query stringlengths 9 9.05k | document stringlengths 10 222k | metadata dict | negatives listlengths 30 30 | negative_scores listlengths 30 30 | document_score stringlengths 4 10 | document_rank stringclasses 2
values |
|---|---|---|---|---|---|---|
Gets a localized version of the given message in the given locale. | def get_localized_message(message, user_locale):
if isinstance(message, Message):
if user_locale:
message.locale = user_locale
return unicode(message)
else:
return message | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def localize(self, msg):\n return self.translations.get(msg, msg)",
"def localize(self, msg):\n return self.translations.get(msg, msg)",
"def gettext(self, message):\n if self._translations.has_key(message):\n return self._translations[message]\n return super(Translations... | [
"0.72277725",
"0.72277725",
"0.68362045",
"0.6571026",
"0.65624756",
"0.6291454",
"0.600911",
"0.59312975",
"0.58701146",
"0.5862935",
"0.5831497",
"0.5822653",
"0.57833225",
"0.5775425",
"0.5719538",
"0.5688827",
"0.56843036",
"0.5634452",
"0.55606395",
"0.55445343",
"0.5509... | 0.74269634 | 0 |
Try to import a module and if it fails return default. | def try_import(import_str, default=None):
try:
return import_module(import_str)
except ImportError:
return default | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def try_import(module, default=None):\n try:\n return importlib.import_module(module)\n except ImportError:\n return default",
"def try_import(name, alternative=None, error_callback=None):\n module_segments = name.split('.')\n last_error = None\n remainder = []\n\n # module_name w... | [
"0.8899236",
"0.6928173",
"0.67791915",
"0.6685252",
"0.65540737",
"0.6259206",
"0.62418336",
"0.6109401",
"0.6079965",
"0.60544294",
"0.6047738",
"0.59817463",
"0.59444374",
"0.5879833",
"0.5879833",
"0.5879833",
"0.5872882",
"0.586335",
"0.586335",
"0.5806929",
"0.5771291",... | 0.8513052 | 1 |
Convert a complex object into primitives. Handy for JSON serialization. We can optionally handle instances, but since this is a recursive function, we could have cyclical data structures. To handle cyclical data structures we could track the actual objects visited in a set, but not all objects are hashable. Instead we ... | def to_primitive(value, convert_instances=False, convert_datetime=True,
level=0, max_depth=3):
# handle obvious types first - order of basic types determined by running
# full tests on nova project, resulting in the following counts:
# 572754 <type 'NoneType'>
# 460353 <type 'int'>... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def toComplex(simpleObject):\n if simpleObject[0] == ENCODING_SIMPLE_PYTHON:\n return simpleObject[1]\n\n if simpleObject[0] == ENCODING_INT:\n return int(simpleObject[1])\n\n if simpleObject[0] == ENCODING_UNICODE:\n return unicode(simpleObject[1], 'utf-8')\n\n if simpleObject[0] ... | [
"0.61621344",
"0.6119563",
"0.6090617",
"0.6067958",
"0.5865956",
"0.5863861",
"0.58078617",
"0.5807257",
"0.57476157",
"0.5735223",
"0.57309777",
"0.56405354",
"0.55863905",
"0.5514896",
"0.5479702",
"0.5463501",
"0.5460837",
"0.5456098",
"0.54283094",
"0.5421082",
"0.540230... | 0.6711862 | 0 |
Decodes incoming str using `incoming` if they're not already unicode. | def safe_decode(text, incoming=None, errors='strict'):
if not isinstance(text, six.string_types):
raise TypeError("%s can't be decoded" % type(text))
if isinstance(text, six.text_type):
return text
if not incoming:
incoming = (sys.stdin.encoding or
sys.... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def _string_convert(str):\n if isinstance(str, unicode):\n return str\n try:\n return str.decode(locale.getpreferredencoding(), 'strict')\n except UnicodeError:\n try:\n return str.decode(locale.getpreferredencoding(), 'replace')\n except UnicodeError:\n #... | [
"0.613527",
"0.6129397",
"0.61197454",
"0.61197454",
"0.6108033",
"0.60947007",
"0.60742056",
"0.60450315",
"0.6007464",
"0.597139",
"0.59522295",
"0.5939489",
"0.59168476",
"0.5898159",
"0.57659566",
"0.57568854",
"0.56696635",
"0.5659861",
"0.5652017",
"0.5652017",
"0.56422... | 0.71777135 | 0 |
Encodes incoming str/unicode using `encoding`. If incoming is not specified, text is expected to be encoded with current python's default encoding. (`sys.getdefaultencoding`) | def safe_encode(text, incoming=None,
encoding='utf-8', errors='strict'):
if not isinstance(text, six.string_types):
raise TypeError(_("%s can't be encoded") % type(text).capitalize())
if not incoming:
incoming = (sys.stdin.encoding or
sys.getdefaultenc... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def enc(text):\n if isinstance(text, str):\n return unicode(text, 'utf-8') # TODO: fix in Python 3\n elif isinstance(text, unicode):\n return text.encode('utf-8')\n else:\n raise Exception(\"Unsupported encode format.\")",
"def encode_if_unicode(string, encoding):\n if isinstanc... | [
"0.7696079",
"0.7556785",
"0.7396893",
"0.7089631",
"0.70645183",
"0.70079195",
"0.69426465",
"0.68694645",
"0.68234116",
"0.68040186",
"0.67836493",
"0.6722486",
"0.6677304",
"0.6631807",
"0.6631149",
"0.6617003",
"0.6581027",
"0.65599966",
"0.65303785",
"0.6508046",
"0.6487... | 0.810129 | 0 |
Return True if before is older than seconds. | def is_older_than(before, seconds):
if isinstance(before, six.string_types):
before = parse_strtime(before).replace(tzinfo=None)
return utcnow() - before > datetime.timedelta(seconds=seconds) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def is_newer_than(after, seconds):\r\n if isinstance(after, six.string_types):\r\n after = parse_strtime(after).replace(tzinfo=None)\r\n return after - utcnow() > datetime.timedelta(seconds=seconds)",
"def __gt__(self, other):\n return self.to_seconds() > other.to_seconds()",
"def __gt__(se... | [
"0.75806665",
"0.7128901",
"0.7128901",
"0.675787",
"0.67280203",
"0.6649693",
"0.6644542",
"0.659305",
"0.6543136",
"0.65426856",
"0.6500086",
"0.6485307",
"0.6467596",
"0.64455134",
"0.6390179",
"0.6377441",
"0.63316554",
"0.6306585",
"0.62739086",
"0.62679946",
"0.62333506... | 0.8338943 | 0 |
Return True if after is newer than seconds. | def is_newer_than(after, seconds):
if isinstance(after, six.string_types):
after = parse_strtime(after).replace(tzinfo=None)
return after - utcnow() > datetime.timedelta(seconds=seconds) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def after(self, time2):\r\n return self.to_seconds() > time2.to_seconds()",
"def after(self, time2):\n return self.to_seconds() > time2.to_seconds()",
"def is_older_than(before, seconds):\r\n if isinstance(before, six.string_types):\r\n before = parse_strtime(before).replace(tzinfo=None... | [
"0.75669533",
"0.742963",
"0.71677315",
"0.6837955",
"0.6765337",
"0.67651576",
"0.6717801",
"0.66049165",
"0.66049165",
"0.6487326",
"0.6445979",
"0.6404347",
"0.6373316",
"0.63638264",
"0.63342094",
"0.62849617",
"0.62745655",
"0.62698144",
"0.6252573",
"0.62229604",
"0.619... | 0.8153654 | 0 |
Timestamp version of our utcnow function. | def utcnow_ts():
return calendar.timegm(utcnow().timetuple()) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def tstamp_now(self):\n return self.tstamp(datetime.datetime.now(tz))",
"def get_utc_now_timestamp() -> int:\n return int(datetime.datetime.now(datetime.timezone.utc).timestamp() * 1000)",
"def utcnow():\n utctime = datetime.datetime.utcnow()\n utcstamp = utctime.strftime(\"%Y-%m-%d %H:%M:%S\")... | [
"0.7703725",
"0.76807797",
"0.7659119",
"0.7656595",
"0.76366156",
"0.7590121",
"0.7575319",
"0.75474936",
"0.74716765",
"0.7452968",
"0.7421942",
"0.7407102",
"0.7405051",
"0.7390046",
"0.7380471",
"0.7355461",
"0.7339692",
"0.73166203",
"0.7290635",
"0.72782147",
"0.7266158... | 0.8233759 | 0 |
Returns a iso8601 formated date from timestamp. | def iso8601_from_timestamp(timestamp):
return isotime(datetime.datetime.utcfromtimestamp(timestamp)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def iso8601_date(ts=None):\n ts = _get_gmtime_compatible_timestamp(ts)\n return _time.strftime('%Y-%m-%dT%H:%M:%SZ', _time.gmtime(ts))",
"def dateformat(timestamp):\n date = datetime.datetime.fromtimestamp(int(timestamp))\n return date.isoformat()",
"def timestamp_to_iso_format(timestamp):\n ... | [
"0.8012124",
"0.7738112",
"0.7716933",
"0.72823215",
"0.68830425",
"0.674141",
"0.66666543",
"0.6664841",
"0.66526645",
"0.6644603",
"0.66098595",
"0.6549779",
"0.65161186",
"0.6515649",
"0.64987385",
"0.64808416",
"0.6479994",
"0.64681756",
"0.6428433",
"0.64221674",
"0.6414... | 0.8048834 | 0 |
Advance overridden time using a datetime.timedelta. | def advance_time_delta(timedelta):
assert(not utcnow.override_time is None)
try:
for dt in utcnow.override_time:
dt += timedelta
except TypeError:
utcnow.override_time += timedelta | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def adjust_datetime(self, context, cls):\n if len(self) == 1:\n item = self.get_argument(context, cls=cls)\n if item is None:\n return\n timezone = getattr(context, 'timezone', None)\n else:\n item = self.get_argument(context=None, cls=cls) ... | [
"0.68380433",
"0.66254115",
"0.64659977",
"0.63646716",
"0.6361225",
"0.63581043",
"0.6301279",
"0.6256574",
"0.6211869",
"0.6164993",
"0.615476",
"0.6144598",
"0.6141021",
"0.6075093",
"0.6029325",
"0.5978698",
"0.59730417",
"0.59617496",
"0.59489065",
"0.5928276",
"0.590779... | 0.8217488 | 0 |
Advance overridden time by seconds. | def advance_time_seconds(seconds):
advance_time_delta(datetime.timedelta(0, seconds)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def set_time(self, sec):\n self.set_timed(round(sec * 10.0))",
"def update_time(self, *args):\n s = int(time.time() - self.start_time)\n self.time_label.text = str(datetime.timedelta(seconds=s))",
"def advance_time_delta(timedelta):\r\n assert(not utcnow.override_time is None)\r\n tr... | [
"0.7244213",
"0.6911929",
"0.6668365",
"0.6656742",
"0.66215026",
"0.66198456",
"0.6547235",
"0.6491218",
"0.6487095",
"0.6449376",
"0.640367",
"0.6362363",
"0.6350183",
"0.63232386",
"0.62989",
"0.62844735",
"0.6274718",
"0.62565625",
"0.6244701",
"0.623354",
"0.6226567",
... | 0.7406532 | 0 |
Remove the overridden time. | def clear_time_override():
utcnow.override_time = None | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def set_time_override(override_time=datetime.datetime.utcnow()):\r\n utcnow.override_time = override_time",
"def _rescheduleFromRun(self, newTime):\n if newTime is None:\n self.deleteFromStore()\n else:\n self.time = newTime",
"def removeKey(self, timeOrHash) -> None:\n ... | [
"0.70454806",
"0.6537983",
"0.6353897",
"0.63447785",
"0.63309777",
"0.6303946",
"0.61608213",
"0.61576796",
"0.61400414",
"0.6060353",
"0.6060353",
"0.60440415",
"0.60427505",
"0.602997",
"0.6022398",
"0.5985644",
"0.5920992",
"0.58894193",
"0.5835796",
"0.58177793",
"0.5816... | 0.8552338 | 0 |
Unmarshall a datetime dict. | def unmarshall_time(tyme):
return datetime.datetime(day=tyme['day'],
month=tyme['month'],
year=tyme['year'],
hour=tyme['hour'],
minute=tyme['minute'],
second=tyme['s... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def object_deserializer(obj):\n for key, val in obj.items():\n if isinstance(val, six.string_types) and DATETIME_REGEX.search(val):\n try:\n obj[key] = dates.localize_datetime(parser.parse(val))\n except ValueError:\n obj[key] = val\n return obj",
... | [
"0.6475352",
"0.6210666",
"0.5951044",
"0.5946126",
"0.5938974",
"0.5869619",
"0.57887393",
"0.57838917",
"0.5710373",
"0.5709906",
"0.5632626",
"0.56293726",
"0.5613223",
"0.5601391",
"0.55799556",
"0.55782783",
"0.55162144",
"0.5470559",
"0.5452197",
"0.54498893",
"0.544297... | 0.62471277 | 1 |
Determines if time is going to happen in the next window seconds. | def is_soon(dt, window):
soon = (utcnow() + datetime.timedelta(seconds=window))
return normalize_time(dt) <= soon | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def is_soon(dt, window):\n soon = (utcnow() + datetime.timedelta(seconds=window))\n return normalize_time(dt) <= soon",
"def is_time(self) -> bool:\n return self.times > 1",
"def check_timer(self, wanted_time):\n if time.time() - self.start_time >= wanted_time:\n return True\n ... | [
"0.6890571",
"0.6811425",
"0.67717886",
"0.66800755",
"0.66078025",
"0.65755785",
"0.6574206",
"0.6526356",
"0.6483012",
"0.6468185",
"0.6400846",
"0.6365922",
"0.6289681",
"0.62060785",
"0.620339",
"0.61888176",
"0.61633587",
"0.61152923",
"0.60497886",
"0.60265994",
"0.5999... | 0.6944673 | 0 |
Prints all of the commands and options for bashcompletion. | def _bash_completion(self):
commands = set()
options = set()
for option, _action in self.parser._option_string_actions.items():
options.add(option)
for command_name, command in self.command_manager:
commands.add(command_name)
cmd_factory = comma... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def _bash_completion(self):\n commands = set()\n options = set()\n for option, _action in self.parser._option_string_actions.items():\n options.add(option)\n for _name, _command in self.command_manager:\n commands.add(_name)\n cmd_factory = _command.load... | [
"0.79802346",
"0.7545891",
"0.7025744",
"0.6869114",
"0.6737863",
"0.6437739",
"0.6415718",
"0.632363",
"0.6310732",
"0.6304526",
"0.62999326",
"0.62967926",
"0.62749267",
"0.62413514",
"0.6151045",
"0.6119202",
"0.60870105",
"0.6063573",
"0.6057972",
"0.60484487",
"0.6011146... | 0.7938483 | 1 |
firewallcreate with mandatory (none) params. | def test_create_firewall_with_mandatory_params(self):
resource = 'firewall'
cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)
name = ''
tenant_id = 'my-tenant'
my_id = 'my-id'
policy_id = 'my-policy-id'
args = ['--tenant-id', tenant_id, poli... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_firewall_with_all_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = 'my-name'\r\n description = 'my-desc'\r\n policy_id = 'my-policy-id'\r\n tenant_id = 'my-tenant'\r\n my_id = 'm... | [
"0.75042325",
"0.72588027",
"0.7086794",
"0.68198645",
"0.6449614",
"0.6378677",
"0.6321848",
"0.6231331",
"0.5972507",
"0.587128",
"0.5781027",
"0.5777939",
"0.5708138",
"0.5690244",
"0.5599123",
"0.5531077",
"0.53636706",
"0.5336756",
"0.52938557",
"0.5269666",
"0.5262774",... | 0.81828576 | 0 |
firewallcreate with all params set. | def test_create_firewall_with_all_params(self):
resource = 'firewall'
cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)
name = 'my-name'
description = 'my-desc'
policy_id = 'my-policy-id'
tenant_id = 'my-tenant'
my_id = 'my-id'
args... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_firewall_with_mandatory_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = ''\r\n tenant_id = 'my-tenant'\r\n my_id = 'my-id'\r\n policy_id = 'my-policy-id'\r\n args = ['--tenant-i... | [
"0.7283879",
"0.7081907",
"0.675774",
"0.6435687",
"0.63719034",
"0.6191783",
"0.58883786",
"0.56545216",
"0.5621425",
"0.56054366",
"0.5558848",
"0.5558848",
"0.55515474",
"0.55184793",
"0.5462888",
"0.5456363",
"0.5414127",
"0.5410806",
"0.53997785",
"0.53982896",
"0.538742... | 0.73971164 | 0 |
firewallpolicycreate with mandatory (none) params only. | def test_create_firewall_policy_with_mandatory_params(self):
resource = 'firewall_policy'
cmd = firewallpolicy.CreateFirewallPolicy(test_cli20.MyApp(sys.stdout),
None)
tenant_id = 'my-tenant'
name = 'my-name'
my_id = 'myid'
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_firewall_with_mandatory_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = ''\r\n tenant_id = 'my-tenant'\r\n my_id = 'my-id'\r\n policy_id = 'my-policy-id'\r\n args = ['--tenant-i... | [
"0.74847823",
"0.7104371",
"0.7095416",
"0.64407015",
"0.6407723",
"0.6371449",
"0.6298104",
"0.6097693",
"0.60709304",
"0.6019739",
"0.6015871",
"0.59274614",
"0.588896",
"0.58118904",
"0.5725704",
"0.566305",
"0.56621164",
"0.5642048",
"0.563379",
"0.5562329",
"0.5535799",
... | 0.80134904 | 0 |
firewallpolicycreate with all params set. | def test_create_firewall_policy_with_all_params(self):
resource = 'firewall_policy'
cmd = firewallpolicy.CreateFirewallPolicy(test_cli20.MyApp(sys.stdout),
None)
name = 'my-name'
description = 'my-desc'
firewall_rules_arg = ... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_firewall_policy(self, body=None):\r\n return self.post(self.firewall_policies_path, body=body)",
"def test_create_firewall_policy_with_mandatory_params(self):\r\n resource = 'firewall_policy'\r\n cmd = firewallpolicy.CreateFirewallPolicy(test_cli20.MyApp(sys.stdout),\r\n ... | [
"0.7227376",
"0.7046867",
"0.6664562",
"0.66510797",
"0.65198874",
"0.6386277",
"0.63337016",
"0.60985684",
"0.6056319",
"0.6051337",
"0.6025777",
"0.5809092",
"0.5799633",
"0.5783354",
"0.56897515",
"0.56619143",
"0.5655164",
"0.56401306",
"0.5620469",
"0.5619255",
"0.561086... | 0.7224969 | 1 |
firewallpolicyupdate myid name newname. | def test_update_firewall_policy(self):
resource = 'firewall_policy'
cmd = firewallpolicy.UpdateFirewallPolicy(test_cli20.MyApp(sys.stdout),
None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def update_policy(self, *args, **kwargs):\r\n pass",
"def test_update_firewall_rule(self):\r\n resource = 'firewall_rule'\r\n cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout),\r\n None)\r\n self._test_update_resource(resou... | [
"0.65458906",
"0.6541915",
"0.6493247",
"0.6469396",
"0.6254555",
"0.62210476",
"0.60345596",
"0.59741807",
"0.5972608",
"0.58833975",
"0.5773749",
"0.5773749",
"0.5710767",
"0.56927264",
"0.5661171",
"0.5610219",
"0.5580246",
"0.5530781",
"0.5486284",
"0.547433",
"0.54298913... | 0.77794296 | 0 |
firewallpolicyinsertrule myid newruleid insertbefore ruleAid insertafter ruleBid | def test_insert_firewall_rule(self):
resource = 'firewall_policy'
cmd = firewallpolicy.FirewallPolicyInsertRule(
test_cli20.MyApp(sys.stdout),
None)
myid = 'myid'
args = ['myid', 'newrule',
'--insert-before', 'rule2',
'--ins... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def insert(self, rule, ident):\n raise NotImplementedError",
"def firewall_policy_insert_rule(self, firewall_policy, body=None):\r\n return self.put(self.firewall_policy_insert_path % (firewall_policy),\r\n body=body)",
"def insert(self, rule, ident=None):\n if ident... | [
"0.6126452",
"0.600289",
"0.59871745",
"0.59802485",
"0.5979399",
"0.5914543",
"0.58061755",
"0.5769279",
"0.57522404",
"0.5746675",
"0.5740453",
"0.5724012",
"0.56661963",
"0.56576926",
"0.55689234",
"0.5551167",
"0.5522083",
"0.54825217",
"0.54779536",
"0.541634",
"0.540053... | 0.65104985 | 0 |
firewallrulecreate with mandatory (none) params only. | def _test_create_firewall_rule_with_mandatory_params(self, enabled):
resource = 'firewall_rule'
cmd = firewallrule.CreateFirewallRule(test_cli20.MyApp(sys.stdout),
None)
tenant_id = 'my-tenant'
name = ''
my_id = 'myid'
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_firewall_with_mandatory_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = ''\r\n tenant_id = 'my-tenant'\r\n my_id = 'my-id'\r\n policy_id = 'my-policy-id'\r\n args = ['--tenant-i... | [
"0.73374516",
"0.68870384",
"0.67805904",
"0.67397535",
"0.65541065",
"0.64010406",
"0.62665415",
"0.62609255",
"0.6253124",
"0.6087303",
"0.6067969",
"0.5791942",
"0.5755012",
"0.5722783",
"0.566182",
"0.56485677",
"0.5640545",
"0.5612639",
"0.55924505",
"0.5589652",
"0.5579... | 0.71403986 | 1 |
firewallrulecreate with all params set. | def _setup_create_firewall_rule_with_all_params(self, protocol='tcp'):
resource = 'firewall_rule'
cmd = firewallrule.CreateFirewallRule(test_cli20.MyApp(sys.stdout),
None)
name = 'my-name'
description = 'my-desc'
source_ip = '19... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_firewall_rule(self, body=None):\r\n return self.post(self.firewall_rules_path, body=body)",
"def create_firewall_rule(self, ipaddressid, protocol, cidrlist, ftype, \n startport=None, endport=None,\n icmpcode=None, icmptype=None... | [
"0.7099152",
"0.66194886",
"0.6589396",
"0.6569594",
"0.65399396",
"0.63816446",
"0.63702446",
"0.6355696",
"0.6311436",
"0.615654",
"0.6075271",
"0.601864",
"0.6016736",
"0.59636486",
"0.59064037",
"0.5876677",
"0.5858481",
"0.58059895",
"0.5805957",
"0.5805957",
"0.57828534... | 0.7010607 | 1 |
firewallrulelist sortkey name sortkey id sortkey asc sortkey desc | def test_list_firewall_rules_sort(self):
resources = "firewall_rules"
cmd = firewallrule.ListFirewallRule(test_cli20.MyApp(sys.stdout),
None)
self._test_list_resources(resources, cmd,
sort_key=["name", "id"],
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def sortby(self):\n ...",
"def sort_key(self):\n ...",
"def keysort(predicate_name, predicates_rules):\n if predicate_name in predicates_rules:\n if \"priority\" in predicates_rules[predicate_name]:\n return predicates_rules[predicate_name][\"priority\"]\n else:\n ... | [
"0.59777766",
"0.5830575",
"0.5722159",
"0.5674791",
"0.5620771",
"0.5555538",
"0.5521349",
"0.5521349",
"0.5518125",
"0.5486883",
"0.544251",
"0.54321384",
"0.5402341",
"0.5395841",
"0.5370548",
"0.53655934",
"0.5359779",
"0.5359703",
"0.52972716",
"0.5283765",
"0.5271728",
... | 0.7548015 | 0 |
firewallruleupdate myid name newname. | def test_update_firewall_rule(self):
resource = 'firewall_rule'
cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout),
None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--name', 'ne... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_update_firewall(self):\r\n resource = 'firewall'\r\n cmd = firewall.UpdateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid', '--name', 'newname'],\r\n {'nam... | [
"0.6726898",
"0.6545427",
"0.59362066",
"0.585473",
"0.5634301",
"0.562206",
"0.5549964",
"0.5497431",
"0.54829466",
"0.5472702",
"0.54453135",
"0.54428446",
"0.54215",
"0.54095495",
"0.53876907",
"0.53836715",
"0.53456855",
"0.529848",
"0.5265227",
"0.5205022",
"0.5204525",
... | 0.7590829 | 0 |
firewallruleupdate myid protocol any. | def test_update_firewall_rule_protocol(self):
resource = 'firewall_rule'
cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout),
None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--p... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_update_firewall_rule(self):\r\n resource = 'firewall_rule'\r\n cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout),\r\n None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid'... | [
"0.7380702",
"0.6379193",
"0.625408",
"0.61188865",
"0.6046731",
"0.59001243",
"0.5834598",
"0.5744176",
"0.5652843",
"0.5650109",
"0.5648755",
"0.56397355",
"0.5628272",
"0.5603399",
"0.5588911",
"0.5585106",
"0.5569495",
"0.5545001",
"0.55222887",
"0.5468459",
"0.5412534",
... | 0.7347367 | 1 |
lbhealthmonitorcreate with mandatory params only. | def test_create_healthmonitor_with_mandatory_params(self):
resource = 'health_monitor'
cmd = healthmonitor.CreateHealthMonitor(test_cli20.MyApp(sys.stdout),
None)
admin_state_up = False
delay = '60'
max_retries = '2'
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_health_monitor(request, **kwargs):\n data = request.DATA\n\n conn = get_sdk_connection(request)\n health_mon = conn.load_balancer.create_health_monitor(\n type=data['monitor']['type'],\n delay=data['monitor']['delay'],\n timeout=data['monitor']['timeout'],\n max_retr... | [
"0.7387556",
"0.72221184",
"0.71751076",
"0.70800364",
"0.6876045",
"0.68227184",
"0.6370052",
"0.6214035",
"0.61889005",
"0.60908353",
"0.6054197",
"0.60230976",
"0.57612705",
"0.5450705",
"0.5418795",
"0.54175",
"0.5385182",
"0.53791326",
"0.5378128",
"0.5341816",
"0.528777... | 0.7544033 | 0 |
lbhealthmonitorlist sortkey name sortkey id sortkey asc sortkey desc | def test_list_healthmonitors_sort(self):
resources = "health_monitors"
cmd = healthmonitor.ListHealthMonitor(test_cli20.MyApp(sys.stdout),
None)
self._test_list_resources(resources, cmd,
sort_key=["name", "id"],... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def sortby(self):\n ...",
"def sort_key(self):\n ...",
"def sort(self, key: str):\n return self._select_interface(self._rc_sort, self._http_sort, key)",
"def SortList(self, key: callable = str.lower):\n temp_list = self.Items\n temp_list.sort(key=key)\n # delete cont... | [
"0.59466326",
"0.5860596",
"0.5763932",
"0.57237047",
"0.5625188",
"0.55186325",
"0.55053836",
"0.5447963",
"0.54419667",
"0.5387238",
"0.5366027",
"0.5333365",
"0.530422",
"0.52928144",
"0.52583086",
"0.52547413",
"0.52156097",
"0.5210766",
"0.52074707",
"0.5192528",
"0.5187... | 0.7249101 | 0 |
lbmemberlist sortkey name sortkey id sortkey asc sortkey desc | def test_list_members_sort(self):
resources = "members"
cmd = member.ListMember(test_cli20.MyApp(sys.stdout), None)
self._test_list_resources(resources, cmd,
sort_key=["name", "id"],
sort_dir=["asc", "desc"]) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def sortby(self):\n ...",
"def sort_key(self):\n ...",
"def sort_members_in_alphabetical_order(interface):\n sorted_interface = OrderedDict()\n for member_type in EXTATTRIBUTES_AND_MEMBER_TYPES:\n member_names = []\n sorted_member_names = OrderedDict()\n sorted_members ... | [
"0.6502986",
"0.62657225",
"0.6116419",
"0.61036575",
"0.6045896",
"0.6022776",
"0.5908604",
"0.58976036",
"0.58546114",
"0.58435214",
"0.58352995",
"0.5829511",
"0.5806374",
"0.57467383",
"0.5745424",
"0.57278883",
"0.5667303",
"0.55992967",
"0.5594694",
"0.5586259",
"0.5557... | 0.6443432 | 1 |
lbmemberupdate myid name myname tags a b. | def test_update_member(self):
resource = 'member'
cmd = member.UpdateMember(test_cli20.MyApp(sys.stdout), None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--name', 'myname',
'--tags', 'a', 'b'],
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def updateTag(self, authenticationToken, tag):\r\n pass",
"def update_tag(tag):\n remove_tag(tag)\n add_tag(tag)",
"def update_existing_entry(client, list_id, mail_addr, merge_fields, l_tags):\n # hash mail address \n mail_h = hash_string(mail_addr)\n # send entry\n try:\n re... | [
"0.5852788",
"0.5708155",
"0.55530024",
"0.5362324",
"0.525218",
"0.52321696",
"0.52134573",
"0.5193489",
"0.5172181",
"0.5155497",
"0.51532125",
"0.5148244",
"0.5132139",
"0.5130163",
"0.51139617",
"0.50862575",
"0.50836533",
"0.50336367",
"0.5018076",
"0.5008931",
"0.499413... | 0.5966063 | 0 |
lbpoolcreate with mandatory params only. | def test_create_pool_with_mandatory_params(self):
resource = 'pool'
cmd = pool.CreatePool(test_cli20.MyApp(sys.stdout), None)
name = 'my-name'
lb_method = 'ROUND_ROBIN'
protocol = 'HTTP'
subnet_id = 'subnet-id'
tenant_id = 'my-tenant'
my_id = 'my-i... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_pool(request, **kwargs):\n data = request.DATA\n\n conn = get_sdk_connection(request)\n pool = conn.load_balancer.create_pool(\n protocol=data['pool']['protocol'],\n lb_algorithm=data['pool']['lb_algorithm'],\n session_persistence=data['pool'].get('session_persistence'),\n ... | [
"0.7355699",
"0.72982085",
"0.707516",
"0.695379",
"0.6923354",
"0.68413204",
"0.67543787",
"0.66024584",
"0.6463393",
"0.6327132",
"0.6311021",
"0.6294826",
"0.6267304",
"0.625105",
"0.61175036",
"0.60841894",
"0.60591257",
"0.59672767",
"0.5951157",
"0.593507",
"0.5874282",... | 0.7772898 | 0 |
lbpoollist sortkey name sortkey id sortkey asc sortkey desc | def test_list_pools_sort(self):
resources = "pools"
cmd = pool.ListPool(test_cli20.MyApp(sys.stdout), None)
self._test_list_resources(resources, cmd,
sort_key=["name", "id"],
sort_dir=["asc", "desc"]) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def sortby(self):\n ...",
"def sort_key(self):\n ...",
"def SortList(self, key: callable = str.lower):\n temp_list = self.Items\n temp_list.sort(key=key)\n # delete contents of present listbox\n self.delete(0, Tags.End.value)\n # load listbox with sorted data\n ... | [
"0.627822",
"0.62093514",
"0.59084535",
"0.580129",
"0.5753239",
"0.57481724",
"0.57344675",
"0.570559",
"0.5693311",
"0.56343687",
"0.562264",
"0.5578885",
"0.5554106",
"0.5535836",
"0.5518113",
"0.5512986",
"0.55051523",
"0.5442103",
"0.54178345",
"0.54178345",
"0.5412351",... | 0.6728168 | 0 |
lbpoolupdate myid name newname tags a b. | def test_update_pool(self):
resource = 'pool'
cmd = pool.UpdatePool(test_cli20.MyApp(sys.stdout), None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--name', 'newname'],
{'name': 'newname', }) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def update_listener_pool(self, service, name, bigips):\n vip = self.service_adapter.get_virtual_name(service)\n if vip:\n vip[\"pool\"] = name\n for bigip in bigips:\n v = bigip.tm.ltm.virtuals.virtual\n if v.exists(name=vip[\"name\"], partition=vip... | [
"0.6342126",
"0.5952895",
"0.58864206",
"0.57931834",
"0.57232237",
"0.5718351",
"0.55714387",
"0.555825",
"0.55182296",
"0.5479502",
"0.5441453",
"0.54374236",
"0.5436243",
"0.54339063",
"0.5398005",
"0.5364105",
"0.53386134",
"0.52923423",
"0.5282463",
"0.52583003",
"0.5249... | 0.60449564 | 1 |
lbvipcreate with all mandatory params. | def test_create_vip_with_mandatory_params(self):
resource = 'vip'
cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None)
pool_id = 'my-pool-id'
name = 'my-name'
subnet_id = 'subnet-id'
protocol_port = '1000'
protocol = 'TCP'
tenant_id = 'my-tenant... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_vip_with_mandatory_params(self):\n resource = 'vip'\n cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None)\n pool_id = 'my-pool-id'\n name = 'my-name'\n subnet_id = 'subnet-id'\n protocol_port = '1000'\n protocol = 'TCP'\n tenant_id = 'my-t... | [
"0.74199384",
"0.7266978",
"0.71127284",
"0.70969236",
"0.7037579",
"0.62459636",
"0.62245834",
"0.6105984",
"0.5917377",
"0.5911766",
"0.5885074",
"0.5866027",
"0.5851251",
"0.58358413",
"0.58268726",
"0.57852036",
"0.578137",
"0.5770711",
"0.5756736",
"0.56653243",
"0.56644... | 0.7440872 | 0 |
lbvipcreate with mandatory and sessionpersistence params. | def test_create_vip_with_session_persistence_params(self):
resource = 'vip'
cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None)
pool_id = 'my-pool-id'
name = 'my-name'
subnet_id = 'subnet-id'
protocol_port = '1000'
protocol = 'TCP'
tenant_id = ... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_vip_with_session_persistence_params(self):\n resource = 'vip'\n cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None)\n pool_id = 'my-pool-id'\n name = 'my-name'\n subnet_id = 'subnet-id'\n protocol_port = '1000'\n protocol = 'TCP'\n tenant_... | [
"0.6996373",
"0.6569359",
"0.6513687",
"0.63645",
"0.62813395",
"0.625031",
"0.5985319",
"0.5824457",
"0.57667637",
"0.57467985",
"0.5722702",
"0.56227684",
"0.55838597",
"0.5567695",
"0.5509529",
"0.55002016",
"0.5488648",
"0.54571265",
"0.54154706",
"0.5401678",
"0.5397481"... | 0.6998259 | 0 |
lbvipupdate myid name myname tags a b. | def test_update_vip(self):
resource = 'vip'
cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--name', 'myname',
'--tags', 'a', 'b'],
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_update_vip(self):\n resource = 'vip'\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\n self._test_update_resource(resource, cmd, 'myid',\n ['myid', '--name', 'myname',\n '--tags', 'a', 'b'],\n ... | [
"0.64373565",
"0.60245734",
"0.59331405",
"0.5930392",
"0.5815289",
"0.57713777",
"0.56657034",
"0.5650916",
"0.5625454",
"0.56197125",
"0.5593169",
"0.55918944",
"0.5573543",
"0.54855055",
"0.5466616",
"0.54563904",
"0.54267275",
"0.5406278",
"0.5365563",
"0.53224146",
"0.52... | 0.66065574 | 0 |
Test that Client.get_auth_info() works even if client was instantiated with predefined token. | def test_reused_token_get_auth_info(self):
client_ = client.HTTPClient(username=USERNAME,
tenant_name=TENANT_NAME,
token=TOKEN,
password=PASSWORD,
auth_url=AUTH_UR... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_read_o_auth_client(self):\n pass",
"def test_read_o_auth_client_authorization(self):\n pass",
"def test_get_token(self):\n token = self.client.get_token()\n assert_equals(token, self.client.token)",
"def test_token_authenticator():\n token = TokenAuthenticator(\"test-t... | [
"0.74461716",
"0.73803073",
"0.7377959",
"0.6871848",
"0.6865224",
"0.68607444",
"0.6856917",
"0.6821779",
"0.68041027",
"0.679124",
"0.677962",
"0.6766453",
"0.6674288",
"0.6657574",
"0.6640797",
"0.66345286",
"0.66312987",
"0.66130656",
"0.66099536",
"0.6590054",
"0.6547094... | 0.8669687 | 0 |
Create a metering label. | def test_create_metering_label(self):
resource = 'metering_label'
cmd = metering.CreateMeteringLabel(
test_cli20.MyApp(sys.stdout), None)
name = 'my label'
myid = 'myid'
description = 'my description'
args = [name, '--description', description, '--share... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_metering_label(self, body=None):\r\n return self.post(self.metering_labels_path, body=body)",
"def create_metering_label_rule(self, body=None):\r\n return self.post(self.metering_label_rules_path, body=body)",
"def create_label(self, name: str):\n return create_label(self.api_ke... | [
"0.77936196",
"0.6822932",
"0.6697742",
"0.6647435",
"0.6602967",
"0.6392292",
"0.625566",
"0.62186307",
"0.6197961",
"0.608764",
"0.60417825",
"0.603417",
"0.598905",
"0.5958657",
"0.59500337",
"0.58386",
"0.58200043",
"0.58174956",
"0.580983",
"0.57898045",
"0.5780329",
"... | 0.79057693 | 0 |
Delete a metering label. | def test_delete_metering_label(self):
resource = 'metering_label'
cmd = metering.DeleteMeteringLabel(
test_cli20.MyApp(sys.stdout), None)
myid = 'myid'
args = [myid]
self._test_delete_resource(resource, cmd, myid, args) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete_metering_label(self, label):\r\n return self.delete(self.metering_label_path % (label))",
"def delete_metering_label_rule(self, rule):\r\n return self.delete(self.metering_label_rule_path % (rule))",
"def delete_label(self, label_id: str):\n return delete_label(self.api_key, lab... | [
"0.89883643",
"0.7607277",
"0.7178897",
"0.6987412",
"0.69216126",
"0.6780957",
"0.6665464",
"0.6630819",
"0.64464206",
"0.6433518",
"0.6346462",
"0.6294747",
"0.62444407",
"0.61471426",
"0.613388",
"0.6080339",
"0.6033608",
"0.5991414",
"0.5983423",
"0.59752935",
"0.5922084"... | 0.83897954 | 1 |
Create a qos queue. | def test_create_qos_queue(self):
resource = 'qos_queue'
cmd = qos.CreateQoSQueue(
test_cli20.MyApp(sys.stdout), None)
myid = 'myid'
name = 'my_queue'
default = False
args = ['--default', default, name]
position_names = ['name', 'default']
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_qos_queue(self, body=None):\r\n return self.post(self.qos_queues_path, body=body)",
"def post_qos_queue_create(self, resource_dict):\n pass",
"def pre_qos_queue_create(self, resource_dict):\n pass",
"def create_qos(self, specs):\n aname = \"cinder_v%s.create_qos\" % sel... | [
"0.8185874",
"0.73180425",
"0.72160995",
"0.72153395",
"0.716852",
"0.698072",
"0.6829998",
"0.6647159",
"0.65395284",
"0.6425167",
"0.62928766",
"0.6290166",
"0.62852246",
"0.62071264",
"0.61866313",
"0.61802065",
"0.614668",
"0.6122831",
"0.6100696",
"0.6072488",
"0.6061471... | 0.8327914 | 0 |
vpnikepolicycreate with limited params. | def test_create_ikepolicy_with_limited_params(self):
resource = 'ikepolicy'
cmd = ikepolicy.CreateIKEPolicy(test_cli20.MyApp(sys.stdout), None)
name = 'ikepolicy1'
auth_algorithm = 'sha1'
encryption_algorithm = 'aes-128'
ike_version = 'v1'
phase1_negotiatio... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def policy_create(request, **kwargs):\n body = {'policy': kwargs}\n policy = neutronclient(request).create_qos_policy(body=body).get('policy')\n return QoSPolicy(policy)",
"def test_create_ipsecpolicy_with_limited_params(self):\r\n resource = 'ipsecpolicy'\r\n cmd = ipsecpolicy.CreateIPsec... | [
"0.67605174",
"0.63373864",
"0.62043536",
"0.61684865",
"0.60333085",
"0.59879845",
"0.5895114",
"0.58576226",
"0.5845144",
"0.57666504",
"0.5718104",
"0.5632918",
"0.5608093",
"0.5539884",
"0.55350953",
"0.55115455",
"0.5504053",
"0.54954237",
"0.54552156",
"0.54532194",
"0.... | 0.68596905 | 0 |
vpnikepolicylist sortkey name sortkey id sortkey asc sortkey desc | def test_list_ikepolicy_sort(self):
resources = "ikepolicies"
cmd = ikepolicy.ListIKEPolicy(test_cli20.MyApp(sys.stdout), None)
self._test_list_resources(resources, cmd,
sort_key=["name", "id"],
sort_dir=["asc", "desc"]) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_list_ipsecpolicy_sort(self):\r\n resources = \"ipsecpolicies\"\r\n cmd = ipsecpolicy.ListIPsecPolicy(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n sort_key=[\"name\", \"id\"],\r\n ... | [
"0.6703592",
"0.65234053",
"0.64397544",
"0.61177826",
"0.6072396",
"0.59171295",
"0.5902732",
"0.5902732",
"0.5901417",
"0.58824617",
"0.5881479",
"0.58443946",
"0.58150613",
"0.5776039",
"0.5760045",
"0.5718927",
"0.570713",
"0.56954855",
"0.5681255",
"0.56656426",
"0.56644... | 0.71034634 | 0 |
vpnikepolicyupdate myid name newname tags a b. | def test_update_ikepolicy(self):
resource = 'ikepolicy'
cmd = ikepolicy.UpdateIKEPolicy(test_cli20.MyApp(sys.stdout), None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--name', 'newname'],
{'name': 'newnam... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def update_policy(self, *args, **kwargs):\r\n pass",
"def update_policy(self):\n pass",
"def test_update_vip(self):\r\n resource = 'vip'\r\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ... | [
"0.63625985",
"0.5746712",
"0.5689816",
"0.56131184",
"0.54967767",
"0.548697",
"0.54793257",
"0.53812796",
"0.5306516",
"0.52892566",
"0.5274082",
"0.5250518",
"0.5247099",
"0.5220096",
"0.5204185",
"0.51909995",
"0.5156048",
"0.51376456",
"0.5125405",
"0.5110084",
"0.509900... | 0.664246 | 0 |
vpnipsecpolicycreate all params with dashes. | def test_create_ipsecpolicy_all_params(self):
resource = 'ipsecpolicy'
cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None)
name = 'ipsecpolicy1'
description = 'first-ipsecpolicy1'
auth_algorithm = 'sha1'
encryption_algorithm = 'aes-256'
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_ipsecpolicy_with_limited_params(self):\r\n resource = 'ipsecpolicy'\r\n cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None)\r\n name = 'ipsecpolicy1'\r\n auth_algorithm = 'sha1'\r\n encryption_algorithm = 'aes-128'\r\n encapsulation_mode... | [
"0.73695415",
"0.69182694",
"0.63075495",
"0.60743695",
"0.59209335",
"0.57737",
"0.55147815",
"0.5427981",
"0.53997797",
"0.5395826",
"0.539565",
"0.5372647",
"0.53380567",
"0.532366",
"0.5307293",
"0.5217004",
"0.5211959",
"0.5211959",
"0.5199746",
"0.5167236",
"0.5164368",... | 0.7212561 | 1 |
vpnipsecpolicycreate with limited params. | def test_create_ipsecpolicy_with_limited_params(self):
resource = 'ipsecpolicy'
cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None)
name = 'ipsecpolicy1'
auth_algorithm = 'sha1'
encryption_algorithm = 'aes-128'
encapsulation_mode = 'tunnel'
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_ipsecpolicy(self, body=None):\r\n return self.post(self.ipsecpolicies_path, body=body)",
"def test_create_ipsecpolicy_all_params(self):\r\n resource = 'ipsecpolicy'\r\n cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None)\r\n name = 'ipsecpolicy1'\r\n ... | [
"0.7234446",
"0.68033886",
"0.66819644",
"0.6222569",
"0.5806694",
"0.5650765",
"0.5503857",
"0.5400083",
"0.5344261",
"0.5315673",
"0.53110784",
"0.52840865",
"0.527926",
"0.52128357",
"0.5198836",
"0.51901317",
"0.5150349",
"0.51397806",
"0.5139367",
"0.5134339",
"0.5099963... | 0.7606524 | 0 |
vpnipsecpolicylist sortkey name sortkey id sortkey asc sortkey desc | def test_list_ipsecpolicy_sort(self):
resources = "ipsecpolicies"
cmd = ipsecpolicy.ListIPsecPolicy(test_cli20.MyApp(sys.stdout), None)
self._test_list_resources(resources, cmd,
sort_key=["name", "id"],
sort_dir=["asc", "de... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_list_ikepolicy_sort(self):\r\n resources = \"ikepolicies\"\r\n cmd = ikepolicy.ListIKEPolicy(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n sort_key=[\"name\", \"id\"],\r\n sort_di... | [
"0.67242914",
"0.6391294",
"0.62031144",
"0.6190055",
"0.61493236",
"0.5974455",
"0.59224576",
"0.592214",
"0.59109926",
"0.58995634",
"0.5834045",
"0.5801107",
"0.57911587",
"0.57911587",
"0.5736912",
"0.5724981",
"0.57087",
"0.56801695",
"0.56698406",
"0.5638582",
"0.558947... | 0.74882025 | 0 |
vpnipsecpolicyupdate myid name newname tags a b. | def test_update_ipsecpolicy(self):
resource = 'ipsecpolicy'
cmd = ipsecpolicy.UpdateIPsecPolicy(test_cli20.MyApp(sys.stdout), None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--name', 'newname'],
{'name':... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_update_vip(self):\r\n resource = 'vip'\r\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid', '--name', 'myname',\r\n '--tags', 'a', 'b'],\r\n ... | [
"0.5947284",
"0.58341014",
"0.5740992",
"0.5528917",
"0.5466148",
"0.5444772",
"0.53655964",
"0.5356423",
"0.5328389",
"0.52295077",
"0.5195847",
"0.51908064",
"0.51708996",
"0.5131637",
"0.5131508",
"0.51128143",
"0.505605",
"0.5028969",
"0.5017572",
"0.49885267",
"0.4941475... | 0.6408668 | 0 |
ipsecsiteconnectionlist. sortkey name sortkey id sortkey asc sortkey desc | def test_list_ipsec_site_connection_sort(self):
resources = "ipsec_site_connections"
cmd = ipsec_site_connection.ListIPsecSiteConnection(
test_cli20.MyApp(sys.stdout), None
)
self._test_list_resources(resources, cmd,
sort_key=["name", "... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def sort(self, key: str):\n return self._select_interface(self._rc_sort, self._http_sort, key)",
"def sort_key(self):\n ...",
"def connection_sort_key(conn):\n\n conn_rec_state = ConnRecord.State.get(conn[\"state\"])\n if conn_rec_state is ConnRecord.State.ABANDONED:\n pfx = \"2\"\n ... | [
"0.63405454",
"0.6340223",
"0.6314149",
"0.6097196",
"0.57135284",
"0.56152034",
"0.55581367",
"0.5535343",
"0.5523954",
"0.5521395",
"0.5507526",
"0.54851496",
"0.54228103",
"0.5417764",
"0.5417227",
"0.5414423",
"0.5414423",
"0.5402862",
"0.52935183",
"0.5264412",
"0.525181... | 0.66013426 | 0 |
vpnservicecreate with limited params. | def test_create_vpnservice_with_limited_params(self):
resource = 'vpnservice'
cmd = vpnservice.CreateVPNService(test_cli20.MyApp(sys.stdout), None)
subnet = 'mysubnet-id'
router = 'myrouter-id'
tenant_id = 'mytenant-id'
my_id = 'my-id'
admin_state = True
... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_vpnservice(self, body=None):\r\n return self.post(self.vpnservices_path, body=body)",
"def new_t1_vpn_service(**kwargs):\n proxy = kwargs['proxy']\n session_token = kwargs['sessiontoken']\n display_name = kwargs['display_name']\n t1g = kwargs['tier1_gateway']\n service = kwargs['... | [
"0.70959985",
"0.6840321",
"0.62186426",
"0.6188994",
"0.6004818",
"0.5956649",
"0.58862764",
"0.5827628",
"0.5777773",
"0.5753519",
"0.56439525",
"0.5605965",
"0.55860615",
"0.5533064",
"0.5523949",
"0.55233705",
"0.55164105",
"0.5459404",
"0.5457873",
"0.5439549",
"0.543954... | 0.7601816 | 0 |
vpnservicelist sortkey name sortkey id sortkey asc sortkey desc | def test_list_vpnservice_sort(self):
resources = "vpnservices"
cmd = vpnservice.ListVPNService(test_cli20.MyApp(sys.stdout), None)
self._test_list_resources(resources, cmd,
sort_key=["name", "id"],
sort_dir=["asc", "desc"]) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def sort(self, key: str):\n return self._select_interface(self._rc_sort, self._http_sort, key)",
"def test_list_vips_sort(self):\r\n resources = \"vips\"\r\n cmd = vip.ListVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n ... | [
"0.63703066",
"0.61061853",
"0.60698044",
"0.60150844",
"0.59789616",
"0.5975713",
"0.5869214",
"0.5810832",
"0.5778297",
"0.5718343",
"0.5699173",
"0.5675813",
"0.5645624",
"0.5600735",
"0.55357623",
"0.55282575",
"0.55243665",
"0.5522524",
"0.55137986",
"0.54805565",
"0.545... | 0.8074301 | 0 |
vpnserviceupdate myid name newname tags a b. | def test_update_vpnservice(self):
resource = 'vpnservice'
cmd = vpnservice.UpdateVPNService(test_cli20.MyApp(sys.stdout), None)
self._test_update_resource(resource, cmd, 'myid',
['myid', '--name', 'newname'],
{'name': 'ne... | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_update_vip(self):\r\n resource = 'vip'\r\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid', '--name', 'myname',\r\n '--tags', 'a', 'b'],\r\n ... | [
"0.6304507",
"0.6097116",
"0.6065094",
"0.5950057",
"0.5797516",
"0.57872784",
"0.5762277",
"0.5693147",
"0.56716585",
"0.5671021",
"0.56150347",
"0.55360514",
"0.5519476",
"0.5514524",
"0.55011",
"0.5480793",
"0.548057",
"0.5445134",
"0.54063755",
"0.53976214",
"0.5396411",
... | 0.6784633 | 0 |
Generic handler for negative lifetime tests. | def _test_validate_lifetime_negative_test_case(self, input_str):
self.assertRaises(exceptions.CommandError,
vpn_utils.validate_lifetime_dict,
(input_str)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_negative_timedelta(self):\n @converters.wrap\n def inner_test(param: datetime.timedelta):\n \"\"\"This shouldn't be called, converting should fail.\"\"\"\n pass\n self.assert_raises_request_error(\n lambda: inner_test(param='-60'), 3117\n )",
... | [
"0.6004946",
"0.56166583",
"0.5580307",
"0.55326796",
"0.5451962",
"0.54277414",
"0.54138",
"0.5377915",
"0.537539",
"0.53710616",
"0.5328369",
"0.532568",
"0.53064287",
"0.52620983",
"0.5247853",
"0.51848763",
"0.51784873",
"0.51591665",
"0.5138147",
"0.51340395",
"0.5123574... | 0.5692034 | 1 |
Fetch tenant info in server's context for following quota operation. | def get_quotas_tenant(self, **_params):
return self.get(self.quota_path % 'tenant', params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def tenant(self, request):\n warnings.warn(\n '\"tenant\" Quota API method is deprecated, use \"project\" instead')\n return self._project(request, 'tenant')",
"def show_quota(self, tenant_id, **_params):\r\n return self.get(self.quota_path % (tenant_id), params=_params)",
"def ... | [
"0.7046992",
"0.6956089",
"0.69095504",
"0.6841608",
"0.6819722",
"0.6819133",
"0.66917735",
"0.61991566",
"0.6149468",
"0.6072379",
"0.60317415",
"0.5986429",
"0.5978525",
"0.5923107",
"0.59088004",
"0.58969223",
"0.588125",
"0.5859193",
"0.5820377",
"0.5808257",
"0.5777847"... | 0.74023384 | 0 |
Fetch all tenants' quotas. | def list_quotas(self, **_params):
return self.get(self.quotas_path, params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def get(self, tenant_id):\n response = self.client.get('/quotas/%s' % tenant_id)\n\n return response.json()",
"def quotas(self) -> Iterable[dto.Quota]:\n raise errors.UnsupportedOperationError(\n \"Operation not supported for provider '{}'\".format(self.provider_name)\n )",... | [
"0.66022927",
"0.6599447",
"0.64777046",
"0.63926065",
"0.60388297",
"0.6008488",
"0.5831066",
"0.58260214",
"0.57410496",
"0.56690055",
"0.5601002",
"0.5509881",
"0.54818875",
"0.54697114",
"0.54492724",
"0.5433787",
"0.5406473",
"0.53875554",
"0.5371106",
"0.53609663",
"0.5... | 0.6908366 | 0 |
Update a tenant's quotas. | def update_quota(self, tenant_id, body=None):
return self.put(self.quota_path % (tenant_id), body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def quota_update(self, tenant_id, fields):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/quotas/\" + \\\n tenant_id + \".json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.cloud_admin_info['token_project']}\n _body = {\"quota\": f... | [
"0.7163246",
"0.635502",
"0.5720036",
"0.5639554",
"0.55166525",
"0.54624575",
"0.5428829",
"0.54258657",
"0.51778257",
"0.5154388",
"0.51109576",
"0.5021779",
"0.5000794",
"0.49561912",
"0.49508128",
"0.49429917",
"0.492987",
"0.49184144",
"0.4904871",
"0.4830201",
"0.482329... | 0.7461944 | 0 |
Delete the specified tenant's quota values. | def delete_quota(self, tenant_id):
return self.delete(self.quota_path % (tenant_id)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete(self):\n\n context = t_context.extract_context_from_environ()\n if not context.is_admin:\n # TODO(joahuang): changed to policy control later\n # to support reseller admin mode\n return Response(_('Admin role required to delete quota'), 409)\n\n kw = ... | [
"0.69970065",
"0.673502",
"0.6282969",
"0.61131537",
"0.6112617",
"0.5945629",
"0.5926098",
"0.58765143",
"0.5865376",
"0.58470356",
"0.579206",
"0.56558055",
"0.562411",
"0.5410008",
"0.5362028",
"0.53468287",
"0.529956",
"0.51715744",
"0.5163412",
"0.5146274",
"0.5144429",
... | 0.7955257 | 0 |
Fetch a list of all exts on server side. | def list_extensions(self, **_params):
return self.get(self.extensions_path, params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def extensions(self):\n return list(self._list(extension.Extension, paginated=False))",
"def fetch_list(self):\n\t\treturn self.fetch(self.list_url % ART_SERVER_HOST)",
"def list_extensions():\n formats = FileFormat.list_formats()\n return render_template('home.html', formats=formats)",
"def ext... | [
"0.68190336",
"0.6657903",
"0.64916474",
"0.6476279",
"0.6232979",
"0.6157164",
"0.6072281",
"0.60483783",
"0.60483783",
"0.6026507",
"0.6012674",
"0.59762377",
"0.59696406",
"0.5939757",
"0.59294885",
"0.5917803",
"0.58528507",
"0.58474547",
"0.5839552",
"0.58357006",
"0.579... | 0.7232655 | 0 |
Creates a new port. | def create_port(self, body=None):
return self.post(self.ports_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def port_create(request, network_id, **kwargs):\n LOG.debug(\"port_create(): netid=%(network_id)s, kwargs=%(kwargs)s\",\n {'network_id': network_id, 'kwargs': kwargs})\n kwargs = unescape_port_kwargs(**kwargs)\n body = {'port': {'network_id': network_id}}\n if 'tenant_id' not in kwargs:\n ... | [
"0.7776417",
"0.7497535",
"0.74686015",
"0.74666834",
"0.7371448",
"0.73548275",
"0.71859133",
"0.7181485",
"0.7097867",
"0.7053701",
"0.6967759",
"0.6953171",
"0.6948751",
"0.69008",
"0.6850297",
"0.6849177",
"0.67380726",
"0.67371327",
"0.6549283",
"0.6459628",
"0.6454151",... | 0.85699546 | 0 |
Deletes the specified port. | def delete_port(self, port):
return self.delete(self.port_path % (port)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def port_delete(switch, port):\n client.port.delete(switch, port)",
"def delete_port(self, port):\n try:\n self.client.delete_nic(port.vm.backend_id, port.backend_id)\n except VMwareError as e:\n raise VMwareBackendError(e)",
"def delete_port(self, port_id):\n _url... | [
"0.8605427",
"0.77690196",
"0.7670423",
"0.757818",
"0.73585236",
"0.7301238",
"0.7281538",
"0.7242986",
"0.7207654",
"0.7157321",
"0.70755917",
"0.7018464",
"0.7011688",
"0.665867",
"0.6627325",
"0.64675957",
"0.6434387",
"0.64250773",
"0.6235666",
"0.6193198",
"0.6191819",
... | 0.9033437 | 0 |
Fetches information of a certain network. | def show_network(self, network, **_params):
return self.get(self.network_path % (network), params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def GetNetwork(self, network, reason=None):\n query = []\n _AppendReason(query, reason)\n\n return self._SendRequest(HTTP_GET,\n \"/%s/networks/%s\" % (GANETI_RAPI_VERSION, network),\n query, None)",
"def get_network_info(self, network_id):\n ... | [
"0.7025692",
"0.6826883",
"0.6770438",
"0.67534244",
"0.67281926",
"0.6689964",
"0.6590673",
"0.65494996",
"0.6434791",
"0.6377579",
"0.6312347",
"0.62848645",
"0.62848645",
"0.62848645",
"0.6279836",
"0.6277307",
"0.62063056",
"0.62010485",
"0.6165593",
"0.609365",
"0.604815... | 0.7827048 | 0 |
Creates a new network. | def create_network(self, body=None):
return self.post(self.networks_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def network_create(request, **kwargs):\n LOG.debug(\"network_create(): kwargs = %s\", kwargs)\n if 'tenant_id' not in kwargs:\n kwargs['tenant_id'] = request.user.project_id\n body = {'network': kwargs}\n network = neutronclient(request).create_network(body=body).get('network')\n return Netwo... | [
"0.81579995",
"0.7955047",
"0.79292595",
"0.7865227",
"0.77354944",
"0.77025455",
"0.7653404",
"0.7584998",
"0.7473897",
"0.73508835",
"0.73476547",
"0.73433155",
"0.72996587",
"0.72917145",
"0.7264279",
"0.72636753",
"0.7241721",
"0.70633",
"0.70381355",
"0.7006608",
"0.6971... | 0.84297645 | 0 |
Deletes the specified network. | def delete_network(self, network):
return self.delete(self.network_path % (network)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete_network(self, tenant_id, network_id, network_segments):\n self.delete_network_segments(tenant_id, network_segments)\n self.delete_network_bulk(tenant_id, [network_id])",
"def network_delete_event(self, network_info):\n\n net_id = network_info['network_id']\n if net_id not i... | [
"0.8059222",
"0.7379222",
"0.720079",
"0.71616256",
"0.7135392",
"0.71011084",
"0.7094287",
"0.7035174",
"0.6975643",
"0.68844634",
"0.6869534",
"0.6844207",
"0.6759504",
"0.6696637",
"0.6662097",
"0.66288805",
"0.65767175",
"0.6397678",
"0.6372114",
"0.63403755",
"0.6321933"... | 0.86559355 | 0 |
Fetches information of a certain subnet. | def show_subnet(self, subnet, **_params):
return self.get(self.subnet_path % (subnet), params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def get_subnet_details(self, subnet_name=\"dummy_subnet\", subnet_id=None):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/subnets\"\n _headers = {'x-auth-token': self.project_info[\"token_project\"]}\n _body = None\n\n result = self.request(\"GET\", _url, _headers, _body)\n ... | [
"0.7390836",
"0.7267412",
"0.72269106",
"0.69200927",
"0.6865069",
"0.6851835",
"0.6811328",
"0.6652118",
"0.6632633",
"0.6610862",
"0.6433478",
"0.6383471",
"0.63660246",
"0.62896067",
"0.62729573",
"0.6270225",
"0.6262065",
"0.62597907",
"0.62462574",
"0.62135315",
"0.61285... | 0.7742677 | 0 |
Creates a new subnet. | def create_subnet(self, body=None):
return self.post(self.subnets_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def subnet_create(request, network_id, **kwargs):\n LOG.debug(\"subnet_create(): netid=%(network_id)s, kwargs=%(kwargs)s\",\n {'network_id': network_id, 'kwargs': kwargs})\n body = {'subnet': {'network_id': network_id}}\n if 'tenant_id' not in kwargs:\n kwargs['tenant_id'] = request.us... | [
"0.8182615",
"0.80901676",
"0.77219945",
"0.7618689",
"0.76168036",
"0.7553743",
"0.7547663",
"0.7508443",
"0.72408324",
"0.71734613",
"0.7053382",
"0.6969514",
"0.6968936",
"0.69553506",
"0.6927736",
"0.6902643",
"0.6880848",
"0.68753177",
"0.6782591",
"0.6767504",
"0.659729... | 0.8516262 | 0 |
Deletes the specified subnet. | def delete_subnet(self, subnet):
return self.delete(self.subnet_path % (subnet)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete_subnet(self, subnet_id):\n\n LOG_OBJ.debug(\"Deleting subnet %s\" % subnet_id)\n\n _url = \"http://\" + self.host_ip + \":9696/v2.0/subnets/\" + \\\n subnet_id + \".json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.project_... | [
"0.80279684",
"0.7537888",
"0.74954545",
"0.73043185",
"0.71507853",
"0.7116594",
"0.70545286",
"0.70140845",
"0.6914489",
"0.67101955",
"0.66071516",
"0.6467483",
"0.6438037",
"0.62992525",
"0.61135745",
"0.6082507",
"0.608126",
"0.60400426",
"0.59426373",
"0.59162545",
"0.5... | 0.8752519 | 0 |
Fetches a list of all routers for a tenant. | def list_routers(self, retrieve_all=True, **_params):
# Pass filters in "params" argument to do_request
return self.list('routers', self.routers_path, retrieve_all,
**_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def list_router(self):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/routers.json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.project_info[\"token_project\"]}\n _body = None\n\n response = self.request(\"GET\", _url, _headers, _body... | [
"0.6313127",
"0.6174423",
"0.6166872",
"0.5997509",
"0.5886302",
"0.5854196",
"0.5810372",
"0.57217276",
"0.5712855",
"0.56660986",
"0.56648535",
"0.56253934",
"0.5617021",
"0.558155",
"0.55518055",
"0.55088097",
"0.5482825",
"0.5412695",
"0.5344983",
"0.5344021",
"0.53354704... | 0.6982911 | 0 |
Fetches information of a certain router. | def show_router(self, router, **_params):
return self.get(self.router_path % (router), params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def get_router(self, ns):\r\n desc = self.sendAndRecv(\"GETINFO desc/id/\" + ns.idhex + \"\\r\\n\")[0][2]\r\n sig_start = desc.find(\"\\nrouter-signature\\n\")+len(\"\\nrouter-signature\\n\")\r\n fp_base64 = sha1(desc[:sig_start]).digest().encode(\"base64\")[:-2]\r\n r = Router.build_from_desc(desc.spl... | [
"0.6491132",
"0.6485342",
"0.6240694",
"0.60985136",
"0.6021243",
"0.60166574",
"0.5952552",
"0.5870413",
"0.5852566",
"0.58317333",
"0.5818978",
"0.56855655",
"0.56371194",
"0.5627783",
"0.56222224",
"0.5595846",
"0.5552522",
"0.55414426",
"0.55044",
"0.54918385",
"0.5471492... | 0.75560486 | 0 |
Creates a new router. | def create_router(self, body=None):
return self.post(self.routers_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_router(self, environment, *, router=None):\n\n if router is None:\n router = self.router\n\n return utils.objects.ensure_instance(router, environment=environment)",
"def create_router(self, router_name=\"test_router\"):\n LOG_OBJ.debug(\n \"Creating router in... | [
"0.788999",
"0.71891093",
"0.68031514",
"0.67899865",
"0.67467797",
"0.66271514",
"0.660581",
"0.65151536",
"0.6493566",
"0.64516914",
"0.64080477",
"0.6309001",
"0.620273",
"0.5938039",
"0.59123707",
"0.59083575",
"0.5859488",
"0.58458954",
"0.5808517",
"0.57845855",
"0.5765... | 0.80614746 | 0 |
Deletes the specified router. | def delete_router(self, router):
return self.delete(self.router_path % (router)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete_router(self, router_id):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/routers/\" + \\\n router_id + \".json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.project_info[\"token_project\"]}\n _body = None\n\n respo... | [
"0.8061734",
"0.79204166",
"0.7457911",
"0.7357191",
"0.73263353",
"0.70104057",
"0.67779124",
"0.65747285",
"0.6572116",
"0.65454334",
"0.64425975",
"0.6437227",
"0.6357478",
"0.6312947",
"0.629201",
"0.62706506",
"0.625203",
"0.6249143",
"0.6221276",
"0.6218233",
"0.610681"... | 0.8844058 | 0 |
Adds an internal network interface to the specified router. | def add_interface_router(self, router, body=None):
return self.put((self.router_path % router) + "/add_router_interface",
body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def add_router_interface(self, router, subnet_id=None, port_id=None):\n return self.network.add_interface_to_router(\n router=router, subnet_id=subnet_id, port_id=port_id\n )",
"def add_internal_interface(self, oid, subnet):\n data = {\"subnet_id\": subnet}\n path = '%s/rou... | [
"0.7873222",
"0.7838222",
"0.7709515",
"0.71190506",
"0.6903455",
"0.6708249",
"0.65713805",
"0.6510887",
"0.6399704",
"0.6221869",
"0.6209524",
"0.6098547",
"0.60733616",
"0.60182595",
"0.59893215",
"0.5945213",
"0.5897475",
"0.582894",
"0.5810345",
"0.57925093",
"0.5694907"... | 0.84055555 | 0 |
Removes an internal network interface from the specified router. | def remove_interface_router(self, router, body=None):
return self.put((self.router_path % router) +
"/remove_router_interface", body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def remove_router_interface(self, router, subnet_id=None, port_id=None):\n if not subnet_id and not port_id:\n raise ValueError(\n \"At least one of subnet_id or port_id must be supplied.\"\n )\n\n self.network.remove_interface_from_router(\n router=rou... | [
"0.7638416",
"0.7565658",
"0.72000104",
"0.68167233",
"0.64587975",
"0.61961097",
"0.6058829",
"0.6018284",
"0.5968525",
"0.5866438",
"0.5834787",
"0.58338827",
"0.5784816",
"0.5697515",
"0.56668746",
"0.56656337",
"0.56577164",
"0.5640304",
"0.5611446",
"0.5598428",
"0.55924... | 0.8504373 | 0 |
Adds an external network gateway to the specified router. | def add_gateway_router(self, router, body=None):
return self.put((self.router_path % router),
body={'router': {'external_gateway_info': body}}) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def add_network(self, router, network, distance):\n self.routers[router].add_network(network, distance)",
"def set_router_gateway(self, ext_net_name, router_id):\n _ext_net_id = self.get_net_id(ext_net_name)\n if not isinstance(_ext_net_id, unicode):\n return\n\n LOG_OBJ.de... | [
"0.7562062",
"0.716101",
"0.68449825",
"0.68084097",
"0.6744273",
"0.65693057",
"0.6566995",
"0.6367071",
"0.6328497",
"0.6255339",
"0.6245209",
"0.6202838",
"0.6190978",
"0.61452156",
"0.6072494",
"0.60703474",
"0.60572124",
"0.60473317",
"0.5961244",
"0.5941951",
"0.5912015... | 0.82570314 | 0 |
Removes an external network gateway from the specified router. | def remove_gateway_router(self, router):
return self.put((self.router_path % router),
body={'router': {'external_gateway_info': {}}}) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def clear_router_gateway(self, router_id):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/routers/\" + \\\n router_id + \".json\"\n _headers = {'x-auth-token': self.project_info[\"token_project\"],\n 'content-type': 'application/json'}\n _gwdata = {\"router\":... | [
"0.75148505",
"0.7291869",
"0.7215167",
"0.71989477",
"0.69219494",
"0.65546954",
"0.6521398",
"0.63652754",
"0.6297426",
"0.62397933",
"0.62172765",
"0.6162991",
"0.6098855",
"0.59807825",
"0.59806484",
"0.59528273",
"0.5935186",
"0.5905832",
"0.5899156",
"0.5846076",
"0.584... | 0.8343582 | 0 |
Fetches a list of all floatingips for a tenant. | def list_floatingips(self, retrieve_all=True, **_params):
# Pass filters in "params" argument to do_request
return self.list('floatingips', self.floatingips_path, retrieve_all,
**_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def floating_ip_list(tenant_id, auth_token):\r\n content = common_utils.do_request(\r\n tenant_id, auth_token,\r\n method='GET',\r\n body='',\r\n service=\"network\",\r\n path=\"floatingips.json\")\r\n return ... | [
"0.81242007",
"0.7544053",
"0.7216728",
"0.7172121",
"0.7137568",
"0.6763114",
"0.6395726",
"0.61118186",
"0.59908193",
"0.5927272",
"0.58235717",
"0.5809937",
"0.57843965",
"0.5727529",
"0.5638011",
"0.55874467",
"0.5565585",
"0.549272",
"0.5395736",
"0.53865224",
"0.5317173... | 0.76698965 | 1 |
Fetches information of a certain floatingip. | def show_floatingip(self, floatingip, **_params):
return self.get(self.floatingip_path % (floatingip), params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def get(self, oid):\n path = '%s/floatingips/%s' % (self.ver, oid)\n res = self.client.call(path, 'GET', data='', \n token=self.manager.identity.token)\n self.logger.debug('Get openstack floating ip %s: %s' % \n (oid, truncate(res)))\n ... | [
"0.729726",
"0.66412824",
"0.657539",
"0.65030426",
"0.64191407",
"0.638935",
"0.6187027",
"0.61458135",
"0.6081408",
"0.6071991",
"0.6043026",
"0.59518915",
"0.59191006",
"0.5901457",
"0.5866904",
"0.58119065",
"0.58007085",
"0.57907933",
"0.5764891",
"0.57493246",
"0.572790... | 0.7693683 | 0 |
Creates a new floatingip. | def create_floatingip(self, body=None):
return self.post(self.floatingips_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create(self, network_id, tenant_id, port_id):\n data = {\n \"floatingip\": {\n \"tenant_id\": tenant_id,\n \"floating_network_id\": network_id,\n \"port_id\": port_id\n }\n }\n \n path = '%s/floatingips' % (self.ver)... | [
"0.7378122",
"0.73097956",
"0.7262478",
"0.67980736",
"0.67412883",
"0.67399395",
"0.65076995",
"0.64782184",
"0.645232",
"0.637573",
"0.6367837",
"0.63190114",
"0.6313995",
"0.62223685",
"0.62001455",
"0.61518633",
"0.6129838",
"0.6112548",
"0.5935769",
"0.5922887",
"0.58890... | 0.82209605 | 0 |
Deletes the specified floatingip. | def delete_floatingip(self, floatingip):
return self.delete(self.floatingip_path % (floatingip)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete(self, floatingip_id):\n path = '%s/floatingips/%s' % (self.ver, floatingip_id)\n res = self.client.call(path, 'DELETE', data='', \n token=self.manager.identity.token)\n self.logger.debug('Delete openstack floating ip %s: %s' % \n ... | [
"0.8358391",
"0.8064777",
"0.80346894",
"0.7467909",
"0.737288",
"0.7300664",
"0.7113757",
"0.7082978",
"0.70673203",
"0.7060899",
"0.6955936",
"0.6880796",
"0.68678147",
"0.6740223",
"0.66462886",
"0.6421955",
"0.6390722",
"0.6356175",
"0.6350115",
"0.6334925",
"0.6297505",
... | 0.91411155 | 0 |
Creates a new security group. | def create_security_group(self, body=None):
return self.post(self.security_groups_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create(self, body: CloudSecurityGroup) -> Dict:\n\t\treturn self._post(route=AWSSecurityGroupConsts.CLOUD_SECURITY_GROUP.value, body=body)",
"def security_group_create(auth=None, **kwargs):\n cloud = get_operator_cloud(auth)\n kwargs = _clean_kwargs(keep_name=True, **kwargs)\n return cloud.create_se... | [
"0.8204056",
"0.80387515",
"0.8036162",
"0.78772044",
"0.78635776",
"0.7851885",
"0.7806621",
"0.76207393",
"0.76201856",
"0.7483134",
"0.7392816",
"0.7248553",
"0.72154444",
"0.7196159",
"0.7180574",
"0.715299",
"0.7137981",
"0.71072334",
"0.70958006",
"0.70805806",
"0.70630... | 0.8415717 | 0 |
Updates a security group. | def update_security_group(self, security_group, body=None):
return self.put(self.security_group_path %
security_group, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def security_group_update(secgroup=None, auth=None, **kwargs):\n cloud = get_operator_cloud(auth)\n kwargs = _clean_kwargs(keep_name=True, **kwargs)\n return cloud.update_security_group(secgroup, **kwargs)",
"def update(self, security_group_id: str, body: CloudSecurityGroup) -> None:\n\t\troute = f'{AWS... | [
"0.82314885",
"0.8048841",
"0.7350805",
"0.685911",
"0.6854288",
"0.67871845",
"0.6778078",
"0.6759359",
"0.6732872",
"0.6714927",
"0.6657734",
"0.66299677",
"0.6612744",
"0.65853596",
"0.6577766",
"0.6539446",
"0.6519325",
"0.64868754",
"0.6460655",
"0.63118005",
"0.63078654... | 0.8174148 | 1 |
Fetches a list of all security groups for a tenant. | def list_security_groups(self, retrieve_all=True, **_params):
return self.list('security_groups', self.security_groups_path,
retrieve_all, **_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def security_groups(self, oid):\n try:\n path = u'/servers/%s/os-security-groups' % oid\n res = self.client.call(path, u'GET', data=u'', \n token=self.manager.identity.token)\n self.logger.debug(u'Get openstack server security groups: %s' % ... | [
"0.66952974",
"0.6504931",
"0.63362503",
"0.6312892",
"0.6240303",
"0.61849177",
"0.6152795",
"0.6045224",
"0.60395956",
"0.60331637",
"0.5994619",
"0.59551716",
"0.5928385",
"0.5910452",
"0.59098077",
"0.59088475",
"0.5883278",
"0.5881842",
"0.5838258",
"0.58300847",
"0.5826... | 0.69792134 | 0 |
Fetches information of a certain security group. | def show_security_group(self, security_group, **_params):
return self.get(self.security_group_path % (security_group),
params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def find_secgrp ( ec2_conn, secgrp_name ) :\n sec_grps = ec2_conn.get_all_security_groups( filters = { \"group-name\" : [ secgrp_name ] } )\n if len( sec_grps ) > 0 :\n return sec_grps[ 0 ]\n \n return None",
"def get(self, sg_id):\n secgroup = self.client.show_security_group(sg_id).get('secur... | [
"0.68748987",
"0.67552584",
"0.67210066",
"0.6686591",
"0.652577",
"0.6494174",
"0.6481859",
"0.63579845",
"0.6334155",
"0.63031715",
"0.6288276",
"0.6269049",
"0.62165534",
"0.6183246",
"0.61800027",
"0.61800027",
"0.61468124",
"0.6135291",
"0.612963",
"0.61201364",
"0.60608... | 0.7536646 | 0 |
Deletes the specified security group. | def delete_security_group(self, security_group):
return self.delete(self.security_group_path % (security_group)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def del_secgroup(self, args):\n region = args[\"Region\"]\n sgid = args[\"Security-group-ID\"]\n message = MessageClass()\n\n # Boto3 client creation by providing the access_id and access_secret\n ec2 = boto3.client(service_name='ec2', region_name=region, api_version=None, use_ss... | [
"0.8035514",
"0.8021995",
"0.7983719",
"0.79304713",
"0.7878552",
"0.77813673",
"0.7729755",
"0.7597194",
"0.7571937",
"0.754748",
"0.75433195",
"0.74403715",
"0.72224003",
"0.72200805",
"0.71985203",
"0.71627986",
"0.7125496",
"0.7101876",
"0.70702475",
"0.7063061",
"0.70546... | 0.8509912 | 0 |
Creates a new security group rule. | def create_security_group_rule(self, body=None):
return self.post(self.security_group_rules_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def security_group_rule_create(auth=None, **kwargs):\n cloud = get_operator_cloud(auth)\n kwargs = _clean_kwargs(**kwargs)\n return cloud.create_security_group_rule(**kwargs)",
"def create_rule(self, security_group, direction, ethertype=None,\n port_range_min=None, port_range_max=None... | [
"0.8042478",
"0.7659484",
"0.7532617",
"0.7476467",
"0.73841006",
"0.73787856",
"0.70613796",
"0.7044276",
"0.68198454",
"0.66372263",
"0.6577984",
"0.6487899",
"0.6429103",
"0.6424751",
"0.64135575",
"0.63829243",
"0.6326697",
"0.6302563",
"0.6242154",
"0.6182589",
"0.614755... | 0.8395399 | 0 |
Deletes the specified security group rule. | def delete_security_group_rule(self, security_group_rule):
return self.delete(self.security_group_rule_path %
(security_group_rule)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def rule_delete(self, sgr_id):\n self.client.delete_security_group_rule(sgr_id)",
"def delete_rule(self, ruleid):\n path = '%s/security-group-rules/%s' % (self.ver, ruleid)\n res = self.client.call(path, 'DELETE', data='', token=self.manager.identity.token)\n self.logger.debug('Delete... | [
"0.818832",
"0.81104696",
"0.8010669",
"0.7354578",
"0.73206323",
"0.6843581",
"0.6817413",
"0.68086785",
"0.67470104",
"0.6741116",
"0.6653575",
"0.664835",
"0.65784734",
"0.65602237",
"0.6552057",
"0.6535408",
"0.65182275",
"0.648097",
"0.6420581",
"0.6400473",
"0.62809914"... | 0.84033525 | 0 |
Fetches a list of all security group rules for a tenant. | def list_security_group_rules(self, retrieve_all=True, **_params):
return self.list('security_group_rules',
self.security_group_rules_path,
retrieve_all, **_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def index(self, req, tenant_id):\n LOG.debug(\"Index() called with %s\" % (tenant_id))\n\n sec_groups = models.SecurityGroup().find_all(tenant_id=tenant_id,\n deleted=False)\n\n # Construct the mapping from Security Groups to Security Group R... | [
"0.6442324",
"0.6289453",
"0.6159688",
"0.5514532",
"0.548488",
"0.542636",
"0.5409088",
"0.5384701",
"0.535883",
"0.53273433",
"0.5319858",
"0.52949345",
"0.52807045",
"0.5279871",
"0.52354646",
"0.52088547",
"0.51403195",
"0.5130113",
"0.5027444",
"0.5020799",
"0.49570218",... | 0.6851677 | 0 |
Fetches information of a certain security group rule. | def show_security_group_rule(self, security_group_rule, **_params):
return self.get(self.security_group_rule_path % (security_group_rule),
params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def get_secgroup_rule(self, rule_id, context):\n plugin = directory.get_plugin()\n with context.session.begin(subtransactions=True):\n return plugin.get_security_group_rule(context, rule_id)",
"def get_rule_group(client, rule_group_name):\n response = client.describe_rule_group(\n Ru... | [
"0.738271",
"0.64413077",
"0.63375515",
"0.63375515",
"0.63375515",
"0.6260252",
"0.62539256",
"0.6172309",
"0.61507857",
"0.61304396",
"0.59664035",
"0.5946747",
"0.5937241",
"0.5836339",
"0.58304036",
"0.57771856",
"0.5769232",
"0.56301296",
"0.55832016",
"0.5582687",
"0.55... | 0.7506909 | 0 |
Fetches a list of all configured VPNServices for a tenant. | def list_vpnservices(self, retrieve_all=True, **_params):
return self.list('vpnservices', self.vpnservices_path, retrieve_all,
**_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def get_vpn_services_on_host(self, context, host=None):\n plugin = self.driver.service_plugin\n vpnservices = plugin.get_agent_hosting_vpn_services(\n context, host, self.driver.service_type)\n return [self.driver._make_vpnservice_dict(vpnservice)\n for vpnservice in ... | [
"0.64834946",
"0.63417435",
"0.6217963",
"0.59979105",
"0.5981965",
"0.59288955",
"0.5915527",
"0.5913047",
"0.58784163",
"0.58099526",
"0.5784925",
"0.56938785",
"0.5677967",
"0.56632555",
"0.5599454",
"0.5592681",
"0.5591068",
"0.5572708",
"0.5559247",
"0.55368185",
"0.5532... | 0.63743883 | 1 |
Fetches information of a specific VPNService. | def show_vpnservice(self, vpnservice, **_params):
return self.get(self.vpnservice_path % (vpnservice), params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def get_service(service=None, vsys=\"1\"):\n query = {\n \"type\": \"config\",\n \"action\": \"get\",\n \"xpath\": (\n \"/config/devices/entry[@name='localhost.localdomain']/vsys/entry[@name='vsys{}']/\"\n \"service/entry[@name='{}']\".format(vsys, service)\n ),... | [
"0.6069",
"0.58816284",
"0.5876587",
"0.58577716",
"0.58401006",
"0.58010286",
"0.57323927",
"0.57289433",
"0.57221717",
"0.57177603",
"0.57064146",
"0.5674278",
"0.553966",
"0.5535464",
"0.5524023",
"0.5498003",
"0.5443511",
"0.54307956",
"0.54205894",
"0.5387409",
"0.536915... | 0.75386333 | 0 |
Creates a new VPNService. | def create_vpnservice(self, body=None):
return self.post(self.vpnservices_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def new_t1_vpn_service(**kwargs):\n proxy = kwargs['proxy']\n session_token = kwargs['sessiontoken']\n display_name = kwargs['display_name']\n t1g = kwargs['tier1_gateway']\n service = kwargs['service_type']\n\n if service == 'ipsec':\n json_data = {\n \"resource_type\": \"IPSec... | [
"0.69971925",
"0.6494992",
"0.6480613",
"0.6412509",
"0.62872297",
"0.6207053",
"0.6186071",
"0.6146034",
"0.61011076",
"0.6081889",
"0.6053445",
"0.60162836",
"0.5998632",
"0.5963445",
"0.5952054",
"0.59224486",
"0.58647734",
"0.5844991",
"0.57842857",
"0.5771153",
"0.575343... | 0.81970257 | 0 |
Deletes the specified VPNService. | def delete_vpnservice(self, vpnservice):
return self.delete(self.vpnservice_path % (vpnservice)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete_service(self, service_id):\n raise exception.NotImplemented() # pragma: no cover",
"async def api_delete_service(service_id, g: WalletTypeInfo = Depends(get_key_type)):\n service = await get_service(service_id)\n if not service:\n raise HTTPException(\n status_code=HTTP... | [
"0.7131132",
"0.6633884",
"0.65709394",
"0.6514676",
"0.64775777",
"0.64649606",
"0.63870174",
"0.62843454",
"0.62729317",
"0.6208488",
"0.61268866",
"0.5970281",
"0.5894233",
"0.5855497",
"0.58256984",
"0.57940286",
"0.5753099",
"0.57491475",
"0.57350796",
"0.5727518",
"0.56... | 0.8535084 | 0 |
Fetches all configured IPsecSiteConnections for a tenant. | def list_ipsec_site_connections(self, retrieve_all=True, **_params):
return self.list('ipsec_site_connections',
self.ipsec_site_connections_path,
retrieve_all,
**_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def list_ipsec_site_connections(self, params = None):\n return self._get(self.ipsec_site_connections_path, params=params)",
"def sitecurclntconnections(self) :\n\t\ttry :\n\t\t\treturn self._sitecurclntconnections\n\t\texcept Exception as e:\n\t\t\traise e",
"def sitecursrvrconnections(self) :\n\t\ttry ... | [
"0.6824947",
"0.6580515",
"0.62963605",
"0.58726037",
"0.58188456",
"0.577184",
"0.576312",
"0.5689952",
"0.568255",
"0.5649047",
"0.56165105",
"0.5581331",
"0.5581331",
"0.5549619",
"0.5500349",
"0.5479567",
"0.5465451",
"0.54610753",
"0.5441959",
"0.54153466",
"0.5385822",
... | 0.6998385 | 0 |
Fetches information of a specific IPsecSiteConnection. | def show_ipsec_site_connection(self, ipsecsite_conn, **_params):
return self.get(
self.ipsec_site_connection_path % (ipsecsite_conn), params=_params
) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def show_ipsec_site_connection(self, ipsecsite_conn, params = None):\n return self._get(\n self.ipsec_site_connection_path % (ipsecsite_conn), \n params=params)",
"def test_list_ipsec_site_connection_sort(self):\r\n resources = \"ipsec_site_connections\"\r\n cmd = ipsec... | [
"0.7450395",
"0.5576896",
"0.5492563",
"0.54900134",
"0.53680754",
"0.53537893",
"0.53537893",
"0.5343454",
"0.53011835",
"0.5263764",
"0.52168727",
"0.52108246",
"0.5206001",
"0.519677",
"0.5159286",
"0.5156365",
"0.5137741",
"0.51124835",
"0.5112057",
"0.5110776",
"0.508233... | 0.75371325 | 0 |
Creates a new IPsecSiteConnection. | def create_ipsec_site_connection(self, body=None):
return self.post(self.ipsec_site_connections_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def create_ipsec_site_connection(self,ipsecpolicy_id, ikepolicy_id,\n vpnservice_id, psk, peer_cidrs,\n peer_address, peer_id,\n ipsec_body = None, **kwargs):\n _body = {\n \"psk\":psk,\n ... | [
"0.6654018",
"0.5621504",
"0.5489131",
"0.548049",
"0.54644406",
"0.53190583",
"0.53171176",
"0.5298952",
"0.5275487",
"0.5240896",
"0.52201253",
"0.520641",
"0.5199626",
"0.5149092",
"0.5132901",
"0.5109163",
"0.5025522",
"0.49949932",
"0.4975458",
"0.49691355",
"0.49545088"... | 0.7530423 | 0 |
Deletes the specified IPsecSiteConnection. | def delete_ipsec_site_connection(self, ipsecsite_conn):
return self.delete(self.ipsec_site_connection_path % (ipsecsite_conn)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def delete_ipsec_site_connection(self, ipsecsite_conn):\n return self._delete(self.ipsec_site_connection_path % (ipsecsite_conn))",
"def delete_site(self, site):\n raise NotImplementedError('delete_site')",
"def delete_connection(connectionId=None):\n pass",
"def delete(self, *, session_id, ... | [
"0.81460273",
"0.6630394",
"0.65649563",
"0.6266774",
"0.57655776",
"0.5645305",
"0.5640637",
"0.5458434",
"0.5439951",
"0.542143",
"0.53993154",
"0.5298285",
"0.5274898",
"0.5271059",
"0.5268835",
"0.5235416",
"0.51978004",
"0.51823866",
"0.5166587",
"0.50845057",
"0.5081752... | 0.814508 | 1 |
Fetches a list of all configured IKEPolicies for a tenant. | def list_ikepolicies(self, retrieve_all=True, **_params):
return self.list('ikepolicies', self.ikepolicies_path, retrieve_all,
**_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_list_ikepolicy_sort(self):\r\n resources = \"ikepolicies\"\r\n cmd = ikepolicy.ListIKEPolicy(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n sort_key=[\"name\", \"id\"],\r\n sort_di... | [
"0.6085039",
"0.5921704",
"0.5858558",
"0.57856494",
"0.5732946",
"0.56552166",
"0.5616965",
"0.5488311",
"0.5480259",
"0.54361844",
"0.5299078",
"0.5253691",
"0.5238233",
"0.5227512",
"0.51910096",
"0.51746917",
"0.51731324",
"0.5148066",
"0.5125747",
"0.511701",
"0.51071024... | 0.6754452 | 0 |
Fetches information of a specific IKEPolicy. | def show_ikepolicy(self, ikepolicy, **_params):
return self.get(self.ikepolicy_path % (ikepolicy), params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def policy_info(self) -> 'outputs.PolicyInfoResponse':\n return pulumi.get(self, \"policy_info\")",
"def policy_info(self) -> pulumi.Input['PolicyInfoArgs']:\n return pulumi.get(self, \"policy_info\")",
"def policy(self) -> Optional[pulumi.Input['ServicePolicyArgs']]:\n return pulumi.get(s... | [
"0.6262695",
"0.5901335",
"0.5764992",
"0.5764992",
"0.5665684",
"0.56627756",
"0.5632856",
"0.5620609",
"0.5618095",
"0.5618095",
"0.5601988",
"0.5601988",
"0.5601988",
"0.5590013",
"0.5581297",
"0.5571066",
"0.5571066",
"0.5571066",
"0.5485365",
"0.54431343",
"0.538188",
... | 0.75339586 | 0 |
Creates a new IKEPolicy. | def create_ikepolicy(self, body=None):
return self.post(self.ikepolicies_path, body=body) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def test_create_ikepolicy_with_limited_params(self):\r\n resource = 'ikepolicy'\r\n cmd = ikepolicy.CreateIKEPolicy(test_cli20.MyApp(sys.stdout), None)\r\n name = 'ikepolicy1'\r\n auth_algorithm = 'sha1'\r\n encryption_algorithm = 'aes-128'\r\n ike_version = 'v1'\r\n ... | [
"0.6848917",
"0.6233196",
"0.59121835",
"0.58847517",
"0.5858937",
"0.5731987",
"0.5681851",
"0.5568024",
"0.55357337",
"0.5510469",
"0.5432297",
"0.5336758",
"0.53310496",
"0.5242851",
"0.5161639",
"0.5157356",
"0.51495206",
"0.512693",
"0.50986606",
"0.5097843",
"0.50950825... | 0.7252418 | 0 |
Deletes the specified IKEPolicy. | def delete_ikepolicy(self, ikepolicy):
return self.delete(self.ikepolicy_path % (ikepolicy)) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def policy_delete(request, policy_id):\n neutronclient(request).delete_qos_policy(policy_id)",
"def delete(self, policy_name):\n path = self.vault.normalize(\"/sys/policies/acl/\" + policy_name)\n address = self.vault.vault_adress + \"/v1\" + path\n # Actually run vault\n logging.i... | [
"0.69964254",
"0.66024697",
"0.6523624",
"0.64902747",
"0.643708",
"0.6422639",
"0.63917917",
"0.6078179",
"0.6076956",
"0.5887067",
"0.58149564",
"0.5773822",
"0.57269686",
"0.5725632",
"0.57185996",
"0.5699927",
"0.56955755",
"0.5687687",
"0.5672811",
"0.5672811",
"0.564356... | 0.7832873 | 0 |
Fetches a list of all configured IPsecPolicies for a tenant. | def list_ipsecpolicies(self, retrieve_all=True, **_params):
return self.list('ipsecpolicies',
self.ipsecpolicies_path,
retrieve_all,
**_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def list_policies(self):\n client = self.connect(VAULT_TOKEN)\n return client.list_policies()",
"def ListPolicies(self, request, global_params=None):\n config = self.GetMethodConfig('ListPolicies')\n return self._RunMethod(\n config, request, global_params=global_params)",
"def... | [
"0.63227504",
"0.60403246",
"0.6016396",
"0.5927996",
"0.5792352",
"0.5752553",
"0.5711208",
"0.56451374",
"0.5639545",
"0.56173253",
"0.56097",
"0.5489103",
"0.5458932",
"0.5458366",
"0.5350394",
"0.53385234",
"0.5295462",
"0.5262144",
"0.5258188",
"0.52507967",
"0.52499187"... | 0.64229774 | 0 |
Fetches information of a specific IPsecPolicy. | def show_ipsecpolicy(self, ipsecpolicy, **_params):
return self.get(self.ipsecpolicy_path % (ipsecpolicy), params=_params) | {
"objective": {
"self": [],
"paired": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} | [
"def policy_info(self) -> 'outputs.PolicyInfoResponse':\n return pulumi.get(self, \"policy_info\")",
"def policy_info(self) -> pulumi.Input['PolicyInfoArgs']:\n return pulumi.get(self, \"policy_info\")",
"def get_sp_policy(self, context, id):\n # handling policy method in RPC\n respo... | [
"0.6893736",
"0.6437934",
"0.6352478",
"0.625141",
"0.6120847",
"0.60739225",
"0.60686016",
"0.6029956",
"0.5977029",
"0.5977029",
"0.5977029",
"0.59603256",
"0.59450626",
"0.59450626",
"0.59016365",
"0.59016365",
"0.58998203",
"0.58780444",
"0.58780444",
"0.58780444",
"0.587... | 0.6450577 | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.