source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(self, protocol):
if isinstance(protocol, packet_base.PacketBase):
protocol = protocol.__class__
assert issubclass(protocol, packet_base.PacketBase)
return [p for p in self.protocols if isinstance(p, protocol)]
| get_protocols | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, protocol):\n if isinstance(protocol, packet_base.PacketBase):\n protocol = protocol.__class__\n assert issubclass(protocol, packet_base.Pack... |
def x(self, protocol):
result = self.get_protocols(protocol)
if len(result) > 0:
return result[0]
return None
| get_protocol | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, protocol):\n result = self.get_protocols(protocol)\n if len(result) > 0:\n return result[0]\n return None\n",
"role": "user"
},
{... |
def x(self, dpid, ports):
assert isinstance(ports, list)
assert len(ports) >= 2
ifs = {}
for port in ports:
ifs[port] = {'enabled': False, 'timeout': 0}
bond = {dpid: ifs}
self._bonds.append(bond)
| add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, ports):\n assert isinstance(ports, list)\n assert len(ports) >= 2\n ifs = {}\n for port in ports:\n ifs[port] = {'enabled': Fals... |
def x(self, evt):
req_pkt = packet.Packet(evt.msg.data)
if slow.lacp in req_pkt:
req_lacp, = req_pkt.get_protocols(slow.lacp)
req_eth, = req_pkt.get_protocols(ethernet.ethernet)
self._do_lacp(req_lacp, req_eth.src, evt.msg)
else:
self.send_event_to_observers(EventPacketIn(evt.msg))
| packet_in_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, evt):\n req_pkt = packet.Packet(evt.msg.data)\n if slow.lacp in req_pkt:\n req_lacp, = req_pkt.get_protocols(slow.lacp)\n req_eth, = ... |
def x(self, evt):
msg = evt.msg
datapath = msg.datapath
ofproto = datapath.ofproto
dpid = datapath.id
match = msg.match
if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:
port = match.in_port
dl_type = match.dl_type
else:
port = match['in_port']
dl_type = match['eth_type']
if ether.ETH_TYPE_SLOW != dl_type:
return
self.logger.info('SW=%s PORT=%d LACP exchange timeout has occurred.',
dpid_to_str(dpid), port)
self._set_slave_enabled(dpid, port, False)
self._set_slave_timeout(dpid, port, 0)
self.send_event_to_observers(EventSlaveStateChanged(datapath, port, False))
| flow_removed_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, evt):\n msg = evt.msg\n datapath = msg.datapath\n ofproto = datapath.ofproto\n dpid = datapath.id\n match = msg.match\n if ofproto.OFP_... |
def x(self, req_lacp, src, msg):
datapath = msg.datapath
dpid = datapath.id
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:
port = msg.in_port
else:
port = msg.match['in_port']
self.logger.info('SW=%s PORT=%d LACP received.', dpid_to_str(dpid), port)
self.logger.debug(str(req_lacp))
if not self._get_slave_enabled(dpid, port):
self.logger.info('SW=%s PORT=%d the slave i/f has just been up.',
dpid_to_str(dpid), port)
self._set_slave_enabled(dpid, port, True)
self.send_event_to_observers(EventSlaveStateChanged(datapath, port,
True))
if req_lacp.LACP_STATE_SHORT_TIMEOUT == req_lacp.actor_state_timeout:
idle_timeout = req_lacp.SHORT_TIMEOUT_TIME
else:
idle_timeout = req_lacp.LONG_TIMEOUT_TIME
if idle_timeout != self._get_slave_timeout(dpid, port):
self.logger.info('SW=%s PORT=%d the timeout time has changed.',
dpid_to_str(dpid), port)
self._set_slave_timeout(dpid, port, idle_timeout)
func = self._add_flow.get(ofproto.OFP_VERSION)
assert func
func(src, port, idle_timeout, datapath)
res_pkt = self._create_response(datapath, port, req_lacp)
out_port = ofproto.OFPP_IN_PORT
actions = [parser.OFPActionOutput(out_port)]
out = datapath.ofproto_parser.OFPPacketOut(datapath=datapath, buffer_id
=ofproto.OFP_NO_BUFFER, data=res_pkt.data, in_port=port, actions=
actions)
datapath.send_msg(out)
| do_lacp | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req_lacp, src, msg):\n datapath = msg.datapath\n dpid = datapath.id\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n if o... |
def x(self, datapath, port, req):
src = datapath.ports[port].hw_addr
res_ether = ethernet.ethernet(slow.SLOW_PROTOCOL_MULTICAST, src, ether.
ETH_TYPE_SLOW)
res_lacp = self._create_lacp(datapath, port, req)
res_pkt = packet.Packet()
res_pkt.add_protocol(res_ether)
res_pkt.add_protocol(res_lacp)
res_pkt.serialize()
return res_pkt
| create_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, datapath, port, req):\n src = datapath.ports[port].hw_addr\n res_ether = ethernet.ethernet(slow.SLOW_PROTOCOL_MULTICAST, src, ether.\n ETH_T... |
def x(self, datapath, port, req):
actor_system = datapath.ports[datapath.ofproto.OFPP_LOCAL].hw_addr
res = slow.lacp(actor_system_priority=65535, actor_system=actor_system,
actor_key=req.actor_key, actor_port_priority=255, actor_port=port,
actor_state_activity=req.LACP_STATE_PASSIVE, actor_state_timeout=
req.actor_state_timeout, actor_state_aggregation=req.
actor_state_aggregation, actor_state_synchronization=req.
actor_state_synchronization, actor_state_collecting=req.
actor_state_collecting, actor_state_distributing=req.
actor_state_distributing, actor_state_defaulted=req.
LACP_STATE_OPERATIONAL_PARTNER, actor_state_expired=req.
LACP_STATE_NOT_EXPIRED, partner_system_priority=req.
actor_system_priority, partner_system=req.actor_system, partner_key
=req.actor_key, partner_port_priority=req.actor_port_priority,
partner_port=req.actor_port, partner_state_activity=req.
actor_state_activity, partner_state_timeout=req.actor_state_timeout,
partner_state_aggregation=req.actor_state_aggregation,
partner_state_synchronization=req.actor_state_synchronization,
partner_state_collecting=req.actor_state_collecting,
partner_state_distributing=req.actor_state_distributing,
partner_state_defaulted=req.actor_state_defaulted,
partner_state_expired=req.actor_state_expired, collector_max_delay=0)
self.logger.info('SW=%s PORT=%d LACP sent.', dpid_to_str(datapath.id), port
)
self.logger.debug(str(res))
return res
| create_lacp | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, datapath, port, req):\n actor_system = datapath.ports[datapath.ofproto.OFPP_LOCAL].hw_addr\n res = slow.lacp(actor_system_priority=65535, actor_sys... |
def x(self, dpid, port):
slave = self._get_slave(dpid, port)
if slave:
return slave['enabled']
else:
return False
| get_slave_enabled | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, port):\n slave = self._get_slave(dpid, port)\n if slave:\n return slave['enabled']\n else:\n return False\n",
"role": "u... |
def x(self, dpid, port, enabled):
slave = self._get_slave(dpid, port)
if slave:
slave['enabled'] = enabled
| set_slave_enabled | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, port, enabled):\n slave = self._get_slave(dpid, port)\n if slave:\n slave['enabled'] = enabled\n",
"role": "user"
},
{
"co... |
def x(self, dpid, port):
slave = self._get_slave(dpid, port)
if slave:
return slave['timeout']
else:
return 0
| get_slave_timeout | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, port):\n slave = self._get_slave(dpid, port)\n if slave:\n return slave['timeout']\n else:\n return 0\n",
"role": "user"... |
def x(self, dpid, port, timeout):
slave = self._get_slave(dpid, port)
if slave:
slave['timeout'] = timeout
| set_slave_timeout | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, port, timeout):\n slave = self._get_slave(dpid, port)\n if slave:\n slave['timeout'] = timeout\n",
"role": "user"
},
{
"co... |
def x(self, dpid, port):
result = None
for bond in self._bonds:
if dpid in bond:
if port in bond[dpid]:
result = bond[dpid][port]
break
return result
| get_slave | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, port):\n result = None\n for bond in self._bonds:\n if dpid in bond:\n if port in bond[dpid]:\n result = bon... |
def x(self, src, port, timeout, datapath):
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
match = parser.OFPMatch(in_port=port, dl_src=addrconv.mac.text_to_bin(
src), dl_type=ether.ETH_TYPE_SLOW)
actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER, 65535)]
mod = parser.OFPFlowMod(datapath=datapath, match=match, cookie=0,
command=ofproto.OFPFC_ADD, idle_timeout=timeout, priority=65535,
flags=ofproto.OFPFF_SEND_FLOW_REM, actions=actions)
datapath.send_msg(mod)
| add_flow_v1_0 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, src, port, timeout, datapath):\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n match = parser.OFPMatch(in_port=port, dl_src=ad... |
def x(self, src, port, timeout, datapath):
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
match = parser.OFPMatch(in_port=port, eth_src=src, eth_type=ether.
ETH_TYPE_SLOW)
actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER, ofproto.
OFPCML_MAX)]
inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS, actions)]
mod = parser.OFPFlowMod(datapath=datapath, command=ofproto.OFPFC_ADD,
idle_timeout=timeout, priority=65535, flags=ofproto.
OFPFF_SEND_FLOW_REM, match=match, instructions=inst)
datapath.send_msg(mod)
| add_flow_v1_2 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, src, port, timeout, datapath):\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n match = parser.OFPMatch(in_port=port, eth_src=s... |
def x(session, destination, device, **kwargs):
intf = interface.ip_link_show(session, ifname=device)
if not intf:
LOG.debug('Interface "%s" does not exist', device)
return None
return session.query(Route).filter_by(destination=destination, ifindex=
intf.ifindex, **kwargs).first()
| ip_route_show | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(session, destination, device, **kwargs):\n intf = interface.ip_link_show(session, ifname=device)\n if not intf:\n LOG.debug('Interface \"%s\" does... |
def x(session, destination, device=None, gateway='', source='', ifindex=0,
route_type=zebra.ZEBRA_ROUTE_KERNEL, is_selected=True):
if device:
intf = interface.ip_link_show(session, ifname=device)
if not intf:
LOG.debug('Interface "%s" does not exist', device)
return None
ifindex = ifindex or intf.ifindex
route = ip_route_show(session, destination=destination, device=device)
if route:
LOG.debug('Route to "%s" already exists on "%s" device',
destination, device)
return route
dest_addr, dest_prefix_num = destination.split('/')
dest_prefix_num = int(dest_prefix_num)
if ip.valid_ipv4(dest_addr) and 0 <= dest_prefix_num <= 32:
family = socket.AF_INET
elif ip.valid_ipv6(dest_addr) and 0 <= dest_prefix_num <= 128:
family = socket.AF_INET6
else:
LOG.debug('Invalid IP address for "prefix": %s', destination)
return None
safi = packet_safi.UNICAST
if is_selected:
old_routes = ip_route_show_all(session, destination=destination,
is_selected=True)
for old_route in old_routes:
if old_route:
LOG.debug('Set existing route to unselected: %s', old_route)
old_route.is_selected = False
new_route = Route(family=family, safi=safi, destination=destination,
gateway=gateway, ifindex=ifindex, source=source, route_type=
route_type, is_selected=is_selected)
session.add(new_route)
return new_route
| ip_route_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(session, destination, device=None, gateway='', source='', ifindex=0,\n route_type=zebra.ZEBRA_ROUTE_KERNEL, is_selected=True):\n if device:\n intf... |
def x(session, destination, **kwargs):
routes = ip_route_show_all(session, destination=destination, **kwargs)
for route in routes:
session.delete(route)
return routes
| ip_route_delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(session, destination, **kwargs):\n routes = ip_route_show_all(session, destination=destination, **kwargs)\n for route in routes:\n session.delete(... |
def x(config):
metadata = config['metadata']
if sys.platform == 'win32':
requires = metadata.get('requires_dist', '').split('\n')
metadata['requires_dist'] = '\n'.join(requires)
config['metadata'] = metadata
metadata['version'] = str(version)
from pbr import packaging
def x(*args, **kwargs):
return _main_module()._orig_get_script_args(*args, **kwargs)
packaging.override_get_script_args = my_get_script_args
easy_install.get_script_args = my_get_script_args
orig_get_version = packaging.get_version
def x(package_name, pre_version=None):
if package_name == 'ryu':
return str(version)
return orig_get_version(package_name, pre_version)
packaging.get_version = my_get_version
| setup_hook | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(config):\n metadata = config['metadata']\n if sys.platform == 'win32':\n requires = metadata.get('requires_dist', '').split('\\n')\n metada... |
def x(path1, path2):
if path1.source == path2.source:
if path1.source_version_num > path2.source_version_num:
return path1
else:
return path2
return None
| compare_by_version | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n if path1.source == path2.source:\n if path1.source_version_num > path2.source_version_num:\n return path1\n else:\... |
def x(local_asn, path1, path2):
best_path = None
best_path_reason = BPR_UNKNOWN
if best_path is None:
best_path = _cmp_by_reachable_nh(path1, path2)
best_path_reason = BPR_REACHABLE_NEXT_HOP
if best_path is None:
best_path = _cmp_by_highest_wg(path1, path2)
best_path_reason = BPR_HIGHEST_WEIGHT
if best_path is None:
best_path = _cmp_by_local_pref(path1, path2)
best_path_reason = BPR_LOCAL_PREF
if best_path is None:
best_path = _cmp_by_local_origin(path1, path2)
best_path_reason = BPR_LOCAL_ORIGIN
if best_path is None:
best_path = _cmp_by_aspath(path1, path2)
best_path_reason = BPR_ASPATH
if best_path is None:
best_path = _cmp_by_origin(path1, path2)
best_path_reason = BPR_ORIGIN
if best_path is None:
best_path = _cmp_by_med(path1, path2)
best_path_reason = BPR_MED
if best_path is None:
best_path = _cmp_by_asn(local_asn, path1, path2)
best_path_reason = BPR_ASN
if best_path is None:
best_path = _cmp_by_igp_cost(path1, path2)
best_path_reason = BPR_IGP_COST
if best_path is None:
best_path = _cmp_by_router_id(local_asn, path1, path2)
best_path_reason = BPR_ROUTER_ID
if best_path is None:
best_path = _cmp_by_cluster_list(path1, path2)
best_path_reason = BPR_CLUSTER_LIST
if best_path is None:
best_path_reason = BPR_UNKNOWN
return best_path, best_path_reason
| compute_best_path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(local_asn, path1, path2):\n best_path = None\n best_path_reason = BPR_UNKNOWN\n if best_path is None:\n best_path = _cmp_by_reachable_nh(path1,... |
def x(path1, path2):
lp1 = path1.get_pattr(BGP_ATTR_TYPE_LOCAL_PREF)
lp2 = path2.get_pattr(BGP_ATTR_TYPE_LOCAL_PREF)
if not (lp1 and lp2):
return None
lp1 = lp1.value
lp2 = lp2.value
if lp1 > lp2:
return path1
elif lp2 > lp1:
return path2
else:
return None
| cmp_by_local_pref | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n lp1 = path1.get_pattr(BGP_ATTR_TYPE_LOCAL_PREF)\n lp2 = path2.get_pattr(BGP_ATTR_TYPE_LOCAL_PREF)\n if not (lp1 and lp2):\n re... |
def x(path1, path2):
if path1.source == path2.source:
return None
if path1.source is None:
return path1
if path2.source is None:
return path2
return None
| cmp_by_local_origin | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n if path1.source == path2.source:\n return None\n if path1.source is None:\n return path1\n if path2.source is None:\n ... |
def x(path1, path2):
as_path1 = path1.get_pattr(BGP_ATTR_TYPE_AS_PATH)
as_path2 = path2.get_pattr(BGP_ATTR_TYPE_AS_PATH)
assert as_path1 and as_path2
l1 = as_path1.get_as_path_len()
l2 = as_path2.get_as_path_len()
assert l1 is not None and l2 is not None
if l1 > l2:
return path2
elif l2 > l1:
return path1
else:
return None
| cmp_by_aspath | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n as_path1 = path1.get_pattr(BGP_ATTR_TYPE_AS_PATH)\n as_path2 = path2.get_pattr(BGP_ATTR_TYPE_AS_PATH)\n assert as_path1 and as_path2\... |
def x(path1, path2):
def x(origin):
if origin.value == BGP_ATTR_ORIGIN_IGP:
return 3
elif origin.value == BGP_ATTR_ORIGIN_EGP:
return 2
elif origin.value == BGP_ATTR_ORIGIN_INCOMPLETE:
return 1
else:
LOG.error('Invalid origin value encountered %s.', origin)
return 0
origin1 = path1.get_pattr(BGP_ATTR_TYPE_ORIGIN)
origin2 = path2.get_pattr(BGP_ATTR_TYPE_ORIGIN)
assert origin1 is not None and origin2 is not None
if origin1.value == origin2.value:
return None
origin1 = get_origin_pref(origin1)
origin2 = get_origin_pref(origin2)
if origin1 == origin2:
return None
elif origin1 > origin2:
return path1
return path2
| cmp_by_origin | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n\n def x(origin):\n if origin.value == BGP_ATTR_ORIGIN_IGP:\n return 3\n elif origin.value == BGP_ATTR_ORIGIN_EGP:\... |
def x(path1, path2):
def x(path):
med = path.get_pattr(BGP_ATTR_TYPE_MULTI_EXIT_DISC)
if not med:
return 0
return med.value
med1 = get_path_med(path1)
med2 = get_path_med(path2)
if med1 == med2:
return None
elif med1 < med2:
return path1
return path2
| cmp_by_med | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n\n def x(path):\n med = path.get_pattr(BGP_ATTR_TYPE_MULTI_EXIT_DISC)\n if not med:\n return 0\n return med.... |
def x(local_asn, path1, path2):
def x(path):
asn = None
if path.source is None:
asn = local_asn
else:
asn = path.source.remote_as
return asn
p1_asn = get_path_source_asn(path1)
p2_asn = get_path_source_asn(path2)
if p1_asn == local_asn and p2_asn != local_asn:
return path2
if p2_asn == local_asn and p1_asn != local_asn:
return path1
return None
| cmp_by_asn | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(local_asn, path1, path2):\n\n def x(path):\n asn = None\n if path.source is None:\n asn = local_asn\n else:\n asn... |
def x(local_asn, path1, path2):
def x(path_source):
if path_source is None:
return local_asn
else:
return path_source.remote_as
def x(path, local_bgp_id):
path_source = path.source
if path_source is None:
return local_bgp_id
else:
originator_id = path.get_pattr(BGP_ATTR_TYPE_ORIGINATOR_ID)
if originator_id:
return originator_id.value
return path_source.protocol.recv_open_msg.bgp_identifier
path_source1 = path1.source
path_source2 = path2.source
if path_source1 is None and path_source2 is None:
return None
asn1 = get_asn(path_source1)
asn2 = get_asn(path_source2)
is_ebgp1 = asn1 != local_asn
is_ebgp2 = asn2 != local_asn
if is_ebgp1 and is_ebgp2:
return None
if (is_ebgp1 is True and is_ebgp2 is False or is_ebgp1 is False and
is_ebgp2 is True):
raise ValueError(
'This method does not support comparing ebgp with ibgp path')
if path_source1 is not None:
local_bgp_id = path_source1.protocol.sent_open_msg.bgp_identifier
else:
local_bgp_id = path_source2.protocol.sent_open_msg.bgp_identifier
router_id1 = get_router_id(path1, local_bgp_id)
router_id2 = get_router_id(path2, local_bgp_id)
if router_id1 == router_id2:
return None
from ryu.services.protocols.bgp.utils.bgp import from_inet_ptoi
if from_inet_ptoi(router_id1) < from_inet_ptoi(router_id2):
return path1
else:
return path2
| cmp_by_router_id | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(local_asn, path1, path2):\n\n def x(path_source):\n if path_source is None:\n return local_asn\n else:\n return path_sou... |
def x(path1, path2):
def x(path):
c_list = path.get_pattr(BGP_ATTR_TYPE_CLUSTER_LIST)
if c_list is None:
return 0
else:
return len(c_list.value)
c_list_len1 = _get_cluster_list_len(path1)
c_list_len2 = _get_cluster_list_len(path2)
if c_list_len1 < c_list_len2:
return path1
elif c_list_len1 > c_list_len2:
return path2
else:
return None
| cmp_by_cluster_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path1, path2):\n\n def x(path):\n c_list = path.get_pattr(BGP_ATTR_TYPE_CLUSTER_LIST)\n if c_list is None:\n return 0\n else... |
def x(self, destination):
if not destination:
raise BgpProcessorError('Invalid destination %s.' % destination)
dest_queue = self._dest_queue
if destination.route_family == RF_RTC_UC:
dest_queue = self._rtdest_queue
if not dest_queue.is_on_list(destination):
dest_queue.append(destination)
self.dest_que_evt.set()
| enqueue | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, destination):\n if not destination:\n raise BgpProcessorError('Invalid destination %s.' % destination)\n dest_queue = self._dest_queue\n ... |
def x(stats_resource=None, stats_source=None, log_level=DEFAULT_LOG_LEVEL,
**kwargs):
if stats_source is not None:
kwargs = stats_source()
if stats_resource is None:
if RESOURCE_ID not in kwargs or RESOURCE_NAME not in kwargs:
raise ValueError('Missing required stats labels.')
else:
if not (hasattr(stats_resource, ConfWithId.ID) and hasattr(
stats_resource, ConfWithId.NAME)):
raise ValueError(
'Given stats source is missing id or name attributes.')
kwargs[RESOURCE_ID] = stats_resource.id
kwargs[RESOURCE_NAME] = stats_resource.name
if TIMESTAMP not in kwargs:
kwargs[TIMESTAMP] = datetime.datetime.utcfromtimestamp(time.time()
).strftime('%Y-%m-%dT%H:%M:%S.%fZ')
_STATS_LOGGER.log(log_level, json.dumps(kwargs))
| log | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(stats_resource=None, stats_source=None, log_level=DEFAULT_LOG_LEVEL,\n **kwargs):\n if stats_source is not None:\n kwargs = stats_source()\n if... |
def x(self, address, remote_as, remote_port=DEFAULT_BGP_PORT, enable_ipv4=
DEFAULT_CAP_MBGP_IPV4, enable_ipv6=DEFAULT_CAP_MBGP_IPV6, enable_vpnv4=
DEFAULT_CAP_MBGP_VPNV4, enable_vpnv6=DEFAULT_CAP_MBGP_VPNV6,
enable_evpn=DEFAULT_CAP_MBGP_EVPN, enable_ipv4fs=
DEFAULT_CAP_MBGP_IPV4FS, enable_ipv6fs=DEFAULT_CAP_MBGP_IPV6FS,
enable_vpnv4fs=DEFAULT_CAP_MBGP_VPNV4FS, enable_vpnv6fs=
DEFAULT_CAP_MBGP_VPNV6FS, enable_l2vpnfs=DEFAULT_CAP_MBGP_L2VPNFS,
enable_enhanced_refresh=DEFAULT_CAP_ENHANCED_REFRESH,
enable_four_octet_as_number=DEFAULT_CAP_FOUR_OCTET_AS_NUMBER, next_hop=
None, password=None, multi_exit_disc=None, site_of_origins=None,
is_route_server_client=DEFAULT_IS_ROUTE_SERVER_CLIENT,
is_route_reflector_client=DEFAULT_IS_ROUTE_REFLECTOR_CLIENT,
is_next_hop_self=DEFAULT_IS_NEXT_HOP_SELF, local_address=None,
local_port=None, local_as=None, connect_mode=DEFAULT_CONNECT_MODE):
bgp_neighbor = {neighbors.IP_ADDRESS: address, neighbors.REMOTE_AS:
remote_as, REMOTE_PORT: remote_port, PEER_NEXT_HOP: next_hop,
PASSWORD: password, IS_ROUTE_SERVER_CLIENT: is_route_server_client,
IS_ROUTE_REFLECTOR_CLIENT: is_route_reflector_client,
IS_NEXT_HOP_SELF: is_next_hop_self, CONNECT_MODE: connect_mode,
CAP_ENHANCED_REFRESH: enable_enhanced_refresh,
CAP_FOUR_OCTET_AS_NUMBER: enable_four_octet_as_number,
CAP_MBGP_IPV4: enable_ipv4, CAP_MBGP_IPV6: enable_ipv6,
CAP_MBGP_VPNV4: enable_vpnv4, CAP_MBGP_VPNV6: enable_vpnv6,
CAP_MBGP_EVPN: enable_evpn, CAP_MBGP_IPV4FS: enable_ipv4fs,
CAP_MBGP_IPV6FS: enable_ipv6fs, CAP_MBGP_VPNV4FS: enable_vpnv4fs,
CAP_MBGP_VPNV6FS: enable_vpnv6fs, CAP_MBGP_L2VPNFS: enable_l2vpnfs}
if multi_exit_disc:
bgp_neighbor[MULTI_EXIT_DISC] = multi_exit_disc
if site_of_origins:
bgp_neighbor[SITE_OF_ORIGINS] = site_of_origins
if local_address:
bgp_neighbor[LOCAL_ADDRESS] = local_address
if local_port:
bgp_neighbor[LOCAL_PORT] = local_port
if local_as:
bgp_neighbor[LOCAL_AS] = local_as
call('neighbor.create', **bgp_neighbor)
| neighbor_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address, remote_as, remote_port=DEFAULT_BGP_PORT, enable_ipv4=\n DEFAULT_CAP_MBGP_IPV4, enable_ipv6=DEFAULT_CAP_MBGP_IPV6, enable_vpnv4=\n DEFAULT_... |
def x(self, address, conf_type, conf_value):
assert conf_type == MULTI_EXIT_DISC or conf_type == CONNECT_MODE
func_name = 'neighbor.update'
attribute_param = {}
if conf_type == MULTI_EXIT_DISC:
attribute_param = {neighbors.MULTI_EXIT_DISC: conf_value}
elif conf_type == CONNECT_MODE:
attribute_param = {neighbors.CONNECT_MODE: conf_value}
param = {neighbors.IP_ADDRESS: address, neighbors.CHANGES: attribute_param}
call(func_name, **param)
| neighbor_update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address, conf_type, conf_value):\n assert conf_type == MULTI_EXIT_DISC or conf_type == CONNECT_MODE\n func_name = 'neighbor.update'\n attribute_... |
def x(self, address=None, format='json'):
show = {'params': ['neighbor', 'summary'], 'format': format}
if address:
show['params'].append(address)
return call('operator.show', **show)
| neighbor_state_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address=None, format='json'):\n show = {'params': ['neighbor', 'summary'], 'format': format}\n if address:\n show['params'].append(address)\... |
def x(self, prefix, next_hop=None, route_dist=None):
func_name = 'network.add'
networks = {PREFIX: prefix}
if next_hop:
networks[NEXT_HOP] = next_hop
if route_dist:
func_name = 'prefix.add_local'
networks[ROUTE_DISTINGUISHER] = route_dist
rf, p = self._check_rf_and_normalize(prefix)
networks[ROUTE_FAMILY] = rf
networks[PREFIX] = p
if rf == vrfs.VRF_RF_IPV6 and ip.valid_ipv4(next_hop):
networks[NEXT_HOP] = str(netaddr.IPAddress(next_hop).ipv6())
return call(func_name, **networks)
| prefix_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, prefix, next_hop=None, route_dist=None):\n func_name = 'network.add'\n networks = {PREFIX: prefix}\n if next_hop:\n networks[NEXT_HOP] = ... |
def x(self, prefix, route_dist=None):
func_name = 'network.del'
networks = {PREFIX: prefix}
if route_dist:
func_name = 'prefix.delete_local'
networks[ROUTE_DISTINGUISHER] = route_dist
rf, p = self._check_rf_and_normalize(prefix)
networks[ROUTE_FAMILY] = rf
networks[PREFIX] = p
call(func_name, **networks)
| prefix_del | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, prefix, route_dist=None):\n func_name = 'network.del'\n networks = {PREFIX: prefix}\n if route_dist:\n func_name = 'prefix.delete_local'\... |
def x(self, route_type, route_dist, esi=0, ethernet_tag_id=None, mac_addr=
None, ip_addr=None, ip_prefix=None, gw_ip_addr=None, vni=None, next_hop
=None, tunnel_type=None, pmsi_tunnel_type=None, redundancy_mode=None):
func_name = 'evpn_prefix.add_local'
if not next_hop:
next_hop = '0.0.0.0'
kwargs = {EVPN_ROUTE_TYPE: route_type, ROUTE_DISTINGUISHER: route_dist,
NEXT_HOP: next_hop}
if tunnel_type in [TUNNEL_TYPE_VXLAN, TUNNEL_TYPE_NVGRE]:
kwargs[TUNNEL_TYPE] = tunnel_type
elif tunnel_type is not None:
raise ValueError('Unsupported tunnel type: %s' % tunnel_type)
if route_type == EVPN_ETH_AUTO_DISCOVERY:
kwargs.update({EVPN_ESI: esi, EVPN_ETHERNET_TAG_ID: ethernet_tag_id})
if vni is not None:
kwargs[EVPN_VNI] = vni
if redundancy_mode in [REDUNDANCY_MODE_ALL_ACTIVE,
REDUNDANCY_MODE_SINGLE_ACTIVE]:
kwargs[REDUNDANCY_MODE] = redundancy_mode
elif redundancy_mode is not None:
raise ValueError('Unsupported Redundancy Mode: %s' %
redundancy_mode)
elif route_type == EVPN_MAC_IP_ADV_ROUTE:
kwargs.update({EVPN_ESI: esi, EVPN_ETHERNET_TAG_ID: ethernet_tag_id,
MAC_ADDR: mac_addr, IP_ADDR: ip_addr})
if tunnel_type in [TUNNEL_TYPE_VXLAN, TUNNEL_TYPE_NVGRE]:
kwargs[EVPN_VNI] = vni
elif route_type == EVPN_MULTICAST_ETAG_ROUTE:
kwargs.update({EVPN_ETHERNET_TAG_ID: ethernet_tag_id, IP_ADDR: ip_addr}
)
if tunnel_type in [TUNNEL_TYPE_VXLAN, TUNNEL_TYPE_NVGRE]:
kwargs[EVPN_VNI] = vni
if pmsi_tunnel_type in [PMSI_TYPE_NO_TUNNEL_INFO, PMSI_TYPE_INGRESS_REP
]:
kwargs[PMSI_TUNNEL_TYPE] = pmsi_tunnel_type
elif pmsi_tunnel_type is not None:
raise ValueError('Unsupported PMSI tunnel type: %s' %
pmsi_tunnel_type)
elif route_type == EVPN_ETH_SEGMENT:
kwargs.update({EVPN_ESI: esi, IP_ADDR: ip_addr})
elif route_type == EVPN_IP_PREFIX_ROUTE:
kwargs.update({EVPN_ESI: esi, EVPN_ETHERNET_TAG_ID: ethernet_tag_id,
IP_PREFIX: ip_prefix, GW_IP_ADDR: gw_ip_addr})
if tunnel_type in [TUNNEL_TYPE_VXLAN, TUNNEL_TYPE_NVGRE]:
kwargs[EVPN_VNI] = vni
else:
raise ValueError('Unsupported EVPN route type: %s' % route_type)
call(func_name, **kwargs)
| evpn_prefix_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_type, route_dist, esi=0, ethernet_tag_id=None, mac_addr=\n None, ip_addr=None, ip_prefix=None, gw_ip_addr=None, vni=None, next_hop\n =None, t... |
def x(self, route_type, route_dist, esi=0, ethernet_tag_id=None, mac_addr=
None, ip_addr=None, ip_prefix=None):
func_name = 'evpn_prefix.delete_local'
kwargs = {EVPN_ROUTE_TYPE: route_type, ROUTE_DISTINGUISHER: route_dist}
if route_type == EVPN_ETH_AUTO_DISCOVERY:
kwargs.update({EVPN_ESI: esi, EVPN_ETHERNET_TAG_ID: ethernet_tag_id})
elif route_type == EVPN_MAC_IP_ADV_ROUTE:
kwargs.update({EVPN_ETHERNET_TAG_ID: ethernet_tag_id, MAC_ADDR:
mac_addr, IP_ADDR: ip_addr})
elif route_type == EVPN_MULTICAST_ETAG_ROUTE:
kwargs.update({EVPN_ETHERNET_TAG_ID: ethernet_tag_id, IP_ADDR: ip_addr}
)
elif route_type == EVPN_ETH_SEGMENT:
kwargs.update({EVPN_ESI: esi, IP_ADDR: ip_addr})
elif route_type == EVPN_IP_PREFIX_ROUTE:
kwargs.update({EVPN_ETHERNET_TAG_ID: ethernet_tag_id, IP_PREFIX:
ip_prefix})
else:
raise ValueError('Unsupported EVPN route type: %s' % route_type)
call(func_name, **kwargs)
| evpn_prefix_del | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_type, route_dist, esi=0, ethernet_tag_id=None, mac_addr=\n None, ip_addr=None, ip_prefix=None):\n func_name = 'evpn_prefix.delete_local'\n ... |
def x(self, flowspec_family, rules, route_dist=None, actions=None):
func_name = 'flowspec.add'
kwargs = {FLOWSPEC_FAMILY: flowspec_family, FLOWSPEC_RULES: rules,
FLOWSPEC_ACTIONS: actions or {}}
if flowspec_family in [FLOWSPEC_FAMILY_VPNV4, FLOWSPEC_FAMILY_VPNV6,
FLOWSPEC_FAMILY_L2VPN]:
func_name = 'flowspec.add_local'
kwargs.update({ROUTE_DISTINGUISHER: route_dist})
call(func_name, **kwargs)
| flowspec_prefix_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, flowspec_family, rules, route_dist=None, actions=None):\n func_name = 'flowspec.add'\n kwargs = {FLOWSPEC_FAMILY: flowspec_family, FLOWSPEC_RULES: ... |
def x(self, flowspec_family, rules, route_dist=None):
func_name = 'flowspec.del'
kwargs = {FLOWSPEC_FAMILY: flowspec_family, FLOWSPEC_RULES: rules}
if flowspec_family in [FLOWSPEC_FAMILY_VPNV4, FLOWSPEC_FAMILY_VPNV6,
FLOWSPEC_FAMILY_L2VPN]:
func_name = 'flowspec.del_local'
kwargs.update({ROUTE_DISTINGUISHER: route_dist})
call(func_name, **kwargs)
| flowspec_prefix_del | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, flowspec_family, rules, route_dist=None):\n func_name = 'flowspec.del'\n kwargs = {FLOWSPEC_FAMILY: flowspec_family, FLOWSPEC_RULES: rules}\n if... |
def x(self, route_dist, import_rts, export_rts, site_of_origins=None,
route_family=RF_VPN_V4, multi_exit_disc=None):
if route_family not in SUPPORTED_VRF_RF:
raise ValueError('Unsupported route_family: %s' % route_family)
vrf = {vrfs.ROUTE_DISTINGUISHER: route_dist, vrfs.IMPORT_RTS:
import_rts, vrfs.EXPORT_RTS: export_rts, vrfs.SITE_OF_ORIGINS:
site_of_origins, vrfs.VRF_RF: route_family, vrfs.MULTI_EXIT_DISC:
multi_exit_disc}
call('vrf.create', **vrf)
| vrf_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_dist, import_rts, export_rts, site_of_origins=None,\n route_family=RF_VPN_V4, multi_exit_disc=None):\n if route_family not in SUPPORTED_VRF_R... |
def x(self, subcommand='routes', route_dist=None, route_family='all',
format='json'):
show = {'format': format}
if route_family in SUPPORTED_VRF_RF:
assert route_dist is not None
show['params'] = ['vrf', subcommand, route_dist, route_family]
else:
show['params'] = ['vrf', subcommand, 'all']
return call('operator.show', **show)
| vrfs_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, subcommand='routes', route_dist=None, route_family='all',\n format='json'):\n show = {'format': format}\n if route_family in SUPPORTED_VRF_RF:\n... |
def x(self, route_type, address, format='json'):
show = {'format': format}
if route_type == 'sent-routes' or route_type == 'received-routes':
show['params'] = ['neighbor', route_type, address, 'all']
else:
show['params'] = ['neighbor', 'received-routes', address, 'all']
return call('operator.show', **show)
| neighbor_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_type, address, format='json'):\n show = {'format': format}\n if route_type == 'sent-routes' or route_type == 'received-routes':\n show... |
def x(self, address):
func_name = 'neighbor.out_filter.get'
param = {neighbors.IP_ADDRESS: address}
return call(func_name, **param)
| out_filter_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address):\n func_name = 'neighbor.out_filter.get'\n param = {neighbors.IP_ADDRESS: address}\n return call(func_name, **param)\n",
"role": "u... |
def x(self, address):
func_name = 'neighbor.in_filter.get'
param = {neighbors.IP_ADDRESS: address}
return call(func_name, **param)
| in_filter_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address):\n func_name = 'neighbor.in_filter.get'\n param = {neighbors.IP_ADDRESS: address}\n return call(func_name, **param)\n",
"role": "us... |
def x(self, address, port):
func_name = 'bmp.start'
param = {'host': address, 'port': port}
call(func_name, **param)
| bmp_server_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address, port):\n func_name = 'bmp.start'\n param = {'host': address, 'port': port}\n call(func_name, **param)\n",
"role": "user"
},
{
... |
def x(self, address, port):
func_name = 'bmp.stop'
param = {'host': address, 'port': port}
call(func_name, **param)
| bmp_server_del | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address, port):\n func_name = 'bmp.stop'\n param = {'host': address, 'port': port}\n call(func_name, **param)\n",
"role": "user"
},
{
... |
def x(self, address, attribute_maps, route_dist=None, route_family=RF_VPN_V4):
if route_family not in SUPPORTED_VRF_RF:
raise ValueError('Unsupported route_family: %s' % route_family)
func_name = 'neighbor.attribute_map.set'
param = {neighbors.IP_ADDRESS: address, neighbors.ATTRIBUTE_MAP:
attribute_maps}
if route_dist is not None:
param[vrfs.ROUTE_DISTINGUISHER] = route_dist
param[vrfs.VRF_RF] = route_family
call(func_name, **param)
| attribute_map_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address, attribute_maps, route_dist=None, route_family=RF_VPN_V4):\n if route_family not in SUPPORTED_VRF_RF:\n raise ValueError('Unsupported r... |
def x(self, address, route_dist=None, route_family=RF_VPN_V4):
if route_family not in SUPPORTED_VRF_RF:
raise ValueError('Unsupported route_family: %s' % route_family)
func_name = 'neighbor.attribute_map.get'
param = {neighbors.IP_ADDRESS: address}
if route_dist is not None:
param[vrfs.ROUTE_DISTINGUISHER] = route_dist
param[vrfs.VRF_RF] = route_family
return call(func_name, **param)
| attribute_map_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address, route_dist=None, route_family=RF_VPN_V4):\n if route_family not in SUPPORTED_VRF_RF:\n raise ValueError('Unsupported route_family: %s'... |
def x(prefix):
addr, masklen = prefix.split('/')
if ip.valid_ipv6(addr):
ipv6_prefix = str(netaddr.IPAddress(addr)) + '/' + masklen
return vrfs.VRF_RF_IPV6, ipv6_prefix
else:
return vrfs.VRF_RF_IPV4, prefix
| check_rf_and_normalize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(prefix):\n addr, masklen = prefix.split('/')\n if ip.valid_ipv6(addr):\n ipv6_prefix = str(netaddr.IPAddress(addr)) + '/' + masklen\n retur... |
def x(self, dst_mac, dst_ip):
self.dst_mac = dst_mac
self.dst_ip = dst_ip
if not (dst_mac == 'FF:FF:FF:FF:FF:FF' or dst_ip == '255.255.255.255'):
self._remote_addr_config = True
LOG.info('[BFD][%s][REMOTE] Remote address configured: %s, %s.', hex(
self._local_discr), self.dst_ip, self.dst_mac)
| set_remote_addr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dst_mac, dst_ip):\n self.dst_mac = dst_mac\n self.dst_ip = dst_ip\n if not (dst_mac == 'FF:FF:FF:FF:FF:FF' or dst_ip == '255.255.255.255'):\n ... |
def x(self, bfd_pkt):
LOG.debug('[BFD][%s][RECV] BFD Control received: %s', hex(self.
_local_discr), six.binary_type(bfd_pkt))
self._remote_discr = bfd_pkt.my_discr
self._remote_state = bfd_pkt.state
self._remote_demand_mode = bfd_pkt.flags & bfd.BFD_FLAG_DEMAND
if self._remote_min_rx_interval != bfd_pkt.required_min_rx_interval:
self._remote_min_rx_interval = bfd_pkt.required_min_rx_interval
self._update_xmit_period()
if bfd_pkt.flags & bfd.BFD_FLAG_FINAL and self._is_polling:
self._is_polling = False
if self._session_state == bfd.BFD_STATE_ADMIN_DOWN:
return
if bfd_pkt.state == bfd.BFD_STATE_ADMIN_DOWN:
if self._session_state != bfd.BFD_STATE_DOWN:
self._set_state(bfd.BFD_STATE_DOWN, bfd.BFD_DIAG_NEIG_SIG_SESS_DOWN
)
elif self._session_state == bfd.BFD_STATE_DOWN:
if bfd_pkt.state == bfd.BFD_STATE_DOWN:
self._set_state(bfd.BFD_STATE_INIT)
elif bfd_pkt.state == bfd.BFD_STATE_INIT:
self._set_state(bfd.BFD_STATE_UP)
elif self._session_state == bfd.BFD_STATE_INIT:
if bfd_pkt.state in [bfd.BFD_STATE_INIT, bfd.BFD_STATE_UP]:
self._set_state(bfd.BFD_STATE_UP)
elif bfd_pkt.state == bfd.BFD_STATE_DOWN:
self._set_state(bfd.BFD_STATE_DOWN, bfd.BFD_DIAG_NEIG_SIG_SESS_DOWN)
if (self._remote_demand_mode and self._session_state == bfd.
BFD_STATE_UP and self._remote_session_state == bfd.BFD_STATE_UP):
self._enable_send = False
if (not self._remote_demand_mode or self._session_state != bfd.
BFD_STATE_UP or self._remote_session_state != bfd.BFD_STATE_UP):
if not self._enable_send:
self._enable_send = True
hub.spawn(self._send_loop)
if self._detect_time == 0:
self._detect_time = (bfd_pkt.desired_min_tx_interval * bfd_pkt.
detect_mult / 1000000.0)
hub.spawn(self._recv_timeout_loop)
if bfd_pkt.flags & bfd.BFD_FLAG_POLL:
self._pending_final = True
self._detect_time = (bfd_pkt.desired_min_tx_interval * bfd_pkt.
detect_mult / 1000000.0)
if self._auth_type in [bfd.BFD_AUTH_KEYED_MD5, bfd.
BFD_AUTH_METICULOUS_KEYED_MD5, bfd.BFD_AUTH_KEYED_SHA1, bfd.
BFD_AUTH_METICULOUS_KEYED_SHA1]:
self._rcv_auth_seq = bfd_pkt.auth_cls.seq
self._auth_seq_known = 1
if self._lock is not None:
self._lock.set()
| recv | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, bfd_pkt):\n LOG.debug('[BFD][%s][RECV] BFD Control received: %s', hex(self.\n _local_discr), six.binary_type(bfd_pkt))\n self._remote_discr ... |
def x(self, new_state, diag=None):
old_state = self._session_state
LOG.info('[BFD][%s][STATE] State changed from %s to %s.', hex(self.
_local_discr), bfd.BFD_STATE_NAME[old_state], bfd.BFD_STATE_NAME[
new_state])
self._session_state = new_state
if new_state == bfd.BFD_STATE_DOWN:
if diag is not None:
self._local_diag = diag
self._desired_min_tx_interval = 1000000
self._is_polling = True
self._update_xmit_period()
elif new_state == bfd.BFD_STATE_UP:
self._desired_min_tx_interval = self._cfg_desired_min_tx_interval
self._is_polling = True
self._update_xmit_period()
self.app.send_event_to_observers(EventBFDSessionStateChanged(self,
old_state, new_state))
| set_state | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_state, diag=None):\n old_state = self._session_state\n LOG.info('[BFD][%s][STATE] State changed from %s to %s.', hex(self.\n _local_disc... |
def x(self):
while self._detect_time:
last_wait = time.time()
self._lock = hub.Event()
self._lock.wait(timeout=self._detect_time)
if self._lock.is_set():
if getattr(self, '_auth_seq_known', 0):
if last_wait > time.time() + 2 * self._detect_time:
self._auth_seq_known = 0
else:
LOG.info('[BFD][%s][RECV] BFD Session timed out.', hex(self.
_local_discr))
if self._session_state not in [bfd.BFD_STATE_DOWN, bfd.
BFD_STATE_ADMIN_DOWN]:
self._set_state(bfd.BFD_STATE_DOWN, bfd.
BFD_DIAG_CTRL_DETECT_TIME_EXPIRED)
if getattr(self, '_auth_seq_known', 0):
self._auth_seq_known = 0
| recv_timeout_loop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n while self._detect_time:\n last_wait = time.time()\n self._lock = hub.Event()\n self._lock.wait(timeout=self._detect_time)\n ... |
def x(self):
if self._desired_min_tx_interval > self._remote_min_rx_interval:
xmit_period = self._desired_min_tx_interval
else:
xmit_period = self._remote_min_rx_interval
if self._detect_mult == 1:
xmit_period *= random.randint(75, 90) / 100.0
else:
xmit_period *= random.randint(75, 100) / 100.0
self._xmit_period = xmit_period / 1000000.0
LOG.info('[BFD][%s][XMIT] Transmission period changed to %f', hex(self.
_local_discr), self._xmit_period)
| update_xmit_period | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._desired_min_tx_interval > self._remote_min_rx_interval:\n xmit_period = self._desired_min_tx_interval\n else:\n xmit_peri... |
def x(self):
while self._enable_send:
hub.sleep(self._xmit_period)
if self._remote_discr == 0 and not self._active_role:
continue
if self._remote_min_rx_interval == 0:
continue
if (self._remote_demand_mode and self._session_state == bfd.
BFD_STATE_UP and self._remote_session_state == bfd.BFD_STATE_UP and
not self._is_polling):
continue
self._send()
| send_loop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n while self._enable_send:\n hub.sleep(self._xmit_period)\n if self._remote_discr == 0 and not self._active_role:\n continue... |
def x(self):
if self.datapath is None:
return
flags = 0
if self._pending_final:
flags |= bfd.BFD_FLAG_FINAL
self._pending_final = False
self._is_polling = False
if self._is_polling:
flags |= bfd.BFD_FLAG_POLL
auth_cls = None
if self._auth_type:
auth_key_id = list(self._auth_keys.keys())[random.randint(0, len(
list(self._auth_keys.keys())) - 1)]
auth_key = self._auth_keys[auth_key_id]
if self._auth_type == bfd.BFD_AUTH_SIMPLE_PASS:
auth_cls = bfd.SimplePassword(auth_key_id=auth_key_id, password
=auth_key)
if self._auth_type in [bfd.BFD_AUTH_KEYED_MD5, bfd.
BFD_AUTH_METICULOUS_KEYED_MD5, bfd.BFD_AUTH_KEYED_SHA1, bfd.
BFD_AUTH_METICULOUS_KEYED_SHA1]:
if self._auth_type in [bfd.BFD_AUTH_KEYED_MD5, bfd.
BFD_AUTH_KEYED_SHA1]:
if random.randint(0, 1):
self._xmit_auth_seq = self._xmit_auth_seq + 1 & UINT32_MAX
else:
self._xmit_auth_seq = self._xmit_auth_seq + 1 & UINT32_MAX
auth_cls = bfd.bfd._auth_parsers[self._auth_type](auth_key_id=
auth_key_id, seq=self._xmit_auth_seq, auth_key=auth_key)
if auth_cls is not None:
flags |= bfd.BFD_FLAG_AUTH_PRESENT
if (self._demand_mode and self._session_state == bfd.BFD_STATE_UP and
self._remote_session_state == bfd.BFD_STATE_UP):
flags |= bfd.BFD_FLAG_DEMAND
diag = self._local_diag
state = self._session_state
detect_mult = self._detect_mult
my_discr = self._local_discr
your_discr = self._remote_discr
desired_min_tx_interval = self._desired_min_tx_interval
required_min_rx_interval = self._required_min_rx_interval
required_min_echo_rx_interval = self._cfg_required_min_echo_rx_interval
src_mac = self.src_mac
dst_mac = self.dst_mac
src_ip = self.src_ip
dst_ip = self.dst_ip
self.ipv4_id = self.ipv4_id + 1 & UINT16_MAX
ipv4_id = self.ipv4_id
src_port = self.src_port
dst_port = self.dst_port
data = BFDPacket.bfd_packet(src_mac=src_mac, dst_mac=dst_mac, src_ip=
src_ip, dst_ip=dst_ip, ipv4_id=ipv4_id, src_port=src_port, dst_port
=dst_port, diag=diag, state=state, flags=flags, detect_mult=
detect_mult, my_discr=my_discr, your_discr=your_discr,
desired_min_tx_interval=desired_min_tx_interval,
required_min_rx_interval=required_min_rx_interval,
required_min_echo_rx_interval=required_min_echo_rx_interval,
auth_cls=auth_cls)
datapath = self.datapath
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
actions = [parser.OFPActionOutput(self.ofport)]
out = parser.OFPPacketOut(datapath=datapath, buffer_id=ofproto.
OFP_NO_BUFFER, in_port=ofproto.OFPP_CONTROLLER, actions=actions,
data=data)
datapath.send_msg(out)
LOG.debug('[BFD][%s][SEND] BFD Control sent.', hex(self._local_discr))
| send | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.datapath is None:\n return\n flags = 0\n if self._pending_final:\n flags |= bfd.BFD_FLAG_FINAL\n self._pending_f... |
def x(src_mac, dst_mac, src_ip, dst_ip, ipv4_id, src_port, dst_port, diag=0,
state=0, flags=0, detect_mult=0, my_discr=0, your_discr=0,
desired_min_tx_interval=0, required_min_rx_interval=0,
required_min_echo_rx_interval=0, auth_cls=None):
pkt = packet.Packet()
eth_pkt = ethernet.ethernet(dst_mac, src_mac, ETH_TYPE_IP)
pkt.add_protocol(eth_pkt)
ipv4_pkt = ipv4.ipv4(proto=inet.IPPROTO_UDP, src=src_ip, dst=dst_ip,
tos=192, identification=ipv4_id, ttl=255)
pkt.add_protocol(ipv4_pkt)
udp_pkt = udp.udp(src_port=src_port, dst_port=dst_port)
pkt.add_protocol(udp_pkt)
bfd_pkt = bfd.bfd(ver=1, diag=diag, state=state, flags=flags,
detect_mult=detect_mult, my_discr=my_discr, your_discr=your_discr,
desired_min_tx_interval=desired_min_tx_interval,
required_min_rx_interval=required_min_rx_interval,
required_min_echo_rx_interval=required_min_echo_rx_interval,
auth_cls=auth_cls)
pkt.add_protocol(bfd_pkt)
pkt.serialize()
return pkt.data
| bfd_packet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(src_mac, dst_mac, src_ip, dst_ip, ipv4_id, src_port, dst_port, diag=0,\n state=0, flags=0, detect_mult=0, my_discr=0, your_discr=0,\n desired_min_tx_inte... |
def x(data):
pkt = packet.Packet(data)
i = iter(pkt)
eth_pkt = next(i)
assert isinstance(eth_pkt, ethernet.ethernet)
ipv4_pkt = next(i)
assert isinstance(ipv4_pkt, ipv4.ipv4)
udp_pkt = next(i)
assert isinstance(udp_pkt, udp.udp)
udp_payload = next(i)
return bfd.bfd.parser(udp_payload)[0]
| bfd_parse | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n pkt = packet.Packet(data)\n i = iter(pkt)\n eth_pkt = next(i)\n assert isinstance(eth_pkt, ethernet.ethernet)\n ipv4_pkt = next(i)\n ... |
def x(opcode, src_mac, src_ip, dst_mac, dst_ip):
pkt = packet.Packet()
eth_pkt = ethernet.ethernet(dst_mac, src_mac, ETH_TYPE_ARP)
pkt.add_protocol(eth_pkt)
arp_pkt = arp.arp_ip(opcode, src_mac, src_ip, dst_mac, dst_ip)
pkt.add_protocol(arp_pkt)
pkt.serialize()
return pkt.data
| arp_packet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(opcode, src_mac, src_ip, dst_mac, dst_ip):\n pkt = packet.Packet()\n eth_pkt = ethernet.ethernet(dst_mac, src_mac, ETH_TYPE_ARP)\n pkt.add_protocol(et... |
def x(data):
pkt = packet.Packet(data)
i = iter(pkt)
eth_pkt = next(i)
assert isinstance(eth_pkt, ethernet.ethernet)
arp_pkt = next(i)
if not isinstance(arp_pkt, arp.arp):
raise ARPPacket.ARPUnknownFormat()
if arp_pkt.opcode not in (ARP_REQUEST, ARP_REPLY):
raise ARPPacket.ARPUnknownFormat(msg='unsupported opcode %d' %
arp_pkt.opcode)
if arp_pkt.proto != ETH_TYPE_IP:
raise ARPPacket.ARPUnknownFormat(msg=
'unsupported arp ethtype 0x%04x' % arp_pkt.proto)
return arp_pkt
| arp_parse | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n pkt = packet.Packet(data)\n i = iter(pkt)\n eth_pkt = next(i)\n assert isinstance(eth_pkt, ethernet.ethernet)\n arp_pkt = next(i)\n ... |
def x(self, dpid, ofport, src_mac, src_ip, dst_mac='FF:FF:FF:FF:FF:FF',
dst_ip='255.255.255.255', auth_type=0, auth_keys=None):
auth_keys = auth_keys if auth_keys else {}
while True:
my_discr = random.randint(1, UINT32_MAX)
src_port = random.randint(49152, 65535)
if my_discr in self.session:
continue
unique_flag = True
for s in self.session.values():
if s.your_discr == my_discr or s.src_port == src_port:
unique_flag = False
break
if unique_flag:
break
sess = BFDSession(app=self, my_discr=my_discr, dpid=dpid, ofport=ofport,
src_mac=src_mac, src_ip=src_ip, src_port=src_port, dst_mac=dst_mac,
dst_ip=dst_ip, auth_type=auth_type, auth_keys=auth_keys)
self.session[my_discr] = sess
return my_discr
| add_bfd_session | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, ofport, src_mac, src_ip, dst_mac='FF:FF:FF:FF:FF:FF',\n dst_ip='255.255.255.255', auth_type=0, auth_keys=None):\n auth_keys = auth_keys if au... |
def x(self, primary_ip_address, vlan_id=None):
if self.is_ipv6:
traffic_class = 192
flow_label = 0
payload_length = ipv6.ipv6._MIN_LEN + len(self)
e = ethernet.ethernet(VRRP_IPV6_DST_MAC_ADDRESS,
vrrp_ipv6_src_mac_address(self.vrid), ether.ETH_TYPE_IPV6)
ip = ipv6.ipv6(6, traffic_class, flow_label, payload_length, inet.
IPPROTO_VRRP, VRRP_IPV6_HOP_LIMIT, primary_ip_address,
VRRP_IPV6_DST_ADDRESS)
else:
header_length = ipv4.ipv4._MIN_LEN // 4
total_length = 0
tos = 192
identification = self.get_identification()
e = ethernet.ethernet(VRRP_IPV4_DST_MAC_ADDRESS,
vrrp_ipv4_src_mac_address(self.vrid), ether.ETH_TYPE_IP)
ip = ipv4.ipv4(4, header_length, tos, total_length, identification,
0, 0, VRRP_IPV4_TTL, inet.IPPROTO_VRRP, 0, primary_ip_address,
VRRP_IPV4_DST_ADDRESS)
p = packet.Packet()
p.add_protocol(e)
if vlan_id is not None:
vlan_ = vlan.vlan(0, 0, vlan_id, e.ethertype)
e.ethertype = ether.ETH_TYPE_8021Q
p.add_protocol(vlan_)
p.add_protocol(ip)
p.add_protocol(self)
return p
| create_packet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, primary_ip_address, vlan_id=None):\n if self.is_ipv6:\n traffic_class = 192\n flow_label = 0\n payload_length = ipv6.ipv6._MIN_LE... |
def x(route_dist, prefix, next_hop, route_family=VRF_RF_IPV4):
try:
tm = CORE_MANAGER.get_core_service().table_manager
label = tm.update_vrf_table(route_dist, prefix, next_hop, route_family)
if label:
label = label[0]
return [{ROUTE_DISTINGUISHER: route_dist, PREFIX: prefix, VRF_RF:
route_family, VPN_LABEL: label}]
except BgpCoreError as e:
raise PrefixError(desc=e)
| add_local | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(route_dist, prefix, next_hop, route_family=VRF_RF_IPV4):\n try:\n tm = CORE_MANAGER.get_core_service().table_manager\n label = tm.update_vrf_t... |
def x(route_dist, prefix, route_family=VRF_RF_IPV4):
try:
tm = CORE_MANAGER.get_core_service().table_manager
tm.update_vrf_table(route_dist, prefix, route_family=route_family,
is_withdraw=True)
return [{ROUTE_DISTINGUISHER: route_dist, PREFIX: prefix, VRF_RF:
route_family}]
except BgpCoreError as e:
raise PrefixError(desc=e)
| delete_local | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(route_dist, prefix, route_family=VRF_RF_IPV4):\n try:\n tm = CORE_MANAGER.get_core_service().table_manager\n tm.update_vrf_table(route_dist, p... |
def x(route_type, route_dist, next_hop, **kwargs):
if route_type in [EVPN_ETH_AUTO_DISCOVERY, EVPN_ETH_SEGMENT] and kwargs[
'esi'] == 0:
raise ConfigValueError(conf_name=EVPN_ESI, conf_value=kwargs['esi'])
try:
tm = CORE_MANAGER.get_core_service().table_manager
label = tm.update_vrf_table(route_dist, next_hop=next_hop,
route_family=VRF_RF_L2_EVPN, route_type=route_type, **kwargs)
if label:
label = label[0]
return [{EVPN_ROUTE_TYPE: route_type, ROUTE_DISTINGUISHER:
route_dist, VRF_RF: VRF_RF_L2_EVPN, VPN_LABEL: label}.update(
kwargs)]
except BgpCoreError as e:
raise PrefixError(desc=e)
| add_evpn_local | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(route_type, route_dist, next_hop, **kwargs):\n if route_type in [EVPN_ETH_AUTO_DISCOVERY, EVPN_ETH_SEGMENT] and kwargs[\n 'esi'] == 0:\n raise... |
def x(route_type, route_dist, **kwargs):
try:
tm = CORE_MANAGER.get_core_service().table_manager
tm.update_vrf_table(route_dist, route_family=VRF_RF_L2_EVPN,
route_type=route_type, is_withdraw=True, **kwargs)
return [{EVPN_ROUTE_TYPE: route_type, ROUTE_DISTINGUISHER:
route_dist, VRF_RF: VRF_RF_L2_EVPN}.update(kwargs)]
except BgpCoreError as e:
raise PrefixError(desc=e)
| delete_evpn_local | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(route_type, route_dist, **kwargs):\n try:\n tm = CORE_MANAGER.get_core_service().table_manager\n tm.update_vrf_table(route_dist, route_family=... |
def x(flowspec_family, route_dist, rules, **kwargs):
try:
tm = CORE_MANAGER.get_core_service().table_manager
tm.update_flowspec_vrf_table(flowspec_family=flowspec_family,
route_dist=route_dist, rules=rules, **kwargs)
return [{FLOWSPEC_FAMILY: flowspec_family, ROUTE_DISTINGUISHER:
route_dist, FLOWSPEC_RULES: rules}.update(kwargs)]
except BgpCoreError as e:
raise PrefixError(desc=e)
| add_flowspec_local | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(flowspec_family, route_dist, rules, **kwargs):\n try:\n tm = CORE_MANAGER.get_core_service().table_manager\n tm.update_flowspec_vrf_table(flow... |
def x(flowspec_family, route_dist, rules):
try:
tm = CORE_MANAGER.get_core_service().table_manager
tm.update_flowspec_vrf_table(flowspec_family=flowspec_family,
route_dist=route_dist, rules=rules, is_withdraw=True)
return [{FLOWSPEC_FAMILY: flowspec_family, ROUTE_DISTINGUISHER:
route_dist, FLOWSPEC_RULES: rules}]
except BgpCoreError as e:
raise PrefixError(desc=e)
| del_flowspec_local | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(flowspec_family, route_dist, rules):\n try:\n tm = CORE_MANAGER.get_core_service().table_manager\n tm.update_flowspec_vrf_table(flowspec_famil... |
def x(address):
host, _port = address
if ip.valid_ipv4(host) or ip.valid_ipv6(host):
return socket.create_connection(address)
elif os.path.exists(host):
sock = None
try:
sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
sock.connect(host)
except socket.error as e:
if sock is not None:
sock.close()
raise e
return sock
else:
raise ValueError('Invalid IP address or Unix Socket: %s' % host)
| create_connection | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(address):\n host, _port = address\n if ip.valid_ipv4(host) or ip.valid_ipv6(host):\n return socket.create_connection(address)\n elif os.path.ex... |
def x(self, prefix, nexthops=None, safi=packet_safi.UNICAST, flags=zebra.
ZEBRA_FLAG_INTERNAL, distance=None, metric=None, mtu=None, tag=None):
try:
return self._send_ip_route_impl(prefix=prefix, nexthops=nexthops,
safi=safi, flags=flags, distance=distance, metric=metric, mtu=
mtu, tag=tag, is_withdraw=False)
except ValueError as e:
self.logger.exception('Cannot send IP route add message: %s', e)
return None
| send_ip_route_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, prefix, nexthops=None, safi=packet_safi.UNICAST, flags=zebra.\n ZEBRA_FLAG_INTERNAL, distance=None, metric=None, mtu=None, tag=None):\n try:\n ... |
def x(app_name, api_style=False):
iterable = (inspect.getmodule(frame[0]) for frame in inspect.stack())
modules = [module for module in iterable if module is not None]
if api_style:
m = modules[2]
else:
m = modules[1]
m._REQUIRED_APP = getattr(m, '_REQUIRED_APP', [])
m._REQUIRED_APP.append(app_name)
LOG.debug('require_app: %s is required by %s', app_name, m.__name__)
| require_app | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app_name, api_style=False):\n iterable = (inspect.getmodule(frame[0]) for frame in inspect.stack())\n modules = [module for module in iterable if module ... |
def x(self, ev, state=None):
ev_cls = ev.__class__
handlers = self.event_handlers.get(ev_cls, [])
if state is None:
return handlers
def x(h):
if not hasattr(h, 'callers') or ev_cls not in h.callers:
return True
states = h.callers[ev_cls].dispatchers
if not states:
return True
return state in states
return filter(test, handlers)
| get_handlers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ev, state=None):\n ev_cls = ev.__class__\n handlers = self.event_handlers.get(ev_cls, [])\n if state is None:\n return handlers\n\n de... |
def x(self, req):
assert isinstance(req, EventRequestBase)
req.sync = True
req.reply_q = hub.Queue()
self.send_event(req.dst, req)
return req.reply_q.get()
| send_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n assert isinstance(req, EventRequestBase)\n req.sync = True\n req.reply_q = hub.Queue()\n self.send_event(req.dst, req)\n return re... |
def x(self, name, ev, state=None):
if name in SERVICE_BRICKS:
if isinstance(ev, EventRequestBase):
ev.src = self.name
LOG.debug('EVENT %s->%s %s', self.name, name, ev.__class__.__name__)
SERVICE_BRICKS[name]._send_event(ev, state)
else:
LOG.debug('EVENT LOST %s->%s %s', self.name, name, ev.__class__.
__name__)
| send_event | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name, ev, state=None):\n if name in SERVICE_BRICKS:\n if isinstance(ev, EventRequestBase):\n ev.src = self.name\n LOG.debug('... |
def x(self, ev, state=None):
for observer in self.get_observers(ev, state):
self.send_event(observer, ev, state)
| send_event_to_observers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ev, state=None):\n for observer in self.get_observers(ev, state):\n self.send_event(observer, ev, state)\n",
"role": "user"
},
{
"c... |
def x(self, req, rep):
assert isinstance(req, EventRequestBase)
assert isinstance(rep, EventReplyBase)
rep.dst = req.src
if req.sync:
req.reply_q.put(rep)
else:
self.send_event(rep.dst, rep)
| reply_to_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, rep):\n assert isinstance(req, EventRequestBase)\n assert isinstance(rep, EventReplyBase)\n rep.dst = req.src\n if req.sync:\n re... |
def x(app_lists):
app_mgr = AppManager.get_instance()
app_mgr.load_apps(app_lists)
contexts = app_mgr.create_contexts()
services = app_mgr.instantiate_apps(**contexts)
webapp = wsgi.start_service(app_mgr)
if webapp:
services.append(hub.spawn(webapp))
try:
hub.joinall(services)
finally:
app_mgr.close()
for t in services:
t.kill()
hub.joinall(services)
gc.collect()
| run_apps | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app_lists):\n app_mgr = AppManager.get_instance()\n app_mgr.load_apps(app_lists)\n contexts = app_mgr.create_contexts()\n services = app_mgr.instan... |
def x(self, line):
def x(p, args):
for i in p.netconf.server_capabilities:
print(i)
self._request(line, f)
| do_list_cap | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n for i in p.netconf.server_capabilities:\n print(i)\n self._request(line, f)\n",
"role": "user"
... |
def x(self, line):
def x(p, args):
result = p.raw_get()
tree = ET.fromstring(result)
validate(tree)
print(et_tostring_pp(tree))
self._request(line, f)
| do_raw_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n result = p.raw_get()\n tree = ET.fromstring(result)\n validate(tree)\n print(et_tostring_pp(t... |
def x(self, line):
def x(p, args):
try:
source = args[0]
except:
print('argument error')
return
result = p.raw_get_config(source)
tree = ET.fromstring(result)
validate(tree)
print(et_tostring_pp(tree))
self._request(line, f)
| do_raw_get_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n source = args[0]\n except:\n print('argument error')\n return\n ... |
def x(self, line):
def x(p, args):
print(p.get())
self._request(line, f)
| do_get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n print(p.get())\n self._request(line, f)\n",
"role": "user"
},
{
"content": "do_get",
"role": "a... |
def x(self, line):
def x(p, args):
print(p.commit())
self._request(line, f)
| do_commit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n print(p.commit())\n self._request(line, f)\n",
"role": "user"
},
{
"content": "do_commit",
"rol... |
def x(self, line):
def x(p, args):
print(p.discard_changes())
self._request(line, f)
| do_discard | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n print(p.discard_changes())\n self._request(line, f)\n",
"role": "user"
},
{
"content": "do_discard"... |
def x(self, line):
def x(p, args):
try:
source = args[0]
except:
print('argument error')
return
print(p.get_config(source))
self._request(line, f)
| do_get_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n source = args[0]\n except:\n print('argument error')\n return\n ... |
def x(self, line):
def x(p, args):
try:
source = args[0]
except:
print('argument error')
return
print(p.delete_config(source))
self._request(line, f)
| do_delete_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n source = args[0]\n except:\n print('argument error')\n return\n ... |
def x(self, line):
def x(p, args):
try:
source, target = args
except:
print('argument error')
return
print(p.copy_config(source, target))
self._request(line, f)
| do_copy_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n source, target = args\n except:\n print('argument error')\n return\... |
def x(self, line):
def x(p, args):
o = p.get()
for p in o.resources.port:
print('%s %s %s' % (p.resource_id, p.name, p.number))
self._request(line, f)
| do_list_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n o = p.get()\n for p in o.resources.port:\n print('%s %s %s' % (p.resource_id, p.name, p.number))... |
def x(self, line):
def x(p, args):
try:
source, port = args
except:
print('argument error')
return
o = p.get_config(source)
for p in o.resources.port:
if p.resource_id != port:
continue
print(p.resource_id)
conf = p.configuration
for k in self._port_settings:
try:
v = getattr(conf, k)
except AttributeError:
continue
print('%s %s' % (k, v))
self._request(line, f)
| do_get_port_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n source, port = args\n except:\n print('argument error')\n return\n ... |
def x(self, line):
def x(p, args):
try:
target, port, key, value = args
except:
print('argument error')
print(args)
return
o = p.get()
capable_switch_id = o.id
try:
capable_switch = ofc.OFCapableSwitchType(id=capable_switch_id,
resources=ofc.OFCapableSwitchResourcesType(port=[ofc.
OFPortType(resource_id=port, configuration=ofc.
OFPortConfigurationType(**{key: value}))]))
except TypeError:
print('argument error')
return
try:
p.edit_config(target, capable_switch)
except Exception as e:
print(e)
self._request(line, f)
| do_set_port_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n target, port, key, value = args\n except:\n print('argument error')\n ... |
def x(self, line):
def x(p, args):
o = p.get()
if o.resources.queue:
for q in o.resources.queue:
print('%s %s' % (q.resource_id, q.port))
self._request(line, f)
| do_list_queue | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n o = p.get()\n if o.resources.queue:\n for q in o.resources.queue:\n print('%s %s'... |
def x(self, line):
def x(p, args):
try:
source, queue = args
except:
print('argument error')
return
o = p.get_config(source)
for q in o.resources.queue:
if q.resource_id != queue:
continue
print(q.resource_id)
conf = q.properties
for k in self._queue_settings:
try:
v = getattr(conf, k)
except AttributeError:
continue
print('%s %s' % (k, v))
self._request(line, f)
| do_get_queue_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n source, queue = args\n except:\n print('argument error')\n return\n... |
def x(self, line):
def x(p, args):
try:
target, queue, key, value = args
except:
print('argument error')
print(args)
return
o = p.get()
capable_switch_id = o.id
try:
capable_switch = ofc.OFCapableSwitchType(id=capable_switch_id,
resources=ofc.OFCapableSwitchResourcesType(queue=[ofc.
OFQueueType(resource_id=queue, properties=ofc.
OFQueuePropertiesType(**{key: value}))]))
except TypeError:
print('argument error')
return
try:
p.edit_config(target, capable_switch)
except Exception as e:
print(e)
self._request(line, f)
| do_set_queue_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n target, queue, key, value = args\n except:\n print('argument error')\n ... |
def x(self, line):
def x(p, args):
try:
target, lsw, queue = args
except:
print('argument error')
print(args)
return
o = p.get()
capable_switch_id = o.id
try:
capable_switch = ofc.OFCapableSwitchType(id=capable_switch_id,
resources=ofc.OFCapableSwitchResourcesType(queue=[ofc.
OFQueueType(resource_id=queue)]), logical_switches=ofc.
OFCapableSwitchLogicalSwitchesType(switch=[ofc.
OFLogicalSwitchType(id=lsw, resources=ofc.
OFLogicalSwitchResourcesType(queue=[queue]))]))
except TypeError:
print('argument error')
return
try:
p.edit_config(target, capable_switch)
except Exception as e:
print(e)
self._request(line, f)
| do_add_queue | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n target, lsw, queue = args\n except:\n print('argument error')\n pri... |
def x(self, line):
def x(p, args):
o = p.get()
for s in o.logical_switches.switch:
print('%s %s' % (s.id, s.datapath_id))
self._request(line, f)
| do_list_logical_switch | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n o = p.get()\n for s in o.logical_switches.switch:\n print('%s %s' % (s.id, s.datapath_id))\n ... |
def x(self, line):
def x(p, args):
try:
lsw, = args
except:
print('argument error')
return
o = p.get()
for s in o.logical_switches.switch:
if s.id != lsw:
continue
print(s.id)
print('datapath-id %s' % s.datapath_id)
if s.resources.queue:
print('queues:')
for q in s.resources.queue:
print('\t %s' % q)
if s.resources.port:
print('ports:')
for p in s.resources.port:
print('\t %s' % p)
self._request(line, f)
| do_show_logical_switch | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n lsw, = args\n except:\n print('argument error')\n return\n o... |
def x(self, line):
def x(p, args):
try:
source, lsw = args
except:
print('argument error')
return
o = p.get_config(source)
for l in o.logical_switches.switch:
if l.id != lsw:
continue
print(l.id)
for k in self._lsw_settings:
try:
v = getattr(l, k)
except AttributeError:
continue
print('%s %s' % (k, v))
self._request(line, f)
| do_get_logical_switch_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n source, lsw = args\n except:\n print('argument error')\n return\n ... |
def x(self, line):
def x(p, args):
try:
target, lsw, key, value = args
except:
print('argument error')
return
o = p.get_config(target)
capable_switch_id = o.id
try:
capable_switch = ofc.OFCapableSwitchType(id=capable_switch_id,
logical_switches=ofc.OFCapableSwitchLogicalSwitchesType(
switch=[ofc.OFLogicalSwitchType(id=lsw, **{key: value})]))
except TypeError:
print('argument error')
return
try:
p.edit_config(target, capable_switch)
except Exception as e:
print(e)
self._request(line, f)
| do_set_logical_switch_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, args):\n try:\n target, lsw, key, value = args\n except:\n print('argument error')\n ... |
def x(opcode, src_mac, src_ip, dst_mac, dst_ip):
return arp(ARP_HW_TYPE_ETHERNET, ether.ETH_TYPE_IP, 6, 4, opcode,
src_mac, src_ip, dst_mac, dst_ip)
| arp_ip | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(opcode, src_mac, src_ip, dst_mac, dst_ip):\n return arp(ARP_HW_TYPE_ETHERNET, ether.ETH_TYPE_IP, 6, 4, opcode,\n src_mac, src_ip, dst_mac, dst_ip)\n"... |
def x(ev_cls, dispatchers=None):
def x(handler):
if 'callers' not in dir(handler):
handler.callers = {}
for e in _listify(ev_cls):
handler.callers[e] = _Caller(_listify(dispatchers), e.__module__)
return handler
return _set_ev_cls_dec
| set_ev_cls | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ev_cls, dispatchers=None):\n\n def x(handler):\n if 'callers' not in dir(handler):\n handler.callers = {}\n for e in _listify(ev_cl... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.