source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
async def setChatStickerSet(self, chat_id, sticker_set_name):
""" See: https://core.telegram.org/bots/api#setchatstickerset """
p = _strip(locals())
return await self._api_request('setChatStickerSet', _rectify(p))
| setChatStickerSet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def setChatStickerSet(self, chat_id, sticker_set_name):\n \"\"\" See: https://core.telegram.org/bots/api#setchatstickerset \"\"\"\n p = _strip(locals())\... |
async def deleteChatStickerSet(self, chat_id):
""" See: https://core.telegram.org/bots/api#deletechatstickerset """
p = _strip(locals())
return await self._api_request('deleteChatStickerSet', _rectify(p))
| deleteChatStickerSet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def deleteChatStickerSet(self, chat_id):\n \"\"\" See: https://core.telegram.org/bots/api#deletechatstickerset \"\"\"\n p = _strip(locals())\n return ... |
async def answerCallbackQuery(self, callback_query_id, text=None,
show_alert=None, url=None, cache_time=None):
""" See: https://core.telegram.org/bots/api#answercallbackquery """
p = _strip(locals())
return await self._api_request('answerCallbackQuery', _rectify(p))
| answerCallbackQuery | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def answerCallbackQuery(self, callback_query_id, text=None,\n show_alert=None, url=None, cache_time=None):\n \"\"\" See: https://core.telegram.org/bots/a... |
async def deleteMessage(self, msg_identifier):
"""
See: https://core.telegram.org/bots/api#deletemessage
:param msg_identifier:
Same as ``msg_identifier`` in :meth:`telepot.aio.Bot.editMessageText`,
except this method does not work on inline messages.
"""
p = _strip(locals(), more=['msg_identifier'])
p.update(_dismantle_message_identifier(msg_identifier))
return await self._api_request('deleteMessage', _rectify(p))
| deleteMessage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def deleteMessage(self, msg_identifier):\n \"\"\"\n See: https://core.telegram.org/bots/api#deletemessage\n\n :param msg_identifier:\n ... |
async def sendSticker(self, chat_id, sticker, disable_notification=None,
reply_to_message_id=None, reply_markup=None):
"""
See: https://core.telegram.org/bots/api#sendsticker
:param sticker: Same as ``photo`` in :meth:`telepot.aio.Bot.sendPhoto`
"""
p = _strip(locals(), more=['sticker'])
return await self._api_request_with_file('sendSticker', _rectify(p),
'sticker', sticker)
| sendSticker | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def sendSticker(self, chat_id, sticker, disable_notification=None,\n reply_to_message_id=None, reply_markup=None):\n \"\"\"\n See: https://core.te... |
async def getStickerSet(self, name):
"""
See: https://core.telegram.org/bots/api#getstickerset
"""
p = _strip(locals())
return await self._api_request('getStickerSet', _rectify(p))
| getStickerSet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def getStickerSet(self, name):\n \"\"\"\n See: https://core.telegram.org/bots/api#getstickerset\n \"\"\"\n p = _strip(locals())\n return... |
async def deleteStickerFromSet(self, sticker):
"""
See: https://core.telegram.org/bots/api#deletestickerfromset
"""
p = _strip(locals())
return await self._api_request('deleteStickerFromSet', _rectify(p))
| deleteStickerFromSet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def deleteStickerFromSet(self, sticker):\n \"\"\"\n See: https://core.telegram.org/bots/api#deletestickerfromset\n \"\"\"\n p = _strip(loca... |
async def answerInlineQuery(self, inline_query_id, results, cache_time=None,
is_personal=None, next_offset=None, switch_pm_text=None,
switch_pm_parameter=None):
""" See: https://core.telegram.org/bots/api#answerinlinequery """
p = _strip(locals())
return await self._api_request('answerInlineQuery', _rectify(p))
| answerInlineQuery | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def answerInlineQuery(self, inline_query_id, results, cache_time=None,\n is_personal=None, next_offset=None, switch_pm_text=None,\n switch_pm_parameter=N... |
async def getUpdates(self, offset=None, limit=None, timeout=None,
allowed_updates=None):
""" See: https://core.telegram.org/bots/api#getupdates """
p = _strip(locals())
return await self._api_request('getUpdates', _rectify(p))
| getUpdates | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def getUpdates(self, offset=None, limit=None, timeout=None,\n allowed_updates=None):\n \"\"\" See: https://core.telegram.org/bots/api#getupdates \"\"\"\n... |
async def setWebhook(self, url=None, certificate=None, max_connections=None,
allowed_updates=None):
""" See: https://core.telegram.org/bots/api#setwebhook """
p = _strip(locals(), more=['certificate'])
if certificate:
files = {'certificate': certificate}
return await self._api_request('setWebhook', _rectify(p), files)
else:
return await self._api_request('setWebhook', _rectify(p))
| setWebhook | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def setWebhook(self, url=None, certificate=None, max_connections=None,\n allowed_updates=None):\n \"\"\" See: https://core.telegram.org/bots/api#setwebho... |
async def download_file(self, file_id, dest):
"""
Download a file to local disk.
:param dest: a path or a ``file`` object
"""
f = await self.getFile(file_id)
try:
d = dest if isinstance(dest, io.IOBase) else open(dest, 'wb')
session, request = api.download((self._token, f['file_path']))
async with session:
async with request as r:
while 1:
chunk = await r.content.read(self._file_chunk_size)
if not chunk:
break
d.write(chunk)
d.flush()
finally:
if not isinstance(dest, io.IOBase) and 'd' in locals():
d.close()
| download_file | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def download_file(self, file_id, dest):\n \"\"\"\n Download a file to local disk.\n\n :param dest: a path or a ``file`` object\n \"\"\"... |
async def grab(self, *, countries=None, limit=0):
"""Gather proxies from the providers without checking.
:param list countries: (optional) List of ISO country codes
where should be located proxies
:param int limit: (optional) The maximum number of proxies
:ref:`Example of usage <proxybroker-examples-grab>`.
"""
self._countries = countries
self._limit = limit
task = asyncio.ensure_future(self._grab(check=False))
self._all_tasks.append(task)
| grab | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def grab(self, *, countries=None, limit=0):\n \"\"\"Gather proxies from the providers without checking.\n\n :param list countries: (optional) List of... |
async def find(self, *, types=None, data=None, countries=None, post=False,
strict=False, dnsbl=None, limit=0, **kwargs):
"""Gather and check proxies from providers or from a passed data.
:ref:`Example of usage <proxybroker-examples-find>`.
:param list types:
Types (protocols) that need to be check on support by proxy.
Supported: HTTP, HTTPS, SOCKS4, SOCKS5, CONNECT:80, CONNECT:25
And levels of anonymity (HTTP only): Transparent, Anonymous, High
:param data:
(optional) String or list with proxies. Also can be a file-like
object supports `read()` method. Used instead of providers
:param list countries:
(optional) List of ISO country codes where should be located
proxies
:param bool post:
(optional) Flag indicating use POST instead of GET for requests
when checking proxies
:param bool strict:
(optional) Flag indicating that anonymity levels of types
(protocols) supported by a proxy must be equal to the requested
types and levels of anonymity. By default, strict mode is off and
for a successful check is enough to satisfy any one of the
requested types
:param list dnsbl:
(optional) Spam databases for proxy checking.
`Wiki <https://en.wikipedia.org/wiki/DNSBL>`_
:param int limit: (optional) The maximum number of proxies
:raises ValueError:
If :attr:`types` not given.
.. versionchanged:: 0.2.0
Added: :attr:`post`, :attr:`strict`, :attr:`dnsbl`.
Changed: :attr:`types` is required.
"""
ip = await self._resolver.get_real_ext_ip()
types = _update_types(types)
if not types:
raise ValueError('`types` is required')
self._checker = Checker(judges=self._judges, timeout=self._timeout,
verify_ssl=self._verify_ssl, max_tries=self._max_tries, real_ext_ip
=ip, types=types, post=post, strict=strict, dnsbl=dnsbl, loop=self.
_loop)
self._countries = countries
self._limit = limit
tasks = [asyncio.ensure_future(self._checker.check_judges())]
if data:
task = asyncio.ensure_future(self._load(data, check=True))
else:
task = asyncio.ensure_future(self._grab(types, check=True))
tasks.append(task)
self._all_tasks.extend(tasks)
| find | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def find(self, *, types=None, data=None, countries=None, post=False,\n strict=False, dnsbl=None, limit=0, **kwargs):\n \"\"\"Gather and check proxies fro... |
def x(self, host='127.0.0.1', port=8888, limit=100, **kwargs):
if limit <= 0:
raise ValueError(
'In serve mode value of the limit cannot be less than or equal to zero. Otherwise, a parsing of providers will be endless'
)
self._server = Server(host=host, port=port, proxies=self._proxies,
timeout=self._timeout, max_tries=kwargs.pop('max_tries', self.
_max_tries), loop=self._loop, **kwargs)
self._server.start()
task = asyncio.ensure_future(self.find(limit=limit, **kwargs))
self._all_tasks.append(task)
| serve | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, host='127.0.0.1', port=8888, limit=100, **kwargs):\n if limit <= 0:\n raise ValueError(\n 'In serve mode value of the limit cannot b... |
async def _load(self, data, check=True):
"""Looking for proxies in the passed data.
Transform the passed data from [raw string | file-like object | list]
to set {(host, port), ...}: {('192.168.0.1', '80'), }
"""
log.debug('Load proxies from the raw data')
if isinstance(data, io.TextIOWrapper):
data = data.read()
if isinstance(data, str):
data = IPPortPatternLine.findall(data)
proxies = set(data)
for proxy in proxies:
await self._handle(proxy, check=check)
await self._on_check.join()
self._done()
| load | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def _load(self, data, check=True):\n \"\"\"Looking for proxies in the passed data.\n\n Transform the passed data from [raw string | file-like object ... |
def x(self):
self._done()
if self._server:
self._server.stop()
self._server = None
log.info('Stop!')
| stop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._done()\n if self._server:\n self._server.stop()\n self._server = None\n log.info('Stop!')\n",
"role": "user"
},
{... |
def x(self, verbose=False, **kwargs):
if kwargs:
verbose = True
warnings.warn(
'`full` in `show_stats` is deprecated, use `verbose` instead.',
DeprecationWarning)
found_proxies = self.unique_proxies.values()
num_working_proxies = len([p for p in found_proxies if p.is_working])
if not found_proxies:
print('Proxy not found')
return
errors = Counter()
for p in found_proxies:
errors.update(p.stat['errors'])
proxies_by_type = {'SOCKS5': [], 'SOCKS4': [], 'HTTPS': [], 'HTTP': [],
'CONNECT:80': [], 'CONNECT:25': []}
stat = {'Wrong country': [], 'Wrong protocol/anonymity lvl': [],
'Connection success': [], 'Connection timeout': [],
'Connection failed': []}
for p in found_proxies:
msgs = ' '.join([l[1] for l in p.get_log()])
full_log = [p]
for proto in p.types:
proxies_by_type[proto].append(p)
if 'Location of proxy' in msgs:
stat['Wrong country'].append(p)
elif 'Connection: success' in msgs:
if 'Protocol or the level' in msgs:
stat['Wrong protocol/anonymity lvl'].append(p)
stat['Connection success'].append(p)
if not verbose:
continue
events_by_ngtr = defaultdict(list)
for ngtr, event, runtime in p.get_log():
events_by_ngtr[ngtr].append((event, runtime))
for ngtr, events in sorted(events_by_ngtr.items(), key=lambda
item: item[0]):
full_log.append('\t%s' % ngtr)
for event, runtime in events:
if event.startswith('Initial connection'):
full_log.append('\t\t-------------------')
else:
full_log.append('\t\t{:<66} Runtime: {:.2f}'.format
(event, runtime))
for row in full_log:
print(row)
elif 'Connection: failed' in msgs:
stat['Connection failed'].append(p)
else:
stat['Connection timeout'].append(p)
if verbose:
print('Stats:')
pprint(stat)
print('The number of working proxies: %d' % num_working_proxies)
for proto, proxies in proxies_by_type.items():
print('%s (%s): %s' % (proto, len(proxies), proxies))
print('Errors:', errors)
| show_stats | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, verbose=False, **kwargs):\n if kwargs:\n verbose = True\n warnings.warn(\n '`full` in `show_stats` is deprecated, use `verbos... |
async def save(proxies, filename):
"""Save proxies to a file."""
with open(filename, 'w') as f:
while True:
proxy = await proxies.get()
if proxy is None:
break
f.write('%s:%d\n' % (proxy.host, proxy.port))
| save | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def save(proxies, filename):\n \"\"\"Save proxies to a file.\"\"\"\n with open(filename, 'w') as f:\n while True:\n proxy = await proxi... |
def x(ip):
try:
ipInfo = _mmdb_reader.get(ip) or {}
except (maxminddb.errors.InvalidDatabaseError, ValueError):
ipInfo = {}
code, name = '--', 'Unknown'
city_name, region_code, region_name = ('Unknown',) * 3
if 'country' in ipInfo:
code = ipInfo['country']['iso_code']
name = ipInfo['country']['names']['en']
elif 'continent' in ipInfo:
code = ipInfo['continent']['code']
name = ipInfo['continent']['names']['en']
if 'city' in ipInfo:
city_name = ipInfo['city']['names']['en']
if 'subdivisions' in ipInfo:
region_code = ipInfo['subdivisions'][0]['iso_code']
region_name = ipInfo['subdivisions'][0]['names']['en']
return GeoData(code, name, region_code, region_name, city_name)
| get_ip_info | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ip):\n try:\n ipInfo = _mmdb_reader.get(ip) or {}\n except (maxminddb.errors.InvalidDatabaseError, ValueError):\n ipInfo = {}\n code, na... |
async def get_real_ext_ip(self):
"""Return real external IP address."""
while self._ip_hosts:
try:
timeout = aiohttp.ClientTimeout(total=self._timeout)
async with aiohttp.ClientSession(timeout=timeout, loop=self._loop
) as session, session.get(self._pop_random_ip_host()) as resp:
ip = await resp.text()
except asyncio.TimeoutError:
pass
else:
ip = ip.strip()
if self.host_is_ip(ip):
log.debug('Real external IP: %s', ip)
break
else:
raise RuntimeError('Could not get the external IP')
return ip
| get_real_ext_ip | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def get_real_ext_ip(self):\n \"\"\"Return real external IP address.\"\"\"\n while self._ip_hosts:\n try:\n timeout = aiohttp.ClientTime... |
async def resolve(self, host, port=80, family=None, qtype='A', logging=True):
"""Return resolving IP address(es) from host name."""
if self.host_is_ip(host):
return host
_host = self._cached_hosts.get(host)
if _host:
return _host
resp = await self._resolve(host, qtype)
if resp:
hosts = [{'hostname': host, 'host': r.host, 'port': port, 'family':
family, 'proto': socket.IPPROTO_IP, 'flags': socket.
AI_NUMERICHOST} for r in resp]
if family:
self._cached_hosts[host] = hosts
else:
self._cached_hosts[host] = hosts[0]['host']
if logging:
log.debug('%s: Host resolved: %s' % (host, self._cached_hosts[
host]))
elif logging:
log.warning('%s: Could not resolve host' % host)
return self._cached_hosts.get(host)
| resolve | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def resolve(self, host, port=80, family=None, qtype='A', logging=True):\n \"\"\"Return resolving IP address(es) from host name.\"\"\"\n if self.host_is_i... |
async def create(cls, host, *args, **kwargs):
"""Asynchronously create a :class:`Proxy` object.
:param str host: A passed host can be a domain or IP address.
If the host is a domain, try to resolve it
:param str \\*args:
(optional) Positional arguments that :class:`Proxy` takes
:param str \\*\\*kwargs:
(optional) Keyword arguments that :class:`Proxy` takes
:return: :class:`Proxy` object
:rtype: proxybroker.Proxy
:raises ResolveError: If could not resolve the host
:raises ValueError: If the port > 65535
"""
loop = kwargs.pop('loop', None)
resolver = kwargs.pop('resolver', Resolver(loop=loop))
try:
_host = await resolver.resolve(host)
self = cls(_host, *args, **kwargs)
except (ResolveError, ValueError) as e:
log.error('%s:%s: Error at creating: %s' % (host, args[0], e))
raise
return self
| create | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def create(cls, host, *args, **kwargs):\n \"\"\"Asynchronously create a :class:`Proxy` object.\n\n :param str host: A passed host can be a domain or ... |
def x(self):
if not self.stat['requests']:
return 0
return round(sum(self.stat['errors'].values()) / self.stat['requests'], 2)
| error_rate | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.stat['requests']:\n return 0\n return round(sum(self.stat['errors'].values()) / self.stat['requests'], 2)\n",
"role": "us... |
def x(self):
if not self._schemes:
_schemes = []
if self.types.keys() & _HTTP_PROTOS:
_schemes.append('HTTP')
if self.types.keys() & _HTTPS_PROTOS:
_schemes.append('HTTPS')
self._schemes = tuple(_schemes)
return self._schemes
| schemes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._schemes:\n _schemes = []\n if self.types.keys() & _HTTP_PROTOS:\n _schemes.append('HTTP')\n if self.ty... |
def x(self):
if not self._runtimes:
return 0
return round(sum(self._runtimes) / len(self._runtimes), 2)
| avg_resp_time | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._runtimes:\n return 0\n return round(sum(self._runtimes) / len(self._runtimes), 2)\n",
"role": "user"
},
{
"conte... |
def x(self):
info = {'host': self.host, 'port': self.port, 'geo': {'country': {
'code': self._geo.code, 'name': self._geo.name}, 'region': {'code':
self._geo.region_code, 'name': self._geo.region_name}, 'city': self
._geo.city_name}, 'types': [], 'avg_resp_time': self.avg_resp_time,
'error_rate': self.error_rate}
order = lambda tp_lvl: (len(tp_lvl[0]), tp_lvl[0][-1])
for tp, lvl in sorted(self.types.items(), key=order):
info['types'].append({'type': tp, 'level': lvl or ''})
return info
| as_json | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n info = {'host': self.host, 'port': self.port, 'geo': {'country': {\n 'code': self._geo.code, 'name': self._geo.name}, 'region': {'code':\n ... |
async def get_proxies(self):
"""Receive proxies from the provider and return them.
:return: :attr:`.proxies`
"""
log.debug('Try to get proxies from %s' % self.domain)
async with aiohttp.ClientSession(headers=get_headers(), cookies=self.
_cookies, loop=self._loop) as self._session:
await self._pipe()
log.debug('%d proxies received from %s: %s' % (len(self.proxies), self.
domain, self.proxies))
return self.proxies
| get_proxies | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def get_proxies(self):\n \"\"\"Receive proxies from the provider and return them.\n\n :return: :attr:`.proxies`\n \"\"\"\n log.debug('Try t... |
async def save(proxies, filename):
"""Save proxies to a file."""
with open(filename, 'w') as f:
while True:
proxy = await proxies.get()
if proxy is None:
break
proto = 'https' if 'HTTPS' in proxy.types else 'http'
row = '%s://%s:%d\n' % (proto, proxy.host, proxy.port)
f.write(row)
| save | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def save(proxies, filename):\n \"\"\"Save proxies to a file.\"\"\"\n with open(filename, 'w') as f:\n while True:\n proxy = await proxi... |
def x(self, **kwargs):
super(CommonConf, self).update(**kwargs)
conf_changed = False
for conf_name, conf_value in kwargs.items():
rtconf.base.get_validator(conf_name)(conf_value)
item1 = self._settings.get(conf_name, None)
item2 = kwargs.get(conf_name, None)
if item1 != item2:
conf_changed = True
if conf_changed:
for conf_name, conf_value in kwargs.items():
self._settings[conf_name] = conf_value
self._notify_listeners(CommonConf.CONF_CHANGED_EVT, self)
| update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n super(CommonConf, self).update(**kwargs)\n conf_changed = False\n for conf_name, conf_value in kwargs.items():\n rtconf.base... |
def x(buf):
mpls_label = type_desc.Int3.to_user(six.binary_type(buf))
return mpls_label >> 4, mpls_label & 1
| label_from_bin | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(buf):\n mpls_label = type_desc.Int3.to_user(six.binary_type(buf))\n return mpls_label >> 4, mpls_label & 1\n",
"role": "user"
},
{
"content":... |
def x(self, evt):
vrf_conf = evt.value
vrf_conf.remove_listener(VrfConf.VRF_CHG_EVT, self.on_chg_vrf_conf)
self._table_manager.remove_vrf_by_vrf_conf(vrf_conf)
self._rt_manager.update_local_rt_nlris()
self._signal_bus.vrf_removed(vrf_conf.route_dist)
rd = vrf_conf.route_dist
rf = vrf_conf.route_family
peers = self._peer_manager.iterpeers
for peer in peers:
key = ':'.join([rd, rf])
peer.attribute_maps.pop(key, None)
| on_remove_vrf_conf | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, evt):\n vrf_conf = evt.value\n vrf_conf.remove_listener(VrfConf.VRF_CHG_EVT, self.on_chg_vrf_conf)\n self._table_manager.remove_vrf_by_vrf_conf(... |
def x(self, evt):
vrf_conf = evt.value
route_family = vrf_conf.route_family
assert route_family in vrfs.SUPPORTED_VRF_RF
vrf_table = self._table_manager.create_and_link_vrf_table(vrf_conf)
vrf_conf.add_listener(ConfWithStats.UPDATE_STATS_LOG_ENABLED_EVT, self.
on_stats_config_change)
vrf_conf.add_listener(ConfWithStats.UPDATE_STATS_TIME_EVT, self.
on_stats_config_change)
vrf_conf.add_listener(VrfConf.VRF_CHG_EVT, self.on_chg_vrf_conf)
self._table_manager.import_all_vpn_paths_to_vrf(vrf_table)
self._rt_manager.update_local_rt_nlris()
self._signal_bus.vrf_added(vrf_conf)
| on_add_vrf_conf | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, evt):\n vrf_conf = evt.value\n route_family = vrf_conf.route_family\n assert route_family in vrfs.SUPPORTED_VRF_RF\n vrf_table = self._table_... |
def x(buf):
family, = struct.unpack_from(_ZEBRA_FAMILY_FMT, buf)
rest = buf[_ZEBRA_FAMILY_SIZE:]
if socket.AF_INET == family:
prefix, p_len = struct.unpack_from(_ZEBRA_IPV4_PREFIX_FMT, rest)
prefix = '%s/%d' % (addrconv.ipv4.bin_to_text(prefix), p_len)
rest = rest[_ZEBRA_IPV4_PREFIX_SIZE:]
elif socket.AF_INET6 == family:
prefix, p_len = struct.unpack_from(_ZEBRA_IPV6_PREFIX_FMT, rest)
prefix = '%s/%d' % (addrconv.ipv6.bin_to_text(prefix), p_len)
rest = rest[_ZEBRA_IPV6_PREFIX_SIZE:]
else:
raise struct.error('Unsupported family: %d' % family)
return family, prefix, rest
| parse_zebra_family_prefix | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(buf):\n family, = struct.unpack_from(_ZEBRA_FAMILY_FMT, buf)\n rest = buf[_ZEBRA_FAMILY_SIZE:]\n if socket.AF_INET == family:\n prefix, p_len =... |
def x(prefix):
if ip.valid_ipv4(prefix):
family = socket.AF_INET
prefix_addr, prefix_num = prefix.split('/')
return family, struct.pack(_ZEBRA_FAMILY_IPV4_PREFIX_FMT, family,
addrconv.ipv4.text_to_bin(prefix_addr), int(prefix_num))
elif ip.valid_ipv6(prefix):
family = socket.AF_INET6
prefix_addr, prefix_num = prefix.split('/')
return family, struct.pack(_ZEBRA_FAMILY_IPV6_PREFIX_FMT, family,
addrconv.ipv6.text_to_bin(prefix_addr), int(prefix_num))
raise ValueError('Invalid prefix: %s' % prefix)
| serialize_zebra_family_prefix | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(prefix):\n if ip.valid_ipv4(prefix):\n family = socket.AF_INET\n prefix_addr, prefix_num = prefix.split('/')\n return family, struct.pa... |
def x(mac):
return bool(re.match('^' + '[\\:\\-]'.join(['([0-9a-f]{2})'] * 6) + '$',
mac.lower()))
| is_valid_mac | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(mac):\n return bool(re.match('^' + '[\\\\:\\\\-]'.join(['([0-9a-f]{2})'] * 6) + '$',\n mac.lower()))\n",
"role": "user"
},
{
"content": "... |
def x(prefix, bits):
try:
prefix = int(prefix)
except ValueError:
return False
return 0 <= prefix <= bits
| is_valid_ip_prefix | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(prefix, bits):\n try:\n prefix = int(prefix)\n except ValueError:\n return False\n return 0 <= prefix <= bits\n",
"role": "user"
}... |
def x(ipv4_prefix):
if not isinstance(ipv4_prefix, str):
return False
tokens = ipv4_prefix.split('/')
if len(tokens) != 2:
return False
return is_valid_ipv4(tokens[0]) and is_valid_ip_prefix(tokens[1], 32)
| is_valid_ipv4_prefix | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ipv4_prefix):\n if not isinstance(ipv4_prefix, str):\n return False\n tokens = ipv4_prefix.split('/')\n if len(tokens) != 2:\n return Fa... |
def x(ipv6_prefix):
if not isinstance(ipv6_prefix, str):
return False
tokens = ipv6_prefix.split('/')
if len(tokens) != 2:
return False
return is_valid_ipv6(tokens[0]) and is_valid_ip_prefix(tokens[1], 128)
| is_valid_ipv6_prefix | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ipv6_prefix):\n if not isinstance(ipv6_prefix, str):\n return False\n tokens = ipv6_prefix.split('/')\n if len(tokens) != 2:\n return Fa... |
def x(prefix):
if not isinstance(prefix, str):
return False
tokens = prefix.split(':', 2)
if len(tokens) != 3:
return False
if not is_valid_route_dist(':'.join([tokens[0], tokens[1]])):
return False
return is_valid_ipv4_prefix(tokens[2])
| is_valid_vpnv4_prefix | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(prefix):\n if not isinstance(prefix, str):\n return False\n tokens = prefix.split(':', 2)\n if len(tokens) != 3:\n return False\n if ... |
def x(prefix):
if not isinstance(prefix, str):
return False
tokens = prefix.split(':', 2)
if len(tokens) != 3:
return False
if not is_valid_route_dist(':'.join([tokens[0], tokens[1]])):
return False
return is_valid_ipv6_prefix(tokens[2])
| is_valid_vpnv6_prefix | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(prefix):\n if not isinstance(prefix, str):\n return False\n tokens = prefix.split(':', 2)\n if len(tokens) != 3:\n return False\n if ... |
def x(label):
if not isinstance(label, numbers.Integral) or 4 <= label <= 15 or (
label < 0 or label > 2 ** 20):
return False
return True
| is_valid_mpls_label | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(label):\n if not isinstance(label, numbers.Integral) or 4 <= label <= 15 or (\n label < 0 or label > 2 ** 20):\n return False\n return True... |
def x(labels):
if not isinstance(labels, (list, tuple)):
return False
for label in labels:
if not is_valid_mpls_label(label):
return False
return True
| is_valid_mpls_labels | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(labels):\n if not isinstance(labels, (list, tuple)):\n return False\n for label in labels:\n if not is_valid_mpls_label(label):\n ... |
def x(attr):
if not isinstance(attr, str):
return False
tokens = attr.rsplit(':', 1)
if len(tokens) != 2:
return False
try:
if '.' in tokens[0]:
if not is_valid_ipv4(tokens[0]):
return False
else:
int(tokens[0])
int(tokens[1])
except (ValueError, socket.error):
return False
return True
| is_valid_ext_comm_attr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(attr):\n if not isinstance(attr, str):\n return False\n tokens = attr.rsplit(':', 1)\n if len(tokens) != 2:\n return False\n try:\n ... |
def x(esi):
if isinstance(esi, numbers.Integral):
return 0 <= esi <= 4722366482869645213695
return isinstance(esi, dict)
| is_valid_esi | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(esi):\n if isinstance(esi, numbers.Integral):\n return 0 <= esi <= 4722366482869645213695\n return isinstance(esi, dict)\n",
"role": "user"
... |
def x(self, data, disp_table):
self._unpacker.feed(data)
for m in self._unpacker:
self._dispatch_message(m, disp_table)
| get_and_dispatch_messages | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data, disp_table):\n self._unpacker.feed(data)\n for m in self._unpacker:\n self._dispatch_message(m, disp_table)\n",
"role": "user"
}... |
def x(self, method, params):
msg, msgid = self._encoder.create_request(method, params)
self._send_message(msg)
self._pending_requests.add(msgid)
return msgid
| send_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, params):\n msg, msgid = self._encoder.create_request(method, params)\n self._send_message(msg)\n self._pending_requests.add(msgid)\n ... |
def x(self, msgid, error=None, result=None):
msg = self._encoder.create_response(msgid, error, result)
self._send_message(msg)
| send_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msgid, error=None, result=None):\n msg = self._encoder.create_response(msgid, error, result)\n self._send_message(msg)\n",
"role": "user"
},
... |
def x(self, method, params):
msg = self._encoder.create_notification(method, params)
self._send_message(msg)
| send_notification | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, params):\n msg = self._encoder.create_notification(method, params)\n self._send_message(msg)\n",
"role": "user"
},
{
"content":... |
def x(self, all=False):
while all or self._incoming == 0:
try:
packet = self._sock.recv(4096)
except IOError:
packet = None
if not packet:
if packet is not None:
self._closed_by_peer = True
break
self._encoder.get_and_dispatch_messages(packet, self._table)
return self._incoming > 0
| receive_messages | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, all=False):\n while all or self._incoming == 0:\n try:\n packet = self._sock.recv(4096)\n except IOError:\n packet... |
def x(self, method, params):
msgid = self._endpoint.send_request(method, params)
while True:
if not self._endpoint.receive_messages():
raise EOFError('EOF')
res = self._endpoint.get_response(msgid)
if res:
result, error = res
if error is None:
return result
raise RPCError(error)
self._process_input_notification()
self._process_input_request()
| call | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, params):\n msgid = self._endpoint.send_request(method, params)\n while True:\n if not self._endpoint.receive_messages():\n ... |
def x(self):
if not self._endpoint.receive_messages():
raise EOFError('EOF')
self._process_input_notification()
self._process_input_request()
| receive_notification | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._endpoint.receive_messages():\n raise EOFError('EOF')\n self._process_input_notification()\n self._process_input_request()... |
def x(self, interval, now=True):
if interval < 0:
raise ValueError('interval must be >= 0')
if self._running:
self.stop()
self._running = True
self._interval = interval
if now:
self._self_thread = hub.spawn_after(0, self)
else:
self._self_thread = hub.spawn_after(self._interval, self)
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, interval, now=True):\n if interval < 0:\n raise ValueError('interval must be >= 0')\n if self._running:\n self.stop()\n self._runn... |
def x(self):
self._running = False
if self._self_thread is not None:
self._self_thread.cancel()
self._self_thread = None
| stop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._running = False\n if self._self_thread is not None:\n self._self_thread.cancel()\n self._self_thread = None\n",
"role": ... |
def x(self):
if self._self_thread is not None:
self._self_thread.cancel()
self._self_thread = None
self._self_thread = hub.spawn_after(self._interval, self)
| reset | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._self_thread is not None:\n self._self_thread.cancel()\n self._self_thread = None\n self._self_thread = hub.spawn_after(se... |
def x(conf_name, default_value, **all_config):
conf_value = all_config.get(conf_name)
if conf_value is not None:
conf_value = get_validator(conf_name)(conf_value)
else:
conf_value = default_value
return conf_value
| compute_optional_conf | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(conf_name, default_value, **all_config):\n conf_value = all_config.get(conf_name)\n if conf_value is not None:\n conf_value = get_validator(conf_n... |
def x(self):
diag = (self.ver << 5) + self.diag
flags = (self.state << 6) + self.flags
length = len(self)
return struct.pack(self._PACK_STR, diag, flags, self.detect_mult,
length, self.my_discr, self.your_discr, self.
desired_min_tx_interval, self.required_min_rx_interval, self.
required_min_echo_rx_interval)
| pack | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n diag = (self.ver << 5) + self.diag\n flags = (self.state << 6) + self.flags\n length = len(self)\n return struct.pack(self._PACK_STR, diag... |
def x(self, *args, **kwargs):
if not self.flags & BFD_FLAG_AUTH_PRESENT or not issubclass(self.
auth_cls.__class__, BFDAuth):
return False
return self.auth_cls.authenticate(self, *args, **kwargs)
| authenticate | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *args, **kwargs):\n if not self.flags & BFD_FLAG_AUTH_PRESENT or not issubclass(self.\n auth_cls.__class__, BFDAuth):\n return False\n ... |
def x(cls, buf):
return struct.unpack_from(cls._PACK_HDR_STR, buf[:cls._PACK_HDR_STR_LEN])
| parser_hdr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, buf):\n return struct.unpack_from(cls._PACK_HDR_STR, buf[:cls._PACK_HDR_STR_LEN])\n",
"role": "user"
},
{
"content": "parser_hdr",
"rol... |
def x(self):
return struct.pack(self._PACK_HDR_STR, self.auth_type, self.auth_len)
| serialize_hdr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return struct.pack(self._PACK_HDR_STR, self.auth_type, self.auth_len)\n",
"role": "user"
},
{
"content": "serialize_hdr",
"role": "... |
def x(cls):
assert cls.cls_msg_type is not None
assert cls.cls_msg_type not in _MSG_PARSERS
_MSG_PARSERS[cls.cls_msg_type] = cls.parser
return cls
| register_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls):\n assert cls.cls_msg_type is not None\n assert cls.cls_msg_type not in _MSG_PARSERS\n _MSG_PARSERS[cls.cls_msg_type] = cls.parser\n return cl... |
def x(msg_):
if hasattr(msg_, '_fields'):
for k in msg_._fields:
yield k, getattr(msg_, k)
return
base = getattr(msg_, '_base_attributes', [])
opt = getattr(msg_, '_opt_attributes', [])
for k, v in inspect.getmembers(msg_):
if k in opt:
pass
elif k.startswith('_'):
continue
elif callable(v):
continue
elif k in base:
continue
elif hasattr(msg_.__class__, k):
continue
yield k, v
| obj_python_attrs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg_):\n if hasattr(msg_, '_fields'):\n for k in msg_._fields:\n yield k, getattr(msg_, k)\n return\n base = getattr(msg_, '_bas... |
def x(msg_):
if isinstance(msg_, StringifyMixin):
itr = msg_.stringify_attrs()
else:
itr = obj_python_attrs(msg_)
for k, v in itr:
if k.endswith('_') and k[:-1] in _RESERVED_KEYWORD:
assert isinstance(msg_, StringifyMixin)
k = k[:-1]
yield k, v
| obj_attrs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg_):\n if isinstance(msg_, StringifyMixin):\n itr = msg_.stringify_attrs()\n else:\n itr = obj_python_attrs(msg_)\n for k, v in itr:\n... |
def x(self, encode_string=base64.b64encode):
dict_ = {}
encode = lambda key, val: self._encode_value(key, val, encode_string)
for k, v in obj_attrs(self):
dict_[k] = encode(k, v)
return {self.__class__.__name__: dict_}
| to_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, encode_string=base64.b64encode):\n dict_ = {}\n encode = lambda key, val: self._encode_value(key, val, encode_string)\n for k, v in obj_attrs(se... |
def x(cls, dict_, decode_string=base64.b64decode, **additional_args):
decode = lambda k, x: cls._decode_value(k, x, decode_string, **
additional_args)
kwargs = cls._restore_args(_mapdict_kv(decode, dict_))
try:
return cls(**dict(kwargs, **additional_args))
except TypeError:
print('CLS %s' % cls)
print('ARG %s' % dict_)
print('KWARG %s' % kwargs)
raise
| from_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, dict_, decode_string=base64.b64decode, **additional_args):\n decode = lambda k, x: cls._decode_value(k, x, decode_string, **\n additional_args)\... |
def x(request, connection):
error = connection.send(request)
reply = None
if error:
return error, reply
ovs_poller = poller.Poller()
while not error:
ovs_poller.immediate_wake()
error, reply = connection.recv()
if error != errno.EAGAIN:
break
if reply and reply.id == request.id and reply.type in (jsonrpc.
Message.T_REPLY, jsonrpc.Message.T_ERROR):
break
connection.run()
connection.wait(ovs_poller)
connection.recv_wait(ovs_poller)
ovs_poller.block()
hub.sleep(0)
return error, reply
| transact_block | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request, connection):\n error = connection.send(request)\n reply = None\n if error:\n return error, reply\n ovs_poller = poller.Poller()\n ... |
def x(schemas, schema_tables, exclude_table_columns):
return [_filter_schema(s, schema_tables, exclude_table_columns) for s in
schemas]
| filter_schemas | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(schemas, schema_tables, exclude_table_columns):\n return [_filter_schema(s, schema_tables, exclude_table_columns) for s in\n schemas]\n",
"role":... |
def x(schema, schema_tables, exclude_table_columns):
tables = {}
for tbl_name, tbl_data in schema['tables'].items():
if not schema_tables or tbl_name in schema_tables:
columns = {}
exclude_columns = exclude_table_columns.get(tbl_name, [])
for col_name, col_data in tbl_data['columns'].items():
if col_name in exclude_columns:
continue
type_ = col_data.get('type')
if type_:
if type_ and isinstance(type_, dict):
key = type_.get('key')
if key and isinstance(key, dict):
ref_tbl = key.get('refTable')
if ref_tbl and isinstance(ref_tbl, six.string_types
):
if ref_tbl not in schema_tables:
continue
value = type_.get('value')
if value and isinstance(value, dict):
ref_tbl = value.get('refTable')
if ref_tbl and isinstance(ref_tbl, six.string_types
):
if ref_tbl not in schema_tables:
continue
columns[col_name] = col_data
tbl_data['columns'] = columns
tables[tbl_name] = tbl_data
schema['tables'] = tables
return schema
| filter_schema | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(schema, schema_tables, exclude_table_columns):\n tables = {}\n for tbl_name, tbl_data in schema['tables'].items():\n if not schema_tables or tbl_n... |
def x(self, msg):
if not self.is_active:
self.logger.debug('Cannot send message: Already deactivated: msg=%s',
msg)
return
elif not self.send_q:
self.logger.debug(
'Cannot send message: Send queue does not exist: msg=%s', msg)
return
elif self.zserv_ver != msg.version:
self.logger.debug(
'Zebra protocol version mismatch:server_version=%d, msg.version=%d'
, self.zserv_ver, msg.version)
msg.version = self.zserv_ver
self.send_q.put(msg.serialize())
| send_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg):\n if not self.is_active:\n self.logger.debug('Cannot send message: Already deactivated: msg=%s',\n msg)\n return\n e... |
def x(self, peer):
LOG.debug('Cleaning obsolete paths whose source/version: %s/%s', peer.
ip_address, peer.version_num)
self._table_manager.clean_stale_routes(peer)
| on_peer_down | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer):\n LOG.debug('Cleaning obsolete paths whose source/version: %s/%s', peer.\n ip_address, peer.version_num)\n self._table_manager.clean_... |
def x(self):
est_peers = []
for peer in self._peers.values():
if peer.in_established:
est_peers.append(peer)
return est_peers
| get_peers_in_established | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n est_peers = []\n for peer in self._peers.values():\n if peer.in_established:\n est_peers.append(peer)\n return est_peers\n"... |
def x(self, route_family, peer):
if peer not in self._peers.values():
raise ValueError('Could not find given peer (%s)' % peer)
if route_family not in SUPPORTED_GLOBAL_RF:
raise ValueError('Given route family (%s) is not supported.' %
route_family)
table = self._table_manager.get_global_table_by_route_family(route_family)
for destination in table.values():
sent_routes = destination.sent_routes
if sent_routes is None or len(sent_routes) == 0:
continue
for sent_route in sent_routes:
if sent_route.sent_peer == peer:
p = sent_route.path
if p.med_set_by_target_neighbor or p.get_pattr(
BGP_ATTR_TYPE_MULTI_EXIT_DISC) is None:
sent_route.path = (
clone_path_and_update_med_for_target_neighbor(
sent_route.path, peer.med))
ogr = OutgoingRoute(sent_route.path, for_route_refresh=True)
peer.enque_outgoing_msg(ogr)
| resend_sent | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_family, peer):\n if peer not in self._peers.values():\n raise ValueError('Could not find given peer (%s)' % peer)\n if route_family no... |
def x(self, route_family):
assert route_family != RF_RTC_UC
for peer in self._peers.values():
if peer.in_established and peer.is_mbgp_cap_valid(route_family
) and not peer.is_mbgp_cap_valid(RF_RTC_UC):
peer.request_route_refresh(route_family)
| req_rr_to_non_rtc_peers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_family):\n assert route_family != RF_RTC_UC\n for peer in self._peers.values():\n if peer.in_established and peer.is_mbgp_cap_valid(ro... |
def x(self, peer_ip, *route_families):
LOG.debug('Route refresh requested for peer %s and route families %s',
peer_ip, route_families)
if not SUPPORTED_GLOBAL_RF.intersection(route_families):
raise ValueError('Given route family(s) % is not supported.' %
route_families)
peer_list = []
if peer_ip == 'all':
peer_list.extend(self.get_peers_in_established())
else:
given_peer = self._peers.get(peer_ip)
if not given_peer:
raise ValueError('Invalid/unrecognized peer %s' % peer_ip)
if not given_peer.in_established:
raise ValueError('Peer currently do not have established session.')
peer_list.append(given_peer)
for peer in peer_list:
peer.request_route_refresh(*route_families)
return True
| make_route_refresh_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer_ip, *route_families):\n LOG.debug('Route refresh requested for peer %s and route families %s',\n peer_ip, route_families)\n if not SUPP... |
def x(self, peer):
if not peer.is_mbgp_cap_valid(RF_RTC_UC):
return
neigh_conf = self._neighbors_conf.get_neighbor_conf(peer.ip_address)
peer_rtc_as = neigh_conf.rtc_as
rtc_table = self._table_manager.get_rtc_table()
for dest in rtc_table.values():
best_path = dest.best_path
if not best_path:
continue
if best_path.source is None:
origin_as = best_path.nlri.origin_as
if origin_as == peer_rtc_as:
peer.communicate_path(best_path)
else:
peer.communicate_path(best_path)
peer.enque_end_of_rib(RF_RTC_UC)
| comm_all_rt_nlris | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer):\n if not peer.is_mbgp_cap_valid(RF_RTC_UC):\n return\n neigh_conf = self._neighbors_conf.get_neighbor_conf(peer.ip_address)\n peer... |
def x(self, peer):
LOG.debug('Communicating current best path for all afi/safi except 1/132')
for route_family, table in self._table_manager.iter:
if route_family == RF_RTC_UC:
continue
if peer.is_mbgp_cap_valid(route_family):
for dest in table.values():
if dest.best_path:
peer.communicate_path(dest.best_path)
| comm_all_best_paths | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer):\n LOG.debug('Communicating current best path for all afi/safi except 1/132')\n for route_family, table in self._table_manager.iter:\n ... |
def x(self, new_best_path):
comm_attr = new_best_path.get_pattr(BGP_ATTR_TYPE_COMMUNITIES)
if comm_attr:
comm_attr_na = comm_attr.has_comm_attr(BGPPathAttributeCommunities.
NO_ADVERTISE)
if comm_attr_na:
LOG.debug(
'New best path has community attr. NO_ADVERTISE = %s. Hence not advertising to any peer'
, comm_attr_na)
return
qualified_peers = self._collect_peers_of_interest(new_best_path)
for peer in qualified_peers:
peer.communicate_path(new_best_path)
| comm_new_best_to_bgp_peers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_best_path):\n comm_attr = new_best_path.get_pattr(BGP_ATTR_TYPE_COMMUNITIES)\n if comm_attr:\n comm_attr_na = comm_attr.has_comm_attr(BG... |
def x(self, new_best_path):
path_rts = new_best_path.get_rts()
qualified_peers = set(self._peers.values())
qualified_peers = self._rt_manager.filter_by_origin_as(new_best_path,
qualified_peers)
if path_rts:
path_rts.append(RouteTargetMembershipNLRI.DEFAULT_RT)
qualified_peers = set(self._get_non_rtc_peers())
peer_to_rtfilter_map = self._peer_to_rtfilter_map
for peer, rt_filter in peer_to_rtfilter_map.items():
if peer is None:
continue
if rt_filter is None:
qualified_peers.add(peer)
elif rt_filter.intersection(path_rts):
qualified_peers.add(peer)
return qualified_peers
| collect_peers_of_interest | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_best_path):\n path_rts = new_best_path.get_rts()\n qualified_peers = set(self._peers.values())\n qualified_peers = self._rt_manager.filter_b... |
def x(l, max_level=10):
if max_level >= 0:
_iter = l.values() if isinstance(l, dict) else l
for el in _iter:
if isinstance(el, RdyToFlattenCollection):
for sub in _flatten(el, max_level=max_level - 1):
yield sub
else:
yield el
else:
yield l
| flatten | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(l, max_level=10):\n if max_level >= 0:\n _iter = l.values() if isinstance(l, dict) else l\n for el in _iter:\n if isinstance(el, Rd... |
def x(outgoing_msg, rpc_session):
assert outgoing_msg
path = outgoing_msg.path
assert path
vpn_nlri = path.nlri
assert path.source is not None
if path.source != VRF_TABLE:
params = [{ROUTE_DISTINGUISHER: outgoing_msg.route_dist, PREFIX:
vpn_nlri.prefix, NEXT_HOP: path.nexthop, VRF_RF: VrfConf.
rf_2_vrf_rf(path.route_family)}]
if path.nlri.ROUTE_FAMILY.safi not in (subaddr_family.IP_FLOWSPEC,
subaddr_family.VPN_FLOWSPEC):
params[VPN_LABEL] = path.label_list[0]
if not path.is_withdraw:
rpc_msg = rpc_session.create_notification(
NOTIFICATION_ADD_REMOTE_PREFIX, params)
else:
rpc_msg = rpc_session.create_notification(
NOTIFICATION_DELETE_REMOTE_PREFIX, params)
else:
params = [{ROUTE_DISTINGUISHER: outgoing_msg.route_dist, PREFIX:
vpn_nlri.prefix, NEXT_HOP: path.nexthop, VRF_RF: VrfConf.
rf_2_vrf_rf(path.route_family), ORIGIN_RD: path.origin_rd}]
if not path.is_withdraw:
rpc_msg = rpc_session.create_notification(
NOTIFICATION_ADD_LOCAL_PREFIX, params)
else:
rpc_msg = rpc_session.create_notification(
NOTIFICATION_DELETE_LOCAL_PREFIX, params)
return rpc_msg
| create_prefix_notification | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(outgoing_msg, rpc_session):\n assert outgoing_msg\n path = outgoing_msg.path\n assert path\n vpn_nlri = path.nlri\n assert path.source is not No... |
def x(port):
if not port:
raise NetworkControllerError(desc='Invalid rpc port number.')
if isinstance(port, str):
port = int(port)
if port <= 0:
raise NetworkControllerError(desc='Invalid rpc port number %s' % port)
return port
| validate_rpc_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(port):\n if not port:\n raise NetworkControllerError(desc='Invalid rpc port number.')\n if isinstance(port, str):\n port = int(port)\n i... |
def x(self, sink_iter):
LOG.debug('NetworkController processing outgoing request list.')
from ryu.services.protocols.bgp.model import FlexinetOutgoingRoute
while self.is_connected:
for outgoing_msg in sink_iter:
if not self.is_connected:
self._socket.close()
return
if isinstance(outgoing_msg, FlexinetOutgoingRoute):
rpc_msg = _create_prefix_notification(outgoing_msg, self)
else:
raise NotImplementedError(
'Do not handle out going message of type %s' %
outgoing_msg.__class__)
if rpc_msg:
self._sendall(rpc_msg)
self.pause(0)
if self.green_in:
self.green_in.kill()
| process_outgoing_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sink_iter):\n LOG.debug('NetworkController processing outgoing request list.')\n from ryu.services.protocols.bgp.model import FlexinetOutgoingRoute... |
def x(self, *args, **kwargs):
apgw_rpc_bind_ip = _validate_rpc_ip(kwargs.pop(NC_RPC_BIND_IP))
apgw_rpc_bind_port = _validate_rpc_port(kwargs.pop(NC_RPC_BIND_PORT))
sock_addr = apgw_rpc_bind_ip, apgw_rpc_bind_port
LOG.debug('NetworkController started listening for connections...')
server_thread, _ = self._listen_tcp(sock_addr, self._start_rpc_session)
self.pause(0)
server_thread.wait()
| run | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *args, **kwargs):\n apgw_rpc_bind_ip = _validate_rpc_ip(kwargs.pop(NC_RPC_BIND_IP))\n apgw_rpc_bind_port = _validate_rpc_port(kwargs.pop(NC_RPC_BIN... |
def x(self, sock):
session_name = RpcSession.NAME_FMT % str(sock.getpeername())
self._stop_child_activities(session_name)
rpc_session = RpcSession(sock, self)
self._spawn_activity(rpc_session)
| start_rpc_session | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sock):\n session_name = RpcSession.NAME_FMT % str(sock.getpeername())\n self._stop_child_activities(session_name)\n rpc_session = RpcSession(soc... |
def x(code, subcode):
notification = BGPNotification(code, subcode)
if not notification.reason:
raise ValueError('Invalid code/sub-code.')
return notification
| notification_factory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(code, subcode):\n notification = BGPNotification(code, subcode)\n if not notification.reason:\n raise ValueError('Invalid code/sub-code.')\n re... |
def x(self):
from ryu.services.protocols.bgp.utils.bgp import from_inet_ptoi
if not self.state == BGP_FSM_OPEN_CONFIRM:
raise BgpProtocolException(desc=
'Can access remote router id only after open message is received')
remote_id = self.recv_open_msg.bgp_identifier
local_id = self.sent_open_msg.bgp_identifier
return from_inet_ptoi(local_id) > from_inet_ptoi(remote_id)
| is_local_router_id_greater | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n from ryu.services.protocols.bgp.utils.bgp import from_inet_ptoi\n if not self.state == BGP_FSM_OPEN_CONFIRM:\n raise BgpProtocolException... |
def x(self):
if not self.recv_open_msg:
raise ValueError('Did not yet receive peers open message.')
err_cap_enabled = False
local_caps = self.sent_open_msg.opt_param
peer_caps = self.recv_open_msg.opt_param
local_cap = [cap for cap in local_caps if cap.cap_code ==
BGP_CAP_ENHANCED_ROUTE_REFRESH]
peer_cap = [cap for cap in peer_caps if cap.cap_code ==
BGP_CAP_ENHANCED_ROUTE_REFRESH]
if local_cap and peer_cap:
err_cap_enabled = True
return err_cap_enabled
| is_enhanced_rr_cap_valid | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.recv_open_msg:\n raise ValueError('Did not yet receive peers open message.')\n err_cap_enabled = False\n local_caps = self... |
def x(self, peer):
self._peer = peer
self.connection_made()
self._recv_loop()
| run | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer):\n self._peer = peer\n self.connection_made()\n self._recv_loop()\n",
"role": "user"
},
{
"content": "run",
"role": "assis... |
def x(self, next_bytes):
self._recv_buff += next_bytes
while True:
if len(self._recv_buff) < BGP_MIN_MSG_LEN:
return
auth, length, ptype = BgpProtocol.parse_msg_header(self._recv_buff[
:BGP_MIN_MSG_LEN])
if auth != BgpProtocol.MESSAGE_MARKER:
LOG.error('Invalid message marker received: %s', auth)
raise bgp.NotSync()
check = length < BGP_MIN_MSG_LEN or length > BGP_MAX_MSG_LEN
check2 = ptype == BGP_MSG_OPEN and length < BGPOpen._MIN_LEN
check3 = ptype == BGP_MSG_KEEPALIVE and length != BGPKeepAlive._MIN_LEN
check4 = ptype == BGP_MSG_UPDATE and length < BGPUpdate._MIN_LEN
if any((check, check2, check3, check4)):
raise bgp.BadLen(ptype, length)
if len(self._recv_buff) < length:
return
msg, _, rest = BGPMessage.parser(self._recv_buff)
self._recv_buff = rest
self._handle_msg(msg)
| data_received | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, next_bytes):\n self._recv_buff += next_bytes\n while True:\n if len(self._recv_buff) < BGP_MIN_MSG_LEN:\n return\n auth, l... |
def x(self, code, subcode):
notification = BGPNotification(code, subcode)
reason = notification.reason
self._send_with_lock(notification)
self._signal_bus.bgp_error(self._peer, code, subcode, reason)
if len(self._localname):
LOG.error('Sent notification to %r >> %s', self._localname,
notification)
self._socket.close()
| send_notification | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, subcode):\n notification = BGPNotification(code, subcode)\n reason = notification.reason\n self._send_with_lock(notification)\n self._s... |
def x(self, open_msg):
assert open_msg.type == BGP_MSG_OPEN
opt_param_cap_map = open_msg.opt_param_cap_map
remote_as = open_msg.my_as
cap4as = opt_param_cap_map.get(BGP_CAP_FOUR_OCTET_AS_NUMBER, None)
if cap4as is None:
if remote_as == AS_TRANS:
raise bgp.BadPeerAs()
self.cap_four_octet_as_number = False
else:
remote_as = cap4as.as_number
self.cap_four_octet_as_number = True
if remote_as != self._peer.remote_as:
raise bgp.BadPeerAs()
if open_msg.version != BGP_VERSION_NUM:
raise bgp.UnsupportedVersion(BGP_VERSION_NUM)
| validate_open_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, open_msg):\n assert open_msg.type == BGP_MSG_OPEN\n opt_param_cap_map = open_msg.opt_param_cap_map\n remote_as = open_msg.my_as\n cap4as = op... |
def x(self, msg):
LOG.debug('Received msg from %s << %s', self._remotename, msg)
if msg.type == BGP_MSG_OPEN:
if self.state == BGP_FSM_OPEN_SENT:
self._validate_open_msg(msg)
self.recv_open_msg = msg
self.state = BGP_FSM_OPEN_CONFIRM
self._peer.state.bgp_state = self.state
self._is_bound = self._peer.bind_protocol(self)
if not self._is_bound:
raise bgp.CollisionResolution()
if msg.hold_time == 0:
LOG.info(
'The Hold Time sent by the peer is zero, hence not setting any Hold Time and Keep Alive timers.'
)
else:
self._start_timers(msg.hold_time)
self._send_keepalive()
return
else:
LOG.error(
'Open message received when current state is not OpenSent')
raise bgp.FiniteStateMachineError()
elif msg.type == BGP_MSG_NOTIFICATION:
if self._peer:
self._signal_bus.bgp_notification_received(self._peer, msg)
LOG.error('Received notification message, hence closing connection %s',
msg)
self._socket.close()
return
if msg.type == BGP_MSG_KEEPALIVE or msg.type == BGP_MSG_UPDATE:
if self._expiry:
self._expiry.reset()
if msg.type in (BGP_MSG_UPDATE, BGP_MSG_KEEPALIVE, BGP_MSG_ROUTE_REFRESH):
self._peer.handle_msg(msg)
self.pause(0)
| handle_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg):\n LOG.debug('Received msg from %s << %s', self._remotename, msg)\n if msg.type == BGP_MSG_OPEN:\n if self.state == BGP_FSM_OPEN_SENT:\... |
def x(self, peer_holdtime):
neg_timer = min(self._holdtime, peer_holdtime)
if neg_timer < self._holdtime:
LOG.info(
'Negotiated hold time (%s) is lower then configured/default (%s).',
neg_timer, self._holdtime)
self._holdtime = neg_timer
self._keepalive = self._create_timer('Keepalive Timer', self.
_send_keepalive)
interval = self._holdtime // 3
self._keepalive.start(interval, now=False)
self._expiry = self._create_timer('Holdtime Timer', self._expired)
self._expiry.start(self._holdtime, now=False)
LOG.debug('Started keep-alive and expire timer for negotiated holdtime %s',
self._holdtime)
| start_timers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer_holdtime):\n neg_timer = min(self._holdtime, peer_holdtime)\n if neg_timer < self._holdtime:\n LOG.info(\n 'Negotiated hold ... |
def x(self):
LOG.info('Negotiated hold time %s expired.', self._holdtime)
code = BGP_ERROR_HOLD_TIMER_EXPIRED
subcode = BGP_ERROR_SUB_HOLD_TIMER_EXPIRED
self.send_notification(code, subcode)
self.connection_lost('Negotiated hold time %s expired.' % self._holdtime)
self.stop()
| expired | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n LOG.info('Negotiated hold time %s expired.', self._holdtime)\n code = BGP_ERROR_HOLD_TIMER_EXPIRED\n subcode = BGP_ERROR_SUB_HOLD_TIMER_EXPIR... |
def x(self):
required_len = BGP_MIN_MSG_LEN
conn_lost_reason = 'Connection lost as protocol is no longer active'
try:
while True:
next_bytes = self._socket.recv(required_len)
if len(next_bytes) == 0:
conn_lost_reason = 'Peer closed connection'
break
self.data_received(next_bytes)
except socket.error as err:
conn_lost_reason = 'Connection to peer lost: %s.' % err
except bgp.BgpExc as ex:
conn_lost_reason = 'Connection to peer lost, reason: %s.' % ex
except Exception as e:
LOG.debug(traceback.format_exc())
conn_lost_reason = str(e)
finally:
self.connection_lost(conn_lost_reason)
| recv_loop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n required_len = BGP_MIN_MSG_LEN\n conn_lost_reason = 'Connection lost as protocol is no longer active'\n try:\n while True:\n ... |
def x(self):
assert self.state == BGP_FSM_CONNECT
open_msg = self._peer.create_open_msg()
self._holdtime = open_msg.hold_time
self.state = BGP_FSM_OPEN_SENT
if not self.is_reactive:
self._peer.state.bgp_state = self.state
self.sent_open_msg = open_msg
self.send(open_msg)
self._peer.connection_made()
| connection_made | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n assert self.state == BGP_FSM_CONNECT\n open_msg = self._peer.create_open_msg()\n self._holdtime = open_msg.hold_time\n self.state = BGP_FS... |
def x(self, reason):
if self._peer:
state = self._peer.state.bgp_state
if self._is_bound or state == BGP_FSM_OPEN_SENT:
self._peer.connection_lost(reason)
self._peer = None
if reason:
LOG.info(reason)
else:
LOG.info('Connection to peer closed for unknown reasons.')
| connection_lost | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, reason):\n if self._peer:\n state = self._peer.state.bgp_state\n if self._is_bound or state == BGP_FSM_OPEN_SENT:\n self._pee... |
def x(self, interval):
if self._thread:
self.cancel()
self._event.clear()
self._thread = hub.spawn(self._timer, interval)
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, interval):\n if self._thread:\n self.cancel()\n self._event.clear()\n self._thread = hub.spawn(self._timer, interval)\n",
"role": "us... |
def x(self):
capabilities = OrderedDict()
mbgp_caps = []
if self.cap_mbgp_ipv4:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(RF_IPv4_UC.afi,
RF_IPv4_UC.safi))
if self.cap_mbgp_ipv6:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(RF_IPv6_UC.afi,
RF_IPv6_UC.safi))
if self.cap_mbgp_vpnv4:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(RF_IPv4_VPN.afi,
RF_IPv4_VPN.safi))
if self.cap_mbgp_vpnv6:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(RF_IPv6_VPN.afi,
RF_IPv6_VPN.safi))
if self.cap_rtc:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(RF_RTC_UC.afi,
RF_RTC_UC.safi))
if self.cap_mbgp_evpn:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(RF_L2_EVPN.afi,
RF_L2_EVPN.safi))
if self.cap_mbgp_ipv4fs:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(
RF_IPv4_FLOWSPEC.afi, RF_IPv4_FLOWSPEC.safi))
if self.cap_mbgp_ipv6fs:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(
RF_IPv6_FLOWSPEC.afi, RF_IPv6_FLOWSPEC.safi))
if self.cap_mbgp_vpnv4fs:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(
RF_VPNv4_FLOWSPEC.afi, RF_VPNv4_FLOWSPEC.safi))
if self.cap_mbgp_vpnv6fs:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(
RF_VPNv6_FLOWSPEC.afi, RF_VPNv6_FLOWSPEC.safi))
if self.cap_mbgp_l2vpnfs:
mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(
RF_L2VPN_FLOWSPEC.afi, RF_L2VPN_FLOWSPEC.safi))
if mbgp_caps:
capabilities[BGP_CAP_MULTIPROTOCOL] = mbgp_caps
if self.cap_refresh:
capabilities[BGP_CAP_ROUTE_REFRESH] = [
BGPOptParamCapabilityRouteRefresh()]
if self.cap_enhanced_refresh:
capabilities[BGP_CAP_ENHANCED_ROUTE_REFRESH] = [
BGPOptParamCapabilityEnhancedRouteRefresh()]
if self.cap_four_octet_as_number:
capabilities[BGP_CAP_FOUR_OCTET_AS_NUMBER] = [
BGPOptParamCapabilityFourOctetAsNumber(self.local_as)]
return capabilities
| get_configured_capabilities | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n capabilities = OrderedDict()\n mbgp_caps = []\n if self.cap_mbgp_ipv4:\n mbgp_caps.append(BGPOptParamCapabilityMultiprotocol(RF_IPv4_U... |
def x(self):
rtc_as_set = set()
for neigh in self._neighbors.values():
rtc_as_set.add(neigh.rtc_as)
return rtc_as_set
| rtc_as_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n rtc_as_set = set()\n for neigh in self._neighbors.values():\n rtc_as_set.add(neigh.rtc_as)\n return rtc_as_set\n",
"role": "user"
... |
def x(self):
self.data = bytearray()
r = self.protocols[::-1]
for i, p in enumerate(r):
if isinstance(p, packet_base.PacketBase):
if i == len(r) - 1:
prev = None
else:
prev = r[i + 1]
data = p.serialize(self.data, prev)
else:
data = six.binary_type(p)
self.data = bytearray(data + self.data)
| serialize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.data = bytearray()\n r = self.protocols[::-1]\n for i, p in enumerate(r):\n if isinstance(p, packet_base.PacketBase):\n ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.