source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(method, uri, query_str): if not query_str: return None query_parms = {} for query_item in query_str.split('&'): if query_item == '': continue items = query_item.split('=') if len(items) != 2: raise BadRequestError(method, uri, reason=1, message= "Invalid format for URI query parameter: {!r} (valid format is: 'name=value')." .format(query_item)) name = unquote(items[0]) value = unquote(items[1]) if name in query_parms: existing_value = query_parms[name] if not isinstance(existing_value, list): query_parms[name] = list() query_parms[name].append(existing_value) query_parms[name].append(value) else: query_parms[name] = value return query_parms
parse_query_parms
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, uri, query_str):\n if not query_str:\n return None\n query_parms = {}\n for query_item in query_str.split('&'):\n if query_item == '':\n continue\n items = query_item.split('=')\n if len(items) != 2:\n raise BadRequestError(method, uri, reason=1, message=\n \"Invalid format for URI query parameter: {!r} (valid format is: 'name=value').\"\n .format(query_item))\n name = unquote(items[0])\n value = unquote(items[1])\n if name in query_parms:\n existing_value = query_parms[name]\n if not isinstance(existing_value, list):\n query_parms[name] = list()\n query_parms[name].append(existing_value)\n query_parms[name].append(value)\n else:\n query_parms[name] = value\n return query_parms\n", "role": "user" }, { "content": "parse_query_parms", "role": "assistant" } ]
def x(method, uri, body, field_names): if body is None: raise BadRequestError(method, uri, reason=3, message= 'Missing request body') for field_name in field_names: if field_name not in body: raise BadRequestError(method, uri, reason=5, message= 'Missing required field in request body: {}'.format(field_name) )
check_required_fields
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, uri, body, field_names):\n if body is None:\n raise BadRequestError(method, uri, reason=3, message=\n 'Missing request body')\n for field_name in field_names:\n if field_name not in body:\n raise BadRequestError(method, uri, reason=5, message=\n 'Missing required field in request body: {}'.format(field_name)\n )\n", "role": "user" }, { "content": "check_required_fields", "role": "assistant" } ]
def x(method, uri, cpc): status = cpc.properties.get('status', None) if status is None: return valid_statuses = ['active', 'service-required', 'degraded', 'exceptions'] if status not in valid_statuses: if uri.startswith(cpc.uri): raise ConflictError(method, uri, reason=1, message= 'The operation cannot be performed because the targeted CPC {} has a status that is not valid for the operation: {}' .format(cpc.name, status)) else: raise ConflictError(method, uri, reason=6, message= 'The operation cannot be performed because CPC {} hosting the targeted resource has a status that is not valid for the operation: {}' .format(cpc.name, status))
check_valid_cpc_status
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, uri, cpc):\n status = cpc.properties.get('status', None)\n if status is None:\n return\n valid_statuses = ['active', 'service-required', 'degraded', 'exceptions']\n if status not in valid_statuses:\n if uri.startswith(cpc.uri):\n raise ConflictError(method, uri, reason=1, message=\n 'The operation cannot be performed because the targeted CPC {} has a status that is not valid for the operation: {}'\n .format(cpc.name, status))\n else:\n raise ConflictError(method, uri, reason=6, message=\n 'The operation cannot be performed because CPC {} hosting the targeted resource has a status that is not valid for the operation: {}'\n .format(cpc.name, status))\n", "role": "user" }, { "content": "check_valid_cpc_status", "role": "assistant" } ]
def x(method, uri, partition, valid_statuses=None, invalid_statuses=None): status = partition.properties.get('status', None) if status is None: return if (valid_statuses and status not in valid_statuses or invalid_statuses and status in invalid_statuses): if uri.startswith(partition.uri): raise ConflictError(method, uri, reason=1, message= 'The operation cannot be performed because the targeted partition {} has a status that is not valid for the operation: {}' .format(partition.name, status)) else: raise ConflictError(method, uri, reason=1, message= 'The operation cannot be performed because partition {} hosting the targeted resource has a status that is not valid for the operation: {}' .format(partition.name, status))
check_partition_status
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, uri, partition, valid_statuses=None, invalid_statuses=None):\n status = partition.properties.get('status', None)\n if status is None:\n return\n if (valid_statuses and status not in valid_statuses or invalid_statuses and\n status in invalid_statuses):\n if uri.startswith(partition.uri):\n raise ConflictError(method, uri, reason=1, message=\n 'The operation cannot be performed because the targeted partition {} has a status that is not valid for the operation: {}'\n .format(partition.name, status))\n else:\n raise ConflictError(method, uri, reason=1, message=\n 'The operation cannot be performed because partition {} hosting the targeted resource has a status that is not valid for the operation: {}'\n .format(partition.name, status))\n", "role": "user" }, { "content": "check_partition_status", "role": "assistant" } ]
def x(partition): if ('crypto-configuration' not in partition.properties or partition. properties['crypto-configuration'] is None): partition.properties['crypto-configuration'] = {} crypto_config = partition.properties['crypto-configuration'] if 'crypto-adapter-uris' not in crypto_config or crypto_config[ 'crypto-adapter-uris'] is None: crypto_config['crypto-adapter-uris'] = [] adapter_uris = crypto_config['crypto-adapter-uris'] if 'crypto-domain-configurations' not in crypto_config or crypto_config[ 'crypto-domain-configurations'] is None: crypto_config['crypto-domain-configurations'] = [] domain_configs = crypto_config['crypto-domain-configurations'] return adapter_uris, domain_configs
ensure_crypto_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(partition):\n if ('crypto-configuration' not in partition.properties or partition.\n properties['crypto-configuration'] is None):\n partition.properties['crypto-configuration'] = {}\n crypto_config = partition.properties['crypto-configuration']\n if 'crypto-adapter-uris' not in crypto_config or crypto_config[\n 'crypto-adapter-uris'] is None:\n crypto_config['crypto-adapter-uris'] = []\n adapter_uris = crypto_config['crypto-adapter-uris']\n if 'crypto-domain-configurations' not in crypto_config or crypto_config[\n 'crypto-domain-configurations'] is None:\n crypto_config['crypto-domain-configurations'] = []\n domain_configs = crypto_config['crypto-domain-configurations']\n return adapter_uris, domain_configs\n", "role": "user" }, { "content": "ensure_crypto_config", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): try: resource = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) return resource.properties
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n return resource.properties\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True try: resource = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) resource.update(body)
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n resource.update(body)\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): try: resource = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) resource.manager.remove(resource.oid)
delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n resource.manager.remove(resource.oid)\n", "role": "user" }, { "content": "delete", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True console_uri = '/api/console' try: console = hmc.lookup_by_uri(console_uri) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['user-pattern-uris']) new_order_uris = body['user-pattern-uris'] objs = console.user_patterns.list() obj_by_uri = {} for obj in objs: obj_by_uri[obj.uri] = obj for uri in new_order_uris: obj = obj_by_uri[uri] console.user_patterns.remove(obj.oid) console.user_patterns.add(obj.properties)
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n console_uri = '/api/console'\n try:\n console = hmc.lookup_by_uri(console_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['user-pattern-uris'])\n new_order_uris = body['user-pattern-uris']\n objs = console.user_patterns.list()\n obj_by_uri = {}\n for obj in objs:\n obj_by_uri[obj.uri] = obj\n for uri in new_order_uris:\n obj = obj_by_uri[uri]\n console.user_patterns.remove(obj.oid)\n console.user_patterns.add(obj.properties)\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True console_uri = '/api/console' try: hmc.lookup_by_uri(console_uri) except KeyError: raise InvalidResourceError(method, uri) resp = [] return resp
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n console_uri = '/api/console'\n try:\n hmc.lookup_by_uri(console_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n resp = []\n return resp\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) result_ucpcs = [] filter_args = parse_query_parms(method, uri, query_str) for ucpc in console.unmanaged_cpcs.list(filter_args): result_ucpc = {} for prop in ucpc.properties: if prop in ('object-uri', 'name'): result_ucpc[prop] = ucpc.properties[prop] result_ucpcs.append(result_ucpc) return {'cpcs': result_ucpcs}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_ucpcs = []\n filter_args = parse_query_parms(method, uri, query_str)\n for ucpc in console.unmanaged_cpcs.list(filter_args):\n result_ucpc = {}\n for prop in ucpc.properties:\n if prop in ('object-uri', 'name'):\n result_ucpc[prop] = ucpc.properties[prop]\n result_ucpcs.append(result_ucpc)\n return {'cpcs': result_ucpcs}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) result_users = [] filter_args = parse_query_parms(method, uri, query_str) for user in console.users.list(filter_args): result_user = {} for prop in user.properties: if prop in ('object-uri', 'name', 'type'): result_user[prop] = user.properties[prop] result_users.append(result_user) return {'users': result_users}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_users = []\n filter_args = parse_query_parms(method, uri, query_str)\n for user in console.users.list(filter_args):\n result_user = {}\n for prop in user.properties:\n if prop in ('object-uri', 'name', 'type'):\n result_user[prop] = user.properties[prop]\n result_users.append(result_user)\n return {'users': result_users}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): try: user = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) type_ = user.properties['type'] if type_ == 'pattern-based': raise BadRequestError(method, uri, reason=312, message= 'Cannot delete pattern-based user {!r}'.format(user.name)) user.manager.remove(user.oid)
delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n user = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n type_ = user.properties['type']\n if type_ == 'pattern-based':\n raise BadRequestError(method, uri, reason=312, message=\n 'Cannot delete pattern-based user {!r}'.format(user.name))\n user.manager.remove(user.oid)\n", "role": "user" }, { "content": "delete", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True user_oid = uri_parms[0] user_uri = '/api/users/' + user_oid try: user = hmc.lookup_by_uri(user_uri) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['user-role-uri']) user_type = user.properties['type'] if user_type in ('pattern-based', 'system-defined'): raise BadRequestError(method, uri, reason=314, message= 'Cannot add user role to user of type {}: {}'.format(user_type, user_uri)) user_role_uri = body['user-role-uri'] try: hmc.lookup_by_uri(user_role_uri) except KeyError: raise InvalidResourceError(method, user_role_uri, reason=2) if user.properties.get('user-roles', None) is None: user.properties['user-roles'] = [] user.properties['user-roles'].append(user_role_uri)
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n user_oid = uri_parms[0]\n user_uri = '/api/users/' + user_oid\n try:\n user = hmc.lookup_by_uri(user_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['user-role-uri'])\n user_type = user.properties['type']\n if user_type in ('pattern-based', 'system-defined'):\n raise BadRequestError(method, uri, reason=314, message=\n 'Cannot add user role to user of type {}: {}'.format(user_type,\n user_uri))\n user_role_uri = body['user-role-uri']\n try:\n hmc.lookup_by_uri(user_role_uri)\n except KeyError:\n raise InvalidResourceError(method, user_role_uri, reason=2)\n if user.properties.get('user-roles', None) is None:\n user.properties['user-roles'] = []\n user.properties['user-roles'].append(user_role_uri)\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) result_user_roles = [] filter_args = parse_query_parms(method, uri, query_str) for user_role in console.user_roles.list(filter_args): result_user_role = {} for prop in user_role.properties: if prop in ('object-uri', 'name', 'type'): result_user_role[prop] = user_role.properties[prop] result_user_roles.append(result_user_role) return {'user-roles': result_user_roles}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_user_roles = []\n filter_args = parse_query_parms(method, uri, query_str)\n for user_role in console.user_roles.list(filter_args):\n result_user_role = {}\n for prop in user_role.properties:\n if prop in ('object-uri', 'name', 'type'):\n result_user_role[prop] = user_role.properties[prop]\n result_user_roles.append(result_user_role)\n return {'user-roles': result_user_roles}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['name']) properties = copy.deepcopy(body) if 'type' in properties: raise BadRequestError(method, uri, reason=6, message= 'Type specified when creating a user role: {!r}'.format( properties['type'])) properties['type'] = 'user-defined' new_user_role = console.user_roles.add(properties) return {'object-uri': new_user_role.uri}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['name'])\n properties = copy.deepcopy(body)\n if 'type' in properties:\n raise BadRequestError(method, uri, reason=6, message=\n 'Type specified when creating a user role: {!r}'.format(\n properties['type']))\n properties['type'] = 'user-defined'\n new_user_role = console.user_roles.add(properties)\n return {'object-uri': new_user_role.uri}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True user_role_oid = uri_parms[0] user_role_uri = '/api/user-roles/' + user_role_oid try: user_role = hmc.lookup_by_uri(user_role_uri) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['permitted-object', 'permitted-object-type']) if user_role.properties['type'] == 'system-defined': raise BadRequestError(method, uri, reason=314, message= 'Cannot add permission to system-defined user role: {}'.format( user_role_uri)) permission = copy.deepcopy(body) if 'include-members' not in permission: permission['include-members'] = False if 'view-only-mode' not in permission: permission['view-only-mode'] = True if user_role.properties.get('permissions', None) is None: user_role.properties['permissions'] = [] user_role.properties['permissions'].append(permission)
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n user_role_oid = uri_parms[0]\n user_role_uri = '/api/user-roles/' + user_role_oid\n try:\n user_role = hmc.lookup_by_uri(user_role_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['permitted-object',\n 'permitted-object-type'])\n if user_role.properties['type'] == 'system-defined':\n raise BadRequestError(method, uri, reason=314, message=\n 'Cannot add permission to system-defined user role: {}'.format(\n user_role_uri))\n permission = copy.deepcopy(body)\n if 'include-members' not in permission:\n permission['include-members'] = False\n if 'view-only-mode' not in permission:\n permission['view-only-mode'] = True\n if user_role.properties.get('permissions', None) is None:\n user_role.properties['permissions'] = []\n user_role.properties['permissions'].append(permission)\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) result_tasks = [] filter_args = parse_query_parms(method, uri, query_str) for task in console.tasks.list(filter_args): result_task = {} for prop in task.properties: if prop in ('element-uri', 'name'): result_task[prop] = task.properties[prop] result_tasks.append(result_task) return {'tasks': result_tasks}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_tasks = []\n filter_args = parse_query_parms(method, uri, query_str)\n for task in console.tasks.list(filter_args):\n result_task = {}\n for prop in task.properties:\n if prop in ('element-uri', 'name'):\n result_task[prop] = task.properties[prop]\n result_tasks.append(result_task)\n return {'tasks': result_tasks}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) result_user_patterns = [] filter_args = parse_query_parms(method, uri, query_str) for user_pattern in console.user_patterns.list(filter_args): result_user_pattern = {} for prop in user_pattern.properties: if prop in ('element-uri', 'name', 'type'): result_user_pattern[prop] = user_pattern.properties[prop] result_user_patterns.append(result_user_pattern) return {'user-patterns': result_user_patterns}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_user_patterns = []\n filter_args = parse_query_parms(method, uri, query_str)\n for user_pattern in console.user_patterns.list(filter_args):\n result_user_pattern = {}\n for prop in user_pattern.properties:\n if prop in ('element-uri', 'name', 'type'):\n result_user_pattern[prop] = user_pattern.properties[prop]\n result_user_patterns.append(result_user_pattern)\n return {'user-patterns': result_user_patterns}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) result_password_rules = [] filter_args = parse_query_parms(method, uri, query_str) for password_rule in console.password_rules.list(filter_args): result_password_rule = {} for prop in password_rule.properties: if prop in ('element-uri', 'name', 'type'): result_password_rule[prop] = password_rule.properties[prop] result_password_rules.append(result_password_rule) return {'password-rules': result_password_rules}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_password_rules = []\n filter_args = parse_query_parms(method, uri, query_str)\n for password_rule in console.password_rules.list(filter_args):\n result_password_rule = {}\n for prop in password_rule.properties:\n if prop in ('element-uri', 'name', 'type'):\n result_password_rule[prop] = password_rule.properties[prop]\n result_password_rules.append(result_password_rule)\n return {'password-rules': result_password_rules}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['name']) new_password_rule = console.password_rules.add(body) return {'element-uri': new_password_rule.uri}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['name'])\n new_password_rule = console.password_rules.add(body)\n return {'element-uri': new_password_rule.uri}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] try: console = hmc.consoles.lookup_by_oid(None) except KeyError: raise InvalidResourceError(method, uri) result_ldap_srv_defs = [] filter_args = parse_query_parms(method, uri, query_str) for ldap_srv_def in console.ldap_server_definitions.list(filter_args): result_ldap_srv_def = {} for prop in ldap_srv_def.properties: if prop in ('element-uri', 'name', 'type'): result_ldap_srv_def[prop] = ldap_srv_def.properties[prop] result_ldap_srv_defs.append(result_ldap_srv_def) return {'ldap-server-definitions': result_ldap_srv_defs}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_ldap_srv_defs = []\n filter_args = parse_query_parms(method, uri, query_str)\n for ldap_srv_def in console.ldap_server_definitions.list(filter_args):\n result_ldap_srv_def = {}\n for prop in ldap_srv_def.properties:\n if prop in ('element-uri', 'name', 'type'):\n result_ldap_srv_def[prop] = ldap_srv_def.properties[prop]\n result_ldap_srv_defs.append(result_ldap_srv_def)\n return {'ldap-server-definitions': result_ldap_srv_defs}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] result_cpcs = [] filter_args = parse_query_parms(method, uri, query_str) for cpc in hmc.cpcs.list(filter_args): result_cpc = {} for prop in cpc.properties: if prop in ('object-uri', 'name', 'status'): result_cpc[prop] = cpc.properties[prop] result_cpcs.append(result_cpc) return {'cpcs': result_cpcs}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n result_cpcs = []\n filter_args = parse_query_parms(method, uri, query_str)\n for cpc in hmc.cpcs.list(filter_args):\n result_cpc = {}\n for prop in cpc.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_cpc[prop] = cpc.properties[prop]\n result_cpcs.append(result_cpc)\n return {'cpcs': result_cpcs}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True cpc_oid = uri_parms[0] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['power-saving']) power_saving = body['power-saving'] if power_saving not in ['high-performance', 'low-power', 'custom']: raise BadRequestError(method, uri, reason=7, message= 'Invalid power-saving value: %r' % power_saving) cpc.properties['cpc-power-saving'] = power_saving cpc.properties['cpc-power-saving-state'] = power_saving cpc.properties['zcpc-power-saving'] = power_saving cpc.properties['zcpc-power-saving-state'] = power_saving
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['power-saving'])\n power_saving = body['power-saving']\n if power_saving not in ['high-performance', 'low-power', 'custom']:\n raise BadRequestError(method, uri, reason=7, message=\n 'Invalid power-saving value: %r' % power_saving)\n cpc.properties['cpc-power-saving'] = power_saving\n cpc.properties['cpc-power-saving-state'] = power_saving\n cpc.properties['zcpc-power-saving'] = power_saving\n cpc.properties['zcpc-power-saving-state'] = power_saving\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True cpc_oid = uri_parms[0] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['power-capping-state']) power_capping_state = body['power-capping-state'] power_cap_current = body.get('power-cap-current', None) if power_capping_state not in ['disabled', 'enabled', 'custom']: raise BadRequestError(method, uri, reason=7, message= 'Invalid power-capping-state value: %r' % power_capping_state) if power_capping_state == 'enabled' and power_cap_current is None: raise BadRequestError(method, uri, reason=7, message= 'Power-cap-current must be provided when enabling power capping') cpc.properties['cpc-power-capping-state'] = power_capping_state cpc.properties['cpc-power-cap-current'] = power_cap_current cpc.properties['zcpc-power-capping-state'] = power_capping_state cpc.properties['zcpc-power-cap-current'] = power_cap_current
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['power-capping-state'])\n power_capping_state = body['power-capping-state']\n power_cap_current = body.get('power-cap-current', None)\n if power_capping_state not in ['disabled', 'enabled', 'custom']:\n raise BadRequestError(method, uri, reason=7, message=\n 'Invalid power-capping-state value: %r' % power_capping_state)\n if power_capping_state == 'enabled' and power_cap_current is None:\n raise BadRequestError(method, uri, reason=7, message=\n 'Power-cap-current must be provided when enabling power capping')\n cpc.properties['cpc-power-capping-state'] = power_capping_state\n cpc.properties['cpc-power-cap-current'] = power_cap_current\n cpc.properties['zcpc-power-capping-state'] = power_capping_state\n cpc.properties['zcpc-power-cap-current'] = power_cap_current\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): cpc_oid = uri_parms[0] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) energy_props = {'cpc-power-cap-allowed': cpc.properties.get( 'cpc-power-cap-allowed'), 'cpc-power-cap-current': cpc.properties. get('cpc-power-cap-current'), 'cpc-power-cap-maximum': cpc. properties.get('cpc-power-cap-maximum'), 'cpc-power-cap-minimum': cpc.properties.get('cpc-power-cap-minimum'), 'cpc-power-capping-state': cpc.properties.get( 'cpc-power-capping-state'), 'cpc-power-consumption': cpc.properties .get('cpc-power-consumption'), 'cpc-power-rating': cpc.properties. get('cpc-power-rating'), 'cpc-power-save-allowed': cpc.properties. get('cpc-power-save-allowed'), 'cpc-power-saving': cpc.properties. get('cpc-power-saving'), 'cpc-power-saving-state': cpc.properties. get('cpc-power-saving-state'), 'zcpc-ambient-temperature': cpc. properties.get('zcpc-ambient-temperature'), 'zcpc-dew-point': cpc. properties.get('zcpc-dew-point'), 'zcpc-exhaust-temperature': cpc. properties.get('zcpc-exhaust-temperature'), 'zcpc-heat-load': cpc. properties.get('zcpc-heat-load'), 'zcpc-heat-load-forced-air': cpc. properties.get('zcpc-heat-load-forced-air'), 'zcpc-heat-load-water': cpc.properties.get('zcpc-heat-load-water'), 'zcpc-humidity': cpc. properties.get('zcpc-humidity'), 'zcpc-maximum-potential-heat-load': cpc.properties.get('zcpc-maximum-potential-heat-load'), 'zcpc-maximum-potential-power': cpc.properties.get( 'zcpc-maximum-potential-power'), 'zcpc-power-cap-allowed': cpc. properties.get('zcpc-power-cap-allowed'), 'zcpc-power-cap-current': cpc.properties.get('zcpc-power-cap-current'), 'zcpc-power-cap-maximum': cpc.properties.get( 'zcpc-power-cap-maximum'), 'zcpc-power-cap-minimum': cpc.properties .get('zcpc-power-cap-minimum'), 'zcpc-power-capping-state': cpc. properties.get('zcpc-power-capping-state'), 'zcpc-power-consumption': cpc.properties.get( 'zcpc-power-consumption'), 'zcpc-power-rating': cpc.properties.get( 'zcpc-power-rating'), 'zcpc-power-save-allowed': cpc.properties.get ('zcpc-power-save-allowed'), 'zcpc-power-saving': cpc.properties. get('zcpc-power-saving'), 'zcpc-power-saving-state': cpc.properties .get('zcpc-power-saving-state')} cpc_data = {'error-occurred': False, 'object-uri': cpc.uri, 'object-id': cpc.oid, 'class': 'cpcs', 'properties': energy_props} result = {'objects': [cpc_data]} return result
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n energy_props = {'cpc-power-cap-allowed': cpc.properties.get(\n 'cpc-power-cap-allowed'), 'cpc-power-cap-current': cpc.properties.\n get('cpc-power-cap-current'), 'cpc-power-cap-maximum': cpc.\n properties.get('cpc-power-cap-maximum'), 'cpc-power-cap-minimum':\n cpc.properties.get('cpc-power-cap-minimum'),\n 'cpc-power-capping-state': cpc.properties.get(\n 'cpc-power-capping-state'), 'cpc-power-consumption': cpc.properties\n .get('cpc-power-consumption'), 'cpc-power-rating': cpc.properties.\n get('cpc-power-rating'), 'cpc-power-save-allowed': cpc.properties.\n get('cpc-power-save-allowed'), 'cpc-power-saving': cpc.properties.\n get('cpc-power-saving'), 'cpc-power-saving-state': cpc.properties.\n get('cpc-power-saving-state'), 'zcpc-ambient-temperature': cpc.\n properties.get('zcpc-ambient-temperature'), 'zcpc-dew-point': cpc.\n properties.get('zcpc-dew-point'), 'zcpc-exhaust-temperature': cpc.\n properties.get('zcpc-exhaust-temperature'), 'zcpc-heat-load': cpc.\n properties.get('zcpc-heat-load'), 'zcpc-heat-load-forced-air': cpc.\n properties.get('zcpc-heat-load-forced-air'), 'zcpc-heat-load-water':\n cpc.properties.get('zcpc-heat-load-water'), 'zcpc-humidity': cpc.\n properties.get('zcpc-humidity'), 'zcpc-maximum-potential-heat-load':\n cpc.properties.get('zcpc-maximum-potential-heat-load'),\n 'zcpc-maximum-potential-power': cpc.properties.get(\n 'zcpc-maximum-potential-power'), 'zcpc-power-cap-allowed': cpc.\n properties.get('zcpc-power-cap-allowed'), 'zcpc-power-cap-current':\n cpc.properties.get('zcpc-power-cap-current'),\n 'zcpc-power-cap-maximum': cpc.properties.get(\n 'zcpc-power-cap-maximum'), 'zcpc-power-cap-minimum': cpc.properties\n .get('zcpc-power-cap-minimum'), 'zcpc-power-capping-state': cpc.\n properties.get('zcpc-power-capping-state'),\n 'zcpc-power-consumption': cpc.properties.get(\n 'zcpc-power-consumption'), 'zcpc-power-rating': cpc.properties.get(\n 'zcpc-power-rating'), 'zcpc-power-save-allowed': cpc.properties.get\n ('zcpc-power-save-allowed'), 'zcpc-power-saving': cpc.properties.\n get('zcpc-power-saving'), 'zcpc-power-saving-state': cpc.properties\n .get('zcpc-power-saving-state')}\n cpc_data = {'error-occurred': False, 'object-uri': cpc.uri, 'object-id':\n cpc.oid, 'class': 'cpcs', 'properties': energy_props}\n result = {'objects': [cpc_data]}\n return result\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True cpc_oid = uri_parms[0] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) if not cpc.dpm_enabled: raise CpcNotInDpmError(method, uri, cpc) cpc.properties['status'] = 'not-operating'
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n cpc.properties['status'] = 'not-operating'\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True cpc_oid = uri_parms[0] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) if not cpc.dpm_enabled: raise CpcNotInDpmError(method, uri, cpc) check_required_fields(method, uri, body, ['partitions']) partition_uris = body['partitions'] if len(partition_uris) == 0: raise BadRequestError(method, uri, reason=149, message= "'partitions' field in request body is empty.") wwpn_list = [] for partition_uri in partition_uris: partition = hmc.lookup_by_uri(partition_uri) partition_cpc = partition.manager.parent if partition_cpc.oid != cpc_oid: raise BadRequestError(method, uri, reason=149, message= "Partition %r specified in 'partitions' field is not in the targeted CPC with ID %r (but in the CPC with ID %r)." % (partition.uri, cpc_oid, partition_cpc.oid)) partition_name = partition.properties.get('name', '') for hba in partition.hbas.list(): port_uri = hba.properties['adapter-port-uri'] port = hmc.lookup_by_uri(port_uri) adapter = port.manager.parent adapter_id = adapter.properties.get('adapter-id', '') devno = hba.properties.get('device-number', '') wwpn = hba.properties.get('wwpn', '') wwpn_str = '%s,%s,%s,%s' % (partition_name, adapter_id, devno, wwpn ) wwpn_list.append(wwpn_str) return {'wwpn-list': wwpn_list}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_required_fields(method, uri, body, ['partitions'])\n partition_uris = body['partitions']\n if len(partition_uris) == 0:\n raise BadRequestError(method, uri, reason=149, message=\n \"'partitions' field in request body is empty.\")\n wwpn_list = []\n for partition_uri in partition_uris:\n partition = hmc.lookup_by_uri(partition_uri)\n partition_cpc = partition.manager.parent\n if partition_cpc.oid != cpc_oid:\n raise BadRequestError(method, uri, reason=149, message=\n \"Partition %r specified in 'partitions' field is not in the targeted CPC with ID %r (but in the CPC with ID %r).\"\n % (partition.uri, cpc_oid, partition_cpc.oid))\n partition_name = partition.properties.get('name', '')\n for hba in partition.hbas.list():\n port_uri = hba.properties['adapter-port-uri']\n port = hmc.lookup_by_uri(port_uri)\n adapter = port.manager.parent\n adapter_id = adapter.properties.get('adapter-id', '')\n devno = hba.properties.get('device-number', '')\n wwpn = hba.properties.get('wwpn', '')\n wwpn_str = '%s,%s,%s,%s' % (partition_name, adapter_id, devno, wwpn\n )\n wwpn_list.append(wwpn_str)\n return {'wwpn-list': wwpn_list}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True check_required_fields(method, uri, body, ['anticipated-frequency-seconds']) new_metrics_context = hmc.metrics_contexts.add(body) result = {'metrics-context-uri': new_metrics_context.uri, 'metric-group-infos': new_metrics_context.get_metric_group_infos()} return result
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n check_required_fields(method, uri, body, ['anticipated-frequency-seconds'])\n new_metrics_context = hmc.metrics_contexts.add(body)\n result = {'metrics-context-uri': new_metrics_context.uri,\n 'metric-group-infos': new_metrics_context.get_metric_group_infos()}\n return result\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): try: metrics_context = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) hmc.metrics_contexts.remove(metrics_context.oid)
delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n metrics_context = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n hmc.metrics_contexts.remove(metrics_context.oid)\n", "role": "user" }, { "content": "delete", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): try: metrics_context = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) result = metrics_context.get_metric_values_response() return result
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n metrics_context = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result = metrics_context.get_metric_values_response()\n return result\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): cpc_oid = uri_parms[0] query_str = uri_parms[1] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) result_adapters = [] if cpc.dpm_enabled: filter_args = parse_query_parms(method, uri, query_str) for adapter in cpc.adapters.list(filter_args): result_adapter = {} for prop in adapter.properties: if prop in ('object-uri', 'name', 'status'): result_adapter[prop] = adapter.properties[prop] result_adapters.append(result_adapter) return {'adapters': result_adapters}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_adapters = []\n if cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for adapter in cpc.adapters.list(filter_args):\n result_adapter = {}\n for prop in adapter.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_adapter[prop] = adapter.properties[prop]\n result_adapters.append(result_adapter)\n return {'adapters': result_adapters}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True cpc_oid = uri_parms[0] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) if not cpc.dpm_enabled: raise CpcNotInDpmError(method, uri, cpc) check_required_fields(method, uri, body, ['name']) body2 = body.copy() body2['type'] = 'hipersockets' try: new_adapter = cpc.adapters.add(body2) except InputError as exc: raise BadRequestError(method, uri, reason=5, message=str(exc)) return {'object-uri': new_adapter.uri}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_required_fields(method, uri, body, ['name'])\n body2 = body.copy()\n body2['type'] = 'hipersockets'\n try:\n new_adapter = cpc.adapters.add(body2)\n except InputError as exc:\n raise BadRequestError(method, uri, reason=5, message=str(exc))\n return {'object-uri': new_adapter.uri}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): try: adapter = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) cpc = adapter.manager.parent assert cpc.dpm_enabled adapter.manager.remove(adapter.oid)
delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n adapter = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = adapter.manager.parent\n assert cpc.dpm_enabled\n adapter.manager.remove(adapter.oid)\n", "role": "user" }, { "content": "delete", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True adapter_uri = uri.split('/operations/')[0] try: adapter = hmc.lookup_by_uri(adapter_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = adapter.manager.parent assert cpc.dpm_enabled check_required_fields(method, uri, body, ['crypto-type']) crypto_type = body['crypto-type'] if crypto_type not in ['accelerator', 'cca-coprocessor', 'ep11-coprocessor' ]: raise BadRequestError(method, uri, reason=8, message= "Invalid value for 'crypto-type' field: %s" % crypto_type) adapter.properties['crypto-type'] = crypto_type
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n adapter_uri = uri.split('/operations/')[0]\n try:\n adapter = hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = adapter.manager.parent\n assert cpc.dpm_enabled\n check_required_fields(method, uri, body, ['crypto-type'])\n crypto_type = body['crypto-type']\n if crypto_type not in ['accelerator', 'cca-coprocessor', 'ep11-coprocessor'\n ]:\n raise BadRequestError(method, uri, reason=8, message=\n \"Invalid value for 'crypto-type' field: %s\" % crypto_type)\n adapter.properties['crypto-type'] = crypto_type\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True adapter_uri = uri.split('/operations/')[0] try: adapter = hmc.lookup_by_uri(adapter_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = adapter.manager.parent assert cpc.dpm_enabled check_required_fields(method, uri, body, ['type']) new_adapter_type = body['type'] adapter_family = adapter.properties.get('adapter-family', None) if adapter_family != 'ficon': raise BadRequestError(method, uri, reason=18, message= 'The adapter type cannot be changed for adapter family: %s' % adapter_family) adapter_status = adapter.properties.get('status', None) if adapter_status == 'exceptions': raise BadRequestError(method, uri, reason=18, message= 'The adapter type cannot be changed for adapter status: %s' % adapter_status) if new_adapter_type not in ['fc', 'fcp', 'not-configured']: raise BadRequestError(method, uri, reason=8, message= "Invalid new value for 'type' field: %s" % new_adapter_type) adapter_type = adapter.properties.get('type', None) if new_adapter_type == adapter_type: raise BadRequestError(method, uri, reason=8, message= "New value for 'type' field is already set: %s" % new_adapter_type) adapter.properties['type'] = new_adapter_type
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n adapter_uri = uri.split('/operations/')[0]\n try:\n adapter = hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = adapter.manager.parent\n assert cpc.dpm_enabled\n check_required_fields(method, uri, body, ['type'])\n new_adapter_type = body['type']\n adapter_family = adapter.properties.get('adapter-family', None)\n if adapter_family != 'ficon':\n raise BadRequestError(method, uri, reason=18, message=\n 'The adapter type cannot be changed for adapter family: %s' %\n adapter_family)\n adapter_status = adapter.properties.get('status', None)\n if adapter_status == 'exceptions':\n raise BadRequestError(method, uri, reason=18, message=\n 'The adapter type cannot be changed for adapter status: %s' %\n adapter_status)\n if new_adapter_type not in ['fc', 'fcp', 'not-configured']:\n raise BadRequestError(method, uri, reason=8, message=\n \"Invalid new value for 'type' field: %s\" % new_adapter_type)\n adapter_type = adapter.properties.get('type', None)\n if new_adapter_type == adapter_type:\n raise BadRequestError(method, uri, reason=8, message=\n \"New value for 'type' field is already set: %s\" % new_adapter_type)\n adapter.properties['type'] = new_adapter_type\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): cpc_oid = uri_parms[0] query_str = uri_parms[1] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) result_partitions = [] if cpc.dpm_enabled: filter_args = parse_query_parms(method, uri, query_str) for partition in cpc.partitions.list(filter_args): result_partition = {} for prop in partition.properties: if prop in ('object-uri', 'name', 'status'): result_partition[prop] = partition.properties[prop] result_partitions.append(result_partition) return {'partitions': result_partitions}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_partitions = []\n if cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for partition in cpc.partitions.list(filter_args):\n result_partition = {}\n for prop in partition.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_partition[prop] = partition.properties[prop]\n result_partitions.append(result_partition)\n return {'partitions': result_partitions}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True cpc_oid = uri_parms[0] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) if not cpc.dpm_enabled: raise CpcNotInDpmError(method, uri, cpc) check_valid_cpc_status(method, uri, cpc) check_required_fields(method, uri, body, ['name', 'initial-memory', 'maximum-memory']) new_partition = cpc.partitions.add(body) return {'object-uri': new_partition.uri}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_valid_cpc_status(method, uri, cpc)\n check_required_fields(method, uri, body, ['name', 'initial-memory',\n 'maximum-memory'])\n new_partition = cpc.partitions.add(body)\n return {'object-uri': new_partition.uri}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_oid = uri_parms[0] partition_uri = '/api/partitions/' + partition_oid try: partition = hmc.lookup_by_uri(partition_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, valid_statuses=['stopped']) partition.properties['status'] = 'active' return {}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, valid_statuses=['stopped'])\n partition.properties['status'] = 'active'\n return {}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_oid = uri_parms[0] partition_uri = '/api/partitions/' + partition_oid try: partition = hmc.lookup_by_uri(partition_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) query_parms = parse_query_parms(method, uri, uri_parms[1]) try: image_name = query_parms['image-name'] except KeyError: raise BadRequestError(method, uri, reason=1, message= "Missing required URI query parameter 'image-name'") try: ins_file_name = query_parms['ins-file-name'] except KeyError: raise BadRequestError(method, uri, reason=1, message= "Missing required URI query parameter 'ins-file-name'") partition.properties['boot-iso-image-name'] = image_name partition.properties['boot-iso-ins-file'] = ins_file_name return {}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n query_parms = parse_query_parms(method, uri, uri_parms[1])\n try:\n image_name = query_parms['image-name']\n except KeyError:\n raise BadRequestError(method, uri, reason=1, message=\n \"Missing required URI query parameter 'image-name'\")\n try:\n ins_file_name = query_parms['ins-file-name']\n except KeyError:\n raise BadRequestError(method, uri, reason=1, message=\n \"Missing required URI query parameter 'ins-file-name'\")\n partition.properties['boot-iso-image-name'] = image_name\n partition.properties['boot-iso-ins-file'] = ins_file_name\n return {}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_oid = uri_parms[0] partition_uri = '/api/partitions/' + partition_oid try: partition = hmc.lookup_by_uri(partition_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) check_required_fields(method, uri, body, []) adapter_uris, domain_configs = ensure_crypto_config(partition) add_adapter_uris = body.get('crypto-adapter-uris', []) add_domain_configs = body.get('crypto-domain-configurations', []) for uri in add_adapter_uris: if uri not in adapter_uris: adapter_uris.append(uri) for dc in add_domain_configs: if dc not in domain_configs: domain_configs.append(dc)
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, [])\n adapter_uris, domain_configs = ensure_crypto_config(partition)\n add_adapter_uris = body.get('crypto-adapter-uris', [])\n add_domain_configs = body.get('crypto-domain-configurations', [])\n for uri in add_adapter_uris:\n if uri not in adapter_uris:\n adapter_uris.append(uri)\n for dc in add_domain_configs:\n if dc not in domain_configs:\n domain_configs.append(dc)\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_oid = uri_parms[0] partition_uri = '/api/partitions/' + partition_oid try: partition = hmc.lookup_by_uri(partition_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) check_required_fields(method, uri, body, []) adapter_uris, domain_configs = ensure_crypto_config(partition) remove_adapter_uris = body.get('crypto-adapter-uris', []) remove_domain_indexes = body.get('crypto-domain-indexes', []) for uri in remove_adapter_uris: if uri in adapter_uris: adapter_uris.remove(uri) for remove_di in remove_domain_indexes: for i, dc in enumerate(domain_configs): if dc['domain-index'] == remove_di: del domain_configs[i]
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, [])\n adapter_uris, domain_configs = ensure_crypto_config(partition)\n remove_adapter_uris = body.get('crypto-adapter-uris', [])\n remove_domain_indexes = body.get('crypto-domain-indexes', [])\n for uri in remove_adapter_uris:\n if uri in adapter_uris:\n adapter_uris.remove(uri)\n for remove_di in remove_domain_indexes:\n for i, dc in enumerate(domain_configs):\n if dc['domain-index'] == remove_di:\n del domain_configs[i]\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_uri = re.sub('/hbas$', '', uri) try: partition = hmc.lookup_by_uri(partition_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) check_required_fields(method, uri, body, ['name', 'adapter-port-uri']) port_uri = body['adapter-port-uri'] m = re.match('(^/api/adapters/[^/]+)/storage-ports/[^/]+$', port_uri) if not m: raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri ) adapter_uri = m.group(1) try: hmc.lookup_by_uri(adapter_uri) except KeyError: raise InvalidResourceError(method, uri, reason=2, resource_uri= adapter_uri) try: hmc.lookup_by_uri(port_uri) except KeyError: raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri ) new_hba = partition.hbas.add(body) return {'element-uri': new_hba.uri}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/hbas$', '', uri)\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['name', 'adapter-port-uri'])\n port_uri = body['adapter-port-uri']\n m = re.match('(^/api/adapters/[^/]+)/storage-ports/[^/]+$', port_uri)\n if not m:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri\n )\n adapter_uri = m.group(1)\n try:\n hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=2, resource_uri=\n adapter_uri)\n try:\n hmc.lookup_by_uri(port_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri\n )\n new_hba = partition.hbas.add(body)\n return {'element-uri': new_hba.uri}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): try: hba = hmc.lookup_by_uri(uri) except KeyError: raise InvalidResourceError(method, uri) partition = hba.manager.parent cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) partition.hbas.remove(hba.oid)
delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n hba = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n partition = hba.manager.parent\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n partition.hbas.remove(hba.oid)\n", "role": "user" }, { "content": "delete", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_oid = uri_parms[0] partition_uri = '/api/partitions/' + partition_oid hba_oid = uri_parms[1] hba_uri = '/api/partitions/' + partition_oid + '/hbas/' + hba_oid try: hba = hmc.lookup_by_uri(hba_uri) except KeyError: raise InvalidResourceError(method, uri) partition = hmc.lookup_by_uri(partition_uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) check_required_fields(method, uri, body, ['adapter-port-uri']) new_port_uri = body['adapter-port-uri'] hba.properties['adapter-port-uri'] = new_port_uri
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n hba_oid = uri_parms[1]\n hba_uri = '/api/partitions/' + partition_oid + '/hbas/' + hba_oid\n try:\n hba = hmc.lookup_by_uri(hba_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n partition = hmc.lookup_by_uri(partition_uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['adapter-port-uri'])\n new_port_uri = body['adapter-port-uri']\n hba.properties['adapter-port-uri'] = new_port_uri\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_uri = re.sub('/nics$', '', uri) try: partition = hmc.lookup_by_uri(partition_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) check_required_fields(method, uri, body, ['name']) if 'network-adapter-port-uri' in body: port_uri = body['network-adapter-port-uri'] m = re.match('(^/api/adapters/[^/]+)/network-ports/[^/]+$', port_uri) if not m: raise InvalidResourceError(method, uri, reason=6, resource_uri= port_uri) adapter_uri = m.group(1) try: hmc.lookup_by_uri(adapter_uri) except KeyError: raise InvalidResourceError(method, uri, reason=2, resource_uri= adapter_uri) try: hmc.lookup_by_uri(port_uri) except KeyError: raise InvalidResourceError(method, uri, reason=6, resource_uri= port_uri) elif 'virtual-switch-uri' in body: vswitch_uri = body['virtual-switch-uri'] try: hmc.lookup_by_uri(vswitch_uri) except KeyError: raise InvalidResourceError(method, uri, reason=2, resource_uri= vswitch_uri) else: nic_name = body.get('name', None) raise BadRequestError(method, uri, reason=5, message= "The input properties for creating a NIC {!r} in partition {!r} must specify either the 'network-adapter-port-uri' or the 'virtual-switch-uri' property." .format(nic_name, partition.name)) new_nic = partition.nics.add(body) return {'element-uri': new_nic.uri}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/nics$', '', uri)\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['name'])\n if 'network-adapter-port-uri' in body:\n port_uri = body['network-adapter-port-uri']\n m = re.match('(^/api/adapters/[^/]+)/network-ports/[^/]+$', port_uri)\n if not m:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=\n port_uri)\n adapter_uri = m.group(1)\n try:\n hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=2, resource_uri=\n adapter_uri)\n try:\n hmc.lookup_by_uri(port_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=\n port_uri)\n elif 'virtual-switch-uri' in body:\n vswitch_uri = body['virtual-switch-uri']\n try:\n hmc.lookup_by_uri(vswitch_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=2, resource_uri=\n vswitch_uri)\n else:\n nic_name = body.get('name', None)\n raise BadRequestError(method, uri, reason=5, message=\n \"The input properties for creating a NIC {!r} in partition {!r} must specify either the 'network-adapter-port-uri' or the 'virtual-switch-uri' property.\"\n .format(nic_name, partition.name))\n new_nic = partition.nics.add(body)\n return {'element-uri': new_nic.uri}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True partition_uri = re.sub('/virtual-functions$', '', uri) try: partition = hmc.lookup_by_uri(partition_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = partition.manager.parent assert cpc.dpm_enabled check_valid_cpc_status(method, uri, cpc) check_partition_status(method, uri, partition, invalid_statuses=[ 'starting', 'stopping']) check_required_fields(method, uri, body, ['name']) new_vf = partition.virtual_functions.add(body) return {'element-uri': new_vf.uri}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/virtual-functions$', '', uri)\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['name'])\n new_vf = partition.virtual_functions.add(body)\n return {'element-uri': new_vf.uri}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): cpc_oid = uri_parms[0] query_str = uri_parms[1] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) result_vswitches = [] if cpc.dpm_enabled: filter_args = parse_query_parms(method, uri, query_str) for vswitch in cpc.virtual_switches.list(filter_args): result_vswitch = {} for prop in vswitch.properties: if prop in ('object-uri', 'name', 'type'): result_vswitch[prop] = vswitch.properties[prop] result_vswitches.append(result_vswitch) return {'virtual-switches': result_vswitches}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_vswitches = []\n if cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for vswitch in cpc.virtual_switches.list(filter_args):\n result_vswitch = {}\n for prop in vswitch.properties:\n if prop in ('object-uri', 'name', 'type'):\n result_vswitch[prop] = vswitch.properties[prop]\n result_vswitches.append(result_vswitch)\n return {'virtual-switches': result_vswitches}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True vswitch_oid = uri_parms[0] vswitch_uri = '/api/virtual-switches/' + vswitch_oid try: vswitch = hmc.lookup_by_uri(vswitch_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = vswitch.manager.parent assert cpc.dpm_enabled connected_vnic_uris = vswitch.properties['connected-vnic-uris'] return {'connected-vnic-uris': connected_vnic_uris}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n vswitch_oid = uri_parms[0]\n vswitch_uri = '/api/virtual-switches/' + vswitch_oid\n try:\n vswitch = hmc.lookup_by_uri(vswitch_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = vswitch.manager.parent\n assert cpc.dpm_enabled\n connected_vnic_uris = vswitch.properties['connected-vnic-uris']\n return {'connected-vnic-uris': connected_vnic_uris}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): query_str = uri_parms[0] filter_args = parse_query_parms(method, uri, query_str) result_storage_groups = [] for sg in hmc.consoles.console.storage_groups.list(filter_args): result_sg = {} for prop in sg.properties: if prop in ('object-uri', 'cpc-uri', 'name', 'status', 'fulfillment-state', 'type'): result_sg[prop] = sg.properties[prop] result_storage_groups.append(result_sg) return {'storage-groups': result_storage_groups}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n filter_args = parse_query_parms(method, uri, query_str)\n result_storage_groups = []\n for sg in hmc.consoles.console.storage_groups.list(filter_args):\n result_sg = {}\n for prop in sg.properties:\n if prop in ('object-uri', 'cpc-uri', 'name', 'status',\n 'fulfillment-state', 'type'):\n result_sg[prop] = sg.properties[prop]\n result_storage_groups.append(result_sg)\n return {'storage-groups': result_storage_groups}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True check_required_fields(method, uri, body, ['name', 'cpc-uri', 'type']) cpc_uri = body['cpc-uri'] try: cpc = hmc.lookup_by_uri(cpc_uri) except KeyError: raise InvalidResourceError(method, uri) if not cpc.dpm_enabled: raise CpcNotInDpmError(method, uri, cpc) check_valid_cpc_status(method, uri, cpc) body2 = body.copy() sv_requests = body2.pop('storage-volumes', None) new_storage_group = hmc.consoles.console.storage_groups.add(body2) sv_uris = [] if sv_requests: for sv_req in sv_requests: check_required_fields(method, uri, sv_req, ['operation']) operation = sv_req['operation'] if operation == 'create': sv_props = sv_req.copy() del sv_props['operation'] if 'element-uri' in sv_props: raise BadRequestError(method, uri, 7, "The 'element-uri' field in storage-volumes is invalid for the create operation" ) sv_uri = new_storage_group.storage_volumes.add(sv_props) sv_uris.append(sv_uri) else: raise BadRequestError(method, uri, 5, "Invalid value for storage-volumes 'operation' field: %s" % operation) return {'object-uri': new_storage_group.uri, 'element-uris': sv_uris}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n check_required_fields(method, uri, body, ['name', 'cpc-uri', 'type'])\n cpc_uri = body['cpc-uri']\n try:\n cpc = hmc.lookup_by_uri(cpc_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_valid_cpc_status(method, uri, cpc)\n body2 = body.copy()\n sv_requests = body2.pop('storage-volumes', None)\n new_storage_group = hmc.consoles.console.storage_groups.add(body2)\n sv_uris = []\n if sv_requests:\n for sv_req in sv_requests:\n check_required_fields(method, uri, sv_req, ['operation'])\n operation = sv_req['operation']\n if operation == 'create':\n sv_props = sv_req.copy()\n del sv_props['operation']\n if 'element-uri' in sv_props:\n raise BadRequestError(method, uri, 7,\n \"The 'element-uri' field in storage-volumes is invalid for the create operation\"\n )\n sv_uri = new_storage_group.storage_volumes.add(sv_props)\n sv_uris.append(sv_uri)\n else:\n raise BadRequestError(method, uri, 5, \n \"Invalid value for storage-volumes 'operation' field: %s\" %\n operation)\n return {'object-uri': new_storage_group.uri, 'element-uris': sv_uris}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True storage_group_oid = uri_parms[0] storage_group_uri = '/api/storage-groups/' + storage_group_oid try: storage_group = hmc.lookup_by_uri(storage_group_uri) except KeyError: raise InvalidResourceError(method, uri) body2 = body.copy() sv_requests = body2.pop('storage-volumes', None) storage_group.update(body2) sv_uris = [] if sv_requests: for sv_req in sv_requests: check_required_fields(method, uri, sv_req, ['operation']) operation = sv_req['operation'] if operation == 'create': sv_props = sv_req.copy() del sv_props['operation'] if 'element-uri' in sv_props: raise BadRequestError(method, uri, 7, "The 'element-uri' field in storage-volumes is invalid for the create operation" ) sv_uri = storage_group.storage_volumes.add(sv_props) sv_uris.append(sv_uri) elif operation == 'modify': check_required_fields(method, uri, sv_req, ['element-uri']) sv_uri = sv_req['element-uri'] storage_volume = hmc.lookup_by_uri(sv_uri) storage_volume.update_properties(sv_props) elif operation == 'delete': check_required_fields(method, uri, sv_req, ['element-uri']) sv_uri = sv_req['element-uri'] storage_volume = hmc.lookup_by_uri(sv_uri) storage_volume.delete() else: raise BadRequestError(method, uri, 5, "Invalid value for storage-volumes 'operation' field: %s" % operation) return {'element-uris': sv_uris}
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n storage_group = hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n body2 = body.copy()\n sv_requests = body2.pop('storage-volumes', None)\n storage_group.update(body2)\n sv_uris = []\n if sv_requests:\n for sv_req in sv_requests:\n check_required_fields(method, uri, sv_req, ['operation'])\n operation = sv_req['operation']\n if operation == 'create':\n sv_props = sv_req.copy()\n del sv_props['operation']\n if 'element-uri' in sv_props:\n raise BadRequestError(method, uri, 7,\n \"The 'element-uri' field in storage-volumes is invalid for the create operation\"\n )\n sv_uri = storage_group.storage_volumes.add(sv_props)\n sv_uris.append(sv_uri)\n elif operation == 'modify':\n check_required_fields(method, uri, sv_req, ['element-uri'])\n sv_uri = sv_req['element-uri']\n storage_volume = hmc.lookup_by_uri(sv_uri)\n storage_volume.update_properties(sv_props)\n elif operation == 'delete':\n check_required_fields(method, uri, sv_req, ['element-uri'])\n sv_uri = sv_req['element-uri']\n storage_volume = hmc.lookup_by_uri(sv_uri)\n storage_volume.delete()\n else:\n raise BadRequestError(method, uri, 5, \n \"Invalid value for storage-volumes 'operation' field: %s\" %\n operation)\n return {'element-uris': sv_uris}\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True storage_group_oid = uri_parms[0] storage_group_uri = '/api/storage-groups/' + storage_group_oid try: storage_group = hmc.lookup_by_uri(storage_group_uri) except KeyError: raise InvalidResourceError(method, uri) storage_group.manager.remove(storage_group.oid)
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n storage_group = hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n storage_group.manager.remove(storage_group.oid)\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True storage_group_oid = uri_parms[0] storage_group_uri = '/api/storage-groups/' + storage_group_oid try: hmc.lookup_by_uri(storage_group_uri) except KeyError: raise InvalidResourceError(method, uri) pass
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n pass\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True storage_group_oid = uri_parms[0] storage_group_uri = '/api/storage-groups/' + storage_group_oid try: storage_group = hmc.lookup_by_uri(storage_group_uri) except KeyError: raise InvalidResourceError(method, uri) check_required_fields(method, uri, body, ['adapter-port-uris']) candidate_adapter_port_uris = storage_group.properties[ 'candidate-adapter-port-uris'] for ap_uri in body['adapter-port-uris']: if ap_uri in candidate_adapter_port_uris: raise ConflictError(method, uri, 483, 'Adapter port is already in candidate list of storage group %s: %s' % (storage_group.name, ap_uri)) else: candidate_adapter_port_uris.append(ap_uri)
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n storage_group = hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['adapter-port-uris'])\n candidate_adapter_port_uris = storage_group.properties[\n 'candidate-adapter-port-uris']\n for ap_uri in body['adapter-port-uris']:\n if ap_uri in candidate_adapter_port_uris:\n raise ConflictError(method, uri, 483, \n 'Adapter port is already in candidate list of storage group %s: %s'\n % (storage_group.name, ap_uri))\n else:\n candidate_adapter_port_uris.append(ap_uri)\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): cpc_oid = uri_parms[0] query_str = uri_parms[1] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) result_lpars = [] if not cpc.dpm_enabled: filter_args = parse_query_parms(method, uri, query_str) for lpar in cpc.lpars.list(filter_args): result_lpar = {} for prop in lpar.properties: if prop in ('object-uri', 'name', 'status'): result_lpar[prop] = lpar.properties[prop] result_lpars.append(result_lpar) return {'logical-partitions': result_lpars}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_lpars = []\n if not cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for lpar in cpc.lpars.list(filter_args):\n result_lpar = {}\n for prop in lpar.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_lpar[prop] = lpar.properties[prop]\n result_lpars.append(result_lpar)\n return {'logical-partitions': result_lpars}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True lpar_oid = uri_parms[0] lpar_uri = '/api/logical-partitions/' + lpar_oid try: lpar = hmc.lookup_by_uri(lpar_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = lpar.manager.parent assert not cpc.dpm_enabled status = lpar.properties.get('status', None) force = body.get('force', False) if body else False if status == 'operating' and not force: raise ServerError(method, uri, reason=263, message= 'LPAR {!r} could not be activated because the LPAR is in status {} (and force was not specified).' .format(lpar.name, status)) act_profile_name = body.get('activation-profile-name', None) if not act_profile_name: act_profile_name = lpar.properties.get('next-activation-profile-name', None) if act_profile_name is None: act_profile_name = '' if act_profile_name != lpar.name: raise ServerError(method, uri, reason=263, message= 'LPAR {!r} could not be activated because the name of the image activation profile {!r} is different from the LPAR name.' .format(lpar.name, act_profile_name)) lpar.properties['status'] = LparActivateHandler.get_status() lpar.properties['last-used-activation-profile'] = act_profile_name
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n lpar_oid = uri_parms[0]\n lpar_uri = '/api/logical-partitions/' + lpar_oid\n try:\n lpar = hmc.lookup_by_uri(lpar_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = lpar.manager.parent\n assert not cpc.dpm_enabled\n status = lpar.properties.get('status', None)\n force = body.get('force', False) if body else False\n if status == 'operating' and not force:\n raise ServerError(method, uri, reason=263, message=\n 'LPAR {!r} could not be activated because the LPAR is in status {} (and force was not specified).'\n .format(lpar.name, status))\n act_profile_name = body.get('activation-profile-name', None)\n if not act_profile_name:\n act_profile_name = lpar.properties.get('next-activation-profile-name',\n None)\n if act_profile_name is None:\n act_profile_name = ''\n if act_profile_name != lpar.name:\n raise ServerError(method, uri, reason=263, message=\n 'LPAR {!r} could not be activated because the name of the image activation profile {!r} is different from the LPAR name.'\n .format(lpar.name, act_profile_name))\n lpar.properties['status'] = LparActivateHandler.get_status()\n lpar.properties['last-used-activation-profile'] = act_profile_name\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion): assert wait_for_completion is True lpar_oid = uri_parms[0] lpar_uri = '/api/logical-partitions/' + lpar_oid try: lpar = hmc.lookup_by_uri(lpar_uri) except KeyError: raise InvalidResourceError(method, uri) cpc = lpar.manager.parent assert not cpc.dpm_enabled status = lpar.properties.get('status', None) force = body.get('force', False) if body else False clear_indicator = body.get('clear-indicator', True) if body else True store_status_indicator = body.get('store-status-indicator', False ) if body else False if status == 'not-activated': raise ConflictError(method, uri, reason=0, message= 'LPAR {!r} could not be loaded because the LPAR is in status {}.' .format(lpar.name, status)) elif status == 'operating' and not force: raise ServerError(method, uri, reason=263, message= 'LPAR {!r} could not be loaded because the LPAR is already loaded (and force was not specified).' .format(lpar.name)) load_address = body.get('load-address', None) if body else None if not load_address: load_address = lpar.properties.get('last-used-load-address', None) if load_address is None: raise BadRequestError(method, uri, reason=5, message= 'LPAR {!r} could not be loaded because a load address is not specified in the request or in the Lpar last-used property' .format(lpar.name)) load_parameter = body.get('load-parameter', None) if body else None if not load_parameter: load_parameter = lpar.properties.get('last-used-load-parameter', None) if load_parameter is None: load_parameter = '' if clear_indicator: lpar.properties['memory'] = '' if store_status_indicator: lpar.properties['stored-status'] = status else: lpar.properties['stored-status'] = None lpar.properties['status'] = LparLoadHandler.get_status() lpar.properties['last-used-load-address'] = load_address lpar.properties['last-used-load-parameter'] = load_parameter
post
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n lpar_oid = uri_parms[0]\n lpar_uri = '/api/logical-partitions/' + lpar_oid\n try:\n lpar = hmc.lookup_by_uri(lpar_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = lpar.manager.parent\n assert not cpc.dpm_enabled\n status = lpar.properties.get('status', None)\n force = body.get('force', False) if body else False\n clear_indicator = body.get('clear-indicator', True) if body else True\n store_status_indicator = body.get('store-status-indicator', False\n ) if body else False\n if status == 'not-activated':\n raise ConflictError(method, uri, reason=0, message=\n 'LPAR {!r} could not be loaded because the LPAR is in status {}.'\n .format(lpar.name, status))\n elif status == 'operating' and not force:\n raise ServerError(method, uri, reason=263, message=\n 'LPAR {!r} could not be loaded because the LPAR is already loaded (and force was not specified).'\n .format(lpar.name))\n load_address = body.get('load-address', None) if body else None\n if not load_address:\n load_address = lpar.properties.get('last-used-load-address', None)\n if load_address is None:\n raise BadRequestError(method, uri, reason=5, message=\n 'LPAR {!r} could not be loaded because a load address is not specified in the request or in the Lpar last-used property'\n .format(lpar.name))\n load_parameter = body.get('load-parameter', None) if body else None\n if not load_parameter:\n load_parameter = lpar.properties.get('last-used-load-parameter', None)\n if load_parameter is None:\n load_parameter = ''\n if clear_indicator:\n lpar.properties['memory'] = ''\n if store_status_indicator:\n lpar.properties['stored-status'] = status\n else:\n lpar.properties['stored-status'] = None\n lpar.properties['status'] = LparLoadHandler.get_status()\n lpar.properties['last-used-load-address'] = load_address\n lpar.properties['last-used-load-parameter'] = load_parameter\n", "role": "user" }, { "content": "post", "role": "assistant" } ]
def x(method, hmc, uri, uri_parms, logon_required): cpc_oid = uri_parms[0] query_str = uri_parms[1] try: cpc = hmc.cpcs.lookup_by_oid(cpc_oid) except KeyError: raise InvalidResourceError(method, uri) assert not cpc.dpm_enabled result_profiles = [] filter_args = parse_query_parms(method, uri, query_str) for profile in cpc.load_activation_profiles.list(filter_args): result_profile = {} for prop in profile.properties: if prop in ('element-uri', 'name'): result_profile[prop] = profile.properties[prop] result_profiles.append(result_profile) return {'load-activation-profiles': result_profiles}
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n assert not cpc.dpm_enabled\n result_profiles = []\n filter_args = parse_query_parms(method, uri, query_str)\n for profile in cpc.load_activation_profiles.list(filter_args):\n result_profile = {}\n for prop in profile.properties:\n if prop in ('element-uri', 'name'):\n result_profile[prop] = profile.properties[prop]\n result_profiles.append(result_profile)\n return {'load-activation-profiles': result_profiles}\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, properties): result = self.session.post(self.cpc.uri + '/partitions', body=properties) props = copy.deepcopy(properties) props.update(result) name = props.get(self._name_prop, None) uri = props[self._uri_prop] part = Partition(self, uri, name, props) self._name_uri_cache.update(name, uri) return part
create
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, properties):\n result = self.session.post(self.cpc.uri + '/partitions', body=properties)\n props = copy.deepcopy(properties)\n props.update(result)\n name = props.get(self._name_prop, None)\n uri = props[self._uri_prop]\n part = Partition(self, uri, name, props)\n self._name_uri_cache.update(name, uri)\n return part\n", "role": "user" }, { "content": "create", "role": "assistant" } ]
def x(self): if not self._nics: self._nics = NicManager(self) return self._nics
nics
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._nics:\n self._nics = NicManager(self)\n return self._nics\n", "role": "user" }, { "content": "nics", "role": "assistant" } ]
def x(self): if not self._hbas: try: dpm_sm = self.feature_enabled('dpm-storage-management') except ValueError: dpm_sm = False if not dpm_sm: self._hbas = HbaManager(self) return self._hbas
hbas
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._hbas:\n try:\n dpm_sm = self.feature_enabled('dpm-storage-management')\n except ValueError:\n dpm_sm = False\n if not dpm_sm:\n self._hbas = HbaManager(self)\n return self._hbas\n", "role": "user" }, { "content": "hbas", "role": "assistant" } ]
def x(self): if not self._virtual_functions: self._virtual_functions = VirtualFunctionManager(self) return self._virtual_functions
virtual_functions
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._virtual_functions:\n self._virtual_functions = VirtualFunctionManager(self)\n return self._virtual_functions\n", "role": "user" }, { "content": "virtual_functions", "role": "assistant" } ]
def x(self, feature_name): feature_list = self.prop('available-features-list', None) if feature_list is None: raise ValueError('Firmware features are not supported on CPC %s' % self.manager.cpc.name) for feature in feature_list: if feature['name'] == feature_name: break else: raise ValueError('Firmware feature %s is not available on CPC %s' % (feature_name, self.manager.cpc.name)) return feature['state']
feature_enabled
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, feature_name):\n feature_list = self.prop('available-features-list', None)\n if feature_list is None:\n raise ValueError('Firmware features are not supported on CPC %s' %\n self.manager.cpc.name)\n for feature in feature_list:\n if feature['name'] == feature_name:\n break\n else:\n raise ValueError('Firmware feature %s is not available on CPC %s' %\n (feature_name, self.manager.cpc.name))\n return feature['state']\n", "role": "user" }, { "content": "feature_enabled", "role": "assistant" } ]
def x(self): feature_list = self.prop('available-features-list', None) if feature_list is None: raise ValueError('Firmware features are not supported on CPC %s' % self.manager.cpc.name) return feature_list
feature_info
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n feature_list = self.prop('available-features-list', None)\n if feature_list is None:\n raise ValueError('Firmware features are not supported on CPC %s' %\n self.manager.cpc.name)\n return feature_list\n", "role": "user" }, { "content": "feature_info", "role": "assistant" } ]
def x(self, wait_for_completion=True, operation_timeout=None, status_timeout=None): result = self.manager.session.post(self.uri + '/operations/start', wait_for_completion=wait_for_completion, operation_timeout= operation_timeout) if wait_for_completion: statuses = ['active', 'degraded'] self.wait_for_status(statuses, status_timeout) return result
start
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, wait_for_completion=True, operation_timeout=None,\n status_timeout=None):\n result = self.manager.session.post(self.uri + '/operations/start',\n wait_for_completion=wait_for_completion, operation_timeout=\n operation_timeout)\n if wait_for_completion:\n statuses = ['active', 'degraded']\n self.wait_for_status(statuses, status_timeout)\n return result\n", "role": "user" }, { "content": "start", "role": "assistant" } ]
def x(self, parameters, wait_for_completion=True, operation_timeout=None): result = self.manager.session.post(self.uri + '/operations/scsi-dump', wait_for_completion=wait_for_completion, operation_timeout= operation_timeout, body=parameters) return result
dump_partition
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, parameters, wait_for_completion=True, operation_timeout=None):\n result = self.manager.session.post(self.uri + '/operations/scsi-dump',\n wait_for_completion=wait_for_completion, operation_timeout=\n operation_timeout, body=parameters)\n return result\n", "role": "user" }, { "content": "dump_partition", "role": "assistant" } ]
def x(self, image, image_name, ins_file_name): query_parms_str = '?image-name={}&ins-file-name={}'.format(quote( image_name, safe=''), quote(ins_file_name, safe='')) self.manager.session.post(self.uri + '/operations/mount-iso-image' + query_parms_str, body=image)
mount_iso_image
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, image, image_name, ins_file_name):\n query_parms_str = '?image-name={}&ins-file-name={}'.format(quote(\n image_name, safe=''), quote(ins_file_name, safe=''))\n self.manager.session.post(self.uri + '/operations/mount-iso-image' +\n query_parms_str, body=image)\n", "role": "user" }, { "content": "mount_iso_image", "role": "assistant" } ]
def x(self, include_refresh_messages=True): body = {'include-refresh-messages': include_refresh_messages} result = self.manager.session.post(self.uri + '/operations/open-os-message-channel', body) return result['topic-name']
open_os_message_channel
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, include_refresh_messages=True):\n body = {'include-refresh-messages': include_refresh_messages}\n result = self.manager.session.post(self.uri +\n '/operations/open-os-message-channel', body)\n return result['topic-name']\n", "role": "user" }, { "content": "open_os_message_channel", "role": "assistant" } ]
def x(self, os_command_text, is_priority=False): body = {'is-priority': is_priority, 'operating-system-command-text': os_command_text} self.manager.session.post(self.uri + '/operations/send-os-cmd', body)
send_os_command
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, os_command_text, is_priority=False):\n body = {'is-priority': is_priority, 'operating-system-command-text':\n os_command_text}\n self.manager.session.post(self.uri + '/operations/send-os-cmd', body)\n", "role": "user" }, { "content": "send_os_command", "role": "assistant" } ]
def x(self, status, status_timeout=None): if status_timeout is None: status_timeout = (self.manager.session.retry_timeout_config. status_timeout) if status_timeout > 0: end_time = time.time() + status_timeout if isinstance(status, (list, tuple)): statuses = status else: statuses = [status] while True: parts = self.manager.cpc.partitions.list(filter_args={'name': self. name}) assert len(parts) == 1 this_part = parts[0] actual_status = this_part.get_property('status') if actual_status in statuses: return if status_timeout > 0 and time.time() > end_time: raise StatusTimeout( "Waiting for partition {} to reach status(es) '{}' timed out after {} s - current status is '{}'" .format(self.name, statuses, status_timeout, actual_status), actual_status, statuses, status_timeout) time.sleep(1)
wait_for_status
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, status, status_timeout=None):\n if status_timeout is None:\n status_timeout = (self.manager.session.retry_timeout_config.\n status_timeout)\n if status_timeout > 0:\n end_time = time.time() + status_timeout\n if isinstance(status, (list, tuple)):\n statuses = status\n else:\n statuses = [status]\n while True:\n parts = self.manager.cpc.partitions.list(filter_args={'name': self.\n name})\n assert len(parts) == 1\n this_part = parts[0]\n actual_status = this_part.get_property('status')\n if actual_status in statuses:\n return\n if status_timeout > 0 and time.time() > end_time:\n raise StatusTimeout(\n \"Waiting for partition {} to reach status(es) '{}' timed out after {} s - current status is '{}'\"\n .format(self.name, statuses, status_timeout, actual_status),\n actual_status, statuses, status_timeout)\n time.sleep(1)\n", "role": "user" }, { "content": "wait_for_status", "role": "assistant" } ]
def x(self, crypto_adapters, crypto_domain_configurations): crypto_adapter_uris = [a.uri for a in crypto_adapters] body = {'crypto-adapter-uris': crypto_adapter_uris, 'crypto-domain-configurations': crypto_domain_configurations} self.manager.session.post(self.uri + '/operations/increase-crypto-configuration', body)
increase_crypto_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, crypto_adapters, crypto_domain_configurations):\n crypto_adapter_uris = [a.uri for a in crypto_adapters]\n body = {'crypto-adapter-uris': crypto_adapter_uris,\n 'crypto-domain-configurations': crypto_domain_configurations}\n self.manager.session.post(self.uri +\n '/operations/increase-crypto-configuration', body)\n", "role": "user" }, { "content": "increase_crypto_config", "role": "assistant" } ]
def x(self, crypto_adapters, crypto_domain_indexes): crypto_adapter_uris = [a.uri for a in crypto_adapters] body = {'crypto-adapter-uris': crypto_adapter_uris, 'crypto-domain-indexes': crypto_domain_indexes} self.manager.session.post(self.uri + '/operations/decrease-crypto-configuration', body)
decrease_crypto_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, crypto_adapters, crypto_domain_indexes):\n crypto_adapter_uris = [a.uri for a in crypto_adapters]\n body = {'crypto-adapter-uris': crypto_adapter_uris,\n 'crypto-domain-indexes': crypto_domain_indexes}\n self.manager.session.post(self.uri +\n '/operations/decrease-crypto-configuration', body)\n", "role": "user" }, { "content": "decrease_crypto_config", "role": "assistant" } ]
def x(self, crypto_domain_index, access_mode): body = {'domain-index': crypto_domain_index, 'access-mode': access_mode} self.manager.session.post(self.uri + '/operations/change-crypto-domain-configuration', body)
change_crypto_domain_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, crypto_domain_index, access_mode):\n body = {'domain-index': crypto_domain_index, 'access-mode': access_mode}\n self.manager.session.post(self.uri +\n '/operations/change-crypto-domain-configuration', body)\n", "role": "user" }, { "content": "change_crypto_domain_config", "role": "assistant" } ]
def x(self, crypto_adapter, crypto_domain_index): body = {'crypto-adapter-uri': crypto_adapter.uri, 'domain-index': crypto_domain_index} self.manager.session.post(self.uri + '/operations/zeroize-crypto-domain', body)
zeroize_crypto_domain
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, crypto_adapter, crypto_domain_index):\n body = {'crypto-adapter-uri': crypto_adapter.uri, 'domain-index':\n crypto_domain_index}\n self.manager.session.post(self.uri +\n '/operations/zeroize-crypto-domain', body)\n", "role": "user" }, { "content": "zeroize_crypto_domain", "role": "assistant" } ]
def x(self, storage_group): body = {'storage-group-uri': storage_group.uri} self.manager.session.post(self.uri + '/operations/attach-storage-group', body)
attach_storage_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, storage_group):\n body = {'storage-group-uri': storage_group.uri}\n self.manager.session.post(self.uri + '/operations/attach-storage-group',\n body)\n", "role": "user" }, { "content": "attach_storage_group", "role": "assistant" } ]
def x(self, storage_group): body = {'storage-group-uri': storage_group.uri} self.manager.session.post(self.uri + '/operations/detach-storage-group', body)
detach_storage_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, storage_group):\n body = {'storage-group-uri': storage_group.uri}\n self.manager.session.post(self.uri + '/operations/detach-storage-group',\n body)\n", "role": "user" }, { "content": "detach_storage_group", "role": "assistant" } ]
def x(self, full_properties=False): sg_list = [] sg_uris = self.get_property('storage-group-uris') if sg_uris: cpc = self.manager.cpc for sg_uri in sg_uris: sg = cpc.storage_groups.resource_object(sg_uri) sg_list.append(sg) if full_properties: sg.pull_full_properties() return sg_list
list_attached_storage_groups
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, full_properties=False):\n sg_list = []\n sg_uris = self.get_property('storage-group-uris')\n if sg_uris:\n cpc = self.manager.cpc\n for sg_uri in sg_uris:\n sg = cpc.storage_groups.resource_object(sg_uri)\n sg_list.append(sg)\n if full_properties:\n sg.pull_full_properties()\n return sg_list\n", "role": "user" }, { "content": "list_attached_storage_groups", "role": "assistant" } ]
def x(self, properties): self.manager.session.post(self.uri, body=properties) assert self.manager._name_prop not in properties self.properties.update(copy.deepcopy(properties))
update_properties
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, properties):\n self.manager.session.post(self.uri, body=properties)\n assert self.manager._name_prop not in properties\n self.properties.update(copy.deepcopy(properties))\n", "role": "user" }, { "content": "update_properties", "role": "assistant" } ]
def x(self): if self._api_version is None: self.query_api_version() return self._api_version['api-major-version'], self._api_version[ 'api-minor-version']
version_info
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self._api_version is None:\n self.query_api_version()\n return self._api_version['api-major-version'], self._api_version[\n 'api-minor-version']\n", "role": "user" }, { "content": "version_info", "role": "assistant" } ]
def x(self): version_resp = self._session.get('/api/version', logon_required=False) self._api_version = version_resp return self._api_version
query_api_version
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n version_resp = self._session.get('/api/version', logon_required=False)\n self._api_version = version_resp\n return self._api_version\n", "role": "user" }, { "content": "query_api_version", "role": "assistant" } ]
def x(self, resources): uri = '/api/services/inventory' body = {'resources': resources} result = self.session.post(uri, body=body) return result
get_inventory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, resources):\n uri = '/api/services/inventory'\n body = {'resources': resources}\n result = self.session.post(uri, body=body)\n return result\n", "role": "user" }, { "content": "get_inventory", "role": "assistant" } ]
def x(self, operation_timeout=None): if operation_timeout is None: operation_timeout = self.session.retry_timeout_config.operation_timeout if operation_timeout > 0: start_time = time.time() while True: try: self.query_api_version() except Error: pass except Exception: raise else: break if operation_timeout > 0: current_time = time.time() if current_time > start_time + operation_timeout: raise OperationTimeout( 'Waiting for Console at {} to become available timed out (operation timeout: {} s)' .format(self.session.host, operation_timeout), operation_timeout) time.sleep(10)
wait_for_available
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, operation_timeout=None):\n if operation_timeout is None:\n operation_timeout = self.session.retry_timeout_config.operation_timeout\n if operation_timeout > 0:\n start_time = time.time()\n while True:\n try:\n self.query_api_version()\n except Error:\n pass\n except Exception:\n raise\n else:\n break\n if operation_timeout > 0:\n current_time = time.time()\n if current_time > start_time + operation_timeout:\n raise OperationTimeout(\n 'Waiting for Console at {} to become available timed out (operation timeout: {} s)'\n .format(self.session.host, operation_timeout),\n operation_timeout)\n time.sleep(10)\n", "role": "user" }, { "content": "wait_for_available", "role": "assistant" } ]
def x(self): full_properties = self.manager.session.get(self._uri) self._properties = dict(full_properties) self._properties_timestamp = int(time.time()) self._full_properties = True
pull_full_properties
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n full_properties = self.manager.session.get(self._uri)\n self._properties = dict(full_properties)\n self._properties_timestamp = int(time.time())\n self._full_properties = True\n", "role": "user" }, { "content": "pull_full_properties", "role": "assistant" } ]
def x(self, name): try: return self._properties[name] except KeyError: if self._full_properties: raise self.pull_full_properties() return self._properties[name]
get_property
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, name):\n try:\n return self._properties[name]\n except KeyError:\n if self._full_properties:\n raise\n self.pull_full_properties()\n return self._properties[name]\n", "role": "user" }, { "content": "get_property", "role": "assistant" } ]
def x(zhmc, userid=None, password=None): global USERID, PASSWORD USERID = userid or USERID or six.input('Enter userid for HMC {}: '. format(zhmc)) PASSWORD = password or PASSWORD or getpass.getpass( 'Enter password for {}: '.format(USERID)) session = zhmcclient.Session(zhmc, USERID, PASSWORD) session.logon() client = zhmcclient.Client(session) print('Established logged-on session with HMC {} using userid {}'. format(zhmc, USERID)) return client
make_client
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(zhmc, userid=None, password=None):\n global USERID, PASSWORD\n USERID = userid or USERID or six.input('Enter userid for HMC {}: '.\n format(zhmc))\n PASSWORD = password or PASSWORD or getpass.getpass(\n 'Enter password for {}: '.format(USERID))\n session = zhmcclient.Session(zhmc, USERID, PASSWORD)\n session.logon()\n client = zhmcclient.Client(session)\n print('Established logged-on session with HMC {} using userid {}'.\n format(zhmc, USERID))\n return client\n", "role": "user" }, { "content": "make_client", "role": "assistant" } ]
def x(text, indent): if text is None: return 'None' ret = _indent(text, amount=indent) return ret.lstrip(' ')
repr_text
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(text, indent):\n if text is None:\n return 'None'\n ret = _indent(text, amount=indent)\n return ret.lstrip(' ')\n", "role": "user" }, { "content": "repr_text", "role": "assistant" } ]
def x(_list, indent): if _list is None: return 'None' if isinstance(_list, MutableSequence): bm = '[' em = ']' elif isinstance(_list, Iterable): bm = '(' em = ')' else: raise TypeError('Object must be an iterable, but is a %s' % type(_list) ) ret = bm + '\n' for value in _list: ret += _indent('%r,\n' % value, 2) ret += em ret = repr_text(ret, indent=indent) return ret.lstrip(' ')
repr_list
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(_list, indent):\n if _list is None:\n return 'None'\n if isinstance(_list, MutableSequence):\n bm = '['\n em = ']'\n elif isinstance(_list, Iterable):\n bm = '('\n em = ')'\n else:\n raise TypeError('Object must be an iterable, but is a %s' % type(_list)\n )\n ret = bm + '\\n'\n for value in _list:\n ret += _indent('%r,\\n' % value, 2)\n ret += em\n ret = repr_text(ret, indent=indent)\n return ret.lstrip(' ')\n", "role": "user" }, { "content": "repr_list", "role": "assistant" } ]
def x(_dict, indent): if _dict is None: return 'None' if not isinstance(_dict, Mapping): raise TypeError('Object must be a mapping, but is a %s' % type(_dict)) if isinstance(_dict, OrderedDict): kind = 'ordered' ret = '%s {\n' % kind for key in six.iterkeys(_dict): value = _dict[key] ret += _indent('%r: %r,\n' % (key, value), 2) else: kind = 'sorted' ret = '%s {\n' % kind for key in sorted(six.iterkeys(_dict)): value = _dict[key] ret += _indent('%r: %r,\n' % (key, value), 2) ret += '}' ret = repr_text(ret, indent=indent) return ret.lstrip(' ')
repr_dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(_dict, indent):\n if _dict is None:\n return 'None'\n if not isinstance(_dict, Mapping):\n raise TypeError('Object must be a mapping, but is a %s' % type(_dict))\n if isinstance(_dict, OrderedDict):\n kind = 'ordered'\n ret = '%s {\\n' % kind\n for key in six.iterkeys(_dict):\n value = _dict[key]\n ret += _indent('%r: %r,\\n' % (key, value), 2)\n else:\n kind = 'sorted'\n ret = '%s {\\n' % kind\n for key in sorted(six.iterkeys(_dict)):\n value = _dict[key]\n ret += _indent('%r: %r,\\n' % (key, value), 2)\n ret += '}'\n ret = repr_text(ret, indent=indent)\n return ret.lstrip(' ')\n", "role": "user" }, { "content": "repr_dict", "role": "assistant" } ]
def x(timestamp): if timestamp is None: return 'None' dt = datetime_from_timestamp(timestamp) ret = '%d (%s)' % (timestamp, dt.strftime('%Y-%m-%d %H:%M:%S.%f %Z')) return ret
repr_timestamp
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(timestamp):\n if timestamp is None:\n return 'None'\n dt = datetime_from_timestamp(timestamp)\n ret = '%d (%s)' % (timestamp, dt.strftime('%Y-%m-%d %H:%M:%S.%f %Z'))\n return ret\n", "role": "user" }, { "content": "repr_timestamp", "role": "assistant" } ]
def x(ts): if ts is None: raise ValueError('HMC timestamp value must not be None.') if ts < 0: raise ValueError( 'Negative HMC timestamp value {} cannot be represented as datetime.' .format(ts)) epoch_seconds = ts // 1000 delta_microseconds = ts % 1000 * 1000 try: dt = datetime.fromtimestamp(epoch_seconds, pytz.utc) except (ValueError, OSError) as exc: raise ValueError(str(exc)) dt = dt.replace(microsecond=delta_microseconds) return dt
datetime_from_timestamp
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(ts):\n if ts is None:\n raise ValueError('HMC timestamp value must not be None.')\n if ts < 0:\n raise ValueError(\n 'Negative HMC timestamp value {} cannot be represented as datetime.'\n .format(ts))\n epoch_seconds = ts // 1000\n delta_microseconds = ts % 1000 * 1000\n try:\n dt = datetime.fromtimestamp(epoch_seconds, pytz.utc)\n except (ValueError, OSError) as exc:\n raise ValueError(str(exc))\n dt = dt.replace(microsecond=delta_microseconds)\n return dt\n", "role": "user" }, { "content": "datetime_from_timestamp", "role": "assistant" } ]
def x(dt): if dt is None: raise ValueError('datetime value must not be None.') if dt.tzinfo is None: dt = pytz.utc.localize(dt) epoch_seconds = (dt - _EPOCH_DT).total_seconds() ts = int(epoch_seconds * 1000) return ts
timestamp_from_datetime
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(dt):\n if dt is None:\n raise ValueError('datetime value must not be None.')\n if dt.tzinfo is None:\n dt = pytz.utc.localize(dt)\n epoch_seconds = (dt - _EPOCH_DT).total_seconds()\n ts = int(epoch_seconds * 1000)\n return ts\n", "role": "user" }, { "content": "timestamp_from_datetime", "role": "assistant" } ]
def x(self, properties): if properties is None: properties = {} result = self.session.post(self._base_uri, body=properties) props = copy.deepcopy(properties) props.update(result) name = props.get(self._name_prop, None) uri = props[self._uri_prop] storage_group = StorageGroup(self, uri, name, props) self._name_uri_cache.update(name, uri) return storage_group
create
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, properties):\n if properties is None:\n properties = {}\n result = self.session.post(self._base_uri, body=properties)\n props = copy.deepcopy(properties)\n props.update(result)\n name = props.get(self._name_prop, None)\n uri = props[self._uri_prop]\n storage_group = StorageGroup(self, uri, name, props)\n self._name_uri_cache.update(name, uri)\n return storage_group\n", "role": "user" }, { "content": "create", "role": "assistant" } ]
def x(self): if not self._storage_volumes: self._storage_volumes = StorageVolumeManager(self) return self._storage_volumes
storage_volumes
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._storage_volumes:\n self._storage_volumes = StorageVolumeManager(self)\n return self._storage_volumes\n", "role": "user" }, { "content": "storage_volumes", "role": "assistant" } ]
def x(self): if not self._virtual_storage_resources: self._virtual_storage_resources = VirtualStorageResourceManager(self) return self._virtual_storage_resources
virtual_storage_resources
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._virtual_storage_resources:\n self._virtual_storage_resources = VirtualStorageResourceManager(self)\n return self._virtual_storage_resources\n", "role": "user" }, { "content": "virtual_storage_resources", "role": "assistant" } ]
def x(self): if not self._cpc: cpc_uri = self.get_property('cpc-uri') cpc_mgr = self.manager.console.manager.client.cpcs self._cpc = cpc_mgr.resource_object(cpc_uri) return self._cpc
cpc
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._cpc:\n cpc_uri = self.get_property('cpc-uri')\n cpc_mgr = self.manager.console.manager.client.cpcs\n self._cpc = cpc_mgr.resource_object(cpc_uri)\n return self._cpc\n", "role": "user" }, { "content": "cpc", "role": "assistant" } ]
def x(self, name=None, status=None): query_parms = [] if name is not None: self.manager._append_query_parms(query_parms, 'name', name) if status is not None: self.manager._append_query_parms(query_parms, 'status', status) query_parms_str = '&'.join(query_parms) if query_parms_str: query_parms_str = '?{}'.format(query_parms_str) uri = '{}/operations/get-partitions{}'.format(self.uri, query_parms_str) sg_cpc = self.cpc part_mgr = sg_cpc.partitions result = self.manager.session.get(uri) props_list = result['partitions'] part_list = [] for props in props_list: part = part_mgr.resource_object(props['object-uri'], props) part_list.append(part) return part_list
list_attached_partitions
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, name=None, status=None):\n query_parms = []\n if name is not None:\n self.manager._append_query_parms(query_parms, 'name', name)\n if status is not None:\n self.manager._append_query_parms(query_parms, 'status', status)\n query_parms_str = '&'.join(query_parms)\n if query_parms_str:\n query_parms_str = '?{}'.format(query_parms_str)\n uri = '{}/operations/get-partitions{}'.format(self.uri, query_parms_str)\n sg_cpc = self.cpc\n part_mgr = sg_cpc.partitions\n result = self.manager.session.get(uri)\n props_list = result['partitions']\n part_list = []\n for props in props_list:\n part = part_mgr.resource_object(props['object-uri'], props)\n part_list.append(part)\n return part_list\n", "role": "user" }, { "content": "list_attached_partitions", "role": "assistant" } ]
def x(self, ports): body = {'adapter-port-uris': [p.uri for p in ports]} self.manager.session.post(self.uri + '/operations/add-candidate-adapter-ports', body=body)
add_candidate_adapter_ports
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, ports):\n body = {'adapter-port-uris': [p.uri for p in ports]}\n self.manager.session.post(self.uri +\n '/operations/add-candidate-adapter-ports', body=body)\n", "role": "user" }, { "content": "add_candidate_adapter_ports", "role": "assistant" } ]
def x(self, full_properties=False): sg_cpc = self.cpc adapter_mgr = sg_cpc.adapters port_list = [] port_uris = self.get_property('candidate-adapter-port-uris') if port_uris: for port_uri in port_uris: m = re.match('^(/api/adapters/[^/]*)/.*', port_uri) adapter_uri = m.group(1) adapter = adapter_mgr.resource_object(adapter_uri) port_mgr = adapter.ports port = port_mgr.resource_object(port_uri) port_list.append(port) if full_properties: port.pull_full_properties() return port_list
list_candidate_adapter_ports
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, full_properties=False):\n sg_cpc = self.cpc\n adapter_mgr = sg_cpc.adapters\n port_list = []\n port_uris = self.get_property('candidate-adapter-port-uris')\n if port_uris:\n for port_uri in port_uris:\n m = re.match('^(/api/adapters/[^/]*)/.*', port_uri)\n adapter_uri = m.group(1)\n adapter = adapter_mgr.resource_object(adapter_uri)\n port_mgr = adapter.ports\n port = port_mgr.resource_object(port_uri)\n port_list.append(port)\n if full_properties:\n port.pull_full_properties()\n return port_list\n", "role": "user" }, { "content": "list_candidate_adapter_ports", "role": "assistant" } ]
def x(self, properties): result = self.session.post(self.cpc.uri + '/adapters', body=properties) props = copy.deepcopy(properties) props.update(result) name = props.get(self._name_prop, None) uri = props[self._uri_prop] adapter = Adapter(self, uri, name, props) self._name_uri_cache.update(name, uri) return adapter
create_hipersocket
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, properties):\n result = self.session.post(self.cpc.uri + '/adapters', body=properties)\n props = copy.deepcopy(properties)\n props.update(result)\n name = props.get(self._name_prop, None)\n uri = props[self._uri_prop]\n adapter = Adapter(self, uri, name, props)\n self._name_uri_cache.update(name, uri)\n return adapter\n", "role": "user" }, { "content": "create_hipersocket", "role": "assistant" } ]