source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(method, uri, query_str):
if not query_str:
return None
query_parms = {}
for query_item in query_str.split('&'):
if query_item == '':
continue
items = query_item.split('=')
if len(items) != 2:
raise BadRequestError(method, uri, reason=1, message=
"Invalid format for URI query parameter: {!r} (valid format is: 'name=value')."
.format(query_item))
name = unquote(items[0])
value = unquote(items[1])
if name in query_parms:
existing_value = query_parms[name]
if not isinstance(existing_value, list):
query_parms[name] = list()
query_parms[name].append(existing_value)
query_parms[name].append(value)
else:
query_parms[name] = value
return query_parms
| parse_query_parms | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, query_str):\n if not query_str:\n return None\n query_parms = {}\n for query_item in query_str.split('&'):\n if query_item ... |
def x(method, uri, body, field_names):
if body is None:
raise BadRequestError(method, uri, reason=3, message=
'Missing request body')
for field_name in field_names:
if field_name not in body:
raise BadRequestError(method, uri, reason=5, message=
'Missing required field in request body: {}'.format(field_name)
)
| check_required_fields | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, body, field_names):\n if body is None:\n raise BadRequestError(method, uri, reason=3, message=\n 'Missing request body')\n ... |
def x(method, uri, cpc):
status = cpc.properties.get('status', None)
if status is None:
return
valid_statuses = ['active', 'service-required', 'degraded', 'exceptions']
if status not in valid_statuses:
if uri.startswith(cpc.uri):
raise ConflictError(method, uri, reason=1, message=
'The operation cannot be performed because the targeted CPC {} has a status that is not valid for the operation: {}'
.format(cpc.name, status))
else:
raise ConflictError(method, uri, reason=6, message=
'The operation cannot be performed because CPC {} hosting the targeted resource has a status that is not valid for the operation: {}'
.format(cpc.name, status))
| check_valid_cpc_status | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, cpc):\n status = cpc.properties.get('status', None)\n if status is None:\n return\n valid_statuses = ['active', 'service-required'... |
def x(method, uri, partition, valid_statuses=None, invalid_statuses=None):
status = partition.properties.get('status', None)
if status is None:
return
if (valid_statuses and status not in valid_statuses or invalid_statuses and
status in invalid_statuses):
if uri.startswith(partition.uri):
raise ConflictError(method, uri, reason=1, message=
'The operation cannot be performed because the targeted partition {} has a status that is not valid for the operation: {}'
.format(partition.name, status))
else:
raise ConflictError(method, uri, reason=1, message=
'The operation cannot be performed because partition {} hosting the targeted resource has a status that is not valid for the operation: {}'
.format(partition.name, status))
| check_partition_status | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, uri, partition, valid_statuses=None, invalid_statuses=None):\n status = partition.properties.get('status', None)\n if status is None:\n re... |
def x(partition):
if ('crypto-configuration' not in partition.properties or partition.
properties['crypto-configuration'] is None):
partition.properties['crypto-configuration'] = {}
crypto_config = partition.properties['crypto-configuration']
if 'crypto-adapter-uris' not in crypto_config or crypto_config[
'crypto-adapter-uris'] is None:
crypto_config['crypto-adapter-uris'] = []
adapter_uris = crypto_config['crypto-adapter-uris']
if 'crypto-domain-configurations' not in crypto_config or crypto_config[
'crypto-domain-configurations'] is None:
crypto_config['crypto-domain-configurations'] = []
domain_configs = crypto_config['crypto-domain-configurations']
return adapter_uris, domain_configs
| ensure_crypto_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(partition):\n if ('crypto-configuration' not in partition.properties or partition.\n properties['crypto-configuration'] is None):\n partition.... |
def x(method, hmc, uri, uri_parms, logon_required):
try:
resource = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
return resource.properties
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(me... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
try:
resource = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
resource.update(body)
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n resource = hmc.lookup_by_ur... |
def x(method, hmc, uri, uri_parms, logon_required):
try:
resource = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
resource.manager.remove(resource.oid)
| delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n resource = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(me... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
console_uri = '/api/console'
try:
console = hmc.lookup_by_uri(console_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['user-pattern-uris'])
new_order_uris = body['user-pattern-uris']
objs = console.user_patterns.list()
obj_by_uri = {}
for obj in objs:
obj_by_uri[obj.uri] = obj
for uri in new_order_uris:
obj = obj_by_uri[uri]
console.user_patterns.remove(obj.oid)
console.user_patterns.add(obj.properties)
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n console_uri = '/api/console'\n try:\n ... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
console_uri = '/api/console'
try:
hmc.lookup_by_uri(console_uri)
except KeyError:
raise InvalidResourceError(method, uri)
resp = []
return resp
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n console_uri = '/api/console'\n try:\n ... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_ucpcs = []
filter_args = parse_query_parms(method, uri, query_str)
for ucpc in console.unmanaged_cpcs.list(filter_args):
result_ucpc = {}
for prop in ucpc.properties:
if prop in ('object-uri', 'name'):
result_ucpc[prop] = ucpc.properties[prop]
result_ucpcs.append(result_ucpc)
return {'cpcs': result_ucpcs}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_users = []
filter_args = parse_query_parms(method, uri, query_str)
for user in console.users.list(filter_args):
result_user = {}
for prop in user.properties:
if prop in ('object-uri', 'name', 'type'):
result_user[prop] = user.properties[prop]
result_users.append(result_user)
return {'users': result_users}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:... |
def x(method, hmc, uri, uri_parms, logon_required):
try:
user = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
type_ = user.properties['type']
if type_ == 'pattern-based':
raise BadRequestError(method, uri, reason=312, message=
'Cannot delete pattern-based user {!r}'.format(user.name))
user.manager.remove(user.oid)
| delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n user = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
user_oid = uri_parms[0]
user_uri = '/api/users/' + user_oid
try:
user = hmc.lookup_by_uri(user_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['user-role-uri'])
user_type = user.properties['type']
if user_type in ('pattern-based', 'system-defined'):
raise BadRequestError(method, uri, reason=314, message=
'Cannot add user role to user of type {}: {}'.format(user_type,
user_uri))
user_role_uri = body['user-role-uri']
try:
hmc.lookup_by_uri(user_role_uri)
except KeyError:
raise InvalidResourceError(method, user_role_uri, reason=2)
if user.properties.get('user-roles', None) is None:
user.properties['user-roles'] = []
user.properties['user-roles'].append(user_role_uri)
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n user_oid = uri_parms[0]\n user_uri = '... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_user_roles = []
filter_args = parse_query_parms(method, uri, query_str)
for user_role in console.user_roles.list(filter_args):
result_user_role = {}
for prop in user_role.properties:
if prop in ('object-uri', 'name', 'type'):
result_user_role[prop] = user_role.properties[prop]
result_user_roles.append(result_user_role)
return {'user-roles': result_user_roles}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['name'])
properties = copy.deepcopy(body)
if 'type' in properties:
raise BadRequestError(method, uri, reason=6, message=
'Type specified when creating a user role: {!r}'.format(
properties['type']))
properties['type'] = 'user-defined'
new_user_role = console.user_roles.add(properties)
return {'object-uri': new_user_role.uri}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n console = hmc.consoles.look... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
user_role_oid = uri_parms[0]
user_role_uri = '/api/user-roles/' + user_role_oid
try:
user_role = hmc.lookup_by_uri(user_role_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['permitted-object',
'permitted-object-type'])
if user_role.properties['type'] == 'system-defined':
raise BadRequestError(method, uri, reason=314, message=
'Cannot add permission to system-defined user role: {}'.format(
user_role_uri))
permission = copy.deepcopy(body)
if 'include-members' not in permission:
permission['include-members'] = False
if 'view-only-mode' not in permission:
permission['view-only-mode'] = True
if user_role.properties.get('permissions', None) is None:
user_role.properties['permissions'] = []
user_role.properties['permissions'].append(permission)
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n user_role_oid = uri_parms[0]\n user_ro... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_tasks = []
filter_args = parse_query_parms(method, uri, query_str)
for task in console.tasks.list(filter_args):
result_task = {}
for prop in task.properties:
if prop in ('element-uri', 'name'):
result_task[prop] = task.properties[prop]
result_tasks.append(result_task)
return {'tasks': result_tasks}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_user_patterns = []
filter_args = parse_query_parms(method, uri, query_str)
for user_pattern in console.user_patterns.list(filter_args):
result_user_pattern = {}
for prop in user_pattern.properties:
if prop in ('element-uri', 'name', 'type'):
result_user_pattern[prop] = user_pattern.properties[prop]
result_user_patterns.append(result_user_pattern)
return {'user-patterns': result_user_patterns}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_password_rules = []
filter_args = parse_query_parms(method, uri, query_str)
for password_rule in console.password_rules.list(filter_args):
result_password_rule = {}
for prop in password_rule.properties:
if prop in ('element-uri', 'name', 'type'):
result_password_rule[prop] = password_rule.properties[prop]
result_password_rules.append(result_password_rule)
return {'password-rules': result_password_rules}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['name'])
new_password_rule = console.password_rules.add(body)
return {'element-uri': new_password_rule.uri}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n try:\n console = hmc.consoles.look... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
try:
console = hmc.consoles.lookup_by_oid(None)
except KeyError:
raise InvalidResourceError(method, uri)
result_ldap_srv_defs = []
filter_args = parse_query_parms(method, uri, query_str)
for ldap_srv_def in console.ldap_server_definitions.list(filter_args):
result_ldap_srv_def = {}
for prop in ldap_srv_def.properties:
if prop in ('element-uri', 'name', 'type'):
result_ldap_srv_def[prop] = ldap_srv_def.properties[prop]
result_ldap_srv_defs.append(result_ldap_srv_def)
return {'ldap-server-definitions': result_ldap_srv_defs}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n try:\n console = hmc.consoles.lookup_by_oid(None)\n except KeyError:... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
result_cpcs = []
filter_args = parse_query_parms(method, uri, query_str)
for cpc in hmc.cpcs.list(filter_args):
result_cpc = {}
for prop in cpc.properties:
if prop in ('object-uri', 'name', 'status'):
result_cpc[prop] = cpc.properties[prop]
result_cpcs.append(result_cpc)
return {'cpcs': result_cpcs}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n result_cpcs = []\n filter_args = parse_query_parms(method, uri, query_str)\... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['power-saving'])
power_saving = body['power-saving']
if power_saving not in ['high-performance', 'low-power', 'custom']:
raise BadRequestError(method, uri, reason=7, message=
'Invalid power-saving value: %r' % power_saving)
cpc.properties['cpc-power-saving'] = power_saving
cpc.properties['cpc-power-saving-state'] = power_saving
cpc.properties['zcpc-power-saving'] = power_saving
cpc.properties['zcpc-power-saving-state'] = power_saving
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n ... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['power-capping-state'])
power_capping_state = body['power-capping-state']
power_cap_current = body.get('power-cap-current', None)
if power_capping_state not in ['disabled', 'enabled', 'custom']:
raise BadRequestError(method, uri, reason=7, message=
'Invalid power-capping-state value: %r' % power_capping_state)
if power_capping_state == 'enabled' and power_cap_current is None:
raise BadRequestError(method, uri, reason=7, message=
'Power-cap-current must be provided when enabling power capping')
cpc.properties['cpc-power-capping-state'] = power_capping_state
cpc.properties['cpc-power-cap-current'] = power_cap_current
cpc.properties['zcpc-power-capping-state'] = power_capping_state
cpc.properties['zcpc-power-cap-current'] = power_cap_current
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n ... |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
energy_props = {'cpc-power-cap-allowed': cpc.properties.get(
'cpc-power-cap-allowed'), 'cpc-power-cap-current': cpc.properties.
get('cpc-power-cap-current'), 'cpc-power-cap-maximum': cpc.
properties.get('cpc-power-cap-maximum'), 'cpc-power-cap-minimum':
cpc.properties.get('cpc-power-cap-minimum'),
'cpc-power-capping-state': cpc.properties.get(
'cpc-power-capping-state'), 'cpc-power-consumption': cpc.properties
.get('cpc-power-consumption'), 'cpc-power-rating': cpc.properties.
get('cpc-power-rating'), 'cpc-power-save-allowed': cpc.properties.
get('cpc-power-save-allowed'), 'cpc-power-saving': cpc.properties.
get('cpc-power-saving'), 'cpc-power-saving-state': cpc.properties.
get('cpc-power-saving-state'), 'zcpc-ambient-temperature': cpc.
properties.get('zcpc-ambient-temperature'), 'zcpc-dew-point': cpc.
properties.get('zcpc-dew-point'), 'zcpc-exhaust-temperature': cpc.
properties.get('zcpc-exhaust-temperature'), 'zcpc-heat-load': cpc.
properties.get('zcpc-heat-load'), 'zcpc-heat-load-forced-air': cpc.
properties.get('zcpc-heat-load-forced-air'), 'zcpc-heat-load-water':
cpc.properties.get('zcpc-heat-load-water'), 'zcpc-humidity': cpc.
properties.get('zcpc-humidity'), 'zcpc-maximum-potential-heat-load':
cpc.properties.get('zcpc-maximum-potential-heat-load'),
'zcpc-maximum-potential-power': cpc.properties.get(
'zcpc-maximum-potential-power'), 'zcpc-power-cap-allowed': cpc.
properties.get('zcpc-power-cap-allowed'), 'zcpc-power-cap-current':
cpc.properties.get('zcpc-power-cap-current'),
'zcpc-power-cap-maximum': cpc.properties.get(
'zcpc-power-cap-maximum'), 'zcpc-power-cap-minimum': cpc.properties
.get('zcpc-power-cap-minimum'), 'zcpc-power-capping-state': cpc.
properties.get('zcpc-power-capping-state'),
'zcpc-power-consumption': cpc.properties.get(
'zcpc-power-consumption'), 'zcpc-power-rating': cpc.properties.get(
'zcpc-power-rating'), 'zcpc-power-save-allowed': cpc.properties.get
('zcpc-power-save-allowed'), 'zcpc-power-saving': cpc.properties.
get('zcpc-power-saving'), 'zcpc-power-saving-state': cpc.properties
.get('zcpc-power-saving-state')}
cpc_data = {'error-occurred': False, 'object-uri': cpc.uri, 'object-id':
cpc.oid, 'class': 'cpcs', 'properties': energy_props}
result = {'objects': [cpc_data]}
return result
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid)\n except KeyError:\n ... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
cpc.properties['status'] = 'not-operating'
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n ... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_required_fields(method, uri, body, ['partitions'])
partition_uris = body['partitions']
if len(partition_uris) == 0:
raise BadRequestError(method, uri, reason=149, message=
"'partitions' field in request body is empty.")
wwpn_list = []
for partition_uri in partition_uris:
partition = hmc.lookup_by_uri(partition_uri)
partition_cpc = partition.manager.parent
if partition_cpc.oid != cpc_oid:
raise BadRequestError(method, uri, reason=149, message=
"Partition %r specified in 'partitions' field is not in the targeted CPC with ID %r (but in the CPC with ID %r)."
% (partition.uri, cpc_oid, partition_cpc.oid))
partition_name = partition.properties.get('name', '')
for hba in partition.hbas.list():
port_uri = hba.properties['adapter-port-uri']
port = hmc.lookup_by_uri(port_uri)
adapter = port.manager.parent
adapter_id = adapter.properties.get('adapter-id', '')
devno = hba.properties.get('device-number', '')
wwpn = hba.properties.get('wwpn', '')
wwpn_str = '%s,%s,%s,%s' % (partition_name, adapter_id, devno, wwpn
)
wwpn_list.append(wwpn_str)
return {'wwpn-list': wwpn_list}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n ... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
check_required_fields(method, uri, body, ['anticipated-frequency-seconds'])
new_metrics_context = hmc.metrics_contexts.add(body)
result = {'metrics-context-uri': new_metrics_context.uri,
'metric-group-infos': new_metrics_context.get_metric_group_infos()}
return result
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n check_required_fields(method, uri, body, ... |
def x(method, hmc, uri, uri_parms, logon_required):
try:
metrics_context = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
hmc.metrics_contexts.remove(metrics_context.oid)
| delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n metrics_context = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceE... |
def x(method, hmc, uri, uri_parms, logon_required):
try:
metrics_context = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
result = metrics_context.get_metric_values_response()
return result
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n metrics_context = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceE... |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_adapters = []
if cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for adapter in cpc.adapters.list(filter_args):
result_adapter = {}
for prop in adapter.properties:
if prop in ('object-uri', 'name', 'status'):
result_adapter[prop] = adapter.properties[prop]
result_adapters.append(result_adapter)
return {'adapters': result_adapters}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_required_fields(method, uri, body, ['name'])
body2 = body.copy()
body2['type'] = 'hipersockets'
try:
new_adapter = cpc.adapters.add(body2)
except InputError as exc:
raise BadRequestError(method, uri, reason=5, message=str(exc))
return {'object-uri': new_adapter.uri}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n ... |
def x(method, hmc, uri, uri_parms, logon_required):
try:
adapter = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = adapter.manager.parent
assert cpc.dpm_enabled
adapter.manager.remove(adapter.oid)
| delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n adapter = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(met... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
adapter_uri = uri.split('/operations/')[0]
try:
adapter = hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = adapter.manager.parent
assert cpc.dpm_enabled
check_required_fields(method, uri, body, ['crypto-type'])
crypto_type = body['crypto-type']
if crypto_type not in ['accelerator', 'cca-coprocessor', 'ep11-coprocessor'
]:
raise BadRequestError(method, uri, reason=8, message=
"Invalid value for 'crypto-type' field: %s" % crypto_type)
adapter.properties['crypto-type'] = crypto_type
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n adapter_uri = uri.split('/operations/')[0... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
adapter_uri = uri.split('/operations/')[0]
try:
adapter = hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = adapter.manager.parent
assert cpc.dpm_enabled
check_required_fields(method, uri, body, ['type'])
new_adapter_type = body['type']
adapter_family = adapter.properties.get('adapter-family', None)
if adapter_family != 'ficon':
raise BadRequestError(method, uri, reason=18, message=
'The adapter type cannot be changed for adapter family: %s' %
adapter_family)
adapter_status = adapter.properties.get('status', None)
if adapter_status == 'exceptions':
raise BadRequestError(method, uri, reason=18, message=
'The adapter type cannot be changed for adapter status: %s' %
adapter_status)
if new_adapter_type not in ['fc', 'fcp', 'not-configured']:
raise BadRequestError(method, uri, reason=8, message=
"Invalid new value for 'type' field: %s" % new_adapter_type)
adapter_type = adapter.properties.get('type', None)
if new_adapter_type == adapter_type:
raise BadRequestError(method, uri, reason=8, message=
"New value for 'type' field is already set: %s" % new_adapter_type)
adapter.properties['type'] = new_adapter_type
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n adapter_uri = uri.split('/operations/')[0... |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_partitions = []
if cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for partition in cpc.partitions.list(filter_args):
result_partition = {}
for prop in partition.properties:
if prop in ('object-uri', 'name', 'status'):
result_partition[prop] = partition.properties[prop]
result_partitions.append(result_partition)
return {'partitions': result_partitions}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
cpc_oid = uri_parms[0]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_valid_cpc_status(method, uri, cpc)
check_required_fields(method, uri, body, ['name', 'initial-memory',
'maximum-memory'])
new_partition = cpc.partitions.add(body)
return {'object-uri': new_partition.uri}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n cpc_oid = uri_parms[0]\n try:\n ... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, valid_statuses=['stopped'])
partition.properties['status'] = 'active'
return {}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partiti... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
query_parms = parse_query_parms(method, uri, uri_parms[1])
try:
image_name = query_parms['image-name']
except KeyError:
raise BadRequestError(method, uri, reason=1, message=
"Missing required URI query parameter 'image-name'")
try:
ins_file_name = query_parms['ins-file-name']
except KeyError:
raise BadRequestError(method, uri, reason=1, message=
"Missing required URI query parameter 'ins-file-name'")
partition.properties['boot-iso-image-name'] = image_name
partition.properties['boot-iso-ins-file'] = ins_file_name
return {}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partiti... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, [])
adapter_uris, domain_configs = ensure_crypto_config(partition)
add_adapter_uris = body.get('crypto-adapter-uris', [])
add_domain_configs = body.get('crypto-domain-configurations', [])
for uri in add_adapter_uris:
if uri not in adapter_uris:
adapter_uris.append(uri)
for dc in add_domain_configs:
if dc not in domain_configs:
domain_configs.append(dc)
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partiti... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, [])
adapter_uris, domain_configs = ensure_crypto_config(partition)
remove_adapter_uris = body.get('crypto-adapter-uris', [])
remove_domain_indexes = body.get('crypto-domain-indexes', [])
for uri in remove_adapter_uris:
if uri in adapter_uris:
adapter_uris.remove(uri)
for remove_di in remove_domain_indexes:
for i, dc in enumerate(domain_configs):
if dc['domain-index'] == remove_di:
del domain_configs[i]
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partiti... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_uri = re.sub('/hbas$', '', uri)
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['name', 'adapter-port-uri'])
port_uri = body['adapter-port-uri']
m = re.match('(^/api/adapters/[^/]+)/storage-ports/[^/]+$', port_uri)
if not m:
raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri
)
adapter_uri = m.group(1)
try:
hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=2, resource_uri=
adapter_uri)
try:
hmc.lookup_by_uri(port_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=6, resource_uri=port_uri
)
new_hba = partition.hbas.add(body)
return {'element-uri': new_hba.uri}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/hbas$', '', uri)... |
def x(method, hmc, uri, uri_parms, logon_required):
try:
hba = hmc.lookup_by_uri(uri)
except KeyError:
raise InvalidResourceError(method, uri)
partition = hba.manager.parent
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
partition.hbas.remove(hba.oid)
| delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n try:\n hba = hmc.lookup_by_uri(uri)\n except KeyError:\n raise InvalidResourceError(method,... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_oid = uri_parms[0]
partition_uri = '/api/partitions/' + partition_oid
hba_oid = uri_parms[1]
hba_uri = '/api/partitions/' + partition_oid + '/hbas/' + hba_oid
try:
hba = hmc.lookup_by_uri(hba_uri)
except KeyError:
raise InvalidResourceError(method, uri)
partition = hmc.lookup_by_uri(partition_uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['adapter-port-uri'])
new_port_uri = body['adapter-port-uri']
hba.properties['adapter-port-uri'] = new_port_uri
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_oid = uri_parms[0]\n partiti... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_uri = re.sub('/nics$', '', uri)
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['name'])
if 'network-adapter-port-uri' in body:
port_uri = body['network-adapter-port-uri']
m = re.match('(^/api/adapters/[^/]+)/network-ports/[^/]+$', port_uri)
if not m:
raise InvalidResourceError(method, uri, reason=6, resource_uri=
port_uri)
adapter_uri = m.group(1)
try:
hmc.lookup_by_uri(adapter_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=2, resource_uri=
adapter_uri)
try:
hmc.lookup_by_uri(port_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=6, resource_uri=
port_uri)
elif 'virtual-switch-uri' in body:
vswitch_uri = body['virtual-switch-uri']
try:
hmc.lookup_by_uri(vswitch_uri)
except KeyError:
raise InvalidResourceError(method, uri, reason=2, resource_uri=
vswitch_uri)
else:
nic_name = body.get('name', None)
raise BadRequestError(method, uri, reason=5, message=
"The input properties for creating a NIC {!r} in partition {!r} must specify either the 'network-adapter-port-uri' or the 'virtual-switch-uri' property."
.format(nic_name, partition.name))
new_nic = partition.nics.add(body)
return {'element-uri': new_nic.uri}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/nics$', '', uri)... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
partition_uri = re.sub('/virtual-functions$', '', uri)
try:
partition = hmc.lookup_by_uri(partition_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = partition.manager.parent
assert cpc.dpm_enabled
check_valid_cpc_status(method, uri, cpc)
check_partition_status(method, uri, partition, invalid_statuses=[
'starting', 'stopping'])
check_required_fields(method, uri, body, ['name'])
new_vf = partition.virtual_functions.add(body)
return {'element-uri': new_vf.uri}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n partition_uri = re.sub('/virtual-function... |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_vswitches = []
if cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for vswitch in cpc.virtual_switches.list(filter_args):
result_vswitch = {}
for prop in vswitch.properties:
if prop in ('object-uri', 'name', 'type'):
result_vswitch[prop] = vswitch.properties[prop]
result_vswitches.append(result_vswitch)
return {'virtual-switches': result_vswitches}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
vswitch_oid = uri_parms[0]
vswitch_uri = '/api/virtual-switches/' + vswitch_oid
try:
vswitch = hmc.lookup_by_uri(vswitch_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = vswitch.manager.parent
assert cpc.dpm_enabled
connected_vnic_uris = vswitch.properties['connected-vnic-uris']
return {'connected-vnic-uris': connected_vnic_uris}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n vswitch_oid = uri_parms[0]\n vswitch_u... |
def x(method, hmc, uri, uri_parms, logon_required):
query_str = uri_parms[0]
filter_args = parse_query_parms(method, uri, query_str)
result_storage_groups = []
for sg in hmc.consoles.console.storage_groups.list(filter_args):
result_sg = {}
for prop in sg.properties:
if prop in ('object-uri', 'cpc-uri', 'name', 'status',
'fulfillment-state', 'type'):
result_sg[prop] = sg.properties[prop]
result_storage_groups.append(result_sg)
return {'storage-groups': result_storage_groups}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n query_str = uri_parms[0]\n filter_args = parse_query_parms(method, uri, query_str)\n result_storage_gr... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
check_required_fields(method, uri, body, ['name', 'cpc-uri', 'type'])
cpc_uri = body['cpc-uri']
try:
cpc = hmc.lookup_by_uri(cpc_uri)
except KeyError:
raise InvalidResourceError(method, uri)
if not cpc.dpm_enabled:
raise CpcNotInDpmError(method, uri, cpc)
check_valid_cpc_status(method, uri, cpc)
body2 = body.copy()
sv_requests = body2.pop('storage-volumes', None)
new_storage_group = hmc.consoles.console.storage_groups.add(body2)
sv_uris = []
if sv_requests:
for sv_req in sv_requests:
check_required_fields(method, uri, sv_req, ['operation'])
operation = sv_req['operation']
if operation == 'create':
sv_props = sv_req.copy()
del sv_props['operation']
if 'element-uri' in sv_props:
raise BadRequestError(method, uri, 7,
"The 'element-uri' field in storage-volumes is invalid for the create operation"
)
sv_uri = new_storage_group.storage_volumes.add(sv_props)
sv_uris.append(sv_uri)
else:
raise BadRequestError(method, uri, 5,
"Invalid value for storage-volumes 'operation' field: %s" %
operation)
return {'object-uri': new_storage_group.uri, 'element-uris': sv_uris}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n check_required_fields(method, uri, body, ... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
storage_group = hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
body2 = body.copy()
sv_requests = body2.pop('storage-volumes', None)
storage_group.update(body2)
sv_uris = []
if sv_requests:
for sv_req in sv_requests:
check_required_fields(method, uri, sv_req, ['operation'])
operation = sv_req['operation']
if operation == 'create':
sv_props = sv_req.copy()
del sv_props['operation']
if 'element-uri' in sv_props:
raise BadRequestError(method, uri, 7,
"The 'element-uri' field in storage-volumes is invalid for the create operation"
)
sv_uri = storage_group.storage_volumes.add(sv_props)
sv_uris.append(sv_uri)
elif operation == 'modify':
check_required_fields(method, uri, sv_req, ['element-uri'])
sv_uri = sv_req['element-uri']
storage_volume = hmc.lookup_by_uri(sv_uri)
storage_volume.update_properties(sv_props)
elif operation == 'delete':
check_required_fields(method, uri, sv_req, ['element-uri'])
sv_uri = sv_req['element-uri']
storage_volume = hmc.lookup_by_uri(sv_uri)
storage_volume.delete()
else:
raise BadRequestError(method, uri, 5,
"Invalid value for storage-volumes 'operation' field: %s" %
operation)
return {'element-uris': sv_uris}
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n sto... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
storage_group = hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
storage_group.manager.remove(storage_group.oid)
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n sto... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
pass
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n sto... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
storage_group_oid = uri_parms[0]
storage_group_uri = '/api/storage-groups/' + storage_group_oid
try:
storage_group = hmc.lookup_by_uri(storage_group_uri)
except KeyError:
raise InvalidResourceError(method, uri)
check_required_fields(method, uri, body, ['adapter-port-uris'])
candidate_adapter_port_uris = storage_group.properties[
'candidate-adapter-port-uris']
for ap_uri in body['adapter-port-uris']:
if ap_uri in candidate_adapter_port_uris:
raise ConflictError(method, uri, 483,
'Adapter port is already in candidate list of storage group %s: %s'
% (storage_group.name, ap_uri))
else:
candidate_adapter_port_uris.append(ap_uri)
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n storage_group_oid = uri_parms[0]\n sto... |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
result_lpars = []
if not cpc.dpm_enabled:
filter_args = parse_query_parms(method, uri, query_str)
for lpar in cpc.lpars.list(filter_args):
result_lpar = {}
for prop in lpar.properties:
if prop in ('object-uri', 'name', 'status'):
result_lpar[prop] = lpar.properties[prop]
result_lpars.append(result_lpar)
return {'logical-partitions': result_lpars}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
lpar_oid = uri_parms[0]
lpar_uri = '/api/logical-partitions/' + lpar_oid
try:
lpar = hmc.lookup_by_uri(lpar_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = lpar.manager.parent
assert not cpc.dpm_enabled
status = lpar.properties.get('status', None)
force = body.get('force', False) if body else False
if status == 'operating' and not force:
raise ServerError(method, uri, reason=263, message=
'LPAR {!r} could not be activated because the LPAR is in status {} (and force was not specified).'
.format(lpar.name, status))
act_profile_name = body.get('activation-profile-name', None)
if not act_profile_name:
act_profile_name = lpar.properties.get('next-activation-profile-name',
None)
if act_profile_name is None:
act_profile_name = ''
if act_profile_name != lpar.name:
raise ServerError(method, uri, reason=263, message=
'LPAR {!r} could not be activated because the name of the image activation profile {!r} is different from the LPAR name.'
.format(lpar.name, act_profile_name))
lpar.properties['status'] = LparActivateHandler.get_status()
lpar.properties['last-used-activation-profile'] = act_profile_name
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n lpar_oid = uri_parms[0]\n lpar_uri = '... |
def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):
assert wait_for_completion is True
lpar_oid = uri_parms[0]
lpar_uri = '/api/logical-partitions/' + lpar_oid
try:
lpar = hmc.lookup_by_uri(lpar_uri)
except KeyError:
raise InvalidResourceError(method, uri)
cpc = lpar.manager.parent
assert not cpc.dpm_enabled
status = lpar.properties.get('status', None)
force = body.get('force', False) if body else False
clear_indicator = body.get('clear-indicator', True) if body else True
store_status_indicator = body.get('store-status-indicator', False
) if body else False
if status == 'not-activated':
raise ConflictError(method, uri, reason=0, message=
'LPAR {!r} could not be loaded because the LPAR is in status {}.'
.format(lpar.name, status))
elif status == 'operating' and not force:
raise ServerError(method, uri, reason=263, message=
'LPAR {!r} could not be loaded because the LPAR is already loaded (and force was not specified).'
.format(lpar.name))
load_address = body.get('load-address', None) if body else None
if not load_address:
load_address = lpar.properties.get('last-used-load-address', None)
if load_address is None:
raise BadRequestError(method, uri, reason=5, message=
'LPAR {!r} could not be loaded because a load address is not specified in the request or in the Lpar last-used property'
.format(lpar.name))
load_parameter = body.get('load-parameter', None) if body else None
if not load_parameter:
load_parameter = lpar.properties.get('last-used-load-parameter', None)
if load_parameter is None:
load_parameter = ''
if clear_indicator:
lpar.properties['memory'] = ''
if store_status_indicator:
lpar.properties['stored-status'] = status
else:
lpar.properties['stored-status'] = None
lpar.properties['status'] = LparLoadHandler.get_status()
lpar.properties['last-used-load-address'] = load_address
lpar.properties['last-used-load-parameter'] = load_parameter
| post | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, body, logon_required, wait_for_completion):\n assert wait_for_completion is True\n lpar_oid = uri_parms[0]\n lpar_uri = '... |
def x(method, hmc, uri, uri_parms, logon_required):
cpc_oid = uri_parms[0]
query_str = uri_parms[1]
try:
cpc = hmc.cpcs.lookup_by_oid(cpc_oid)
except KeyError:
raise InvalidResourceError(method, uri)
assert not cpc.dpm_enabled
result_profiles = []
filter_args = parse_query_parms(method, uri, query_str)
for profile in cpc.load_activation_profiles.list(filter_args):
result_profile = {}
for prop in profile.properties:
if prop in ('element-uri', 'name'):
result_profile[prop] = profile.properties[prop]
result_profiles.append(result_profile)
return {'load-activation-profiles': result_profiles}
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, hmc, uri, uri_parms, logon_required):\n cpc_oid = uri_parms[0]\n query_str = uri_parms[1]\n try:\n cpc = hmc.cpcs.lookup_by_oid(cpc_oid... |
def x(self, properties):
result = self.session.post(self.cpc.uri + '/partitions', body=properties)
props = copy.deepcopy(properties)
props.update(result)
name = props.get(self._name_prop, None)
uri = props[self._uri_prop]
part = Partition(self, uri, name, props)
self._name_uri_cache.update(name, uri)
return part
| create | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n result = self.session.post(self.cpc.uri + '/partitions', body=properties)\n props = copy.deepcopy(properties)\n props.update(resu... |
def x(self):
if not self._nics:
self._nics = NicManager(self)
return self._nics
| nics | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._nics:\n self._nics = NicManager(self)\n return self._nics\n",
"role": "user"
},
{
"content": "nics",
"role":... |
def x(self):
if not self._hbas:
try:
dpm_sm = self.feature_enabled('dpm-storage-management')
except ValueError:
dpm_sm = False
if not dpm_sm:
self._hbas = HbaManager(self)
return self._hbas
| hbas | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._hbas:\n try:\n dpm_sm = self.feature_enabled('dpm-storage-management')\n except ValueError:\n dpm_... |
def x(self):
if not self._virtual_functions:
self._virtual_functions = VirtualFunctionManager(self)
return self._virtual_functions
| virtual_functions | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._virtual_functions:\n self._virtual_functions = VirtualFunctionManager(self)\n return self._virtual_functions\n",
"role":... |
def x(self, feature_name):
feature_list = self.prop('available-features-list', None)
if feature_list is None:
raise ValueError('Firmware features are not supported on CPC %s' %
self.manager.cpc.name)
for feature in feature_list:
if feature['name'] == feature_name:
break
else:
raise ValueError('Firmware feature %s is not available on CPC %s' %
(feature_name, self.manager.cpc.name))
return feature['state']
| feature_enabled | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, feature_name):\n feature_list = self.prop('available-features-list', None)\n if feature_list is None:\n raise ValueError('Firmware features ... |
def x(self):
feature_list = self.prop('available-features-list', None)
if feature_list is None:
raise ValueError('Firmware features are not supported on CPC %s' %
self.manager.cpc.name)
return feature_list
| feature_info | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n feature_list = self.prop('available-features-list', None)\n if feature_list is None:\n raise ValueError('Firmware features are not suppor... |
def x(self, wait_for_completion=True, operation_timeout=None,
status_timeout=None):
result = self.manager.session.post(self.uri + '/operations/start',
wait_for_completion=wait_for_completion, operation_timeout=
operation_timeout)
if wait_for_completion:
statuses = ['active', 'degraded']
self.wait_for_status(statuses, status_timeout)
return result
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, wait_for_completion=True, operation_timeout=None,\n status_timeout=None):\n result = self.manager.session.post(self.uri + '/operations/start',\n ... |
def x(self, parameters, wait_for_completion=True, operation_timeout=None):
result = self.manager.session.post(self.uri + '/operations/scsi-dump',
wait_for_completion=wait_for_completion, operation_timeout=
operation_timeout, body=parameters)
return result
| dump_partition | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, parameters, wait_for_completion=True, operation_timeout=None):\n result = self.manager.session.post(self.uri + '/operations/scsi-dump',\n wait_... |
def x(self, image, image_name, ins_file_name):
query_parms_str = '?image-name={}&ins-file-name={}'.format(quote(
image_name, safe=''), quote(ins_file_name, safe=''))
self.manager.session.post(self.uri + '/operations/mount-iso-image' +
query_parms_str, body=image)
| mount_iso_image | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, image, image_name, ins_file_name):\n query_parms_str = '?image-name={}&ins-file-name={}'.format(quote(\n image_name, safe=''), quote(ins_file_n... |
def x(self, include_refresh_messages=True):
body = {'include-refresh-messages': include_refresh_messages}
result = self.manager.session.post(self.uri +
'/operations/open-os-message-channel', body)
return result['topic-name']
| open_os_message_channel | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, include_refresh_messages=True):\n body = {'include-refresh-messages': include_refresh_messages}\n result = self.manager.session.post(self.uri +\n ... |
def x(self, os_command_text, is_priority=False):
body = {'is-priority': is_priority, 'operating-system-command-text':
os_command_text}
self.manager.session.post(self.uri + '/operations/send-os-cmd', body)
| send_os_command | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, os_command_text, is_priority=False):\n body = {'is-priority': is_priority, 'operating-system-command-text':\n os_command_text}\n self.manage... |
def x(self, status, status_timeout=None):
if status_timeout is None:
status_timeout = (self.manager.session.retry_timeout_config.
status_timeout)
if status_timeout > 0:
end_time = time.time() + status_timeout
if isinstance(status, (list, tuple)):
statuses = status
else:
statuses = [status]
while True:
parts = self.manager.cpc.partitions.list(filter_args={'name': self.
name})
assert len(parts) == 1
this_part = parts[0]
actual_status = this_part.get_property('status')
if actual_status in statuses:
return
if status_timeout > 0 and time.time() > end_time:
raise StatusTimeout(
"Waiting for partition {} to reach status(es) '{}' timed out after {} s - current status is '{}'"
.format(self.name, statuses, status_timeout, actual_status),
actual_status, statuses, status_timeout)
time.sleep(1)
| wait_for_status | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, status, status_timeout=None):\n if status_timeout is None:\n status_timeout = (self.manager.session.retry_timeout_config.\n status_t... |
def x(self, crypto_adapters, crypto_domain_configurations):
crypto_adapter_uris = [a.uri for a in crypto_adapters]
body = {'crypto-adapter-uris': crypto_adapter_uris,
'crypto-domain-configurations': crypto_domain_configurations}
self.manager.session.post(self.uri +
'/operations/increase-crypto-configuration', body)
| increase_crypto_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_adapters, crypto_domain_configurations):\n crypto_adapter_uris = [a.uri for a in crypto_adapters]\n body = {'crypto-adapter-uris': crypto_ad... |
def x(self, crypto_adapters, crypto_domain_indexes):
crypto_adapter_uris = [a.uri for a in crypto_adapters]
body = {'crypto-adapter-uris': crypto_adapter_uris,
'crypto-domain-indexes': crypto_domain_indexes}
self.manager.session.post(self.uri +
'/operations/decrease-crypto-configuration', body)
| decrease_crypto_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_adapters, crypto_domain_indexes):\n crypto_adapter_uris = [a.uri for a in crypto_adapters]\n body = {'crypto-adapter-uris': crypto_adapter_u... |
def x(self, crypto_domain_index, access_mode):
body = {'domain-index': crypto_domain_index, 'access-mode': access_mode}
self.manager.session.post(self.uri +
'/operations/change-crypto-domain-configuration', body)
| change_crypto_domain_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_domain_index, access_mode):\n body = {'domain-index': crypto_domain_index, 'access-mode': access_mode}\n self.manager.session.post(self.uri ... |
def x(self, crypto_adapter, crypto_domain_index):
body = {'crypto-adapter-uri': crypto_adapter.uri, 'domain-index':
crypto_domain_index}
self.manager.session.post(self.uri +
'/operations/zeroize-crypto-domain', body)
| zeroize_crypto_domain | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, crypto_adapter, crypto_domain_index):\n body = {'crypto-adapter-uri': crypto_adapter.uri, 'domain-index':\n crypto_domain_index}\n self.mana... |
def x(self, storage_group):
body = {'storage-group-uri': storage_group.uri}
self.manager.session.post(self.uri + '/operations/attach-storage-group',
body)
| attach_storage_group | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, storage_group):\n body = {'storage-group-uri': storage_group.uri}\n self.manager.session.post(self.uri + '/operations/attach-storage-group',\n ... |
def x(self, storage_group):
body = {'storage-group-uri': storage_group.uri}
self.manager.session.post(self.uri + '/operations/detach-storage-group',
body)
| detach_storage_group | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, storage_group):\n body = {'storage-group-uri': storage_group.uri}\n self.manager.session.post(self.uri + '/operations/detach-storage-group',\n ... |
def x(self, full_properties=False):
sg_list = []
sg_uris = self.get_property('storage-group-uris')
if sg_uris:
cpc = self.manager.cpc
for sg_uri in sg_uris:
sg = cpc.storage_groups.resource_object(sg_uri)
sg_list.append(sg)
if full_properties:
sg.pull_full_properties()
return sg_list
| list_attached_storage_groups | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, full_properties=False):\n sg_list = []\n sg_uris = self.get_property('storage-group-uris')\n if sg_uris:\n cpc = self.manager.cpc\n ... |
def x(self, properties):
self.manager.session.post(self.uri, body=properties)
assert self.manager._name_prop not in properties
self.properties.update(copy.deepcopy(properties))
| update_properties | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n self.manager.session.post(self.uri, body=properties)\n assert self.manager._name_prop not in properties\n self.properties.update(... |
def x(self):
if self._api_version is None:
self.query_api_version()
return self._api_version['api-major-version'], self._api_version[
'api-minor-version']
| version_info | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._api_version is None:\n self.query_api_version()\n return self._api_version['api-major-version'], self._api_version[\n 'ap... |
def x(self):
version_resp = self._session.get('/api/version', logon_required=False)
self._api_version = version_resp
return self._api_version
| query_api_version | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n version_resp = self._session.get('/api/version', logon_required=False)\n self._api_version = version_resp\n return self._api_version\n",
... |
def x(self, resources):
uri = '/api/services/inventory'
body = {'resources': resources}
result = self.session.post(uri, body=body)
return result
| get_inventory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, resources):\n uri = '/api/services/inventory'\n body = {'resources': resources}\n result = self.session.post(uri, body=body)\n return result\... |
def x(self, operation_timeout=None):
if operation_timeout is None:
operation_timeout = self.session.retry_timeout_config.operation_timeout
if operation_timeout > 0:
start_time = time.time()
while True:
try:
self.query_api_version()
except Error:
pass
except Exception:
raise
else:
break
if operation_timeout > 0:
current_time = time.time()
if current_time > start_time + operation_timeout:
raise OperationTimeout(
'Waiting for Console at {} to become available timed out (operation timeout: {} s)'
.format(self.session.host, operation_timeout),
operation_timeout)
time.sleep(10)
| wait_for_available | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, operation_timeout=None):\n if operation_timeout is None:\n operation_timeout = self.session.retry_timeout_config.operation_timeout\n if oper... |
def x(self):
full_properties = self.manager.session.get(self._uri)
self._properties = dict(full_properties)
self._properties_timestamp = int(time.time())
self._full_properties = True
| pull_full_properties | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n full_properties = self.manager.session.get(self._uri)\n self._properties = dict(full_properties)\n self._properties_timestamp = int(time.time... |
def x(self, name):
try:
return self._properties[name]
except KeyError:
if self._full_properties:
raise
self.pull_full_properties()
return self._properties[name]
| get_property | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name):\n try:\n return self._properties[name]\n except KeyError:\n if self._full_properties:\n raise\n self.pull_fu... |
def x(zhmc, userid=None, password=None):
global USERID, PASSWORD
USERID = userid or USERID or six.input('Enter userid for HMC {}: '.
format(zhmc))
PASSWORD = password or PASSWORD or getpass.getpass(
'Enter password for {}: '.format(USERID))
session = zhmcclient.Session(zhmc, USERID, PASSWORD)
session.logon()
client = zhmcclient.Client(session)
print('Established logged-on session with HMC {} using userid {}'.
format(zhmc, USERID))
return client
| make_client | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(zhmc, userid=None, password=None):\n global USERID, PASSWORD\n USERID = userid or USERID or six.input('Enter userid for HMC {}: '.\n format(zhmc))... |
def x(text, indent):
if text is None:
return 'None'
ret = _indent(text, amount=indent)
return ret.lstrip(' ')
| repr_text | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(text, indent):\n if text is None:\n return 'None'\n ret = _indent(text, amount=indent)\n return ret.lstrip(' ')\n",
"role": "user"
},
{... |
def x(_list, indent):
if _list is None:
return 'None'
if isinstance(_list, MutableSequence):
bm = '['
em = ']'
elif isinstance(_list, Iterable):
bm = '('
em = ')'
else:
raise TypeError('Object must be an iterable, but is a %s' % type(_list)
)
ret = bm + '\n'
for value in _list:
ret += _indent('%r,\n' % value, 2)
ret += em
ret = repr_text(ret, indent=indent)
return ret.lstrip(' ')
| repr_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(_list, indent):\n if _list is None:\n return 'None'\n if isinstance(_list, MutableSequence):\n bm = '['\n em = ']'\n elif isinsta... |
def x(_dict, indent):
if _dict is None:
return 'None'
if not isinstance(_dict, Mapping):
raise TypeError('Object must be a mapping, but is a %s' % type(_dict))
if isinstance(_dict, OrderedDict):
kind = 'ordered'
ret = '%s {\n' % kind
for key in six.iterkeys(_dict):
value = _dict[key]
ret += _indent('%r: %r,\n' % (key, value), 2)
else:
kind = 'sorted'
ret = '%s {\n' % kind
for key in sorted(six.iterkeys(_dict)):
value = _dict[key]
ret += _indent('%r: %r,\n' % (key, value), 2)
ret += '}'
ret = repr_text(ret, indent=indent)
return ret.lstrip(' ')
| repr_dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(_dict, indent):\n if _dict is None:\n return 'None'\n if not isinstance(_dict, Mapping):\n raise TypeError('Object must be a mapping, but i... |
def x(timestamp):
if timestamp is None:
return 'None'
dt = datetime_from_timestamp(timestamp)
ret = '%d (%s)' % (timestamp, dt.strftime('%Y-%m-%d %H:%M:%S.%f %Z'))
return ret
| repr_timestamp | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(timestamp):\n if timestamp is None:\n return 'None'\n dt = datetime_from_timestamp(timestamp)\n ret = '%d (%s)' % (timestamp, dt.strftime('%Y-%... |
def x(ts):
if ts is None:
raise ValueError('HMC timestamp value must not be None.')
if ts < 0:
raise ValueError(
'Negative HMC timestamp value {} cannot be represented as datetime.'
.format(ts))
epoch_seconds = ts // 1000
delta_microseconds = ts % 1000 * 1000
try:
dt = datetime.fromtimestamp(epoch_seconds, pytz.utc)
except (ValueError, OSError) as exc:
raise ValueError(str(exc))
dt = dt.replace(microsecond=delta_microseconds)
return dt
| datetime_from_timestamp | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ts):\n if ts is None:\n raise ValueError('HMC timestamp value must not be None.')\n if ts < 0:\n raise ValueError(\n 'Negative H... |
def x(dt):
if dt is None:
raise ValueError('datetime value must not be None.')
if dt.tzinfo is None:
dt = pytz.utc.localize(dt)
epoch_seconds = (dt - _EPOCH_DT).total_seconds()
ts = int(epoch_seconds * 1000)
return ts
| timestamp_from_datetime | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(dt):\n if dt is None:\n raise ValueError('datetime value must not be None.')\n if dt.tzinfo is None:\n dt = pytz.utc.localize(dt)\n epoc... |
def x(self, properties):
if properties is None:
properties = {}
result = self.session.post(self._base_uri, body=properties)
props = copy.deepcopy(properties)
props.update(result)
name = props.get(self._name_prop, None)
uri = props[self._uri_prop]
storage_group = StorageGroup(self, uri, name, props)
self._name_uri_cache.update(name, uri)
return storage_group
| create | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n if properties is None:\n properties = {}\n result = self.session.post(self._base_uri, body=properties)\n props = copy.deep... |
def x(self):
if not self._storage_volumes:
self._storage_volumes = StorageVolumeManager(self)
return self._storage_volumes
| storage_volumes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._storage_volumes:\n self._storage_volumes = StorageVolumeManager(self)\n return self._storage_volumes\n",
"role": "user"
... |
def x(self):
if not self._virtual_storage_resources:
self._virtual_storage_resources = VirtualStorageResourceManager(self)
return self._virtual_storage_resources
| virtual_storage_resources | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._virtual_storage_resources:\n self._virtual_storage_resources = VirtualStorageResourceManager(self)\n return self._virtual_st... |
def x(self):
if not self._cpc:
cpc_uri = self.get_property('cpc-uri')
cpc_mgr = self.manager.console.manager.client.cpcs
self._cpc = cpc_mgr.resource_object(cpc_uri)
return self._cpc
| cpc | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._cpc:\n cpc_uri = self.get_property('cpc-uri')\n cpc_mgr = self.manager.console.manager.client.cpcs\n self._cpc = ... |
def x(self, name=None, status=None):
query_parms = []
if name is not None:
self.manager._append_query_parms(query_parms, 'name', name)
if status is not None:
self.manager._append_query_parms(query_parms, 'status', status)
query_parms_str = '&'.join(query_parms)
if query_parms_str:
query_parms_str = '?{}'.format(query_parms_str)
uri = '{}/operations/get-partitions{}'.format(self.uri, query_parms_str)
sg_cpc = self.cpc
part_mgr = sg_cpc.partitions
result = self.manager.session.get(uri)
props_list = result['partitions']
part_list = []
for props in props_list:
part = part_mgr.resource_object(props['object-uri'], props)
part_list.append(part)
return part_list
| list_attached_partitions | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name=None, status=None):\n query_parms = []\n if name is not None:\n self.manager._append_query_parms(query_parms, 'name', name)\n if sta... |
def x(self, ports):
body = {'adapter-port-uris': [p.uri for p in ports]}
self.manager.session.post(self.uri +
'/operations/add-candidate-adapter-ports', body=body)
| add_candidate_adapter_ports | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ports):\n body = {'adapter-port-uris': [p.uri for p in ports]}\n self.manager.session.post(self.uri +\n '/operations/add-candidate-adapter-p... |
def x(self, full_properties=False):
sg_cpc = self.cpc
adapter_mgr = sg_cpc.adapters
port_list = []
port_uris = self.get_property('candidate-adapter-port-uris')
if port_uris:
for port_uri in port_uris:
m = re.match('^(/api/adapters/[^/]*)/.*', port_uri)
adapter_uri = m.group(1)
adapter = adapter_mgr.resource_object(adapter_uri)
port_mgr = adapter.ports
port = port_mgr.resource_object(port_uri)
port_list.append(port)
if full_properties:
port.pull_full_properties()
return port_list
| list_candidate_adapter_ports | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, full_properties=False):\n sg_cpc = self.cpc\n adapter_mgr = sg_cpc.adapters\n port_list = []\n port_uris = self.get_property('candidate-adapt... |
def x(self, properties):
result = self.session.post(self.cpc.uri + '/adapters', body=properties)
props = copy.deepcopy(properties)
props.update(result)
name = props.get(self._name_prop, None)
uri = props[self._uri_prop]
adapter = Adapter(self, uri, name, props)
self._name_uri_cache.update(name, uri)
return adapter
| create_hipersocket | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, properties):\n result = self.session.post(self.cpc.uri + '/adapters', body=properties)\n props = copy.deepcopy(properties)\n props.update(result... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.