source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(instance):
for key, obj in instance['objects'].items():
if ('type' in obj and obj['type'] not in enums.OBSERVABLE_TYPES and
obj['type'] not in enums.OBSERVABLE_RESERVED_OBJECTS and not
CUSTOM_TYPE_LAX_PREFIX_RE.match(obj['type'])):
yield JSONError(
"Custom Observable Object type '%s' should start with 'x-'." %
obj['type'], instance['id'], 'custom-prefix-lax')
|
custom_observable_object_prefix_lax
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if ('type' in obj and obj['type'] not in enums.OBSERVABLE_TYPES and\n obj['type'] not in enums.OBSERVABLE_RESERVED_OBJECTS and not\n CUSTOM_TYPE_LAX_PREFIX_RE.match(obj['type'])):\n yield JSONError(\n \"Custom Observable Object type '%s' should start with 'x-'.\" %\n obj['type'], instance['id'], 'custom-prefix-lax')\n",
"role": "user"
},
{
"content": "custom_observable_object_prefix_lax",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if not ('extensions' in obj and 'type' in obj and obj['type'] in
enums.OBSERVABLE_EXTENSIONS):
continue
for ext_key in obj['extensions']:
if ext_key not in enums.OBSERVABLE_EXTENSIONS[obj['type']
] and not CUSTOM_TYPE_PREFIX_RE.match(ext_key):
yield JSONError(
"Custom Cyber Observable Object extension type '%s' should start with 'x-' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name."
% ext_key, instance['id'], 'custom-prefix')
|
custom_object_extension_prefix_strict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if not ('extensions' in obj and 'type' in obj and obj['type'] in\n enums.OBSERVABLE_EXTENSIONS):\n continue\n for ext_key in obj['extensions']:\n if ext_key not in enums.OBSERVABLE_EXTENSIONS[obj['type']\n ] and not CUSTOM_TYPE_PREFIX_RE.match(ext_key):\n yield JSONError(\n \"Custom Cyber Observable Object extension type '%s' should start with 'x-' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name.\"\n % ext_key, instance['id'], 'custom-prefix')\n",
"role": "user"
},
{
"content": "custom_object_extension_prefix_strict",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if not ('extensions' in obj and 'type' in obj and obj['type'] in
enums.OBSERVABLE_EXTENSIONS):
continue
for ext_key in obj['extensions']:
if ext_key not in enums.OBSERVABLE_EXTENSIONS[obj['type']
] and not CUSTOM_TYPE_LAX_PREFIX_RE.match(ext_key):
yield JSONError(
"Custom Cyber Observable Object extension type '%s' should start with 'x-'."
% ext_key, instance['id'], 'custom-prefix-lax')
|
custom_object_extension_prefix_lax
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if not ('extensions' in obj and 'type' in obj and obj['type'] in\n enums.OBSERVABLE_EXTENSIONS):\n continue\n for ext_key in obj['extensions']:\n if ext_key not in enums.OBSERVABLE_EXTENSIONS[obj['type']\n ] and not CUSTOM_TYPE_LAX_PREFIX_RE.match(ext_key):\n yield JSONError(\n \"Custom Cyber Observable Object extension type '%s' should start with 'x-'.\"\n % ext_key, instance['id'], 'custom-prefix-lax')\n",
"role": "user"
},
{
"content": "custom_object_extension_prefix_lax",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' not in obj:
continue
type_ = obj['type']
for prop in obj:
if (type_ in enums.OBSERVABLE_PROPERTIES and prop not in enums.
OBSERVABLE_PROPERTIES[type_] and not
CUSTOM_PROPERTY_PREFIX_RE.match(prop)):
yield JSONError(
"Cyber Observable Object custom property '%s' should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name."
% prop, instance['id'], 'custom-prefix')
if (type_ in enums.OBSERVABLE_EMBEDDED_PROPERTIES and prop in
enums.OBSERVABLE_EMBEDDED_PROPERTIES[type_]):
for embed_prop in obj[prop]:
if isinstance(embed_prop, dict):
for embedded in embed_prop:
if (embedded not in enums.
OBSERVABLE_EMBEDDED_PROPERTIES[type_][prop] and
not CUSTOM_PROPERTY_PREFIX_RE.match(embedded)):
yield JSONError(
"Cyber Observable Object custom property '%s' in the %s property of %s object should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name."
% (embedded, prop, type_), instance[
'id'], 'custom-prefix')
elif embed_prop not in enums.OBSERVABLE_EMBEDDED_PROPERTIES[
type_][prop] and not CUSTOM_PROPERTY_PREFIX_RE.match(
embed_prop):
yield JSONError(
"Cyber Observable Object custom property '%s' in the %s property of %s object should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name."
% (embed_prop, prop, type_), instance['id'],
'custom-prefix')
if type_ in enums.OBSERVABLE_EXTENSIONS and 'extensions' in obj:
for ext_key in obj['extensions']:
if ext_key in enums.OBSERVABLE_EXTENSIONS[type_]:
for ext_prop in obj['extensions'][ext_key]:
if (ext_prop not in enums.
OBSERVABLE_EXTENSION_PROPERTIES[ext_key] and
not CUSTOM_PROPERTY_PREFIX_RE.match(ext_prop)):
yield JSONError(
"Cyber Observable Object custom property '%s' in the %s extension should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name."
% (ext_prop, ext_key), instance['id'],
'custom-prefix')
if ext_key in enums.OBSERVABLE_EXTENSIONS[type_]:
for ext_prop in obj['extensions'][ext_key]:
if (ext_key in enums.
OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES and
ext_prop in enums.
OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES[ext_key]):
for embed_prop in obj['extensions'][ext_key][
ext_prop]:
if not (isinstance(embed_prop, Iterable) and
not isinstance(embed_prop, string_types)):
embed_prop = [embed_prop]
for p in embed_prop:
if (p not in enums.
OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES
[ext_key][ext_prop] and not
CUSTOM_PROPERTY_PREFIX_RE.match(p)):
yield JSONError(
"Cyber Observable Object custom property '%s' in the %s property of the %s extension should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name."
% (p, ext_prop, ext_key), instance
['id'], 'custom-prefix')
|
custom_observable_properties_prefix_strict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' not in obj:\n continue\n type_ = obj['type']\n for prop in obj:\n if (type_ in enums.OBSERVABLE_PROPERTIES and prop not in enums.\n OBSERVABLE_PROPERTIES[type_] and not\n CUSTOM_PROPERTY_PREFIX_RE.match(prop)):\n yield JSONError(\n \"Cyber Observable Object custom property '%s' should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name.\"\n % prop, instance['id'], 'custom-prefix')\n if (type_ in enums.OBSERVABLE_EMBEDDED_PROPERTIES and prop in\n enums.OBSERVABLE_EMBEDDED_PROPERTIES[type_]):\n for embed_prop in obj[prop]:\n if isinstance(embed_prop, dict):\n for embedded in embed_prop:\n if (embedded not in enums.\n OBSERVABLE_EMBEDDED_PROPERTIES[type_][prop] and\n not CUSTOM_PROPERTY_PREFIX_RE.match(embedded)):\n yield JSONError(\n \"Cyber Observable Object custom property '%s' in the %s property of %s object should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name.\"\n % (embedded, prop, type_), instance[\n 'id'], 'custom-prefix')\n elif embed_prop not in enums.OBSERVABLE_EMBEDDED_PROPERTIES[\n type_][prop] and not CUSTOM_PROPERTY_PREFIX_RE.match(\n embed_prop):\n yield JSONError(\n \"Cyber Observable Object custom property '%s' in the %s property of %s object should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name.\"\n % (embed_prop, prop, type_), instance['id'],\n 'custom-prefix')\n if type_ in enums.OBSERVABLE_EXTENSIONS and 'extensions' in obj:\n for ext_key in obj['extensions']:\n if ext_key in enums.OBSERVABLE_EXTENSIONS[type_]:\n for ext_prop in obj['extensions'][ext_key]:\n if (ext_prop not in enums.\n OBSERVABLE_EXTENSION_PROPERTIES[ext_key] and \n not CUSTOM_PROPERTY_PREFIX_RE.match(ext_prop)):\n yield JSONError(\n \"Cyber Observable Object custom property '%s' in the %s extension should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name.\"\n % (ext_prop, ext_key), instance['id'],\n 'custom-prefix')\n if ext_key in enums.OBSERVABLE_EXTENSIONS[type_]:\n for ext_prop in obj['extensions'][ext_key]:\n if (ext_key in enums.\n OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES and \n ext_prop in enums.\n OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES[ext_key]):\n for embed_prop in obj['extensions'][ext_key][\n ext_prop]:\n if not (isinstance(embed_prop, Iterable) and\n not isinstance(embed_prop, string_types)):\n embed_prop = [embed_prop]\n for p in embed_prop:\n if (p not in enums.\n OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES\n [ext_key][ext_prop] and not\n CUSTOM_PROPERTY_PREFIX_RE.match(p)):\n yield JSONError(\n \"Cyber Observable Object custom property '%s' in the %s property of the %s extension should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name.\"\n % (p, ext_prop, ext_key), instance\n ['id'], 'custom-prefix')\n",
"role": "user"
},
{
"content": "custom_observable_properties_prefix_strict",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'network-traffic' and (
'src_port' not in obj or 'dst_port' not in obj):
yield JSONError(
"The Network Traffic object '%s' should contain both the 'src_port' and 'dst_port' properties."
% key, instance['id'], 'network-traffic-ports')
|
network_traffic_ports
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'network-traffic' and (\n 'src_port' not in obj or 'dst_port' not in obj):\n yield JSONError(\n \"The Network Traffic object '%s' should contain both the 'src_port' and 'dst_port' properties.\"\n % key, instance['id'], 'network-traffic-ports')\n",
"role": "user"
},
{
"content": "network_traffic_ports",
"role": "assistant"
}
] |
def x(instance):
mime_pattern = re.compile(
'^(application|audio|font|image|message|model|multipart|text|video)/[a-zA-Z0-9.+_-]+'
)
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'file' and 'mime_type' in obj:
if enums.media_types():
if obj['mime_type'] not in enums.media_types():
yield JSONError(
"The 'mime_type' property of object '%s' ('%s') should be an IANA registered MIME Type of the form 'type/subtype'."
% (key, obj['mime_type']), instance['id'], 'mime-type'
)
else:
info("Can't reach IANA website; using regex for mime types.")
if not mime_pattern.match(obj['mime_type']):
yield JSONError(
"The 'mime_type' property of object '%s' ('%s') should be an IANA MIME Type of the form 'type/subtype'."
% (key, obj['mime_type']), instance['id'], 'mime-type'
)
|
mime_type
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n mime_pattern = re.compile(\n '^(application|audio|font|image|message|model|multipart|text|video)/[a-zA-Z0-9.+_-]+'\n )\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'file' and 'mime_type' in obj:\n if enums.media_types():\n if obj['mime_type'] not in enums.media_types():\n yield JSONError(\n \"The 'mime_type' property of object '%s' ('%s') should be an IANA registered MIME Type of the form 'type/subtype'.\"\n % (key, obj['mime_type']), instance['id'], 'mime-type'\n )\n else:\n info(\"Can't reach IANA website; using regex for mime types.\")\n if not mime_pattern.match(obj['mime_type']):\n yield JSONError(\n \"The 'mime_type' property of object '%s' ('%s') should be an IANA MIME Type of the form 'type/subtype'.\"\n % (key, obj['mime_type']), instance['id'], 'mime-type'\n )\n",
"role": "user"
},
{
"content": "mime_type",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'
] == 'network-traffic' and 'protocols' in obj:
for prot in obj['protocols']:
if enums.protocols():
if prot not in enums.protocols():
yield JSONError(
"The 'protocols' property of object '%s' contains a value ('%s') not in IANA Service Name and Transport Protocol Port Number Registry."
% (key, prot), instance['id'], 'protocols')
else:
info("Can't reach IANA website; using regex for protocols."
)
if not PROTOCOL_RE.match(prot):
yield JSONError(
"The 'protocols' property of object '%s' contains a value ('%s') not in IANA Service Name and Transport Protocol Port Number Registry."
% (key, prot), instance['id'], 'protocols')
|
protocols
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'\n ] == 'network-traffic' and 'protocols' in obj:\n for prot in obj['protocols']:\n if enums.protocols():\n if prot not in enums.protocols():\n yield JSONError(\n \"The 'protocols' property of object '%s' contains a value ('%s') not in IANA Service Name and Transport Protocol Port Number Registry.\"\n % (key, prot), instance['id'], 'protocols')\n else:\n info(\"Can't reach IANA website; using regex for protocols.\"\n )\n if not PROTOCOL_RE.match(prot):\n yield JSONError(\n \"The 'protocols' property of object '%s' contains a value ('%s') not in IANA Service Name and Transport Protocol Port Number Registry.\"\n % (key, prot), instance['id'], 'protocols')\n",
"role": "user"
},
{
"content": "protocols",
"role": "assistant"
}
] |
def x(instance):
ipf_pattern = re.compile('^[a-z][a-zA-Z0-9]+')
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'
] == 'network-traffic' and 'ipfix' in obj:
for ipf in obj['ipfix']:
if enums.ipfix():
if ipf not in enums.ipfix():
yield JSONError(
"The 'ipfix' property of object '%s' contains a key ('%s') not in IANA IP Flow Information Export (IPFIX) Entities Registry."
% (key, ipf), instance['id'], 'ipfix')
else:
info("Can't reach IANA website; using regex for ipfix.")
if not ipf_pattern.match(ipf):
yield JSONError(
"The 'ipfix' property of object '%s' contains a key ('%s') not in IANA IP Flow Information Export (IPFIX) Entities Registry."
% (key, ipf), instance['id'], 'ipfix')
|
ipfix
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n ipf_pattern = re.compile('^[a-z][a-zA-Z0-9]+')\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'\n ] == 'network-traffic' and 'ipfix' in obj:\n for ipf in obj['ipfix']:\n if enums.ipfix():\n if ipf not in enums.ipfix():\n yield JSONError(\n \"The 'ipfix' property of object '%s' contains a key ('%s') not in IANA IP Flow Information Export (IPFIX) Entities Registry.\"\n % (key, ipf), instance['id'], 'ipfix')\n else:\n info(\"Can't reach IANA website; using regex for ipfix.\")\n if not ipf_pattern.match(ipf):\n yield JSONError(\n \"The 'ipfix' property of object '%s' contains a key ('%s') not in IANA IP Flow Information Export (IPFIX) Entities Registry.\"\n % (key, ipf), instance['id'], 'ipfix')\n",
"role": "user"
},
{
"content": "ipfix",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'network-traffic':
try:
headers = obj['extensions']['http-request-ext'][
'request_header']
except KeyError:
continue
for hdr in headers:
if hdr not in enums.HTTP_REQUEST_HEADERS:
yield JSONError(
"The 'request_header' property of object '%s' contains an invalid HTTP request header ('%s')."
% (key, hdr), instance['id'], 'http-request-headers')
|
http_request_headers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'network-traffic':\n try:\n headers = obj['extensions']['http-request-ext'][\n 'request_header']\n except KeyError:\n continue\n for hdr in headers:\n if hdr not in enums.HTTP_REQUEST_HEADERS:\n yield JSONError(\n \"The 'request_header' property of object '%s' contains an invalid HTTP request header ('%s').\"\n % (key, hdr), instance['id'], 'http-request-headers')\n",
"role": "user"
},
{
"content": "http_request_headers",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'network-traffic':
try:
options = obj['extensions']['socket-ext']['options']
except KeyError:
continue
for opt in options:
if opt not in enums.SOCKET_OPTIONS:
yield JSONError(
"The 'options' property of object '%s' contains a key ('%s') that is not a valid socket option (SO_*)."
% (key, opt), instance['id'], 'socket-options')
|
socket_options
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'network-traffic':\n try:\n options = obj['extensions']['socket-ext']['options']\n except KeyError:\n continue\n for opt in options:\n if opt not in enums.SOCKET_OPTIONS:\n yield JSONError(\n \"The 'options' property of object '%s' contains a key ('%s') that is not a valid socket option (SO_*).\"\n % (key, opt), instance['id'], 'socket-options')\n",
"role": "user"
},
{
"content": "socket_options",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'file':
try:
did = obj['extensions']['pdf-ext']['document_info_dict']
except KeyError:
continue
for elem in did:
if elem not in enums.PDF_DID:
yield JSONError(
"The 'document_info_dict' property of object '%s' contains a key ('%s') that is not a valid PDF Document Information Dictionary key."
% (key, elem), instance['id'], 'pdf-doc-info')
|
pdf_doc_info
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'file':\n try:\n did = obj['extensions']['pdf-ext']['document_info_dict']\n except KeyError:\n continue\n for elem in did:\n if elem not in enums.PDF_DID:\n yield JSONError(\n \"The 'document_info_dict' property of object '%s' contains a key ('%s') that is not a valid PDF Document Information Dictionary key.\"\n % (key, elem), instance['id'], 'pdf-doc-info')\n",
"role": "user"
},
{
"content": "pdf_doc_info",
"role": "assistant"
}
] |
def x(instance):
if instance['type'
] == 'location' and 'country' in instance and not instance['country'
].upper() in enums.COUNTRY_CODES:
return JSONError(
'Location `country` should be a valid ISO 3166-1 ALPHA-2 Code.',
instance['id'], 'marking-definition-type')
|
countries
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'\n ] == 'location' and 'country' in instance and not instance['country'\n ].upper() in enums.COUNTRY_CODES:\n return JSONError(\n 'Location `country` should be a valid ISO 3166-1 ALPHA-2 Code.',\n instance['id'], 'marking-definition-type')\n",
"role": "user"
},
{
"content": "countries",
"role": "assistant"
}
] |
def x(instance):
class_suffix_re = re.compile('.+_CLASS$')
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'process':
try:
priority = obj['extensions']['windows-process-ext']['priority']
except KeyError:
continue
if not class_suffix_re.match(priority):
yield JSONError(
"The 'priority' property of object '%s' should end in '_CLASS'."
% key, instance['id'], 'windows-process-priority-format')
|
windows_process_priority_format
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n class_suffix_re = re.compile('.+_CLASS$')\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'process':\n try:\n priority = obj['extensions']['windows-process-ext']['priority']\n except KeyError:\n continue\n if not class_suffix_re.match(priority):\n yield JSONError(\n \"The 'priority' property of object '%s' should end in '_CLASS'.\"\n % key, instance['id'], 'windows-process-priority-format')\n",
"role": "user"
},
{
"content": "windows_process_priority_format",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' not in obj:
continue
if obj['type'] == 'file':
try:
hashes = obj['hashes']
except KeyError:
pass
else:
for h in hashes:
if len(h) > 30:
yield JSONError(
"Object '%s' has a 'hashes' dictionary with a hash of type '%s', which is longer than 30 characters."
% (key, h), instance['id'], 'hash-algo')
try:
ads = obj['extensions']['ntfs-ext']['alternate_data_streams']
except KeyError:
pass
else:
for datastream in ads:
if 'hashes' not in datastream:
continue
for h in datastream['hashes']:
if len(h) > 30:
yield JSONError(
"Object '%s' has an NTFS extension with an alternate data stream that has a 'hashes' dictionary with a hash of type '%s', which is longer than 30 characters."
% (key, h), instance['id'], 'hash-algo')
try:
head_hashes = obj['extensions']['windows-pebinary-ext'][
'file_header_hashes']
except KeyError:
pass
else:
for h in head_hashes:
if len(h) > 30:
yield JSONError(
"Object '%s' has a Windows PE Binary File extension with a file header hash of '%s', which is longer than 30 characters."
% (key, h), instance['id'], 'hash-algo')
try:
hashes = obj['extensions']['windows-pebinary-ext'][
'optional_header']['hashes']
except KeyError:
pass
else:
for h in hashes:
if len(h) > 30:
yield JSONError(
"Object '%s' has a Windows PE Binary File extension with an optional header that has a hash of '%s', which is longer than 30 characters."
% (key, h), instance['id'], 'hash-algo')
try:
sections = obj['extensions']['windows-pebinary-ext']['sections'
]
except KeyError:
pass
else:
for s in sections:
if 'hashes' not in s:
continue
for h in s['hashes']:
if len(h) > 30:
yield JSONError(
"Object '%s' has a Windows PE Binary File extension with a section that has a hash of '%s', which is longer than 30 characters."
% (key, h), instance['id'], 'hash-algo')
elif obj['type'] == 'artifact' or obj['type'] == 'x509-certificate':
try:
hashes = obj['hashes']
except KeyError:
pass
else:
for h in hashes:
if len(h) > 30:
yield JSONError(
"Object '%s' has a 'hashes' dictionary with a hash of type '%s', which is longer than 30 characters."
% (key, h), instance['id'], 'hash-algo')
|
hash_length
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' not in obj:\n continue\n if obj['type'] == 'file':\n try:\n hashes = obj['hashes']\n except KeyError:\n pass\n else:\n for h in hashes:\n if len(h) > 30:\n yield JSONError(\n \"Object '%s' has a 'hashes' dictionary with a hash of type '%s', which is longer than 30 characters.\"\n % (key, h), instance['id'], 'hash-algo')\n try:\n ads = obj['extensions']['ntfs-ext']['alternate_data_streams']\n except KeyError:\n pass\n else:\n for datastream in ads:\n if 'hashes' not in datastream:\n continue\n for h in datastream['hashes']:\n if len(h) > 30:\n yield JSONError(\n \"Object '%s' has an NTFS extension with an alternate data stream that has a 'hashes' dictionary with a hash of type '%s', which is longer than 30 characters.\"\n % (key, h), instance['id'], 'hash-algo')\n try:\n head_hashes = obj['extensions']['windows-pebinary-ext'][\n 'file_header_hashes']\n except KeyError:\n pass\n else:\n for h in head_hashes:\n if len(h) > 30:\n yield JSONError(\n \"Object '%s' has a Windows PE Binary File extension with a file header hash of '%s', which is longer than 30 characters.\"\n % (key, h), instance['id'], 'hash-algo')\n try:\n hashes = obj['extensions']['windows-pebinary-ext'][\n 'optional_header']['hashes']\n except KeyError:\n pass\n else:\n for h in hashes:\n if len(h) > 30:\n yield JSONError(\n \"Object '%s' has a Windows PE Binary File extension with an optional header that has a hash of '%s', which is longer than 30 characters.\"\n % (key, h), instance['id'], 'hash-algo')\n try:\n sections = obj['extensions']['windows-pebinary-ext']['sections'\n ]\n except KeyError:\n pass\n else:\n for s in sections:\n if 'hashes' not in s:\n continue\n for h in s['hashes']:\n if len(h) > 30:\n yield JSONError(\n \"Object '%s' has a Windows PE Binary File extension with a section that has a hash of '%s', which is longer than 30 characters.\"\n % (key, h), instance['id'], 'hash-algo')\n elif obj['type'] == 'artifact' or obj['type'] == 'x509-certificate':\n try:\n hashes = obj['hashes']\n except KeyError:\n pass\n else:\n for h in hashes:\n if len(h) > 30:\n yield JSONError(\n \"Object '%s' has a 'hashes' dictionary with a hash of type '%s', which is longer than 30 characters.\"\n % (key, h), instance['id'], 'hash-algo')\n",
"role": "user"
},
{
"content": "hash_length",
"role": "assistant"
}
] |
def x(instance):
if instance['type'] != 'bundle' or 'objects' not in instance:
return
unique_ids = {}
for obj in instance['objects']:
if 'id' not in obj or 'modified' not in obj:
continue
elif obj['id'] not in unique_ids:
unique_ids[obj['id']] = obj['modified']
elif obj['modified'] == unique_ids[obj['id']]:
yield JSONError(
"Duplicate ID '%s' has identical `modified` timestamp. If they are different versions of the same object, they should have different `modified` properties."
% obj['id'], instance['id'], 'duplicate-ids')
|
duplicate_ids
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'] != 'bundle' or 'objects' not in instance:\n return\n unique_ids = {}\n for obj in instance['objects']:\n if 'id' not in obj or 'modified' not in obj:\n continue\n elif obj['id'] not in unique_ids:\n unique_ids[obj['id']] = obj['modified']\n elif obj['modified'] == unique_ids[obj['id']]:\n yield JSONError(\n \"Duplicate ID '%s' has identical `modified` timestamp. If they are different versions of the same object, they should have different `modified` properties.\"\n % obj['id'], instance['id'], 'duplicate-ids')\n",
"role": "user"
},
{
"content": "duplicate_ids",
"role": "assistant"
}
] |
def x(options):
validator_list = []
if not options.disabled and not options.enabled:
validator_list.extend(CHECKS['all'])
return validator_list
if options.disabled:
if 'all' not in options.disabled:
if 'format-checks' not in options.disabled:
if 'custom-prefix' not in options.disabled:
validator_list.append(CHECKS['custom-prefix'])
elif 'custom-prefix-lax' not in options.disabled:
validator_list.append(CHECKS['custom-prefix-lax'])
if 'open-vocab-format' not in options.disabled:
validator_list.append(CHECKS['open-vocab-format'])
if 'kill-chain-names' not in options.disabled:
validator_list.append(CHECKS['kill-chain-names'])
if 'observable-object-keys' not in options.disabled:
validator_list.append(CHECKS['observable-object-keys'])
if 'observable-dictionary-keys' not in options.disabled:
validator_list.append(CHECKS['observable-dictionary-keys'])
if 'windows-process-priority-format' not in options.disabled:
validator_list.append(CHECKS[
'windows-process-priority-format'])
if 'hash-length' not in options.disabled:
validator_list.append(CHECKS['hash-length'])
if 'approved-values' not in options.disabled:
if 'marking-definition-type' not in options.disabled:
validator_list.append(CHECKS['marking-definition-type'])
if 'relationship-types' not in options.disabled:
validator_list.append(CHECKS['relationship-types'])
if 'duplicate-ids' not in options.disabled:
validator_list.append(CHECKS['duplicate-ids'])
if 'all-vocabs' not in options.disabled:
if 'attack-motivation' not in options.disabled:
validator_list.append(CHECKS['attack-motivation'])
if 'attack-resource-level' not in options.disabled:
validator_list.append(CHECKS['attack-resource-level'])
if 'identity-class' not in options.disabled:
validator_list.append(CHECKS['identity-class'])
if 'indicator-types' not in options.disabled:
validator_list.append(CHECKS['indicator-types'])
if 'industry-sector' not in options.disabled:
validator_list.append(CHECKS['industry-sector'])
if 'malware-types' not in options.disabled:
validator_list.append(CHECKS['malware-types'])
if 'report-types' not in options.disabled:
validator_list.append(CHECKS['report-types'])
if 'threat-actor-types' not in options.disabled:
validator_list.append(CHECKS['threat-actor-types'])
if 'threat-actor-role' not in options.disabled:
validator_list.append(CHECKS['threat-actor-role'])
if 'threat-actor-sophistication' not in options.disabled:
validator_list.append(CHECKS[
'threat-actor-sophistication'])
if 'tool-types' not in options.disabled:
validator_list.append(CHECKS['tool-types'])
if 'region' not in options.disabled:
validator_list.append(CHECKS['region'])
if 'hash-algo' not in options.disabled:
validator_list.append(CHECKS['hash-algo'])
if 'windows-pebinary-type' not in options.disabled:
validator_list.append(CHECKS['windows-pebinary-type'])
if 'account-type' not in options.disabled:
validator_list.append(CHECKS['account-type'])
if 'all-external-sources' not in options.disabled:
if 'mime-type' not in options.disabled:
validator_list.append(CHECKS['mime-type'])
if 'protocols' not in options.disabled:
validator_list.append(CHECKS['protocols'])
if 'ipfix' not in options.disabled:
validator_list.append(CHECKS['ipfix'])
if 'http-request-headers' not in options.disabled:
validator_list.append(CHECKS['http-request-headers'])
if 'socket-options' not in options.disabled:
validator_list.append(CHECKS['socket-options'])
if 'pdf-doc-info' not in options.disabled:
validator_list.append(CHECKS['pdf-doc-info'])
if 'countries' not in options.disabled:
validator_list.append(CHECKS['countries'])
if 'network-traffic-ports' not in options.disabled:
validator_list.append(CHECKS['network-traffic-ports'])
if 'extref-hashes' not in options.disabled:
validator_list.append(CHECKS['extref-hashes'])
if options.enabled:
for check in options.enabled:
try:
if CHECKS[check] in validator_list:
continue
if type(CHECKS[check]) is list:
validator_list.extend(CHECKS[check])
else:
validator_list.append(CHECKS[check])
except KeyError:
raise JSONError('%s is not a valid check!' % check)
return validator_list
|
list_shoulds
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(options):\n validator_list = []\n if not options.disabled and not options.enabled:\n validator_list.extend(CHECKS['all'])\n return validator_list\n if options.disabled:\n if 'all' not in options.disabled:\n if 'format-checks' not in options.disabled:\n if 'custom-prefix' not in options.disabled:\n validator_list.append(CHECKS['custom-prefix'])\n elif 'custom-prefix-lax' not in options.disabled:\n validator_list.append(CHECKS['custom-prefix-lax'])\n if 'open-vocab-format' not in options.disabled:\n validator_list.append(CHECKS['open-vocab-format'])\n if 'kill-chain-names' not in options.disabled:\n validator_list.append(CHECKS['kill-chain-names'])\n if 'observable-object-keys' not in options.disabled:\n validator_list.append(CHECKS['observable-object-keys'])\n if 'observable-dictionary-keys' not in options.disabled:\n validator_list.append(CHECKS['observable-dictionary-keys'])\n if 'windows-process-priority-format' not in options.disabled:\n validator_list.append(CHECKS[\n 'windows-process-priority-format'])\n if 'hash-length' not in options.disabled:\n validator_list.append(CHECKS['hash-length'])\n if 'approved-values' not in options.disabled:\n if 'marking-definition-type' not in options.disabled:\n validator_list.append(CHECKS['marking-definition-type'])\n if 'relationship-types' not in options.disabled:\n validator_list.append(CHECKS['relationship-types'])\n if 'duplicate-ids' not in options.disabled:\n validator_list.append(CHECKS['duplicate-ids'])\n if 'all-vocabs' not in options.disabled:\n if 'attack-motivation' not in options.disabled:\n validator_list.append(CHECKS['attack-motivation'])\n if 'attack-resource-level' not in options.disabled:\n validator_list.append(CHECKS['attack-resource-level'])\n if 'identity-class' not in options.disabled:\n validator_list.append(CHECKS['identity-class'])\n if 'indicator-types' not in options.disabled:\n validator_list.append(CHECKS['indicator-types'])\n if 'industry-sector' not in options.disabled:\n validator_list.append(CHECKS['industry-sector'])\n if 'malware-types' not in options.disabled:\n validator_list.append(CHECKS['malware-types'])\n if 'report-types' not in options.disabled:\n validator_list.append(CHECKS['report-types'])\n if 'threat-actor-types' not in options.disabled:\n validator_list.append(CHECKS['threat-actor-types'])\n if 'threat-actor-role' not in options.disabled:\n validator_list.append(CHECKS['threat-actor-role'])\n if 'threat-actor-sophistication' not in options.disabled:\n validator_list.append(CHECKS[\n 'threat-actor-sophistication'])\n if 'tool-types' not in options.disabled:\n validator_list.append(CHECKS['tool-types'])\n if 'region' not in options.disabled:\n validator_list.append(CHECKS['region'])\n if 'hash-algo' not in options.disabled:\n validator_list.append(CHECKS['hash-algo'])\n if 'windows-pebinary-type' not in options.disabled:\n validator_list.append(CHECKS['windows-pebinary-type'])\n if 'account-type' not in options.disabled:\n validator_list.append(CHECKS['account-type'])\n if 'all-external-sources' not in options.disabled:\n if 'mime-type' not in options.disabled:\n validator_list.append(CHECKS['mime-type'])\n if 'protocols' not in options.disabled:\n validator_list.append(CHECKS['protocols'])\n if 'ipfix' not in options.disabled:\n validator_list.append(CHECKS['ipfix'])\n if 'http-request-headers' not in options.disabled:\n validator_list.append(CHECKS['http-request-headers'])\n if 'socket-options' not in options.disabled:\n validator_list.append(CHECKS['socket-options'])\n if 'pdf-doc-info' not in options.disabled:\n validator_list.append(CHECKS['pdf-doc-info'])\n if 'countries' not in options.disabled:\n validator_list.append(CHECKS['countries'])\n if 'network-traffic-ports' not in options.disabled:\n validator_list.append(CHECKS['network-traffic-ports'])\n if 'extref-hashes' not in options.disabled:\n validator_list.append(CHECKS['extref-hashes'])\n if options.enabled:\n for check in options.enabled:\n try:\n if CHECKS[check] in validator_list:\n continue\n if type(CHECKS[check]) is list:\n validator_list.extend(CHECKS[check])\n else:\n validator_list.append(CHECKS[check])\n except KeyError:\n raise JSONError('%s is not a valid check!' % check)\n return validator_list\n",
"role": "user"
},
{
"content": "list_shoulds",
"role": "assistant"
}
] |
def x(instance):
ts_re = re.compile(
'^[0-9]{4}-(0[1-9]|1[012])-(0[1-9]|[12][0-9]|3[01])T([01][0-9]|2[0-3]):([0-5][0-9]):([0-5][0-9]|60)(\\.[0-9]+)?Z$'
)
timestamp_props = ['created', 'modified']
if instance['type'] in enums.TIMESTAMP_PROPERTIES:
timestamp_props += enums.TIMESTAMP_PROPERTIES[instance['type']]
for tprop in timestamp_props:
if tprop in instance and ts_re.match(instance[tprop]):
try:
parser.parse(instance[tprop])
except ValueError as e:
yield JSONError("'%s': '%s' is not a valid timestamp: %s" %
(tprop, instance[tprop], str(e)), instance['id'])
if has_cyber_observable_data(instance):
for key, obj in instance['objects'].items():
if 'type' not in obj:
continue
if obj['type'] in enums.TIMESTAMP_OBSERVABLE_PROPERTIES:
for tprop in enums.TIMESTAMP_OBSERVABLE_PROPERTIES[obj['type']
]:
if tprop in obj and ts_re.match(obj[tprop]):
try:
parser.parse(obj[tprop])
except ValueError as e:
yield JSONError(
"'%s': '%s': '%s' is not a valid timestamp: %s"
% (obj['type'], tprop, obj[tprop], str(e)),
instance['id'])
if obj['type'] in enums.TIMESTAMP_EMBEDDED_PROPERTIES:
for embed in enums.TIMESTAMP_EMBEDDED_PROPERTIES[obj['type']]:
if embed in obj:
for tprop in enums.TIMESTAMP_EMBEDDED_PROPERTIES[obj
['type']][embed]:
if embed == 'extensions':
for ext in obj[embed]:
if tprop in obj[embed][ext
] and ts_re.match(obj[embed][ext][
tprop]):
try:
parser.parse(obj[embed][ext][tprop])
except ValueError as e:
yield JSONError(
"'%s': '%s': '%s': '%s' is not a valid timestamp: %s"
% (obj['type'], ext, tprop, obj[
embed][ext][tprop], str(e)),
instance['id'])
elif tprop in obj[embed] and ts_re.match(obj[
embed][tprop]):
try:
parser.parse(obj[embed][tprop])
except ValueError as e:
yield JSONError(
"'%s': '%s': '%s' is not a valid timestamp: %s"
% (obj['type'], tprop, obj[embed][
tprop], str(e)), instance['id'])
|
timestamp
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n ts_re = re.compile(\n '^[0-9]{4}-(0[1-9]|1[012])-(0[1-9]|[12][0-9]|3[01])T([01][0-9]|2[0-3]):([0-5][0-9]):([0-5][0-9]|60)(\\\\.[0-9]+)?Z$'\n )\n timestamp_props = ['created', 'modified']\n if instance['type'] in enums.TIMESTAMP_PROPERTIES:\n timestamp_props += enums.TIMESTAMP_PROPERTIES[instance['type']]\n for tprop in timestamp_props:\n if tprop in instance and ts_re.match(instance[tprop]):\n try:\n parser.parse(instance[tprop])\n except ValueError as e:\n yield JSONError(\"'%s': '%s' is not a valid timestamp: %s\" %\n (tprop, instance[tprop], str(e)), instance['id'])\n if has_cyber_observable_data(instance):\n for key, obj in instance['objects'].items():\n if 'type' not in obj:\n continue\n if obj['type'] in enums.TIMESTAMP_OBSERVABLE_PROPERTIES:\n for tprop in enums.TIMESTAMP_OBSERVABLE_PROPERTIES[obj['type']\n ]:\n if tprop in obj and ts_re.match(obj[tprop]):\n try:\n parser.parse(obj[tprop])\n except ValueError as e:\n yield JSONError(\n \"'%s': '%s': '%s' is not a valid timestamp: %s\"\n % (obj['type'], tprop, obj[tprop], str(e)),\n instance['id'])\n if obj['type'] in enums.TIMESTAMP_EMBEDDED_PROPERTIES:\n for embed in enums.TIMESTAMP_EMBEDDED_PROPERTIES[obj['type']]:\n if embed in obj:\n for tprop in enums.TIMESTAMP_EMBEDDED_PROPERTIES[obj\n ['type']][embed]:\n if embed == 'extensions':\n for ext in obj[embed]:\n if tprop in obj[embed][ext\n ] and ts_re.match(obj[embed][ext][\n tprop]):\n try:\n parser.parse(obj[embed][ext][tprop])\n except ValueError as e:\n yield JSONError(\n \"'%s': '%s': '%s': '%s' is not a valid timestamp: %s\"\n % (obj['type'], ext, tprop, obj[\n embed][ext][tprop], str(e)),\n instance['id'])\n elif tprop in obj[embed] and ts_re.match(obj[\n embed][tprop]):\n try:\n parser.parse(obj[embed][tprop])\n except ValueError as e:\n yield JSONError(\n \"'%s': '%s': '%s' is not a valid timestamp: %s\"\n % (obj['type'], tprop, obj[embed][\n tprop], str(e)), instance['id'])\n",
"role": "user"
},
{
"content": "timestamp",
"role": "assistant"
}
] |
def x(instance):
if 'modified' in instance and 'created' in instance and instance['modified'
] < instance['created']:
msg = "'modified' (%s) must be later or equal to 'created' (%s)"
return JSONError(msg % (instance['modified'], instance['created']),
instance['id'])
|
modified_created
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if 'modified' in instance and 'created' in instance and instance['modified'\n ] < instance['created']:\n msg = \"'modified' (%s) must be later or equal to 'created' (%s)\"\n return JSONError(msg % (instance['modified'], instance['created']),\n instance['id'])\n",
"role": "user"
},
{
"content": "modified_created",
"role": "assistant"
}
] |
def x(instance):
if instance['type'] != 'marking-definition':
return
if 'object_marking_refs' in instance:
for ref in instance['object_marking_refs']:
if ref == instance['id']:
yield JSONError(
'`object_marking_refs` cannot contain any references to this marking definition object (no circular references).'
, instance['id'])
|
object_marking_circular_refs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'] != 'marking-definition':\n return\n if 'object_marking_refs' in instance:\n for ref in instance['object_marking_refs']:\n if ref == instance['id']:\n yield JSONError(\n '`object_marking_refs` cannot contain any references to this marking definition object (no circular references).'\n , instance['id'])\n",
"role": "user"
},
{
"content": "object_marking_circular_refs",
"role": "assistant"
}
] |
def x(instance):
if instance['type'] != 'marking-definition':
return
if 'granular_markings' in instance:
for marking in instance['granular_markings']:
if 'marking_ref' in marking and marking['marking_ref'] == instance[
'id']:
yield JSONError(
'`granular_markings` cannot contain any references to this marking definition object (no circular references).'
, instance['id'])
|
granular_markings_circular_refs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'] != 'marking-definition':\n return\n if 'granular_markings' in instance:\n for marking in instance['granular_markings']:\n if 'marking_ref' in marking and marking['marking_ref'] == instance[\n 'id']:\n yield JSONError(\n '`granular_markings` cannot contain any references to this marking definition object (no circular references).'\n , instance['id'])\n",
"role": "user"
},
{
"content": "granular_markings_circular_refs",
"role": "assistant"
}
] |
def x(instance):
if 'granular_markings' not in instance:
return
list_index_re = re.compile('\\[(\\d+)\\]')
for marking in instance['granular_markings']:
if 'selectors' not in marking:
continue
selectors = marking['selectors']
for selector in selectors:
segments = selector.split('.')
obj = instance
prev_segmt = None
for segmt in segments:
index_match = list_index_re.match(segmt)
if index_match:
try:
idx = int(index_match.group(1))
obj = obj[idx]
except IndexError:
yield JSONError(
"'%s' is not a valid selector because %s is not a valid index."
% (selector, idx), instance['id'])
except KeyError:
yield JSONError(
"'%s' is not a valid selector because '%s' is not a list."
% (selector, prev_segmt), instance['id'])
else:
try:
obj = obj[segmt]
except KeyError as e:
yield JSONError(
"'%s' is not a valid selector because %s is not a property."
% (selector, e), instance['id'])
except TypeError:
yield JSONError(
"'%s' is not a valid selector because '%s' is not a property."
% (selector, segmt), instance['id'])
prev_segmt = segmt
|
marking_selector_syntax
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if 'granular_markings' not in instance:\n return\n list_index_re = re.compile('\\\\[(\\\\d+)\\\\]')\n for marking in instance['granular_markings']:\n if 'selectors' not in marking:\n continue\n selectors = marking['selectors']\n for selector in selectors:\n segments = selector.split('.')\n obj = instance\n prev_segmt = None\n for segmt in segments:\n index_match = list_index_re.match(segmt)\n if index_match:\n try:\n idx = int(index_match.group(1))\n obj = obj[idx]\n except IndexError:\n yield JSONError(\n \"'%s' is not a valid selector because %s is not a valid index.\"\n % (selector, idx), instance['id'])\n except KeyError:\n yield JSONError(\n \"'%s' is not a valid selector because '%s' is not a list.\"\n % (selector, prev_segmt), instance['id'])\n else:\n try:\n obj = obj[segmt]\n except KeyError as e:\n yield JSONError(\n \"'%s' is not a valid selector because %s is not a property.\"\n % (selector, e), instance['id'])\n except TypeError:\n yield JSONError(\n \"'%s' is not a valid selector because '%s' is not a property.\"\n % (selector, segmt), instance['id'])\n prev_segmt = segmt\n",
"role": "user"
},
{
"content": "marking_selector_syntax",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' not in obj:
continue
elif obj['type'] not in enums.OBSERVABLE_PROP_REFS:
continue
obj_type = obj['type']
for obj_prop in enums.OBSERVABLE_PROP_REFS[obj_type]:
if obj_prop not in obj:
continue
enum_prop = enums.OBSERVABLE_PROP_REFS[obj_type][obj_prop]
if isinstance(enum_prop, list):
refs = obj[obj_prop]
enum_vals = enum_prop
for x in check_observable_refs(refs, obj_prop, enum_prop,
'', enum_vals, key, instance):
yield x
elif isinstance(enum_prop, dict):
for embedded_prop in enum_prop:
if isinstance(obj[obj_prop], dict):
if embedded_prop not in obj[obj_prop]:
continue
embedded_obj = obj[obj_prop][embedded_prop]
for embed_obj_prop in embedded_obj:
if embed_obj_prop not in enum_prop[embedded_prop]:
continue
refs = embedded_obj[embed_obj_prop]
enum_vals = enum_prop[embedded_prop][embed_obj_prop
]
for x in check_observable_refs(refs, obj_prop,
enum_prop, embed_obj_prop, enum_vals, key,
instance):
yield x
elif isinstance(obj[obj_prop], list):
for embedded_list_obj in obj[obj_prop]:
if embedded_prop not in embedded_list_obj:
continue
embedded_obj = embedded_list_obj[embedded_prop]
refs = embedded_obj
enum_vals = enum_prop[embedded_prop]
for x in check_observable_refs(refs, obj_prop,
enum_prop, embedded_prop, enum_vals, key,
instance):
yield x
|
observable_object_references
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' not in obj:\n continue\n elif obj['type'] not in enums.OBSERVABLE_PROP_REFS:\n continue\n obj_type = obj['type']\n for obj_prop in enums.OBSERVABLE_PROP_REFS[obj_type]:\n if obj_prop not in obj:\n continue\n enum_prop = enums.OBSERVABLE_PROP_REFS[obj_type][obj_prop]\n if isinstance(enum_prop, list):\n refs = obj[obj_prop]\n enum_vals = enum_prop\n for x in check_observable_refs(refs, obj_prop, enum_prop,\n '', enum_vals, key, instance):\n yield x\n elif isinstance(enum_prop, dict):\n for embedded_prop in enum_prop:\n if isinstance(obj[obj_prop], dict):\n if embedded_prop not in obj[obj_prop]:\n continue\n embedded_obj = obj[obj_prop][embedded_prop]\n for embed_obj_prop in embedded_obj:\n if embed_obj_prop not in enum_prop[embedded_prop]:\n continue\n refs = embedded_obj[embed_obj_prop]\n enum_vals = enum_prop[embedded_prop][embed_obj_prop\n ]\n for x in check_observable_refs(refs, obj_prop,\n enum_prop, embed_obj_prop, enum_vals, key,\n instance):\n yield x\n elif isinstance(obj[obj_prop], list):\n for embedded_list_obj in obj[obj_prop]:\n if embedded_prop not in embedded_list_obj:\n continue\n embedded_obj = embedded_list_obj[embedded_prop]\n refs = embedded_obj\n enum_vals = enum_prop[embedded_prop]\n for x in check_observable_refs(refs, obj_prop,\n enum_prop, embedded_prop, enum_vals, key,\n instance):\n yield x\n",
"role": "user"
},
{
"content": "observable_object_references",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'artifact' and 'mime_type' in obj:
if enums.media_types():
if obj['mime_type'] not in enums.media_types():
yield JSONError(
"The 'mime_type' property of object '%s' ('%s') must be an IANA registered MIME Type of the form 'type/subtype'."
% (key, obj['mime_type']), instance['id'])
else:
info("Can't reach IANA website; using regex for mime types.")
mime_re = re.compile(
'^(application|audio|font|image|message|model|multipart|text|video)/[a-zA-Z0-9.+_-]+'
)
if not mime_re.match(obj['mime_type']):
yield JSONError(
"The 'mime_type' property of object '%s' ('%s') should be an IANA MIME Type of the form 'type/subtype'."
% (key, obj['mime_type']), instance['id'])
|
artifact_mime_type
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'artifact' and 'mime_type' in obj:\n if enums.media_types():\n if obj['mime_type'] not in enums.media_types():\n yield JSONError(\n \"The 'mime_type' property of object '%s' ('%s') must be an IANA registered MIME Type of the form 'type/subtype'.\"\n % (key, obj['mime_type']), instance['id'])\n else:\n info(\"Can't reach IANA website; using regex for mime types.\")\n mime_re = re.compile(\n '^(application|audio|font|image|message|model|multipart|text|video)/[a-zA-Z0-9.+_-]+'\n )\n if not mime_re.match(obj['mime_type']):\n yield JSONError(\n \"The 'mime_type' property of object '%s' ('%s') should be an IANA MIME Type of the form 'type/subtype'.\"\n % (key, obj['mime_type']), instance['id'])\n",
"role": "user"
},
{
"content": "artifact_mime_type",
"role": "assistant"
}
] |
def x(instance):
char_re = re.compile('^[a-zA-Z0-9_\\(\\)-]+$')
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'directory' and 'path_enc' in obj:
if enums.char_sets():
if obj['path_enc'] not in enums.char_sets():
yield JSONError(
"The 'path_enc' property of object '%s' ('%s') must be an IANA registered character set."
% (key, obj['path_enc']), instance['id'])
else:
info("Can't reach IANA website; using regex for character_set."
)
if not char_re.match(obj['path_enc']):
yield JSONError(
"The 'path_enc' property of object '%s' ('%s') must be an IANA registered character set."
% (key, obj['path_enc']), instance['id'])
if 'type' in obj and obj['type'] == 'file' and 'name_enc' in obj:
if enums.char_sets():
if obj['name_enc'] not in enums.char_sets():
yield JSONError(
"The 'name_enc' property of object '%s' ('%s') must be an IANA registered character set."
% (key, obj['name_enc']), instance['id'])
else:
info("Can't reach IANA website; using regex for character_set."
)
if not char_re.match(obj['name_enc']):
yield JSONError(
"The 'name_enc' property of object '%s' ('%s') must be an IANA registered character set."
% (key, obj['name_enc']), instance['id'])
|
character_set
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n char_re = re.compile('^[a-zA-Z0-9_\\\\(\\\\)-]+$')\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'directory' and 'path_enc' in obj:\n if enums.char_sets():\n if obj['path_enc'] not in enums.char_sets():\n yield JSONError(\n \"The 'path_enc' property of object '%s' ('%s') must be an IANA registered character set.\"\n % (key, obj['path_enc']), instance['id'])\n else:\n info(\"Can't reach IANA website; using regex for character_set.\"\n )\n if not char_re.match(obj['path_enc']):\n yield JSONError(\n \"The 'path_enc' property of object '%s' ('%s') must be an IANA registered character set.\"\n % (key, obj['path_enc']), instance['id'])\n if 'type' in obj and obj['type'] == 'file' and 'name_enc' in obj:\n if enums.char_sets():\n if obj['name_enc'] not in enums.char_sets():\n yield JSONError(\n \"The 'name_enc' property of object '%s' ('%s') must be an IANA registered character set.\"\n % (key, obj['name_enc']), instance['id'])\n else:\n info(\"Can't reach IANA website; using regex for character_set.\"\n )\n if not char_re.match(obj['name_enc']):\n yield JSONError(\n \"The 'name_enc' property of object '%s' ('%s') must be an IANA registered character set.\"\n % (key, obj['name_enc']), instance['id'])\n",
"role": "user"
},
{
"content": "character_set",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'software' and 'languages' in obj:
for lang in obj['languages']:
if lang not in enums.SOFTWARE_LANG_CODES:
yield JSONError(
"The 'languages' property of object '%s' contains an invalid ISO 639-2 language code ('%s')."
% (key, lang), instance['id'])
|
software_language
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'software' and 'languages' in obj:\n for lang in obj['languages']:\n if lang not in enums.SOFTWARE_LANG_CODES:\n yield JSONError(\n \"The 'languages' property of object '%s' contains an invalid ISO 639-2 language code ('%s').\"\n % (key, lang), instance['id'])\n",
"role": "user"
},
{
"content": "software_language",
"role": "assistant"
}
] |
def x(instance):
if instance['type'] not in enums.TYPES:
yield JSONError(
"Object type '%s' is not one of those defined in the specification."
% instance['type'], instance['id'])
if has_cyber_observable_data(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] not in enums.OBSERVABLE_TYPES:
yield JSONError(
"Observable object %s is type '%s' which is not one of those defined in the specification."
% (key, obj['type']), instance['id'])
|
types_strict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'] not in enums.TYPES:\n yield JSONError(\n \"Object type '%s' is not one of those defined in the specification.\"\n % instance['type'], instance['id'])\n if has_cyber_observable_data(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] not in enums.OBSERVABLE_TYPES:\n yield JSONError(\n \"Observable object %s is type '%s' which is not one of those defined in the specification.\"\n % (key, obj['type']), instance['id'])\n",
"role": "user"
},
{
"content": "types_strict",
"role": "assistant"
}
] |
def x(instance):
if instance['type'] not in enums.TYPES:
return
defined_props = enums.PROPERTIES.get(instance['type'], [])
for prop in instance.keys():
if prop not in defined_props:
yield JSONError(
"Property '%s' is not one of those defined in the specification."
% prop, instance['id'])
if has_cyber_observable_data(instance):
for key, obj in instance['objects'].items():
type_ = obj.get('type', '')
if type_ not in enums.OBSERVABLE_PROPERTIES:
continue
observable_props = enums.OBSERVABLE_PROPERTIES.get(type_, [])
embedded_props = enums.OBSERVABLE_EMBEDDED_PROPERTIES.get(type_, {}
)
extensions = enums.OBSERVABLE_EXTENSIONS.get(type_, [])
for prop in obj.keys():
if prop not in observable_props:
yield JSONError(
"Property '%s' is not one of those defined in the specification for %s objects."
% (prop, type_), instance['id'])
elif prop in embedded_props:
embedded_prop_keys = embedded_props.get(prop, [])
for embedded_key in obj[prop]:
if isinstance(embedded_key, dict):
for embedded in embedded_key:
if embedded not in embedded_prop_keys:
yield JSONError(
"Property '%s' is not one of those defined in the specification for the %s property in %s objects."
% (embedded, prop, type_),
instance['id'])
elif embedded_key not in embedded_prop_keys:
yield JSONError(
"Property '%s' is not one of those defined in the specification for the %s property in %s objects."
% (embedded_key, prop, type_), instance['id'])
for ext_key in obj.get('extensions', {}):
if ext_key not in extensions:
continue
extension_props = enums.OBSERVABLE_EXTENSION_PROPERTIES[ext_key
]
for ext_prop in obj['extensions'][ext_key]:
if ext_prop not in extension_props:
yield JSONError(
"Property '%s' is not one of those defined in the specification for the %s extension in %s objects."
% (ext_prop, ext_key, type_), instance['id'])
embedded_ext_props = (enums.
OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES.get(
ext_key, {}).get(ext_prop, []))
if embedded_ext_props:
for embed_ext_prop in obj['extensions'][ext_key].get(
ext_prop, []):
if embed_ext_prop not in embedded_ext_props:
yield JSONError(
"Property '%s' in the %s property of the %s extension is not one of those defined in the specification."
% (embed_ext_prop, ext_prop, ext_key),
instance['id'])
|
properties_strict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'] not in enums.TYPES:\n return\n defined_props = enums.PROPERTIES.get(instance['type'], [])\n for prop in instance.keys():\n if prop not in defined_props:\n yield JSONError(\n \"Property '%s' is not one of those defined in the specification.\"\n % prop, instance['id'])\n if has_cyber_observable_data(instance):\n for key, obj in instance['objects'].items():\n type_ = obj.get('type', '')\n if type_ not in enums.OBSERVABLE_PROPERTIES:\n continue\n observable_props = enums.OBSERVABLE_PROPERTIES.get(type_, [])\n embedded_props = enums.OBSERVABLE_EMBEDDED_PROPERTIES.get(type_, {}\n )\n extensions = enums.OBSERVABLE_EXTENSIONS.get(type_, [])\n for prop in obj.keys():\n if prop not in observable_props:\n yield JSONError(\n \"Property '%s' is not one of those defined in the specification for %s objects.\"\n % (prop, type_), instance['id'])\n elif prop in embedded_props:\n embedded_prop_keys = embedded_props.get(prop, [])\n for embedded_key in obj[prop]:\n if isinstance(embedded_key, dict):\n for embedded in embedded_key:\n if embedded not in embedded_prop_keys:\n yield JSONError(\n \"Property '%s' is not one of those defined in the specification for the %s property in %s objects.\"\n % (embedded, prop, type_),\n instance['id'])\n elif embedded_key not in embedded_prop_keys:\n yield JSONError(\n \"Property '%s' is not one of those defined in the specification for the %s property in %s objects.\"\n % (embedded_key, prop, type_), instance['id'])\n for ext_key in obj.get('extensions', {}):\n if ext_key not in extensions:\n continue\n extension_props = enums.OBSERVABLE_EXTENSION_PROPERTIES[ext_key\n ]\n for ext_prop in obj['extensions'][ext_key]:\n if ext_prop not in extension_props:\n yield JSONError(\n \"Property '%s' is not one of those defined in the specification for the %s extension in %s objects.\"\n % (ext_prop, ext_key, type_), instance['id'])\n embedded_ext_props = (enums.\n OBSERVABLE_EXTENSION_EMBEDDED_PROPERTIES.get(\n ext_key, {}).get(ext_prop, []))\n if embedded_ext_props:\n for embed_ext_prop in obj['extensions'][ext_key].get(\n ext_prop, []):\n if embed_ext_prop not in embedded_ext_props:\n yield JSONError(\n \"Property '%s' in the %s property of the %s extension is not one of those defined in the specification.\"\n % (embed_ext_prop, ext_prop, ext_key),\n instance['id'])\n",
"role": "user"
},
{
"content": "properties_strict",
"role": "assistant"
}
] |
def x(instance, options):
if instance['type'] != 'indicator' or 'pattern' not in instance:
return
pattern = instance['pattern']
if not isinstance(pattern, string_types):
return
errors = pattern_validator(pattern)
if errors:
for e in errors:
yield PatternError(str(e), instance['id'])
return
type_format_re = re.compile('^\\-?[a-z0-9]+(-[a-z0-9]+)*\\-?$')
property_format_re = re.compile('^[a-z0-9_]{3,250}$')
p = Pattern(pattern)
inspection = p.inspect().comparisons
for objtype in inspection:
if objtype in enums.OBSERVABLE_TYPES:
pass
elif options.strict_types:
yield PatternError("'%s' is not a valid STIX observable type" %
objtype, instance['id'])
elif not type_format_re.match(objtype) or len(objtype) < 3 or len(
objtype) > 250:
yield PatternError("'%s' is not a valid observable type name" %
objtype, instance['id'])
elif all(x not in options.disabled for x in ['all', 'format-checks',
'custom-prefix']) and not CUSTOM_TYPE_PREFIX_RE.match(objtype):
yield PatternError(
"Custom Observable Object type '%s' should start with 'x-' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name"
% objtype, instance['id'])
elif all(x not in options.disabled for x in ['all', 'format-checks',
'custom-prefix-lax']) and not CUSTOM_TYPE_LAX_PREFIX_RE.match(
objtype):
yield PatternError(
"Custom Observable Object type '%s' should start with 'x-'" %
objtype, instance['id'])
expression_list = inspection[objtype]
for exp in expression_list:
path = exp[0]
prop = path[0]
if (objtype in enums.OBSERVABLE_PROPERTIES and prop in enums.
OBSERVABLE_PROPERTIES[objtype]):
continue
elif options.strict_properties:
yield PatternError(
"'%s' is not a valid property for '%s' objects" % (prop,
objtype), instance['id'])
elif not property_format_re.match(prop):
yield PatternError(
"'%s' is not a valid observable property name" % prop,
instance['id'])
elif all(x not in options.disabled for x in ['all',
'format-checks', 'custom-prefix']
) and not CUSTOM_PROPERTY_PREFIX_RE.match(prop):
yield PatternError(
"Cyber Observable Object custom property '%s' should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by underscores), an underscore and then the name"
% prop, instance['id'])
elif all(x not in options.disabled for x in ['all',
'format-checks', 'custom-prefix-lax']
) and not CUSTOM_PROPERTY_LAX_PREFIX_RE.match(prop):
yield PatternError(
"Cyber Observable Object custom property '%s' should start with 'x_'"
% prop, instance['id'])
|
patterns
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance, options):\n if instance['type'] != 'indicator' or 'pattern' not in instance:\n return\n pattern = instance['pattern']\n if not isinstance(pattern, string_types):\n return\n errors = pattern_validator(pattern)\n if errors:\n for e in errors:\n yield PatternError(str(e), instance['id'])\n return\n type_format_re = re.compile('^\\\\-?[a-z0-9]+(-[a-z0-9]+)*\\\\-?$')\n property_format_re = re.compile('^[a-z0-9_]{3,250}$')\n p = Pattern(pattern)\n inspection = p.inspect().comparisons\n for objtype in inspection:\n if objtype in enums.OBSERVABLE_TYPES:\n pass\n elif options.strict_types:\n yield PatternError(\"'%s' is not a valid STIX observable type\" %\n objtype, instance['id'])\n elif not type_format_re.match(objtype) or len(objtype) < 3 or len(\n objtype) > 250:\n yield PatternError(\"'%s' is not a valid observable type name\" %\n objtype, instance['id'])\n elif all(x not in options.disabled for x in ['all', 'format-checks',\n 'custom-prefix']) and not CUSTOM_TYPE_PREFIX_RE.match(objtype):\n yield PatternError(\n \"Custom Observable Object type '%s' should start with 'x-' followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name\"\n % objtype, instance['id'])\n elif all(x not in options.disabled for x in ['all', 'format-checks',\n 'custom-prefix-lax']) and not CUSTOM_TYPE_LAX_PREFIX_RE.match(\n objtype):\n yield PatternError(\n \"Custom Observable Object type '%s' should start with 'x-'\" %\n objtype, instance['id'])\n expression_list = inspection[objtype]\n for exp in expression_list:\n path = exp[0]\n prop = path[0]\n if (objtype in enums.OBSERVABLE_PROPERTIES and prop in enums.\n OBSERVABLE_PROPERTIES[objtype]):\n continue\n elif options.strict_properties:\n yield PatternError(\n \"'%s' is not a valid property for '%s' objects\" % (prop,\n objtype), instance['id'])\n elif not property_format_re.match(prop):\n yield PatternError(\n \"'%s' is not a valid observable property name\" % prop,\n instance['id'])\n elif all(x not in options.disabled for x in ['all',\n 'format-checks', 'custom-prefix']\n ) and not CUSTOM_PROPERTY_PREFIX_RE.match(prop):\n yield PatternError(\n \"Cyber Observable Object custom property '%s' should start with 'x_' followed by a source unique identifier (like a domain name with dots replaced by underscores), an underscore and then the name\"\n % prop, instance['id'])\n elif all(x not in options.disabled for x in ['all',\n 'format-checks', 'custom-prefix-lax']\n ) and not CUSTOM_PROPERTY_LAX_PREFIX_RE.match(prop):\n yield PatternError(\n \"Cyber Observable Object custom property '%s' should start with 'x_'\"\n % prop, instance['id'])\n",
"role": "user"
},
{
"content": "patterns",
"role": "assistant"
}
] |
def x(options):
validator_list = [timestamp, modified_created,
object_marking_circular_refs, granular_markings_circular_refs,
marking_selector_syntax, observable_object_references,
artifact_mime_type, character_set, software_language, patterns]
if options.strict_types:
validator_list.append(types_strict)
if options.strict_properties:
validator_list.append(properties_strict)
return validator_list
|
list_musts
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(options):\n validator_list = [timestamp, modified_created,\n object_marking_circular_refs, granular_markings_circular_refs,\n marking_selector_syntax, observable_object_references,\n artifact_mime_type, character_set, software_language, patterns]\n if options.strict_types:\n validator_list.append(types_strict)\n if options.strict_properties:\n validator_list.append(properties_strict)\n return validator_list\n",
"role": "user"
},
{
"content": "list_musts",
"role": "assistant"
}
] |
def x():
if not hasattr(media_types, 'typelist'):
tlist = []
categories = ['application', 'audio', 'font', 'image', 'message',
'model', 'multipart', 'text', 'video']
for cat in categories:
try:
data = requests.get(
'http://www.iana.org/assignments/media-types/%s.csv' % cat)
except requests.exceptions.RequestException:
return []
types = []
for line in data.iter_lines():
if line:
line = line.decode('utf-8')
if line.count(',') > 0:
reg_template = line.split(',')[1]
if reg_template:
types.append(reg_template)
else:
types.append(cat + '/' + line.split(',')[0])
tlist.extend(types)
media_types.typelist = tlist
return media_types.typelist
|
media_types
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if not hasattr(media_types, 'typelist'):\n tlist = []\n categories = ['application', 'audio', 'font', 'image', 'message',\n 'model', 'multipart', 'text', 'video']\n for cat in categories:\n try:\n data = requests.get(\n 'http://www.iana.org/assignments/media-types/%s.csv' % cat)\n except requests.exceptions.RequestException:\n return []\n types = []\n for line in data.iter_lines():\n if line:\n line = line.decode('utf-8')\n if line.count(',') > 0:\n reg_template = line.split(',')[1]\n if reg_template:\n types.append(reg_template)\n else:\n types.append(cat + '/' + line.split(',')[0])\n tlist.extend(types)\n media_types.typelist = tlist\n return media_types.typelist\n",
"role": "user"
},
{
"content": "media_types",
"role": "assistant"
}
] |
def x():
if not hasattr(char_sets, 'setlist'):
clist = []
try:
data = requests.get(
'http://www.iana.org/assignments/character-sets/character-sets-1.csv'
)
except requests.exceptions.RequestException:
return []
for line in data.iter_lines():
if line:
line = line.decode('utf-8')
if line.count(',') > 0:
vals = line.split(',')
if vals[0]:
clist.append(vals[0])
else:
clist.append(vals[1])
char_sets.setlist = clist
return char_sets.setlist
|
char_sets
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if not hasattr(char_sets, 'setlist'):\n clist = []\n try:\n data = requests.get(\n 'http://www.iana.org/assignments/character-sets/character-sets-1.csv'\n )\n except requests.exceptions.RequestException:\n return []\n for line in data.iter_lines():\n if line:\n line = line.decode('utf-8')\n if line.count(',') > 0:\n vals = line.split(',')\n if vals[0]:\n clist.append(vals[0])\n else:\n clist.append(vals[1])\n char_sets.setlist = clist\n return char_sets.setlist\n",
"role": "user"
},
{
"content": "char_sets",
"role": "assistant"
}
] |
def x():
if not hasattr(protocols, 'protlist'):
plist = []
try:
data = requests.get(
'http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.csv'
)
except requests.exceptions.RequestException:
return []
for line in data.iter_lines():
if line:
line = line.decode('utf-8')
if line.count(',') > 0:
vals = line.split(',')
if vals[0]:
plist.append(vals[0])
if len(vals) > 2 and vals[2] and vals[2] not in plist:
plist.append(vals[2])
plist.append('ipv4')
plist.append('ipv6')
plist.append('ssl')
plist.append('tls')
plist.append('dns')
protocols.protlist = plist
return protocols.protlist
|
protocols
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if not hasattr(protocols, 'protlist'):\n plist = []\n try:\n data = requests.get(\n 'http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.csv'\n )\n except requests.exceptions.RequestException:\n return []\n for line in data.iter_lines():\n if line:\n line = line.decode('utf-8')\n if line.count(',') > 0:\n vals = line.split(',')\n if vals[0]:\n plist.append(vals[0])\n if len(vals) > 2 and vals[2] and vals[2] not in plist:\n plist.append(vals[2])\n plist.append('ipv4')\n plist.append('ipv6')\n plist.append('ssl')\n plist.append('tls')\n plist.append('dns')\n protocols.protlist = plist\n return protocols.protlist\n",
"role": "user"
},
{
"content": "protocols",
"role": "assistant"
}
] |
def x():
if not hasattr(ipfix, 'ipflist'):
ilist = []
try:
data = requests.get(
'http://www.iana.org/assignments/ipfix/ipfix-information-elements.csv'
)
except requests.exceptions.RequestException:
return []
for line in data.iter_lines():
if line:
line = line.decode('utf-8')
if re.match('^\\d+(,[a-zA-Z0-9]+){2},', line):
vals = line.split(',')
if vals[1]:
ilist.append(vals[1])
ipfix.ipflist = ilist
return ipfix.ipflist
|
ipfix
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n if not hasattr(ipfix, 'ipflist'):\n ilist = []\n try:\n data = requests.get(\n 'http://www.iana.org/assignments/ipfix/ipfix-information-elements.csv'\n )\n except requests.exceptions.RequestException:\n return []\n for line in data.iter_lines():\n if line:\n line = line.decode('utf-8')\n if re.match('^\\\\d+(,[a-zA-Z0-9]+){2},', line):\n vals = line.split(',')\n if vals[1]:\n ilist.append(vals[1])\n ipfix.ipflist = ilist\n return ipfix.ipflist\n",
"role": "user"
},
{
"content": "ipfix",
"role": "assistant"
}
] |
def x(log_function, fmt, level, *args):
if _SILENT:
return
msg = fmt % args
spaces = ' ' * level
log_function('%s%s' % (spaces, msg))
|
print_level
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(log_function, fmt, level, *args):\n if _SILENT:\n return\n msg = fmt % args\n spaces = ' ' * level\n log_function('%s%s' % (spaces, msg))\n",
"role": "user"
},
{
"content": "print_level",
"role": "assistant"
}
] |
def x(results, level=0):
print_level(logger.critical, _RED + '[X] Fatal Error: %s', level,
results.error)
|
print_fatal_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(results, level=0):\n print_level(logger.critical, _RED + '[X] Fatal Error: %s', level,\n results.error)\n",
"role": "user"
},
{
"content": "print_fatal_results",
"role": "assistant"
}
] |
def x(results, level=0):
for error in results.errors:
print_level(logger.error, _RED + '[X] %s', level, error)
|
print_schema_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(results, level=0):\n for error in results.errors:\n print_level(logger.error, _RED + '[X] %s', level, error)\n",
"role": "user"
},
{
"content": "print_schema_results",
"role": "assistant"
}
] |
def x(results, level=0):
marker = _YELLOW + '[!] '
for warning in results.warnings:
print_level(logger.warning, marker + 'Warning: %s', level, warning)
|
print_warning_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(results, level=0):\n marker = _YELLOW + '[!] '\n for warning in results.warnings:\n print_level(logger.warning, marker + 'Warning: %s', level, warning)\n",
"role": "user"
},
{
"content": "print_warning_results",
"role": "assistant"
}
] |
def x(identifier, is_valid):
print_horizontal_rule()
print_level(logger.info, '[-] Results for: %s', 0, identifier)
if is_valid:
marker = _GREEN + '[+]'
verdict = 'Valid'
log_func = logger.info
else:
marker = _RED + '[X]'
verdict = 'Invalid'
log_func = logger.error
print_level(log_func, '%s STIX JSON: %s', 0, marker, verdict)
|
print_results_header
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(identifier, is_valid):\n print_horizontal_rule()\n print_level(logger.info, '[-] Results for: %s', 0, identifier)\n if is_valid:\n marker = _GREEN + '[+]'\n verdict = 'Valid'\n log_func = logger.info\n else:\n marker = _RED + '[X]'\n verdict = 'Invalid'\n log_func = logger.error\n print_level(log_func, '%s STIX JSON: %s', 0, marker, verdict)\n",
"role": "user"
},
{
"content": "print_results_header",
"role": "assistant"
}
] |
def x(obj_result):
print_results_header(obj_result.object_id, obj_result.is_valid)
if obj_result.warnings:
print_warning_results(obj_result, 1)
if obj_result.errors:
print_schema_results(obj_result, 1)
|
print_object_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(obj_result):\n print_results_header(obj_result.object_id, obj_result.is_valid)\n if obj_result.warnings:\n print_warning_results(obj_result, 1)\n if obj_result.errors:\n print_schema_results(obj_result, 1)\n",
"role": "user"
},
{
"content": "print_object_results",
"role": "assistant"
}
] |
def x(file_result):
print_results_header(file_result.filepath, file_result.is_valid)
for object_result in file_result.object_results:
if object_result.warnings:
print_warning_results(object_result, 1)
if object_result.errors:
print_schema_results(object_result, 1)
if file_result.fatal:
print_fatal_results(file_result.fatal, 1)
|
print_file_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(file_result):\n print_results_header(file_result.filepath, file_result.is_valid)\n for object_result in file_result.object_results:\n if object_result.warnings:\n print_warning_results(object_result, 1)\n if object_result.errors:\n print_schema_results(object_result, 1)\n if file_result.fatal:\n print_fatal_results(file_result.fatal, 1)\n",
"role": "user"
},
{
"content": "print_file_results",
"role": "assistant"
}
] |
def x(results):
if not isinstance(results, list):
results = [results]
for r in results:
try:
r.log()
except AttributeError:
raise ValueError(
'Argument to print_results() must be a list of FileValidationResults or ObjectValidationResults.'
)
|
print_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(results):\n if not isinstance(results, list):\n results = [results]\n for r in results:\n try:\n r.log()\n except AttributeError:\n raise ValueError(\n 'Argument to print_results() must be a list of FileValidationResults or ObjectValidationResults.'\n )\n",
"role": "user"
},
{
"content": "print_results",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
if 'type' in obj and obj['type'] == 'file':
try:
enc_algo = obj['encryption_algorithm']
except KeyError:
continue
if enc_algo not in enums.ENCRYPTION_ALGO_OV:
yield JSONError(
"Object '%s' has an 'encryption_algorithm' of '%s', which is not a value in the encryption-algo-ov vocabulary."
% (key, enc_algo), instance['id'], 'encryption-algo')
|
vocab_encryption_algo
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n if 'type' in obj and obj['type'] == 'file':\n try:\n enc_algo = obj['encryption_algorithm']\n except KeyError:\n continue\n if enc_algo not in enums.ENCRYPTION_ALGO_OV:\n yield JSONError(\n \"Object '%s' has an 'encryption_algorithm' of '%s', which is not a value in the encryption-algo-ov vocabulary.\"\n % (key, enc_algo), instance['id'], 'encryption-algo')\n",
"role": "user"
},
{
"content": "vocab_encryption_algo",
"role": "assistant"
}
] |
def x(instance):
if instance['type'] != 'bundle' or 'objects' not in instance:
return
rel_references = set()
"""Find and store all ids"""
for obj in instance['objects']:
if obj['type'] != 'relationship':
rel_references.add(obj['id'])
"""Check if id has been encountered"""
for obj in instance['objects']:
if obj['type'] == 'relationship':
if obj['source_ref'] not in rel_references:
yield JSONError(
'Relationship object %s makes reference to %s Which is not found in current bundle '
% (obj['id'], obj['source_ref']),
'enforce-relationship-refs')
if obj['target_ref'] not in rel_references:
yield JSONError(
'Relationship object %s makes reference to %s Which is not found in current bundle '
% (obj['id'], obj['target_ref']),
'enforce-relationship-refs')
|
enforce_relationship_refs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'] != 'bundle' or 'objects' not in instance:\n return\n rel_references = set()\n \"\"\"Find and store all ids\"\"\"\n for obj in instance['objects']:\n if obj['type'] != 'relationship':\n rel_references.add(obj['id'])\n \"\"\"Check if id has been encountered\"\"\"\n for obj in instance['objects']:\n if obj['type'] == 'relationship':\n if obj['source_ref'] not in rel_references:\n yield JSONError(\n 'Relationship object %s makes reference to %s Which is not found in current bundle '\n % (obj['id'], obj['source_ref']),\n 'enforce-relationship-refs')\n if obj['target_ref'] not in rel_references:\n yield JSONError(\n 'Relationship object %s makes reference to %s Which is not found in current bundle '\n % (obj['id'], obj['target_ref']),\n 'enforce-relationship-refs')\n",
"role": "user"
},
{
"content": "enforce_relationship_refs",
"role": "assistant"
}
] |
def x(instance):
compares = [('modified', 'ge', 'created')]
additional_compares = enums.TIMESTAMP_COMPARE.get(instance.get('type',
''), [])
compares.extend(additional_compares)
for first, op, second in compares:
comp = getattr(operator, op)
comp_str = get_comparison_string(op)
if first in instance and second in instance and not comp(instance[
first], instance[second]):
msg = "'%s' (%s) must be %s '%s' (%s)"
yield JSONError(msg % (first, instance[first], comp_str, second,
instance[second]), instance['id'])
|
timestamp_compare
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n compares = [('modified', 'ge', 'created')]\n additional_compares = enums.TIMESTAMP_COMPARE.get(instance.get('type',\n ''), [])\n compares.extend(additional_compares)\n for first, op, second in compares:\n comp = getattr(operator, op)\n comp_str = get_comparison_string(op)\n if first in instance and second in instance and not comp(instance[\n first], instance[second]):\n msg = \"'%s' (%s) must be %s '%s' (%s)\"\n yield JSONError(msg % (first, instance[first], comp_str, second,\n instance[second]), instance['id'])\n",
"role": "user"
},
{
"content": "timestamp_compare",
"role": "assistant"
}
] |
def x(instance):
for key, obj in instance['objects'].items():
compares = enums.TIMESTAMP_COMPARE_OBSERVABLE.get(obj.get('type',
''), [])
print(compares)
for first, op, second in compares:
comp = getattr(operator, op)
comp_str = get_comparison_string(op)
if first in obj and second in obj and not comp(obj[first], obj[
second]):
msg = "In object '%s', '%s' (%s) must be %s '%s' (%s)"
yield JSONError(msg % (key, first, obj[first], comp_str,
second, obj[second]), instance['id'])
|
observable_timestamp_compare
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n for key, obj in instance['objects'].items():\n compares = enums.TIMESTAMP_COMPARE_OBSERVABLE.get(obj.get('type',\n ''), [])\n print(compares)\n for first, op, second in compares:\n comp = getattr(operator, op)\n comp_str = get_comparison_string(op)\n if first in obj and second in obj and not comp(obj[first], obj[\n second]):\n msg = \"In object '%s', '%s' (%s) must be %s '%s' (%s)\"\n yield JSONError(msg % (key, first, obj[first], comp_str,\n second, obj[second]), instance['id'])\n",
"role": "user"
},
{
"content": "observable_timestamp_compare",
"role": "assistant"
}
] |
def x(instance):
if instance['type'] != 'language-content' or 'contents' not in instance:
return
for key, value in instance['contents'].items():
if key not in enums.LANG_CODES:
yield JSONError(
"Invalid key '%s' in 'contents' property must be an RFC 5646 code"
% key, instance['id'])
for subkey, subvalue in value.items():
if not PROPERTY_FORMAT_RE.match(subkey):
yield JSONError(
"'%s' in '%s' of the 'contents' property is invalid and must match a valid property name"
% (subkey, key), instance['id'],
'observable-dictionary-keys')
|
language_contents
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(instance):\n if instance['type'] != 'language-content' or 'contents' not in instance:\n return\n for key, value in instance['contents'].items():\n if key not in enums.LANG_CODES:\n yield JSONError(\n \"Invalid key '%s' in 'contents' property must be an RFC 5646 code\"\n % key, instance['id'])\n for subkey, subvalue in value.items():\n if not PROPERTY_FORMAT_RE.match(subkey):\n yield JSONError(\n \"'%s' in '%s' of the 'contents' property is invalid and must match a valid property name\"\n % (subkey, key), instance['id'],\n 'observable-dictionary-keys')\n",
"role": "user"
},
{
"content": "language_contents",
"role": "assistant"
}
] |
def x(options):
validator_list = [timestamp, timestamp_compare,
observable_timestamp_compare, object_marking_circular_refs,
granular_markings_circular_refs, marking_selector_syntax,
observable_object_references, artifact_mime_type, character_set,
language, software_language, patterns, language_contents]
if options.strict_types:
validator_list.append(types_strict)
if options.strict_properties:
validator_list.append(properties_strict)
return validator_list
|
list_musts
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(options):\n validator_list = [timestamp, timestamp_compare,\n observable_timestamp_compare, object_marking_circular_refs,\n granular_markings_circular_refs, marking_selector_syntax,\n observable_object_references, artifact_mime_type, character_set,\n language, software_language, patterns, language_contents]\n if options.strict_types:\n validator_list.append(types_strict)\n if options.strict_properties:\n validator_list.append(properties_strict)\n return validator_list\n",
"role": "user"
},
{
"content": "list_musts",
"role": "assistant"
}
] |
def x(results):
status = EXIT_SUCCESS
for file_result in results:
error = any(object_result.errors for object_result in file_result.
object_results)
fatal = file_result.fatal
if error:
status |= EXIT_SCHEMA_INVALID
if fatal:
status |= EXIT_VALIDATION_ERROR
return status
|
get_code
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(results):\n status = EXIT_SUCCESS\n for file_result in results:\n error = any(object_result.errors for object_result in file_result.\n object_results)\n fatal = file_result.fatal\n if error:\n status |= EXIT_SCHEMA_INVALID\n if fatal:\n status |= EXIT_VALIDATION_ERROR\n return status\n",
"role": "user"
},
{
"content": "get_code",
"role": "assistant"
}
] |
def x(cmd_args, is_script=False):
parser = argparse.ArgumentParser(description=__doc__, formatter_class=
NewlinesHelpFormatter, epilog=CODES_TABLE)
if is_script:
parser.add_argument('files', metavar='FILES', nargs='*', default=
sys.stdin, help=
'A whitespace separated list of STIX files or directories of STIX files to validate. If none given, stdin will be used.'
)
parser.add_argument('-r', '--recursive', dest='recursive', action=
'store_true', default=True, help=
'Recursively descend into input directories.')
parser.add_argument('-s', '--schemas', dest='schema_dir', help=
'Custom schema directory. If provided, input will be validated against these schemas in addition to the STIX schemas bundled with this script.'
)
parser.add_argument('--version', dest='version', default=DEFAULT_VER,
help=
'The version of the STIX specification to validate against (e.g. "2.0").'
)
parser.add_argument('-v', '--verbose', dest='verbose', action=
'store_true', default=False, help=
'Print informational notes and more verbose error messages.')
parser.add_argument('-q', '--silent', dest='silent', action=
'store_true', default=False, help='Silence all output to stdout.')
parser.add_argument('-d', '--disable', '--ignore', dest='disabled',
default='', help=
"""A comma-separated list of recommended best practice checks to skip. By default, no checks are disabled.
Example: --disable 202,210"""
)
parser.add_argument('-e', '--enable', '--select', dest='enabled',
default='', help=
"""A comma-separated list of recommended best practice checks to enable. If the --disable option is not used, no other checks will be run. By default, all checks are enabled.
Example: --enable 218"""
)
parser.add_argument('--strict', dest='strict', action='store_true',
default=False, help=
'Treat warnings as errors and fail validation if any are found.')
parser.add_argument('--strict-types', dest='strict_types', action=
'store_true', default=False, help=
'Ensure that no custom object types are used, only those defined in the STIX specification.'
)
parser.add_argument('--strict-properties', dest='strict_properties',
action='store_true', default=False, help=
'Ensure that no custom properties are used, only those defined in the STIX specification.'
)
parser.add_argument('--no-cache', dest='no_cache', action='store_true',
default=False, help='Disable the caching of external source values.')
parser.add_argument('--refresh-cache', dest='refresh_cache', action=
'store_true', default=False, help=
'Clears the cache of external source values, then during validation downloads them again.'
)
parser.add_argument('--clear-cache', dest='clear_cache', action=
'store_true', default=False, help=
'Clear the cache of external source values after validation.')
parser.add_argument('--enforce-refs', dest='enforce_refs', action=
'store_true', default=False, help=
'Ensures that all SDOs being referenced by SROs are contained within the same bundle.'
)
args = parser.parse_args(cmd_args)
if not is_script:
args.files = ''
if not args.version:
args.version = DEFAULT_VER
return ValidationOptions(args)
|
parse_args
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cmd_args, is_script=False):\n parser = argparse.ArgumentParser(description=__doc__, formatter_class=\n NewlinesHelpFormatter, epilog=CODES_TABLE)\n if is_script:\n parser.add_argument('files', metavar='FILES', nargs='*', default=\n sys.stdin, help=\n 'A whitespace separated list of STIX files or directories of STIX files to validate. If none given, stdin will be used.'\n )\n parser.add_argument('-r', '--recursive', dest='recursive', action=\n 'store_true', default=True, help=\n 'Recursively descend into input directories.')\n parser.add_argument('-s', '--schemas', dest='schema_dir', help=\n 'Custom schema directory. If provided, input will be validated against these schemas in addition to the STIX schemas bundled with this script.'\n )\n parser.add_argument('--version', dest='version', default=DEFAULT_VER,\n help=\n 'The version of the STIX specification to validate against (e.g. \"2.0\").'\n )\n parser.add_argument('-v', '--verbose', dest='verbose', action=\n 'store_true', default=False, help=\n 'Print informational notes and more verbose error messages.')\n parser.add_argument('-q', '--silent', dest='silent', action=\n 'store_true', default=False, help='Silence all output to stdout.')\n parser.add_argument('-d', '--disable', '--ignore', dest='disabled',\n default='', help=\n \"\"\"A comma-separated list of recommended best practice checks to skip. By default, no checks are disabled. \n\nExample: --disable 202,210\"\"\"\n )\n parser.add_argument('-e', '--enable', '--select', dest='enabled',\n default='', help=\n \"\"\"A comma-separated list of recommended best practice checks to enable. If the --disable option is not used, no other checks will be run. By default, all checks are enabled.\n\nExample: --enable 218\"\"\"\n )\n parser.add_argument('--strict', dest='strict', action='store_true',\n default=False, help=\n 'Treat warnings as errors and fail validation if any are found.')\n parser.add_argument('--strict-types', dest='strict_types', action=\n 'store_true', default=False, help=\n 'Ensure that no custom object types are used, only those defined in the STIX specification.'\n )\n parser.add_argument('--strict-properties', dest='strict_properties',\n action='store_true', default=False, help=\n 'Ensure that no custom properties are used, only those defined in the STIX specification.'\n )\n parser.add_argument('--no-cache', dest='no_cache', action='store_true',\n default=False, help='Disable the caching of external source values.')\n parser.add_argument('--refresh-cache', dest='refresh_cache', action=\n 'store_true', default=False, help=\n 'Clears the cache of external source values, then during validation downloads them again.'\n )\n parser.add_argument('--clear-cache', dest='clear_cache', action=\n 'store_true', default=False, help=\n 'Clear the cache of external source values after validation.')\n parser.add_argument('--enforce-refs', dest='enforce_refs', action=\n 'store_true', default=False, help=\n 'Ensures that all SDOs being referenced by SROs are contained within the same bundle.'\n )\n args = parser.parse_args(cmd_args)\n if not is_script:\n args.files = ''\n if not args.version:\n args.version = DEFAULT_VER\n return ValidationOptions(args)\n",
"role": "user"
},
{
"content": "parse_args",
"role": "assistant"
}
] |
def x(original_function):
def x(*args, **kwargs):
if not has_cyber_observable_data(args[0]):
return
func = original_function(*args, **kwargs)
if isinstance(func, Iterable):
for x in original_function(*args, **kwargs):
yield x
new_function.__name__ = original_function.__name__
return new_function
|
cyber_observable_check
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(original_function):\n\n def x(*args, **kwargs):\n if not has_cyber_observable_data(args[0]):\n return\n func = original_function(*args, **kwargs)\n if isinstance(func, Iterable):\n for x in original_function(*args, **kwargs):\n yield x\n new_function.__name__ = original_function.__name__\n return new_function\n",
"role": "user"
},
{
"content": "cyber_observable_check",
"role": "assistant"
}
] |
def x(refresh_cache=False):
dirs = AppDirs('stix2-validator', 'OASIS')
try:
os.makedirs(dirs.user_cache_dir)
except OSError as e:
if e.errno != errno.EEXIST:
raise
requests_cache.install_cache(cache_name=os.path.join(dirs.
user_cache_dir, 'py{}cache'.format(sys.version_info[0])),
expire_after=datetime.timedelta(weeks=1))
if refresh_cache:
clear_requests_cache()
|
init_requests_cache
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(refresh_cache=False):\n dirs = AppDirs('stix2-validator', 'OASIS')\n try:\n os.makedirs(dirs.user_cache_dir)\n except OSError as e:\n if e.errno != errno.EEXIST:\n raise\n requests_cache.install_cache(cache_name=os.path.join(dirs.\n user_cache_dir, 'py{}cache'.format(sys.version_info[0])),\n expire_after=datetime.timedelta(weeks=1))\n if refresh_cache:\n clear_requests_cache()\n",
"role": "user"
},
{
"content": "init_requests_cache",
"role": "assistant"
}
] |
def x(self, context, kwargs, nodelist):
self.load_configuration(**kwargs)
request = context['request']
self.full_path = request.get_full_path()
context.push()
content = nodelist.render(context)
context.pop()
content = render_content(content, full_path=self.full_path, parent_tag=
self.parent_tag, css_class=self.css_class, menu=self.menu,
ignore_params=self.ignore_params)
return content
|
render_tag
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context, kwargs, nodelist):\n self.load_configuration(**kwargs)\n request = context['request']\n self.full_path = request.get_full_path()\n context.push()\n content = nodelist.render(context)\n context.pop()\n content = render_content(content, full_path=self.full_path, parent_tag=\n self.parent_tag, css_class=self.css_class, menu=self.menu,\n ignore_params=self.ignore_params)\n return content\n",
"role": "user"
},
{
"content": "render_tag",
"role": "assistant"
}
] |
def x(self, parser):
lineno = next(parser.stream).lineno
context = nodes.ContextReference()
kwargs = []
while parser.stream.look().type == lexer.TOKEN_ASSIGN:
key = parser.stream.expect(lexer.TOKEN_NAME)
next(parser.stream)
kwargs.append(nodes.Keyword(key.value, parser.parse_expression()))
parser.stream.skip_if('comma')
body = parser.parse_statements(['name:endactiveurl'], drop_needle=True)
args = [context]
call_method = self.call_method('render_tag', args=args, kwargs=kwargs)
return nodes.CallBlock(call_method, [], [], body).set_lineno(lineno)
|
parse
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, parser):\n lineno = next(parser.stream).lineno\n context = nodes.ContextReference()\n kwargs = []\n while parser.stream.look().type == lexer.TOKEN_ASSIGN:\n key = parser.stream.expect(lexer.TOKEN_NAME)\n next(parser.stream)\n kwargs.append(nodes.Keyword(key.value, parser.parse_expression()))\n parser.stream.skip_if('comma')\n body = parser.parse_statements(['name:endactiveurl'], drop_needle=True)\n args = [context]\n call_method = self.call_method('render_tag', args=args, kwargs=kwargs)\n return nodes.CallBlock(call_method, [], [], body).set_lineno(lineno)\n",
"role": "user"
},
{
"content": "parse",
"role": "assistant"
}
] |
def x(self, context, caller, **kwargs):
self.load_configuration(**kwargs)
request = context['request']
self.full_path = request.get_full_path()
content = caller()
content = render_content(content, full_path=self.full_path, parent_tag=
self.parent_tag, css_class=self.css_class, menu=self.menu,
ignore_params=self.ignore_params)
return content
|
render_tag
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context, caller, **kwargs):\n self.load_configuration(**kwargs)\n request = context['request']\n self.full_path = request.get_full_path()\n content = caller()\n content = render_content(content, full_path=self.full_path, parent_tag=\n self.parent_tag, css_class=self.css_class, menu=self.menu,\n ignore_params=self.ignore_params)\n return content\n",
"role": "user"
},
{
"content": "render_tag",
"role": "assistant"
}
] |
def x(content, **kwargs):
cache_key = ''
for key in sorted(kwargs.keys()):
cache_key = '{cache_key}.{key}:{value}'.format(cache_key=cache_key,
key=key, value=kwargs[key])
cache_key = '{content}{cache_key}'.format(content=content, cache_key=
cache_key)
cache_key = cache_key.encode('utf-8', 'ignore')
cache_key = md5(cache_key).hexdigest()
cache_key = '{prefix}.{version}.{language}.{cache_key}'.format(prefix=
settings.ACTIVE_URL_CACHE_PREFIX, version=__version__, language=
get_language(), cache_key=cache_key)
return cache_key
|
get_cache_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(content, **kwargs):\n cache_key = ''\n for key in sorted(kwargs.keys()):\n cache_key = '{cache_key}.{key}:{value}'.format(cache_key=cache_key,\n key=key, value=kwargs[key])\n cache_key = '{content}{cache_key}'.format(content=content, cache_key=\n cache_key)\n cache_key = cache_key.encode('utf-8', 'ignore')\n cache_key = md5(cache_key).hexdigest()\n cache_key = '{prefix}.{version}.{language}.{cache_key}'.format(prefix=\n settings.ACTIVE_URL_CACHE_PREFIX, version=__version__, language=\n get_language(), cache_key=cache_key)\n return cache_key\n",
"role": "user"
},
{
"content": "get_cache_key",
"role": "assistant"
}
] |
def x(value, varname):
if isinstance(value, bool):
if value:
value = 'yes'
else:
value = 'no'
elif value is None:
value = 'no'
if value.lower() in ('yes', 'true'):
value = True
elif value.lower() in ('no', 'false'):
value = False
else:
raise ImproperlyConfigured(
'activeurl: malformed param value for %s' % varname)
return value
|
yesno_to_bool
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(value, varname):\n if isinstance(value, bool):\n if value:\n value = 'yes'\n else:\n value = 'no'\n elif value is None:\n value = 'no'\n if value.lower() in ('yes', 'true'):\n value = True\n elif value.lower() in ('no', 'false'):\n value = False\n else:\n raise ImproperlyConfigured(\n 'activeurl: malformed param value for %s' % varname)\n return value\n",
"role": "user"
},
{
"content": "yesno_to_bool",
"role": "assistant"
}
] |
def x(url, element, **kwargs):
menu = yesno_to_bool(kwargs['menu'], 'menu')
ignore_params = yesno_to_bool(kwargs['ignore_params'], 'ignore_params')
if not url.attrib.get('href', None) is None:
href = url.attrib['href'].strip()
if href == '#':
return False
href = urlparse.urlsplit(href)
href = href._replace(fragment='')
if ignore_params:
href = href._replace(query='')
kwargs['full_path'] = urlparse.urlunsplit(urlparse.urlsplit(
kwargs['full_path'])._replace(query=''))
href = urlparse.urlunsplit(href)
if href == '':
href = kwargs['full_path']
if menu:
if href == '/' == kwargs['full_path']:
logic = True
elif href != '/':
logic = kwargs['full_path'].startswith(href) or urlquote(kwargs
['full_path']).startswith(href) or kwargs['full_path'
].startswith(urlquote(href))
else:
logic = False
else:
logic = kwargs['full_path'] == href or urlquote(kwargs['full_path']
) == href or kwargs['full_path'] == urlquote(href)
if logic:
if element.attrib.get('class'):
if kwargs['css_class'] not in element.attrib['class']:
element.attrib['class'] += ' {css_class}'.format(css_class
=kwargs['css_class'])
else:
element.attrib['class'] = kwargs['css_class']
return True
return False
|
check_active
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url, element, **kwargs):\n menu = yesno_to_bool(kwargs['menu'], 'menu')\n ignore_params = yesno_to_bool(kwargs['ignore_params'], 'ignore_params')\n if not url.attrib.get('href', None) is None:\n href = url.attrib['href'].strip()\n if href == '#':\n return False\n href = urlparse.urlsplit(href)\n href = href._replace(fragment='')\n if ignore_params:\n href = href._replace(query='')\n kwargs['full_path'] = urlparse.urlunsplit(urlparse.urlsplit(\n kwargs['full_path'])._replace(query=''))\n href = urlparse.urlunsplit(href)\n if href == '':\n href = kwargs['full_path']\n if menu:\n if href == '/' == kwargs['full_path']:\n logic = True\n elif href != '/':\n logic = kwargs['full_path'].startswith(href) or urlquote(kwargs\n ['full_path']).startswith(href) or kwargs['full_path'\n ].startswith(urlquote(href))\n else:\n logic = False\n else:\n logic = kwargs['full_path'] == href or urlquote(kwargs['full_path']\n ) == href or kwargs['full_path'] == urlquote(href)\n if logic:\n if element.attrib.get('class'):\n if kwargs['css_class'] not in element.attrib['class']:\n element.attrib['class'] += ' {css_class}'.format(css_class\n =kwargs['css_class'])\n else:\n element.attrib['class'] = kwargs['css_class']\n return True\n return False\n",
"role": "user"
},
{
"content": "check_active",
"role": "assistant"
}
] |
def x(content, **kwargs):
try:
tree = fragment_fromstring(content)
processed = False
if isinstance(kwargs['parent_tag'], bool):
if not kwargs['parent_tag']:
kwargs['parent_tag'] = 'self'
else:
raise ImproperlyConfigured(
"""
parent_tag=True is not allowed
"""
)
elif kwargs['parent_tag'] is None:
kwargs['parent_tag'] = 'self'
if kwargs['parent_tag'].lower() in ('a', 'self', ''):
urls = tree.xpath('.//a')
for url in urls:
if check_active(url, url, **kwargs):
processed = True
else:
elements = tree.xpath('.//{parent_tag}'.format(parent_tag=
kwargs['parent_tag']))
for element in elements:
urls = element.xpath('.//a')
for url in urls:
if check_active(url, element, **kwargs):
processed = True
break
if processed:
return tostring(tree, encoding='unicode')
except ParserError:
raise ImproperlyConfigured(
"""
content of {% activeurl %} must have valid html root tag
for example
{% activeurl %}
<ul>
<li>
<a href="/page/">page</a>
</li>
<li>
<a href="/other_page/">other_page</a>
</li>
</ul>
{% endactiveurl %}
in this case <ul> is valid content root tag
"""
)
return content
|
check_content
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(content, **kwargs):\n try:\n tree = fragment_fromstring(content)\n processed = False\n if isinstance(kwargs['parent_tag'], bool):\n if not kwargs['parent_tag']:\n kwargs['parent_tag'] = 'self'\n else:\n raise ImproperlyConfigured(\n \"\"\"\n parent_tag=True is not allowed\n \"\"\"\n )\n elif kwargs['parent_tag'] is None:\n kwargs['parent_tag'] = 'self'\n if kwargs['parent_tag'].lower() in ('a', 'self', ''):\n urls = tree.xpath('.//a')\n for url in urls:\n if check_active(url, url, **kwargs):\n processed = True\n else:\n elements = tree.xpath('.//{parent_tag}'.format(parent_tag=\n kwargs['parent_tag']))\n for element in elements:\n urls = element.xpath('.//a')\n for url in urls:\n if check_active(url, element, **kwargs):\n processed = True\n break\n if processed:\n return tostring(tree, encoding='unicode')\n except ParserError:\n raise ImproperlyConfigured(\n \"\"\"\n content of {% activeurl %} must have valid html root tag\n for example\n {% activeurl %}\n <ul>\n <li>\n <a href=\"/page/\">page</a>\n </li>\n <li>\n <a href=\"/other_page/\">other_page</a>\n </li>\n </ul>\n {% endactiveurl %}\n in this case <ul> is valid content root tag\n \"\"\"\n )\n return content\n",
"role": "user"
},
{
"content": "check_content",
"role": "assistant"
}
] |
def x(content, **kwargs):
if settings.ACTIVE_URL_CACHE:
cache_key = get_cache_key(content, **kwargs)
from_cache = cache.get(cache_key)
if from_cache is not None:
return from_cache
content = check_content(content, **kwargs)
if settings.ACTIVE_URL_CACHE:
cache.set(cache_key, content, settings.ACTIVE_URL_CACHE_TIMEOUT)
return content
|
render_content
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(content, **kwargs):\n if settings.ACTIVE_URL_CACHE:\n cache_key = get_cache_key(content, **kwargs)\n from_cache = cache.get(cache_key)\n if from_cache is not None:\n return from_cache\n content = check_content(content, **kwargs)\n if settings.ACTIVE_URL_CACHE:\n cache.set(cache_key, content, settings.ACTIVE_URL_CACHE_TIMEOUT)\n return content\n",
"role": "user"
},
{
"content": "render_content",
"role": "assistant"
}
] |
def x(self, **kwargs):
for key in settings.ACTIVE_URL_KWARGS:
kwargs.setdefault(key, settings.ACTIVE_URL_KWARGS[key])
self.css_class = kwargs['css_class']
self.parent_tag = kwargs['parent_tag']
self.menu = kwargs['menu']
self.ignore_params = kwargs['ignore_params']
|
load_configuration
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n for key in settings.ACTIVE_URL_KWARGS:\n kwargs.setdefault(key, settings.ACTIVE_URL_KWARGS[key])\n self.css_class = kwargs['css_class']\n self.parent_tag = kwargs['parent_tag']\n self.menu = kwargs['menu']\n self.ignore_params = kwargs['ignore_params']\n",
"role": "user"
},
{
"content": "load_configuration",
"role": "assistant"
}
] |
def x(response, clazz, is_list=False, resource_name=None):
target = response.json()[resource_name
] if resource_name else response.json()
if is_list:
return [clazz.from_json(resource) for resource in target]
else:
return clazz.from_json(target)
|
parse_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(response, clazz, is_list=False, resource_name=None):\n target = response.json()[resource_name\n ] if resource_name else response.json()\n if is_list:\n return [clazz.from_json(resource) for resource in target]\n else:\n return clazz.from_json(target)\n",
"role": "user"
},
{
"content": "parse_response",
"role": "assistant"
}
] |
def x(self, method, path, params=None, data=None):
headers = {'Content-Type': 'application/json', 'Accept': 'application/json'
}
if self.auth_token:
headers['Authorization'] = 'token={}'.format(self.auth_token)
response = None
servers = list(self.servers)
while servers and response is None:
server = servers.pop(0)
url = ''.join([server.rstrip('/'), path])
try:
response = self.session.request(method, url, params=params,
data=data, headers=headers, auth=self.auth, timeout=self.
timeout, verify=self.verify)
marathon.log.info('Got response from %s', server)
except requests.exceptions.RequestException as e:
marathon.log.error('Error while calling %s: %s', url, str(e))
if response is None:
raise NoResponseError('No remaining Marathon servers to try')
if response.status_code >= 500:
marathon.log.error('Got HTTP {code}: {body}'.format(code=response.
status_code, body=response.text.encode('utf-8')))
raise InternalServerError(response)
elif response.status_code >= 400:
marathon.log.error('Got HTTP {code}: {body}'.format(code=response.
status_code, body=response.text.encode('utf-8')))
if response.status_code == 404:
raise NotFoundError(response)
elif response.status_code == 409:
raise ConflictError(response)
else:
raise MarathonHttpError(response)
elif response.status_code >= 300:
marathon.log.warn('Got HTTP {code}: {body}'.format(code=response.
status_code, body=response.text.encode('utf-8')))
else:
marathon.log.debug('Got HTTP {code}: {body}'.format(code=response.
status_code, body=response.text.encode('utf-8')))
return response
|
do_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, path, params=None, data=None):\n headers = {'Content-Type': 'application/json', 'Accept': 'application/json'\n }\n if self.auth_token:\n headers['Authorization'] = 'token={}'.format(self.auth_token)\n response = None\n servers = list(self.servers)\n while servers and response is None:\n server = servers.pop(0)\n url = ''.join([server.rstrip('/'), path])\n try:\n response = self.session.request(method, url, params=params,\n data=data, headers=headers, auth=self.auth, timeout=self.\n timeout, verify=self.verify)\n marathon.log.info('Got response from %s', server)\n except requests.exceptions.RequestException as e:\n marathon.log.error('Error while calling %s: %s', url, str(e))\n if response is None:\n raise NoResponseError('No remaining Marathon servers to try')\n if response.status_code >= 500:\n marathon.log.error('Got HTTP {code}: {body}'.format(code=response.\n status_code, body=response.text.encode('utf-8')))\n raise InternalServerError(response)\n elif response.status_code >= 400:\n marathon.log.error('Got HTTP {code}: {body}'.format(code=response.\n status_code, body=response.text.encode('utf-8')))\n if response.status_code == 404:\n raise NotFoundError(response)\n elif response.status_code == 409:\n raise ConflictError(response)\n else:\n raise MarathonHttpError(response)\n elif response.status_code >= 300:\n marathon.log.warn('Got HTTP {code}: {body}'.format(code=response.\n status_code, body=response.text.encode('utf-8')))\n else:\n marathon.log.debug('Got HTTP {code}: {body}'.format(code=response.\n status_code, body=response.text.encode('utf-8')))\n return response\n",
"role": "user"
},
{
"content": "do_request",
"role": "assistant"
}
] |
def x(self, path, params=None):
urls = [''.join([server.rstrip('/'), path]) for server in self.servers]
while urls:
url = urls.pop()
try:
response = self.sse_session.get(url, params=params, stream=True,
headers={'Accept': 'text/event-stream'}, auth=self.auth,
verify=self.verify, allow_redirects=False)
except Exception as e:
marathon.log.error('Error while calling %s: %s', url, e.message)
else:
if response.is_redirect and response.next:
urls.append(response.next.url)
marathon.log.debug('Got redirect to {}'.format(response.
next.url))
elif response.ok:
return response.iter_lines()
raise MarathonError('No remaining Marathon servers to try')
|
do_sse_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, path, params=None):\n urls = [''.join([server.rstrip('/'), path]) for server in self.servers]\n while urls:\n url = urls.pop()\n try:\n response = self.sse_session.get(url, params=params, stream=True,\n headers={'Accept': 'text/event-stream'}, auth=self.auth,\n verify=self.verify, allow_redirects=False)\n except Exception as e:\n marathon.log.error('Error while calling %s: %s', url, e.message)\n else:\n if response.is_redirect and response.next:\n urls.append(response.next.url)\n marathon.log.debug('Got redirect to {}'.format(response.\n next.url))\n elif response.ok:\n return response.iter_lines()\n raise MarathonError('No remaining Marathon servers to try')\n",
"role": "user"
},
{
"content": "do_sse_request",
"role": "assistant"
}
] |
def x(self, app_id, app, minimal=True):
app.id = app_id
data = app.to_json(minimal=minimal)
response = self._do_request('POST', '/v2/apps', data=data)
if response.status_code == 201:
return self._parse_response(response, MarathonApp)
else:
return False
|
create_app
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, app, minimal=True):\n app.id = app_id\n data = app.to_json(minimal=minimal)\n response = self._do_request('POST', '/v2/apps', data=data)\n if response.status_code == 201:\n return self._parse_response(response, MarathonApp)\n else:\n return False\n",
"role": "user"
},
{
"content": "create_app",
"role": "assistant"
}
] |
def x(self, cmd=None, embed_tasks=False, embed_counts=False,
embed_deployments=False, embed_readiness=False, embed_last_task_failure
=False, embed_failures=False, embed_task_stats=False, app_id=None,
label=None, **kwargs):
params = {}
if cmd:
params['cmd'] = cmd
if app_id:
params['id'] = app_id
if label:
params['label'] = label
embed_params = {'app.tasks': embed_tasks, 'app.counts': embed_counts,
'app.deployments': embed_deployments, 'app.readiness':
embed_readiness, 'app.lastTaskFailure': embed_last_task_failure,
'app.failures': embed_failures, 'app.taskStats': embed_task_stats}
filtered_embed_params = [k for k, v in embed_params.items() if v]
if filtered_embed_params:
params['embed'] = filtered_embed_params
response = self._do_request('GET', '/v2/apps', params=params)
apps = self._parse_response(response, MarathonApp, is_list=True,
resource_name='apps')
for k, v in kwargs.items():
apps = [o for o in apps if getattr(o, k) == v]
return apps
|
list_apps
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cmd=None, embed_tasks=False, embed_counts=False,\n embed_deployments=False, embed_readiness=False, embed_last_task_failure\n =False, embed_failures=False, embed_task_stats=False, app_id=None,\n label=None, **kwargs):\n params = {}\n if cmd:\n params['cmd'] = cmd\n if app_id:\n params['id'] = app_id\n if label:\n params['label'] = label\n embed_params = {'app.tasks': embed_tasks, 'app.counts': embed_counts,\n 'app.deployments': embed_deployments, 'app.readiness':\n embed_readiness, 'app.lastTaskFailure': embed_last_task_failure,\n 'app.failures': embed_failures, 'app.taskStats': embed_task_stats}\n filtered_embed_params = [k for k, v in embed_params.items() if v]\n if filtered_embed_params:\n params['embed'] = filtered_embed_params\n response = self._do_request('GET', '/v2/apps', params=params)\n apps = self._parse_response(response, MarathonApp, is_list=True,\n resource_name='apps')\n for k, v in kwargs.items():\n apps = [o for o in apps if getattr(o, k) == v]\n return apps\n",
"role": "user"
},
{
"content": "list_apps",
"role": "assistant"
}
] |
def x(self, app_id, embed_tasks=False, embed_counts=False,
embed_deployments=False, embed_readiness=False, embed_last_task_failure
=False, embed_failures=False, embed_task_stats=False):
params = {}
embed_params = {'app.tasks': embed_tasks, 'app.counts': embed_counts,
'app.deployments': embed_deployments, 'app.readiness':
embed_readiness, 'app.lastTaskFailure': embed_last_task_failure,
'app.failures': embed_failures, 'app.taskStats': embed_task_stats}
filtered_embed_params = [k for k, v in embed_params.items() if v]
if filtered_embed_params:
params['embed'] = filtered_embed_params
response = self._do_request('GET', '/v2/apps/{app_id}'.format(app_id=
app_id), params=params)
return self._parse_response(response, MarathonApp, resource_name='app')
|
get_app
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, embed_tasks=False, embed_counts=False,\n embed_deployments=False, embed_readiness=False, embed_last_task_failure\n =False, embed_failures=False, embed_task_stats=False):\n params = {}\n embed_params = {'app.tasks': embed_tasks, 'app.counts': embed_counts,\n 'app.deployments': embed_deployments, 'app.readiness':\n embed_readiness, 'app.lastTaskFailure': embed_last_task_failure,\n 'app.failures': embed_failures, 'app.taskStats': embed_task_stats}\n filtered_embed_params = [k for k, v in embed_params.items() if v]\n if filtered_embed_params:\n params['embed'] = filtered_embed_params\n response = self._do_request('GET', '/v2/apps/{app_id}'.format(app_id=\n app_id), params=params)\n return self._parse_response(response, MarathonApp, resource_name='app')\n",
"role": "user"
},
{
"content": "get_app",
"role": "assistant"
}
] |
def x(self, app_id, app, force=False, minimal=True):
app.version = None
params = {'force': force}
data = app.to_json(minimal=minimal)
response = self._do_request('PUT', '/v2/apps/{app_id}'.format(app_id=
app_id), params=params, data=data)
return response.json()
|
update_app
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, app, force=False, minimal=True):\n app.version = None\n params = {'force': force}\n data = app.to_json(minimal=minimal)\n response = self._do_request('PUT', '/v2/apps/{app_id}'.format(app_id=\n app_id), params=params, data=data)\n return response.json()\n",
"role": "user"
},
{
"content": "update_app",
"role": "assistant"
}
] |
def x(self, apps, force=False, minimal=True):
json_repr_apps = []
for app in apps:
app.version = None
json_repr_apps.append(app.json_repr(minimal=minimal))
params = {'force': force}
encoder = MarathonMinimalJsonEncoder if minimal else MarathonJsonEncoder
data = json.dumps(json_repr_apps, cls=encoder, sort_keys=True)
response = self._do_request('PUT', '/v2/apps', params=params, data=data)
return response.json()
|
update_apps
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, apps, force=False, minimal=True):\n json_repr_apps = []\n for app in apps:\n app.version = None\n json_repr_apps.append(app.json_repr(minimal=minimal))\n params = {'force': force}\n encoder = MarathonMinimalJsonEncoder if minimal else MarathonJsonEncoder\n data = json.dumps(json_repr_apps, cls=encoder, sort_keys=True)\n response = self._do_request('PUT', '/v2/apps', params=params, data=data)\n return response.json()\n",
"role": "user"
},
{
"content": "update_apps",
"role": "assistant"
}
] |
def x(self, app_id, version, force=False):
params = {'force': force}
data = json.dumps({'version': version})
response = self._do_request('PUT', '/v2/apps/{app_id}'.format(app_id=
app_id), params=params, data=data)
return response.json()
|
rollback_app
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, version, force=False):\n params = {'force': force}\n data = json.dumps({'version': version})\n response = self._do_request('PUT', '/v2/apps/{app_id}'.format(app_id=\n app_id), params=params, data=data)\n return response.json()\n",
"role": "user"
},
{
"content": "rollback_app",
"role": "assistant"
}
] |
def x(self, app_id, force=False):
params = {'force': force}
response = self._do_request('DELETE', '/v2/apps/{app_id}'.format(app_id
=app_id), params=params)
return response.json()
|
delete_app
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, force=False):\n params = {'force': force}\n response = self._do_request('DELETE', '/v2/apps/{app_id}'.format(app_id\n =app_id), params=params)\n return response.json()\n",
"role": "user"
},
{
"content": "delete_app",
"role": "assistant"
}
] |
def x(self, app_id, instances=None, delta=None, force=False):
if instances is None and delta is None:
marathon.log.error('instances or delta must be passed')
return
try:
app = self.get_app(app_id)
except NotFoundError:
marathon.log.error('App "{app}" not found'.format(app=app_id))
return
desired = instances if instances is not None else app.instances + delta
return self.update_app(app.id, MarathonApp(instances=desired), force=force)
|
scale_app
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, instances=None, delta=None, force=False):\n if instances is None and delta is None:\n marathon.log.error('instances or delta must be passed')\n return\n try:\n app = self.get_app(app_id)\n except NotFoundError:\n marathon.log.error('App \"{app}\" not found'.format(app=app_id))\n return\n desired = instances if instances is not None else app.instances + delta\n return self.update_app(app.id, MarathonApp(instances=desired), force=force)\n",
"role": "user"
},
{
"content": "scale_app",
"role": "assistant"
}
] |
def x(self, group):
data = group.to_json()
response = self._do_request('POST', '/v2/groups', data=data)
return response.json()
|
create_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group):\n data = group.to_json()\n response = self._do_request('POST', '/v2/groups', data=data)\n return response.json()\n",
"role": "user"
},
{
"content": "create_group",
"role": "assistant"
}
] |
def x(self, **kwargs):
response = self._do_request('GET', '/v2/groups')
groups = self._parse_response(response, MarathonGroup, is_list=True,
resource_name='groups')
for k, v in kwargs.items():
groups = [o for o in groups if getattr(o, k) == v]
return groups
|
list_groups
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n response = self._do_request('GET', '/v2/groups')\n groups = self._parse_response(response, MarathonGroup, is_list=True,\n resource_name='groups')\n for k, v in kwargs.items():\n groups = [o for o in groups if getattr(o, k) == v]\n return groups\n",
"role": "user"
},
{
"content": "list_groups",
"role": "assistant"
}
] |
def x(self, group_id):
response = self._do_request('GET', '/v2/groups/{group_id}'.format(
group_id=group_id))
return self._parse_response(response, MarathonGroup)
|
get_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group_id):\n response = self._do_request('GET', '/v2/groups/{group_id}'.format(\n group_id=group_id))\n return self._parse_response(response, MarathonGroup)\n",
"role": "user"
},
{
"content": "get_group",
"role": "assistant"
}
] |
def x(self, group_id, group, force=False, minimal=True):
group.version = None
params = {'force': force}
data = group.to_json(minimal=minimal)
response = self._do_request('PUT', '/v2/groups/{group_id}'.format(
group_id=group_id), data=data, params=params)
return response.json()
|
update_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group_id, group, force=False, minimal=True):\n group.version = None\n params = {'force': force}\n data = group.to_json(minimal=minimal)\n response = self._do_request('PUT', '/v2/groups/{group_id}'.format(\n group_id=group_id), data=data, params=params)\n return response.json()\n",
"role": "user"
},
{
"content": "update_group",
"role": "assistant"
}
] |
def x(self, group_id, version, force=False):
params = {'force': force}
response = self._do_request('PUT',
'/v2/groups/{group_id}/versions/{version}'.format(group_id=group_id,
version=version), params=params)
return response.json()
|
rollback_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group_id, version, force=False):\n params = {'force': force}\n response = self._do_request('PUT',\n '/v2/groups/{group_id}/versions/{version}'.format(group_id=group_id,\n version=version), params=params)\n return response.json()\n",
"role": "user"
},
{
"content": "rollback_group",
"role": "assistant"
}
] |
def x(self, group_id, force=False):
params = {'force': force}
response = self._do_request('DELETE', '/v2/groups/{group_id}'.format(
group_id=group_id), params=params)
return response.json()
|
delete_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group_id, force=False):\n params = {'force': force}\n response = self._do_request('DELETE', '/v2/groups/{group_id}'.format(\n group_id=group_id), params=params)\n return response.json()\n",
"role": "user"
},
{
"content": "delete_group",
"role": "assistant"
}
] |
def x(self, group_id, scale_by):
data = {'scaleBy': scale_by}
response = self._do_request('PUT', '/v2/groups/{group_id}'.format(
group_id=group_id), data=json.dumps(data))
return response.json()
|
scale_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group_id, scale_by):\n data = {'scaleBy': scale_by}\n response = self._do_request('PUT', '/v2/groups/{group_id}'.format(\n group_id=group_id), data=json.dumps(data))\n return response.json()\n",
"role": "user"
},
{
"content": "scale_group",
"role": "assistant"
}
] |
def x(self, app_id=None, **kwargs):
response = self._do_request('GET', '/v2/apps/%s/tasks' % app_id if
app_id else '/v2/tasks')
tasks = self._parse_response(response, MarathonTask, is_list=True,
resource_name='tasks')
[setattr(t, 'app_id', app_id) for t in tasks if app_id and t.app_id is None
]
for k, v in kwargs.items():
tasks = [o for o in tasks if getattr(o, k) == v]
return tasks
|
list_tasks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id=None, **kwargs):\n response = self._do_request('GET', '/v2/apps/%s/tasks' % app_id if\n app_id else '/v2/tasks')\n tasks = self._parse_response(response, MarathonTask, is_list=True,\n resource_name='tasks')\n [setattr(t, 'app_id', app_id) for t in tasks if app_id and t.app_id is None\n ]\n for k, v in kwargs.items():\n tasks = [o for o in tasks if getattr(o, k) == v]\n return tasks\n",
"role": "user"
},
{
"content": "list_tasks",
"role": "assistant"
}
] |
def x(self, task_ids, scale=False, force=None):
params = {'scale': scale}
if force is not None:
params['force'] = force
data = json.dumps({'ids': task_ids})
response = self._do_request('POST', '/v2/tasks/delete', params=params,
data=data)
return response == 200
|
kill_given_tasks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, task_ids, scale=False, force=None):\n params = {'scale': scale}\n if force is not None:\n params['force'] = force\n data = json.dumps({'ids': task_ids})\n response = self._do_request('POST', '/v2/tasks/delete', params=params,\n data=data)\n return response == 200\n",
"role": "user"
},
{
"content": "kill_given_tasks",
"role": "assistant"
}
] |
def x(self, app_id, scale=False, wipe=False, host=None, batch_size=0,
batch_delay=0):
def x(iterable, size):
sourceiter = iter(iterable)
while True:
batchiter = itertools.islice(sourceiter, size)
yield itertools.chain([next(batchiter)], batchiter)
if batch_size == 0:
params = {'scale': scale, 'wipe': wipe}
if host:
params['host'] = host
response = self._do_request('DELETE', '/v2/apps/{app_id}/tasks'.
format(app_id=app_id), params)
if 'tasks' in response.json():
return self._parse_response(response, MarathonTask, is_list=
True, resource_name='tasks')
else:
return response.json()
else:
tasks = self.list_tasks(app_id, host=host
) if host else self.list_tasks(app_id)
for tbatch in batch(tasks, batch_size):
killed_tasks = [self.kill_task(app_id, t.id, scale=scale, wipe=
wipe) for t in tbatch]
killed_task_ids = set(t.id for t in killed_tasks)
running_task_ids = killed_task_ids
while killed_task_ids.intersection(running_task_ids):
time.sleep(1)
running_task_ids = set(t.id for t in self.get_app(app_id).tasks
)
if batch_delay == 0:
desired_instances = self.get_app(app_id).instances
running_instances = 0
while running_instances < desired_instances:
time.sleep(1)
running_instances = sum(t.started_at is None for t in
self.get_app(app_id).tasks)
else:
time.sleep(batch_delay)
return tasks
|
kill_tasks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, scale=False, wipe=False, host=None, batch_size=0,\n batch_delay=0):\n\n def x(iterable, size):\n sourceiter = iter(iterable)\n while True:\n batchiter = itertools.islice(sourceiter, size)\n yield itertools.chain([next(batchiter)], batchiter)\n if batch_size == 0:\n params = {'scale': scale, 'wipe': wipe}\n if host:\n params['host'] = host\n response = self._do_request('DELETE', '/v2/apps/{app_id}/tasks'.\n format(app_id=app_id), params)\n if 'tasks' in response.json():\n return self._parse_response(response, MarathonTask, is_list=\n True, resource_name='tasks')\n else:\n return response.json()\n else:\n tasks = self.list_tasks(app_id, host=host\n ) if host else self.list_tasks(app_id)\n for tbatch in batch(tasks, batch_size):\n killed_tasks = [self.kill_task(app_id, t.id, scale=scale, wipe=\n wipe) for t in tbatch]\n killed_task_ids = set(t.id for t in killed_tasks)\n running_task_ids = killed_task_ids\n while killed_task_ids.intersection(running_task_ids):\n time.sleep(1)\n running_task_ids = set(t.id for t in self.get_app(app_id).tasks\n )\n if batch_delay == 0:\n desired_instances = self.get_app(app_id).instances\n running_instances = 0\n while running_instances < desired_instances:\n time.sleep(1)\n running_instances = sum(t.started_at is None for t in\n self.get_app(app_id).tasks)\n else:\n time.sleep(batch_delay)\n return tasks\n",
"role": "user"
},
{
"content": "kill_tasks",
"role": "assistant"
}
] |
def x(self, app_id, task_id, scale=False, wipe=False):
params = {'scale': scale, 'wipe': wipe}
response = self._do_request('DELETE',
'/v2/apps/{app_id}/tasks/{task_id}'.format(app_id=app_id, task_id=
task_id), params)
if 'task' in response.json():
return self._parse_response(response, MarathonTask, is_list=False,
resource_name='task')
else:
return response.json()
|
kill_task
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, task_id, scale=False, wipe=False):\n params = {'scale': scale, 'wipe': wipe}\n response = self._do_request('DELETE',\n '/v2/apps/{app_id}/tasks/{task_id}'.format(app_id=app_id, task_id=\n task_id), params)\n if 'task' in response.json():\n return self._parse_response(response, MarathonTask, is_list=False,\n resource_name='task')\n else:\n return response.json()\n",
"role": "user"
},
{
"content": "kill_task",
"role": "assistant"
}
] |
def x(self, app_id):
response = self._do_request('GET', '/v2/apps/{app_id}/versions'.format(
app_id=app_id))
return [version for version in response.json()['versions']]
|
list_versions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id):\n response = self._do_request('GET', '/v2/apps/{app_id}/versions'.format(\n app_id=app_id))\n return [version for version in response.json()['versions']]\n",
"role": "user"
},
{
"content": "list_versions",
"role": "assistant"
}
] |
def x(self, app_id, version):
response = self._do_request('GET',
'/v2/apps/{app_id}/versions/{version}'.format(app_id=app_id,
version=version))
return MarathonApp.from_json(response.json())
|
get_version
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, app_id, version):\n response = self._do_request('GET',\n '/v2/apps/{app_id}/versions/{version}'.format(app_id=app_id,\n version=version))\n return MarathonApp.from_json(response.json())\n",
"role": "user"
},
{
"content": "get_version",
"role": "assistant"
}
] |
def x(self, url):
params = {'callbackUrl': url}
response = self._do_request('POST', '/v2/eventSubscriptions', params)
return response.json()
|
create_event_subscription
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, url):\n params = {'callbackUrl': url}\n response = self._do_request('POST', '/v2/eventSubscriptions', params)\n return response.json()\n",
"role": "user"
},
{
"content": "create_event_subscription",
"role": "assistant"
}
] |
def x(self, url):
params = {'callbackUrl': url}
response = self._do_request('DELETE', '/v2/eventSubscriptions', params)
return response.json()
|
delete_event_subscription
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, url):\n params = {'callbackUrl': url}\n response = self._do_request('DELETE', '/v2/eventSubscriptions', params)\n return response.json()\n",
"role": "user"
},
{
"content": "delete_event_subscription",
"role": "assistant"
}
] |
def x(self):
response = self._do_request('GET', '/v2/deployments')
return self._parse_response(response, MarathonDeployment, is_list=True)
|
list_deployments
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n response = self._do_request('GET', '/v2/deployments')\n return self._parse_response(response, MarathonDeployment, is_list=True)\n",
"role": "user"
},
{
"content": "list_deployments",
"role": "assistant"
}
] |
def x(self, embed_last_unused_offers=False):
if embed_last_unused_offers:
params = {'embed': 'lastUnusedOffers'}
else:
params = {}
response = self._do_request('GET', '/v2/queue', params=params)
return self._parse_response(response, MarathonQueueItem, is_list=True,
resource_name='queue')
|
list_queue
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, embed_last_unused_offers=False):\n if embed_last_unused_offers:\n params = {'embed': 'lastUnusedOffers'}\n else:\n params = {}\n response = self._do_request('GET', '/v2/queue', params=params)\n return self._parse_response(response, MarathonQueueItem, is_list=True,\n resource_name='queue')\n",
"role": "user"
},
{
"content": "list_queue",
"role": "assistant"
}
] |
def x(self, deployment_id, force=False):
if force:
params = {'force': True}
self._do_request('DELETE', '/v2/deployments/{deployment}'.format(
deployment=deployment_id), params=params)
return {}
else:
response = self._do_request('DELETE',
'/v2/deployments/{deployment}'.format(deployment=deployment_id))
return response.json()
|
delete_deployment
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, deployment_id, force=False):\n if force:\n params = {'force': True}\n self._do_request('DELETE', '/v2/deployments/{deployment}'.format(\n deployment=deployment_id), params=params)\n return {}\n else:\n response = self._do_request('DELETE',\n '/v2/deployments/{deployment}'.format(deployment=deployment_id))\n return response.json()\n",
"role": "user"
},
{
"content": "delete_deployment",
"role": "assistant"
}
] |
def x(self, raw=False, event_types=None):
ef = EventFactory()
params = {'event_type': [(EventFactory.class_to_event[et] if isinstance
(et, type) and issubclass(et, MarathonEvent) else et) for et in
event_types or []]}
for raw_message in self._do_sse_request('/v2/events', params=params):
try:
_data = raw_message.decode('utf8').split(':', 1)
if _data[0] == 'data':
if raw:
yield _data[1]
else:
event_data = json.loads(_data[1].strip())
if 'eventType' not in event_data:
raise MarathonError('Invalid event data received.')
yield ef.process(event_data)
except ValueError:
raise MarathonError('Invalid event data received.')
|
event_stream
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, raw=False, event_types=None):\n ef = EventFactory()\n params = {'event_type': [(EventFactory.class_to_event[et] if isinstance\n (et, type) and issubclass(et, MarathonEvent) else et) for et in \n event_types or []]}\n for raw_message in self._do_sse_request('/v2/events', params=params):\n try:\n _data = raw_message.decode('utf8').split(':', 1)\n if _data[0] == 'data':\n if raw:\n yield _data[1]\n else:\n event_data = json.loads(_data[1].strip())\n if 'eventType' not in event_data:\n raise MarathonError('Invalid event data received.')\n yield ef.process(event_data)\n except ValueError:\n raise MarathonError('Invalid event data received.')\n",
"role": "user"
},
{
"content": "event_stream",
"role": "assistant"
}
] |
def x(path):
if path is None:
return
for id in filter(None, path.strip('/').split('/')):
if not ID_PATTERN.match(id):
raise ValueError(
'invalid path (allowed: lowercase letters, digits, hyphen, "/", ".", ".."): %r'
% path)
return path
|
assert_valid_path
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path):\n if path is None:\n return\n for id in filter(None, path.strip('/').split('/')):\n if not ID_PATTERN.match(id):\n raise ValueError(\n 'invalid path (allowed: lowercase letters, digits, hyphen, \"/\", \".\", \"..\"): %r'\n % path)\n return path\n",
"role": "user"
},
{
"content": "assert_valid_path",
"role": "assistant"
}
] |
def x(id):
if id is None:
return
if not ID_PATTERN.match(id.strip('/')):
raise ValueError(
'invalid id (allowed: lowercase letters, digits, hyphen, ".", ".."): %r'
% id)
return id
|
assert_valid_id
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(id):\n if id is None:\n return\n if not ID_PATTERN.match(id.strip('/')):\n raise ValueError(\n 'invalid id (allowed: lowercase letters, digits, hyphen, \".\", \"..\"): %r'\n % id)\n return id\n",
"role": "user"
},
{
"content": "assert_valid_id",
"role": "assistant"
}
] |
def x(self, minimal=False):
if minimal:
return {to_camel_case(k): v for k, v in vars(self).items() if v or
v is False or v == 0}
else:
return {to_camel_case(k): v for k, v in vars(self).items()}
|
json_repr
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, minimal=False):\n if minimal:\n return {to_camel_case(k): v for k, v in vars(self).items() if v or \n v is False or v == 0}\n else:\n return {to_camel_case(k): v for k, v in vars(self).items()}\n",
"role": "user"
},
{
"content": "json_repr",
"role": "assistant"
}
] |
def x(cls, attributes):
return cls(**{to_snake_case(k): v for k, v in attributes.items()})
|
from_json
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, attributes):\n return cls(**{to_snake_case(k): v for k, v in attributes.items()})\n",
"role": "user"
},
{
"content": "from_json",
"role": "assistant"
}
] |
def x(self, minimal=True):
if minimal:
return json.dumps(self.json_repr(minimal=True), cls=
MarathonMinimalJsonEncoder, sort_keys=True)
else:
return json.dumps(self.json_repr(), cls=MarathonJsonEncoder,
sort_keys=True)
|
to_json
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, minimal=True):\n if minimal:\n return json.dumps(self.json_repr(minimal=True), cls=\n MarathonMinimalJsonEncoder, sort_keys=True)\n else:\n return json.dumps(self.json_repr(), cls=MarathonJsonEncoder,\n sort_keys=True)\n",
"role": "user"
},
{
"content": "to_json",
"role": "assistant"
}
] |
def x(self, minimal=False):
if self.value:
return [self.field, self.operator, self.value]
else:
return [self.field, self.operator]
|
json_repr
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, minimal=False):\n if self.value:\n return [self.field, self.operator, self.value]\n else:\n return [self.field, self.operator]\n",
"role": "user"
},
{
"content": "json_repr",
"role": "assistant"
}
] |
def x(cls, obj):
if len(obj) == 2:
field, operator = obj
return cls(field, operator)
if len(obj) > 2:
field, operator, value = obj
return cls(field, operator, value)
|
from_json
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, obj):\n if len(obj) == 2:\n field, operator = obj\n return cls(field, operator)\n if len(obj) > 2:\n field, operator, value = obj\n return cls(field, operator, value)\n",
"role": "user"
},
{
"content": "from_json",
"role": "assistant"
}
] |
def x(cls, constraint):
obj = constraint.split(':')
marathon_constraint = cls.from_json(obj)
if marathon_constraint:
return marathon_constraint
raise ValueError('Invalid string format. Expected `field:operator:value`')
|
from_string
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, constraint):\n obj = constraint.split(':')\n marathon_constraint = cls.from_json(obj)\n if marathon_constraint:\n return marathon_constraint\n raise ValueError('Invalid string format. Expected `field:operator:value`')\n",
"role": "user"
},
{
"content": "from_string",
"role": "assistant"
}
] |
def x(cls, tasks):
endpoints = [[MarathonEndpoint(task.app_id, task.service_ports[
port_index], task.host, task.id, port) for port_index, port in
enumerate(task.ports)] for task in tasks]
return [item for sublist in endpoints for item in sublist]
|
from_tasks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, tasks):\n endpoints = [[MarathonEndpoint(task.app_id, task.service_ports[\n port_index], task.host, task.id, port) for port_index, port in\n enumerate(task.ports)] for task in tasks]\n return [item for sublist in endpoints for item in sublist]\n",
"role": "user"
},
{
"content": "from_tasks",
"role": "assistant"
}
] |
def x(prefix, formatted_node, options):
replacement = u''.join([options.NEWLINE, u'\n', prefix])
return formatted_node.replace(u'\n', replacement)
|
format_newlines
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(prefix, formatted_node, options):\n replacement = u''.join([options.NEWLINE, u'\\n', prefix])\n return formatted_node.replace(u'\\n', replacement)\n",
"role": "user"
},
{
"content": "format_newlines",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.