source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
---|---|---|
def x(method, uri, query_str):
if not query_str:
return None
query_parms = {}
for query_item in query_str.split('&'):
if query_item == '':
continue
items = query_item.split('=')
if len(items) != 2:
raise BadRequestError(method, uri, reason=1, message=
"Invalid format for URI query parameter: {!r} (valid format is: 'name=value')."
.format(query_item))
name = unquote(items[0])
value = unquote(items[1])
if name in query_parms:
existing_value = query_parms[name]
if not isinstance(existing_value, list):
query_parms[name] = list()
query_parms[name].append(existing_value)
query_parms[name].append(value)
else:
query_parms[name] = value
return query_parms
|
parse_query_parms
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, query_str):\n if not query_str:\n return None\n query_parms = {}\n for query_item in query_str.split('&'):\n if query_item == '':\n continue\n items = query_item.split('=')\n if len(items) != 2:\n raise BadRequestError(method, uri, reason=1, message=\n \"Invalid format for URI query parameter: {!r} (valid format is: 'name=value').\"\n .format(query_item))\n name = unquote(items[0])\n value = unquote(items[1])\n if name in query_parms:\n existing_value = query_parms[name]\n if not isinstance(existing_value, list):\n query_parms[name] = list()\n query_parms[name].append(existing_value)\n query_parms[name].append(value)\n else:\n query_parms[name] = value\n return query_parms\n",
"role": "user"
},
{
"content": "parse_query_parms",
"role": "assistant"
}
] |
def x(method, uri, body, field_names):
if body is None:
raise BadRequestError(method, uri, reason=3, message=
'Missing request body')
for field_name in field_names:
if field_name not in body:
raise BadRequestError(method, uri, reason=5, message=
'Missing required field in request body: {}'.format(field_name)
)
|
check_required_fields
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, body, field_names):\n if body is None:\n raise BadRequestError(method, uri, reason=3, message=\n 'Missing request body')\n for field_name in field_names:\n if field_name not in body:\n raise BadRequestError(method, uri, reason=5, message=\n 'Missing required field in request body: {}'.format(field_name)\n )\n",
"role": "user"
},
{
"content": "check_required_fields",
"role": "assistant"
}
] |
def x(method, uri, cpc):
status = cpc.properties.get('status', None)
if status is None:
return
valid_statuses = ['active', 'service-required', 'degraded', 'exceptions']
if status not in valid_statuses:
if uri.startswith(cpc.uri):
raise ConflictError(method, uri, reason=1, message=
'The operation cannot be performed because the targeted CPC {} has a status that is not valid for the operation: {}'
.format(cpc.name, status))
else:
raise ConflictError(method, uri, reason=6, message=
'The operation cannot be performed because CPC {} hosting the targeted resource has a status that is not valid for the operation: {}'
.format(cpc.name, status))
|
check_valid_cpc_status
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, cpc):\n status = cpc.properties.get('status', None)\n if status is None:\n return\n valid_statuses = ['active', 'service-required', 'degraded', 'exceptions']\n if status not in valid_statuses:\n if uri.startswith(cpc.uri):\n raise ConflictError(method, uri, reason=1, message=\n 'The operation cannot be performed because the targeted CPC {} has a status that is not valid for the operation: {}'\n .format(cpc.name, status))\n else:\n raise ConflictError(method, uri, reason=6, message=\n 'The operation cannot be performed because CPC {} hosting the targeted resource has a status that is not valid for the operation: {}'\n .format(cpc.name, status))\n",
"role": "user"
},
{
"content": "check_valid_cpc_status",
"role": "assistant"
}
] |
def x(method, uri, partition, valid_statuses=None, invalid_statuses=None):
status = partition.properties.get('status', None)
if status is None:
return
if (valid_statuses and status not in valid_statuses or invalid_statuses and
status in invalid_statuses):
if uri.startswith(partition.uri):
raise ConflictError(method, uri, reason=1, message=
'The operation cannot be performed because the targeted partition {} has a status that is not valid for the operation: {}'
.format(partition.name, status))
else:
raise ConflictError(method, uri, reason=1, message=
'The operation cannot be performed because partition {} hosting the targeted resource has a status that is not valid for the operation: {}'
.format(partition.name, status))
|
check_partition_status
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, partition, valid_statuses=None, invalid_statuses=None):\n status = partition.properties.get('status', None)\n if status is None:\n return\n if (valid_statuses and status not in valid_statuses or invalid_statuses and\n status in invalid_statuses):\n if uri.startswith(partition.uri):\n raise ConflictError(method, uri, reason=1, message=\n 'The operation cannot be performed because the targeted partition {} has a status that is not valid for the operation: {}'\n .format(partition.name, status))\n else:\n raise ConflictError(method, uri, reason=1, message=\n 'The operation cannot be performed because partition {} hosting the targeted resource has a status that is not valid for the operation: {}'\n .format(partition.name, status))\n",
"role": "user"
},
{
"content": "check_partition_status",
"role": "assistant"
}
] |
def x(partition):
if ('crypto-configuration' not in partition.properties or partition.
properties['crypto-configuration'] is None):
partition.properties['crypto-configuration'] = {}
crypto_config = partition.properties['crypto-configuration']
if 'crypto-adapter-uris' not in crypto_config or crypto_config[
'crypto-adapter-uris'] is None:
crypto_config['crypto-adapter-uris'] = []
adapter_uris = crypto_config['crypto-adapter-uris']
if 'crypto-domain-configurations' not in crypto_config or crypto_config[
'crypto-domain-configurations'] is None:
crypto_config['crypto-domain-configurations'] = []
domain_configs = crypto_config['crypto-domain-configurations']
return adapter_uris, domain_configs
|
ensure_crypto_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(partition):\n if ('crypto-configuration' not in partition.properties or partition.\n properties['crypto-configuration'] is None):\n partition.properties['crypto-configuration'] = {}\n crypto_config = partition.properties['crypto-configuration']\n if 'crypto-adapter-uris' not in crypto_config or crypto_config[\n 'crypto-adapter-uris'] is None:\n crypto_config['crypto-adapter-uris'] = []\n adapter_uris = crypto_config['crypto-adapter-uris']\n if 'crypto-domain-configurations' not in crypto_config or crypto_config[\n 'crypto-domain-configurations'] is None:\n crypto_config['crypto-domain-configurations'] = []\n domain_configs = crypto_config['crypto-domain-configurations']\n return adapter_uris, domain_configs\n",
"role": "user"
},
{
"content": "ensure_crypto_config",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
try:
resource = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
return resource.properties
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n return resource.properties\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
try:
resource = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
resource.update(body)
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n resource.update(body)\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
try:
resource = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
resource.manager.remove(resource.oid)
|
delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n resource.manager.remove(resource.oid)\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
console_uri = '/api/console'
try:
console = hmc.lookup_by_uri(console_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['user-pattern-uris'])
new_order_uris = body['user-pattern-uris']
objs = console.user_patterns.list()
obj_by_uri = {}
for obj in objs:
obj_by_uri[obj.uri] = obj
for uri in new_order_uris:
obj = obj_by_uri[uri]
console.user_patterns.remove(obj.oid)
console.user_patterns.add(obj.properties)
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n console_uri = '/api/console'\n try:\n console = hmc.lookup_by_uri(console_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['user-pattern-uris'])\n new_order_uris = body['user-pattern-uris']\n objs = console.user_patterns.list()\n obj_by_uri = {}\n for obj in objs:\n obj_by_uri[obj.uri] = obj\n for uri in new_order_uris:\n obj = obj_by_uri[uri]\n console.user_patterns.remove(obj.oid)\n console.user_patterns.add(obj.properties)\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
console_uri = '/api/console'
try:
hmc.lookup_by_uri(console_uri)
except KeyError:
raise InvalidResourceError(method, uri)
resp = []
return resp
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n console_uri = '/api/console'\n try:\n hmc.lookup_by_uri(console_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n resp = []\n return resp\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_ucpcs = []
filter_args = parse_query_parms(method, uri, query_str)
for ucpc in console.unmanaged_cpcs.list(filter_args):
result_ucpc = {}
for prop in ucpc.properties:
if prop in ('object-uri', 'name'):
result_ucpc[prop] = ucpc.properties[prop]
result_ucpcs.append(result_ucpc)
return {'cpcs': result_ucpcs}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_ucpcs = []\n filter_args = parse_query_parms(method, uri, query_str)\n for ucpc in console.unmanaged_cpcs.list(filter_args):\n result_ucpc = {}\n for prop in ucpc.properties:\n if prop in ('object-uri', 'name'):\n result_ucpc[prop] = ucpc.properties[prop]\n result_ucpcs.append(result_ucpc)\n return {'cpcs': result_ucpcs}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_users = []
filter_args = parse_query_parms(method, uri, query_str)
for user in console.users.list(filter_args):
result_user = {}
for prop in user.properties:
if prop in ('object-uri', 'name', 'type'):
result_user[prop] = user.properties[prop]
result_users.append(result_user)
return {'users': result_users}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_users = []\n filter_args = parse_query_parms(method, uri, query_str)\n for user in console.users.list(filter_args):\n result_user = {}\n for prop in user.properties:\n if prop in ('object-uri', 'name', 'type'):\n result_user[prop] = user.properties[prop]\n result_users.append(result_user)\n return {'users': result_users}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
try:
user = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
type_ = user.properties['type']
if type_ == 'pattern-based':
raise BadRequestError(method, uri, reason=312, message=
'Cannot delete pattern-based user {!r}'.format(user.name))
user.manager.remove(user.oid)
|
delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n user = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n type_ = user.properties['type']\n if type_ == 'pattern-based':\n raise BadRequestError(method, uri, reason=312, message=\n 'Cannot delete pattern-based user {!r}'.format(user.name))\n user.manager.remove(user.oid)\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
user_oid = uri_parms[0]
user_uri = '/api/users/' + user_oid
try:
user = hmc.lookup_by_uri(user_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['user-role-uri'])
user_type = user.properties['type']
if user_type in ('pattern-based', 'system-defined'):
raise BadRequestError(method, uri, reason=314, message=
'Cannot add user role to user of type {}: {}'.format(user_type,
user_uri))
user_role_uri = body['user-role-uri']
try:
hmc.lookup_by_uri(user_role_uri)
except KeyError:
raise InvalidResourceError(method, user_role_uri, reason=2)
if user.properties.get('user-roles', None) is None:
user.properties['user-roles'] = []
user.properties['user-roles'].append(user_role_uri)
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n user_oid = uri_parms[0]\n user_uri = '/api/users/' + user_oid\n try:\n user = hmc.lookup_by_uri(user_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['user-role-uri'])\n user_type = user.properties['type']\n if user_type in ('pattern-based', 'system-defined'):\n raise BadRequestError(method, uri, reason=314, message=\n 'Cannot add user role to user of type {}: {}'.format(user_type,\n user_uri))\n user_role_uri = body['user-role-uri']\n try:\n hmc.lookup_by_uri(user_role_uri)\n except KeyError:\n raise InvalidResourceError(method, user_role_uri, reason=2)\n if user.properties.get('user-roles', None) is None:\n user.properties['user-roles'] = []\n user.properties['user-roles'].append(user_role_uri)\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_user_roles = []
filter_args = parse_query_parms(method, uri, query_str)
for user_role in console.user_roles.list(filter_args):
result_user_role = {}
for prop in user_role.properties:
if prop in ('object-uri', 'name', 'type'):
result_user_role[prop] = user_role.properties[prop]
result_user_roles.append(result_user_role)
return {'user-roles': result_user_roles}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_user_roles = []\n filter_args = parse_query_parms(method, uri, query_str)\n for user_role in console.user_roles.list(filter_args):\n result_user_role = {}\n for prop in user_role.properties:\n if prop in ('object-uri', 'name', 'type'):\n result_user_role[prop] = user_role.properties[prop]\n result_user_roles.append(result_user_role)\n return {'user-roles': result_user_roles}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['name'])
properties = copy.deepcopy(body)
if 'type' in properties:
raise BadRequestError(method, uri, reason=6, message=
'Type specified when creating a user role: {!r}'.format(
properties['type']))
properties['type'] = 'user-defined'
new_user_role = console.user_roles.add(properties)
return {'object-uri': new_user_role.uri}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['name'])\n properties = copy.deepcopy(body)\n if 'type' in properties:\n raise BadRequestError(method, uri, reason=6, message=\n 'Type specified when creating a user role: {!r}'.format(\n properties['type']))\n properties['type'] = 'user-defined'\n new_user_role = console.user_roles.add(properties)\n return {'object-uri': new_user_role.uri}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
user_role_oid = uri_parms[0]
user_role_uri = '/api/user-roles/' + user_role_oid
try:
user_role = hmc.lookup_by_uri(user_role_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['permitted-object',
'permitted-object-type'])
if user_role.properties['type'] == 'system-defined':
raise BadRequestError(method, uri, reason=314, message=
'Cannot add permission to system-defined user role: {}'.format(
user_role_uri))
permission = copy.deepcopy(body)
if 'include-members' not in permission:
permission['include-members'] = False
if 'view-only-mode' not in permission:
permission['view-only-mode'] = True
if user_role.properties.get('permissions', None) is None:
user_role.properties['permissions'] = []
user_role.properties['permissions'].append(permission)
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n user_role_oid = uri_parms[0]\n user_role_uri = '/api/user-roles/' + user_role_oid\n try:\n user_role = hmc.lookup_by_uri(user_role_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['permitted-object',\n 'permitted-object-type'])\n if user_role.properties['type'] == 'system-defined':\n raise BadRequestError(method, uri, reason=314, message=\n 'Cannot add permission to system-defined user role: {}'.format(\n user_role_uri))\n permission = copy.deepcopy(body)\n if 'include-members' not in permission:\n permission['include-members'] = False\n if 'view-only-mode' not in permission:\n permission['view-only-mode'] = True\n if user_role.properties.get('permissions', None) is None:\n user_role.properties['permissions'] = []\n user_role.properties['permissions'].append(permission)\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_tasks = []
filter_args = parse_query_parms(method, uri, query_str)
for task in console.tasks.list(filter_args):
result_task = {}
for prop in task.properties:
if prop in ('element-uri', 'name'):
result_task[prop] = task.properties[prop]
result_tasks.append(result_task)
return {'tasks': result_tasks}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_tasks = []\n filter_args = parse_query_parms(method, uri, query_str)\n for task in console.tasks.list(filter_args):\n result_task = {}\n for prop in task.properties:\n if prop in ('element-uri', 'name'):\n result_task[prop] = task.properties[prop]\n result_tasks.append(result_task)\n return {'tasks': result_tasks}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_user_patterns = []
filter_args = parse_query_parms(method, uri, query_str)
for user_pattern in console.user_patterns.list(filter_args):
result_user_pattern = {}
for prop in user_pattern.properties:
if prop in ('element-uri', 'name', 'type'):
result_user_pattern[prop] = user_pattern.properties[prop]
result_user_patterns.append(result_user_pattern)
return {'user-patterns': result_user_patterns}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_user_patterns = []\n filter_args = parse_query_parms(method, uri, query_str)\n for user_pattern in console.user_patterns.list(filter_args):\n result_user_pattern = {}\n for prop in user_pattern.properties:\n if prop in ('element-uri', 'name', 'type'):\n result_user_pattern[prop] = user_pattern.properties[prop]\n result_user_patterns.append(result_user_pattern)\n return {'user-patterns': result_user_patterns}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_password_rules = []
filter_args = parse_query_parms(method, uri, query_str)
for password_rule in console.password_rules.list(filter_args):
result_password_rule = {}
for prop in password_rule.properties:
if prop in ('element-uri', 'name', 'type'):
result_password_rule[prop] = password_rule.properties[prop]
result_password_rules.append(result_password_rule)
return {'password-rules': result_password_rules}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_password_rules = []\n filter_args = parse_query_parms(method, uri, query_str)\n for password_rule in console.password_rules.list(filter_args):\n result_password_rule = {}\n for prop in password_rule.properties:\n if prop in ('element-uri', 'name', 'type'):\n result_password_rule[prop] = password_rule.properties[prop]\n result_password_rules.append(result_password_rule)\n return {'password-rules': result_password_rules}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['name'])
new_password_rule = console.password_rules.add(body)
return {'element-uri': new_password_rule.uri}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['name'])\n new_password_rule = console.password_rules.add(body)\n return {'element-uri': new_password_rule.uri}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_ldap_srv_defs = []
filter_args = parse_query_parms(method, uri, query_str)
for ldap_srv_def in console.ldap_server_definitions.list(filter_args):
result_ldap_srv_def = {}
for prop in ldap_srv_def.properties:
if prop in ('element-uri', 'name', 'type'):
result_ldap_srv_def[prop] = ldap_srv_def.properties[prop]
result_ldap_srv_defs.append(result_ldap_srv_def)
return {'ldap-server-definitions': result_ldap_srv_defs}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_ldap_srv_defs = []\n filter_args = parse_query_parms(method, uri, query_str)\n for ldap_srv_def in console.ldap_server_definitions.list(filter_args):\n result_ldap_srv_def = {}\n for prop in ldap_srv_def.properties:\n if prop in ('element-uri', 'name', 'type'):\n result_ldap_srv_def[prop] = ldap_srv_def.properties[prop]\n result_ldap_srv_defs.append(result_ldap_srv_def)\n return {'ldap-server-definitions': result_ldap_srv_defs}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
result_cpcs = []
filter_args = parse_query_parms(method, uri, query_str)
for cpc in hmc.cpcs.list(filter_args):
result_cpc = {}
for prop in cpc.properties:
if prop in ('object-uri', 'name', 'status'):
result_cpc[prop] = cpc.properties[prop]
result_cpcs.append(result_cpc)
return {'cpcs': result_cpcs}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n result_cpcs = []\n filter_args = parse_query_parms(method, uri, query_str)\n for cpc in hmc.cpcs.list(filter_args):\n result_cpc = {}\n for prop in cpc.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_cpc[prop] = cpc.properties[prop]\n result_cpcs.append(result_cpc)\n return {'cpcs': result_cpcs}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['power-saving'])
power_saving = body['power-saving']
if power_saving not in ['high-performance', 'low-power', 'custom']:
raise BadRequestError(method, uri, reason=7, message=
'Invalid power-saving value: %r' % power_saving)
cpc.properties['cpc-power-saving'] = power_saving
cpc.properties['cpc-power-saving-state'] = power_saving
cpc.properties['zcpc-power-saving'] = power_saving
cpc.properties['zcpc-power-saving-state'] = power_saving
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['power-saving'])\n power_saving = body['power-saving']\n if power_saving not in ['high-performance', 'low-power', 'custom']:\n raise BadRequestError(method, uri, reason=7, message=\n 'Invalid power-saving value: %r' % power_saving)\n cpc.properties['cpc-power-saving'] = power_saving\n cpc.properties['cpc-power-saving-state'] = power_saving\n cpc.properties['zcpc-power-saving'] = power_saving\n cpc.properties['zcpc-power-saving-state'] = power_saving\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['power-capping-state'])
power_capping_state = body['power-capping-state']
power_cap_current = body.get('power-cap-current', None)
if power_capping_state not in ['disabled', 'enabled', 'custom']:
raise BadRequestError(method, uri, reason=7, message=
'Invalid power-capping-state value: %r' % power_capping_state)
if power_capping_state == 'enabled' and power_cap_current is None:
raise BadRequestError(method, uri, reason=7, message=
'Power-cap-current must be provided when enabling power capping')
cpc.properties['cpc-power-capping-state'] = power_capping_state
cpc.properties['cpc-power-cap-current'] = power_cap_current
cpc.properties['zcpc-power-capping-state'] = power_capping_state
cpc.properties['zcpc-power-cap-current'] = power_cap_current
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['power-capping-state'])\n power_capping_state = body['power-capping-state']\n power_cap_current = body.get('power-cap-current', None)\n if power_capping_state not in ['disabled', 'enabled', 'custom']:\n raise BadRequestError(method, uri, reason=7, message=\n 'Invalid power-capping-state value: %r' % power_capping_state)\n if power_capping_state == 'enabled' and power_cap_current is None:\n raise BadRequestError(method, uri, reason=7, message=\n 'Power-cap-current must be provided when enabling power capping')\n cpc.properties['cpc-power-capping-state'] = power_capping_state\n cpc.properties['cpc-power-cap-current'] = power_cap_current\n cpc.properties['zcpc-power-capping-state'] = power_capping_state\n cpc.properties['zcpc-power-cap-current'] = power_cap_current\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
energy_props = {'cpc-power-cap-allowed': cpc.properties.get(
'cpc-power-cap-allowed'), 'cpc-power-cap-current': cpc.properties.
get('cpc-power-cap-current'), 'cpc-power-cap-maximum': cpc.
properties.get('cpc-power-cap-maximum'), 'cpc-power-cap-minimum':
cpc.properties.get('cpc-power-cap-minimum'),
'cpc-power-capping-state': cpc.properties.get(
'cpc-power-capping-state'), 'cpc-power-consumption': cpc.properties
.get('cpc-power-consumption'), 'cpc-power-rating': cpc.properties.
get('cpc-power-rating'), 'cpc-power-save-allowed': cpc.properties.
get('cpc-power-save-allowed'), 'cpc-power-saving': cpc.properties.
get('cpc-power-saving'), 'cpc-power-saving-state': cpc.properties.
get('cpc-power-saving-state'), 'zcpc-ambient-temperature': cpc.
properties.get('zcpc-ambient-temperature'), 'zcpc-dew-point': cpc.
properties.get('zcpc-dew-point'), 'zcpc-exhaust-temperature': cpc.
properties.get('zcpc-exhaust-temperature'), 'zcpc-heat-load': cpc.
properties.get('zcpc-heat-load'), 'zcpc-heat-load-forced-air': cpc.
properties.get('zcpc-heat-load-forced-air'), 'zcpc-heat-load-water':
cpc.properties.get('zcpc-heat-load-water'), 'zcpc-humidity': cpc.
properties.get('zcpc-humidity'), 'zcpc-maximum-potential-heat-load':
cpc.properties.get('zcpc-maximum-potential-heat-load'),
'zcpc-maximum-potential-power': cpc.properties.get(
'zcpc-maximum-potential-power'), 'zcpc-power-cap-allowed': cpc.
properties.get('zcpc-power-cap-allowed'), 'zcpc-power-cap-current':
cpc.properties.get('zcpc-power-cap-current'),
'zcpc-power-cap-maximum': cpc.properties.get(
'zcpc-power-cap-maximum'), 'zcpc-power-cap-minimum': cpc.properties
.get('zcpc-power-cap-minimum'), 'zcpc-power-capping-state': cpc.
properties.get('zcpc-power-capping-state'),
'zcpc-power-consumption': cpc.properties.get(
'zcpc-power-consumption'), 'zcpc-power-rating': cpc.properties.get(
'zcpc-power-rating'), 'zcpc-power-save-allowed': cpc.properties.get
('zcpc-power-save-allowed'), 'zcpc-power-saving': cpc.properties.
get('zcpc-power-saving'), 'zcpc-power-saving-state': cpc.properties
.get('zcpc-power-saving-state')}
cpc_data = {'error-occurred': False, 'object-uri': cpc.uri, 'object-id':
cpc.oid, 'class': 'cpcs', 'properties': energy_props}
result = {'objects': [cpc_data]}
return result
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n energy_props = {'cpc-power-cap-allowed': cpc.properties.get(\n 'cpc-power-cap-allowed'), 'cpc-power-cap-current': cpc.properties.\n get('cpc-power-cap-current'), 'cpc-power-cap-maximum': cpc.\n properties.get('cpc-power-cap-maximum'), 'cpc-power-cap-minimum':\n cpc.properties.get('cpc-power-cap-minimum'),\n 'cpc-power-capping-state': cpc.properties.get(\n 'cpc-power-capping-state'), 'cpc-power-consumption': cpc.properties\n .get('cpc-power-consumption'), 'cpc-power-rating': cpc.properties.\n get('cpc-power-rating'), 'cpc-power-save-allowed': cpc.properties.\n get('cpc-power-save-allowed'), 'cpc-power-saving': cpc.properties.\n get('cpc-power-saving'), 'cpc-power-saving-state': cpc.properties.\n get('cpc-power-saving-state'), 'zcpc-ambient-temperature': cpc.\n properties.get('zcpc-ambient-temperature'), 'zcpc-dew-point': cpc.\n properties.get('zcpc-dew-point'), 'zcpc-exhaust-temperature': cpc.\n properties.get('zcpc-exhaust-temperature'), 'zcpc-heat-load': cpc.\n properties.get('zcpc-heat-load'), 'zcpc-heat-load-forced-air': cpc.\n properties.get('zcpc-heat-load-forced-air'), 'zcpc-heat-load-water':\n cpc.properties.get('zcpc-heat-load-water'), 'zcpc-humidity': cpc.\n properties.get('zcpc-humidity'), 'zcpc-maximum-potential-heat-load':\n cpc.properties.get('zcpc-maximum-potential-heat-load'),\n 'zcpc-maximum-potential-power': cpc.properties.get(\n 'zcpc-maximum-potential-power'), 'zcpc-power-cap-allowed': cpc.\n properties.get('zcpc-power-cap-allowed'), 'zcpc-power-cap-current':\n cpc.properties.get('zcpc-power-cap-current'),\n 'zcpc-power-cap-maximum': cpc.properties.get(\n 'zcpc-power-cap-maximum'), 'zcpc-power-cap-minimum': cpc.properties\n .get('zcpc-power-cap-minimum'), 'zcpc-power-capping-state': cpc.\n properties.get('zcpc-power-capping-state'),\n 'zcpc-power-consumption': cpc.properties.get(\n 'zcpc-power-consumption'), 'zcpc-power-rating': cpc.properties.get(\n 'zcpc-power-rating'), 'zcpc-power-save-allowed': cpc.properties.get\n ('zcpc-power-save-allowed'), 'zcpc-power-saving': cpc.properties.\n get('zcpc-power-saving'), 'zcpc-power-saving-state': cpc.properties\n .get('zcpc-power-saving-state')}\n cpc_data = {'error-occurred': False, 'object-uri': cpc.uri, 'object-id':\n cpc.oid, 'class': 'cpcs', 'properties': energy_props}\n result = {'objects': [cpc_data]}\n return result\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
cpc.properties['status'] = 'not-operating'
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n cpc.properties['status'] = 'not-operating'\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_required_fields(method, uri, body, ['partitions'])
partition_uris = body['partitions']
if len(partition_uris) == 0:
raise BadRequestError(method, uri, reason=149, message=
"'partitions' field in request body is empty.")
wwpn_list = []
for partition_uri in partition_uris:
partition = hmc.lookup_by_uri(partition_uri)
partition_cpc = partition.manager.parent
if partition_cpc.oid != cpc_oid:
raise BadRequestError(method, uri, reason=149, message=
"Partition %r specified in 'partitions' field is not in the targeted CPC with ID %r (but in the CPC with ID %r)."
% (partition.uri, cpc_oid, partition_cpc.oid))
partition_name = partition.properties.get('name', '')
for hba in partition.hbas.list():
port_uri = hba.properties['adapter-port-uri']
port = hmc.lookup_by_uri(port_uri)
adapter = port.manager.parent
adapter_id = adapter.properties.get('adapter-id', '')
devno = hba.properties.get('device-number', '')
wwpn = hba.properties.get('wwpn', '')
wwpn_str = '%s,%s,%s,%s' % (partition_name, adapter_id, devno, wwpn
)
wwpn_list.append(wwpn_str)
return {'wwpn-list': wwpn_list}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_required_fields(method, uri, body, ['partitions'])\n partition_uris = body['partitions']\n if len(partition_uris) == 0:\n raise BadRequestError(method, uri, reason=149, message=\n \"'partitions' field in request body is empty.\")\n wwpn_list = []\n for partition_uri in partition_uris:\n partition = hmc.lookup_by_uri(partition_uri)\n partition_cpc = partition.manager.parent\n if partition_cpc.oid != cpc_oid:\n raise BadRequestError(method, uri, reason=149, message=\n \"Partition %r specified in 'partitions' field is not in the targeted CPC with ID %r (but in the CPC with ID %r).\"\n % (partition.uri, cpc_oid, partition_cpc.oid))\n partition_name = partition.properties.get('name', '')\n for hba in partition.hbas.list():\n port_uri = hba.properties['adapter-port-uri']\n port = hmc.lookup_by_uri(port_uri)\n adapter = port.manager.parent\n adapter_id = adapter.properties.get('adapter-id', '')\n devno = hba.properties.get('device-number', '')\n wwpn = hba.properties.get('wwpn', '')\n wwpn_str = '%s,%s,%s,%s' % (partition_name, adapter_id, devno, wwpn\n )\n wwpn_list.append(wwpn_str)\n return {'wwpn-list': wwpn_list}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
check_required_fields(method, uri, body, ['anticipated-frequency-seconds'])
new_metrics_context = hmc.metrics_contexts.add(body)
result = {'metrics-context-uri': new_metrics_context.uri,
'metric-group-infos': new_metrics_context.get_metric_group_infos()}
return result
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n check_required_fields(method, uri, body, ['anticipated-frequency-seconds'])\n new_metrics_context = hmc.metrics_contexts.add(body)\n result = {'metrics-context-uri': new_metrics_context.uri,\n 'metric-group-infos': new_metrics_context.get_metric_group_infos()}\n return result\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
try:
metrics_context = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
hmc.metrics_contexts.remove(metrics_context.oid)
|
delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n metrics_context = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n hmc.metrics_contexts.remove(metrics_context.oid)\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
try:
metrics_context = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
result = metrics_context.get_metric_values_response()
return result
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n metrics_context = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result = metrics_context.get_metric_values_response()\n return result\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_adapters = []
if cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for adapter in cpc.adapters.list(filter_args):
result_adapter = {}
for prop in adapter.properties:
if prop in ('object-uri', 'name', 'status'):
result_adapter[prop] = adapter.properties[prop]
result_adapters.append(result_adapter)
return {'adapters': result_adapters}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_adapters = []\n if cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for adapter in cpc.adapters.list(filter_args):\n result_adapter = {}\n for prop in adapter.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_adapter[prop] = adapter.properties[prop]\n result_adapters.append(result_adapter)\n return {'adapters': result_adapters}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_required_fields(method, uri, body, ['name'])
body2 = body.copy()
body2['type'] = 'hipersockets'
try:
new_adapter = cpc.adapters.add(body2)
except InputError as exc:
raise BadRequestError(method, uri, reason=5, message=str(exc))
return {'object-uri': new_adapter.uri}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_required_fields(method, uri, body, ['name'])\n body2 = body.copy()\n body2['type'] = 'hipersockets'\n try:\n new_adapter = cpc.adapters.add(body2)\n except InputError as exc:\n raise BadRequestError(method, uri, reason=5, message=str(exc))\n return {'object-uri': new_adapter.uri}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
try:
adapter = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = adapter.manager.parent
assert cpc.dpm_enabled
adapter.manager.remove(adapter.oid)
|
delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n adapter = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = adapter.manager.parent\n assert cpc.dpm_enabled\n adapter.manager.remove(adapter.oid)\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
adapter_uri = uri.split('/operations/')[0]
try:
adapter = hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = adapter.manager.parent
assert cpc.dpm_enabled
check_required_fields(method, uri, body, ['crypto-type'])
crypto_type = body['crypto-type']
if crypto_type not in ['accelerator', 'cca-coprocessor', 'ep11-coprocessor'
]:
raise BadRequestError(method, uri, reason=8, message=
"Invalid value for 'crypto-type' field: %s" % crypto_type)
adapter.properties['crypto-type'] = crypto_type
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n adapter_uri = uri.split('/operations/')[0]\n try:\n adapter = hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = adapter.manager.parent\n assert cpc.dpm_enabled\n check_required_fields(method, uri, body, ['crypto-type'])\n crypto_type = body['crypto-type']\n if crypto_type not in ['accelerator', 'cca-coprocessor', 'ep11-coprocessor'\n ]:\n raise BadRequestError(method, uri, reason=8, message=\n \"Invalid value for 'crypto-type' field: %s\" % crypto_type)\n adapter.properties['crypto-type'] = crypto_type\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
adapter_uri = uri.split('/operations/')[0]
try:
adapter = hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = adapter.manager.parent
assert cpc.dpm_enabled
check_required_fields(method, uri, body, ['type'])
new_adapter_type = body['type']
adapter_family = adapter.properties.get('adapter-family', None)
if adapter_family != 'ficon':
raise BadRequestError(method, uri, reason=18, message=
'The adapter type cannot be changed for adapter family: %s' %
adapter_family)
adapter_status = adapter.properties.get('status', None)
if adapter_status == 'exceptions':
raise BadRequestError(method, uri, reason=18, message=
'The adapter type cannot be changed for adapter status: %s' %
adapter_status)
if new_adapter_type not in ['fc', 'fcp', 'not-configured']:
raise BadRequestError(method, uri, reason=8, message=
"Invalid new value for 'type' field: %s" % new_adapter_type)
adapter_type = adapter.properties.get('type', None)
if new_adapter_type == adapter_type:
raise BadRequestError(method, uri, reason=8, message=
"New value for 'type' field is already set: %s" % new_adapter_type)
adapter.properties['type'] = new_adapter_type
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n adapter_uri = uri.split('/operations/')[0]\n try:\n adapter = hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = adapter.manager.parent\n assert cpc.dpm_enabled\n check_required_fields(method, uri, body, ['type'])\n new_adapter_type = body['type']\n adapter_family = adapter.properties.get('adapter-family', None)\n if adapter_family != 'ficon':\n raise BadRequestError(method, uri, reason=18, message=\n 'The adapter type cannot be changed for adapter family: %s' %\n adapter_family)\n adapter_status = adapter.properties.get('status', None)\n if adapter_status == 'exceptions':\n raise BadRequestError(method, uri, reason=18, message=\n 'The adapter type cannot be changed for adapter status: %s' %\n adapter_status)\n if new_adapter_type not in ['fc', 'fcp', 'not-configured']:\n raise BadRequestError(method, uri, reason=8, message=\n \"Invalid new value for 'type' field: %s\" % new_adapter_type)\n adapter_type = adapter.properties.get('type', None)\n if new_adapter_type == adapter_type:\n raise BadRequestError(method, uri, reason=8, message=\n \"New value for 'type' field is already set: %s\" % new_adapter_type)\n adapter.properties['type'] = new_adapter_type\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_partitions = []
if cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for partition in cpc.partitions.list(filter_args):
result_partition = {}
for prop in partition.properties:
if prop in ('object-uri', 'name', 'status'):
result_partition[prop] = partition.properties[prop]
result_partitions.append(result_partition)
return {'partitions': result_partitions}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_partitions = []\n if cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for partition in cpc.partitions.list(filter_args):\n result_partition = {}\n for prop in partition.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_partition[prop] = partition.properties[prop]\n result_partitions.append(result_partition)\n return {'partitions': result_partitions}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_valid_cpc_status(method, uri, cpc)
check_required_fields(method, uri, body, ['name', 'initial-memory',
'maximum-memory'])
new_partition = cpc.partitions.add(body)
return {'object-uri': new_partition.uri}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_valid_cpc_status(method, uri, cpc)\n check_required_fields(method, uri, body, ['name', 'initial-memory',\n 'maximum-memory'])\n new_partition = cpc.partitions.add(body)\n return {'object-uri': new_partition.uri}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, valid_statuses=['stopped'])
partition.properties['status'] = 'active'
return {}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, valid_statuses=['stopped'])\n partition.properties['status'] = 'active'\n return {}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
query_parms = parse_query_parms(method, uri, uri_parms[1])
try:
image_name = query_parms['image-name']
except KeyError:
raise BadRequestError(method, uri, reason=1, message=
"Missing required URI query parameter 'image-name'")
try:
ins_file_name = query_parms['ins-file-name']
except KeyError:
raise BadRequestError(method, uri, reason=1, message=
"Missing required URI query parameter 'ins-file-name'")
partition.properties['boot-iso-image-name'] = image_name
partition.properties['boot-iso-ins-file'] = ins_file_name
return {}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n query_parms = parse_query_parms(method, uri, uri_parms[1])\n try:\n image_name = query_parms['image-name']\n except KeyError:\n raise BadRequestError(method, uri, reason=1, message=\n \"Missing required URI query parameter 'image-name'\")\n try:\n ins_file_name = query_parms['ins-file-name']\n except KeyError:\n raise BadRequestError(method, uri, reason=1, message=\n \"Missing required URI query parameter 'ins-file-name'\")\n partition.properties['boot-iso-image-name'] = image_name\n partition.properties['boot-iso-ins-file'] = ins_file_name\n return {}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, [])
adapter_uris, domain_configs = ensure_crypto_config(partition)
add_adapter_uris = body.get('crypto-adapter-uris', [])
add_domain_configs = body.get('crypto-domain-configurations', [])
for uri in add_adapter_uris:
if uri not in adapter_uris:
adapter_uris.append(uri)
for dc in add_domain_configs:
if dc not in domain_configs:
domain_configs.append(dc)
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, [])\n adapter_uris, domain_configs = ensure_crypto_config(partition)\n add_adapter_uris = body.get('crypto-adapter-uris', [])\n add_domain_configs = body.get('crypto-domain-configurations', [])\n for uri in add_adapter_uris:\n if uri not in adapter_uris:\n adapter_uris.append(uri)\n for dc in add_domain_configs:\n if dc not in domain_configs:\n domain_configs.append(dc)\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, [])
adapter_uris, domain_configs = ensure_crypto_config(partition)
remove_adapter_uris = body.get('crypto-adapter-uris', [])
remove_domain_indexes = body.get('crypto-domain-indexes', [])
for uri in remove_adapter_uris:
if uri in adapter_uris:
adapter_uris.remove(uri)
for remove_di in remove_domain_indexes:
for i, dc in enumerate(domain_configs):
if dc['domain-index'] == remove_di:
del domain_configs[i]
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, [])\n adapter_uris, domain_configs = ensure_crypto_config(partition)\n remove_adapter_uris = body.get('crypto-adapter-uris', [])\n remove_domain_indexes = body.get('crypto-domain-indexes', [])\n for uri in remove_adapter_uris:\n if uri in adapter_uris:\n adapter_uris.remove(uri)\n for remove_di in remove_domain_indexes:\n for i, dc in enumerate(domain_configs):\n if dc['domain-index'] == remove_di:\n del domain_configs[i]\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_uri = re.sub('/hbas$', '', uri)
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['name', 'adapter-port-uri'])
port_uri = body['adapter-port-uri']
m = re.match('(^/api/adapters/[^/]+)/storage-ports/[^/]+$', port_uri)
if not m:
raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri
)
adapter_uri = m.group(1)
try:
hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=2, resource_uri=
adapter_uri)
try:
hmc.lookup_by_uri(port_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri
)
new_hba = partition.hbas.add(body)
return {'element-uri': new_hba.uri}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/hbas$', '', uri)\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['name', 'adapter-port-uri'])\n port_uri = body['adapter-port-uri']\n m = re.match('(^/api/adapters/[^/]+)/storage-ports/[^/]+$', port_uri)\n if not m:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri\n )\n adapter_uri = m.group(1)\n try:\n hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=2, resource_uri=\n adapter_uri)\n try:\n hmc.lookup_by_uri(port_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri\n )\n new_hba = partition.hbas.add(body)\n return {'element-uri': new_hba.uri}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
try:
hba = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
partition = hba.manager.parent
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
partition.hbas.remove(hba.oid)
|
delete
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n hba = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n partition = hba.manager.parent\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n partition.hbas.remove(hba.oid)\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
hba_oid = uri_parms[1]
hba_uri = '/api/partitions/' + partition_oid + '/hbas/' + hba_oid
try:
hba = hmc.lookup_by_uri(hba_uri)
except KeyError:
raise InvalidResourceError(method, uri)
partition = hmc.lookup_by_uri(partition_uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['adapter-port-uri'])
new_port_uri = body['adapter-port-uri']
hba.properties['adapter-port-uri'] = new_port_uri
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partition_uri = '/api/partitions/' + partition_oid\n hba_oid = uri_parms[1]\n hba_uri = '/api/partitions/' + partition_oid + '/hbas/' + hba_oid\n try:\n hba = hmc.lookup_by_uri(hba_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n partition = hmc.lookup_by_uri(partition_uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['adapter-port-uri'])\n new_port_uri = body['adapter-port-uri']\n hba.properties['adapter-port-uri'] = new_port_uri\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_uri = re.sub('/nics$', '', uri)
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['name'])
if 'network-adapter-port-uri' in body:
port_uri = body['network-adapter-port-uri']
m = re.match('(^/api/adapters/[^/]+)/network-ports/[^/]+$', port_uri)
if not m:
raise InvalidResourceError(method, uri, reason=6, resource_uri=
port_uri)
adapter_uri = m.group(1)
try:
hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=2, resource_uri=
adapter_uri)
try:
hmc.lookup_by_uri(port_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=6, resource_uri=
port_uri)
elif 'virtual-switch-uri' in body:
vswitch_uri = body['virtual-switch-uri']
try:
hmc.lookup_by_uri(vswitch_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=2, resource_uri=
vswitch_uri)
else:
nic_name = body.get('name', None)
raise BadRequestError(method, uri, reason=5, message=
"The input properties for creating a NIC {!r} in partition {!r} must specify either the 'network-adapter-port-uri' or the 'virtual-switch-uri' property."
.format(nic_name, partition.name))
new_nic = partition.nics.add(body)
return {'element-uri': new_nic.uri}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/nics$', '', uri)\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['name'])\n if 'network-adapter-port-uri' in body:\n port_uri = body['network-adapter-port-uri']\n m = re.match('(^/api/adapters/[^/]+)/network-ports/[^/]+$', port_uri)\n if not m:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=\n port_uri)\n adapter_uri = m.group(1)\n try:\n hmc.lookup_by_uri(adapter_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=2, resource_uri=\n adapter_uri)\n try:\n hmc.lookup_by_uri(port_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=6, resource_uri=\n port_uri)\n elif 'virtual-switch-uri' in body:\n vswitch_uri = body['virtual-switch-uri']\n try:\n hmc.lookup_by_uri(vswitch_uri)\n except KeyError:\n raise InvalidResourceError(method, uri, reason=2, resource_uri=\n vswitch_uri)\n else:\n nic_name = body.get('name', None)\n raise BadRequestError(method, uri, reason=5, message=\n \"The input properties for creating a NIC {!r} in partition {!r} must specify either the 'network-adapter-port-uri' or the 'virtual-switch-uri' property.\"\n .format(nic_name, partition.name))\n new_nic = partition.nics.add(body)\n return {'element-uri': new_nic.uri}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_uri = re.sub('/virtual-functions$', '', uri)
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['name'])
new_vf = partition.virtual_functions.add(body)
return {'element-uri': new_vf.uri}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/virtual-functions$', '', uri)\n try:\n partition = hmc.lookup_by_uri(partition_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = partition.manager.parent\n assert cpc.dpm_enabled\n check_valid_cpc_status(method, uri, cpc)\n check_partition_status(method, uri, partition, invalid_statuses=[\n 'starting', 'stopping'])\n check_required_fields(method, uri, body, ['name'])\n new_vf = partition.virtual_functions.add(body)\n return {'element-uri': new_vf.uri}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_vswitches = []
if cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for vswitch in cpc.virtual_switches.list(filter_args):
result_vswitch = {}
for prop in vswitch.properties:
if prop in ('object-uri', 'name', 'type'):
result_vswitch[prop] = vswitch.properties[prop]
result_vswitches.append(result_vswitch)
return {'virtual-switches': result_vswitches}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_vswitches = []\n if cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for vswitch in cpc.virtual_switches.list(filter_args):\n result_vswitch = {}\n for prop in vswitch.properties:\n if prop in ('object-uri', 'name', 'type'):\n result_vswitch[prop] = vswitch.properties[prop]\n result_vswitches.append(result_vswitch)\n return {'virtual-switches': result_vswitches}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
vswitch_oid = uri_parms[0]
vswitch_uri = '/api/virtual-switches/' + vswitch_oid
try:
vswitch = hmc.lookup_by_uri(vswitch_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = vswitch.manager.parent
assert cpc.dpm_enabled
connected_vnic_uris = vswitch.properties['connected-vnic-uris']
return {'connected-vnic-uris': connected_vnic_uris}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n vswitch_oid = uri_parms[0]\n vswitch_uri = '/api/virtual-switches/' + vswitch_oid\n try:\n vswitch = hmc.lookup_by_uri(vswitch_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = vswitch.manager.parent\n assert cpc.dpm_enabled\n connected_vnic_uris = vswitch.properties['connected-vnic-uris']\n return {'connected-vnic-uris': connected_vnic_uris}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
filter_args = parse_query_parms(method, uri, query_str)
result_storage_groups = []
for sg in hmc.consoles.console.storage_groups.list(filter_args):
result_sg = {}
for prop in sg.properties:
if prop in ('object-uri', 'cpc-uri', 'name', 'status',
'fulfillment-state', 'type'):
result_sg[prop] = sg.properties[prop]
result_storage_groups.append(result_sg)
return {'storage-groups': result_storage_groups}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n filter_args = parse_query_parms(method, uri, query_str)\n result_storage_groups = []\n for sg in hmc.consoles.console.storage_groups.list(filter_args):\n result_sg = {}\n for prop in sg.properties:\n if prop in ('object-uri', 'cpc-uri', 'name', 'status',\n 'fulfillment-state', 'type'):\n result_sg[prop] = sg.properties[prop]\n result_storage_groups.append(result_sg)\n return {'storage-groups': result_storage_groups}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
check_required_fields(method, uri, body, ['name', 'cpc-uri', 'type'])
cpc_uri = body['cpc-uri']
try:
cpc = hmc.lookup_by_uri(cpc_uri)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_valid_cpc_status(method, uri, cpc)
body2 = body.copy()
sv_requests = body2.pop('storage-volumes', None)
new_storage_group = hmc.consoles.console.storage_groups.add(body2)
sv_uris = []
if sv_requests:
for sv_req in sv_requests:
check_required_fields(method, uri, sv_req, ['operation'])
operation = sv_req['operation']
if operation == 'create':
sv_props = sv_req.copy()
del sv_props['operation']
if 'element-uri' in sv_props:
raise BadRequestError(method, uri, 7,
"The 'element-uri' field in storage-volumes is invalid for the create operation"
)
sv_uri = new_storage_group.storage_volumes.add(sv_props)
sv_uris.append(sv_uri)
else:
raise BadRequestError(method, uri, 5,
"Invalid value for storage-volumes 'operation' field: %s" %
operation)
return {'object-uri': new_storage_group.uri, 'element-uris': sv_uris}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n check_required_fields(method, uri, body, ['name', 'cpc-uri', 'type'])\n cpc_uri = body['cpc-uri']\n try:\n cpc = hmc.lookup_by_uri(cpc_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n if not cpc.dpm_enabled:\n raise CpcNotInDpmError(method, uri, cpc)\n check_valid_cpc_status(method, uri, cpc)\n body2 = body.copy()\n sv_requests = body2.pop('storage-volumes', None)\n new_storage_group = hmc.consoles.console.storage_groups.add(body2)\n sv_uris = []\n if sv_requests:\n for sv_req in sv_requests:\n check_required_fields(method, uri, sv_req, ['operation'])\n operation = sv_req['operation']\n if operation == 'create':\n sv_props = sv_req.copy()\n del sv_props['operation']\n if 'element-uri' in sv_props:\n raise BadRequestError(method, uri, 7,\n \"The 'element-uri' field in storage-volumes is invalid for the create operation\"\n )\n sv_uri = new_storage_group.storage_volumes.add(sv_props)\n sv_uris.append(sv_uri)\n else:\n raise BadRequestError(method, uri, 5, \n \"Invalid value for storage-volumes 'operation' field: %s\" %\n operation)\n return {'object-uri': new_storage_group.uri, 'element-uris': sv_uris}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
storage_group = hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
body2 = body.copy()
sv_requests = body2.pop('storage-volumes', None)
storage_group.update(body2)
sv_uris = []
if sv_requests:
for sv_req in sv_requests:
check_required_fields(method, uri, sv_req, ['operation'])
operation = sv_req['operation']
if operation == 'create':
sv_props = sv_req.copy()
del sv_props['operation']
if 'element-uri' in sv_props:
raise BadRequestError(method, uri, 7,
"The 'element-uri' field in storage-volumes is invalid for the create operation"
)
sv_uri = storage_group.storage_volumes.add(sv_props)
sv_uris.append(sv_uri)
elif operation == 'modify':
check_required_fields(method, uri, sv_req, ['element-uri'])
sv_uri = sv_req['element-uri']
storage_volume = hmc.lookup_by_uri(sv_uri)
storage_volume.update_properties(sv_props)
elif operation == 'delete':
check_required_fields(method, uri, sv_req, ['element-uri'])
sv_uri = sv_req['element-uri']
storage_volume = hmc.lookup_by_uri(sv_uri)
storage_volume.delete()
else:
raise BadRequestError(method, uri, 5,
"Invalid value for storage-volumes 'operation' field: %s" %
operation)
return {'element-uris': sv_uris}
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n storage_group = hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n body2 = body.copy()\n sv_requests = body2.pop('storage-volumes', None)\n storage_group.update(body2)\n sv_uris = []\n if sv_requests:\n for sv_req in sv_requests:\n check_required_fields(method, uri, sv_req, ['operation'])\n operation = sv_req['operation']\n if operation == 'create':\n sv_props = sv_req.copy()\n del sv_props['operation']\n if 'element-uri' in sv_props:\n raise BadRequestError(method, uri, 7,\n \"The 'element-uri' field in storage-volumes is invalid for the create operation\"\n )\n sv_uri = storage_group.storage_volumes.add(sv_props)\n sv_uris.append(sv_uri)\n elif operation == 'modify':\n check_required_fields(method, uri, sv_req, ['element-uri'])\n sv_uri = sv_req['element-uri']\n storage_volume = hmc.lookup_by_uri(sv_uri)\n storage_volume.update_properties(sv_props)\n elif operation == 'delete':\n check_required_fields(method, uri, sv_req, ['element-uri'])\n sv_uri = sv_req['element-uri']\n storage_volume = hmc.lookup_by_uri(sv_uri)\n storage_volume.delete()\n else:\n raise BadRequestError(method, uri, 5, \n \"Invalid value for storage-volumes 'operation' field: %s\" %\n operation)\n return {'element-uris': sv_uris}\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
storage_group = hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
storage_group.manager.remove(storage_group.oid)
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n storage_group = hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n storage_group.manager.remove(storage_group.oid)\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
pass
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n pass\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
storage_group = hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['adapter-port-uris'])
candidate_adapter_port_uris = storage_group.properties[
'candidate-adapter-port-uris']
for ap_uri in body['adapter-port-uris']:
if ap_uri in candidate_adapter_port_uris:
raise ConflictError(method, uri, 483,
'Adapter port is already in candidate list of storage group %s: %s'
% (storage_group.name, ap_uri))
else:
candidate_adapter_port_uris.append(ap_uri)
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n storage_group_uri = '/api/storage-groups/' + storage_group_oid\n try:\n storage_group = hmc.lookup_by_uri(storage_group_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n check_required_fields(method, uri, body, ['adapter-port-uris'])\n candidate_adapter_port_uris = storage_group.properties[\n 'candidate-adapter-port-uris']\n for ap_uri in body['adapter-port-uris']:\n if ap_uri in candidate_adapter_port_uris:\n raise ConflictError(method, uri, 483, \n 'Adapter port is already in candidate list of storage group %s: %s'\n % (storage_group.name, ap_uri))\n else:\n candidate_adapter_port_uris.append(ap_uri)\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_lpars = []
if not cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for lpar in cpc.lpars.list(filter_args):
result_lpar = {}
for prop in lpar.properties:
if prop in ('object-uri', 'name', 'status'):
result_lpar[prop] = lpar.properties[prop]
result_lpars.append(result_lpar)
return {'logical-partitions': result_lpars}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n result_lpars = []\n if not cpc.dpm_enabled:\n filter_args = parse_query_parms(method, uri, query_str)\n for lpar in cpc.lpars.list(filter_args):\n result_lpar = {}\n for prop in lpar.properties:\n if prop in ('object-uri', 'name', 'status'):\n result_lpar[prop] = lpar.properties[prop]\n result_lpars.append(result_lpar)\n return {'logical-partitions': result_lpars}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
lpar_oid = uri_parms[0]
lpar_uri = '/api/logical-partitions/' + lpar_oid
try:
lpar = hmc.lookup_by_uri(lpar_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = lpar.manager.parent
assert not cpc.dpm_enabled
status = lpar.properties.get('status', None)
force = body.get('force', False) if body else False
if status == 'operating' and not force:
raise ServerError(method, uri, reason=263, message=
'LPAR {!r} could not be activated because the LPAR is in status {} (and force was not specified).'
.format(lpar.name, status))
act_profile_name = body.get('activation-profile-name', None)
if not act_profile_name:
act_profile_name = lpar.properties.get('next-activation-profile-name',
None)
if act_profile_name is None:
act_profile_name = ''
if act_profile_name != lpar.name:
raise ServerError(method, uri, reason=263, message=
'LPAR {!r} could not be activated because the name of the image activation profile {!r} is different from the LPAR name.'
.format(lpar.name, act_profile_name))
lpar.properties['status'] = LparActivateHandler.get_status()
lpar.properties['last-used-activation-profile'] = act_profile_name
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n lpar_oid = uri_parms[0]\n lpar_uri = '/api/logical-partitions/' + lpar_oid\n try:\n lpar = hmc.lookup_by_uri(lpar_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = lpar.manager.parent\n assert not cpc.dpm_enabled\n status = lpar.properties.get('status', None)\n force = body.get('force', False) if body else False\n if status == 'operating' and not force:\n raise ServerError(method, uri, reason=263, message=\n 'LPAR {!r} could not be activated because the LPAR is in status {} (and force was not specified).'\n .format(lpar.name, status))\n act_profile_name = body.get('activation-profile-name', None)\n if not act_profile_name:\n act_profile_name = lpar.properties.get('next-activation-profile-name',\n None)\n if act_profile_name is None:\n act_profile_name = ''\n if act_profile_name != lpar.name:\n raise ServerError(method, uri, reason=263, message=\n 'LPAR {!r} could not be activated because the name of the image activation profile {!r} is different from the LPAR name.'\n .format(lpar.name, act_profile_name))\n lpar.properties['status'] = LparActivateHandler.get_status()\n lpar.properties['last-used-activation-profile'] = act_profile_name\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
lpar_oid = uri_parms[0]
lpar_uri = '/api/logical-partitions/' + lpar_oid
try:
lpar = hmc.lookup_by_uri(lpar_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = lpar.manager.parent
assert not cpc.dpm_enabled
status = lpar.properties.get('status', None)
force = body.get('force', False) if body else False
clear_indicator = body.get('clear-indicator', True) if body else True
store_status_indicator = body.get('store-status-indicator', False
) if body else False
if status == 'not-activated':
raise ConflictError(method, uri, reason=0, message=
'LPAR {!r} could not be loaded because the LPAR is in status {}.'
.format(lpar.name, status))
elif status == 'operating' and not force:
raise ServerError(method, uri, reason=263, message=
'LPAR {!r} could not be loaded because the LPAR is already loaded (and force was not specified).'
.format(lpar.name))
load_address = body.get('load-address', None) if body else None
if not load_address:
load_address = lpar.properties.get('last-used-load-address', None)
if load_address is None:
raise BadRequestError(method, uri, reason=5, message=
'LPAR {!r} could not be loaded because a load address is not specified in the request or in the Lpar last-used property'
.format(lpar.name))
load_parameter = body.get('load-parameter', None) if body else None
if not load_parameter:
load_parameter = lpar.properties.get('last-used-load-parameter', None)
if load_parameter is None:
load_parameter = ''
if clear_indicator:
lpar.properties['memory'] = ''
if store_status_indicator:
lpar.properties['stored-status'] = status
else:
lpar.properties['stored-status'] = None
lpar.properties['status'] = LparLoadHandler.get_status()
lpar.properties['last-used-load-address'] = load_address
lpar.properties['last-used-load-parameter'] = load_parameter
|
post
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n lpar_oid = uri_parms[0]\n lpar_uri = '/api/logical-partitions/' + lpar_oid\n try:\n lpar = hmc.lookup_by_uri(lpar_uri)\n except KeyError:\n raise InvalidResourceError(method, uri)\n cpc = lpar.manager.parent\n assert not cpc.dpm_enabled\n status = lpar.properties.get('status', None)\n force = body.get('force', False) if body else False\n clear_indicator = body.get('clear-indicator', True) if body else True\n store_status_indicator = body.get('store-status-indicator', False\n ) if body else False\n if status == 'not-activated':\n raise ConflictError(method, uri, reason=0, message=\n 'LPAR {!r} could not be loaded because the LPAR is in status {}.'\n .format(lpar.name, status))\n elif status == 'operating' and not force:\n raise ServerError(method, uri, reason=263, message=\n 'LPAR {!r} could not be loaded because the LPAR is already loaded (and force was not specified).'\n .format(lpar.name))\n load_address = body.get('load-address', None) if body else None\n if not load_address:\n load_address = lpar.properties.get('last-used-load-address', None)\n if load_address is None:\n raise BadRequestError(method, uri, reason=5, message=\n 'LPAR {!r} could not be loaded because a load address is not specified in the request or in the Lpar last-used property'\n .format(lpar.name))\n load_parameter = body.get('load-parameter', None) if body else None\n if not load_parameter:\n load_parameter = lpar.properties.get('last-used-load-parameter', None)\n if load_parameter is None:\n load_parameter = ''\n if clear_indicator:\n lpar.properties['memory'] = ''\n if store_status_indicator:\n lpar.properties['stored-status'] = status\n else:\n lpar.properties['stored-status'] = None\n lpar.properties['status'] = LparLoadHandler.get_status()\n lpar.properties['last-used-load-address'] = load_address\n lpar.properties['last-used-load-parameter'] = load_parameter\n",
"role": "user"
},
{
"content": "post",
"role": "assistant"
}
] |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
assert not cpc.dpm_enabled
result_profiles = []
filter_args = parse_query_parms(method, uri, query_str)
for profile in cpc.load_activation_profiles.list(filter_args):
result_profile = {}
for prop in profile.properties:
if prop in ('element-uri', 'name'):
result_profile[prop] = profile.properties[prop]
result_profiles.append(result_profile)
return {'load-activation-profiles': result_profiles}
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n raise InvalidResourceError(method, uri)\n assert not cpc.dpm_enabled\n result_profiles = []\n filter_args = parse_query_parms(method, uri, query_str)\n for profile in cpc.load_activation_profiles.list(filter_args):\n result_profile = {}\n for prop in profile.properties:\n if prop in ('element-uri', 'name'):\n result_profile[prop] = profile.properties[prop]\n result_profiles.append(result_profile)\n return {'load-activation-profiles': result_profiles}\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, properties):
result = self.session.post(self.cpc.uri + '/partitions', body=properties)
props = copy.deepcopy(properties)
props.update(result)
name = props.get(self._name_prop, None)
uri = props[self._uri_prop]
part = Partition(self, uri, name, props)
self._name_uri_cache.update(name, uri)
return part
|
create
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n result = self.session.post(self.cpc.uri + '/partitions', body=properties)\n props = copy.deepcopy(properties)\n props.update(result)\n name = props.get(self._name_prop, None)\n uri = props[self._uri_prop]\n part = Partition(self, uri, name, props)\n self._name_uri_cache.update(name, uri)\n return part\n",
"role": "user"
},
{
"content": "create",
"role": "assistant"
}
] |
def x(self):
if not self._nics:
self._nics = NicManager(self)
return self._nics
|
nics
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._nics:\n self._nics = NicManager(self)\n return self._nics\n",
"role": "user"
},
{
"content": "nics",
"role": "assistant"
}
] |
def x(self):
if not self._hbas:
try:
dpm_sm = self.feature_enabled('dpm-storage-management')
except ValueError:
dpm_sm = False
if not dpm_sm:
self._hbas = HbaManager(self)
return self._hbas
|
hbas
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._hbas:\n try:\n dpm_sm = self.feature_enabled('dpm-storage-management')\n except ValueError:\n dpm_sm = False\n if not dpm_sm:\n self._hbas = HbaManager(self)\n return self._hbas\n",
"role": "user"
},
{
"content": "hbas",
"role": "assistant"
}
] |
def x(self):
if not self._virtual_functions:
self._virtual_functions = VirtualFunctionManager(self)
return self._virtual_functions
|
virtual_functions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._virtual_functions:\n self._virtual_functions = VirtualFunctionManager(self)\n return self._virtual_functions\n",
"role": "user"
},
{
"content": "virtual_functions",
"role": "assistant"
}
] |
def x(self, feature_name):
feature_list = self.prop('available-features-list', None)
if feature_list is None:
raise ValueError('Firmware features are not supported on CPC %s' %
self.manager.cpc.name)
for feature in feature_list:
if feature['name'] == feature_name:
break
else:
raise ValueError('Firmware feature %s is not available on CPC %s' %
(feature_name, self.manager.cpc.name))
return feature['state']
|
feature_enabled
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, feature_name):\n feature_list = self.prop('available-features-list', None)\n if feature_list is None:\n raise ValueError('Firmware features are not supported on CPC %s' %\n self.manager.cpc.name)\n for feature in feature_list:\n if feature['name'] == feature_name:\n break\n else:\n raise ValueError('Firmware feature %s is not available on CPC %s' %\n (feature_name, self.manager.cpc.name))\n return feature['state']\n",
"role": "user"
},
{
"content": "feature_enabled",
"role": "assistant"
}
] |
def x(self):
feature_list = self.prop('available-features-list', None)
if feature_list is None:
raise ValueError('Firmware features are not supported on CPC %s' %
self.manager.cpc.name)
return feature_list
|
feature_info
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n feature_list = self.prop('available-features-list', None)\n if feature_list is None:\n raise ValueError('Firmware features are not supported on CPC %s' %\n self.manager.cpc.name)\n return feature_list\n",
"role": "user"
},
{
"content": "feature_info",
"role": "assistant"
}
] |
def x(self, wait_for_completion=True, operation_timeout=None,
status_timeout=None):
result = self.manager.session.post(self.uri + '/operations/start',
wait_for_completion=wait_for_completion, operation_timeout=
operation_timeout)
if wait_for_completion:
statuses = ['active', 'degraded']
self.wait_for_status(statuses, status_timeout)
return result
|
start
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, wait_for_completion=True, operation_timeout=None,\n status_timeout=None):\n result = self.manager.session.post(self.uri + '/operations/start',\n wait_for_completion=wait_for_completion, operation_timeout=\n operation_timeout)\n if wait_for_completion:\n statuses = ['active', 'degraded']\n self.wait_for_status(statuses, status_timeout)\n return result\n",
"role": "user"
},
{
"content": "start",
"role": "assistant"
}
] |
def x(self, parameters, wait_for_completion=True, operation_timeout=None):
result = self.manager.session.post(self.uri + '/operations/scsi-dump',
wait_for_completion=wait_for_completion, operation_timeout=
operation_timeout, body=parameters)
return result
|
dump_partition
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, parameters, wait_for_completion=True, operation_timeout=None):\n result = self.manager.session.post(self.uri + '/operations/scsi-dump',\n wait_for_completion=wait_for_completion, operation_timeout=\n operation_timeout, body=parameters)\n return result\n",
"role": "user"
},
{
"content": "dump_partition",
"role": "assistant"
}
] |
def x(self, image, image_name, ins_file_name):
query_parms_str = '?image-name={}&ins-file-name={}'.format(quote(
image_name, safe=''), quote(ins_file_name, safe=''))
self.manager.session.post(self.uri + '/operations/mount-iso-image' +
query_parms_str, body=image)
|
mount_iso_image
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, image, image_name, ins_file_name):\n query_parms_str = '?image-name={}&ins-file-name={}'.format(quote(\n image_name, safe=''), quote(ins_file_name, safe=''))\n self.manager.session.post(self.uri + '/operations/mount-iso-image' +\n query_parms_str, body=image)\n",
"role": "user"
},
{
"content": "mount_iso_image",
"role": "assistant"
}
] |
def x(self, include_refresh_messages=True):
body = {'include-refresh-messages': include_refresh_messages}
result = self.manager.session.post(self.uri +
'/operations/open-os-message-channel', body)
return result['topic-name']
|
open_os_message_channel
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, include_refresh_messages=True):\n body = {'include-refresh-messages': include_refresh_messages}\n result = self.manager.session.post(self.uri +\n '/operations/open-os-message-channel', body)\n return result['topic-name']\n",
"role": "user"
},
{
"content": "open_os_message_channel",
"role": "assistant"
}
] |
def x(self, os_command_text, is_priority=False):
body = {'is-priority': is_priority, 'operating-system-command-text':
os_command_text}
self.manager.session.post(self.uri + '/operations/send-os-cmd', body)
|
send_os_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, os_command_text, is_priority=False):\n body = {'is-priority': is_priority, 'operating-system-command-text':\n os_command_text}\n self.manager.session.post(self.uri + '/operations/send-os-cmd', body)\n",
"role": "user"
},
{
"content": "send_os_command",
"role": "assistant"
}
] |
def x(self, status, status_timeout=None):
if status_timeout is None:
status_timeout = (self.manager.session.retry_timeout_config.
status_timeout)
if status_timeout > 0:
end_time = time.time() + status_timeout
if isinstance(status, (list, tuple)):
statuses = status
else:
statuses = [status]
while True:
parts = self.manager.cpc.partitions.list(filter_args={'name': self.
name})
assert len(parts) == 1
this_part = parts[0]
actual_status = this_part.get_property('status')
if actual_status in statuses:
return
if status_timeout > 0 and time.time() > end_time:
raise StatusTimeout(
"Waiting for partition {} to reach status(es) '{}' timed out after {} s - current status is '{}'"
.format(self.name, statuses, status_timeout, actual_status),
actual_status, statuses, status_timeout)
time.sleep(1)
|
wait_for_status
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, status, status_timeout=None):\n if status_timeout is None:\n status_timeout = (self.manager.session.retry_timeout_config.\n status_timeout)\n if status_timeout > 0:\n end_time = time.time() + status_timeout\n if isinstance(status, (list, tuple)):\n statuses = status\n else:\n statuses = [status]\n while True:\n parts = self.manager.cpc.partitions.list(filter_args={'name': self.\n name})\n assert len(parts) == 1\n this_part = parts[0]\n actual_status = this_part.get_property('status')\n if actual_status in statuses:\n return\n if status_timeout > 0 and time.time() > end_time:\n raise StatusTimeout(\n \"Waiting for partition {} to reach status(es) '{}' timed out after {} s - current status is '{}'\"\n .format(self.name, statuses, status_timeout, actual_status),\n actual_status, statuses, status_timeout)\n time.sleep(1)\n",
"role": "user"
},
{
"content": "wait_for_status",
"role": "assistant"
}
] |
def x(self, crypto_adapters, crypto_domain_configurations):
crypto_adapter_uris = [a.uri for a in crypto_adapters]
body = {'crypto-adapter-uris': crypto_adapter_uris,
'crypto-domain-configurations': crypto_domain_configurations}
self.manager.session.post(self.uri +
'/operations/increase-crypto-configuration', body)
|
increase_crypto_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_adapters, crypto_domain_configurations):\n crypto_adapter_uris = [a.uri for a in crypto_adapters]\n body = {'crypto-adapter-uris': crypto_adapter_uris,\n 'crypto-domain-configurations': crypto_domain_configurations}\n self.manager.session.post(self.uri +\n '/operations/increase-crypto-configuration', body)\n",
"role": "user"
},
{
"content": "increase_crypto_config",
"role": "assistant"
}
] |
def x(self, crypto_adapters, crypto_domain_indexes):
crypto_adapter_uris = [a.uri for a in crypto_adapters]
body = {'crypto-adapter-uris': crypto_adapter_uris,
'crypto-domain-indexes': crypto_domain_indexes}
self.manager.session.post(self.uri +
'/operations/decrease-crypto-configuration', body)
|
decrease_crypto_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_adapters, crypto_domain_indexes):\n crypto_adapter_uris = [a.uri for a in crypto_adapters]\n body = {'crypto-adapter-uris': crypto_adapter_uris,\n 'crypto-domain-indexes': crypto_domain_indexes}\n self.manager.session.post(self.uri +\n '/operations/decrease-crypto-configuration', body)\n",
"role": "user"
},
{
"content": "decrease_crypto_config",
"role": "assistant"
}
] |
def x(self, crypto_domain_index, access_mode):
body = {'domain-index': crypto_domain_index, 'access-mode': access_mode}
self.manager.session.post(self.uri +
'/operations/change-crypto-domain-configuration', body)
|
change_crypto_domain_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_domain_index, access_mode):\n body = {'domain-index': crypto_domain_index, 'access-mode': access_mode}\n self.manager.session.post(self.uri +\n '/operations/change-crypto-domain-configuration', body)\n",
"role": "user"
},
{
"content": "change_crypto_domain_config",
"role": "assistant"
}
] |
def x(self, crypto_adapter, crypto_domain_index):
body = {'crypto-adapter-uri': crypto_adapter.uri, 'domain-index':
crypto_domain_index}
self.manager.session.post(self.uri +
'/operations/zeroize-crypto-domain', body)
|
zeroize_crypto_domain
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_adapter, crypto_domain_index):\n body = {'crypto-adapter-uri': crypto_adapter.uri, 'domain-index':\n crypto_domain_index}\n self.manager.session.post(self.uri +\n '/operations/zeroize-crypto-domain', body)\n",
"role": "user"
},
{
"content": "zeroize_crypto_domain",
"role": "assistant"
}
] |
def x(self, storage_group):
body = {'storage-group-uri': storage_group.uri}
self.manager.session.post(self.uri + '/operations/attach-storage-group',
body)
|
attach_storage_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, storage_group):\n body = {'storage-group-uri': storage_group.uri}\n self.manager.session.post(self.uri + '/operations/attach-storage-group',\n body)\n",
"role": "user"
},
{
"content": "attach_storage_group",
"role": "assistant"
}
] |
def x(self, storage_group):
body = {'storage-group-uri': storage_group.uri}
self.manager.session.post(self.uri + '/operations/detach-storage-group',
body)
|
detach_storage_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, storage_group):\n body = {'storage-group-uri': storage_group.uri}\n self.manager.session.post(self.uri + '/operations/detach-storage-group',\n body)\n",
"role": "user"
},
{
"content": "detach_storage_group",
"role": "assistant"
}
] |
def x(self, full_properties=False):
sg_list = []
sg_uris = self.get_property('storage-group-uris')
if sg_uris:
cpc = self.manager.cpc
for sg_uri in sg_uris:
sg = cpc.storage_groups.resource_object(sg_uri)
sg_list.append(sg)
if full_properties:
sg.pull_full_properties()
return sg_list
|
list_attached_storage_groups
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, full_properties=False):\n sg_list = []\n sg_uris = self.get_property('storage-group-uris')\n if sg_uris:\n cpc = self.manager.cpc\n for sg_uri in sg_uris:\n sg = cpc.storage_groups.resource_object(sg_uri)\n sg_list.append(sg)\n if full_properties:\n sg.pull_full_properties()\n return sg_list\n",
"role": "user"
},
{
"content": "list_attached_storage_groups",
"role": "assistant"
}
] |
def x(self, properties):
self.manager.session.post(self.uri, body=properties)
assert self.manager._name_prop not in properties
self.properties.update(copy.deepcopy(properties))
|
update_properties
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n self.manager.session.post(self.uri, body=properties)\n assert self.manager._name_prop not in properties\n self.properties.update(copy.deepcopy(properties))\n",
"role": "user"
},
{
"content": "update_properties",
"role": "assistant"
}
] |
def x(self):
if self._api_version is None:
self.query_api_version()
return self._api_version['api-major-version'], self._api_version[
'api-minor-version']
|
version_info
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._api_version is None:\n self.query_api_version()\n return self._api_version['api-major-version'], self._api_version[\n 'api-minor-version']\n",
"role": "user"
},
{
"content": "version_info",
"role": "assistant"
}
] |
def x(self):
version_resp = self._session.get('/api/version', logon_required=False)
self._api_version = version_resp
return self._api_version
|
query_api_version
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n version_resp = self._session.get('/api/version', logon_required=False)\n self._api_version = version_resp\n return self._api_version\n",
"role": "user"
},
{
"content": "query_api_version",
"role": "assistant"
}
] |
def x(self, resources):
uri = '/api/services/inventory'
body = {'resources': resources}
result = self.session.post(uri, body=body)
return result
|
get_inventory
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, resources):\n uri = '/api/services/inventory'\n body = {'resources': resources}\n result = self.session.post(uri, body=body)\n return result\n",
"role": "user"
},
{
"content": "get_inventory",
"role": "assistant"
}
] |
def x(self, operation_timeout=None):
if operation_timeout is None:
operation_timeout = self.session.retry_timeout_config.operation_timeout
if operation_timeout > 0:
start_time = time.time()
while True:
try:
self.query_api_version()
except Error:
pass
except Exception:
raise
else:
break
if operation_timeout > 0:
current_time = time.time()
if current_time > start_time + operation_timeout:
raise OperationTimeout(
'Waiting for Console at {} to become available timed out (operation timeout: {} s)'
.format(self.session.host, operation_timeout),
operation_timeout)
time.sleep(10)
|
wait_for_available
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, operation_timeout=None):\n if operation_timeout is None:\n operation_timeout = self.session.retry_timeout_config.operation_timeout\n if operation_timeout > 0:\n start_time = time.time()\n while True:\n try:\n self.query_api_version()\n except Error:\n pass\n except Exception:\n raise\n else:\n break\n if operation_timeout > 0:\n current_time = time.time()\n if current_time > start_time + operation_timeout:\n raise OperationTimeout(\n 'Waiting for Console at {} to become available timed out (operation timeout: {} s)'\n .format(self.session.host, operation_timeout),\n operation_timeout)\n time.sleep(10)\n",
"role": "user"
},
{
"content": "wait_for_available",
"role": "assistant"
}
] |
def x(self):
full_properties = self.manager.session.get(self._uri)
self._properties = dict(full_properties)
self._properties_timestamp = int(time.time())
self._full_properties = True
|
pull_full_properties
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n full_properties = self.manager.session.get(self._uri)\n self._properties = dict(full_properties)\n self._properties_timestamp = int(time.time())\n self._full_properties = True\n",
"role": "user"
},
{
"content": "pull_full_properties",
"role": "assistant"
}
] |
def x(self, name):
try:
return self._properties[name]
except KeyError:
if self._full_properties:
raise
self.pull_full_properties()
return self._properties[name]
|
get_property
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name):\n try:\n return self._properties[name]\n except KeyError:\n if self._full_properties:\n raise\n self.pull_full_properties()\n return self._properties[name]\n",
"role": "user"
},
{
"content": "get_property",
"role": "assistant"
}
] |
def x(zhmc, userid=None, password=None):
global USERID, PASSWORD
USERID = userid or USERID or six.input('Enter userid for HMC {}: '.
format(zhmc))
PASSWORD = password or PASSWORD or getpass.getpass(
'Enter password for {}: '.format(USERID))
session = zhmcclient.Session(zhmc, USERID, PASSWORD)
session.logon()
client = zhmcclient.Client(session)
print('Established logged-on session with HMC {} using userid {}'.
format(zhmc, USERID))
return client
|
make_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(zhmc, userid=None, password=None):\n global USERID, PASSWORD\n USERID = userid or USERID or six.input('Enter userid for HMC {}: '.\n format(zhmc))\n PASSWORD = password or PASSWORD or getpass.getpass(\n 'Enter password for {}: '.format(USERID))\n session = zhmcclient.Session(zhmc, USERID, PASSWORD)\n session.logon()\n client = zhmcclient.Client(session)\n print('Established logged-on session with HMC {} using userid {}'.\n format(zhmc, USERID))\n return client\n",
"role": "user"
},
{
"content": "make_client",
"role": "assistant"
}
] |
def x(text, indent):
if text is None:
return 'None'
ret = _indent(text, amount=indent)
return ret.lstrip(' ')
|
repr_text
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(text, indent):\n if text is None:\n return 'None'\n ret = _indent(text, amount=indent)\n return ret.lstrip(' ')\n",
"role": "user"
},
{
"content": "repr_text",
"role": "assistant"
}
] |
def x(_list, indent):
if _list is None:
return 'None'
if isinstance(_list, MutableSequence):
bm = '['
em = ']'
elif isinstance(_list, Iterable):
bm = '('
em = ')'
else:
raise TypeError('Object must be an iterable, but is a %s' % type(_list)
)
ret = bm + '\n'
for value in _list:
ret += _indent('%r,\n' % value, 2)
ret += em
ret = repr_text(ret, indent=indent)
return ret.lstrip(' ')
|
repr_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(_list, indent):\n if _list is None:\n return 'None'\n if isinstance(_list, MutableSequence):\n bm = '['\n em = ']'\n elif isinstance(_list, Iterable):\n bm = '('\n em = ')'\n else:\n raise TypeError('Object must be an iterable, but is a %s' % type(_list)\n )\n ret = bm + '\\n'\n for value in _list:\n ret += _indent('%r,\\n' % value, 2)\n ret += em\n ret = repr_text(ret, indent=indent)\n return ret.lstrip(' ')\n",
"role": "user"
},
{
"content": "repr_list",
"role": "assistant"
}
] |
def x(_dict, indent):
if _dict is None:
return 'None'
if not isinstance(_dict, Mapping):
raise TypeError('Object must be a mapping, but is a %s' % type(_dict))
if isinstance(_dict, OrderedDict):
kind = 'ordered'
ret = '%s {\n' % kind
for key in six.iterkeys(_dict):
value = _dict[key]
ret += _indent('%r: %r,\n' % (key, value), 2)
else:
kind = 'sorted'
ret = '%s {\n' % kind
for key in sorted(six.iterkeys(_dict)):
value = _dict[key]
ret += _indent('%r: %r,\n' % (key, value), 2)
ret += '}'
ret = repr_text(ret, indent=indent)
return ret.lstrip(' ')
|
repr_dict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(_dict, indent):\n if _dict is None:\n return 'None'\n if not isinstance(_dict, Mapping):\n raise TypeError('Object must be a mapping, but is a %s' % type(_dict))\n if isinstance(_dict, OrderedDict):\n kind = 'ordered'\n ret = '%s {\\n' % kind\n for key in six.iterkeys(_dict):\n value = _dict[key]\n ret += _indent('%r: %r,\\n' % (key, value), 2)\n else:\n kind = 'sorted'\n ret = '%s {\\n' % kind\n for key in sorted(six.iterkeys(_dict)):\n value = _dict[key]\n ret += _indent('%r: %r,\\n' % (key, value), 2)\n ret += '}'\n ret = repr_text(ret, indent=indent)\n return ret.lstrip(' ')\n",
"role": "user"
},
{
"content": "repr_dict",
"role": "assistant"
}
] |
def x(timestamp):
if timestamp is None:
return 'None'
dt = datetime_from_timestamp(timestamp)
ret = '%d (%s)' % (timestamp, dt.strftime('%Y-%m-%d %H:%M:%S.%f %Z'))
return ret
|
repr_timestamp
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(timestamp):\n if timestamp is None:\n return 'None'\n dt = datetime_from_timestamp(timestamp)\n ret = '%d (%s)' % (timestamp, dt.strftime('%Y-%m-%d %H:%M:%S.%f %Z'))\n return ret\n",
"role": "user"
},
{
"content": "repr_timestamp",
"role": "assistant"
}
] |
def x(ts):
if ts is None:
raise ValueError('HMC timestamp value must not be None.')
if ts < 0:
raise ValueError(
'Negative HMC timestamp value {} cannot be represented as datetime.'
.format(ts))
epoch_seconds = ts // 1000
delta_microseconds = ts % 1000 * 1000
try:
dt = datetime.fromtimestamp(epoch_seconds, pytz.utc)
except (ValueError, OSError) as exc:
raise ValueError(str(exc))
dt = dt.replace(microsecond=delta_microseconds)
return dt
|
datetime_from_timestamp
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ts):\n if ts is None:\n raise ValueError('HMC timestamp value must not be None.')\n if ts < 0:\n raise ValueError(\n 'Negative HMC timestamp value {} cannot be represented as datetime.'\n .format(ts))\n epoch_seconds = ts // 1000\n delta_microseconds = ts % 1000 * 1000\n try:\n dt = datetime.fromtimestamp(epoch_seconds, pytz.utc)\n except (ValueError, OSError) as exc:\n raise ValueError(str(exc))\n dt = dt.replace(microsecond=delta_microseconds)\n return dt\n",
"role": "user"
},
{
"content": "datetime_from_timestamp",
"role": "assistant"
}
] |
def x(dt):
if dt is None:
raise ValueError('datetime value must not be None.')
if dt.tzinfo is None:
dt = pytz.utc.localize(dt)
epoch_seconds = (dt - _EPOCH_DT).total_seconds()
ts = int(epoch_seconds * 1000)
return ts
|
timestamp_from_datetime
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(dt):\n if dt is None:\n raise ValueError('datetime value must not be None.')\n if dt.tzinfo is None:\n dt = pytz.utc.localize(dt)\n epoch_seconds = (dt - _EPOCH_DT).total_seconds()\n ts = int(epoch_seconds * 1000)\n return ts\n",
"role": "user"
},
{
"content": "timestamp_from_datetime",
"role": "assistant"
}
] |
def x(self, properties):
if properties is None:
properties = {}
result = self.session.post(self._base_uri, body=properties)
props = copy.deepcopy(properties)
props.update(result)
name = props.get(self._name_prop, None)
uri = props[self._uri_prop]
storage_group = StorageGroup(self, uri, name, props)
self._name_uri_cache.update(name, uri)
return storage_group
|
create
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n if properties is None:\n properties = {}\n result = self.session.post(self._base_uri, body=properties)\n props = copy.deepcopy(properties)\n props.update(result)\n name = props.get(self._name_prop, None)\n uri = props[self._uri_prop]\n storage_group = StorageGroup(self, uri, name, props)\n self._name_uri_cache.update(name, uri)\n return storage_group\n",
"role": "user"
},
{
"content": "create",
"role": "assistant"
}
] |
def x(self):
if not self._storage_volumes:
self._storage_volumes = StorageVolumeManager(self)
return self._storage_volumes
|
storage_volumes
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._storage_volumes:\n self._storage_volumes = StorageVolumeManager(self)\n return self._storage_volumes\n",
"role": "user"
},
{
"content": "storage_volumes",
"role": "assistant"
}
] |
def x(self):
if not self._virtual_storage_resources:
self._virtual_storage_resources = VirtualStorageResourceManager(self)
return self._virtual_storage_resources
|
virtual_storage_resources
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._virtual_storage_resources:\n self._virtual_storage_resources = VirtualStorageResourceManager(self)\n return self._virtual_storage_resources\n",
"role": "user"
},
{
"content": "virtual_storage_resources",
"role": "assistant"
}
] |
def x(self):
if not self._cpc:
cpc_uri = self.get_property('cpc-uri')
cpc_mgr = self.manager.console.manager.client.cpcs
self._cpc = cpc_mgr.resource_object(cpc_uri)
return self._cpc
|
cpc
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._cpc:\n cpc_uri = self.get_property('cpc-uri')\n cpc_mgr = self.manager.console.manager.client.cpcs\n self._cpc = cpc_mgr.resource_object(cpc_uri)\n return self._cpc\n",
"role": "user"
},
{
"content": "cpc",
"role": "assistant"
}
] |
def x(self, name=None, status=None):
query_parms = []
if name is not None:
self.manager._append_query_parms(query_parms, 'name', name)
if status is not None:
self.manager._append_query_parms(query_parms, 'status', status)
query_parms_str = '&'.join(query_parms)
if query_parms_str:
query_parms_str = '?{}'.format(query_parms_str)
uri = '{}/operations/get-partitions{}'.format(self.uri, query_parms_str)
sg_cpc = self.cpc
part_mgr = sg_cpc.partitions
result = self.manager.session.get(uri)
props_list = result['partitions']
part_list = []
for props in props_list:
part = part_mgr.resource_object(props['object-uri'], props)
part_list.append(part)
return part_list
|
list_attached_partitions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name=None, status=None):\n query_parms = []\n if name is not None:\n self.manager._append_query_parms(query_parms, 'name', name)\n if status is not None:\n self.manager._append_query_parms(query_parms, 'status', status)\n query_parms_str = '&'.join(query_parms)\n if query_parms_str:\n query_parms_str = '?{}'.format(query_parms_str)\n uri = '{}/operations/get-partitions{}'.format(self.uri, query_parms_str)\n sg_cpc = self.cpc\n part_mgr = sg_cpc.partitions\n result = self.manager.session.get(uri)\n props_list = result['partitions']\n part_list = []\n for props in props_list:\n part = part_mgr.resource_object(props['object-uri'], props)\n part_list.append(part)\n return part_list\n",
"role": "user"
},
{
"content": "list_attached_partitions",
"role": "assistant"
}
] |
def x(self, ports):
body = {'adapter-port-uris': [p.uri for p in ports]}
self.manager.session.post(self.uri +
'/operations/add-candidate-adapter-ports', body=body)
|
add_candidate_adapter_ports
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ports):\n body = {'adapter-port-uris': [p.uri for p in ports]}\n self.manager.session.post(self.uri +\n '/operations/add-candidate-adapter-ports', body=body)\n",
"role": "user"
},
{
"content": "add_candidate_adapter_ports",
"role": "assistant"
}
] |
def x(self, full_properties=False):
sg_cpc = self.cpc
adapter_mgr = sg_cpc.adapters
port_list = []
port_uris = self.get_property('candidate-adapter-port-uris')
if port_uris:
for port_uri in port_uris:
m = re.match('^(/api/adapters/[^/]*)/.*', port_uri)
adapter_uri = m.group(1)
adapter = adapter_mgr.resource_object(adapter_uri)
port_mgr = adapter.ports
port = port_mgr.resource_object(port_uri)
port_list.append(port)
if full_properties:
port.pull_full_properties()
return port_list
|
list_candidate_adapter_ports
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, full_properties=False):\n sg_cpc = self.cpc\n adapter_mgr = sg_cpc.adapters\n port_list = []\n port_uris = self.get_property('candidate-adapter-port-uris')\n if port_uris:\n for port_uri in port_uris:\n m = re.match('^(/api/adapters/[^/]*)/.*', port_uri)\n adapter_uri = m.group(1)\n adapter = adapter_mgr.resource_object(adapter_uri)\n port_mgr = adapter.ports\n port = port_mgr.resource_object(port_uri)\n port_list.append(port)\n if full_properties:\n port.pull_full_properties()\n return port_list\n",
"role": "user"
},
{
"content": "list_candidate_adapter_ports",
"role": "assistant"
}
] |
def x(self, properties):
result = self.session.post(self.cpc.uri + '/adapters', body=properties)
props = copy.deepcopy(properties)
props.update(result)
name = props.get(self._name_prop, None)
uri = props[self._uri_prop]
adapter = Adapter(self, uri, name, props)
self._name_uri_cache.update(name, uri)
return adapter
|
create_hipersocket
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n result = self.session.post(self.cpc.uri + '/adapters', body=properties)\n props = copy.deepcopy(properties)\n props.update(result)\n name = props.get(self._name_prop, None)\n uri = props[self._uri_prop]\n adapter = Adapter(self, uri, name, props)\n self._name_uri_cache.update(name, uri)\n return adapter\n",
"role": "user"
},
{
"content": "create_hipersocket",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.