query
stringlengths
9
9.05k
document
stringlengths
10
222k
metadata
dict
negatives
listlengths
30
30
negative_scores
listlengths
30
30
document_score
stringlengths
4
10
document_rank
stringclasses
2 values
Gets a localized version of the given message in the given locale.
def get_localized_message(message, user_locale): if isinstance(message, Message): if user_locale: message.locale = user_locale return unicode(message) else: return message
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def localize(self, msg):\n return self.translations.get(msg, msg)", "def localize(self, msg):\n return self.translations.get(msg, msg)", "def gettext(self, message):\n if self._translations.has_key(message):\n return self._translations[message]\n return super(Translations...
[ "0.72277725", "0.72277725", "0.68362045", "0.6571026", "0.65624756", "0.6291454", "0.600911", "0.59312975", "0.58701146", "0.5862935", "0.5831497", "0.5822653", "0.57833225", "0.5775425", "0.5719538", "0.5688827", "0.56843036", "0.5634452", "0.55606395", "0.55445343", "0.5509...
0.74269634
0
Try to import a module and if it fails return default.
def try_import(import_str, default=None): try: return import_module(import_str) except ImportError: return default
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def try_import(module, default=None):\n try:\n return importlib.import_module(module)\n except ImportError:\n return default", "def try_import(name, alternative=None, error_callback=None):\n module_segments = name.split('.')\n last_error = None\n remainder = []\n\n # module_name w...
[ "0.8899236", "0.6928173", "0.67791915", "0.6685252", "0.65540737", "0.6259206", "0.62418336", "0.6109401", "0.6079965", "0.60544294", "0.6047738", "0.59817463", "0.59444374", "0.5879833", "0.5879833", "0.5879833", "0.5872882", "0.586335", "0.586335", "0.5806929", "0.5771291",...
0.8513052
1
Convert a complex object into primitives. Handy for JSON serialization. We can optionally handle instances, but since this is a recursive function, we could have cyclical data structures. To handle cyclical data structures we could track the actual objects visited in a set, but not all objects are hashable. Instead we ...
def to_primitive(value, convert_instances=False, convert_datetime=True, level=0, max_depth=3): # handle obvious types first - order of basic types determined by running # full tests on nova project, resulting in the following counts: # 572754 <type 'NoneType'> # 460353 <type 'int'>...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def toComplex(simpleObject):\n if simpleObject[0] == ENCODING_SIMPLE_PYTHON:\n return simpleObject[1]\n\n if simpleObject[0] == ENCODING_INT:\n return int(simpleObject[1])\n\n if simpleObject[0] == ENCODING_UNICODE:\n return unicode(simpleObject[1], 'utf-8')\n\n if simpleObject[0] ...
[ "0.61621344", "0.6119563", "0.6090617", "0.6067958", "0.5865956", "0.5863861", "0.58078617", "0.5807257", "0.57476157", "0.5735223", "0.57309777", "0.56405354", "0.55863905", "0.5514896", "0.5479702", "0.5463501", "0.5460837", "0.5456098", "0.54283094", "0.5421082", "0.540230...
0.6711862
0
Decodes incoming str using `incoming` if they're not already unicode.
def safe_decode(text, incoming=None, errors='strict'): if not isinstance(text, six.string_types): raise TypeError("%s can't be decoded" % type(text)) if isinstance(text, six.text_type): return text if not incoming: incoming = (sys.stdin.encoding or sys....
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def _string_convert(str):\n if isinstance(str, unicode):\n return str\n try:\n return str.decode(locale.getpreferredencoding(), 'strict')\n except UnicodeError:\n try:\n return str.decode(locale.getpreferredencoding(), 'replace')\n except UnicodeError:\n #...
[ "0.613527", "0.6129397", "0.61197454", "0.61197454", "0.6108033", "0.60947007", "0.60742056", "0.60450315", "0.6007464", "0.597139", "0.59522295", "0.5939489", "0.59168476", "0.5898159", "0.57659566", "0.57568854", "0.56696635", "0.5659861", "0.5652017", "0.5652017", "0.56422...
0.71777135
0
Encodes incoming str/unicode using `encoding`. If incoming is not specified, text is expected to be encoded with current python's default encoding. (`sys.getdefaultencoding`)
def safe_encode(text, incoming=None, encoding='utf-8', errors='strict'): if not isinstance(text, six.string_types): raise TypeError(_("%s can't be encoded") % type(text).capitalize()) if not incoming: incoming = (sys.stdin.encoding or sys.getdefaultenc...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def enc(text):\n if isinstance(text, str):\n return unicode(text, 'utf-8') # TODO: fix in Python 3\n elif isinstance(text, unicode):\n return text.encode('utf-8')\n else:\n raise Exception(\"Unsupported encode format.\")", "def encode_if_unicode(string, encoding):\n if isinstanc...
[ "0.7696079", "0.7556785", "0.7396893", "0.7089631", "0.70645183", "0.70079195", "0.69426465", "0.68694645", "0.68234116", "0.68040186", "0.67836493", "0.6722486", "0.6677304", "0.6631807", "0.6631149", "0.6617003", "0.6581027", "0.65599966", "0.65303785", "0.6508046", "0.6487...
0.810129
0
Return True if before is older than seconds.
def is_older_than(before, seconds): if isinstance(before, six.string_types): before = parse_strtime(before).replace(tzinfo=None) return utcnow() - before > datetime.timedelta(seconds=seconds)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def is_newer_than(after, seconds):\r\n if isinstance(after, six.string_types):\r\n after = parse_strtime(after).replace(tzinfo=None)\r\n return after - utcnow() > datetime.timedelta(seconds=seconds)", "def __gt__(self, other):\n return self.to_seconds() > other.to_seconds()", "def __gt__(se...
[ "0.75806665", "0.7128901", "0.7128901", "0.675787", "0.67280203", "0.6649693", "0.6644542", "0.659305", "0.6543136", "0.65426856", "0.6500086", "0.6485307", "0.6467596", "0.64455134", "0.6390179", "0.6377441", "0.63316554", "0.6306585", "0.62739086", "0.62679946", "0.62333506...
0.8338943
0
Return True if after is newer than seconds.
def is_newer_than(after, seconds): if isinstance(after, six.string_types): after = parse_strtime(after).replace(tzinfo=None) return after - utcnow() > datetime.timedelta(seconds=seconds)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def after(self, time2):\r\n return self.to_seconds() > time2.to_seconds()", "def after(self, time2):\n return self.to_seconds() > time2.to_seconds()", "def is_older_than(before, seconds):\r\n if isinstance(before, six.string_types):\r\n before = parse_strtime(before).replace(tzinfo=None...
[ "0.75669533", "0.742963", "0.71677315", "0.6837955", "0.6765337", "0.67651576", "0.6717801", "0.66049165", "0.66049165", "0.6487326", "0.6445979", "0.6404347", "0.6373316", "0.63638264", "0.63342094", "0.62849617", "0.62745655", "0.62698144", "0.6252573", "0.62229604", "0.619...
0.8153654
0
Timestamp version of our utcnow function.
def utcnow_ts(): return calendar.timegm(utcnow().timetuple())
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def tstamp_now(self):\n return self.tstamp(datetime.datetime.now(tz))", "def get_utc_now_timestamp() -> int:\n return int(datetime.datetime.now(datetime.timezone.utc).timestamp() * 1000)", "def utcnow():\n utctime = datetime.datetime.utcnow()\n utcstamp = utctime.strftime(\"%Y-%m-%d %H:%M:%S\")...
[ "0.7703725", "0.76807797", "0.7659119", "0.7656595", "0.76366156", "0.7590121", "0.7575319", "0.75474936", "0.74716765", "0.7452968", "0.7421942", "0.7407102", "0.7405051", "0.7390046", "0.7380471", "0.7355461", "0.7339692", "0.73166203", "0.7290635", "0.72782147", "0.7266158...
0.8233759
0
Returns a iso8601 formated date from timestamp.
def iso8601_from_timestamp(timestamp): return isotime(datetime.datetime.utcfromtimestamp(timestamp))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def iso8601_date(ts=None):\n ts = _get_gmtime_compatible_timestamp(ts)\n return _time.strftime('%Y-%m-%dT%H:%M:%SZ', _time.gmtime(ts))", "def dateformat(timestamp):\n date = datetime.datetime.fromtimestamp(int(timestamp))\n return date.isoformat()", "def timestamp_to_iso_format(timestamp):\n ...
[ "0.8012124", "0.7738112", "0.7716933", "0.72823215", "0.68830425", "0.674141", "0.66666543", "0.6664841", "0.66526645", "0.6644603", "0.66098595", "0.6549779", "0.65161186", "0.6515649", "0.64987385", "0.64808416", "0.6479994", "0.64681756", "0.6428433", "0.64221674", "0.6414...
0.8048834
0
Advance overridden time using a datetime.timedelta.
def advance_time_delta(timedelta): assert(not utcnow.override_time is None) try: for dt in utcnow.override_time: dt += timedelta except TypeError: utcnow.override_time += timedelta
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def adjust_datetime(self, context, cls):\n if len(self) == 1:\n item = self.get_argument(context, cls=cls)\n if item is None:\n return\n timezone = getattr(context, 'timezone', None)\n else:\n item = self.get_argument(context=None, cls=cls) ...
[ "0.68380433", "0.66254115", "0.64659977", "0.63646716", "0.6361225", "0.63581043", "0.6301279", "0.6256574", "0.6211869", "0.6164993", "0.615476", "0.6144598", "0.6141021", "0.6075093", "0.6029325", "0.5978698", "0.59730417", "0.59617496", "0.59489065", "0.5928276", "0.590779...
0.8217488
0
Advance overridden time by seconds.
def advance_time_seconds(seconds): advance_time_delta(datetime.timedelta(0, seconds))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def set_time(self, sec):\n self.set_timed(round(sec * 10.0))", "def update_time(self, *args):\n s = int(time.time() - self.start_time)\n self.time_label.text = str(datetime.timedelta(seconds=s))", "def advance_time_delta(timedelta):\r\n assert(not utcnow.override_time is None)\r\n tr...
[ "0.7244213", "0.6911929", "0.6668365", "0.6656742", "0.66215026", "0.66198456", "0.6547235", "0.6491218", "0.6487095", "0.6449376", "0.640367", "0.6362363", "0.6350183", "0.63232386", "0.62989", "0.62844735", "0.6274718", "0.62565625", "0.6244701", "0.623354", "0.6226567", ...
0.7406532
0
Remove the overridden time.
def clear_time_override(): utcnow.override_time = None
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def set_time_override(override_time=datetime.datetime.utcnow()):\r\n utcnow.override_time = override_time", "def _rescheduleFromRun(self, newTime):\n if newTime is None:\n self.deleteFromStore()\n else:\n self.time = newTime", "def removeKey(self, timeOrHash) -> None:\n ...
[ "0.70454806", "0.6537983", "0.6353897", "0.63447785", "0.63309777", "0.6303946", "0.61608213", "0.61576796", "0.61400414", "0.6060353", "0.6060353", "0.60440415", "0.60427505", "0.602997", "0.6022398", "0.5985644", "0.5920992", "0.58894193", "0.5835796", "0.58177793", "0.5816...
0.8552338
0
Unmarshall a datetime dict.
def unmarshall_time(tyme): return datetime.datetime(day=tyme['day'], month=tyme['month'], year=tyme['year'], hour=tyme['hour'], minute=tyme['minute'], second=tyme['s...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def object_deserializer(obj):\n for key, val in obj.items():\n if isinstance(val, six.string_types) and DATETIME_REGEX.search(val):\n try:\n obj[key] = dates.localize_datetime(parser.parse(val))\n except ValueError:\n obj[key] = val\n return obj", ...
[ "0.6475352", "0.6210666", "0.5951044", "0.5946126", "0.5938974", "0.5869619", "0.57887393", "0.57838917", "0.5710373", "0.5709906", "0.5632626", "0.56293726", "0.5613223", "0.5601391", "0.55799556", "0.55782783", "0.55162144", "0.5470559", "0.5452197", "0.54498893", "0.544297...
0.62471277
1
Determines if time is going to happen in the next window seconds.
def is_soon(dt, window): soon = (utcnow() + datetime.timedelta(seconds=window)) return normalize_time(dt) <= soon
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def is_soon(dt, window):\n soon = (utcnow() + datetime.timedelta(seconds=window))\n return normalize_time(dt) <= soon", "def is_time(self) -> bool:\n return self.times > 1", "def check_timer(self, wanted_time):\n if time.time() - self.start_time >= wanted_time:\n return True\n ...
[ "0.6890571", "0.6811425", "0.67717886", "0.66800755", "0.66078025", "0.65755785", "0.6574206", "0.6526356", "0.6483012", "0.6468185", "0.6400846", "0.6365922", "0.6289681", "0.62060785", "0.620339", "0.61888176", "0.61633587", "0.61152923", "0.60497886", "0.60265994", "0.5999...
0.6944673
0
Prints all of the commands and options for bashcompletion.
def _bash_completion(self): commands = set() options = set() for option, _action in self.parser._option_string_actions.items(): options.add(option) for command_name, command in self.command_manager: commands.add(command_name) cmd_factory = comma...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def _bash_completion(self):\n commands = set()\n options = set()\n for option, _action in self.parser._option_string_actions.items():\n options.add(option)\n for _name, _command in self.command_manager:\n commands.add(_name)\n cmd_factory = _command.load...
[ "0.79802346", "0.7545891", "0.7025744", "0.6869114", "0.6737863", "0.6437739", "0.6415718", "0.632363", "0.6310732", "0.6304526", "0.62999326", "0.62967926", "0.62749267", "0.62413514", "0.6151045", "0.6119202", "0.60870105", "0.6063573", "0.6057972", "0.60484487", "0.6011146...
0.7938483
1
firewallcreate with mandatory (none) params.
def test_create_firewall_with_mandatory_params(self): resource = 'firewall' cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None) name = '' tenant_id = 'my-tenant' my_id = 'my-id' policy_id = 'my-policy-id' args = ['--tenant-id', tenant_id, poli...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_firewall_with_all_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = 'my-name'\r\n description = 'my-desc'\r\n policy_id = 'my-policy-id'\r\n tenant_id = 'my-tenant'\r\n my_id = 'm...
[ "0.75042325", "0.72588027", "0.7086794", "0.68198645", "0.6449614", "0.6378677", "0.6321848", "0.6231331", "0.5972507", "0.587128", "0.5781027", "0.5777939", "0.5708138", "0.5690244", "0.5599123", "0.5531077", "0.53636706", "0.5336756", "0.52938557", "0.5269666", "0.5262774",...
0.81828576
0
firewallcreate with all params set.
def test_create_firewall_with_all_params(self): resource = 'firewall' cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None) name = 'my-name' description = 'my-desc' policy_id = 'my-policy-id' tenant_id = 'my-tenant' my_id = 'my-id' args...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_firewall_with_mandatory_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = ''\r\n tenant_id = 'my-tenant'\r\n my_id = 'my-id'\r\n policy_id = 'my-policy-id'\r\n args = ['--tenant-i...
[ "0.7283879", "0.7081907", "0.675774", "0.6435687", "0.63719034", "0.6191783", "0.58883786", "0.56545216", "0.5621425", "0.56054366", "0.5558848", "0.5558848", "0.55515474", "0.55184793", "0.5462888", "0.5456363", "0.5414127", "0.5410806", "0.53997785", "0.53982896", "0.538742...
0.73971164
0
firewallpolicycreate with mandatory (none) params only.
def test_create_firewall_policy_with_mandatory_params(self): resource = 'firewall_policy' cmd = firewallpolicy.CreateFirewallPolicy(test_cli20.MyApp(sys.stdout), None) tenant_id = 'my-tenant' name = 'my-name' my_id = 'myid' ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_firewall_with_mandatory_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = ''\r\n tenant_id = 'my-tenant'\r\n my_id = 'my-id'\r\n policy_id = 'my-policy-id'\r\n args = ['--tenant-i...
[ "0.74847823", "0.7104371", "0.7095416", "0.64407015", "0.6407723", "0.6371449", "0.6298104", "0.6097693", "0.60709304", "0.6019739", "0.6015871", "0.59274614", "0.588896", "0.58118904", "0.5725704", "0.566305", "0.56621164", "0.5642048", "0.563379", "0.5562329", "0.5535799", ...
0.80134904
0
firewallpolicycreate with all params set.
def test_create_firewall_policy_with_all_params(self): resource = 'firewall_policy' cmd = firewallpolicy.CreateFirewallPolicy(test_cli20.MyApp(sys.stdout), None) name = 'my-name' description = 'my-desc' firewall_rules_arg = ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_firewall_policy(self, body=None):\r\n return self.post(self.firewall_policies_path, body=body)", "def test_create_firewall_policy_with_mandatory_params(self):\r\n resource = 'firewall_policy'\r\n cmd = firewallpolicy.CreateFirewallPolicy(test_cli20.MyApp(sys.stdout),\r\n ...
[ "0.7227376", "0.7046867", "0.6664562", "0.66510797", "0.65198874", "0.6386277", "0.63337016", "0.60985684", "0.6056319", "0.6051337", "0.6025777", "0.5809092", "0.5799633", "0.5783354", "0.56897515", "0.56619143", "0.5655164", "0.56401306", "0.5620469", "0.5619255", "0.561086...
0.7224969
1
firewallpolicyupdate myid name newname.
def test_update_firewall_policy(self): resource = 'firewall_policy' cmd = firewallpolicy.UpdateFirewallPolicy(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def update_policy(self, *args, **kwargs):\r\n pass", "def test_update_firewall_rule(self):\r\n resource = 'firewall_rule'\r\n cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout),\r\n None)\r\n self._test_update_resource(resou...
[ "0.65458906", "0.6541915", "0.6493247", "0.6469396", "0.6254555", "0.62210476", "0.60345596", "0.59741807", "0.5972608", "0.58833975", "0.5773749", "0.5773749", "0.5710767", "0.56927264", "0.5661171", "0.5610219", "0.5580246", "0.5530781", "0.5486284", "0.547433", "0.54298913...
0.77794296
0
firewallpolicyinsertrule myid newruleid insertbefore ruleAid insertafter ruleBid
def test_insert_firewall_rule(self): resource = 'firewall_policy' cmd = firewallpolicy.FirewallPolicyInsertRule( test_cli20.MyApp(sys.stdout), None) myid = 'myid' args = ['myid', 'newrule', '--insert-before', 'rule2', '--ins...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def insert(self, rule, ident):\n raise NotImplementedError", "def firewall_policy_insert_rule(self, firewall_policy, body=None):\r\n return self.put(self.firewall_policy_insert_path % (firewall_policy),\r\n body=body)", "def insert(self, rule, ident=None):\n if ident...
[ "0.6126452", "0.600289", "0.59871745", "0.59802485", "0.5979399", "0.5914543", "0.58061755", "0.5769279", "0.57522404", "0.5746675", "0.5740453", "0.5724012", "0.56661963", "0.56576926", "0.55689234", "0.5551167", "0.5522083", "0.54825217", "0.54779536", "0.541634", "0.540053...
0.65104985
0
firewallrulecreate with mandatory (none) params only.
def _test_create_firewall_rule_with_mandatory_params(self, enabled): resource = 'firewall_rule' cmd = firewallrule.CreateFirewallRule(test_cli20.MyApp(sys.stdout), None) tenant_id = 'my-tenant' name = '' my_id = 'myid' ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_firewall_with_mandatory_params(self):\r\n resource = 'firewall'\r\n cmd = firewall.CreateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n name = ''\r\n tenant_id = 'my-tenant'\r\n my_id = 'my-id'\r\n policy_id = 'my-policy-id'\r\n args = ['--tenant-i...
[ "0.73374516", "0.68870384", "0.67805904", "0.67397535", "0.65541065", "0.64010406", "0.62665415", "0.62609255", "0.6253124", "0.6087303", "0.6067969", "0.5791942", "0.5755012", "0.5722783", "0.566182", "0.56485677", "0.5640545", "0.5612639", "0.55924505", "0.5589652", "0.5579...
0.71403986
1
firewallrulecreate with all params set.
def _setup_create_firewall_rule_with_all_params(self, protocol='tcp'): resource = 'firewall_rule' cmd = firewallrule.CreateFirewallRule(test_cli20.MyApp(sys.stdout), None) name = 'my-name' description = 'my-desc' source_ip = '19...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_firewall_rule(self, body=None):\r\n return self.post(self.firewall_rules_path, body=body)", "def create_firewall_rule(self, ipaddressid, protocol, cidrlist, ftype, \n startport=None, endport=None,\n icmpcode=None, icmptype=None...
[ "0.7099152", "0.66194886", "0.6589396", "0.6569594", "0.65399396", "0.63816446", "0.63702446", "0.6355696", "0.6311436", "0.615654", "0.6075271", "0.601864", "0.6016736", "0.59636486", "0.59064037", "0.5876677", "0.5858481", "0.58059895", "0.5805957", "0.5805957", "0.57828534...
0.7010607
1
firewallrulelist sortkey name sortkey id sortkey asc sortkey desc
def test_list_firewall_rules_sort(self): resources = "firewall_rules" cmd = firewallrule.ListFirewallRule(test_cli20.MyApp(sys.stdout), None) self._test_list_resources(resources, cmd, sort_key=["name", "id"], ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def sortby(self):\n ...", "def sort_key(self):\n ...", "def keysort(predicate_name, predicates_rules):\n if predicate_name in predicates_rules:\n if \"priority\" in predicates_rules[predicate_name]:\n return predicates_rules[predicate_name][\"priority\"]\n else:\n ...
[ "0.59777766", "0.5830575", "0.5722159", "0.5674791", "0.5620771", "0.5555538", "0.5521349", "0.5521349", "0.5518125", "0.5486883", "0.544251", "0.54321384", "0.5402341", "0.5395841", "0.5370548", "0.53655934", "0.5359779", "0.5359703", "0.52972716", "0.5283765", "0.5271728", ...
0.7548015
0
firewallruleupdate myid name newname.
def test_update_firewall_rule(self): resource = 'firewall_rule' cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--name', 'ne...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_update_firewall(self):\r\n resource = 'firewall'\r\n cmd = firewall.UpdateFirewall(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid', '--name', 'newname'],\r\n {'nam...
[ "0.6726898", "0.6545427", "0.59362066", "0.585473", "0.5634301", "0.562206", "0.5549964", "0.5497431", "0.54829466", "0.5472702", "0.54453135", "0.54428446", "0.54215", "0.54095495", "0.53876907", "0.53836715", "0.53456855", "0.529848", "0.5265227", "0.5205022", "0.5204525", ...
0.7590829
0
firewallruleupdate myid protocol any.
def test_update_firewall_rule_protocol(self): resource = 'firewall_rule' cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--p...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_update_firewall_rule(self):\r\n resource = 'firewall_rule'\r\n cmd = firewallrule.UpdateFirewallRule(test_cli20.MyApp(sys.stdout),\r\n None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid'...
[ "0.7380702", "0.6379193", "0.625408", "0.61188865", "0.6046731", "0.59001243", "0.5834598", "0.5744176", "0.5652843", "0.5650109", "0.5648755", "0.56397355", "0.5628272", "0.5603399", "0.5588911", "0.5585106", "0.5569495", "0.5545001", "0.55222887", "0.5468459", "0.5412534", ...
0.7347367
1
lbhealthmonitorcreate with mandatory params only.
def test_create_healthmonitor_with_mandatory_params(self): resource = 'health_monitor' cmd = healthmonitor.CreateHealthMonitor(test_cli20.MyApp(sys.stdout), None) admin_state_up = False delay = '60' max_retries = '2' ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_health_monitor(request, **kwargs):\n data = request.DATA\n\n conn = get_sdk_connection(request)\n health_mon = conn.load_balancer.create_health_monitor(\n type=data['monitor']['type'],\n delay=data['monitor']['delay'],\n timeout=data['monitor']['timeout'],\n max_retr...
[ "0.7387556", "0.72221184", "0.71751076", "0.70800364", "0.6876045", "0.68227184", "0.6370052", "0.6214035", "0.61889005", "0.60908353", "0.6054197", "0.60230976", "0.57612705", "0.5450705", "0.5418795", "0.54175", "0.5385182", "0.53791326", "0.5378128", "0.5341816", "0.528777...
0.7544033
0
lbhealthmonitorlist sortkey name sortkey id sortkey asc sortkey desc
def test_list_healthmonitors_sort(self): resources = "health_monitors" cmd = healthmonitor.ListHealthMonitor(test_cli20.MyApp(sys.stdout), None) self._test_list_resources(resources, cmd, sort_key=["name", "id"],...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def sortby(self):\n ...", "def sort_key(self):\n ...", "def sort(self, key: str):\n return self._select_interface(self._rc_sort, self._http_sort, key)", "def SortList(self, key: callable = str.lower):\n temp_list = self.Items\n temp_list.sort(key=key)\n # delete cont...
[ "0.59466326", "0.5860596", "0.5763932", "0.57237047", "0.5625188", "0.55186325", "0.55053836", "0.5447963", "0.54419667", "0.5387238", "0.5366027", "0.5333365", "0.530422", "0.52928144", "0.52583086", "0.52547413", "0.52156097", "0.5210766", "0.52074707", "0.5192528", "0.5187...
0.7249101
0
lbmemberlist sortkey name sortkey id sortkey asc sortkey desc
def test_list_members_sort(self): resources = "members" cmd = member.ListMember(test_cli20.MyApp(sys.stdout), None) self._test_list_resources(resources, cmd, sort_key=["name", "id"], sort_dir=["asc", "desc"])
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def sortby(self):\n ...", "def sort_key(self):\n ...", "def sort_members_in_alphabetical_order(interface):\n sorted_interface = OrderedDict()\n for member_type in EXTATTRIBUTES_AND_MEMBER_TYPES:\n member_names = []\n sorted_member_names = OrderedDict()\n sorted_members ...
[ "0.6502986", "0.62657225", "0.6116419", "0.61036575", "0.6045896", "0.6022776", "0.5908604", "0.58976036", "0.58546114", "0.58435214", "0.58352995", "0.5829511", "0.5806374", "0.57467383", "0.5745424", "0.57278883", "0.5667303", "0.55992967", "0.5594694", "0.5586259", "0.5557...
0.6443432
1
lbmemberupdate myid name myname tags a b.
def test_update_member(self): resource = 'member' cmd = member.UpdateMember(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--name', 'myname', '--tags', 'a', 'b'], ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def updateTag(self, authenticationToken, tag):\r\n pass", "def update_tag(tag):\n remove_tag(tag)\n add_tag(tag)", "def update_existing_entry(client, list_id, mail_addr, merge_fields, l_tags):\n # hash mail address \n mail_h = hash_string(mail_addr)\n # send entry\n try:\n re...
[ "0.5852788", "0.5708155", "0.55530024", "0.5362324", "0.525218", "0.52321696", "0.52134573", "0.5193489", "0.5172181", "0.5155497", "0.51532125", "0.5148244", "0.5132139", "0.5130163", "0.51139617", "0.50862575", "0.50836533", "0.50336367", "0.5018076", "0.5008931", "0.499413...
0.5966063
0
lbpoolcreate with mandatory params only.
def test_create_pool_with_mandatory_params(self): resource = 'pool' cmd = pool.CreatePool(test_cli20.MyApp(sys.stdout), None) name = 'my-name' lb_method = 'ROUND_ROBIN' protocol = 'HTTP' subnet_id = 'subnet-id' tenant_id = 'my-tenant' my_id = 'my-i...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_pool(request, **kwargs):\n data = request.DATA\n\n conn = get_sdk_connection(request)\n pool = conn.load_balancer.create_pool(\n protocol=data['pool']['protocol'],\n lb_algorithm=data['pool']['lb_algorithm'],\n session_persistence=data['pool'].get('session_persistence'),\n ...
[ "0.7355699", "0.72982085", "0.707516", "0.695379", "0.6923354", "0.68413204", "0.67543787", "0.66024584", "0.6463393", "0.6327132", "0.6311021", "0.6294826", "0.6267304", "0.625105", "0.61175036", "0.60841894", "0.60591257", "0.59672767", "0.5951157", "0.593507", "0.5874282",...
0.7772898
0
lbpoollist sortkey name sortkey id sortkey asc sortkey desc
def test_list_pools_sort(self): resources = "pools" cmd = pool.ListPool(test_cli20.MyApp(sys.stdout), None) self._test_list_resources(resources, cmd, sort_key=["name", "id"], sort_dir=["asc", "desc"])
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def sortby(self):\n ...", "def sort_key(self):\n ...", "def SortList(self, key: callable = str.lower):\n temp_list = self.Items\n temp_list.sort(key=key)\n # delete contents of present listbox\n self.delete(0, Tags.End.value)\n # load listbox with sorted data\n ...
[ "0.627822", "0.62093514", "0.59084535", "0.580129", "0.5753239", "0.57481724", "0.57344675", "0.570559", "0.5693311", "0.56343687", "0.562264", "0.5578885", "0.5554106", "0.5535836", "0.5518113", "0.5512986", "0.55051523", "0.5442103", "0.54178345", "0.54178345", "0.5412351",...
0.6728168
0
lbpoolupdate myid name newname tags a b.
def test_update_pool(self): resource = 'pool' cmd = pool.UpdatePool(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--name', 'newname'], {'name': 'newname', })
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def update_listener_pool(self, service, name, bigips):\n vip = self.service_adapter.get_virtual_name(service)\n if vip:\n vip[\"pool\"] = name\n for bigip in bigips:\n v = bigip.tm.ltm.virtuals.virtual\n if v.exists(name=vip[\"name\"], partition=vip...
[ "0.6342126", "0.5952895", "0.58864206", "0.57931834", "0.57232237", "0.5718351", "0.55714387", "0.555825", "0.55182296", "0.5479502", "0.5441453", "0.54374236", "0.5436243", "0.54339063", "0.5398005", "0.5364105", "0.53386134", "0.52923423", "0.5282463", "0.52583003", "0.5249...
0.60449564
1
lbvipcreate with all mandatory params.
def test_create_vip_with_mandatory_params(self): resource = 'vip' cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None) pool_id = 'my-pool-id' name = 'my-name' subnet_id = 'subnet-id' protocol_port = '1000' protocol = 'TCP' tenant_id = 'my-tenant...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_vip_with_mandatory_params(self):\n resource = 'vip'\n cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None)\n pool_id = 'my-pool-id'\n name = 'my-name'\n subnet_id = 'subnet-id'\n protocol_port = '1000'\n protocol = 'TCP'\n tenant_id = 'my-t...
[ "0.74199384", "0.7266978", "0.71127284", "0.70969236", "0.7037579", "0.62459636", "0.62245834", "0.6105984", "0.5917377", "0.5911766", "0.5885074", "0.5866027", "0.5851251", "0.58358413", "0.58268726", "0.57852036", "0.578137", "0.5770711", "0.5756736", "0.56653243", "0.56644...
0.7440872
0
lbvipcreate with mandatory and sessionpersistence params.
def test_create_vip_with_session_persistence_params(self): resource = 'vip' cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None) pool_id = 'my-pool-id' name = 'my-name' subnet_id = 'subnet-id' protocol_port = '1000' protocol = 'TCP' tenant_id = ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_vip_with_session_persistence_params(self):\n resource = 'vip'\n cmd = vip.CreateVip(test_cli20.MyApp(sys.stdout), None)\n pool_id = 'my-pool-id'\n name = 'my-name'\n subnet_id = 'subnet-id'\n protocol_port = '1000'\n protocol = 'TCP'\n tenant_...
[ "0.6996373", "0.6569359", "0.6513687", "0.63645", "0.62813395", "0.625031", "0.5985319", "0.5824457", "0.57667637", "0.57467985", "0.5722702", "0.56227684", "0.55838597", "0.5567695", "0.5509529", "0.55002016", "0.5488648", "0.54571265", "0.54154706", "0.5401678", "0.5397481"...
0.6998259
0
lbvipupdate myid name myname tags a b.
def test_update_vip(self): resource = 'vip' cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--name', 'myname', '--tags', 'a', 'b'], ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_update_vip(self):\n resource = 'vip'\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\n self._test_update_resource(resource, cmd, 'myid',\n ['myid', '--name', 'myname',\n '--tags', 'a', 'b'],\n ...
[ "0.64373565", "0.60245734", "0.59331405", "0.5930392", "0.5815289", "0.57713777", "0.56657034", "0.5650916", "0.5625454", "0.56197125", "0.5593169", "0.55918944", "0.5573543", "0.54855055", "0.5466616", "0.54563904", "0.54267275", "0.5406278", "0.5365563", "0.53224146", "0.52...
0.66065574
0
Test that Client.get_auth_info() works even if client was instantiated with predefined token.
def test_reused_token_get_auth_info(self): client_ = client.HTTPClient(username=USERNAME, tenant_name=TENANT_NAME, token=TOKEN, password=PASSWORD, auth_url=AUTH_UR...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_read_o_auth_client(self):\n pass", "def test_read_o_auth_client_authorization(self):\n pass", "def test_get_token(self):\n token = self.client.get_token()\n assert_equals(token, self.client.token)", "def test_token_authenticator():\n token = TokenAuthenticator(\"test-t...
[ "0.74461716", "0.73803073", "0.7377959", "0.6871848", "0.6865224", "0.68607444", "0.6856917", "0.6821779", "0.68041027", "0.679124", "0.677962", "0.6766453", "0.6674288", "0.6657574", "0.6640797", "0.66345286", "0.66312987", "0.66130656", "0.66099536", "0.6590054", "0.6547094...
0.8669687
0
Create a metering label.
def test_create_metering_label(self): resource = 'metering_label' cmd = metering.CreateMeteringLabel( test_cli20.MyApp(sys.stdout), None) name = 'my label' myid = 'myid' description = 'my description' args = [name, '--description', description, '--share...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_metering_label(self, body=None):\r\n return self.post(self.metering_labels_path, body=body)", "def create_metering_label_rule(self, body=None):\r\n return self.post(self.metering_label_rules_path, body=body)", "def create_label(self, name: str):\n return create_label(self.api_ke...
[ "0.77936196", "0.6822932", "0.6697742", "0.6647435", "0.6602967", "0.6392292", "0.625566", "0.62186307", "0.6197961", "0.608764", "0.60417825", "0.603417", "0.598905", "0.5958657", "0.59500337", "0.58386", "0.58200043", "0.58174956", "0.580983", "0.57898045", "0.5780329", "...
0.79057693
0
Delete a metering label.
def test_delete_metering_label(self): resource = 'metering_label' cmd = metering.DeleteMeteringLabel( test_cli20.MyApp(sys.stdout), None) myid = 'myid' args = [myid] self._test_delete_resource(resource, cmd, myid, args)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete_metering_label(self, label):\r\n return self.delete(self.metering_label_path % (label))", "def delete_metering_label_rule(self, rule):\r\n return self.delete(self.metering_label_rule_path % (rule))", "def delete_label(self, label_id: str):\n return delete_label(self.api_key, lab...
[ "0.89883643", "0.7607277", "0.7178897", "0.6987412", "0.69216126", "0.6780957", "0.6665464", "0.6630819", "0.64464206", "0.6433518", "0.6346462", "0.6294747", "0.62444407", "0.61471426", "0.613388", "0.6080339", "0.6033608", "0.5991414", "0.5983423", "0.59752935", "0.5922084"...
0.83897954
1
Create a qos queue.
def test_create_qos_queue(self): resource = 'qos_queue' cmd = qos.CreateQoSQueue( test_cli20.MyApp(sys.stdout), None) myid = 'myid' name = 'my_queue' default = False args = ['--default', default, name] position_names = ['name', 'default'] ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_qos_queue(self, body=None):\r\n return self.post(self.qos_queues_path, body=body)", "def post_qos_queue_create(self, resource_dict):\n pass", "def pre_qos_queue_create(self, resource_dict):\n pass", "def create_qos(self, specs):\n aname = \"cinder_v%s.create_qos\" % sel...
[ "0.8185874", "0.73180425", "0.72160995", "0.72153395", "0.716852", "0.698072", "0.6829998", "0.6647159", "0.65395284", "0.6425167", "0.62928766", "0.6290166", "0.62852246", "0.62071264", "0.61866313", "0.61802065", "0.614668", "0.6122831", "0.6100696", "0.6072488", "0.6061471...
0.8327914
0
vpnikepolicycreate with limited params.
def test_create_ikepolicy_with_limited_params(self): resource = 'ikepolicy' cmd = ikepolicy.CreateIKEPolicy(test_cli20.MyApp(sys.stdout), None) name = 'ikepolicy1' auth_algorithm = 'sha1' encryption_algorithm = 'aes-128' ike_version = 'v1' phase1_negotiatio...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def policy_create(request, **kwargs):\n body = {'policy': kwargs}\n policy = neutronclient(request).create_qos_policy(body=body).get('policy')\n return QoSPolicy(policy)", "def test_create_ipsecpolicy_with_limited_params(self):\r\n resource = 'ipsecpolicy'\r\n cmd = ipsecpolicy.CreateIPsec...
[ "0.67605174", "0.63373864", "0.62043536", "0.61684865", "0.60333085", "0.59879845", "0.5895114", "0.58576226", "0.5845144", "0.57666504", "0.5718104", "0.5632918", "0.5608093", "0.5539884", "0.55350953", "0.55115455", "0.5504053", "0.54954237", "0.54552156", "0.54532194", "0....
0.68596905
0
vpnikepolicylist sortkey name sortkey id sortkey asc sortkey desc
def test_list_ikepolicy_sort(self): resources = "ikepolicies" cmd = ikepolicy.ListIKEPolicy(test_cli20.MyApp(sys.stdout), None) self._test_list_resources(resources, cmd, sort_key=["name", "id"], sort_dir=["asc", "desc"])
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_list_ipsecpolicy_sort(self):\r\n resources = \"ipsecpolicies\"\r\n cmd = ipsecpolicy.ListIPsecPolicy(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n sort_key=[\"name\", \"id\"],\r\n ...
[ "0.6703592", "0.65234053", "0.64397544", "0.61177826", "0.6072396", "0.59171295", "0.5902732", "0.5902732", "0.5901417", "0.58824617", "0.5881479", "0.58443946", "0.58150613", "0.5776039", "0.5760045", "0.5718927", "0.570713", "0.56954855", "0.5681255", "0.56656426", "0.56644...
0.71034634
0
vpnikepolicyupdate myid name newname tags a b.
def test_update_ikepolicy(self): resource = 'ikepolicy' cmd = ikepolicy.UpdateIKEPolicy(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--name', 'newname'], {'name': 'newnam...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def update_policy(self, *args, **kwargs):\r\n pass", "def update_policy(self):\n pass", "def test_update_vip(self):\r\n resource = 'vip'\r\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ...
[ "0.63625985", "0.5746712", "0.5689816", "0.56131184", "0.54967767", "0.548697", "0.54793257", "0.53812796", "0.5306516", "0.52892566", "0.5274082", "0.5250518", "0.5247099", "0.5220096", "0.5204185", "0.51909995", "0.5156048", "0.51376456", "0.5125405", "0.5110084", "0.509900...
0.664246
0
vpnipsecpolicycreate all params with dashes.
def test_create_ipsecpolicy_all_params(self): resource = 'ipsecpolicy' cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None) name = 'ipsecpolicy1' description = 'first-ipsecpolicy1' auth_algorithm = 'sha1' encryption_algorithm = 'aes-256' ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_ipsecpolicy_with_limited_params(self):\r\n resource = 'ipsecpolicy'\r\n cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None)\r\n name = 'ipsecpolicy1'\r\n auth_algorithm = 'sha1'\r\n encryption_algorithm = 'aes-128'\r\n encapsulation_mode...
[ "0.73695415", "0.69182694", "0.63075495", "0.60743695", "0.59209335", "0.57737", "0.55147815", "0.5427981", "0.53997797", "0.5395826", "0.539565", "0.5372647", "0.53380567", "0.532366", "0.5307293", "0.5217004", "0.5211959", "0.5211959", "0.5199746", "0.5167236", "0.5164368",...
0.7212561
1
vpnipsecpolicycreate with limited params.
def test_create_ipsecpolicy_with_limited_params(self): resource = 'ipsecpolicy' cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None) name = 'ipsecpolicy1' auth_algorithm = 'sha1' encryption_algorithm = 'aes-128' encapsulation_mode = 'tunnel' ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_ipsecpolicy(self, body=None):\r\n return self.post(self.ipsecpolicies_path, body=body)", "def test_create_ipsecpolicy_all_params(self):\r\n resource = 'ipsecpolicy'\r\n cmd = ipsecpolicy.CreateIPsecPolicy(test_cli20.MyApp(sys.stdout), None)\r\n name = 'ipsecpolicy1'\r\n ...
[ "0.7234446", "0.68033886", "0.66819644", "0.6222569", "0.5806694", "0.5650765", "0.5503857", "0.5400083", "0.5344261", "0.5315673", "0.53110784", "0.52840865", "0.527926", "0.52128357", "0.5198836", "0.51901317", "0.5150349", "0.51397806", "0.5139367", "0.5134339", "0.5099963...
0.7606524
0
vpnipsecpolicylist sortkey name sortkey id sortkey asc sortkey desc
def test_list_ipsecpolicy_sort(self): resources = "ipsecpolicies" cmd = ipsecpolicy.ListIPsecPolicy(test_cli20.MyApp(sys.stdout), None) self._test_list_resources(resources, cmd, sort_key=["name", "id"], sort_dir=["asc", "de...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_list_ikepolicy_sort(self):\r\n resources = \"ikepolicies\"\r\n cmd = ikepolicy.ListIKEPolicy(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n sort_key=[\"name\", \"id\"],\r\n sort_di...
[ "0.67242914", "0.6391294", "0.62031144", "0.6190055", "0.61493236", "0.5974455", "0.59224576", "0.592214", "0.59109926", "0.58995634", "0.5834045", "0.5801107", "0.57911587", "0.57911587", "0.5736912", "0.5724981", "0.57087", "0.56801695", "0.56698406", "0.5638582", "0.558947...
0.74882025
0
vpnipsecpolicyupdate myid name newname tags a b.
def test_update_ipsecpolicy(self): resource = 'ipsecpolicy' cmd = ipsecpolicy.UpdateIPsecPolicy(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--name', 'newname'], {'name':...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_update_vip(self):\r\n resource = 'vip'\r\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid', '--name', 'myname',\r\n '--tags', 'a', 'b'],\r\n ...
[ "0.5947284", "0.58341014", "0.5740992", "0.5528917", "0.5466148", "0.5444772", "0.53655964", "0.5356423", "0.5328389", "0.52295077", "0.5195847", "0.51908064", "0.51708996", "0.5131637", "0.5131508", "0.51128143", "0.505605", "0.5028969", "0.5017572", "0.49885267", "0.4941475...
0.6408668
0
ipsecsiteconnectionlist. sortkey name sortkey id sortkey asc sortkey desc
def test_list_ipsec_site_connection_sort(self): resources = "ipsec_site_connections" cmd = ipsec_site_connection.ListIPsecSiteConnection( test_cli20.MyApp(sys.stdout), None ) self._test_list_resources(resources, cmd, sort_key=["name", "...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def sort(self, key: str):\n return self._select_interface(self._rc_sort, self._http_sort, key)", "def sort_key(self):\n ...", "def connection_sort_key(conn):\n\n conn_rec_state = ConnRecord.State.get(conn[\"state\"])\n if conn_rec_state is ConnRecord.State.ABANDONED:\n pfx = \"2\"\n ...
[ "0.63405454", "0.6340223", "0.6314149", "0.6097196", "0.57135284", "0.56152034", "0.55581367", "0.5535343", "0.5523954", "0.5521395", "0.5507526", "0.54851496", "0.54228103", "0.5417764", "0.5417227", "0.5414423", "0.5414423", "0.5402862", "0.52935183", "0.5264412", "0.525181...
0.66013426
0
vpnservicecreate with limited params.
def test_create_vpnservice_with_limited_params(self): resource = 'vpnservice' cmd = vpnservice.CreateVPNService(test_cli20.MyApp(sys.stdout), None) subnet = 'mysubnet-id' router = 'myrouter-id' tenant_id = 'mytenant-id' my_id = 'my-id' admin_state = True ...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_vpnservice(self, body=None):\r\n return self.post(self.vpnservices_path, body=body)", "def new_t1_vpn_service(**kwargs):\n proxy = kwargs['proxy']\n session_token = kwargs['sessiontoken']\n display_name = kwargs['display_name']\n t1g = kwargs['tier1_gateway']\n service = kwargs['...
[ "0.70959985", "0.6840321", "0.62186426", "0.6188994", "0.6004818", "0.5956649", "0.58862764", "0.5827628", "0.5777773", "0.5753519", "0.56439525", "0.5605965", "0.55860615", "0.5533064", "0.5523949", "0.55233705", "0.55164105", "0.5459404", "0.5457873", "0.5439549", "0.543954...
0.7601816
0
vpnservicelist sortkey name sortkey id sortkey asc sortkey desc
def test_list_vpnservice_sort(self): resources = "vpnservices" cmd = vpnservice.ListVPNService(test_cli20.MyApp(sys.stdout), None) self._test_list_resources(resources, cmd, sort_key=["name", "id"], sort_dir=["asc", "desc"])
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def sort(self, key: str):\n return self._select_interface(self._rc_sort, self._http_sort, key)", "def test_list_vips_sort(self):\r\n resources = \"vips\"\r\n cmd = vip.ListVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n ...
[ "0.63703066", "0.61061853", "0.60698044", "0.60150844", "0.59789616", "0.5975713", "0.5869214", "0.5810832", "0.5778297", "0.5718343", "0.5699173", "0.5675813", "0.5645624", "0.5600735", "0.55357623", "0.55282575", "0.55243665", "0.5522524", "0.55137986", "0.54805565", "0.545...
0.8074301
0
vpnserviceupdate myid name newname tags a b.
def test_update_vpnservice(self): resource = 'vpnservice' cmd = vpnservice.UpdateVPNService(test_cli20.MyApp(sys.stdout), None) self._test_update_resource(resource, cmd, 'myid', ['myid', '--name', 'newname'], {'name': 'ne...
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_update_vip(self):\r\n resource = 'vip'\r\n cmd = vip.UpdateVip(test_cli20.MyApp(sys.stdout), None)\r\n self._test_update_resource(resource, cmd, 'myid',\r\n ['myid', '--name', 'myname',\r\n '--tags', 'a', 'b'],\r\n ...
[ "0.6304507", "0.6097116", "0.6065094", "0.5950057", "0.5797516", "0.57872784", "0.5762277", "0.5693147", "0.56716585", "0.5671021", "0.56150347", "0.55360514", "0.5519476", "0.5514524", "0.55011", "0.5480793", "0.548057", "0.5445134", "0.54063755", "0.53976214", "0.5396411", ...
0.6784633
0
Generic handler for negative lifetime tests.
def _test_validate_lifetime_negative_test_case(self, input_str): self.assertRaises(exceptions.CommandError, vpn_utils.validate_lifetime_dict, (input_str))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_negative_timedelta(self):\n @converters.wrap\n def inner_test(param: datetime.timedelta):\n \"\"\"This shouldn't be called, converting should fail.\"\"\"\n pass\n self.assert_raises_request_error(\n lambda: inner_test(param='-60'), 3117\n )", ...
[ "0.6004946", "0.56166583", "0.5580307", "0.55326796", "0.5451962", "0.54277414", "0.54138", "0.5377915", "0.537539", "0.53710616", "0.5328369", "0.532568", "0.53064287", "0.52620983", "0.5247853", "0.51848763", "0.51784873", "0.51591665", "0.5138147", "0.51340395", "0.5123574...
0.5692034
1
Fetch tenant info in server's context for following quota operation.
def get_quotas_tenant(self, **_params): return self.get(self.quota_path % 'tenant', params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def tenant(self, request):\n warnings.warn(\n '\"tenant\" Quota API method is deprecated, use \"project\" instead')\n return self._project(request, 'tenant')", "def show_quota(self, tenant_id, **_params):\r\n return self.get(self.quota_path % (tenant_id), params=_params)", "def ...
[ "0.7046992", "0.6956089", "0.69095504", "0.6841608", "0.6819722", "0.6819133", "0.66917735", "0.61991566", "0.6149468", "0.6072379", "0.60317415", "0.5986429", "0.5978525", "0.5923107", "0.59088004", "0.58969223", "0.588125", "0.5859193", "0.5820377", "0.5808257", "0.5777847"...
0.74023384
0
Fetch all tenants' quotas.
def list_quotas(self, **_params): return self.get(self.quotas_path, params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def get(self, tenant_id):\n response = self.client.get('/quotas/%s' % tenant_id)\n\n return response.json()", "def quotas(self) -> Iterable[dto.Quota]:\n raise errors.UnsupportedOperationError(\n \"Operation not supported for provider '{}'\".format(self.provider_name)\n )",...
[ "0.66022927", "0.6599447", "0.64777046", "0.63926065", "0.60388297", "0.6008488", "0.5831066", "0.58260214", "0.57410496", "0.56690055", "0.5601002", "0.5509881", "0.54818875", "0.54697114", "0.54492724", "0.5433787", "0.5406473", "0.53875554", "0.5371106", "0.53609663", "0.5...
0.6908366
0
Update a tenant's quotas.
def update_quota(self, tenant_id, body=None): return self.put(self.quota_path % (tenant_id), body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def quota_update(self, tenant_id, fields):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/quotas/\" + \\\n tenant_id + \".json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.cloud_admin_info['token_project']}\n _body = {\"quota\": f...
[ "0.7163246", "0.635502", "0.5720036", "0.5639554", "0.55166525", "0.54624575", "0.5428829", "0.54258657", "0.51778257", "0.5154388", "0.51109576", "0.5021779", "0.5000794", "0.49561912", "0.49508128", "0.49429917", "0.492987", "0.49184144", "0.4904871", "0.4830201", "0.482329...
0.7461944
0
Delete the specified tenant's quota values.
def delete_quota(self, tenant_id): return self.delete(self.quota_path % (tenant_id))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete(self):\n\n context = t_context.extract_context_from_environ()\n if not context.is_admin:\n # TODO(joahuang): changed to policy control later\n # to support reseller admin mode\n return Response(_('Admin role required to delete quota'), 409)\n\n kw = ...
[ "0.69970065", "0.673502", "0.6282969", "0.61131537", "0.6112617", "0.5945629", "0.5926098", "0.58765143", "0.5865376", "0.58470356", "0.579206", "0.56558055", "0.562411", "0.5410008", "0.5362028", "0.53468287", "0.529956", "0.51715744", "0.5163412", "0.5146274", "0.5144429", ...
0.7955257
0
Fetch a list of all exts on server side.
def list_extensions(self, **_params): return self.get(self.extensions_path, params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def extensions(self):\n return list(self._list(extension.Extension, paginated=False))", "def fetch_list(self):\n\t\treturn self.fetch(self.list_url % ART_SERVER_HOST)", "def list_extensions():\n formats = FileFormat.list_formats()\n return render_template('home.html', formats=formats)", "def ext...
[ "0.68190336", "0.6657903", "0.64916474", "0.6476279", "0.6232979", "0.6157164", "0.6072281", "0.60483783", "0.60483783", "0.6026507", "0.6012674", "0.59762377", "0.59696406", "0.5939757", "0.59294885", "0.5917803", "0.58528507", "0.58474547", "0.5839552", "0.58357006", "0.579...
0.7232655
0
Creates a new port.
def create_port(self, body=None): return self.post(self.ports_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def port_create(request, network_id, **kwargs):\n LOG.debug(\"port_create(): netid=%(network_id)s, kwargs=%(kwargs)s\",\n {'network_id': network_id, 'kwargs': kwargs})\n kwargs = unescape_port_kwargs(**kwargs)\n body = {'port': {'network_id': network_id}}\n if 'tenant_id' not in kwargs:\n ...
[ "0.7776417", "0.7497535", "0.74686015", "0.74666834", "0.7371448", "0.73548275", "0.71859133", "0.7181485", "0.7097867", "0.7053701", "0.6967759", "0.6953171", "0.6948751", "0.69008", "0.6850297", "0.6849177", "0.67380726", "0.67371327", "0.6549283", "0.6459628", "0.6454151",...
0.85699546
0
Deletes the specified port.
def delete_port(self, port): return self.delete(self.port_path % (port))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def port_delete(switch, port):\n client.port.delete(switch, port)", "def delete_port(self, port):\n try:\n self.client.delete_nic(port.vm.backend_id, port.backend_id)\n except VMwareError as e:\n raise VMwareBackendError(e)", "def delete_port(self, port_id):\n _url...
[ "0.8605427", "0.77690196", "0.7670423", "0.757818", "0.73585236", "0.7301238", "0.7281538", "0.7242986", "0.7207654", "0.7157321", "0.70755917", "0.7018464", "0.7011688", "0.665867", "0.6627325", "0.64675957", "0.6434387", "0.64250773", "0.6235666", "0.6193198", "0.6191819", ...
0.9033437
0
Fetches information of a certain network.
def show_network(self, network, **_params): return self.get(self.network_path % (network), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def GetNetwork(self, network, reason=None):\n query = []\n _AppendReason(query, reason)\n\n return self._SendRequest(HTTP_GET,\n \"/%s/networks/%s\" % (GANETI_RAPI_VERSION, network),\n query, None)", "def get_network_info(self, network_id):\n ...
[ "0.7025692", "0.6826883", "0.6770438", "0.67534244", "0.67281926", "0.6689964", "0.6590673", "0.65494996", "0.6434791", "0.6377579", "0.6312347", "0.62848645", "0.62848645", "0.62848645", "0.6279836", "0.6277307", "0.62063056", "0.62010485", "0.6165593", "0.609365", "0.604815...
0.7827048
0
Creates a new network.
def create_network(self, body=None): return self.post(self.networks_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def network_create(request, **kwargs):\n LOG.debug(\"network_create(): kwargs = %s\", kwargs)\n if 'tenant_id' not in kwargs:\n kwargs['tenant_id'] = request.user.project_id\n body = {'network': kwargs}\n network = neutronclient(request).create_network(body=body).get('network')\n return Netwo...
[ "0.81579995", "0.7955047", "0.79292595", "0.7865227", "0.77354944", "0.77025455", "0.7653404", "0.7584998", "0.7473897", "0.73508835", "0.73476547", "0.73433155", "0.72996587", "0.72917145", "0.7264279", "0.72636753", "0.7241721", "0.70633", "0.70381355", "0.7006608", "0.6971...
0.84297645
0
Deletes the specified network.
def delete_network(self, network): return self.delete(self.network_path % (network))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete_network(self, tenant_id, network_id, network_segments):\n self.delete_network_segments(tenant_id, network_segments)\n self.delete_network_bulk(tenant_id, [network_id])", "def network_delete_event(self, network_info):\n\n net_id = network_info['network_id']\n if net_id not i...
[ "0.8059222", "0.7379222", "0.720079", "0.71616256", "0.7135392", "0.71011084", "0.7094287", "0.7035174", "0.6975643", "0.68844634", "0.6869534", "0.6844207", "0.6759504", "0.6696637", "0.6662097", "0.66288805", "0.65767175", "0.6397678", "0.6372114", "0.63403755", "0.6321933"...
0.86559355
0
Fetches information of a certain subnet.
def show_subnet(self, subnet, **_params): return self.get(self.subnet_path % (subnet), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def get_subnet_details(self, subnet_name=\"dummy_subnet\", subnet_id=None):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/subnets\"\n _headers = {'x-auth-token': self.project_info[\"token_project\"]}\n _body = None\n\n result = self.request(\"GET\", _url, _headers, _body)\n ...
[ "0.7390836", "0.7267412", "0.72269106", "0.69200927", "0.6865069", "0.6851835", "0.6811328", "0.6652118", "0.6632633", "0.6610862", "0.6433478", "0.6383471", "0.63660246", "0.62896067", "0.62729573", "0.6270225", "0.6262065", "0.62597907", "0.62462574", "0.62135315", "0.61285...
0.7742677
0
Creates a new subnet.
def create_subnet(self, body=None): return self.post(self.subnets_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def subnet_create(request, network_id, **kwargs):\n LOG.debug(\"subnet_create(): netid=%(network_id)s, kwargs=%(kwargs)s\",\n {'network_id': network_id, 'kwargs': kwargs})\n body = {'subnet': {'network_id': network_id}}\n if 'tenant_id' not in kwargs:\n kwargs['tenant_id'] = request.us...
[ "0.8182615", "0.80901676", "0.77219945", "0.7618689", "0.76168036", "0.7553743", "0.7547663", "0.7508443", "0.72408324", "0.71734613", "0.7053382", "0.6969514", "0.6968936", "0.69553506", "0.6927736", "0.6902643", "0.6880848", "0.68753177", "0.6782591", "0.6767504", "0.659729...
0.8516262
0
Deletes the specified subnet.
def delete_subnet(self, subnet): return self.delete(self.subnet_path % (subnet))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete_subnet(self, subnet_id):\n\n LOG_OBJ.debug(\"Deleting subnet %s\" % subnet_id)\n\n _url = \"http://\" + self.host_ip + \":9696/v2.0/subnets/\" + \\\n subnet_id + \".json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.project_...
[ "0.80279684", "0.7537888", "0.74954545", "0.73043185", "0.71507853", "0.7116594", "0.70545286", "0.70140845", "0.6914489", "0.67101955", "0.66071516", "0.6467483", "0.6438037", "0.62992525", "0.61135745", "0.6082507", "0.608126", "0.60400426", "0.59426373", "0.59162545", "0.5...
0.8752519
0
Fetches a list of all routers for a tenant.
def list_routers(self, retrieve_all=True, **_params): # Pass filters in "params" argument to do_request return self.list('routers', self.routers_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def list_router(self):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/routers.json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.project_info[\"token_project\"]}\n _body = None\n\n response = self.request(\"GET\", _url, _headers, _body...
[ "0.6313127", "0.6174423", "0.6166872", "0.5997509", "0.5886302", "0.5854196", "0.5810372", "0.57217276", "0.5712855", "0.56660986", "0.56648535", "0.56253934", "0.5617021", "0.558155", "0.55518055", "0.55088097", "0.5482825", "0.5412695", "0.5344983", "0.5344021", "0.53354704...
0.6982911
0
Fetches information of a certain router.
def show_router(self, router, **_params): return self.get(self.router_path % (router), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def get_router(self, ns):\r\n desc = self.sendAndRecv(\"GETINFO desc/id/\" + ns.idhex + \"\\r\\n\")[0][2]\r\n sig_start = desc.find(\"\\nrouter-signature\\n\")+len(\"\\nrouter-signature\\n\")\r\n fp_base64 = sha1(desc[:sig_start]).digest().encode(\"base64\")[:-2]\r\n r = Router.build_from_desc(desc.spl...
[ "0.6491132", "0.6485342", "0.6240694", "0.60985136", "0.6021243", "0.60166574", "0.5952552", "0.5870413", "0.5852566", "0.58317333", "0.5818978", "0.56855655", "0.56371194", "0.5627783", "0.56222224", "0.5595846", "0.5552522", "0.55414426", "0.55044", "0.54918385", "0.5471492...
0.75560486
0
Creates a new router.
def create_router(self, body=None): return self.post(self.routers_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_router(self, environment, *, router=None):\n\n if router is None:\n router = self.router\n\n return utils.objects.ensure_instance(router, environment=environment)", "def create_router(self, router_name=\"test_router\"):\n LOG_OBJ.debug(\n \"Creating router in...
[ "0.788999", "0.71891093", "0.68031514", "0.67899865", "0.67467797", "0.66271514", "0.660581", "0.65151536", "0.6493566", "0.64516914", "0.64080477", "0.6309001", "0.620273", "0.5938039", "0.59123707", "0.59083575", "0.5859488", "0.58458954", "0.5808517", "0.57845855", "0.5765...
0.80614746
0
Deletes the specified router.
def delete_router(self, router): return self.delete(self.router_path % (router))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete_router(self, router_id):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/routers/\" + \\\n router_id + \".json\"\n _headers = {'Content-type': 'application/json',\n 'x-auth-token': self.project_info[\"token_project\"]}\n _body = None\n\n respo...
[ "0.8061734", "0.79204166", "0.7457911", "0.7357191", "0.73263353", "0.70104057", "0.67779124", "0.65747285", "0.6572116", "0.65454334", "0.64425975", "0.6437227", "0.6357478", "0.6312947", "0.629201", "0.62706506", "0.625203", "0.6249143", "0.6221276", "0.6218233", "0.610681"...
0.8844058
0
Adds an internal network interface to the specified router.
def add_interface_router(self, router, body=None): return self.put((self.router_path % router) + "/add_router_interface", body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def add_router_interface(self, router, subnet_id=None, port_id=None):\n return self.network.add_interface_to_router(\n router=router, subnet_id=subnet_id, port_id=port_id\n )", "def add_internal_interface(self, oid, subnet):\n data = {\"subnet_id\": subnet}\n path = '%s/rou...
[ "0.7873222", "0.7838222", "0.7709515", "0.71190506", "0.6903455", "0.6708249", "0.65713805", "0.6510887", "0.6399704", "0.6221869", "0.6209524", "0.6098547", "0.60733616", "0.60182595", "0.59893215", "0.5945213", "0.5897475", "0.582894", "0.5810345", "0.57925093", "0.5694907"...
0.84055555
0
Removes an internal network interface from the specified router.
def remove_interface_router(self, router, body=None): return self.put((self.router_path % router) + "/remove_router_interface", body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def remove_router_interface(self, router, subnet_id=None, port_id=None):\n if not subnet_id and not port_id:\n raise ValueError(\n \"At least one of subnet_id or port_id must be supplied.\"\n )\n\n self.network.remove_interface_from_router(\n router=rou...
[ "0.7638416", "0.7565658", "0.72000104", "0.68167233", "0.64587975", "0.61961097", "0.6058829", "0.6018284", "0.5968525", "0.5866438", "0.5834787", "0.58338827", "0.5784816", "0.5697515", "0.56668746", "0.56656337", "0.56577164", "0.5640304", "0.5611446", "0.5598428", "0.55924...
0.8504373
0
Adds an external network gateway to the specified router.
def add_gateway_router(self, router, body=None): return self.put((self.router_path % router), body={'router': {'external_gateway_info': body}})
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def add_network(self, router, network, distance):\n self.routers[router].add_network(network, distance)", "def set_router_gateway(self, ext_net_name, router_id):\n _ext_net_id = self.get_net_id(ext_net_name)\n if not isinstance(_ext_net_id, unicode):\n return\n\n LOG_OBJ.de...
[ "0.7562062", "0.716101", "0.68449825", "0.68084097", "0.6744273", "0.65693057", "0.6566995", "0.6367071", "0.6328497", "0.6255339", "0.6245209", "0.6202838", "0.6190978", "0.61452156", "0.6072494", "0.60703474", "0.60572124", "0.60473317", "0.5961244", "0.5941951", "0.5912015...
0.82570314
0
Removes an external network gateway from the specified router.
def remove_gateway_router(self, router): return self.put((self.router_path % router), body={'router': {'external_gateway_info': {}}})
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def clear_router_gateway(self, router_id):\n _url = \"http://\" + self.host_ip + \":9696/v2.0/routers/\" + \\\n router_id + \".json\"\n _headers = {'x-auth-token': self.project_info[\"token_project\"],\n 'content-type': 'application/json'}\n _gwdata = {\"router\":...
[ "0.75148505", "0.7291869", "0.7215167", "0.71989477", "0.69219494", "0.65546954", "0.6521398", "0.63652754", "0.6297426", "0.62397933", "0.62172765", "0.6162991", "0.6098855", "0.59807825", "0.59806484", "0.59528273", "0.5935186", "0.5905832", "0.5899156", "0.5846076", "0.584...
0.8343582
0
Fetches a list of all floatingips for a tenant.
def list_floatingips(self, retrieve_all=True, **_params): # Pass filters in "params" argument to do_request return self.list('floatingips', self.floatingips_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def floating_ip_list(tenant_id, auth_token):\r\n content = common_utils.do_request(\r\n tenant_id, auth_token,\r\n method='GET',\r\n body='',\r\n service=\"network\",\r\n path=\"floatingips.json\")\r\n return ...
[ "0.81242007", "0.7544053", "0.7216728", "0.7172121", "0.7137568", "0.6763114", "0.6395726", "0.61118186", "0.59908193", "0.5927272", "0.58235717", "0.5809937", "0.57843965", "0.5727529", "0.5638011", "0.55874467", "0.5565585", "0.549272", "0.5395736", "0.53865224", "0.5317173...
0.76698965
1
Fetches information of a certain floatingip.
def show_floatingip(self, floatingip, **_params): return self.get(self.floatingip_path % (floatingip), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def get(self, oid):\n path = '%s/floatingips/%s' % (self.ver, oid)\n res = self.client.call(path, 'GET', data='', \n token=self.manager.identity.token)\n self.logger.debug('Get openstack floating ip %s: %s' % \n (oid, truncate(res)))\n ...
[ "0.729726", "0.66412824", "0.657539", "0.65030426", "0.64191407", "0.638935", "0.6187027", "0.61458135", "0.6081408", "0.6071991", "0.6043026", "0.59518915", "0.59191006", "0.5901457", "0.5866904", "0.58119065", "0.58007085", "0.57907933", "0.5764891", "0.57493246", "0.572790...
0.7693683
0
Creates a new floatingip.
def create_floatingip(self, body=None): return self.post(self.floatingips_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create(self, network_id, tenant_id, port_id):\n data = {\n \"floatingip\": {\n \"tenant_id\": tenant_id,\n \"floating_network_id\": network_id,\n \"port_id\": port_id\n }\n }\n \n path = '%s/floatingips' % (self.ver)...
[ "0.7378122", "0.73097956", "0.7262478", "0.67980736", "0.67412883", "0.67399395", "0.65076995", "0.64782184", "0.645232", "0.637573", "0.6367837", "0.63190114", "0.6313995", "0.62223685", "0.62001455", "0.61518633", "0.6129838", "0.6112548", "0.5935769", "0.5922887", "0.58890...
0.82209605
0
Deletes the specified floatingip.
def delete_floatingip(self, floatingip): return self.delete(self.floatingip_path % (floatingip))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete(self, floatingip_id):\n path = '%s/floatingips/%s' % (self.ver, floatingip_id)\n res = self.client.call(path, 'DELETE', data='', \n token=self.manager.identity.token)\n self.logger.debug('Delete openstack floating ip %s: %s' % \n ...
[ "0.8358391", "0.8064777", "0.80346894", "0.7467909", "0.737288", "0.7300664", "0.7113757", "0.7082978", "0.70673203", "0.7060899", "0.6955936", "0.6880796", "0.68678147", "0.6740223", "0.66462886", "0.6421955", "0.6390722", "0.6356175", "0.6350115", "0.6334925", "0.6297505", ...
0.91411155
0
Creates a new security group.
def create_security_group(self, body=None): return self.post(self.security_groups_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create(self, body: CloudSecurityGroup) -> Dict:\n\t\treturn self._post(route=AWSSecurityGroupConsts.CLOUD_SECURITY_GROUP.value, body=body)", "def security_group_create(auth=None, **kwargs):\n cloud = get_operator_cloud(auth)\n kwargs = _clean_kwargs(keep_name=True, **kwargs)\n return cloud.create_se...
[ "0.8204056", "0.80387515", "0.8036162", "0.78772044", "0.78635776", "0.7851885", "0.7806621", "0.76207393", "0.76201856", "0.7483134", "0.7392816", "0.7248553", "0.72154444", "0.7196159", "0.7180574", "0.715299", "0.7137981", "0.71072334", "0.70958006", "0.70805806", "0.70630...
0.8415717
0
Updates a security group.
def update_security_group(self, security_group, body=None): return self.put(self.security_group_path % security_group, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def security_group_update(secgroup=None, auth=None, **kwargs):\n cloud = get_operator_cloud(auth)\n kwargs = _clean_kwargs(keep_name=True, **kwargs)\n return cloud.update_security_group(secgroup, **kwargs)", "def update(self, security_group_id: str, body: CloudSecurityGroup) -> None:\n\t\troute = f'{AWS...
[ "0.82314885", "0.8048841", "0.7350805", "0.685911", "0.6854288", "0.67871845", "0.6778078", "0.6759359", "0.6732872", "0.6714927", "0.6657734", "0.66299677", "0.6612744", "0.65853596", "0.6577766", "0.6539446", "0.6519325", "0.64868754", "0.6460655", "0.63118005", "0.63078654...
0.8174148
1
Fetches a list of all security groups for a tenant.
def list_security_groups(self, retrieve_all=True, **_params): return self.list('security_groups', self.security_groups_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def security_groups(self, oid):\n try:\n path = u'/servers/%s/os-security-groups' % oid\n res = self.client.call(path, u'GET', data=u'', \n token=self.manager.identity.token)\n self.logger.debug(u'Get openstack server security groups: %s' % ...
[ "0.66952974", "0.6504931", "0.63362503", "0.6312892", "0.6240303", "0.61849177", "0.6152795", "0.6045224", "0.60395956", "0.60331637", "0.5994619", "0.59551716", "0.5928385", "0.5910452", "0.59098077", "0.59088475", "0.5883278", "0.5881842", "0.5838258", "0.58300847", "0.5826...
0.69792134
0
Fetches information of a certain security group.
def show_security_group(self, security_group, **_params): return self.get(self.security_group_path % (security_group), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def find_secgrp ( ec2_conn, secgrp_name ) :\n sec_grps = ec2_conn.get_all_security_groups( filters = { \"group-name\" : [ secgrp_name ] } )\n if len( sec_grps ) > 0 :\n return sec_grps[ 0 ]\n \n return None", "def get(self, sg_id):\n secgroup = self.client.show_security_group(sg_id).get('secur...
[ "0.68748987", "0.67552584", "0.67210066", "0.6686591", "0.652577", "0.6494174", "0.6481859", "0.63579845", "0.6334155", "0.63031715", "0.6288276", "0.6269049", "0.62165534", "0.6183246", "0.61800027", "0.61800027", "0.61468124", "0.6135291", "0.612963", "0.61201364", "0.60608...
0.7536646
0
Deletes the specified security group.
def delete_security_group(self, security_group): return self.delete(self.security_group_path % (security_group))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def del_secgroup(self, args):\n region = args[\"Region\"]\n sgid = args[\"Security-group-ID\"]\n message = MessageClass()\n\n # Boto3 client creation by providing the access_id and access_secret\n ec2 = boto3.client(service_name='ec2', region_name=region, api_version=None, use_ss...
[ "0.8035514", "0.8021995", "0.7983719", "0.79304713", "0.7878552", "0.77813673", "0.7729755", "0.7597194", "0.7571937", "0.754748", "0.75433195", "0.74403715", "0.72224003", "0.72200805", "0.71985203", "0.71627986", "0.7125496", "0.7101876", "0.70702475", "0.7063061", "0.70546...
0.8509912
0
Creates a new security group rule.
def create_security_group_rule(self, body=None): return self.post(self.security_group_rules_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def security_group_rule_create(auth=None, **kwargs):\n cloud = get_operator_cloud(auth)\n kwargs = _clean_kwargs(**kwargs)\n return cloud.create_security_group_rule(**kwargs)", "def create_rule(self, security_group, direction, ethertype=None,\n port_range_min=None, port_range_max=None...
[ "0.8042478", "0.7659484", "0.7532617", "0.7476467", "0.73841006", "0.73787856", "0.70613796", "0.7044276", "0.68198454", "0.66372263", "0.6577984", "0.6487899", "0.6429103", "0.6424751", "0.64135575", "0.63829243", "0.6326697", "0.6302563", "0.6242154", "0.6182589", "0.614755...
0.8395399
0
Deletes the specified security group rule.
def delete_security_group_rule(self, security_group_rule): return self.delete(self.security_group_rule_path % (security_group_rule))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def rule_delete(self, sgr_id):\n self.client.delete_security_group_rule(sgr_id)", "def delete_rule(self, ruleid):\n path = '%s/security-group-rules/%s' % (self.ver, ruleid)\n res = self.client.call(path, 'DELETE', data='', token=self.manager.identity.token)\n self.logger.debug('Delete...
[ "0.818832", "0.81104696", "0.8010669", "0.7354578", "0.73206323", "0.6843581", "0.6817413", "0.68086785", "0.67470104", "0.6741116", "0.6653575", "0.664835", "0.65784734", "0.65602237", "0.6552057", "0.6535408", "0.65182275", "0.648097", "0.6420581", "0.6400473", "0.62809914"...
0.84033525
0
Fetches a list of all security group rules for a tenant.
def list_security_group_rules(self, retrieve_all=True, **_params): return self.list('security_group_rules', self.security_group_rules_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def index(self, req, tenant_id):\n LOG.debug(\"Index() called with %s\" % (tenant_id))\n\n sec_groups = models.SecurityGroup().find_all(tenant_id=tenant_id,\n deleted=False)\n\n # Construct the mapping from Security Groups to Security Group R...
[ "0.6442324", "0.6289453", "0.6159688", "0.5514532", "0.548488", "0.542636", "0.5409088", "0.5384701", "0.535883", "0.53273433", "0.5319858", "0.52949345", "0.52807045", "0.5279871", "0.52354646", "0.52088547", "0.51403195", "0.5130113", "0.5027444", "0.5020799", "0.49570218",...
0.6851677
0
Fetches information of a certain security group rule.
def show_security_group_rule(self, security_group_rule, **_params): return self.get(self.security_group_rule_path % (security_group_rule), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def get_secgroup_rule(self, rule_id, context):\n plugin = directory.get_plugin()\n with context.session.begin(subtransactions=True):\n return plugin.get_security_group_rule(context, rule_id)", "def get_rule_group(client, rule_group_name):\n response = client.describe_rule_group(\n Ru...
[ "0.738271", "0.64413077", "0.63375515", "0.63375515", "0.63375515", "0.6260252", "0.62539256", "0.6172309", "0.61507857", "0.61304396", "0.59664035", "0.5946747", "0.5937241", "0.5836339", "0.58304036", "0.57771856", "0.5769232", "0.56301296", "0.55832016", "0.5582687", "0.55...
0.7506909
0
Fetches a list of all configured VPNServices for a tenant.
def list_vpnservices(self, retrieve_all=True, **_params): return self.list('vpnservices', self.vpnservices_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def get_vpn_services_on_host(self, context, host=None):\n plugin = self.driver.service_plugin\n vpnservices = plugin.get_agent_hosting_vpn_services(\n context, host, self.driver.service_type)\n return [self.driver._make_vpnservice_dict(vpnservice)\n for vpnservice in ...
[ "0.64834946", "0.63417435", "0.6217963", "0.59979105", "0.5981965", "0.59288955", "0.5915527", "0.5913047", "0.58784163", "0.58099526", "0.5784925", "0.56938785", "0.5677967", "0.56632555", "0.5599454", "0.5592681", "0.5591068", "0.5572708", "0.5559247", "0.55368185", "0.5532...
0.63743883
1
Fetches information of a specific VPNService.
def show_vpnservice(self, vpnservice, **_params): return self.get(self.vpnservice_path % (vpnservice), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def get_service(service=None, vsys=\"1\"):\n query = {\n \"type\": \"config\",\n \"action\": \"get\",\n \"xpath\": (\n \"/config/devices/entry[@name='localhost.localdomain']/vsys/entry[@name='vsys{}']/\"\n \"service/entry[@name='{}']\".format(vsys, service)\n ),...
[ "0.6069", "0.58816284", "0.5876587", "0.58577716", "0.58401006", "0.58010286", "0.57323927", "0.57289433", "0.57221717", "0.57177603", "0.57064146", "0.5674278", "0.553966", "0.5535464", "0.5524023", "0.5498003", "0.5443511", "0.54307956", "0.54205894", "0.5387409", "0.536915...
0.75386333
0
Creates a new VPNService.
def create_vpnservice(self, body=None): return self.post(self.vpnservices_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def new_t1_vpn_service(**kwargs):\n proxy = kwargs['proxy']\n session_token = kwargs['sessiontoken']\n display_name = kwargs['display_name']\n t1g = kwargs['tier1_gateway']\n service = kwargs['service_type']\n\n if service == 'ipsec':\n json_data = {\n \"resource_type\": \"IPSec...
[ "0.69971925", "0.6494992", "0.6480613", "0.6412509", "0.62872297", "0.6207053", "0.6186071", "0.6146034", "0.61011076", "0.6081889", "0.6053445", "0.60162836", "0.5998632", "0.5963445", "0.5952054", "0.59224486", "0.58647734", "0.5844991", "0.57842857", "0.5771153", "0.575343...
0.81970257
0
Deletes the specified VPNService.
def delete_vpnservice(self, vpnservice): return self.delete(self.vpnservice_path % (vpnservice))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete_service(self, service_id):\n raise exception.NotImplemented() # pragma: no cover", "async def api_delete_service(service_id, g: WalletTypeInfo = Depends(get_key_type)):\n service = await get_service(service_id)\n if not service:\n raise HTTPException(\n status_code=HTTP...
[ "0.7131132", "0.6633884", "0.65709394", "0.6514676", "0.64775777", "0.64649606", "0.63870174", "0.62843454", "0.62729317", "0.6208488", "0.61268866", "0.5970281", "0.5894233", "0.5855497", "0.58256984", "0.57940286", "0.5753099", "0.57491475", "0.57350796", "0.5727518", "0.56...
0.8535084
0
Fetches all configured IPsecSiteConnections for a tenant.
def list_ipsec_site_connections(self, retrieve_all=True, **_params): return self.list('ipsec_site_connections', self.ipsec_site_connections_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def list_ipsec_site_connections(self, params = None):\n return self._get(self.ipsec_site_connections_path, params=params)", "def sitecurclntconnections(self) :\n\t\ttry :\n\t\t\treturn self._sitecurclntconnections\n\t\texcept Exception as e:\n\t\t\traise e", "def sitecursrvrconnections(self) :\n\t\ttry ...
[ "0.6824947", "0.6580515", "0.62963605", "0.58726037", "0.58188456", "0.577184", "0.576312", "0.5689952", "0.568255", "0.5649047", "0.56165105", "0.5581331", "0.5581331", "0.5549619", "0.5500349", "0.5479567", "0.5465451", "0.54610753", "0.5441959", "0.54153466", "0.5385822", ...
0.6998385
0
Fetches information of a specific IPsecSiteConnection.
def show_ipsec_site_connection(self, ipsecsite_conn, **_params): return self.get( self.ipsec_site_connection_path % (ipsecsite_conn), params=_params )
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def show_ipsec_site_connection(self, ipsecsite_conn, params = None):\n return self._get(\n self.ipsec_site_connection_path % (ipsecsite_conn), \n params=params)", "def test_list_ipsec_site_connection_sort(self):\r\n resources = \"ipsec_site_connections\"\r\n cmd = ipsec...
[ "0.7450395", "0.5576896", "0.5492563", "0.54900134", "0.53680754", "0.53537893", "0.53537893", "0.5343454", "0.53011835", "0.5263764", "0.52168727", "0.52108246", "0.5206001", "0.519677", "0.5159286", "0.5156365", "0.5137741", "0.51124835", "0.5112057", "0.5110776", "0.508233...
0.75371325
0
Creates a new IPsecSiteConnection.
def create_ipsec_site_connection(self, body=None): return self.post(self.ipsec_site_connections_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def create_ipsec_site_connection(self,ipsecpolicy_id, ikepolicy_id,\n vpnservice_id, psk, peer_cidrs,\n peer_address, peer_id,\n ipsec_body = None, **kwargs):\n _body = {\n \"psk\":psk,\n ...
[ "0.6654018", "0.5621504", "0.5489131", "0.548049", "0.54644406", "0.53190583", "0.53171176", "0.5298952", "0.5275487", "0.5240896", "0.52201253", "0.520641", "0.5199626", "0.5149092", "0.5132901", "0.5109163", "0.5025522", "0.49949932", "0.4975458", "0.49691355", "0.49545088"...
0.7530423
0
Deletes the specified IPsecSiteConnection.
def delete_ipsec_site_connection(self, ipsecsite_conn): return self.delete(self.ipsec_site_connection_path % (ipsecsite_conn))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def delete_ipsec_site_connection(self, ipsecsite_conn):\n return self._delete(self.ipsec_site_connection_path % (ipsecsite_conn))", "def delete_site(self, site):\n raise NotImplementedError('delete_site')", "def delete_connection(connectionId=None):\n pass", "def delete(self, *, session_id, ...
[ "0.81460273", "0.6630394", "0.65649563", "0.6266774", "0.57655776", "0.5645305", "0.5640637", "0.5458434", "0.5439951", "0.542143", "0.53993154", "0.5298285", "0.5274898", "0.5271059", "0.5268835", "0.5235416", "0.51978004", "0.51823866", "0.5166587", "0.50845057", "0.5081752...
0.814508
1
Fetches a list of all configured IKEPolicies for a tenant.
def list_ikepolicies(self, retrieve_all=True, **_params): return self.list('ikepolicies', self.ikepolicies_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_list_ikepolicy_sort(self):\r\n resources = \"ikepolicies\"\r\n cmd = ikepolicy.ListIKEPolicy(test_cli20.MyApp(sys.stdout), None)\r\n self._test_list_resources(resources, cmd,\r\n sort_key=[\"name\", \"id\"],\r\n sort_di...
[ "0.6085039", "0.5921704", "0.5858558", "0.57856494", "0.5732946", "0.56552166", "0.5616965", "0.5488311", "0.5480259", "0.54361844", "0.5299078", "0.5253691", "0.5238233", "0.5227512", "0.51910096", "0.51746917", "0.51731324", "0.5148066", "0.5125747", "0.511701", "0.51071024...
0.6754452
0
Fetches information of a specific IKEPolicy.
def show_ikepolicy(self, ikepolicy, **_params): return self.get(self.ikepolicy_path % (ikepolicy), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def policy_info(self) -> 'outputs.PolicyInfoResponse':\n return pulumi.get(self, \"policy_info\")", "def policy_info(self) -> pulumi.Input['PolicyInfoArgs']:\n return pulumi.get(self, \"policy_info\")", "def policy(self) -> Optional[pulumi.Input['ServicePolicyArgs']]:\n return pulumi.get(s...
[ "0.6262695", "0.5901335", "0.5764992", "0.5764992", "0.5665684", "0.56627756", "0.5632856", "0.5620609", "0.5618095", "0.5618095", "0.5601988", "0.5601988", "0.5601988", "0.5590013", "0.5581297", "0.5571066", "0.5571066", "0.5571066", "0.5485365", "0.54431343", "0.538188", ...
0.75339586
0
Creates a new IKEPolicy.
def create_ikepolicy(self, body=None): return self.post(self.ikepolicies_path, body=body)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def test_create_ikepolicy_with_limited_params(self):\r\n resource = 'ikepolicy'\r\n cmd = ikepolicy.CreateIKEPolicy(test_cli20.MyApp(sys.stdout), None)\r\n name = 'ikepolicy1'\r\n auth_algorithm = 'sha1'\r\n encryption_algorithm = 'aes-128'\r\n ike_version = 'v1'\r\n ...
[ "0.6848917", "0.6233196", "0.59121835", "0.58847517", "0.5858937", "0.5731987", "0.5681851", "0.5568024", "0.55357337", "0.5510469", "0.5432297", "0.5336758", "0.53310496", "0.5242851", "0.5161639", "0.5157356", "0.51495206", "0.512693", "0.50986606", "0.5097843", "0.50950825...
0.7252418
0
Deletes the specified IKEPolicy.
def delete_ikepolicy(self, ikepolicy): return self.delete(self.ikepolicy_path % (ikepolicy))
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def policy_delete(request, policy_id):\n neutronclient(request).delete_qos_policy(policy_id)", "def delete(self, policy_name):\n path = self.vault.normalize(\"/sys/policies/acl/\" + policy_name)\n address = self.vault.vault_adress + \"/v1\" + path\n # Actually run vault\n logging.i...
[ "0.69964254", "0.66024697", "0.6523624", "0.64902747", "0.643708", "0.6422639", "0.63917917", "0.6078179", "0.6076956", "0.5887067", "0.58149564", "0.5773822", "0.57269686", "0.5725632", "0.57185996", "0.5699927", "0.56955755", "0.5687687", "0.5672811", "0.5672811", "0.564356...
0.7832873
0
Fetches a list of all configured IPsecPolicies for a tenant.
def list_ipsecpolicies(self, retrieve_all=True, **_params): return self.list('ipsecpolicies', self.ipsecpolicies_path, retrieve_all, **_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def list_policies(self):\n client = self.connect(VAULT_TOKEN)\n return client.list_policies()", "def ListPolicies(self, request, global_params=None):\n config = self.GetMethodConfig('ListPolicies')\n return self._RunMethod(\n config, request, global_params=global_params)", "def...
[ "0.63227504", "0.60403246", "0.6016396", "0.5927996", "0.5792352", "0.5752553", "0.5711208", "0.56451374", "0.5639545", "0.56173253", "0.56097", "0.5489103", "0.5458932", "0.5458366", "0.5350394", "0.53385234", "0.5295462", "0.5262144", "0.5258188", "0.52507967", "0.52499187"...
0.64229774
0
Fetches information of a specific IPsecPolicy.
def show_ipsecpolicy(self, ipsecpolicy, **_params): return self.get(self.ipsecpolicy_path % (ipsecpolicy), params=_params)
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "def policy_info(self) -> 'outputs.PolicyInfoResponse':\n return pulumi.get(self, \"policy_info\")", "def policy_info(self) -> pulumi.Input['PolicyInfoArgs']:\n return pulumi.get(self, \"policy_info\")", "def get_sp_policy(self, context, id):\n # handling policy method in RPC\n respo...
[ "0.6893736", "0.6437934", "0.6352478", "0.625141", "0.6120847", "0.60739225", "0.60686016", "0.6029956", "0.5977029", "0.5977029", "0.5977029", "0.59603256", "0.59450626", "0.59450626", "0.59016365", "0.59016365", "0.58998203", "0.58780444", "0.58780444", "0.58780444", "0.587...
0.6450577
1