
if not command:
return None
else:
ctx = command.make_context(args[0], args[1:], parent=ctx,
resilient_parsing=True)
return ctx
|
get_completion_context
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(args):\n root_command = click.get_current_context().find_root().command\n ctx = root_command.make_context('globus', list(args), resilient_parsing\n =True)\n while isinstance(ctx.command, click.MultiCommand) and args:\n args = ctx.protected_args + ctx.args\n if not args:\n break\n command = ctx.command.get_command(ctx, args[0])\n if not command:\n return None\n else:\n ctx = command.make_context(args[0], args[1:], parent=ctx,\n resilient_parsing=True)\n return ctx\n",
"role": "user"
},
{
"content": "get_completion_context",
"role": "assistant"
}
] |
def x(completed_args, cur, quoted):
ctx = get_completion_context(completed_args)
if not ctx:
return []
def x(n, m):
return n.startswith(m)
def x(n, m):
return n.lower().startswith(m.lower())
match_func = match_with_case
ctx_options = [p for p in ctx.command.get_params(ctx) if isinstance(p,
click.Option)]
last_completed = None
if completed_args:
last_completed = completed_args[-1]
matching_choice_opt = None
for p in ctx_options:
if isinstance(p.type, click.Choice) and last_completed in p.opts:
matching_choice_opt = p
choices = []
if matching_choice_opt:
if isinstance(matching_choice_opt.type, CaseInsensitiveChoice):
match_func = match_nocase
choices = [(x, matching_choice_opt.help) for x in
matching_choice_opt.type.choices]
elif cur and cur.startswith('-') and not quoted:
for param in ctx_options:
if isinstance(param, HiddenOption):
continue
for optset in (param.opts, param.secondary_opts):
for opt in optset:
if opt.startswith('--') or len(cur) > 1 and cur[1] != '-':
choices.append((opt, param.help))
elif isinstance(ctx.command, click.MultiCommand) and not quoted:
choices = [(cmdname, ctx.command.get_command(ctx, cmdname).
short_help) for cmdname in ctx.command.list_commands(ctx)]
else:
pass
if cur:
choices = [(n, h) for n, h in choices if match_func(n, cur)]
return choices
|
get_all_choices
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(completed_args, cur, quoted):\n ctx = get_completion_context(completed_args)\n if not ctx:\n return []\n\n def x(n, m):\n return n.startswith(m)\n\n def x(n, m):\n return n.lower().startswith(m.lower())\n match_func = match_with_case\n ctx_options = [p for p in ctx.command.get_params(ctx) if isinstance(p,\n click.Option)]\n last_completed = None\n if completed_args:\n last_completed = completed_args[-1]\n matching_choice_opt = None\n for p in ctx_options:\n if isinstance(p.type, click.Choice) and last_completed in p.opts:\n matching_choice_opt = p\n choices = []\n if matching_choice_opt:\n if isinstance(matching_choice_opt.type, CaseInsensitiveChoice):\n match_func = match_nocase\n choices = [(x, matching_choice_opt.help) for x in\n matching_choice_opt.type.choices]\n elif cur and cur.startswith('-') and not quoted:\n for param in ctx_options:\n if isinstance(param, HiddenOption):\n continue\n for optset in (param.opts, param.secondary_opts):\n for opt in optset:\n if opt.startswith('--') or len(cur) > 1 and cur[1] != '-':\n choices.append((opt, param.help))\n elif isinstance(ctx.command, click.MultiCommand) and not quoted:\n choices = [(cmdname, ctx.command.get_command(ctx, cmdname).\n short_help) for cmdname in ctx.command.list_commands(ctx)]\n else:\n pass\n if cur:\n choices = [(n, h) for n, h in choices if match_func(n, cur)]\n return choices\n",
"role": "user"
},
{
"content": "get_all_choices",
"role": "assistant"
}
] |
def x(endpoint_id, until, absolute_time):
client = get_client()
res = client.endpoint_get_activation_requirements(endpoint_id)
def x(deadline=None):
exp_string = ''
if deadline is not None:
exp_string = ' or will expire within {} seconds'.format(deadline)
message = 'The endpoint is not activated{}.\n\n'.format(exp_string
) + activation_requirements_help_text(res, endpoint_id)
formatted_print(res, simple_text=message)
click.get_current_context().exit(1)
def x(msg, *format_params):
formatted_print(res, simple_text=msg.format(endpoint_id, *
format_params))
click.get_current_context().exit(0)
if res['expires_in'] == -1:
success('{} does not require activation')
if until is None:
if res.active_until(0):
success('{} is activated')
fail()
if res.active_until(until, relative_time=not absolute_time):
success('{} will be active for at least {} seconds', until)
else:
fail(deadline=until)
|
endpoint_is_activated
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id, until, absolute_time):\n client = get_client()\n res = client.endpoint_get_activation_requirements(endpoint_id)\n\n def x(deadline=None):\n exp_string = ''\n if deadline is not None:\n exp_string = ' or will expire within {} seconds'.format(deadline)\n message = 'The endpoint is not activated{}.\\n\\n'.format(exp_string\n ) + activation_requirements_help_text(res, endpoint_id)\n formatted_print(res, simple_text=message)\n click.get_current_context().exit(1)\n\n def x(msg, *format_params):\n formatted_print(res, simple_text=msg.format(endpoint_id, *\n format_params))\n click.get_current_context().exit(0)\n if res['expires_in'] == -1:\n success('{} does not require activation')\n if until is None:\n if res.active_until(0):\n success('{} is activated')\n fail()\n if res.active_until(until, relative_time=not absolute_time):\n success('{} will be active for at least {} seconds', until)\n else:\n fail(deadline=until)\n",
"role": "user"
},
{
"content": "endpoint_is_activated",
"role": "assistant"
}
] |
def x(**kwargs):
client = get_client()
personal = kwargs.pop('personal')
server = kwargs.pop('server')
shared = kwargs.pop('shared')
if personal and not server and not shared:
endpoint_type = 'personal'
elif server and not personal and not shared:
endpoint_type = 'server'
elif shared and not personal and not server:
endpoint_type = 'shared'
else:
raise click.UsageError(
'Exactly one of --personal, --server, or --shared is required.')
kwargs['is_globus_connect'] = personal or None
validate_endpoint_create_and_update_params(endpoint_type, False, kwargs)
if shared:
endpoint_id, host_path = shared
kwargs['host_endpoint'] = endpoint_id
kwargs['host_path'] = host_path
ep_doc = assemble_generic_doc('shared_endpoint', **kwargs)
autoactivate(client, endpoint_id, if_expires_in=60)
res = client.create_shared_endpoint(ep_doc)
else:
ep_doc = assemble_generic_doc('endpoint', **kwargs)
res = client.create_endpoint(ep_doc)
formatted_print(res, fields=COMMON_FIELDS + GCP_FIELDS if personal else
COMMON_FIELDS, text_format=FORMAT_TEXT_RECORD)
|
endpoint_create
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(**kwargs):\n client = get_client()\n personal = kwargs.pop('personal')\n server = kwargs.pop('server')\n shared = kwargs.pop('shared')\n if personal and not server and not shared:\n endpoint_type = 'personal'\n elif server and not personal and not shared:\n endpoint_type = 'server'\n elif shared and not personal and not server:\n endpoint_type = 'shared'\n else:\n raise click.UsageError(\n 'Exactly one of --personal, --server, or --shared is required.')\n kwargs['is_globus_connect'] = personal or None\n validate_endpoint_create_and_update_params(endpoint_type, False, kwargs)\n if shared:\n endpoint_id, host_path = shared\n kwargs['host_endpoint'] = endpoint_id\n kwargs['host_path'] = host_path\n ep_doc = assemble_generic_doc('shared_endpoint', **kwargs)\n autoactivate(client, endpoint_id, if_expires_in=60)\n res = client.create_shared_endpoint(ep_doc)\n else:\n ep_doc = assemble_generic_doc('endpoint', **kwargs)\n res = client.create_endpoint(ep_doc)\n formatted_print(res, fields=COMMON_FIELDS + GCP_FIELDS if personal else\n COMMON_FIELDS, text_format=FORMAT_TEXT_RECORD)\n",
"role": "user"
},
{
"content": "endpoint_create",
"role": "assistant"
}
] |
def x(endpoint_id, server_id, subject, port, scheme, hostname,
incoming_data_ports, outgoing_data_ports):
client = get_client()
server_doc = assemble_generic_doc('server', subject=subject, port=port,
scheme=scheme, hostname=hostname)
if incoming_data_ports:
server_doc.update(incoming_data_port_start=incoming_data_ports[0],
incoming_data_port_end=incoming_data_ports[1])
if outgoing_data_ports:
server_doc.update(outgoing_data_port_start=outgoing_data_ports[0],
outgoing_data_port_end=outgoing_data_ports[1])
res = client.update_endpoint_server(endpoint_id, server_id, server_doc)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
server_update
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id, server_id, subject, port, scheme, hostname,\n incoming_data_ports, outgoing_data_ports):\n client = get_client()\n server_doc = assemble_generic_doc('server', subject=subject, port=port,\n scheme=scheme, hostname=hostname)\n if incoming_data_ports:\n server_doc.update(incoming_data_port_start=incoming_data_ports[0],\n incoming_data_port_end=incoming_data_ports[1])\n if outgoing_data_ports:\n server_doc.update(outgoing_data_port_start=outgoing_data_ports[0],\n outgoing_data_port_end=outgoing_data_ports[1])\n res = client.update_endpoint_server(endpoint_id, server_id, server_doc)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "server_update",
"role": "assistant"
}
] |
def x():
try:
config = get_config_obj(file_error=True)
except IOError as e:
safeprint(e, write_to_stderr=True)
click.get_current_context().exit(1)
else:
safeprint(config.filename)
|
filename_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n try:\n config = get_config_obj(file_error=True)\n except IOError as e:\n safeprint(e, write_to_stderr=True)\n click.get_current_context().exit(1)\n else:\n safeprint(config.filename)\n",
"role": "user"
},
{
"content": "filename_command",
"role": "assistant"
}
] |
def x(endpoint_id):
client = get_client()
ep_iterator = client.my_shared_endpoint_list(endpoint_id)
formatted_print(ep_iterator, fields=ENDPOINT_LIST_FIELDS)
|
my_shared_endpoint_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id):\n client = get_client()\n ep_iterator = client.my_shared_endpoint_list(endpoint_id)\n formatted_print(ep_iterator, fields=ENDPOINT_LIST_FIELDS)\n",
"role": "user"
},
{
"content": "my_shared_endpoint_list",
"role": "assistant"
}
] |
def x(v):
if not v.startswith('u_'):
return None
if '@' in v:
return None
v = v[2:]
if len(v) != 26:
return None
v = v.upper() + 6 * '='
try:
return str(uuid.UUID(bytes=base64.b32decode(v)))
except ValueError:
return None
|
try_b32_decode
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(v):\n if not v.startswith('u_'):\n return None\n if '@' in v:\n return None\n v = v[2:]\n if len(v) != 26:\n return None\n v = v.upper() + 6 * '='\n try:\n return str(uuid.UUID(bytes=base64.b32decode(v)))\n except ValueError:\n return None\n",
"role": "user"
},
{
"content": "try_b32_decode",
"role": "assistant"
}
] |
def x(values):
client = get_auth_client()
resolved_values = [(_try_b32_decode(v) or v) for v in values]
ids = []
usernames = []
for val in resolved_values:
try:
uuid.UUID(val)
ids.append(val)
except ValueError:
usernames.append(val)
results = []
if len(ids):
results += client.get_identities(ids=ids)['identities']
if len(usernames):
results += client.get_identities(usernames=usernames)['identities']
res = GlobusResponse({'identities': results})
def x(identities):
def x(value):
for identity in identities:
if identity['id'] == value:
return identity['username']
if identity['username'] == value:
return identity['id']
return 'NO_SUCH_IDENTITY'
for val in resolved_values:
safeprint(resolve_identity(val))
formatted_print(res, response_key='identities', fields=[('ID', 'id'), (
'Username', 'username'), ('Full Name', 'name'), ('Organization',
'organization'), ('Email Address', 'email')], text_format=
FORMAT_TEXT_TABLE if is_verbose() else _custom_text_format)
|
get_identities_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(values):\n client = get_auth_client()\n resolved_values = [(_try_b32_decode(v) or v) for v in values]\n ids = []\n usernames = []\n for val in resolved_values:\n try:\n uuid.UUID(val)\n ids.append(val)\n except ValueError:\n usernames.append(val)\n results = []\n if len(ids):\n results += client.get_identities(ids=ids)['identities']\n if len(usernames):\n results += client.get_identities(usernames=usernames)['identities']\n res = GlobusResponse({'identities': results})\n\n def x(identities):\n\n def x(value):\n for identity in identities:\n if identity['id'] == value:\n return identity['username']\n if identity['username'] == value:\n return identity['id']\n return 'NO_SUCH_IDENTITY'\n for val in resolved_values:\n safeprint(resolve_identity(val))\n formatted_print(res, response_key='identities', fields=[('ID', 'id'), (\n 'Username', 'username'), ('Full Name', 'name'), ('Organization',\n 'organization'), ('Email Address', 'email')], text_format=\n FORMAT_TEXT_TABLE if is_verbose() else _custom_text_format)\n",
"role": "user"
},
{
"content": "get_identities_command",
"role": "assistant"
}
] |
def x(res):
supported = ['web']
if res['oauth_server']:
supported.append('oauth')
for req in res['DATA']:
if req['type'] == 'myproxy' and req['name'] == 'hostname' and req[
'value'] != 'myproxy.globusonline.org':
supported.append('myproxy')
if req['type'] == 'delegate_proxy' and req['name'] == 'public_key':
supported.append('delegate_proxy')
return supported
|
supported_activation_methods
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(res):\n supported = ['web']\n if res['oauth_server']:\n supported.append('oauth')\n for req in res['DATA']:\n if req['type'] == 'myproxy' and req['name'] == 'hostname' and req[\n 'value'] != 'myproxy.globusonline.org':\n supported.append('myproxy')\n if req['type'] == 'delegate_proxy' and req['name'] == 'public_key':\n supported.append('delegate_proxy')\n return supported\n",
"role": "user"
},
{
"content": "supported_activation_methods",
"role": "assistant"
}
] |
def x(res, ep_id):
methods = supported_activation_methods(res)
lines = ['This endpoint supports the following activation methods: ',
', '.join(methods).replace('_', ' '), '\n',
"""For web activation use:
'globus endpoint activate --web {}'
""".
format(ep_id) if 'web' in methods else '',
"""For myproxy activation use:
'globus endpoint activate --myproxy {}'
"""
.format(ep_id) if 'myproxy' in methods else '',
"""For oauth activation use web activation:
'globus endpoint activate --web {}'
"""
.format(ep_id) if 'oauth' in methods else '',
"""For delegate proxy activation use:
'globus endpoint activate --delegate-proxy X.509_PEM_FILE {}'
"""
.format(ep_id) if 'delegate_proxy' in methods else '',
"""Delegate proxy activation requires an additional dependency on cryptography. See the docs for details:
https://docs.globus.org/cli/reference/endpoint_activate/
"""
if 'delegate_proxy' in methods else '']
return ''.join(lines)
|
activation_requirements_help_text
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(res, ep_id):\n methods = supported_activation_methods(res)\n lines = ['This endpoint supports the following activation methods: ',\n ', '.join(methods).replace('_', ' '), '\\n', \n \"\"\"For web activation use:\n'globus endpoint activate --web {}'\n\"\"\".\n format(ep_id) if 'web' in methods else '', \n \"\"\"For myproxy activation use:\n'globus endpoint activate --myproxy {}'\n\"\"\"\n .format(ep_id) if 'myproxy' in methods else '', \n \"\"\"For oauth activation use web activation:\n'globus endpoint activate --web {}'\n\"\"\"\n .format(ep_id) if 'oauth' in methods else '', \n \"\"\"For delegate proxy activation use:\n'globus endpoint activate --delegate-proxy X.509_PEM_FILE {}'\n\"\"\"\n .format(ep_id) if 'delegate_proxy' in methods else '', \n \"\"\"Delegate proxy activation requires an additional dependency on cryptography. See the docs for details:\nhttps://docs.globus.org/cli/reference/endpoint_activate/\n\"\"\"\n if 'delegate_proxy' in methods else '']\n return ''.join(lines)\n",
"role": "user"
},
{
"content": "activation_requirements_help_text",
"role": "assistant"
}
] |
def x(client, endpoint_id, if_expires_in=None):
kwargs = {}
if if_expires_in is not None:
kwargs['if_expires_in'] = if_expires_in
res = client.endpoint_autoactivate(endpoint_id, **kwargs)
if res['code'] == 'AutoActivationFailed':
message = (
"""The endpoint could not be auto-activated and must be activated before it can be used.
"""
+ activation_requirements_help_text(res, endpoint_id))
safeprint(message, write_to_stderr=True)
click.get_current_context().exit(1)
else:
return res
|
autoactivate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(client, endpoint_id, if_expires_in=None):\n kwargs = {}\n if if_expires_in is not None:\n kwargs['if_expires_in'] = if_expires_in\n res = client.endpoint_autoactivate(endpoint_id, **kwargs)\n if res['code'] == 'AutoActivationFailed':\n message = (\n \"\"\"The endpoint could not be auto-activated and must be activated before it can be used.\n\n\"\"\"\n + activation_requirements_help_text(res, endpoint_id))\n safeprint(message, write_to_stderr=True)\n click.get_current_context().exit(1)\n else:\n return res\n",
"role": "user"
},
{
"content": "autoactivate",
"role": "assistant"
}
] |
def x(endpoint_id):
client = get_client()
endpoint = client.get_endpoint(endpoint_id)
if endpoint['host_endpoint_id']:
raise click.UsageError(dedent(
u""" {id} ({0}) is a share and does not have servers.
To see details of the share, use
globus endpoint show {id}
To list the servers on the share's host endpoint, use
globus endpoint server list {host_endpoint_id}
"""
).format(display_name_or_cname(endpoint), **endpoint.data))
if endpoint['s3_url']:
return endpoint, 'S3'
else:
return endpoint, client.endpoint_server_list(endpoint_id)
|
get_endpoint_w_server_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id):\n client = get_client()\n endpoint = client.get_endpoint(endpoint_id)\n if endpoint['host_endpoint_id']:\n raise click.UsageError(dedent(\n u\"\"\" {id} ({0}) is a share and does not have servers.\n\n To see details of the share, use\n globus endpoint show {id}\n\n To list the servers on the share's host endpoint, use\n globus endpoint server list {host_endpoint_id}\n \"\"\"\n ).format(display_name_or_cname(endpoint), **endpoint.data))\n if endpoint['s3_url']:\n return endpoint, 'S3'\n else:\n return endpoint, client.endpoint_server_list(endpoint_id)\n",
"role": "user"
},
{
"content": "get_endpoint_w_server_list",
"role": "assistant"
}
] |
def x(meow, heartbeat, polling_interval, timeout, task_id,
timeout_exit_code, client=None):
client = client or get_client()
def x(waited_time):
if timeout is None:
return False
else:
return waited_time >= timeout
def x():
completed = client.task_wait(task_id, timeout=polling_interval,
polling_interval=polling_interval)
if completed:
if heartbeat:
safeprint('', write_to_stderr=True)
if meow:
safeprint(
"""
_..
/}_{\\ /.-'
( a a )-.___...-'/
==._.== ;
\\ i _..._ /,
{_;/ {_//"""
, write_to_stderr=True)
res = client.get_task(task_id)
formatted_print(res, text_format=FORMAT_SILENT)
status = res['status']
if status == 'SUCCEEDED':
click.get_current_context().exit(0)
else:
click.get_current_context().exit(1)
return completed
if meow:
safeprint(
"""
|\\ _,,,---,,_
/,`.-'`' -. ;-;;,_
|,4- ) )-,_..;\\ ( `'-'
'---''(_/--' `-'\\_)"""
, write_to_stderr=True)
waited_time = 0
while not timed_out(waited_time) and not check_completed():
if heartbeat:
safeprint('.', write_to_stderr=True, newline=False)
sys.stderr.flush()
waited_time += polling_interval
if heartbeat:
safeprint('', write_to_stderr=True)
exit_code = 1
if timed_out(waited_time):
safeprint('Task has yet to complete after {} seconds'.format(
timeout), write_to_stderr=True)
exit_code = timeout_exit_code
res = client.get_task(task_id)
formatted_print(res, text_format=FORMAT_SILENT)
click.get_current_context().exit(exit_code)
|
task_wait_with_io
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(meow, heartbeat, polling_interval, timeout, task_id,\n timeout_exit_code, client=None):\n client = client or get_client()\n\n def x(waited_time):\n if timeout is None:\n return False\n else:\n return waited_time >= timeout\n\n def x():\n completed = client.task_wait(task_id, timeout=polling_interval,\n polling_interval=polling_interval)\n if completed:\n if heartbeat:\n safeprint('', write_to_stderr=True)\n if meow:\n safeprint(\n \"\"\"\n _..\n /}_{\\\\ /.-'\n ( a a )-.___...-'/\n ==._.== ;\n \\\\ i _..._ /,\n {_;/ {_//\"\"\"\n , write_to_stderr=True)\n res = client.get_task(task_id)\n formatted_print(res, text_format=FORMAT_SILENT)\n status = res['status']\n if status == 'SUCCEEDED':\n click.get_current_context().exit(0)\n else:\n click.get_current_context().exit(1)\n return completed\n if meow:\n safeprint(\n \"\"\"\n |\\\\ _,,,---,,_\n /,`.-'`' -. ;-;;,_\n |,4- ) )-,_..;\\\\ ( `'-'\n '---''(_/--' `-'\\\\_)\"\"\"\n , write_to_stderr=True)\n waited_time = 0\n while not timed_out(waited_time) and not check_completed():\n if heartbeat:\n safeprint('.', write_to_stderr=True, newline=False)\n sys.stderr.flush()\n waited_time += polling_interval\n if heartbeat:\n safeprint('', write_to_stderr=True)\n exit_code = 1\n if timed_out(waited_time):\n safeprint('Task has yet to complete after {} seconds'.format(\n timeout), write_to_stderr=True)\n exit_code = timeout_exit_code\n res = client.get_task(task_id)\n formatted_print(res, text_format=FORMAT_SILENT)\n click.get_current_context().exit(exit_code)\n",
"role": "user"
},
{
"content": "task_wait_with_io",
"role": "assistant"
}
] |
def x(self, f, *args, **kwargs):
backoff = random.random() / 100
for _ in range(self.tries - 1):
try:
return f(*args, **kwargs)
except NetworkError:
time.sleep(backoff)
backoff *= 2
return f(*args, **kwargs)
|
retry
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, f, *args, **kwargs):\n backoff = random.random() / 100\n for _ in range(self.tries - 1):\n try:\n return f(*args, **kwargs)\n except NetworkError:\n time.sleep(backoff)\n backoff *= 2\n return f(*args, **kwargs)\n",
"role": "user"
},
{
"content": "retry",
"role": "assistant"
}
] |
def x(self, endpoint_id, depth=3, filter_after_first=True, **params):
endpoint_id = safe_stringify(endpoint_id)
self.logger.info('TransferClient.recursive_operation_ls({}, {}, {})'.
format(endpoint_id, depth, params))
return RecursiveLsResponse(self, endpoint_id, depth, filter_after_first,
params)
|
recursive_operation_ls
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, endpoint_id, depth=3, filter_after_first=True, **params):\n endpoint_id = safe_stringify(endpoint_id)\n self.logger.info('TransferClient.recursive_operation_ls({}, {}, {})'.\n format(endpoint_id, depth, params))\n return RecursiveLsResponse(self, endpoint_id, depth, filter_after_first,\n params)\n",
"role": "user"
},
{
"content": "recursive_operation_ls",
"role": "assistant"
}
] |
def x(self, value, param, ctx):
if value is None or isinstance(value, tuple):
return value
splitval = value.split(':', 1)
endpoint_id = click.UUID(splitval[0])
try:
path = splitval[1]
except IndexError:
path = None
path = path or None
if path is None and self.path_required:
self.fail('The path component is required', param=param)
return endpoint_id, path
|
convert
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, value, param, ctx):\n if value is None or isinstance(value, tuple):\n return value\n splitval = value.split(':', 1)\n endpoint_id = click.UUID(splitval[0])\n try:\n path = splitval[1]\n except IndexError:\n path = None\n path = path or None\n if path is None and self.path_required:\n self.fail('The path component is required', param=param)\n return endpoint_id, path\n",
"role": "user"
},
{
"content": "convert",
"role": "assistant"
}
] |
def x(all, task_id):
if bool(all) + bool(task_id) != 1:
raise click.UsageError(
'You must pass EITHER the special --all flag to cancel all in-progress tasks OR a single task ID to cancel.'
)
client = get_client()
if all:
from sys import maxsize
task_ids = [task_row['task_id'] for task_row in client.task_list(
filter='type:TRANSFER,DELETE/status:ACTIVE,INACTIVE', fields=
'task_id', num_results=maxsize)]
task_count = len(task_ids)
if not task_ids:
raise click.ClickException('You have no in-progress tasks.')
def x():
for i in task_ids:
yield i, client.cancel_task(i).data
def x(res):
return {'results': [x for i, x in cancellation_iterator()],
'task_ids': task_ids}
def x(res):
for i, (task_id, data) in enumerate(cancellation_iterator(),
start=1):
safeprint(u'{} ({} of {}): {}'.format(task_id, i,
task_count, data['message']))
formatted_print(None, text_format=_custom_text, json_converter=
json_converter)
else:
res = client.cancel_task(task_id)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key=
'message')
|
cancel_task
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(all, task_id):\n if bool(all) + bool(task_id) != 1:\n raise click.UsageError(\n 'You must pass EITHER the special --all flag to cancel all in-progress tasks OR a single task ID to cancel.'\n )\n client = get_client()\n if all:\n from sys import maxsize\n task_ids = [task_row['task_id'] for task_row in client.task_list(\n filter='type:TRANSFER,DELETE/status:ACTIVE,INACTIVE', fields=\n 'task_id', num_results=maxsize)]\n task_count = len(task_ids)\n if not task_ids:\n raise click.ClickException('You have no in-progress tasks.')\n\n def x():\n for i in task_ids:\n yield i, client.cancel_task(i).data\n\n def x(res):\n return {'results': [x for i, x in cancellation_iterator()],\n 'task_ids': task_ids}\n\n def x(res):\n for i, (task_id, data) in enumerate(cancellation_iterator(),\n start=1):\n safeprint(u'{} ({} of {}): {}'.format(task_id, i,\n task_count, data['message']))\n formatted_print(None, text_format=_custom_text, json_converter=\n json_converter)\n else:\n res = client.cancel_task(task_id)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key=\n 'message')\n",
"role": "user"
},
{
"content": "cancel_task",
"role": "assistant"
}
] |
def x(meow, heartbeat, polling_interval, timeout, task_id, timeout_exit_code):
task_wait_with_io(meow, heartbeat, polling_interval, timeout, task_id,
timeout_exit_code)
|
task_wait
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(meow, heartbeat, polling_interval, timeout, task_id, timeout_exit_code):\n task_wait_with_io(meow, heartbeat, polling_interval, timeout, task_id,\n timeout_exit_code)\n",
"role": "user"
},
{
"content": "task_wait",
"role": "assistant"
}
] |
def x(*args, **kwargs):
if 'multiple' in kwargs or 'count' in kwargs:
raise ValueError(
'Internal error, one_use_option cannot be used with multiple or count.'
)
if kwargs.get('cls'):
raise TypeError(
'Internal error, one_use_option cannot overwrite cls {}.'.
format(kwargs.get('cls')))
kwargs['cls'] = OneUseOption
if kwargs.get('is_flag'):
kwargs['is_flag'] = False
kwargs['count'] = True
else:
kwargs['multiple'] = True
def x(f):
return click.option(*args, **kwargs)(f)
return decorator
|
one_use_option
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n if 'multiple' in kwargs or 'count' in kwargs:\n raise ValueError(\n 'Internal error, one_use_option cannot be used with multiple or count.'\n )\n if kwargs.get('cls'):\n raise TypeError(\n 'Internal error, one_use_option cannot overwrite cls {}.'.\n format(kwargs.get('cls')))\n kwargs['cls'] = OneUseOption\n if kwargs.get('is_flag'):\n kwargs['is_flag'] = False\n kwargs['count'] = True\n else:\n kwargs['multiple'] = True\n\n def x(f):\n return click.option(*args, **kwargs)(f)\n return decorator\n",
"role": "user"
},
{
"content": "one_use_option",
"role": "assistant"
}
] |
def x(server_list, server_spec, mode):
assert mode in ('uri', 'hostname', 'hostname_port')
def x(server_doc):
if mode == 'hostname':
return server_spec == server_doc['hostname']
elif mode == 'hostname_port':
return server_spec == '{}:{}'.format(server_doc['hostname'],
server_doc['port'])
elif mode == 'uri':
return server_spec == '{}://{}:{}'.format(server_doc['scheme'],
server_doc['hostname'], server_doc['port'])
else:
raise NotImplementedError(
'Unreachable error! Something is very wrong.')
return [server_doc for server_doc in server_list if match(server_doc)]
|
spec_to_matches
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(server_list, server_spec, mode):\n assert mode in ('uri', 'hostname', 'hostname_port')\n\n def x(server_doc):\n if mode == 'hostname':\n return server_spec == server_doc['hostname']\n elif mode == 'hostname_port':\n return server_spec == '{}:{}'.format(server_doc['hostname'],\n server_doc['port'])\n elif mode == 'uri':\n return server_spec == '{}://{}:{}'.format(server_doc['scheme'],\n server_doc['hostname'], server_doc['port'])\n else:\n raise NotImplementedError(\n 'Unreachable error! Something is very wrong.')\n return [server_doc for server_doc in server_list if match(server_doc)]\n",
"role": "user"
},
{
"content": "spec_to_matches",
"role": "assistant"
}
] |
def x(endpoint_id, server):
client = get_client()
mode = _detect_mode(server)
endpoint, server_list = get_endpoint_w_server_list(endpoint_id)
if server_list == 'S3':
raise click.UsageError('You cannot delete servers from S3 endpoints.')
if endpoint['is_globus_connect']:
raise click.UsageError(
'You cannot delete servers from Globus Connect Personal endpoints')
if mode != 'id':
matches = _spec_to_matches(server_list, server, mode)
if not matches:
raise click.UsageError('No server was found matching "{}"'.
format(server))
elif len(matches) > 1:
raise click.UsageError(dedent(
""" Multiple servers matched "{}":
{}
"""
).format(server, [x['id'] for x in matches]))
else:
server = matches[0]['id']
response = client.delete_endpoint_server(endpoint_id, server)
formatted_print(response, text_format=FORMAT_TEXT_RAW, response_key=
'message')
|
server_delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id, server):\n client = get_client()\n mode = _detect_mode(server)\n endpoint, server_list = get_endpoint_w_server_list(endpoint_id)\n if server_list == 'S3':\n raise click.UsageError('You cannot delete servers from S3 endpoints.')\n if endpoint['is_globus_connect']:\n raise click.UsageError(\n 'You cannot delete servers from Globus Connect Personal endpoints')\n if mode != 'id':\n matches = _spec_to_matches(server_list, server, mode)\n if not matches:\n raise click.UsageError('No server was found matching \"{}\"'.\n format(server))\n elif len(matches) > 1:\n raise click.UsageError(dedent(\n \"\"\" Multiple servers matched \"{}\":\n {}\n \"\"\"\n ).format(server, [x['id'] for x in matches]))\n else:\n server = matches[0]['id']\n response = client.delete_endpoint_server(endpoint_id, server)\n formatted_print(response, text_format=FORMAT_TEXT_RAW, response_key=\n 'message')\n",
"role": "user"
},
{
"content": "server_delete",
"role": "assistant"
}
] |
def x(parameter):
conf = get_config_obj()
section = 'cli'
if '.' in parameter:
section, parameter = parameter.split('.', 1)
if section not in conf:
conf[section] = {}
del conf[section][parameter]
safeprint('Writing updated config to {}'.format(conf.filename))
conf.write()
|
remove_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(parameter):\n conf = get_config_obj()\n section = 'cli'\n if '.' in parameter:\n section, parameter = parameter.split('.', 1)\n if section not in conf:\n conf[section] = {}\n del conf[section][parameter]\n safeprint('Writing updated config to {}'.format(conf.filename))\n conf.write()\n",
"role": "user"
},
{
"content": "remove_command",
"role": "assistant"
}
] |
def x(endpoint_id, rule_id):
client = get_client()
rule = client.get_endpoint_acl_rule(endpoint_id, rule_id)
formatted_print(rule, text_format=FORMAT_TEXT_RECORD, fields=((
'Rule ID', 'id'), ('Permissions', 'permissions'), ('Shared With',
_shared_with_keyfunc), ('Path', 'path')))
|
show_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id, rule_id):\n client = get_client()\n rule = client.get_endpoint_acl_rule(endpoint_id, rule_id)\n formatted_print(rule, text_format=FORMAT_TEXT_RECORD, fields=((\n 'Rule ID', 'id'), ('Permissions', 'permissions'), ('Shared With',\n _shared_with_keyfunc), ('Path', 'path')))\n",
"role": "user"
},
{
"content": "show_command",
"role": "assistant"
}
] |
def x(bookmark_id_or_name, new_bookmark_name):
client = get_client()
bookmark_id = resolve_id_or_name(client, bookmark_id_or_name)['id']
submit_data = {'name': new_bookmark_name}
res = client.update_bookmark(bookmark_id, submit_data)
formatted_print(res, simple_text='Success')
|
bookmark_rename
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(bookmark_id_or_name, new_bookmark_name):\n client = get_client()\n bookmark_id = resolve_id_or_name(client, bookmark_id_or_name)['id']\n submit_data = {'name': new_bookmark_name}\n res = client.update_bookmark(bookmark_id, submit_data)\n formatted_print(res, simple_text='Success')\n",
"role": "user"
},
{
"content": "bookmark_rename",
"role": "assistant"
}
] |
def x(parameter):
section = 'cli'
if '.' in parameter:
section, parameter = parameter.split('.', 1)
value = lookup_option(parameter, section=section)
if value is None:
safeprint('{} not set'.format(parameter))
else:
safeprint('{} = {}'.format(parameter, value))
|
show_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(parameter):\n section = 'cli'\n if '.' in parameter:\n section, parameter = parameter.split('.', 1)\n value = lookup_option(parameter, section=section)\n if value is None:\n safeprint('{} not set'.format(parameter))\n else:\n safeprint('{} = {}'.format(parameter, value))\n",
"role": "user"
},
{
"content": "show_command",
"role": "assistant"
}
] |
def x(source, destination):
source_ep, source_path = source
dest_ep, dest_path = destination
if source_ep != dest_ep:
raise click.UsageError(
'rename requires that the source and dest endpoints are the same, {} != {}'
.format(source_ep, dest_ep))
endpoint_id = source_ep
client = get_client()
autoactivate(client, endpoint_id, if_expires_in=60)
res = client.operation_rename(endpoint_id, oldpath=source_path, newpath
=dest_path)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
rename_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(source, destination):\n source_ep, source_path = source\n dest_ep, dest_path = destination\n if source_ep != dest_ep:\n raise click.UsageError(\n 'rename requires that the source and dest endpoints are the same, {} != {}'\n .format(source_ep, dest_ep))\n endpoint_id = source_ep\n client = get_client()\n autoactivate(client, endpoint_id, if_expires_in=60)\n res = client.operation_rename(endpoint_id, oldpath=source_path, newpath\n =dest_path)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "rename_command",
"role": "assistant"
}
] |
def x(endpoint_id):
client = get_client()
res = client.get_endpoint(endpoint_id)
formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=GCP_FIELDS if
res['is_globus_connect'] else STANDARD_FIELDS)
|
endpoint_show
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id):\n client = get_client()\n res = client.get_endpoint(endpoint_id)\n formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=GCP_FIELDS if\n res['is_globus_connect'] else STANDARD_FIELDS)\n",
"role": "user"
},
{
"content": "endpoint_show",
"role": "assistant"
}
] |
def x(permissions, rule_id, endpoint_id):
client = get_client()
rule_data = assemble_generic_doc('access', permissions=permissions)
res = client.update_endpoint_acl_rule(endpoint_id, rule_id, rule_data)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
update_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(permissions, rule_id, endpoint_id):\n client = get_client()\n rule_data = assemble_generic_doc('access', permissions=permissions)\n res = client.update_endpoint_acl_rule(endpoint_id, rule_id, rule_data)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "update_command",
"role": "assistant"
}
] |
def x(self, val):
name = self.name + ':'
if not self.multiline or '\n' not in val:
val = u'{0} {1}'.format(name.ljust(self._text_prefix_len), val)
else:
spacer = '\n' + ' ' * (self._text_prefix_len + 1)
val = u'{0}{1}{2}'.format(name, spacer, spacer.join(val.split('\n')))
return val
|
format_value
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, val):\n name = self.name + ':'\n if not self.multiline or '\\n' not in val:\n val = u'{0} {1}'.format(name.ljust(self._text_prefix_len), val)\n else:\n spacer = '\\n' + ' ' * (self._text_prefix_len + 1)\n val = u'{0}{1}{2}'.format(name, spacer, spacer.join(val.split('\\n')))\n return val\n",
"role": "user"
},
{
"content": "format_value",
"role": "assistant"
}
] |
def x(endpoint_id, rule_id):
client = get_client()
res = client.delete_endpoint_acl_rule(endpoint_id, rule_id)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
delete_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id, rule_id):\n client = get_client()\n res = client.delete_endpoint_acl_rule(endpoint_id, rule_id)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "delete_command",
"role": "assistant"
}
] |
def x(batch, sync_level, recursive, destination, source, label,
preserve_mtime, verify_checksum, encrypt, submission_id, dry_run,
delete, deadline, skip_activation_check, notify, perf_cc, perf_p,
perf_pp, perf_udt):
source_endpoint, cmd_source_path = source
dest_endpoint, cmd_dest_path = destination
if recursive and batch:
raise click.UsageError(
'You cannot use --recursive in addition to --batch. Instead, use --recursive on lines of --batch input which need it'
)
if (cmd_source_path is None or cmd_dest_path is None) and not batch:
raise click.UsageError(
'transfer requires either SOURCE_PATH and DEST_PATH or --batch')
kwargs = {}
perf_opts = dict((k, v) for k, v in dict(perf_cc=perf_cc, perf_p=perf_p,
perf_pp=perf_pp, perf_udt=perf_udt).items() if v is not None)
kwargs.update(perf_opts)
kwargs.update(notify)
client = get_client()
transfer_data = TransferData(client, source_endpoint, dest_endpoint,
label=label, sync_level=sync_level, verify_checksum=verify_checksum,
preserve_timestamp=preserve_mtime, encrypt_data=encrypt,
submission_id=submission_id, delete_destination_extra=delete,
deadline=deadline, skip_activation_check=skip_activation_check, **
kwargs)
if batch:
@click.command()
@click.option('--recursive', '-r', is_flag=True)
@click.argument('source_path', type=TaskPath(base_dir=cmd_source_path))
@click.argument('dest_path', type=TaskPath(base_dir=cmd_dest_path))
def x(dest_path, source_path, recursive):
transfer_data.add_item(str(source_path), str(dest_path),
recursive=recursive)
shlex_process_stdin(process_batch_line,
"""Enter transfers, line by line, as
[--recursive] SOURCE_PATH DEST_PATH
"""
)
else:
transfer_data.add_item(cmd_source_path, cmd_dest_path, recursive=
recursive)
if dry_run:
formatted_print(transfer_data, response_key='DATA', fields=((
'Source Path', 'source_path'), ('Dest Path', 'destination_path'
), ('Recursive', 'recursive')))
return
if not skip_activation_check:
autoactivate(client, source_endpoint, if_expires_in=60)
autoactivate(client, dest_endpoint, if_expires_in=60)
res = client.submit_transfer(transfer_data)
formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=(('Message',
'message'), ('Task ID', 'task_id')))
|
transfer_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(batch, sync_level, recursive, destination, source, label,\n preserve_mtime, verify_checksum, encrypt, submission_id, dry_run,\n delete, deadline, skip_activation_check, notify, perf_cc, perf_p,\n perf_pp, perf_udt):\n source_endpoint, cmd_source_path = source\n dest_endpoint, cmd_dest_path = destination\n if recursive and batch:\n raise click.UsageError(\n 'You cannot use --recursive in addition to --batch. Instead, use --recursive on lines of --batch input which need it'\n )\n if (cmd_source_path is None or cmd_dest_path is None) and not batch:\n raise click.UsageError(\n 'transfer requires either SOURCE_PATH and DEST_PATH or --batch')\n kwargs = {}\n perf_opts = dict((k, v) for k, v in dict(perf_cc=perf_cc, perf_p=perf_p,\n perf_pp=perf_pp, perf_udt=perf_udt).items() if v is not None)\n kwargs.update(perf_opts)\n kwargs.update(notify)\n client = get_client()\n transfer_data = TransferData(client, source_endpoint, dest_endpoint,\n label=label, sync_level=sync_level, verify_checksum=verify_checksum,\n preserve_timestamp=preserve_mtime, encrypt_data=encrypt,\n submission_id=submission_id, delete_destination_extra=delete,\n deadline=deadline, skip_activation_check=skip_activation_check, **\n kwargs)\n if batch:\n\n @click.command()\n @click.option('--recursive', '-r', is_flag=True)\n @click.argument('source_path', type=TaskPath(base_dir=cmd_source_path))\n @click.argument('dest_path', type=TaskPath(base_dir=cmd_dest_path))\n def x(dest_path, source_path, recursive):\n transfer_data.add_item(str(source_path), str(dest_path),\n recursive=recursive)\n shlex_process_stdin(process_batch_line,\n \"\"\"Enter transfers, line by line, as\n\n [--recursive] SOURCE_PATH DEST_PATH\n\"\"\"\n )\n else:\n transfer_data.add_item(cmd_source_path, cmd_dest_path, recursive=\n recursive)\n if dry_run:\n formatted_print(transfer_data, response_key='DATA', fields=((\n 'Source Path', 'source_path'), ('Dest Path', 'destination_path'\n ), ('Recursive', 'recursive')))\n return\n if not skip_activation_check:\n autoactivate(client, source_endpoint, if_expires_in=60)\n autoactivate(client, dest_endpoint, if_expires_in=60)\n res = client.submit_transfer(transfer_data)\n formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=(('Message',\n 'message'), ('Task ID', 'task_id')))\n",
"role": "user"
},
{
"content": "transfer_command",
"role": "assistant"
}
] |
def x(endpoint_id):
client = get_client()
res = client.delete_endpoint(endpoint_id)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
endpoint_delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id):\n client = get_client()\n res = client.delete_endpoint(endpoint_id)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "endpoint_delete",
"role": "assistant"
}
] |
def x(bookmark_id_or_name):
client = get_client()
bookmark_id = resolve_id_or_name(client, bookmark_id_or_name)['id']
res = client.delete_bookmark(bookmark_id)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
bookmark_delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(bookmark_id_or_name):\n client = get_client()\n bookmark_id = resolve_id_or_name(client, bookmark_id_or_name)['id']\n res = client.delete_bookmark(bookmark_id)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "bookmark_delete",
"role": "assistant"
}
] |
def x(endpoint_plus_path):
endpoint_id, path = endpoint_plus_path
client = get_client()
autoactivate(client, endpoint_id, if_expires_in=60)
res = client.operation_mkdir(endpoint_id, path=path)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
mkdir_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_plus_path):\n endpoint_id, path = endpoint_plus_path\n client = get_client()\n autoactivate(client, endpoint_id, if_expires_in=60)\n res = client.operation_mkdir(endpoint_id, path=path)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "mkdir_command",
"role": "assistant"
}
] |
def x(default_output_format, default_myproxy_username):
if not default_output_format:
safeprint(textwrap.fill(
'This must be one of "json" or "text". Other values will be ignored. ENTER to skip.'
))
default_output_format = click.prompt(
'Default CLI output format (cli.output_format)', default='text'
).strip().lower()
if default_output_format not in ('json', 'text'):
default_output_format = None
if not default_myproxy_username:
safeprint(textwrap.fill('ENTER to skip.'))
default_myproxy_username = click.prompt(
'Default myproxy username (cli.default_myproxy_username)',
default='', show_default=False).strip()
safeprint('\n\nWriting updated config to {0}'.format(os.path.expanduser
('~/.globus.cfg')))
write_option(OUTPUT_FORMAT_OPTNAME, default_output_format)
write_option(MYPROXY_USERNAME_OPTNAME, default_myproxy_username)
|
init_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(default_output_format, default_myproxy_username):\n if not default_output_format:\n safeprint(textwrap.fill(\n 'This must be one of \"json\" or \"text\". Other values will be ignored. ENTER to skip.'\n ))\n default_output_format = click.prompt(\n 'Default CLI output format (cli.output_format)', default='text'\n ).strip().lower()\n if default_output_format not in ('json', 'text'):\n default_output_format = None\n if not default_myproxy_username:\n safeprint(textwrap.fill('ENTER to skip.'))\n default_myproxy_username = click.prompt(\n 'Default myproxy username (cli.default_myproxy_username)',\n default='', show_default=False).strip()\n safeprint('\\n\\nWriting updated config to {0}'.format(os.path.expanduser\n ('~/.globus.cfg')))\n write_option(OUTPUT_FORMAT_OPTNAME, default_output_format)\n write_option(MYPROXY_USERNAME_OPTNAME, default_myproxy_username)\n",
"role": "user"
},
{
"content": "init_command",
"role": "assistant"
}
] |
def x(decorator, args, kwargs):
if len(args) == 1 and len(kwargs) == 0 and callable(args[0]):
return decorator(args[0])
elif len(args) != 0:
raise ValueError('this decorator cannot take positional args')
else:
def x(f):
return decorator(f, **kwargs)
return inner_decorator
|
detect_and_decorate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(decorator, args, kwargs):\n if len(args) == 1 and len(kwargs) == 0 and callable(args[0]):\n return decorator(args[0])\n elif len(args) != 0:\n raise ValueError('this decorator cannot take positional args')\n else:\n\n def x(f):\n return decorator(f, **kwargs)\n return inner_decorator\n",
"role": "user"
},
{
"content": "detect_and_decorate",
"role": "assistant"
}
] |
def x(endpoint_id):
client = get_client()
rules = client.endpoint_acl_list(endpoint_id)
resolved_ids = LazyIdentityMap(x['principal'] for x in rules if x[
'principal_type'] == 'identity')
def x(rule):
principal = rule['principal']
if rule['principal_type'] == 'identity':
username = resolved_ids.get(principal)
return username or principal
elif rule['principal_type'] == 'group':
return u'https://app.globus.org/groups/{}'.format(principal)
else:
principal = rule['principal_type']
return principal
formatted_print(rules, fields=[('Rule ID', 'id'), ('Permissions',
'permissions'), ('Shared With', principal_str), ('Path', 'path')])
|
list_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id):\n client = get_client()\n rules = client.endpoint_acl_list(endpoint_id)\n resolved_ids = LazyIdentityMap(x['principal'] for x in rules if x[\n 'principal_type'] == 'identity')\n\n def x(rule):\n principal = rule['principal']\n if rule['principal_type'] == 'identity':\n username = resolved_ids.get(principal)\n return username or principal\n elif rule['principal_type'] == 'group':\n return u'https://app.globus.org/groups/{}'.format(principal)\n else:\n principal = rule['principal_type']\n return principal\n formatted_print(rules, fields=[('Rule ID', 'id'), ('Permissions',\n 'permissions'), ('Shared With', principal_str), ('Path', 'path')])\n",
"role": "user"
},
{
"content": "list_command",
"role": "assistant"
}
] |
def x():
client = get_client()
bookmark_iterator = client.bookmark_list()
def x(item):
ep_id = item['endpoint_id']
try:
ep_doc = client.get_endpoint(ep_id)
return display_name_or_cname(ep_doc)
except TransferAPIError as err:
if err.code == 'EndpointDeleted':
return '[DELETED ENDPOINT]'
else:
raise err
formatted_print(bookmark_iterator, fields=[('Name', 'name'), (
'Bookmark ID', 'id'), ('Endpoint ID', 'endpoint_id'), (
'Endpoint Name', get_ep_name), ('Path', 'path')], response_key=
'DATA', json_converter=iterable_response_to_dict)
|
bookmark_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n client = get_client()\n bookmark_iterator = client.bookmark_list()\n\n def x(item):\n ep_id = item['endpoint_id']\n try:\n ep_doc = client.get_endpoint(ep_id)\n return display_name_or_cname(ep_doc)\n except TransferAPIError as err:\n if err.code == 'EndpointDeleted':\n return '[DELETED ENDPOINT]'\n else:\n raise err\n formatted_print(bookmark_iterator, fields=[('Name', 'name'), (\n 'Bookmark ID', 'id'), ('Endpoint ID', 'endpoint_id'), (\n 'Endpoint Name', get_ep_name), ('Path', 'path')], response_key=\n 'DATA', json_converter=iterable_response_to_dict)\n",
"role": "user"
},
{
"content": "bookmark_list",
"role": "assistant"
}
] |
def x(ignore_missing, star_silent, recursive, enable_globs,
endpoint_plus_path, label, submission_id, dry_run, deadline,
skip_activation_check, notify, meow, heartbeat, polling_interval,
timeout, timeout_exit_code):
endpoint_id, path = endpoint_plus_path
client = get_client()
if not skip_activation_check:
autoactivate(client, endpoint_id, if_expires_in=60)
delete_data = DeleteData(client, endpoint_id, label=label, recursive=
recursive, ignore_missing=ignore_missing, submission_id=
submission_id, deadline=deadline, skip_activation_check=
skip_activation_check, interpret_globs=enable_globs, **notify)
if not star_silent and enable_globs and path.endswith('*'):
if err_is_terminal() and term_is_interactive() and not click.confirm(
'Are you sure you want to delete all files matching "{}"?'.
format(path), err=True):
safeprint('Aborted.', write_to_stderr=True)
click.get_current_context().exit(1)
delete_data.add_item(path)
if dry_run:
formatted_print(delete_data, response_key='DATA', fields=[('Path',
'path')])
return
res = client.submit_delete(delete_data)
task_id = res['task_id']
safeprint('Delete task submitted under ID "{}"'.format(task_id),
write_to_stderr=True)
task_wait_with_io(meow, heartbeat, polling_interval, timeout, task_id,
timeout_exit_code, client=client)
|
rm_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ignore_missing, star_silent, recursive, enable_globs,\n endpoint_plus_path, label, submission_id, dry_run, deadline,\n skip_activation_check, notify, meow, heartbeat, polling_interval,\n timeout, timeout_exit_code):\n endpoint_id, path = endpoint_plus_path\n client = get_client()\n if not skip_activation_check:\n autoactivate(client, endpoint_id, if_expires_in=60)\n delete_data = DeleteData(client, endpoint_id, label=label, recursive=\n recursive, ignore_missing=ignore_missing, submission_id=\n submission_id, deadline=deadline, skip_activation_check=\n skip_activation_check, interpret_globs=enable_globs, **notify)\n if not star_silent and enable_globs and path.endswith('*'):\n if err_is_terminal() and term_is_interactive() and not click.confirm(\n 'Are you sure you want to delete all files matching \"{}\"?'.\n format(path), err=True):\n safeprint('Aborted.', write_to_stderr=True)\n click.get_current_context().exit(1)\n delete_data.add_item(path)\n if dry_run:\n formatted_print(delete_data, response_key='DATA', fields=[('Path',\n 'path')])\n return\n res = client.submit_delete(delete_data)\n task_id = res['task_id']\n safeprint('Delete task submitted under ID \"{}\"'.format(task_id),\n write_to_stderr=True)\n task_wait_with_io(meow, heartbeat, polling_interval, timeout, task_id,\n timeout_exit_code, client=client)\n",
"role": "user"
},
{
"content": "rm_command",
"role": "assistant"
}
] |
def x(session_params=None, force_new_client=False):
session_params = session_params or {}
auth_client = internal_auth_client(requires_instance=True,
force_new_client=force_new_client)
auth_client.oauth2_start_flow(redirect_uri=auth_client.base_url +
'v2/web/auth-code', refresh_tokens=True, requested_scopes=SCOPES)
additional_params = {'prompt': 'login'}
additional_params.update(session_params)
linkprompt = 'Please authenticate with Globus here'
safeprint('{0}:\n{1}\n{2}\n{1}\n'.format(linkprompt, '-' * len(
linkprompt), auth_client.oauth2_get_authorize_url(additional_params
=additional_params)))
auth_code = click.prompt('Enter the resulting Authorization Code here'
).strip()
exchange_code_and_store_config(auth_client, auth_code)
return True
|
do_link_auth_flow
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(session_params=None, force_new_client=False):\n session_params = session_params or {}\n auth_client = internal_auth_client(requires_instance=True,\n force_new_client=force_new_client)\n auth_client.oauth2_start_flow(redirect_uri=auth_client.base_url +\n 'v2/web/auth-code', refresh_tokens=True, requested_scopes=SCOPES)\n additional_params = {'prompt': 'login'}\n additional_params.update(session_params)\n linkprompt = 'Please authenticate with Globus here'\n safeprint('{0}:\\n{1}\\n{2}\\n{1}\\n'.format(linkprompt, '-' * len(\n linkprompt), auth_client.oauth2_get_authorize_url(additional_params\n =additional_params)))\n auth_code = click.prompt('Enter the resulting Authorization Code here'\n ).strip()\n exchange_code_and_store_config(auth_client, auth_code)\n return True\n",
"role": "user"
},
{
"content": "do_link_auth_flow",
"role": "assistant"
}
] |
def x(session_params=None, force_new_client=False):
session_params = session_params or {}
with start_local_server(listen=('127.0.0.1', 0)) as server:
_, port = server.socket.getsockname()
redirect_uri = 'http://localhost:{}'.format(port)
auth_client = internal_auth_client(requires_instance=True,
force_new_client=force_new_client)
auth_client.oauth2_start_flow(refresh_tokens=True, redirect_uri=
redirect_uri, requested_scopes=SCOPES)
additional_params = {'prompt': 'login'}
additional_params.update(session_params)
url = auth_client.oauth2_get_authorize_url(additional_params=
additional_params)
webbrowser.open(url, new=1)
auth_code = server.wait_for_code()
if isinstance(auth_code, LocalServerError):
safeprint('Authorization failed: {}'.format(auth_code),
write_to_stderr=True)
click.get_current_context().exit(1)
elif isinstance(auth_code, Exception):
safeprint('Authorization failed with unexpected error:\n{}'.format(
auth_code), write_to_stderr=True)
click.get_current_context().exit(1)
exchange_code_and_store_config(auth_client, auth_code)
return True
|
do_local_server_auth_flow
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(session_params=None, force_new_client=False):\n session_params = session_params or {}\n with start_local_server(listen=('127.0.0.1', 0)) as server:\n _, port = server.socket.getsockname()\n redirect_uri = 'http://localhost:{}'.format(port)\n auth_client = internal_auth_client(requires_instance=True,\n force_new_client=force_new_client)\n auth_client.oauth2_start_flow(refresh_tokens=True, redirect_uri=\n redirect_uri, requested_scopes=SCOPES)\n additional_params = {'prompt': 'login'}\n additional_params.update(session_params)\n url = auth_client.oauth2_get_authorize_url(additional_params=\n additional_params)\n webbrowser.open(url, new=1)\n auth_code = server.wait_for_code()\n if isinstance(auth_code, LocalServerError):\n safeprint('Authorization failed: {}'.format(auth_code),\n write_to_stderr=True)\n click.get_current_context().exit(1)\n elif isinstance(auth_code, Exception):\n safeprint('Authorization failed with unexpected error:\\n{}'.format(\n auth_code), write_to_stderr=True)\n click.get_current_context().exit(1)\n exchange_code_and_store_config(auth_client, auth_code)\n return True\n",
"role": "user"
},
{
"content": "do_local_server_auth_flow",
"role": "assistant"
}
] |
def x(auth_client, auth_code):
tkn = auth_client.oauth2_exchange_code_for_tokens(auth_code)
tkn = tkn.by_resource_server
transfer_at = tkn['transfer.api.globus.org']['access_token']
transfer_at_expires = tkn['transfer.api.globus.org']['expires_at_seconds']
transfer_rt = tkn['transfer.api.globus.org']['refresh_token']
auth_at = tkn['auth.globus.org']['access_token']
auth_at_expires = tkn['auth.globus.org']['expires_at_seconds']
auth_rt = tkn['auth.globus.org']['refresh_token']
for token_opt in (TRANSFER_RT_OPTNAME, TRANSFER_AT_OPTNAME,
AUTH_RT_OPTNAME, AUTH_AT_OPTNAME):
token = lookup_option(token_opt)
if token:
auth_client.oauth2_revoke_token(token)
write_option(TRANSFER_RT_OPTNAME, transfer_rt)
write_option(TRANSFER_AT_OPTNAME, transfer_at)
write_option(TRANSFER_AT_EXPIRES_OPTNAME, transfer_at_expires)
write_option(AUTH_RT_OPTNAME, auth_rt)
write_option(AUTH_AT_OPTNAME, auth_at)
write_option(AUTH_AT_EXPIRES_OPTNAME, auth_at_expires)
|
exchange_code_and_store_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(auth_client, auth_code):\n tkn = auth_client.oauth2_exchange_code_for_tokens(auth_code)\n tkn = tkn.by_resource_server\n transfer_at = tkn['transfer.api.globus.org']['access_token']\n transfer_at_expires = tkn['transfer.api.globus.org']['expires_at_seconds']\n transfer_rt = tkn['transfer.api.globus.org']['refresh_token']\n auth_at = tkn['auth.globus.org']['access_token']\n auth_at_expires = tkn['auth.globus.org']['expires_at_seconds']\n auth_rt = tkn['auth.globus.org']['refresh_token']\n for token_opt in (TRANSFER_RT_OPTNAME, TRANSFER_AT_OPTNAME,\n AUTH_RT_OPTNAME, AUTH_AT_OPTNAME):\n token = lookup_option(token_opt)\n if token:\n auth_client.oauth2_revoke_token(token)\n write_option(TRANSFER_RT_OPTNAME, transfer_rt)\n write_option(TRANSFER_AT_OPTNAME, transfer_at)\n write_option(TRANSFER_AT_EXPIRES_OPTNAME, transfer_at_expires)\n write_option(AUTH_RT_OPTNAME, auth_rt)\n write_option(AUTH_AT_OPTNAME, auth_at)\n write_option(AUTH_AT_EXPIRES_OPTNAME, auth_at_expires)\n",
"role": "user"
},
{
"content": "exchange_code_and_store_config",
"role": "assistant"
}
] |
def x(filter_fulltext, filter_owner_id, filter_scope):
if filter_scope == 'all' and not filter_fulltext:
raise click.UsageError(
'When searching all endpoints (--filter-scope=all, the default), a full-text search filter is required. Other scopes (e.g. --filter-scope=recently-used) may be used without specifying an additional filter.'
)
client = get_client()
owner_id = filter_owner_id
if owner_id:
owner_id = maybe_lookup_identity_id(owner_id)
search_iterator = client.endpoint_search(filter_fulltext=
filter_fulltext, filter_scope=filter_scope, filter_owner_id=owner_id)
formatted_print(search_iterator, fields=ENDPOINT_LIST_FIELDS,
json_converter=iterable_response_to_dict)
|
endpoint_search
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filter_fulltext, filter_owner_id, filter_scope):\n if filter_scope == 'all' and not filter_fulltext:\n raise click.UsageError(\n 'When searching all endpoints (--filter-scope=all, the default), a full-text search filter is required. Other scopes (e.g. --filter-scope=recently-used) may be used without specifying an additional filter.'\n )\n client = get_client()\n owner_id = filter_owner_id\n if owner_id:\n owner_id = maybe_lookup_identity_id(owner_id)\n search_iterator = client.endpoint_search(filter_fulltext=\n filter_fulltext, filter_scope=filter_scope, filter_owner_id=owner_id)\n formatted_print(search_iterator, fields=ENDPOINT_LIST_FIELDS,\n json_converter=iterable_response_to_dict)\n",
"role": "user"
},
{
"content": "endpoint_search",
"role": "assistant"
}
] |
def x(**kwargs):
client = get_client()
endpoint_id = kwargs.pop('endpoint_id')
get_res = client.get_endpoint(endpoint_id)
if get_res['host_endpoint_id']:
endpoint_type = 'shared'
elif get_res['is_globus_connect']:
endpoint_type = 'personal'
elif get_res['s3_url']:
endpoint_type = 's3'
else:
endpoint_type = 'server'
validate_endpoint_create_and_update_params(endpoint_type, get_res[
'subscription_id'], kwargs)
ep_doc = assemble_generic_doc('endpoint', **kwargs)
res = client.update_endpoint(endpoint_id, ep_doc)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
endpoint_update
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(**kwargs):\n client = get_client()\n endpoint_id = kwargs.pop('endpoint_id')\n get_res = client.get_endpoint(endpoint_id)\n if get_res['host_endpoint_id']:\n endpoint_type = 'shared'\n elif get_res['is_globus_connect']:\n endpoint_type = 'personal'\n elif get_res['s3_url']:\n endpoint_type = 's3'\n else:\n endpoint_type = 'server'\n validate_endpoint_create_and_update_params(endpoint_type, get_res[\n 'subscription_id'], kwargs)\n ep_doc = assemble_generic_doc('endpoint', **kwargs)\n res = client.update_endpoint(endpoint_id, ep_doc)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "endpoint_update",
"role": "assistant"
}
] |
def x(message, write_to_stderr=False, newline=True):
try:
click.echo(message, nl=newline, err=write_to_stderr)
except IOError as err:
if err.errno is errno.EPIPE:
pass
else:
raise
|
safeprint
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(message, write_to_stderr=False, newline=True):\n try:\n click.echo(message, nl=newline, err=write_to_stderr)\n except IOError as err:\n if err.errno is errno.EPIPE:\n pass\n else:\n raise\n",
"role": "user"
},
{
"content": "safeprint",
"role": "assistant"
}
] |
def x(k):
if isinstance(k, six.string_types):
def x(x):
return x[k]
return lookup
return k
|
key_to_keyfunc
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(k):\n if isinstance(k, six.string_types):\n\n def x(x):\n return x[k]\n return lookup\n return k\n",
"role": "user"
},
{
"content": "key_to_keyfunc",
"role": "assistant"
}
] |
def x(response_data, simple_text=None, text_preamble=None, text_epilog=None,
text_format=FORMAT_TEXT_TABLE, json_converter=None, fields=None,
response_key=None):
def x():
if fields is None:
raise ValueError(
'Internal Error! Output format requires fields; none given. You can workaround this error by using `--format JSON`'
)
def x():
print_json_response(json_converter(response_data) if json_converter
else response_data)
def x():
print_unix_response(json_converter(response_data) if json_converter
else response_data)
def x():
if simple_text is not None:
safeprint(simple_text)
return
if text_preamble is not None:
safeprint(text_preamble)
data = response_data if response_key is None else response_data[
response_key]
if text_format == FORMAT_TEXT_TABLE:
_assert_fields()
print_table(data, fields)
elif text_format == FORMAT_TEXT_RECORD:
_assert_fields()
colon_formatted_print(data, fields)
elif text_format == FORMAT_TEXT_RAW:
safeprint(data)
elif text_format == FORMAT_TEXT_CUSTOM:
_custom_text_formatter(data)
if text_epilog is not None:
safeprint(text_epilog)
if isinstance(text_format, six.string_types):
text_format = text_format
_custom_text_formatter = None
else:
_custom_text_formatter = text_format
text_format = FORMAT_TEXT_CUSTOM
if outformat_is_json():
_print_as_json()
elif outformat_is_unix():
_print_as_unix()
else:
if text_format == FORMAT_SILENT:
return
_print_as_text()
|
formatted_print
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(response_data, simple_text=None, text_preamble=None, text_epilog=None,\n text_format=FORMAT_TEXT_TABLE, json_converter=None, fields=None,\n response_key=None):\n\n def x():\n if fields is None:\n raise ValueError(\n 'Internal Error! Output format requires fields; none given. You can workaround this error by using `--format JSON`'\n )\n\n def x():\n print_json_response(json_converter(response_data) if json_converter\n else response_data)\n\n def x():\n print_unix_response(json_converter(response_data) if json_converter\n else response_data)\n\n def x():\n if simple_text is not None:\n safeprint(simple_text)\n return\n if text_preamble is not None:\n safeprint(text_preamble)\n data = response_data if response_key is None else response_data[\n response_key]\n if text_format == FORMAT_TEXT_TABLE:\n _assert_fields()\n print_table(data, fields)\n elif text_format == FORMAT_TEXT_RECORD:\n _assert_fields()\n colon_formatted_print(data, fields)\n elif text_format == FORMAT_TEXT_RAW:\n safeprint(data)\n elif text_format == FORMAT_TEXT_CUSTOM:\n _custom_text_formatter(data)\n if text_epilog is not None:\n safeprint(text_epilog)\n if isinstance(text_format, six.string_types):\n text_format = text_format\n _custom_text_formatter = None\n else:\n _custom_text_formatter = text_format\n text_format = FORMAT_TEXT_CUSTOM\n if outformat_is_json():\n _print_as_json()\n elif outformat_is_unix():\n _print_as_unix()\n else:\n if text_format == FORMAT_SILENT:\n return\n _print_as_text()\n",
"role": "user"
},
{
"content": "formatted_print",
"role": "assistant"
}
] |
def x(*args, **kwargs):
def x(f, **kwargs):
f = version_option(f)
f = debug_option(f)
f = verbose_option(f)
f = click.help_option('-h', '--help')(f)
if not kwargs.get('no_format_option'):
f = format_option(f)
if not kwargs.get('no_map_http_status_option'):
f = map_http_status_option(f)
return f
return detect_and_decorate(decorate, args, kwargs)
|
common_options
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n\n def x(f, **kwargs):\n f = version_option(f)\n f = debug_option(f)\n f = verbose_option(f)\n f = click.help_option('-h', '--help')(f)\n if not kwargs.get('no_format_option'):\n f = format_option(f)\n if not kwargs.get('no_map_http_status_option'):\n f = map_http_status_option(f)\n return f\n return detect_and_decorate(decorate, args, kwargs)\n",
"role": "user"
},
{
"content": "common_options",
"role": "assistant"
}
] |
def x(*args, **kwargs):
def x(f, **kwargs):
metavar = kwargs.get('metavar', 'ENDPOINT_ID')
f = click.argument('endpoint_id', metavar=metavar, type=click.UUID)(f)
return f
return detect_and_decorate(decorate, args, kwargs)
|
endpoint_id_arg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n\n def x(f, **kwargs):\n metavar = kwargs.get('metavar', 'ENDPOINT_ID')\n f = click.argument('endpoint_id', metavar=metavar, type=click.UUID)(f)\n return f\n return detect_and_decorate(decorate, args, kwargs)\n",
"role": "user"
},
{
"content": "endpoint_id_arg",
"role": "assistant"
}
] |
def x(*args, **kwargs):
def x(f, create=False):
update_help_prefix = not create and 'New ' or ''
if create:
f = click.argument('display_name')(f)
else:
f = click.option('--display-name', help=update_help_prefix +
'Name for the endpoint')(f)
f = click.option('--description', help=update_help_prefix +
'Description for the endpoint')(f)
f = click.option('--info-link', help=update_help_prefix +
'Link for Info about the endpoint')(f)
f = click.option('--contact-info', help=update_help_prefix +
'Contact Info for the endpoint')(f)
f = click.option('--contact-email', help=update_help_prefix +
'Contact Email for the endpoint')(f)
f = click.option('--organization', help=update_help_prefix +
'Organization for the endpoint')(f)
f = click.option('--department', help=update_help_prefix +
'Department which operates the endpoint')(f)
f = click.option('--keywords', help=update_help_prefix +
'Comma separated list of keywords to help searches for the endpoint'
)(f)
f = click.option('--default-directory', help=
'Set the default directory')(f)
f = click.option('--no-default-directory', is_flag=True, flag_value
=True, default=None, help=
'Unset any default directory on the endpoint')(f)
f = click.option('--force-encryption/--no-force-encryption',
default=None, help='(Un)Force the endpoint to encrypt transfers')(f
)
f = click.option('--disable-verify/--no-disable-verify', is_flag=
True, help='(Un)Set the endpoint to ignore checksum verification')(
f)
f = click.option('--public/--private', 'public', default=None, help
=
'Set the endpoint to be public or private (Globus Connect Server only)'
)(f)
f = click.option('--myproxy-dn', help=
'Set the MyProxy Server DN (Globus Connect Server only)')(f)
f = click.option('--myproxy-server', help=
'Set the MyProxy Server URI (Globus Connect Server only)')(f)
f = click.option('--oauth-server', help=
'Set the OAuth Server URI (Globus Connect Server only)')(f)
f = click.option('--location', type=LocationType(), default=None,
help=
"Manually set the endpoint's latitude and longitude (Globus Connect Server only)"
)(f)
f = click.option('--managed', 'managed', is_flag=True, flag_value=
True, default=None, help=
'Set the endpoint as a managed endpoint. Requires the user to be a subscription manager. If the user has multiple subscription IDs, --subscription-id must be used instead'
)(f)
f = click.option('--no-managed', 'managed', is_flag=True,
flag_value=False, default=None, help=
'Unset the endpoint as a managed endpoint. Does not require the user to be a subscription manager. Mutually exclusive with --subscription-id'
)(f)
f = click.option('--subscription-id', type=click.UUID, default=None,
help=
'Set the endpoint as a managed endpoint with the given subscription ID. Mutually exclusive with --no-managed'
)(f)
f = click.option('--network-use', default=None, type=click.Choice([
'normal', 'minimal', 'aggressive', 'custom']), help=
"Set the endpoint's network use level. If using custom, the endpoint's max and preferred concurrency and parallelism must be set (Managed endpoints only) (Globus Connect Server only)"
)(f)
f = click.option('--max-concurrency', type=int, default=None, help=
"Set the endpoint's max concurrency; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)"
)(f)
f = click.option('--preferred-concurrency', type=int, default=None,
help=
"Set the endpoint's preferred concurrency; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)"
)(f)
f = click.option('--max-parallelism', type=int, default=None, help=
"Set the endpoint's max parallelism; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)"
)(f)
f = click.option('--preferred-parallelism', type=int, default=None,
help=
"Set the endpoint's preferred parallelism; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)"
)(f)
return f
return detect_and_decorate(inner_decorator, args, kwargs)
|
endpoint_create_and_update_params
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n\n def x(f, create=False):\n update_help_prefix = not create and 'New ' or ''\n if create:\n f = click.argument('display_name')(f)\n else:\n f = click.option('--display-name', help=update_help_prefix +\n 'Name for the endpoint')(f)\n f = click.option('--description', help=update_help_prefix +\n 'Description for the endpoint')(f)\n f = click.option('--info-link', help=update_help_prefix +\n 'Link for Info about the endpoint')(f)\n f = click.option('--contact-info', help=update_help_prefix +\n 'Contact Info for the endpoint')(f)\n f = click.option('--contact-email', help=update_help_prefix +\n 'Contact Email for the endpoint')(f)\n f = click.option('--organization', help=update_help_prefix +\n 'Organization for the endpoint')(f)\n f = click.option('--department', help=update_help_prefix +\n 'Department which operates the endpoint')(f)\n f = click.option('--keywords', help=update_help_prefix +\n 'Comma separated list of keywords to help searches for the endpoint'\n )(f)\n f = click.option('--default-directory', help=\n 'Set the default directory')(f)\n f = click.option('--no-default-directory', is_flag=True, flag_value\n =True, default=None, help=\n 'Unset any default directory on the endpoint')(f)\n f = click.option('--force-encryption/--no-force-encryption',\n default=None, help='(Un)Force the endpoint to encrypt transfers')(f\n )\n f = click.option('--disable-verify/--no-disable-verify', is_flag=\n True, help='(Un)Set the endpoint to ignore checksum verification')(\n f)\n f = click.option('--public/--private', 'public', default=None, help\n =\n 'Set the endpoint to be public or private (Globus Connect Server only)'\n )(f)\n f = click.option('--myproxy-dn', help=\n 'Set the MyProxy Server DN (Globus Connect Server only)')(f)\n f = click.option('--myproxy-server', help=\n 'Set the MyProxy Server URI (Globus Connect Server only)')(f)\n f = click.option('--oauth-server', help=\n 'Set the OAuth Server URI (Globus Connect Server only)')(f)\n f = click.option('--location', type=LocationType(), default=None,\n help=\n \"Manually set the endpoint's latitude and longitude (Globus Connect Server only)\"\n )(f)\n f = click.option('--managed', 'managed', is_flag=True, flag_value=\n True, default=None, help=\n 'Set the endpoint as a managed endpoint. Requires the user to be a subscription manager. If the user has multiple subscription IDs, --subscription-id must be used instead'\n )(f)\n f = click.option('--no-managed', 'managed', is_flag=True,\n flag_value=False, default=None, help=\n 'Unset the endpoint as a managed endpoint. Does not require the user to be a subscription manager. Mutually exclusive with --subscription-id'\n )(f)\n f = click.option('--subscription-id', type=click.UUID, default=None,\n help=\n 'Set the endpoint as a managed endpoint with the given subscription ID. Mutually exclusive with --no-managed'\n )(f)\n f = click.option('--network-use', default=None, type=click.Choice([\n 'normal', 'minimal', 'aggressive', 'custom']), help=\n \"Set the endpoint's network use level. If using custom, the endpoint's max and preferred concurrency and parallelism must be set (Managed endpoints only) (Globus Connect Server only)\"\n )(f)\n f = click.option('--max-concurrency', type=int, default=None, help=\n \"Set the endpoint's max concurrency; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)\"\n )(f)\n f = click.option('--preferred-concurrency', type=int, default=None,\n help=\n \"Set the endpoint's preferred concurrency; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)\"\n )(f)\n f = click.option('--max-parallelism', type=int, default=None, help=\n \"Set the endpoint's max parallelism; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)\"\n )(f)\n f = click.option('--preferred-parallelism', type=int, default=None,\n help=\n \"Set the endpoint's preferred parallelism; requires --network-use=custom (Managed endpoints only) (Globus Connect Server only)\"\n )(f)\n return f\n return detect_and_decorate(inner_decorator, args, kwargs)\n",
"role": "user"
},
{
"content": "endpoint_create_and_update_params",
"role": "assistant"
}
] |
def x(endpoint_type, managed, params):
if endpoint_type != 'server':
if params['public'] is False:
raise click.UsageError(
'Option --private only allowed for Globus Connect Server endpoints'
)
for option in ['public', 'myproxy_dn', 'myproxy_server',
'oauth_server', 'location', 'network_use', 'max_concurrency',
'preferred_concurrency', 'max_parallelism', 'preferred_parallelism'
]:
if params[option] is not None:
raise click.UsageError(
'Option --{} can only be used with Globus Connect Server endpoints'
.format(option.replace('_', '-')))
if not managed and not (params['subscription_id'] or params['managed']):
for option in ['network_use', 'max_concurrency',
'preferred_concurrency', 'max_parallelism', 'preferred_parallelism'
]:
if params[option] is not None:
raise click.UsageError(
'Option --{} can only be used with managed endpoints'.
format(option.replace('_', '-')))
custom_network_use_params = ('max_concurrency', 'preferred_concurrency',
'max_parallelism', 'preferred_parallelism')
if params['network_use'] != 'custom':
for option in custom_network_use_params:
if params[option] is not None:
raise click.UsageError(
'The {} options require you use --network-use=custom.'.
format('/'.join('--' + option.replace('_', '-') for
option in custom_network_use_params)))
managed_flag = params.get('managed')
if managed_flag is not None:
params.pop('managed')
if managed_flag:
params['subscription_id'] = params.get('subscription_id'
) or 'DEFAULT'
else:
if params.get('subscription_id'):
raise click.UsageError(
'Cannot specify --subscription-id and use the --no-managed option.'
)
params['subscription_id'] = EXPLICIT_NULL
if params.get('no_default_directory'):
if params.get('default_directory'):
raise click.UsageError(
'--no-default-directory and --default-directory are mutually exclusive.'
)
else:
params['default_directory'] = EXPLICIT_NULL
params.pop('no_default_directory')
|
validate_endpoint_create_and_update_params
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_type, managed, params):\n if endpoint_type != 'server':\n if params['public'] is False:\n raise click.UsageError(\n 'Option --private only allowed for Globus Connect Server endpoints'\n )\n for option in ['public', 'myproxy_dn', 'myproxy_server',\n 'oauth_server', 'location', 'network_use', 'max_concurrency',\n 'preferred_concurrency', 'max_parallelism', 'preferred_parallelism'\n ]:\n if params[option] is not None:\n raise click.UsageError(\n 'Option --{} can only be used with Globus Connect Server endpoints'\n .format(option.replace('_', '-')))\n if not managed and not (params['subscription_id'] or params['managed']):\n for option in ['network_use', 'max_concurrency',\n 'preferred_concurrency', 'max_parallelism', 'preferred_parallelism'\n ]:\n if params[option] is not None:\n raise click.UsageError(\n 'Option --{} can only be used with managed endpoints'.\n format(option.replace('_', '-')))\n custom_network_use_params = ('max_concurrency', 'preferred_concurrency',\n 'max_parallelism', 'preferred_parallelism')\n if params['network_use'] != 'custom':\n for option in custom_network_use_params:\n if params[option] is not None:\n raise click.UsageError(\n 'The {} options require you use --network-use=custom.'.\n format('/'.join('--' + option.replace('_', '-') for\n option in custom_network_use_params)))\n managed_flag = params.get('managed')\n if managed_flag is not None:\n params.pop('managed')\n if managed_flag:\n params['subscription_id'] = params.get('subscription_id'\n ) or 'DEFAULT'\n else:\n if params.get('subscription_id'):\n raise click.UsageError(\n 'Cannot specify --subscription-id and use the --no-managed option.'\n )\n params['subscription_id'] = EXPLICIT_NULL\n if params.get('no_default_directory'):\n if params.get('default_directory'):\n raise click.UsageError(\n '--no-default-directory and --default-directory are mutually exclusive.'\n )\n else:\n params['default_directory'] = EXPLICIT_NULL\n params.pop('no_default_directory')\n",
"role": "user"
},
{
"content": "validate_endpoint_create_and_update_params",
"role": "assistant"
}
] |
def x(*args, **kwargs):
def x(f, required=True):
f = click.argument('TASK_ID', required=required)(f)
return f
return detect_and_decorate(inner_decorator, args, kwargs)
|
task_id_arg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n\n def x(f, required=True):\n f = click.argument('TASK_ID', required=required)(f)\n return f\n return detect_and_decorate(inner_decorator, args, kwargs)\n",
"role": "user"
},
{
"content": "task_id_arg",
"role": "assistant"
}
] |
def x(f):
def x(ctx, param, value):
if value is None:
return {}
value = value.lower()
value = [x.strip() for x in value.split(',')]
if value == ['']:
value = ['off']
off = 'off' in value
on = 'on' in value
vals = set([x for x in value if x not in ('off', 'on')])
if (vals or on) and off:
raise click.UsageError(
'--notify cannot accept "off" and another value')
allowed_vals = set(('on', 'succeeded', 'failed', 'inactive'))
if not vals <= allowed_vals:
raise click.UsageError(
'--notify received at least one invalid value among {}'.
format(list(vals)))
if on:
return {}
if off:
return {'notify_on_succeeded': False, 'notify_on_failed': False,
'notify_on_inactive': False}
else:
return {'notify_on_succeeded': 'succeeded' in vals,
'notify_on_failed': 'failed' in vals, 'notify_on_inactive':
'inactive' in vals}
f = click.option('--dry-run', is_flag=True, help=
"Don't actually submit the task, print submission data instead")(f)
f = click.option('--notify', callback=notify_opt_callback, help=
"Comma separated list of task events which notify by email. 'on' and 'off' may be used to enable or disable notifications for all event types. Otherwise, use 'succeeded', 'failed', or 'inactive'"
)(f)
f = click.option('--submission-id', help=
'Task submission ID, as generated by `globus task generate-submission-id`. Used for safe resubmission in the presence of network failures.'
)(f)
f = click.option('--label', default=None, help='Set a label for this task.'
)(f)
f = click.option('--deadline', default=None, type=ISOTimeType(), help=
'Set a deadline for this to be canceled if not completed by.')(f)
f = click.option('--skip-activation-check', is_flag=True, help=
"Submit the task even if the endpoint(s) aren't currently activated.")(
f)
return f
|
task_submission_options
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(f):\n\n def x(ctx, param, value):\n if value is None:\n return {}\n value = value.lower()\n value = [x.strip() for x in value.split(',')]\n if value == ['']:\n value = ['off']\n off = 'off' in value\n on = 'on' in value\n vals = set([x for x in value if x not in ('off', 'on')])\n if (vals or on) and off:\n raise click.UsageError(\n '--notify cannot accept \"off\" and another value')\n allowed_vals = set(('on', 'succeeded', 'failed', 'inactive'))\n if not vals <= allowed_vals:\n raise click.UsageError(\n '--notify received at least one invalid value among {}'.\n format(list(vals)))\n if on:\n return {}\n if off:\n return {'notify_on_succeeded': False, 'notify_on_failed': False,\n 'notify_on_inactive': False}\n else:\n return {'notify_on_succeeded': 'succeeded' in vals,\n 'notify_on_failed': 'failed' in vals, 'notify_on_inactive':\n 'inactive' in vals}\n f = click.option('--dry-run', is_flag=True, help=\n \"Don't actually submit the task, print submission data instead\")(f)\n f = click.option('--notify', callback=notify_opt_callback, help=\n \"Comma separated list of task events which notify by email. 'on' and 'off' may be used to enable or disable notifications for all event types. Otherwise, use 'succeeded', 'failed', or 'inactive'\"\n )(f)\n f = click.option('--submission-id', help=\n 'Task submission ID, as generated by `globus task generate-submission-id`. Used for safe resubmission in the presence of network failures.'\n )(f)\n f = click.option('--label', default=None, help='Set a label for this task.'\n )(f)\n f = click.option('--deadline', default=None, type=ISOTimeType(), help=\n 'Set a deadline for this to be canceled if not completed by.')(f)\n f = click.option('--skip-activation-check', is_flag=True, help=\n \"Submit the task even if the endpoint(s) aren't currently activated.\")(\n f)\n return f\n",
"role": "user"
},
{
"content": "task_submission_options",
"role": "assistant"
}
] |
def x(*args, **kwargs):
def x(f, supports_batch=True, default_enable_globs=False):
f = click.option('--recursive', '-r', is_flag=True, help=
'Recursively delete dirs')(f)
f = click.option('--ignore-missing', '-f', is_flag=True, help=
"Don't throw errors if the file or dir is absent")(f)
f = click.option('--star-silent', '--unsafe', 'star_silent',
is_flag=True, help=
'Don\'t prompt when the trailing character is a "*".' + (
' Implicit in --batch' if supports_batch else ''))(f)
f = click.option('--enable-globs/--no-enable-globs', is_flag=True,
default=default_enable_globs, show_default=True, help=
'Enable expansion of *, ?, and [ ] characters in the last component of file paths, unless they are escaped with a preceeding backslash, \\'
)(f)
if supports_batch:
f = click.option('--batch', is_flag=True, help=
'Accept a batch of paths on stdin (i.e. run in batchmode). Uses ENDPOINT_ID as passed on the commandline. Any commandline PATH given will be used as a prefix to all paths given'
)(f)
return f
return detect_and_decorate(inner_decorator, args, kwargs)
|
delete_and_rm_options
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n\n def x(f, supports_batch=True, default_enable_globs=False):\n f = click.option('--recursive', '-r', is_flag=True, help=\n 'Recursively delete dirs')(f)\n f = click.option('--ignore-missing', '-f', is_flag=True, help=\n \"Don't throw errors if the file or dir is absent\")(f)\n f = click.option('--star-silent', '--unsafe', 'star_silent',\n is_flag=True, help=\n 'Don\\'t prompt when the trailing character is a \"*\".' + (\n ' Implicit in --batch' if supports_batch else ''))(f)\n f = click.option('--enable-globs/--no-enable-globs', is_flag=True,\n default=default_enable_globs, show_default=True, help=\n 'Enable expansion of *, ?, and [ ] characters in the last component of file paths, unless they are escaped with a preceeding backslash, \\\\'\n )(f)\n if supports_batch:\n f = click.option('--batch', is_flag=True, help=\n 'Accept a batch of paths on stdin (i.e. run in batchmode). Uses ENDPOINT_ID as passed on the commandline. Any commandline PATH given will be used as a prefix to all paths given'\n )(f)\n return f\n return detect_and_decorate(inner_decorator, args, kwargs)\n",
"role": "user"
},
{
"content": "delete_and_rm_options",
"role": "assistant"
}
] |
def x(*args, **kwargs):
def x(ctx, param, value):
if not value:
return None
value = value.lower().strip()
if value == 'unspecified':
return None, None
if value == 'unrestricted':
return 1024, 65535
try:
lower, upper = map(int, value.split('-'))
except ValueError:
raise click.BadParameter(
"must specify as 'unspecified', 'unrestricted', or as range separated by a hyphen (e.g. '50000-51000')"
)
if not 1024 <= lower <= 65535 or not 1024 <= upper <= 65535:
raise click.BadParameter('must be within the 1024-65535 range')
return (lower, upper) if lower <= upper else (upper, lower)
def x(f, add=False):
f = click.option('--hostname', required=add, help='Server Hostname.')(f
)
default_scheme = 'gsiftp' if add else None
f = click.option('--scheme', help='Scheme for the Server.', type=
CaseInsensitiveChoice(('gsiftp', 'ftp')), default=
default_scheme, show_default=add)(f)
default_port = 2811 if add else None
f = click.option('--port', help=
'Port for Globus control channel connections.', type=int,
default=default_port, show_default=add)(f)
f = click.option('--subject', help=
'Subject of the X509 Certificate of the server. When unspecified, the CN must match the server hostname.'
)(f)
for adjective, our_preposition, their_preposition in [('incoming',
'to', 'from'), ('outgoing', 'from', 'to')]:
f = click.option('--{}-data-ports'.format(adjective), callback=
port_range_callback, help=
"Indicate to firewall administrators at other sites how to allow {} traffic {} this server {} their own. Specify as either 'unspecified', 'unrestricted', or as range of ports separated by a hyphen (e.g. '50000-51000') within the 1024-65535 range."
.format(adjective, our_preposition, their_preposition))(f)
return f
return detect_and_decorate(inner_decorator, args, kwargs)
|
server_add_and_update_opts
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n\n def x(ctx, param, value):\n if not value:\n return None\n value = value.lower().strip()\n if value == 'unspecified':\n return None, None\n if value == 'unrestricted':\n return 1024, 65535\n try:\n lower, upper = map(int, value.split('-'))\n except ValueError:\n raise click.BadParameter(\n \"must specify as 'unspecified', 'unrestricted', or as range separated by a hyphen (e.g. '50000-51000')\"\n )\n if not 1024 <= lower <= 65535 or not 1024 <= upper <= 65535:\n raise click.BadParameter('must be within the 1024-65535 range')\n return (lower, upper) if lower <= upper else (upper, lower)\n\n def x(f, add=False):\n f = click.option('--hostname', required=add, help='Server Hostname.')(f\n )\n default_scheme = 'gsiftp' if add else None\n f = click.option('--scheme', help='Scheme for the Server.', type=\n CaseInsensitiveChoice(('gsiftp', 'ftp')), default=\n default_scheme, show_default=add)(f)\n default_port = 2811 if add else None\n f = click.option('--port', help=\n 'Port for Globus control channel connections.', type=int,\n default=default_port, show_default=add)(f)\n f = click.option('--subject', help=\n 'Subject of the X509 Certificate of the server. When unspecified, the CN must match the server hostname.'\n )(f)\n for adjective, our_preposition, their_preposition in [('incoming',\n 'to', 'from'), ('outgoing', 'from', 'to')]:\n f = click.option('--{}-data-ports'.format(adjective), callback=\n port_range_callback, help=\n \"Indicate to firewall administrators at other sites how to allow {} traffic {} this server {} their own. Specify as either 'unspecified', 'unrestricted', or as range of ports separated by a hyphen (e.g. '50000-51000') within the 1024-65535 range.\"\n .format(adjective, our_preposition, their_preposition))(f)\n return f\n return detect_and_decorate(inner_decorator, args, kwargs)\n",
"role": "user"
},
{
"content": "server_add_and_update_opts",
"role": "assistant"
}
] |
def x(endpoint_id):
client = get_client()
res = client.endpoint_deactivate(endpoint_id)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
endpoint_deactivate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id):\n client = get_client()\n res = client.endpoint_deactivate(endpoint_id)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "endpoint_deactivate",
"role": "assistant"
}
] |
def x(f):
def x(ctx, param, value):
if not value or ctx.resilient_parsing:
return
print_version()
ctx.exit(0)
return click.option('--version', is_flag=True, expose_value=False,
is_eager=True, callback=callback, cls=HiddenOption)(f)
|
version_option
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(f):\n\n def x(ctx, param, value):\n if not value or ctx.resilient_parsing:\n return\n print_version()\n ctx.exit(0)\n return click.option('--version', is_flag=True, expose_value=False,\n is_eager=True, callback=callback, cls=HiddenOption)(f)\n",
"role": "user"
},
{
"content": "version_option",
"role": "assistant"
}
] |
def x():
import requests
try:
version_data = requests.get(
'https://pypi.python.org/pypi/globus-cli/json').json()
latest = max(LooseVersion(v) for v in version_data['releases'])
return latest, LooseVersion(__version__)
except requests.RequestException:
return None, LooseVersion(__version__)
|
get_versions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n import requests\n try:\n version_data = requests.get(\n 'https://pypi.python.org/pypi/globus-cli/json').json()\n latest = max(LooseVersion(v) for v in version_data['releases'])\n return latest, LooseVersion(__version__)\n except requests.RequestException:\n return None, LooseVersion(__version__)\n",
"role": "user"
},
{
"content": "get_versions",
"role": "assistant"
}
] |
def x(self):
id_batch_size = 100
ac = get_auth_client()
self._resolved_map = {}
for i in range(0, len(self.identity_ids), id_batch_size):
chunk = self.identity_ids[i:i + id_batch_size]
resolved_result = ac.get_identities(ids=chunk)
for x in resolved_result['identities']:
self._resolved_map[x['id']] = x['username']
|
lookup_identity_names
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n id_batch_size = 100\n ac = get_auth_client()\n self._resolved_map = {}\n for i in range(0, len(self.identity_ids), id_batch_size):\n chunk = self.identity_ids[i:i + id_batch_size]\n resolved_result = ac.get_identities(ids=chunk)\n for x in resolved_result['identities']:\n self._resolved_map[x['id']] = x['username']\n",
"role": "user"
},
{
"content": "lookup_identity_names",
"role": "assistant"
}
] |
def x(option, value, section='cli', system=False):
os.umask(63)
conf = get_config_obj(system=system)
if section not in conf:
conf[section] = {}
conf[section][option] = value
conf.write()
|
write_option
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(option, value, section='cli', system=False):\n os.umask(63)\n conf = get_config_obj(system=system)\n if section not in conf:\n conf[section] = {}\n conf[section][option] = value\n conf.write()\n",
"role": "user"
},
{
"content": "write_option",
"role": "assistant"
}
] |
def x(requires_instance=False, force_new_client=False):
client_id = lookup_option(CLIENT_ID_OPTNAME)
client_secret = lookup_option(CLIENT_SECRET_OPTNAME)
template_id = lookup_option(TEMPLATE_ID_OPTNAME) or DEFAULT_TEMPLATE_ID
template_client = internal_native_client()
existing = client_id and client_secret
if force_new_client and existing:
existing_client = globus_sdk.ConfidentialAppAuthClient(client_id,
client_secret)
try:
existing_client.delete('/v2/api/clients/{}'.format(client_id))
except globus_sdk.exc.AuthAPIError:
pass
if force_new_client or requires_instance and not existing:
body = {'client': {'template_id': template_id, 'name': 'Globus CLI'}}
res = template_client.post('/v2/api/clients', json_body=body)
credential_data = res['included']['client_credential']
client_id = credential_data['client']
client_secret = credential_data['secret']
write_option(CLIENT_ID_OPTNAME, client_id)
write_option(CLIENT_SECRET_OPTNAME, client_secret)
return globus_sdk.ConfidentialAppAuthClient(client_id,
client_secret, app_name='Globus CLI')
elif existing:
return globus_sdk.ConfidentialAppAuthClient(client_id,
client_secret, app_name='Globus CLI')
else:
return template_client
|
internal_auth_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(requires_instance=False, force_new_client=False):\n client_id = lookup_option(CLIENT_ID_OPTNAME)\n client_secret = lookup_option(CLIENT_SECRET_OPTNAME)\n template_id = lookup_option(TEMPLATE_ID_OPTNAME) or DEFAULT_TEMPLATE_ID\n template_client = internal_native_client()\n existing = client_id and client_secret\n if force_new_client and existing:\n existing_client = globus_sdk.ConfidentialAppAuthClient(client_id,\n client_secret)\n try:\n existing_client.delete('/v2/api/clients/{}'.format(client_id))\n except globus_sdk.exc.AuthAPIError:\n pass\n if force_new_client or requires_instance and not existing:\n body = {'client': {'template_id': template_id, 'name': 'Globus CLI'}}\n res = template_client.post('/v2/api/clients', json_body=body)\n credential_data = res['included']['client_credential']\n client_id = credential_data['client']\n client_secret = credential_data['secret']\n write_option(CLIENT_ID_OPTNAME, client_id)\n write_option(CLIENT_SECRET_OPTNAME, client_secret)\n return globus_sdk.ConfidentialAppAuthClient(client_id,\n client_secret, app_name='Globus CLI')\n elif existing:\n return globus_sdk.ConfidentialAppAuthClient(client_id,\n client_secret, app_name='Globus CLI')\n else:\n return template_client\n",
"role": "user"
},
{
"content": "internal_auth_client",
"role": "assistant"
}
] |
def x(http_status):
mapping = click.get_current_context().ensure_object(CommandState
).http_status_map
if http_status in mapping:
sys.exit(mapping[http_status])
else:
sys.exit(1)
|
exit_with_mapped_status
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(http_status):\n mapping = click.get_current_context().ensure_object(CommandState\n ).http_status_map\n if http_status in mapping:\n sys.exit(mapping[http_status])\n else:\n sys.exit(1)\n",
"role": "user"
},
{
"content": "exit_with_mapped_status",
"role": "assistant"
}
] |
def x(exception):
safeprint(
'The resource you are trying to access requires you to re-authenticate with specific identities.'
)
params = exception.raw_json['authorization_parameters']
message = params.get('session_message')
if message:
safeprint('message: {}'.format(message))
identities = params.get('session_required_identities')
if identities:
id_str = ' '.join(identities)
safeprint(
"""Please run
globus session update {}
to re-authenticate with the required identities"""
.format(id_str))
else:
safeprint(
'Please use "globus session update" to re-authenticate with specific identities'
.format(id_str))
exit_with_mapped_status(exception.http_status)
|
session_hook
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(exception):\n safeprint(\n 'The resource you are trying to access requires you to re-authenticate with specific identities.'\n )\n params = exception.raw_json['authorization_parameters']\n message = params.get('session_message')\n if message:\n safeprint('message: {}'.format(message))\n identities = params.get('session_required_identities')\n if identities:\n id_str = ' '.join(identities)\n safeprint(\n \"\"\"Please run\n\n globus session update {}\n\nto re-authenticate with the required identities\"\"\"\n .format(id_str))\n else:\n safeprint(\n 'Please use \"globus session update\" to re-authenticate with specific identities'\n .format(id_str))\n exit_with_mapped_status(exception.http_status)\n",
"role": "user"
},
{
"content": "session_hook",
"role": "assistant"
}
] |
def x(exc_info):
exception_type, exception, traceback = exc_info
ctx = click.get_current_context()
state = ctx.ensure_object(CommandState)
if state.debug:
sys.excepthook(exception_type, exception, traceback)
elif isinstance(exception, click.ClickException):
reraise(exception_type, exception, traceback)
elif isinstance(exception, exc.GlobusAPIError
) and exception.raw_json and 'authorization_parameters' in exception.raw_json:
session_hook(exception)
elif isinstance(exception, exc.TransferAPIError):
if exception.code == 'ClientError.AuthenticationFailed':
authentication_hook(exception)
else:
transferapi_hook(exception)
elif isinstance(exception, exc.AuthAPIError):
if exception.code == 'UNAUTHORIZED':
authentication_hook(exception)
elif exception.message == 'invalid_grant':
invalidrefresh_hook(exception)
else:
authapi_hook(exception)
elif isinstance(exception, exc.GlobusAPIError):
globusapi_hook(exception)
elif isinstance(exception, exc.GlobusError):
globus_generic_hook(exception)
else:
safeprint(u'{}: {}'.format(exception_type.__name__, exception))
sys.exit(1)
|
custom_except_hook
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(exc_info):\n exception_type, exception, traceback = exc_info\n ctx = click.get_current_context()\n state = ctx.ensure_object(CommandState)\n if state.debug:\n sys.excepthook(exception_type, exception, traceback)\n elif isinstance(exception, click.ClickException):\n reraise(exception_type, exception, traceback)\n elif isinstance(exception, exc.GlobusAPIError\n ) and exception.raw_json and 'authorization_parameters' in exception.raw_json:\n session_hook(exception)\n elif isinstance(exception, exc.TransferAPIError):\n if exception.code == 'ClientError.AuthenticationFailed':\n authentication_hook(exception)\n else:\n transferapi_hook(exception)\n elif isinstance(exception, exc.AuthAPIError):\n if exception.code == 'UNAUTHORIZED':\n authentication_hook(exception)\n elif exception.message == 'invalid_grant':\n invalidrefresh_hook(exception)\n else:\n authapi_hook(exception)\n elif isinstance(exception, exc.GlobusAPIError):\n globusapi_hook(exception)\n elif isinstance(exception, exc.GlobusError):\n globus_generic_hook(exception)\n else:\n safeprint(u'{}: {}'.format(exception_type.__name__, exception))\n sys.exit(1)\n",
"role": "user"
},
{
"content": "custom_except_hook",
"role": "assistant"
}
] |
def x(task_id, limit, filter_errors, filter_non_errors):
client = get_client()
if filter_errors and filter_non_errors:
raise click.UsageError('Cannot filter by both errors and non errors')
elif filter_errors:
filter_string = 'is_error:1'
elif filter_non_errors:
filter_string = 'is_error:0'
else:
filter_string = ''
event_iterator = client.task_event_list(task_id, num_results=limit,
filter=filter_string)
def x(x):
is_json = False
try:
loaded = json.loads(x['details'])
is_json = True
except ValueError:
loaded = x['details']
if is_json:
return json.dumps(loaded, separators=(',', ':'), sort_keys=True)
else:
return loaded.replace('\n', '\\n')
formatted_print(event_iterator, fields=(('Time', 'time'), ('Code',
'code'), ('Is Error', 'is_error'), ('Details',
squashed_json_details)), json_converter=iterable_response_to_dict)
|
task_event_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(task_id, limit, filter_errors, filter_non_errors):\n client = get_client()\n if filter_errors and filter_non_errors:\n raise click.UsageError('Cannot filter by both errors and non errors')\n elif filter_errors:\n filter_string = 'is_error:1'\n elif filter_non_errors:\n filter_string = 'is_error:0'\n else:\n filter_string = ''\n event_iterator = client.task_event_list(task_id, num_results=limit,\n filter=filter_string)\n\n def x(x):\n is_json = False\n try:\n loaded = json.loads(x['details'])\n is_json = True\n except ValueError:\n loaded = x['details']\n if is_json:\n return json.dumps(loaded, separators=(',', ':'), sort_keys=True)\n else:\n return loaded.replace('\\n', '\\\\n')\n formatted_print(event_iterator, fields=(('Time', 'time'), ('Code',\n 'code'), ('Is Error', 'is_error'), ('Details',\n squashed_json_details)), json_converter=iterable_response_to_dict)\n",
"role": "user"
},
{
"content": "task_event_list",
"role": "assistant"
}
] |
def x(role_id, endpoint_id):
client = get_client()
res = client.delete_endpoint_role(endpoint_id, role_id)
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')
|
role_delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(role_id, endpoint_id):\n client = get_client()\n res = client.delete_endpoint_role(endpoint_id, role_id)\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='message')\n",
"role": "user"
},
{
"content": "role_delete",
"role": "assistant"
}
] |
def x(endpoint_plus_path, recursive_depth_limit, recursive, long_output,
show_hidden, filter_val):
endpoint_id, path = endpoint_plus_path
client = get_client()
autoactivate(client, endpoint_id, if_expires_in=60)
ls_params = {'show_hidden': int(show_hidden)}
if path:
ls_params['path'] = path
if filter_val:
if '/' in filter_val:
raise click.UsageError('--filter cannot contain "/"')
ls_params['filter'] = 'name:{}'.format(filter_val)
if recursive:
res = client.recursive_operation_ls(endpoint_id, depth=
recursive_depth_limit, **ls_params)
else:
res = client.operation_ls(endpoint_id, **ls_params)
def x(item):
return item['name'] + ('/' if item['type'] == 'dir' else '')
formatted_print(res, fields=[('Permissions', 'permissions'), ('User',
'user'), ('Group', 'group'), ('Size', 'size'), ('Last Modified',
'last_modified'), ('File Type', 'type'), ('Filename',
cleaned_item_name)], simple_text=None if long_output or is_verbose(
) or not outformat_is_text() else '\n'.join(cleaned_item_name(x) for
x in res), json_converter=iterable_response_to_dict)
|
ls_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_plus_path, recursive_depth_limit, recursive, long_output,\n show_hidden, filter_val):\n endpoint_id, path = endpoint_plus_path\n client = get_client()\n autoactivate(client, endpoint_id, if_expires_in=60)\n ls_params = {'show_hidden': int(show_hidden)}\n if path:\n ls_params['path'] = path\n if filter_val:\n if '/' in filter_val:\n raise click.UsageError('--filter cannot contain \"/\"')\n ls_params['filter'] = 'name:{}'.format(filter_val)\n if recursive:\n res = client.recursive_operation_ls(endpoint_id, depth=\n recursive_depth_limit, **ls_params)\n else:\n res = client.operation_ls(endpoint_id, **ls_params)\n\n def x(item):\n return item['name'] + ('/' if item['type'] == 'dir' else '')\n formatted_print(res, fields=[('Permissions', 'permissions'), ('User',\n 'user'), ('Group', 'group'), ('Size', 'size'), ('Last Modified',\n 'last_modified'), ('File Type', 'type'), ('Filename',\n cleaned_item_name)], simple_text=None if long_output or is_verbose(\n ) or not outformat_is_text() else '\\n'.join(cleaned_item_name(x) for\n x in res), json_converter=iterable_response_to_dict)\n",
"role": "user"
},
{
"content": "ls_command",
"role": "assistant"
}
] |
def x():
client = get_client()
res = client.get_submission_id()
formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='value')
|
generate_submission_id
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n client = get_client()\n res = client.get_submission_id()\n formatted_print(res, text_format=FORMAT_TEXT_RAW, response_key='value')\n",
"role": "user"
},
{
"content": "generate_submission_id",
"role": "assistant"
}
] |
def x(principal, permissions, endpoint_plus_path, notify_email, notify_message
):
if not principal:
raise click.UsageError(
'A security principal is required for this command')
endpoint_id, path = endpoint_plus_path
principal_type, principal_val = principal
client = get_client()
if principal_type == 'identity':
principal_val = maybe_lookup_identity_id(principal_val)
if not principal_val:
raise click.UsageError(
'Identity does not exist. Use --provision-identity to auto-provision an identity.'
)
elif principal_type == 'provision-identity':
principal_val = maybe_lookup_identity_id(principal_val, provision=True)
principal_type = 'identity'
if not notify_email:
notify_message = None
rule_data = assemble_generic_doc('access', permissions=permissions,
principal=principal_val, principal_type=principal_type, path=path,
notify_email=notify_email, notify_message=notify_message)
res = client.add_endpoint_acl_rule(endpoint_id, rule_data)
formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=[('Message',
'message'), ('Rule ID', 'access_id')])
|
create_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(principal, permissions, endpoint_plus_path, notify_email, notify_message\n ):\n if not principal:\n raise click.UsageError(\n 'A security principal is required for this command')\n endpoint_id, path = endpoint_plus_path\n principal_type, principal_val = principal\n client = get_client()\n if principal_type == 'identity':\n principal_val = maybe_lookup_identity_id(principal_val)\n if not principal_val:\n raise click.UsageError(\n 'Identity does not exist. Use --provision-identity to auto-provision an identity.'\n )\n elif principal_type == 'provision-identity':\n principal_val = maybe_lookup_identity_id(principal_val, provision=True)\n principal_type = 'identity'\n if not notify_email:\n notify_message = None\n rule_data = assemble_generic_doc('access', permissions=permissions,\n principal=principal_val, principal_type=principal_type, path=path,\n notify_email=notify_email, notify_message=notify_message)\n res = client.add_endpoint_acl_rule(endpoint_id, rule_data)\n formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=[('Message',\n 'message'), ('Rule ID', 'access_id')])\n",
"role": "user"
},
{
"content": "create_command",
"role": "assistant"
}
] |
def x(self):
while self.queue:
logger.debug(
'recursive_operation_ls BFS queue not empty, getting next path now.'
)
self.ls_count += 1
if self.ls_count % SLEEP_FREQUENCY == 0:
logger.debug(
'recursive_operation_ls sleeping {} seconds to rate limit itself.'
.format(SLEEP_LEN))
time.sleep(SLEEP_LEN)
abs_path, rel_path, depth = self.queue.pop()
if abs_path:
self.ls_params['path'] = abs_path
if not self.filter_after_first:
if self.filtering:
self.filtering = False
else:
try:
self.ls_params.pop('filter')
except KeyError:
pass
res = self.client.operation_ls(self.endpoint_id, **self.ls_params)
res_data = res['DATA']
if depth < self.max_depth:
self.queue.extend([(res['path'] + item['name'], (rel_path + '/' if
rel_path else '') + item['name'], depth + 1) for item in
reversed(res_data) if item['type'] == 'dir'])
for item in res_data:
item['name'] = (rel_path + '/' if rel_path else '') + item['name']
yield GlobusResponse(item)
|
iterable_func
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n while self.queue:\n logger.debug(\n 'recursive_operation_ls BFS queue not empty, getting next path now.'\n )\n self.ls_count += 1\n if self.ls_count % SLEEP_FREQUENCY == 0:\n logger.debug(\n 'recursive_operation_ls sleeping {} seconds to rate limit itself.'\n .format(SLEEP_LEN))\n time.sleep(SLEEP_LEN)\n abs_path, rel_path, depth = self.queue.pop()\n if abs_path:\n self.ls_params['path'] = abs_path\n if not self.filter_after_first:\n if self.filtering:\n self.filtering = False\n else:\n try:\n self.ls_params.pop('filter')\n except KeyError:\n pass\n res = self.client.operation_ls(self.endpoint_id, **self.ls_params)\n res_data = res['DATA']\n if depth < self.max_depth:\n self.queue.extend([(res['path'] + item['name'], (rel_path + '/' if\n rel_path else '') + item['name'], depth + 1) for item in\n reversed(res_data) if item['type'] == 'dir'])\n for item in res_data:\n item['name'] = (rel_path + '/' if rel_path else '') + item['name']\n yield GlobusResponse(item)\n",
"role": "user"
},
{
"content": "iterable_func",
"role": "assistant"
}
] |
def x(bookmark_id_or_name):
client = get_client()
res = resolve_id_or_name(client, bookmark_id_or_name)
formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=(('ID',
'id'), ('Name', 'name'), ('Endpoint ID', 'endpoint_id'), ('Path',
'path')), simple_text='{}:{}'.format(res['endpoint_id'], res['path'
]) if not is_verbose() else None)
|
bookmark_show
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(bookmark_id_or_name):\n client = get_client()\n res = resolve_id_or_name(client, bookmark_id_or_name)\n formatted_print(res, text_format=FORMAT_TEXT_RECORD, fields=(('ID',\n 'id'), ('Name', 'name'), ('Endpoint ID', 'endpoint_id'), ('Path',\n 'path')), simple_text='{}:{}'.format(res['endpoint_id'], res['path'\n ]) if not is_verbose() else None)\n",
"role": "user"
},
{
"content": "bookmark_show",
"role": "assistant"
}
] |
def x(endpoint_id):
client = get_client()
roles = client.endpoint_role_list(endpoint_id)
resolved_ids = LazyIdentityMap(x['principal'] for x in roles if x[
'principal_type'] == 'identity')
def x(role):
principal = role['principal']
if role['principal_type'] == 'identity':
username = resolved_ids.get(principal)
return username or principal
elif role['principal_type'] == 'group':
return u'https://app.globus.org/groups/{}'.format(principal)
else:
return principal
formatted_print(roles, fields=[('Principal Type', 'principal_type'), (
'Role ID', 'id'), ('Principal', principal_str), ('Role', 'role')])
|
role_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(endpoint_id):\n client = get_client()\n roles = client.endpoint_role_list(endpoint_id)\n resolved_ids = LazyIdentityMap(x['principal'] for x in roles if x[\n 'principal_type'] == 'identity')\n\n def x(role):\n principal = role['principal']\n if role['principal_type'] == 'identity':\n username = resolved_ids.get(principal)\n return username or principal\n elif role['principal_type'] == 'group':\n return u'https://app.globus.org/groups/{}'.format(principal)\n else:\n return principal\n formatted_print(roles, fields=[('Principal Type', 'principal_type'), (\n 'Role ID', 'id'), ('Principal', principal_str), ('Role', 'role')])\n",
"role": "user"
},
{
"content": "role_list",
"role": "assistant"
}
] |
def x(requirements_data, cred_file, lifetime_hours=12):
for data in requirements_data['DATA']:
if data['type'] == 'delegate_proxy' and data['name'] == 'public_key':
public_key = data['value']
break
else:
raise ValueError(
'No public_key found in activation requirements, this endpoint does not support Delegate Proxy activation.'
)
with open(cred_file) as f:
issuer_cred = f.read()
proxy = create_proxy_credentials(issuer_cred, public_key, lifetime_hours)
for data in requirements_data['DATA']:
if data['type'] == 'delegate_proxy' and data['name'] == 'proxy_chain':
data['value'] = proxy
return requirements_data
else:
raise ValueError(
'No proxy_chain found in activation requirements, this endpoint does not support Delegate Proxy activation.'
)
|
fill_delegate_proxy_activation_requirements
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(requirements_data, cred_file, lifetime_hours=12):\n for data in requirements_data['DATA']:\n if data['type'] == 'delegate_proxy' and data['name'] == 'public_key':\n public_key = data['value']\n break\n else:\n raise ValueError(\n 'No public_key found in activation requirements, this endpoint does not support Delegate Proxy activation.'\n )\n with open(cred_file) as f:\n issuer_cred = f.read()\n proxy = create_proxy_credentials(issuer_cred, public_key, lifetime_hours)\n for data in requirements_data['DATA']:\n if data['type'] == 'delegate_proxy' and data['name'] == 'proxy_chain':\n data['value'] = proxy\n return requirements_data\n else:\n raise ValueError(\n 'No proxy_chain found in activation requirements, this endpoint does not support Delegate Proxy activation.'\n )\n",
"role": "user"
},
{
"content": "fill_delegate_proxy_activation_requirements",
"role": "assistant"
}
] |
def x(issuer_cred, public_key, lifetime_hours):
loaded_cert, loaded_private_key, issuer_chain = parse_issuer_cred(
issuer_cred)
loaded_public_key = serialization.load_pem_public_key(public_key.encode
('ascii'), backend=default_backend())
confirm_not_old_proxy(loaded_cert)
validate_key_usage(loaded_cert)
new_cert = create_proxy_cert(loaded_cert, loaded_private_key,
loaded_public_key, lifetime_hours)
extended_chain = loaded_cert.public_bytes(serialization.Encoding.PEM
).decode('ascii') + six.u(issuer_chain)
return new_cert.public_bytes(serialization.Encoding.PEM).decode('ascii'
) + extended_chain
|
create_proxy_credentials
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(issuer_cred, public_key, lifetime_hours):\n loaded_cert, loaded_private_key, issuer_chain = parse_issuer_cred(\n issuer_cred)\n loaded_public_key = serialization.load_pem_public_key(public_key.encode\n ('ascii'), backend=default_backend())\n confirm_not_old_proxy(loaded_cert)\n validate_key_usage(loaded_cert)\n new_cert = create_proxy_cert(loaded_cert, loaded_private_key,\n loaded_public_key, lifetime_hours)\n extended_chain = loaded_cert.public_bytes(serialization.Encoding.PEM\n ).decode('ascii') + six.u(issuer_chain)\n return new_cert.public_bytes(serialization.Encoding.PEM).decode('ascii'\n ) + extended_chain\n",
"role": "user"
},
{
"content": "create_proxy_credentials",
"role": "assistant"
}
] |
def x(issuer_cred):
sections = re.findall('-----BEGIN.*?-----.*?-----END.*?-----',
issuer_cred, flags=re.DOTALL)
try:
issuer_cert = sections[0]
issuer_private_key = sections[1]
issuer_chain_certs = sections[2:]
except IndexError:
raise ValueError(
'Unable to parse PEM data in credentials, make sure the X.509 file is in PEM format and consists of the issuer cert, issuer private key, and proxy chain (if any) in that order.'
)
try:
loaded_cert = x509.load_pem_x509_certificate(six.b(issuer_cert),
default_backend())
loaded_private_key = serialization.load_pem_private_key(six.b(
issuer_private_key), password=None, backend=default_backend())
for chain_cert in issuer_chain_certs:
x509.load_pem_x509_certificate(six.b(chain_cert), default_backend()
)
issuer_chain = ''.join(issuer_chain_certs)
except ValueError:
raise ValueError(
'Failed to decode PEM data in credentials. Make sure the X.509 file consists of the issuer cert, issuer private key, and proxy chain (if any) in that order.'
)
return loaded_cert, loaded_private_key, issuer_chain
|
parse_issuer_cred
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(issuer_cred):\n sections = re.findall('-----BEGIN.*?-----.*?-----END.*?-----',\n issuer_cred, flags=re.DOTALL)\n try:\n issuer_cert = sections[0]\n issuer_private_key = sections[1]\n issuer_chain_certs = sections[2:]\n except IndexError:\n raise ValueError(\n 'Unable to parse PEM data in credentials, make sure the X.509 file is in PEM format and consists of the issuer cert, issuer private key, and proxy chain (if any) in that order.'\n )\n try:\n loaded_cert = x509.load_pem_x509_certificate(six.b(issuer_cert),\n default_backend())\n loaded_private_key = serialization.load_pem_private_key(six.b(\n issuer_private_key), password=None, backend=default_backend())\n for chain_cert in issuer_chain_certs:\n x509.load_pem_x509_certificate(six.b(chain_cert), default_backend()\n )\n issuer_chain = ''.join(issuer_chain_certs)\n except ValueError:\n raise ValueError(\n 'Failed to decode PEM data in credentials. Make sure the X.509 file consists of the issuer cert, issuer private key, and proxy chain (if any) in that order.'\n )\n return loaded_cert, loaded_private_key, issuer_chain\n",
"role": "user"
},
{
"content": "parse_issuer_cred",
"role": "assistant"
}
] |
def x(loaded_cert, loaded_private_key, loaded_public_key, lifetime_hours):
builder = x509.CertificateBuilder()
serial = struct.unpack('<Q', os.urandom(8))[0]
builder = builder.serial_number(serial)
builder = builder.not_valid_before(datetime.datetime.utcnow())
builder = builder.not_valid_after(datetime.datetime.utcnow() + datetime
.timedelta(hours=lifetime_hours))
builder = builder.public_key(loaded_public_key)
builder = builder.issuer_name(loaded_cert.subject)
new_atribute = x509.NameAttribute(x509.oid.NameOID.COMMON_NAME, six.u(
str(serial)))
subject_attributes = list(loaded_cert.subject)
subject_attributes.append(new_atribute)
builder = builder.subject_name(x509.Name(subject_attributes))
oid = x509.ObjectIdentifier('1.3.6.1.5.5.7.1.14')
value = b'0\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x15\x01'
extension = x509.extensions.UnrecognizedExtension(oid, value)
builder = builder.add_extension(extension, critical=True)
new_certificate = builder.sign(private_key=loaded_private_key,
algorithm=hashes.SHA256(), backend=default_backend())
return new_certificate
|
create_proxy_cert
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(loaded_cert, loaded_private_key, loaded_public_key, lifetime_hours):\n builder = x509.CertificateBuilder()\n serial = struct.unpack('<Q', os.urandom(8))[0]\n builder = builder.serial_number(serial)\n builder = builder.not_valid_before(datetime.datetime.utcnow())\n builder = builder.not_valid_after(datetime.datetime.utcnow() + datetime\n .timedelta(hours=lifetime_hours))\n builder = builder.public_key(loaded_public_key)\n builder = builder.issuer_name(loaded_cert.subject)\n new_atribute = x509.NameAttribute(x509.oid.NameOID.COMMON_NAME, six.u(\n str(serial)))\n subject_attributes = list(loaded_cert.subject)\n subject_attributes.append(new_atribute)\n builder = builder.subject_name(x509.Name(subject_attributes))\n oid = x509.ObjectIdentifier('1.3.6.1.5.5.7.1.14')\n value = b'0\\x0c0\\n\\x06\\x08+\\x06\\x01\\x05\\x05\\x07\\x15\\x01'\n extension = x509.extensions.UnrecognizedExtension(oid, value)\n builder = builder.add_extension(extension, critical=True)\n new_certificate = builder.sign(private_key=loaded_private_key,\n algorithm=hashes.SHA256(), backend=default_backend())\n return new_certificate\n",
"role": "user"
},
{
"content": "create_proxy_cert",
"role": "assistant"
}
] |
def x(loaded_cert):
last_cn = loaded_cert.subject.get_attributes_for_oid(x509.oid.NameOID.
COMMON_NAME)[-1]
if last_cn.value in ('proxy', 'limited proxy'):
raise ValueError(
'Proxy certificate is in an outdated format that is no longer supported'
)
|
confirm_not_old_proxy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(loaded_cert):\n last_cn = loaded_cert.subject.get_attributes_for_oid(x509.oid.NameOID.\n COMMON_NAME)[-1]\n if last_cn.value in ('proxy', 'limited proxy'):\n raise ValueError(\n 'Proxy certificate is in an outdated format that is no longer supported'\n )\n",
"role": "user"
},
{
"content": "confirm_not_old_proxy",
"role": "assistant"
}
] |
def x(loaded_cert):
try:
key_usage = loaded_cert.extensions.get_extension_for_oid(x509.oid.
ExtensionOID.KEY_USAGE)
if not key_usage.value.digital_signature:
raise ValueError(
'Certificate is using the keyUsage extension, but has not asserted the Digital Signature bit.'
)
except x509.ExtensionNotFound:
return
|
validate_key_usage
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(loaded_cert):\n try:\n key_usage = loaded_cert.extensions.get_extension_for_oid(x509.oid.\n ExtensionOID.KEY_USAGE)\n if not key_usage.value.digital_signature:\n raise ValueError(\n 'Certificate is using the keyUsage extension, but has not asserted the Digital Signature bit.'\n )\n except x509.ExtensionNotFound:\n return\n",
"role": "user"
},
{
"content": "validate_key_usage",
"role": "assistant"
}
] |
def x(task_id):
client = get_client()
res = client.task_pause_info(task_id)
def x(res):
explicit_pauses = [field for field in EXPLICIT_PAUSE_MSG_FIELDS if
res.get(field[1])]
effective_pause_rules = res['pause_rules']
if not explicit_pauses and not effective_pause_rules:
safeprint('Task {} is not paused.'.format(task_id))
click.get_current_context().exit(0)
if explicit_pauses:
formatted_print(res, fields=explicit_pauses, text_format=
FORMAT_TEXT_RECORD, text_preamble=
"""This task has been explicitly paused.
""", text_epilog=
'\n' if effective_pause_rules else None)
if effective_pause_rules:
formatted_print(effective_pause_rules, fields=
PAUSE_RULE_DISPLAY_FIELDS, text_preamble=
"""The following pause rules are effective on this task:
""")
formatted_print(res, text_format=_custom_text_format)
|
task_pause_info
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(task_id):\n client = get_client()\n res = client.task_pause_info(task_id)\n\n def x(res):\n explicit_pauses = [field for field in EXPLICIT_PAUSE_MSG_FIELDS if\n res.get(field[1])]\n effective_pause_rules = res['pause_rules']\n if not explicit_pauses and not effective_pause_rules:\n safeprint('Task {} is not paused.'.format(task_id))\n click.get_current_context().exit(0)\n if explicit_pauses:\n formatted_print(res, fields=explicit_pauses, text_format=\n FORMAT_TEXT_RECORD, text_preamble=\n \"\"\"This task has been explicitly paused.\n\"\"\", text_epilog=\n '\\n' if effective_pause_rules else None)\n if effective_pause_rules:\n formatted_print(effective_pause_rules, fields=\n PAUSE_RULE_DISPLAY_FIELDS, text_preamble=\n \"\"\"The following pause rules are effective on this task:\n\"\"\")\n formatted_print(res, text_format=_custom_text_format)\n",
"role": "user"
},
{
"content": "task_pause_info",
"role": "assistant"
}
] |
def x(self):
self.timer = t.Thread(target=self.report_spans)
self.timer.daemon = True
self.timer.name = 'Instana Span Reporting'
self.timer.start()
|
run
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.timer = t.Thread(target=self.report_spans)\n self.timer.daemon = True\n self.timer.name = 'Instana Span Reporting'\n self.timer.start()\n",
"role": "user"
},
{
"content": "run",
"role": "assistant"
}
] |
def x(self):
logger.debug('Span reporting thread is now alive')
def x():
queue_size = self.queue.qsize()
if queue_size > 0 and instana.singletons.agent.can_send():
response = instana.singletons.agent.report_traces(self.
queued_spans())
if response:
logger.debug('reported %d spans' % queue_size)
return True
every(2, span_work, 'Span Reporting')
|
report_spans
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n logger.debug('Span reporting thread is now alive')\n\n def x():\n queue_size = self.queue.qsize()\n if queue_size > 0 and instana.singletons.agent.can_send():\n response = instana.singletons.agent.report_traces(self.\n queued_spans())\n if response:\n logger.debug('reported %d spans' % queue_size)\n return True\n every(2, span_work, 'Span Reporting')\n",
"role": "user"
},
{
"content": "report_spans",
"role": "assistant"
}
] |
def x(self):
spans = []
while True:
try:
s = self.queue.get(False)
except queue.Empty:
break
else:
spans.append(s)
return spans
|
queued_spans
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n spans = []\n while True:\n try:\n s = self.queue.get(False)\n except queue.Empty:\n break\n else:\n spans.append(s)\n return spans\n",
"role": "user"
},
{
"content": "queued_spans",
"role": "assistant"
}
] |
def x(self, span):
if instana.singletons.agent.can_send() or 'INSTANA_TEST' in os.environ:
json_span = None
if span.operation_name in self.registered_spans:
json_span = self.build_registered_span(span)
else:
json_span = self.build_sdk_span(span)
self.queue.put(json_span)
|
record_span
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, span):\n if instana.singletons.agent.can_send() or 'INSTANA_TEST' in os.environ:\n json_span = None\n if span.operation_name in self.registered_spans:\n json_span = self.build_registered_span(span)\n else:\n json_span = self.build_sdk_span(span)\n self.queue.put(json_span)\n",
"role": "user"
},
{
"content": "record_span",
"role": "assistant"
}
] |
def x(self, span):
data = Data(baggage=span.context.baggage)
kind = 1
if span.operation_name in self.exit_spans:
kind = 2
if span.operation_name == 'log':
kind = 3
logs = self.collect_logs(span)
if len(logs) > 0:
if data.custom is None:
data.custom = CustomData()
data.custom.logs = logs
if span.operation_name in self.http_spans:
data.http = HttpData(host=span.tags.pop('http.host', None), url=
span.tags.pop(ext.HTTP_URL, None), params=span.tags.pop(
'http.params', None), method=span.tags.pop(ext.HTTP_METHOD,
None), status=span.tags.pop(ext.HTTP_STATUS_CODE, None),
path_tpl=span.tags.pop('http.path_tpl', None), error=span.tags.
pop('http.error', None))
if span.operation_name == 'rabbitmq':
data.rabbitmq = RabbitmqData(exchange=span.tags.pop('exchange',
None), queue=span.tags.pop('queue', None), sort=span.tags.pop(
'sort', None), address=span.tags.pop('address', None), key=span
.tags.pop('key', None))
if data.rabbitmq.sort == 'consume':
kind = 1
if span.operation_name == 'redis':
data.redis = RedisData(connection=span.tags.pop('connection', None),
driver=span.tags.pop('driver', None), command=span.tags.pop(
'command', None), error=span.tags.pop('redis.error', None),
subCommands=span.tags.pop('subCommands', None))
if (span.operation_name == 'rpc-client' or span.operation_name ==
'rpc-server'):
data.rpc = RPCData(flavor=span.tags.pop('rpc.flavor', None), host=
span.tags.pop('rpc.host', None), port=span.tags.pop('rpc.port',
None), call=span.tags.pop('rpc.call', None), call_type=span.
tags.pop('rpc.call_type', None), params=span.tags.pop(
'rpc.params', None), baggage=span.tags.pop('rpc.baggage', None),
error=span.tags.pop('rpc.error', None))
if span.operation_name == 'sqlalchemy':
data.sqlalchemy = SQLAlchemyData(sql=span.tags.pop('sqlalchemy.sql',
None), eng=span.tags.pop('sqlalchemy.eng', None), url=span.tags
.pop('sqlalchemy.url', None), err=span.tags.pop(
'sqlalchemy.err', None))
if span.operation_name == 'soap':
data.soap = SoapData(action=span.tags.pop('soap.action', None))
if span.operation_name == 'mysql':
data.mysql = MySQLData(host=span.tags.pop('host', None), db=span.
tags.pop(ext.DATABASE_INSTANCE, None), user=span.tags.pop(ext.
DATABASE_USER, None), stmt=span.tags.pop(ext.DATABASE_STATEMENT,
None))
if data.custom is not None and data.custom.logs is not None and len(
data.custom.logs):
tskey = list(data.custom.logs.keys())[0]
data.mysql.error = data.custom.logs[tskey]['message']
if span.operation_name == 'log':
data.log = {}
for l in span.logs:
if 'message' in l.key_values:
data.log['message'] = l.key_values.pop('message', None)
if 'parameters' in l.key_values:
data.log['parameters'] = l.key_values.pop('parameters', None)
entity_from = {'e': instana.singletons.agent.from_.pid, 'h': instana.
singletons.agent.from_.agentUuid}
json_span = JsonSpan(n=span.operation_name, k=kind, t=span.context.
trace_id, p=span.parent_id, s=span.context.span_id, ts=int(round(
span.start_time * 1000)), d=int(round(span.duration * 1000)), f=
entity_from, data=data)
if span.stack:
json_span.stack = span.stack
error = span.tags.pop('error', False)
ec = span.tags.pop('ec', None)
if error and ec:
json_span.error = error
json_span.ec = ec
if len(span.tags) > 0:
if data.custom is None:
data.custom = CustomData()
data.custom.tags = span.tags
return json_span
|
build_registered_span
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, span):\n data = Data(baggage=span.context.baggage)\n kind = 1\n if span.operation_name in self.exit_spans:\n kind = 2\n if span.operation_name == 'log':\n kind = 3\n logs = self.collect_logs(span)\n if len(logs) > 0:\n if data.custom is None:\n data.custom = CustomData()\n data.custom.logs = logs\n if span.operation_name in self.http_spans:\n data.http = HttpData(host=span.tags.pop('http.host', None), url=\n span.tags.pop(ext.HTTP_URL, None), params=span.tags.pop(\n 'http.params', None), method=span.tags.pop(ext.HTTP_METHOD,\n None), status=span.tags.pop(ext.HTTP_STATUS_CODE, None),\n path_tpl=span.tags.pop('http.path_tpl', None), error=span.tags.\n pop('http.error', None))\n if span.operation_name == 'rabbitmq':\n data.rabbitmq = RabbitmqData(exchange=span.tags.pop('exchange',\n None), queue=span.tags.pop('queue', None), sort=span.tags.pop(\n 'sort', None), address=span.tags.pop('address', None), key=span\n .tags.pop('key', None))\n if data.rabbitmq.sort == 'consume':\n kind = 1\n if span.operation_name == 'redis':\n data.redis = RedisData(connection=span.tags.pop('connection', None),\n driver=span.tags.pop('driver', None), command=span.tags.pop(\n 'command', None), error=span.tags.pop('redis.error', None),\n subCommands=span.tags.pop('subCommands', None))\n if (span.operation_name == 'rpc-client' or span.operation_name ==\n 'rpc-server'):\n data.rpc = RPCData(flavor=span.tags.pop('rpc.flavor', None), host=\n span.tags.pop('rpc.host', None), port=span.tags.pop('rpc.port',\n None), call=span.tags.pop('rpc.call', None), call_type=span.\n tags.pop('rpc.call_type', None), params=span.tags.pop(\n 'rpc.params', None), baggage=span.tags.pop('rpc.baggage', None),\n error=span.tags.pop('rpc.error', None))\n if span.operation_name == 'sqlalchemy':\n data.sqlalchemy = SQLAlchemyData(sql=span.tags.pop('sqlalchemy.sql',\n None), eng=span.tags.pop('sqlalchemy.eng', None), url=span.tags\n .pop('sqlalchemy.url', None), err=span.tags.pop(\n 'sqlalchemy.err', None))\n if span.operation_name == 'soap':\n data.soap = SoapData(action=span.tags.pop('soap.action', None))\n if span.operation_name == 'mysql':\n data.mysql = MySQLData(host=span.tags.pop('host', None), db=span.\n tags.pop(ext.DATABASE_INSTANCE, None), user=span.tags.pop(ext.\n DATABASE_USER, None), stmt=span.tags.pop(ext.DATABASE_STATEMENT,\n None))\n if data.custom is not None and data.custom.logs is not None and len(\n data.custom.logs):\n tskey = list(data.custom.logs.keys())[0]\n data.mysql.error = data.custom.logs[tskey]['message']\n if span.operation_name == 'log':\n data.log = {}\n for l in span.logs:\n if 'message' in l.key_values:\n data.log['message'] = l.key_values.pop('message', None)\n if 'parameters' in l.key_values:\n data.log['parameters'] = l.key_values.pop('parameters', None)\n entity_from = {'e': instana.singletons.agent.from_.pid, 'h': instana.\n singletons.agent.from_.agentUuid}\n json_span = JsonSpan(n=span.operation_name, k=kind, t=span.context.\n trace_id, p=span.parent_id, s=span.context.span_id, ts=int(round(\n span.start_time * 1000)), d=int(round(span.duration * 1000)), f=\n entity_from, data=data)\n if span.stack:\n json_span.stack = span.stack\n error = span.tags.pop('error', False)\n ec = span.tags.pop('ec', None)\n if error and ec:\n json_span.error = error\n json_span.ec = ec\n if len(span.tags) > 0:\n if data.custom is None:\n data.custom = CustomData()\n data.custom.tags = span.tags\n return json_span\n",
"role": "user"
},
{
"content": "build_registered_span",
"role": "assistant"
}
] |
def x(self, span):
custom_data = CustomData(tags=span.tags, logs=self.collect_logs(span))
sdk_data = SDKData(name=span.operation_name, custom=custom_data, Type=
self.get_span_kind_as_string(span))
if 'arguments' in span.tags:
sdk_data.arguments = span.tags['arguments']
if 'return' in span.tags:
sdk_data.Return = span.tags['return']
data = Data(service=instana.singletons.agent.sensor.options.
service_name, sdk=sdk_data)
entity_from = {'e': instana.singletons.agent.from_.pid, 'h': instana.
singletons.agent.from_.agentUuid}
json_span = JsonSpan(t=span.context.trace_id, p=span.parent_id, s=span.
context.span_id, ts=int(round(span.start_time * 1000)), d=int(round
(span.duration * 1000)), k=self.get_span_kind_as_int(span), n='sdk',
f=entity_from, data=data)
error = span.tags.pop('error', False)
ec = span.tags.pop('ec', None)
if error and ec:
json_span.error = error
json_span.ec = ec
return json_span
|
build_sdk_span
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, span):\n custom_data = CustomData(tags=span.tags, logs=self.collect_logs(span))\n sdk_data = SDKData(name=span.operation_name, custom=custom_data, Type=\n self.get_span_kind_as_string(span))\n if 'arguments' in span.tags:\n sdk_data.arguments = span.tags['arguments']\n if 'return' in span.tags:\n sdk_data.Return = span.tags['return']\n data = Data(service=instana.singletons.agent.sensor.options.\n service_name, sdk=sdk_data)\n entity_from = {'e': instana.singletons.agent.from_.pid, 'h': instana.\n singletons.agent.from_.agentUuid}\n json_span = JsonSpan(t=span.context.trace_id, p=span.parent_id, s=span.\n context.span_id, ts=int(round(span.start_time * 1000)), d=int(round\n (span.duration * 1000)), k=self.get_span_kind_as_int(span), n='sdk',\n f=entity_from, data=data)\n error = span.tags.pop('error', False)\n ec = span.tags.pop('ec', None)\n if error and ec:\n json_span.error = error\n json_span.ec = ec\n return json_span\n",
"role": "user"
},
{
"content": "build_sdk_span",
"role": "assistant"
}
] |
def x(self, span):
kind = None
if 'span.kind' in span.tags:
if span.tags['span.kind'] in self.entry_kind:
kind = 'entry'
elif span.tags['span.kind'] in self.exit_kind:
kind = 'exit'
else:
kind = 'intermediate'
return kind
|
get_span_kind_as_string
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, span):\n kind = None\n if 'span.kind' in span.tags:\n if span.tags['span.kind'] in self.entry_kind:\n kind = 'entry'\n elif span.tags['span.kind'] in self.exit_kind:\n kind = 'exit'\n else:\n kind = 'intermediate'\n return kind\n",
"role": "user"
},
{
"content": "get_span_kind_as_string",
"role": "assistant"
}
] |
def x(self, span):
kind = None
if 'span.kind' in span.tags:
if span.tags['span.kind'] in self.entry_kind:
kind = 1
elif span.tags['span.kind'] in self.exit_kind:
kind = 2
else:
kind = 3
return kind
|
get_span_kind_as_int
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, span):\n kind = None\n if 'span.kind' in span.tags:\n if span.tags['span.kind'] in self.entry_kind:\n kind = 1\n elif span.tags['span.kind'] in self.exit_kind:\n kind = 2\n else:\n kind = 3\n return kind\n",
"role": "user"
},
{
"content": "get_span_kind_as_int",
"role": "assistant"
}
] |
def x(self):
pid = None
if os.path.exists('/proc/'):
sched_file = '/proc/%d/sched' % os.getpid()
if os.path.isfile(sched_file):
try:
file = open(sched_file)
line = file.readline()
g = re.search('\\((\\d+),', line)
if len(g.groups()) == 1:
pid = int(g.groups()[0])
except Exception:
logger.debug('parsing sched file failed', exc_info=True)
pass
if pid is None:
pid = os.getpid()
return pid
|
get_real_pid
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n pid = None\n if os.path.exists('/proc/'):\n sched_file = '/proc/%d/sched' % os.getpid()\n if os.path.isfile(sched_file):\n try:\n file = open(sched_file)\n line = file.readline()\n g = re.search('\\\\((\\\\d+),', line)\n if len(g.groups()) == 1:\n pid = int(g.groups()[0])\n except Exception:\n logger.debug('parsing sched file failed', exc_info=True)\n pass\n if pid is None:\n pid = os.getpid()\n return pid\n",
"role": "user"
},
{
"content": "get_real_pid",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.