source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(service): frame = inspect.currentframe() m_name = frame.f_back.f_globals['__name__'] m = sys.modules[m_name] m._SERVICE_NAME = service
register_service
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(service):\n frame = inspect.currentframe()\n m_name = frame.f_back.f_globals['__name__']\n m = sys.modules[m_name]\n m._SERVICE_NAME = service\n", ...
def x(neigh_ip_address): neigh_conf = CORE_MANAGER.neighbors_conf.get_neighbor_conf(neigh_ip_address ) if not neigh_conf: raise RuntimeConfigError(desc= 'No Neighbor configuration with IP address %s' % neigh_ip_address) assert isinstance(neigh_conf, NeighborConf) return neigh_conf
get_neighbor_conf
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(neigh_ip_address):\n neigh_conf = CORE_MANAGER.neighbors_conf.get_neighbor_conf(neigh_ip_address\n )\n if not neigh_conf:\n raise RuntimeCo...
def x(neigh_ip_address): core = CORE_MANAGER.get_core_service() peer = core.peer_manager.get_by_addr(neigh_ip_address) return peer.in_filters
get_neighbor_in_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(neigh_ip_address):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_address)\n return peer.in_filters\n", ...
def x(neigh_ip_address, filters): core = CORE_MANAGER.get_core_service() peer = core.peer_manager.get_by_addr(neigh_ip_address) peer.in_filters = filters return True
set_neighbor_in_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(neigh_ip_address, filters):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_address)\n peer.in_filters = filt...
def x(neigh_ip_address): core = CORE_MANAGER.get_core_service() ret = core.peer_manager.get_by_addr(neigh_ip_address).out_filters return ret
get_neighbor_out_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(neigh_ip_address):\n core = CORE_MANAGER.get_core_service()\n ret = core.peer_manager.get_by_addr(neigh_ip_address).out_filters\n return ret\n", "...
def x(neigh_ip_address, filters): core = CORE_MANAGER.get_core_service() peer = core.peer_manager.get_by_addr(neigh_ip_address) peer.out_filters = filters return True
set_neighbor_out_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(neigh_ip_address, filters):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_address)\n peer.out_filters = fil...
def x(neigh_ip_address, at_maps, route_dist=None, route_family=VRF_RF_IPV4): core = CORE_MANAGER.get_core_service() peer = core.peer_manager.get_by_addr(neigh_ip_address) at_maps_key = const.ATTR_MAPS_LABEL_DEFAULT at_maps_dict = {} if route_dist is not None: vrf_conf = CORE_MANAGER.vrfs_conf.get_vrf_conf(route_dist, route_family ) if vrf_conf: at_maps_key = ':'.join([route_dist, route_family]) else: raise RuntimeConfigError(desc='No VrfConf with rd %s' % route_dist) at_maps_dict[const.ATTR_MAPS_LABEL_KEY] = at_maps_key at_maps_dict[const.ATTR_MAPS_VALUE] = at_maps peer.attribute_maps = at_maps_dict return True
set_neighbor_attribute_map
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(neigh_ip_address, at_maps, route_dist=None, route_family=VRF_RF_IPV4):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(ne...
def x(neigh_ip_address, route_dist=None, route_family=VRF_RF_IPV4): core = CORE_MANAGER.get_core_service() peer = core.peer_manager.get_by_addr(neigh_ip_address) at_maps_key = const.ATTR_MAPS_LABEL_DEFAULT if route_dist is not None: at_maps_key = ':'.join([route_dist, route_family]) at_maps = peer.attribute_maps.get(at_maps_key) if at_maps: return at_maps.get(const.ATTR_MAPS_ORG_KEY) else: return []
get_neighbor_attribute_map
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(neigh_ip_address, route_dist=None, route_family=VRF_RF_IPV4):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_ad...
def x(**kwargs): def x(func): _CALL_REGISTRY[kwargs.get(API_SYM, func.__name__)] = func return func return decorator
register
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(**kwargs):\n\n def x(func):\n _CALL_REGISTRY[kwargs.get(API_SYM, func.__name__)] = func\n return func\n return decorator\n", "role": "u...
def x(symbol, **kwargs): LOG.info('API method %s called with args: %s', symbol, str(kwargs)) from . import all if not is_call_registered(symbol): message = 'Did not find any method registered by symbol %s' % symbol raise MethodNotFound(message) if not symbol.startswith('core') and not CORE_MANAGER.started: raise CoreNotStarted(desc='CoreManager is not active.') call = get_call(symbol) try: return call(**kwargs) except BGPSException as r: LOG.error(traceback.format_exc()) raise r except Exception as e: LOG.error(traceback.format_exc()) raise ApiException(desc=str(e))
call
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(symbol, **kwargs):\n LOG.info('API method %s called with args: %s', symbol, str(kwargs))\n from . import all\n if not is_call_registered(symbol):\n ...
def x(mod, type_, code): _, c_name = _get_error_names(mod, type_, code) return '%s(%d)' % (c_name, code)
error_code_to_str
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(mod, type_, code):\n _, c_name = _get_error_names(mod, type_, code)\n return '%s(%d)' % (c_name, code)\n", "role": "user" }, { "content": "er...
def x(mod, type_, code): t_name, c_name = _get_error_names(mod, type_, code) return {'type': '%s(%d)' % (t_name, type_), 'code': '%s(%d)' % (c_name, code)}
error_to_jsondict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(mod, type_, code):\n t_name, c_name = _get_error_names(mod, type_, code)\n return {'type': '%s(%d)' % (t_name, type_), 'code': '%s(%d)' % (c_name,\n ...
def x(self): cloned_setting = self._settings.copy() cloned_setting[IMPORT_RTS] = self.import_rts cloned_setting[EXPORT_RTS] = self.export_rts cloned_setting[SITE_OF_ORIGINS] = self.soo_list return cloned_setting
settings
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n cloned_setting = self._settings.copy()\n cloned_setting[IMPORT_RTS] = self.import_rts\n cloned_setting[EXPORT_RTS] = self.export_rts\n clo...
def x(self, **kwargs): super(VrfConf, self).update(**kwargs) vrf_id = kwargs.get(ConfWithId.ID) vrf_rd = kwargs.get(ROUTE_DISTINGUISHER) vrf_rf = kwargs.get(VRF_RF) if (vrf_id != self.id or vrf_rd != self.route_dist or vrf_rf != self. route_family): raise ConfigValueError(desc= 'id/route-distinguisher/route-family do not match configured value.' ) new_imp_rts, old_imp_rts = self._update_import_rts(**kwargs) export_rts_changed = self._update_export_rts(**kwargs) soos_list_changed = self._update_soo_list(**kwargs) med_changed = self._update_med(**kwargs) re_export_needed = export_rts_changed or soos_list_changed or med_changed import_maps = kwargs.get(IMPORT_MAPS, []) re_import_needed = self._update_importmaps(import_maps) if (new_imp_rts is not None or old_imp_rts is not None or re_export_needed or re_import_needed): evt_value = (new_imp_rts, old_imp_rts, import_maps, re_export_needed, re_import_needed) self._notify_listeners(VrfConf.VRF_CHG_EVT, evt_value) return True
update
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, **kwargs):\n super(VrfConf, self).update(**kwargs)\n vrf_id = kwargs.get(ConfWithId.ID)\n vrf_rd = kwargs.get(ROUTE_DISTINGUISHER)\n vrf_rf =...
def x(self, route_dist=None, vrf_id=None, vrf_rf=None): if route_dist is None and vrf_id is None: raise RuntimeConfigError(desc='To delete supply route_dist or id.') vrf_rfs = SUPPORTED_VRF_RF if vrf_rf: vrf_rfs = vrf_rf removed_vrf_confs = [] for route_family in vrf_rfs: if route_dist is not None: rd_rf_id = VrfConf.create_rd_rf_id(route_dist, route_family) vrf_conf = self._vrfs_by_rd_rf.pop(rd_rf_id, None) if vrf_conf: self._vrfs_by_id.pop(vrf_conf.id, None) removed_vrf_confs.append(vrf_conf) else: vrf_conf = self._vrfs_by_id.pop(vrf_id, None) if vrf_conf: self._vrfs_by_rd_rf.pop(vrf_conf.rd_rd_id, None) removed_vrf_confs.append(vrf_conf) for vrf_conf in removed_vrf_confs: self._notify_listeners(VrfsConf.REMOVE_VRF_CONF_EVT, vrf_conf) return removed_vrf_confs
remove_vrf_conf
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, route_dist=None, vrf_id=None, vrf_rf=None):\n if route_dist is None and vrf_id is None:\n raise RuntimeConfigError(desc='To delete supply route...
def x(self, evt): msg = evt.msg dpid = msg.datapath.id req_pkt = packet.Packet(msg.data) req_igmp = req_pkt.get_protocol(igmp.igmp) if req_igmp: if self._querier.dpid == dpid: self._querier.packet_in_handler(req_igmp, msg) else: self._snooper.packet_in_handler(req_pkt, req_igmp, msg) else: self.send_event_to_observers(EventPacketIn(msg))
packet_in_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, evt):\n msg = evt.msg\n dpid = msg.datapath.id\n req_pkt = packet.Packet(msg.data)\n req_igmp = req_pkt.get_protocol(igmp.igmp)\n if req_i...
def x(self, evt): datapath = evt.datapath assert datapath is not None if datapath.id == self._querier.dpid: if evt.state == MAIN_DISPATCHER: self._querier.start_loop(datapath) elif evt.state == DEAD_DISPATCHER: self._querier.stop_loop()
state_change_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, evt):\n datapath = evt.datapath\n assert datapath is not None\n if datapath.id == self._querier.dpid:\n if evt.state == MAIN_DISPATCHER:\...
def x(self, datapath, actions, in_port, dst, src=None): set_flow = self._set_flow_func.get(datapath.ofproto.OFP_VERSION) assert set_flow set_flow(datapath, actions, in_port, dst, src)
set_flow_entry
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, datapath, actions, in_port, dst, src=None):\n set_flow = self._set_flow_func.get(datapath.ofproto.OFP_VERSION)\n assert set_flow\n set_flow(data...
def x(self, datapath, in_port, dst, src=None): del_flow = self._del_flow_func.get(datapath.ofproto.OFP_VERSION) assert del_flow del_flow(datapath, in_port, dst, src)
del_flow_entry
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, datapath, in_port, dst, src=None):\n del_flow = self._del_flow_func.get(datapath.ofproto.OFP_VERSION)\n assert del_flow\n del_flow(datapath, in_...
def x(self, datapath, data, in_port, actions): ofproto = datapath.ofproto parser = datapath.ofproto_parser out = parser.OFPPacketOut(datapath=datapath, buffer_id=ofproto. OFP_NO_BUFFER, data=data, in_port=in_port, actions=actions) datapath.send_msg(out)
do_packet_out
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, datapath, data, in_port, actions):\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n out = parser.OFPPacketOut(datapath=datapath...
def x(self, ip_text): if ip_text is None: return None assert isinstance(ip_text, str) return struct.unpack('!I', addrconv.ipv4.text_to_bin(ip_text))[0]
ipv4_text_to_int
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, ip_text):\n if ip_text is None:\n return None\n assert isinstance(ip_text, str)\n return struct.unpack('!I', addrconv.ipv4.text_to_bin(ip...
def x(self, dpid, server_port): self.dpid = dpid self.server_port = server_port if self._querier_thread: hub.kill(self._querier_thread) self._querier_thread = None
set_querier_mode
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, dpid, server_port):\n self.dpid = dpid\n self.server_port = server_port\n if self._querier_thread:\n hub.kill(self._querier_thread)\n ...
def x(self, req_igmp, msg): ofproto = msg.datapath.ofproto if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION: in_port = msg.in_port else: in_port = msg.match['in_port'] if (igmp.IGMP_TYPE_REPORT_V1 == req_igmp.msgtype or igmp. IGMP_TYPE_REPORT_V2 == req_igmp.msgtype): self._do_report(req_igmp, in_port, msg) elif igmp.IGMP_TYPE_LEAVE == req_igmp.msgtype: self._do_leave(req_igmp, in_port, msg)
packet_in_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req_igmp, msg):\n ofproto = msg.datapath.ofproto\n if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:\n in_port = msg.in_port\n else:\n ...
def x(self, datapath): self._datapath = datapath self._querier_thread = hub.spawn(self._send_query) self.logger.info('started a querier.')
start_loop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, datapath):\n self._datapath = datapath\n self._querier_thread = hub.spawn(self._send_query)\n self.logger.info('started a querier.')\n", "ro...
def x(self): hub.kill(self._querier_thread) self._querier_thread = None self._datapath = None self.logger.info('stopped a querier.')
stop_loop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n hub.kill(self._querier_thread)\n self._querier_thread = None\n self._datapath = None\n self.logger.info('stopped a querier.')\n", "rol...
def x(self): timeout = 60 ofproto = self._datapath.ofproto parser = self._datapath.ofproto_parser if ofproto_v1_0.OFP_VERSION == ofproto.OFP_VERSION: send_port = ofproto.OFPP_NONE else: send_port = ofproto.OFPP_ANY res_igmp = igmp.igmp(msgtype=igmp.IGMP_TYPE_QUERY, maxresp=igmp. QUERY_RESPONSE_INTERVAL * 10, csum=0, address='0.0.0.0') res_ipv4 = ipv4.ipv4(total_length=len(ipv4.ipv4()) + len(res_igmp), proto=inet.IPPROTO_IGMP, ttl=1, src='0.0.0.0', dst=igmp. MULTICAST_IP_ALL_HOST) res_ether = ethernet.ethernet(dst=igmp.MULTICAST_MAC_ALL_HOST, src=self ._datapath.ports[ofproto.OFPP_LOCAL].hw_addr, ethertype=ether. ETH_TYPE_IP) res_pkt = packet.Packet() res_pkt.add_protocol(res_ether) res_pkt.add_protocol(res_ipv4) res_pkt.add_protocol(res_igmp) res_pkt.serialize() flood = [parser.OFPActionOutput(ofproto.OFPP_FLOOD)] while True: for status in self._mcast.values(): for port in status.keys(): status[port] = False self._do_packet_out(self._datapath, res_pkt.data, send_port, flood) hub.sleep(igmp.QUERY_RESPONSE_INTERVAL) del_groups = [] for group, status in self._mcast.items(): del_ports = [] actions = [] for port in status.keys(): if not status[port]: del_ports.append(port) else: actions.append(parser.OFPActionOutput(port)) if len(actions) and len(del_ports): self._set_flow_entry(self._datapath, actions, self. server_port, group) if not len(actions): self._del_flow_entry(self._datapath, self.server_port, group) del_groups.append(group) if len(del_ports): for port in del_ports: self._del_flow_entry(self._datapath, port, group) for port in del_ports: del status[port] for group in del_groups: del self._mcast[group] rest_time = timeout - igmp.QUERY_RESPONSE_INTERVAL hub.sleep(rest_time)
send_query
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n timeout = 60\n ofproto = self._datapath.ofproto\n parser = self._datapath.ofproto_parser\n if ofproto_v1_0.OFP_VERSION == ofproto.OFP_VERS...
def x(self, report, in_port, msg): datapath = msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION: size = 65535 else: size = ofproto.OFPCML_MAX update = False self._mcast.setdefault(report.address, {}) if in_port not in self._mcast[report.address]: update = True self._mcast[report.address][in_port] = True if update: actions = [] for port in self._mcast[report.address]: actions.append(parser.OFPActionOutput(port)) self._set_flow_entry(datapath, actions, self.server_port, report. address) self._set_flow_entry(datapath, [parser.OFPActionOutput(ofproto. OFPP_CONTROLLER, size)], in_port, report.address)
do_report
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, report, in_port, msg):\n datapath = msg.datapath\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n if ofproto.OFP_VERSION == ...
def x(self, leave, in_port, msg): datapath = msg.datapath parser = datapath.ofproto_parser self._mcast.setdefault(leave.address, {}) if in_port in self._mcast[leave.address]: self._del_flow_entry(datapath, in_port, leave.address) del self._mcast[leave.address][in_port] actions = [] for port in self._mcast[leave.address]: actions.append(parser.OFPActionOutput(port)) if len(actions): self._set_flow_entry(datapath, actions, self.server_port, leave .address) else: self._del_flow_entry(datapath, self.server_port, leave.address)
do_leave
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, leave, in_port, msg):\n datapath = msg.datapath\n parser = datapath.ofproto_parser\n self._mcast.setdefault(leave.address, {})\n if in_port i...
def x(self): self.logger.propagate = False hdl = logging.StreamHandler() fmt_str = '[querier][%(levelname)s] %(message)s' hdl.setFormatter(logging.Formatter(fmt_str)) self.logger.addHandler(hdl)
set_logger
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.logger.propagate = False\n hdl = logging.StreamHandler()\n fmt_str = '[querier][%(levelname)s] %(message)s'\n hdl.setFormatter(loggin...
def x(self, req_pkt, req_igmp, msg): dpid = msg.datapath.id ofproto = msg.datapath.ofproto if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION: in_port = msg.in_port else: in_port = msg.match['in_port'] log = 'SW=%s PORT=%d IGMP received. ' % (dpid_to_str(dpid), in_port) self.logger.debug(str(req_igmp)) if igmp.IGMP_TYPE_QUERY == req_igmp.msgtype: self.logger.info(log + '[QUERY]') req_ipv4, = req_pkt.get_protocols(ipv4.ipv4) req_eth, = req_pkt.get_protocols(ethernet.ethernet) self._do_query(req_igmp, req_ipv4, req_eth, in_port, msg) elif igmp.IGMP_TYPE_REPORT_V1 == req_igmp.msgtype or igmp.IGMP_TYPE_REPORT_V2 == req_igmp.msgtype: self.logger.info(log + '[REPORT]') self._do_report(req_igmp, in_port, msg) elif igmp.IGMP_TYPE_LEAVE == req_igmp.msgtype: self.logger.info(log + '[LEAVE]') self._do_leave(req_igmp, in_port, msg) elif igmp.IGMP_TYPE_REPORT_V3 == req_igmp.msgtype: self.logger.info(log + 'V3 is not supported yet.') self._do_flood(in_port, msg) else: self.logger.info(log + '[unknown type:%d]', req_igmp.msgtype) self._do_flood(in_port, msg)
packet_in_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req_pkt, req_igmp, msg):\n dpid = msg.datapath.id\n ofproto = msg.datapath.ofproto\n if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:\n ...
def x(self, query, iph, eth, in_port, msg): datapath = msg.datapath dpid = datapath.id ofproto = datapath.ofproto parser = datapath.ofproto_parser self._to_querier[dpid] = {'port': in_port, 'ip': iph.src, 'mac': eth.src} timeout = igmp.QUERY_RESPONSE_INTERVAL if query.maxresp: timeout = query.maxresp / 10 self._to_hosts.setdefault(dpid, {}) if query.address == '0.0.0.0': for group in self._to_hosts[dpid].values(): group['replied'] = False group['leave'] = None else: group = self._to_hosts[dpid].get(query.address) if group: group['replied'] = False group['leave'] = None actions = [parser.OFPActionOutput(ofproto.OFPP_FLOOD)] self._do_packet_out(datapath, msg.data, in_port, actions) hub.spawn(self._do_timeout_for_query, timeout, datapath)
do_query
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, query, iph, eth, in_port, msg):\n datapath = msg.datapath\n dpid = datapath.id\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parse...
def x(self, report, in_port, msg): datapath = msg.datapath dpid = datapath.id ofproto = datapath.ofproto parser = datapath.ofproto_parser if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION: size = 65535 else: size = ofproto.OFPCML_MAX outport = None value = self._to_querier.get(dpid) if value: outport = value['port'] self._to_hosts.setdefault(dpid, {}) if not self._to_hosts[dpid].get(report.address): self._send_event(EventMulticastGroupStateChanged(MG_GROUP_ADDED, report.address, outport, [])) self._to_hosts[dpid].setdefault(report.address, {'replied': False, 'leave': None, 'ports': {}}) if not self._to_hosts[dpid][report.address]['ports'].get(in_port): self._to_hosts[dpid][report.address]['ports'][in_port] = {'out': False, 'in': False} self._set_flow_entry(datapath, [parser.OFPActionOutput(ofproto. OFPP_CONTROLLER, size)], in_port, report.address) if not self._to_hosts[dpid][report.address]['ports'][in_port]['out']: self._to_hosts[dpid][report.address]['ports'][in_port]['out'] = True if not outport: self.logger.info('no querier exists.') return if not self._to_hosts[dpid][report.address]['ports'][in_port]['in']: actions = [] ports = [] for port in self._to_hosts[dpid][report.address]['ports']: actions.append(parser.OFPActionOutput(port)) ports.append(port) self._send_event(EventMulticastGroupStateChanged(MG_MEMBER_CHANGED, report.address, outport, ports)) self._set_flow_entry(datapath, actions, outport, report.address) self._to_hosts[dpid][report.address]['ports'][in_port]['in'] = True if not self._to_hosts[dpid][report.address]['replied']: actions = [parser.OFPActionOutput(outport, size)] self._do_packet_out(datapath, msg.data, in_port, actions) self._to_hosts[dpid][report.address]['replied'] = True
do_report
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, report, in_port, msg):\n datapath = msg.datapath\n dpid = datapath.id\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n if...
def x(self, leave, in_port, msg): datapath = msg.datapath dpid = datapath.id ofproto = datapath.ofproto parser = datapath.ofproto_parser if not self._to_querier.get(dpid): self.logger.info('no querier exists.') return self._to_hosts.setdefault(dpid, {}) self._to_hosts[dpid].setdefault(leave.address, {'replied': False, 'leave': None, 'ports': {}}) self._to_hosts[dpid][leave.address]['leave'] = msg self._to_hosts[dpid][leave.address]['ports'][in_port] = {'out': False, 'in': False} timeout = igmp.LAST_MEMBER_QUERY_INTERVAL res_igmp = igmp.igmp(msgtype=igmp.IGMP_TYPE_QUERY, maxresp=timeout * 10, csum=0, address=leave.address) res_ipv4 = ipv4.ipv4(total_length=len(ipv4.ipv4()) + len(res_igmp), proto=inet.IPPROTO_IGMP, ttl=1, src=self._to_querier[dpid]['ip'], dst=igmp.MULTICAST_IP_ALL_HOST) res_ether = ethernet.ethernet(dst=igmp.MULTICAST_MAC_ALL_HOST, src=self ._to_querier[dpid]['mac'], ethertype=ether.ETH_TYPE_IP) res_pkt = packet.Packet() res_pkt.add_protocol(res_ether) res_pkt.add_protocol(res_ipv4) res_pkt.add_protocol(res_igmp) res_pkt.serialize() actions = [parser.OFPActionOutput(ofproto.OFPP_IN_PORT)] self._do_packet_out(datapath, res_pkt.data, in_port, actions) hub.spawn(self._do_timeout_for_leave, timeout, datapath, leave.address, in_port)
do_leave
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, leave, in_port, msg):\n datapath = msg.datapath\n dpid = datapath.id\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n if ...
def x(self, in_port, msg): datapath = msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser actions = [parser.OFPActionOutput(ofproto.OFPP_FLOOD)] self._do_packet_out(datapath, msg.data, in_port, actions)
do_flood
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, in_port, msg):\n datapath = msg.datapath\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n actions = [parser.OFPActionOutput(...
def x(self, timeout, datapath): dpid = datapath.id hub.sleep(timeout) outport = self._to_querier[dpid]['port'] remove_dsts = [] for dst in self._to_hosts[dpid]: if not self._to_hosts[dpid][dst]['replied']: self._remove_multicast_group(datapath, outport, dst) remove_dsts.append(dst) for dst in remove_dsts: del self._to_hosts[dpid][dst]
do_timeout_for_query
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, timeout, datapath):\n dpid = datapath.id\n hub.sleep(timeout)\n outport = self._to_querier[dpid]['port']\n remove_dsts = []\n for dst in s...
def x(self, timeout, datapath, dst, in_port): parser = datapath.ofproto_parser dpid = datapath.id hub.sleep(timeout) outport = self._to_querier[dpid]['port'] if self._to_hosts[dpid][dst]['ports'][in_port]['out']: return del self._to_hosts[dpid][dst]['ports'][in_port] self._del_flow_entry(datapath, in_port, dst) actions = [] ports = [] for port in self._to_hosts[dpid][dst]['ports']: actions.append(parser.OFPActionOutput(port)) ports.append(port) if len(actions): self._send_event(EventMulticastGroupStateChanged(MG_MEMBER_CHANGED, dst, outport, ports)) self._set_flow_entry(datapath, actions, outport, dst) self._to_hosts[dpid][dst]['leave'] = None else: self._remove_multicast_group(datapath, outport, dst) del self._to_hosts[dpid][dst]
do_timeout_for_leave
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, timeout, datapath, dst, in_port):\n parser = datapath.ofproto_parser\n dpid = datapath.id\n hub.sleep(timeout)\n outport = self._to_querier[d...
def x(self, datapath, outport, dst): ofproto = datapath.ofproto parser = datapath.ofproto_parser dpid = datapath.id self._send_event(EventMulticastGroupStateChanged(MG_GROUP_REMOVED, dst, outport, [])) self._del_flow_entry(datapath, outport, dst) for port in self._to_hosts[dpid][dst]['ports']: self._del_flow_entry(datapath, port, dst) leave = self._to_hosts[dpid][dst]['leave'] if leave: if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION: in_port = leave.in_port else: in_port = leave.match['in_port'] actions = [parser.OFPActionOutput(outport)] self._do_packet_out(datapath, leave.data, in_port, actions)
remove_multicast_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, datapath, outport, dst):\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n dpid = datapath.id\n self._send_event(EventMultica...
def x(self): curr_rtc_as_set = self._neighbors_conf.rtc_as_set curr_rtc_as_set.add(self._core_service.asn) removed_rtc_as_set = self._all_rtc_as_set - curr_rtc_as_set new_rtc_as_set = curr_rtc_as_set - self._all_rtc_as_set self._all_rtc_as_set = curr_rtc_as_set for new_rtc_as in new_rtc_as_set: for import_rt in self._all_vrfs_import_rts_set: self._add_rt_nlri_for_as(new_rtc_as, import_rt) for removed_rtc_as in removed_rtc_as_set: for import_rt in self._all_vrfs_import_rts_set: self._add_rt_nlri_for_as(removed_rtc_as, import_rt, is_withdraw =True)
update_rtc_as_set
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n curr_rtc_as_set = self._neighbors_conf.rtc_as_set\n curr_rtc_as_set.add(self._core_service.asn)\n removed_rtc_as_set = self._all_rtc_as_set -...
def x(self): current_conf_import_rts = set() for vrf in self._vrfs_conf.vrf_confs: current_conf_import_rts.update(vrf.import_rts) removed_rts = self._all_vrfs_import_rts_set - current_conf_import_rts new_rts = current_conf_import_rts - self._all_vrfs_import_rts_set self._all_vrfs_import_rts_set = current_conf_import_rts for new_rt in new_rts: self.add_rt_nlri(new_rt) for removed_rt in removed_rts: self.add_rt_nlri(removed_rt, is_withdraw=True)
update_local_rt_nlris
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n current_conf_import_rts = set()\n for vrf in self._vrfs_conf.vrf_confs:\n current_conf_import_rts.update(vrf.import_rts)\n removed_rts...
def x(self): interested_rts = set() for rtfilter in self._peer_to_rtfilter_map.values(): interested_rts.update(rtfilter) interested_rts.update(self._vrfs_conf.vrf_interested_rts) interested_rts.add(RouteTargetMembershipNLRI.DEFAULT_RT) interested_rts.remove(RouteTargetMembershipNLRI.DEFAULT_RT) return interested_rts
compute_global_interested_rts
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n interested_rts = set()\n for rtfilter in self._peer_to_rtfilter_map.values():\n interested_rts.update(rtfilter)\n interested_rts.updat...
def x(self): prev_global_rts = self._global_interested_rts curr_global_rts = self._compute_global_interested_rts() new_global_rts = curr_global_rts - prev_global_rts removed_global_rts = prev_global_rts - curr_global_rts self._global_interested_rts = curr_global_rts LOG.debug('Global Interested RT changed, new RTs %s, removed RTs %s', new_global_rts, removed_global_rts) tm = self._core_service.table_manager tm.on_interesting_rts_change(new_global_rts, removed_global_rts)
update_interested_rts
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n prev_global_rts = self._global_interested_rts\n curr_global_rts = self._compute_global_interested_rts()\n new_global_rts = curr_global_rts - ...
def x(ip): if isinstance(ip, numbers.Integral): return addrconv.ipv4.bin_to_text(struct.pack('!I', ip)) else: return addrconv.ipv4.bin_to_text(ip)
ipv4_to_str
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(ip):\n if isinstance(ip, numbers.Integral):\n return addrconv.ipv4.bin_to_text(struct.pack('!I', ip))\n else:\n return addrconv.ipv4.bin_to...
def x(ip): if isinstance(ip, numbers.Integral): return addrconv.ipv6.bin_to_text(type_desc.Int16.from_user(ip)) else: return addrconv.ipv6.bin_to_text(ip)
ipv6_to_str
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(ip):\n if isinstance(ip, numbers.Integral):\n return addrconv.ipv6.bin_to_text(type_desc.Int16.from_user(ip))\n else:\n return addrconv.ipv...
def x(ip): if len(ip) == 4: return ipv4_to_str(ip) elif len(ip) == 16: return ipv6_to_str(ip) else: raise struct.error('Invalid ip address length: %s' % len(ip))
bin_to_text
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(ip):\n if len(ip) == 4:\n return ipv4_to_str(ip)\n elif len(ip) == 16:\n return ipv6_to_str(ip)\n else:\n raise struct.error('Inv...
def x(self, line): def x(p, method, params): result = p.call(method, params) print('RESULT %s' % result) self._request(line, f)
do_request
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, line):\n\n def x(p, method, params):\n result = p.call(method, params)\n print('RESULT %s' % result)\n self._request(line, f)\n", ...
def x(self, line): def x(p, method, params): p.send_notification(method, params) self._request(line, f)
do_notify
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, line):\n\n def x(p, method, params):\n p.send_notification(method, params)\n self._request(line, f)\n", "role": "user" }, { "con...
def x(self): if self._composed_with_old_api(): o2 = OFPMatch() o2.fields = self.fields[:] buf = bytearray() o2.serialize(buf, 0) o = OFPMatch.parser(six.binary_type(buf), 0) else: o = self body = {'oxm_fields': [ofproto.oxm_to_jsondict(k, uv) for k, uv in o. _fields2], 'length': o.length, 'type': o.type} return {self.__class__.__name__: body}
to_jsondict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self._composed_with_old_api():\n o2 = OFPMatch()\n o2.fields = self.fields[:]\n buf = bytearray()\n o2.serialize(buf...
def x(cls, dict_): fields = [ofproto.oxm_from_jsondict(f) for f in dict_['oxm_fields']] o = OFPMatch(_ordered_fields=fields) buf = bytearray() o.serialize(buf, 0) return OFPMatch.parser(six.binary_type(buf), 0)
from_jsondict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, dict_):\n fields = [ofproto.oxm_from_jsondict(f) for f in dict_['oxm_fields']]\n o = OFPMatch(_ordered_fields=fields)\n buf = bytearray()\n o....
def x(self, header, value, mask=None): self.fields.append(OFPMatchField.make(header, value, mask))
append_field
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, header, value, mask=None):\n self.fields.append(OFPMatchField.make(header, value, mask))\n", "role": "user" }, { "content": "append_field"...
def x(self, path): result = False cause = None for f in self.filters: cause, result = f.evaluate(path) if not result: break return cause, result
evaluate
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, path):\n result = False\n cause = None\n for f in self.filters:\n cause, result = f.evaluate(path)\n if not result:\n b...
def x(self): cloned_filters = [f.clone() for f in self.filters] return self.__class__(cloned_filters, self.attr_type, self.attr_value)
clone
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n cloned_filters = [f.clone() for f in self.filters]\n return self.__class__(cloned_filters, self.attr_type, self.attr_value)\n", "role": "use...
def x(self): return self.get_count(PeerCounterNames.SENT_REFRESH) + self.get_count( PeerCounterNames.SENT_UPDATES)
total_msg_sent
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n return self.get_count(PeerCounterNames.SENT_REFRESH) + self.get_count(\n PeerCounterNames.SENT_UPDATES)\n", "role": "user" }, { ...
def x(self): return self.get_count(PeerCounterNames.RECV_UPDATES) + self.get_count( PeerCounterNames.RECV_REFRESH) + self.get_count(PeerCounterNames. RECV_NOTIFICATION)
total_msg_recv
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n return self.get_count(PeerCounterNames.RECV_UPDATES) + self.get_count(\n PeerCounterNames.RECV_REFRESH) + self.get_count(PeerCounterNames.\n...
def x(self): uptime = time.time( ) - self._established_time if self._established_time != 0 else -1 return {stats.UPDATE_MSG_IN: self.get_count(PeerCounterNames. RECV_UPDATES), stats.UPDATE_MSG_OUT: self.get_count( PeerCounterNames.SENT_UPDATES), stats.TOTAL_MSG_IN: self. total_msg_recv, stats.TOTAL_MSG_OUT: self.total_msg_sent, stats. FMS_EST_TRANS: self.get_count(PeerCounterNames.FSM_ESTB_TRANSITIONS ), stats.UPTIME: uptime}
get_stats_summary_dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n uptime = time.time(\n ) - self._established_time if self._established_time != 0 else -1\n return {stats.UPDATE_MSG_IN: self.get_count(Pee...
def x(self, conf_evt): enabled = conf_evt.value if enabled: LOG.info('%s enabled', self) if self._protocol and self._protocol.started: LOG.error('Tried to enable neighbor that is already enabled') else: self.state.bgp_state = const.BGP_FSM_CONNECT if not self._connect_retry_event.is_set(): self._connect_retry_event.set() LOG.debug('Starting connect loop as neighbor is enabled.') else: LOG.info('%s disabled', self) if self._protocol: self._protocol.send_notification(BGP_ERROR_CEASE, BGP_ERROR_SUB_ADMINISTRATIVE_SHUTDOWN) self._protocol.stop() self._protocol = None self.state.bgp_state = const.BGP_FSM_IDLE LOG.debug('Disabling connect-retry as neighbor was disabled') self._connect_retry_event.clear()
on_update_enabled
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, conf_evt):\n enabled = conf_evt.value\n if enabled:\n LOG.info('%s enabled', self)\n if self._protocol and self._protocol.started:\n ...
def x(self, rr_msg): assert rr_msg.type == BGP_MSG_ROUTE_REFRESH self._protocol.send(rr_msg) LOG.debug('RouteRefresh %s>> %s', self._neigh_conf.ip_address, rr_msg) if rr_msg.demarcation == 0: self.state.incr(PeerCounterNames.SENT_REFRESH) elif rr_msg.demarcation == 1 and self._common_conf.refresh_max_eor_time != 0: eor_timer = self._common_conf.refresh_max_eor_time self._spawn_after('end-of-rib-timer', eor_timer, self. _enqueue_eor_msg, rr_msg) LOG.debug('Enhanced RR max. EOR timer set.')
send_outgoing_route_refresh_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, rr_msg):\n assert rr_msg.type == BGP_MSG_ROUTE_REFRESH\n self._protocol.send(rr_msg)\n LOG.debug('RouteRefresh %s>> %s', self._neigh_conf.ip_add...
def x(self, outgoing_route): path = outgoing_route.path block, blocked_cause = self._apply_out_filter(path) nlri_str = outgoing_route.path.nlri.formatted_nlri_str sent_route = SentRoute(outgoing_route.path, self, block) self._adj_rib_out[nlri_str] = sent_route self._signal_bus.adj_rib_out_changed(self, sent_route) if not block: update_msg = self._construct_update(outgoing_route) self._protocol.send(update_msg) self.state.incr(PeerCounterNames.SENT_UPDATES) else: LOG.debug('prefix : %s is not sent by filter : %s', path.nlri, blocked_cause) if (not outgoing_route.path.is_withdraw and not outgoing_route. for_route_refresh): tm = self._core_service.table_manager tm.remember_sent_route(sent_route)
send_outgoing_route
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, outgoing_route):\n path = outgoing_route.path\n block, blocked_cause = self._apply_out_filter(path)\n nlri_str = outgoing_route.path.nlri.format...
def x(self, *route_families): if not self.in_established: raise ValueError( 'Peer not in established state to satisfy this request.') skip_validation = False if len(route_families) == 0: route_families = [] skip_validation = True for route_family in SUPPORTED_GLOBAL_RF: if self.is_mbgp_cap_valid(route_family): route_families.append(route_family) for route_family in route_families: if (skip_validation or route_family in SUPPORTED_GLOBAL_RF and self ._protocol.is_mbgp_cap_valid(route_family)): rr_req = BGPRouteRefresh(route_family.afi, route_family.safi) self.enque_outgoing_msg(rr_req) LOG.debug('Enqueued Route Refresh message to peer %s for rf: %s', self, route_family)
request_route_refresh
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *route_families):\n if not self.in_established:\n raise ValueError(\n 'Peer not in established state to satisfy this request.')\n ...
def x(self, path): route_family = path.route_family if self._neigh_conf.next_hop: next_hop = self._neigh_conf.next_hop else: next_hop = self.host_bind_ip if route_family == RF_IPv6_VPN: next_hop = self._ipv4_mapped_ipv6(next_hop) return next_hop
session_next_hop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, path):\n route_family = path.route_family\n if self._neigh_conf.next_hop:\n next_hop = self._neigh_conf.next_hop\n else:\n next_ho...
def x(self, as_path_attr, as4_path_attr): def x(li): lo = [] for l in li: if isinstance(l, list): lo.extend(l) elif isinstance(l, set): lo.append(l) else: pass return lo if as4_path_attr is None: return as_path_attr if as_path_attr.get_as_path_len() < as4_path_attr.get_as_path_len(): return as_path_attr org_as_path_list = _listify(as_path_attr.path_seg_list) as4_path_list = _listify(as4_path_attr.path_seg_list) org_as_path_list.reverse() as4_path_list.reverse() new_as_path_list = [] tmp_list = [] for as_path, as4_path in zip_longest(org_as_path_list, as4_path_list): if as4_path is None: if isinstance(as_path, int): tmp_list.insert(0, as_path) elif isinstance(as_path, set): if tmp_list: new_as_path_list.insert(0, tmp_list) tmp_list = [] new_as_path_list.insert(0, as_path) else: pass elif isinstance(as4_path, int): tmp_list.insert(0, as4_path) elif isinstance(as4_path, set): if tmp_list: new_as_path_list.insert(0, tmp_list) tmp_list = [] new_as_path_list.insert(0, as4_path) else: pass if tmp_list: new_as_path_list.insert(0, tmp_list) return bgp.BGPPathAttributeAsPath(new_as_path_list)
construct_as_path_attr
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, as_path_attr, as4_path_attr):\n\n def x(li):\n lo = []\n for l in li:\n if isinstance(l, list):\n lo.extend(l)...
def x(self, as_path_list): def x(n): if is_valid_old_asn(n): return n else: return bgp.AS_TRANS if self.is_four_octet_as_number_cap_valid(): return as_path_list, None else: new_as_path_list = [] for as_path in as_path_list: if isinstance(as_path, set): path_set = set() for as_num in as_path: path_set.add(_swap(as_num)) new_as_path_list.append(path_set) elif isinstance(as_path, list): path_list = list() for as_num in as_path: path_list.append(_swap(as_num)) new_as_path_list.append(path_list) else: pass if as_path_list == new_as_path_list: return as_path_list, None return new_as_path_list, as_path_list
trans_as_path
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, as_path_list):\n\n def x(n):\n if is_valid_old_asn(n):\n return n\n else:\n return bgp.AS_TRANS\n if self.is_fo...
def x(self, client_factory): if self._neigh_conf.enabled: self._connect_retry_event.set() while True: self._connect_retry_event.wait() self.pause(1.0) if self.state.bgp_state in (const.BGP_FSM_IDLE, const.BGP_FSM_ACTIVE): self.state.bgp_state = const.BGP_FSM_CONNECT if (self._neigh_conf.host_bind_ip and self._neigh_conf. host_bind_port): bind_addr = (self._neigh_conf.host_bind_ip, self. _neigh_conf.host_bind_port) else: bind_addr = None peer_address = self._neigh_conf.ip_address, self._neigh_conf.port if bind_addr: LOG.debug('%s trying to connect from%s to %s', self, bind_addr, peer_address) else: LOG.debug('%s trying to connect to %s', self, peer_address) tcp_conn_timeout = self._common_conf.tcp_conn_timeout try: password = self._neigh_conf.password self._connect_tcp(peer_address, client_factory, time_out= tcp_conn_timeout, bind_address=bind_addr, password=password ) except socket.error: self.state.bgp_state = const.BGP_FSM_ACTIVE if LOG.isEnabledFor(logging.DEBUG): LOG.debug( 'Socket could not be created in time (%s secs), reason %s' , tcp_conn_timeout, traceback.format_exc()) LOG.info('Will try to reconnect to %s after %s secs: %s', self._neigh_conf.ip_address, self._common_conf. bgp_conn_retry_time, self._connect_retry_event.is_set()) self.pause(self._common_conf.bgp_conn_retry_time)
connect_loop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, client_factory):\n if self._neigh_conf.enabled:\n self._connect_retry_event.set()\n while True:\n self._connect_retry_event.wait()\n ...
def x(self, proto): LOG.debug('Trying to bind protocol %s to peer %s', proto, self) if not isinstance(proto, BgpProtocol): raise ValueError( 'Currently only supports valid instances of `BgpProtocol`') if proto.state != const.BGP_FSM_OPEN_CONFIRM: raise ValueError('Only protocols in OpenConfirm state can be bound') is_bound = False if not self._protocol: self._set_protocol(proto) is_bound = True else: if self.state.bgp_state != const.BGP_FSM_IDLE: LOG.debug( 'Currently in %s state, hence will send collision Notification to close this protocol.' , self.state.bgp_state) self._send_collision_err_and_stop(proto) return assert proto.is_colliding(self._protocol ), 'Tried to bind second protocol that is not colliding with first/bound protocol' LOG.debug( 'Currently have one protocol in %s state and another protocol in %s state' , self._protocol.state, proto.state) first_protocol = self._protocol assert first_protocol.is_reactive and not proto.is_reactive or proto.is_reactive and not first_protocol.is_reactive reactive_proto = None proactive_proto = None if proto.is_reactive: reactive_proto = proto proactive_proto = self._protocol else: reactive_proto = self._protocol proactive_proto = proto LOG.debug('Pro-active/Active protocol %s', proactive_proto) if proto.is_local_router_id_greater(): self._set_protocol(proactive_proto) else: self._set_protocol(reactive_proto) if self._protocol is not proto: is_bound = False else: self._send_collision_err_and_stop(first_protocol) is_bound = True return is_bound
bind_protocol
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, proto):\n LOG.debug('Trying to bind protocol %s to peer %s', proto, self)\n if not isinstance(proto, BgpProtocol):\n raise ValueError(\n ...
def x(self): asnum = self.local_as if not is_valid_old_asn(asnum): asnum = bgp.AS_TRANS bgpid = self._common_conf.router_id holdtime = self._neigh_conf.hold_time def x(L): if isinstance(L, list): for i in range(len(L)): for e in flatten(L[i]): yield e else: yield L opts = list(flatten(list(self._neigh_conf.get_configured_capabilities() .values()))) open_msg = BGPOpen(my_as=asnum, bgp_identifier=bgpid, version=const. BGP_VERSION_NUM, hold_time=holdtime, opt_param=opts) return open_msg
create_open_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n asnum = self.local_as\n if not is_valid_old_asn(asnum):\n asnum = bgp.AS_TRANS\n bgpid = self._common_conf.router_id\n holdtime = s...
def x(self, update_msg): assert update_msg.type == BGP_MSG_UPDATE if self.state.bgp_state != const.BGP_FSM_ESTABLISHED: LOG.error('Received UPDATE message when not in ESTABLISHED state.') raise bgp.FiniteStateMachineError() mp_reach_attr = update_msg.get_path_attr(BGP_ATTR_TYPE_MP_REACH_NLRI) mp_unreach_attr = update_msg.get_path_attr(BGP_ATTR_TYPE_MP_UNREACH_NLRI) if not (mp_reach_attr or mp_unreach_attr): if not self.is_mpbgp_cap_valid(RF_IPv4_UC): LOG.error('Got UPDATE message with un-available afi/safi %s', RF_IPv4_UC) nlri_list = update_msg.nlri if len(nlri_list) > 0: aspath = update_msg.get_path_attr(BGP_ATTR_TYPE_AS_PATH) if not aspath: raise bgp.MissingWellKnown(BGP_ATTR_TYPE_AS_PATH) if self.check_first_as and self.is_ebgp_peer( ) and not aspath.has_matching_leftmost(self.remote_as): LOG.error('First AS check fails. Raise appropriate exception.') raise bgp.MalformedAsPath() origin = update_msg.get_path_attr(BGP_ATTR_TYPE_ORIGIN) if not origin: raise bgp.MissingWellKnown(BGP_ATTR_TYPE_ORIGIN) nexthop = update_msg.get_path_attr(BGP_ATTR_TYPE_NEXT_HOP) if not nexthop: raise bgp.MissingWellKnown(BGP_ATTR_TYPE_NEXT_HOP) return True if mp_unreach_attr: if not self.is_mpbgp_cap_valid(mp_unreach_attr.route_family): LOG.error( 'Got UPDATE message with un-available afi/safi for MP_UNREACH path attribute (non-negotiated afi/safi) %s' , mp_unreach_attr.route_family) if mp_reach_attr: if not self.is_mpbgp_cap_valid(mp_reach_attr.route_family): LOG.error( 'Got UPDATE message with un-available afi/safi for MP_UNREACH path attribute (non-negotiated afi/safi) %s' , mp_reach_attr.route_family) aspath = update_msg.get_path_attr(BGP_ATTR_TYPE_AS_PATH) if not aspath: raise bgp.MissingWellKnown(BGP_ATTR_TYPE_AS_PATH) if self.check_first_as and self.is_ebgp_peer( ) and not aspath.has_matching_leftmost(self.remote_as): LOG.error('First AS check fails. Raise appropriate exception.') raise bgp.MalformedAsPath() origin = update_msg.get_path_attr(BGP_ATTR_TYPE_ORIGIN) if not origin: raise bgp.MissingWellKnown(BGP_ATTR_TYPE_ORIGIN) if mp_reach_attr.route_family.safi in (subaddr_family.IP_FLOWSPEC, subaddr_family.VPN_FLOWSPEC): pass elif not mp_reach_attr.next_hop or mp_reach_attr.next_hop == self.host_bind_ip: LOG.error( 'Nexthop of received UPDATE msg. (%s) same as local interface address %s.' , mp_reach_attr.next_hop, self.host_bind_ip) return False return True
validate_update_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, update_msg):\n assert update_msg.type == BGP_MSG_UPDATE\n if self.state.bgp_state != const.BGP_FSM_ESTABLISHED:\n LOG.error('Received UPDATE...
def x(self, update_msg): assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED self.state.incr(PeerCounterNames.RECV_UPDATES) if not self._validate_update_msg(update_msg): LOG.error('UPDATE message was invalid, hence ignoring its routes.') return self._extract_and_reconstruct_as_path(update_msg) if self._is_looped_path_attrs(update_msg): return umsg_pattrs = update_msg.pathattr_map mp_reach_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_REACH_NLRI, None) if mp_reach_attr: self._extract_and_handle_mpbgp_new_paths(update_msg) mp_unreach_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_UNREACH_NLRI, None) if mp_unreach_attr: self._extract_and_handle_mpbgp_withdraws(mp_unreach_attr) nlri_list = update_msg.nlri if nlri_list: self._extract_and_handle_bgp4_new_paths(update_msg) withdraw_list = update_msg.withdrawn_routes if withdraw_list: self._extract_and_handle_bgp4_withdraws(withdraw_list)
handle_update_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, update_msg):\n assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED\n self.state.incr(PeerCounterNames.RECV_UPDATES)\n if not self._validate...
def x(self, update_msg): umsg_pattrs = update_msg.pathattr_map as_aggregator = umsg_pattrs.get(BGP_ATTR_TYPE_AGGREGATOR, None) as4_aggregator = umsg_pattrs.get(BGP_ATTR_TYPE_AS4_AGGREGATOR, None) if as_aggregator and as4_aggregator: if as_aggregator.as_number != bgp.AS_TRANS: update_msg.path_attributes.remove(as4_aggregator) as4_path = umsg_pattrs.pop(BGP_ATTR_TYPE_AS4_PATH, None) if as4_path: update_msg.path_attributes.remove(as4_path) else: update_msg.path_attributes.remove(as_aggregator) update_msg.path_attributes.remove(as4_aggregator) update_msg.path_attributes.append(bgp. BGPPathAttributeAggregator(as_number=as4_aggregator. as_number, addr=as4_aggregator.addr)) as_path = umsg_pattrs.get(BGP_ATTR_TYPE_AS_PATH, None) as4_path = umsg_pattrs.get(BGP_ATTR_TYPE_AS4_PATH, None) if as_path and as4_path: if as_path.get_as_path_len() < as4_path.get_as_path_len(): update_msg.path_attributes.remove(as4_path) else: update_msg.path_attributes.remove(as_path) update_msg.path_attributes.remove(as4_path) as_path = self._construct_as_path_attr(as_path, as4_path) update_msg.path_attributes.append(as_path)
extract_and_reconstruct_as_path
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n as_aggregator = umsg_pattrs.get(BGP_ATTR_TYPE_AGGREGATOR, None)\n as4_aggregator = umsg_p...
def x(self, update_msg): umsg_pattrs = update_msg.pathattr_map recv_open_msg = self.protocol.recv_open_msg aspath = umsg_pattrs.get(BGP_ATTR_TYPE_AS_PATH) if aspath is not None and aspath.has_local_as(self.local_as, max_count= self._common_conf.allow_local_as_in_count): LOG.error( 'AS_PATH on UPDATE message has loops. Ignoring this message: %s', update_msg) return originator_id = umsg_pattrs.get(BGP_ATTR_TYPE_ORIGINATOR_ID, None) if originator_id and recv_open_msg.bgp_identifier == originator_id: LOG.error( 'ORIGINATOR_ID on UPDATE message has loops. Ignoring this message: %s' , update_msg) return cluster_list = umsg_pattrs.get(BGP_ATTR_TYPE_CLUSTER_LIST, None) if cluster_list and self._common_conf.cluster_id in cluster_list.value: LOG.error( 'CLUSTER_LIST on UPDATE message has loops. Ignoring this message: %s' , update_msg) return
is_looped_path_attrs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n recv_open_msg = self.protocol.recv_open_msg\n aspath = umsg_pattrs.get(BGP_ATTR_TYPE_AS_P...
def x(self, update_msg): umsg_pattrs = update_msg.pathattr_map next_hop = update_msg.get_path_attr(BGP_ATTR_TYPE_NEXT_HOP).value msg_nlri_list = update_msg.nlri if not msg_nlri_list: LOG.debug('Update message did not have any new MP_REACH_NLRIs.') return for msg_nlri in msg_nlri_list: LOG.debug('NLRI: %s', msg_nlri) new_path = bgp_utils.create_path(self, msg_nlri, pattrs=umsg_pattrs, nexthop=next_hop) LOG.debug('Extracted paths from Update msg.: %s', new_path) block, blocked_cause = self._apply_in_filter(new_path) nlri_str = new_path.nlri.formatted_nlri_str received_route = ReceivedRoute(new_path, self, block) self._adj_rib_in[nlri_str] = received_route self._signal_bus.adj_rib_in_changed(self, received_route) if not block: tm = self._core_service.table_manager tm.learn_path(new_path) else: LOG.debug('prefix : %s is blocked by in-bound filter: %s', msg_nlri, blocked_cause) if msg_nlri_list: self.state.incr(PeerCounterNames.RECV_PREFIXES, incr_by=len( msg_nlri_list)) if self._neigh_conf.exceeds_max_prefix_allowed(self.state.get_count (PeerCounterNames.RECV_PREFIXES)): LOG.error('Max. prefix allowed for this neighbor exceeded.')
extract_and_handle_bgp4_new_paths
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n next_hop = update_msg.get_path_attr(BGP_ATTR_TYPE_NEXT_HOP).value\n msg_nlri_list = updat...
def x(self, withdraw_list): msg_rf = RF_IPv4_UC w_nlris = withdraw_list if not w_nlris: self._handle_eor(msg_rf) for w_nlri in w_nlris: w_path = bgp_utils.create_path(self, w_nlri, is_withdraw=True) block, blocked_cause = self._apply_in_filter(w_path) received_route = ReceivedRoute(w_path, self, block) nlri_str = w_nlri.formatted_nlri_str if nlri_str in self._adj_rib_in: del self._adj_rib_in[nlri_str] self._signal_bus.adj_rib_in_changed(self, received_route) if not block: tm = self._core_service.table_manager tm.learn_path(w_path) else: LOG.debug('prefix : %s is blocked by in-bound filter: %s', nlri_str, blocked_cause)
extract_and_handle_bgp4_withdraws
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, withdraw_list):\n msg_rf = RF_IPv4_UC\n w_nlris = withdraw_list\n if not w_nlris:\n self._handle_eor(msg_rf)\n for w_nlri in w_nlris:\...
def x(self, update_msg): umsg_pattrs = update_msg.pathattr_map mpreach_nlri_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_REACH_NLRI) assert mpreach_nlri_attr msg_rf = mpreach_nlri_attr.route_family if msg_rf not in SUPPORTED_GLOBAL_RF: LOG.info( 'Received route for route family %s which is not supported. Ignoring paths from this UPDATE: %s' % (msg_rf, update_msg)) return if msg_rf in (RF_IPv4_VPN, RF_IPv6_VPN): ext_comm_attr = umsg_pattrs.get(BGP_ATTR_TYPE_EXTENDED_COMMUNITIES) if not ext_comm_attr: LOG.info( 'Missing Extended Communities Attribute. Ignoring paths from this UPDATE: %s' , update_msg) return msg_rts = ext_comm_attr.rt_list if not msg_rts: LOG.info( 'Received route with no RTs. Ignoring paths in this UPDATE: %s' , update_msg) return interested_rts = self._core_service.global_interested_rts if not interested_rts.intersection(msg_rts): LOG.info( 'Received route with RT %s that is of no interest to any VRFs or Peers %s. Ignoring paths from this UPDATE: %s' , msg_rts, interested_rts, update_msg) return next_hop = mpreach_nlri_attr.next_hop msg_nlri_list = mpreach_nlri_attr.nlri if not msg_nlri_list: LOG.debug('Update message did not have any new MP_REACH_NLRIs.') return for msg_nlri in msg_nlri_list: new_path = bgp_utils.create_path(self, msg_nlri, pattrs=umsg_pattrs, nexthop=next_hop) LOG.debug('Extracted paths from Update msg.: %s', new_path) block, blocked_cause = self._apply_in_filter(new_path) received_route = ReceivedRoute(new_path, self, block) nlri_str = msg_nlri.formatted_nlri_str self._adj_rib_in[nlri_str] = received_route self._signal_bus.adj_rib_in_changed(self, received_route) if not block: if msg_rf == RF_RTC_UC and self._init_rtc_nlri_path is not None: self._init_rtc_nlri_path.append(new_path) else: tm = self._core_service.table_manager tm.learn_path(new_path) else: LOG.debug('prefix : %s is blocked by in-bound filter: %s', msg_nlri, blocked_cause) if msg_nlri_list: self.state.incr(PeerCounterNames.RECV_PREFIXES, incr_by=len( msg_nlri_list)) if self._neigh_conf.exceeds_max_prefix_allowed(self.state.get_count (PeerCounterNames.RECV_PREFIXES)): LOG.error('Max. prefix allowed for this neighbor exceeded.')
extract_and_handle_mpbgp_new_paths
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n mpreach_nlri_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_REACH_NLRI)\n assert mpreach_nlri_at...
def x(self, mp_unreach_attr): msg_rf = mp_unreach_attr.route_family if msg_rf not in SUPPORTED_GLOBAL_RF: LOG.info( 'Received route family %s is not supported. Ignoring withdraw routes on this UPDATE message.' , msg_rf) return w_nlris = mp_unreach_attr.withdrawn_routes if not w_nlris: self._handle_eor(msg_rf) for w_nlri in w_nlris: w_path = bgp_utils.create_path(self, w_nlri, is_withdraw=True) block, blocked_cause = self._apply_in_filter(w_path) received_route = ReceivedRoute(w_path, self, block) nlri_str = w_nlri.formatted_nlri_str if nlri_str in self._adj_rib_in: del self._adj_rib_in[nlri_str] self._signal_bus.adj_rib_in_changed(self, received_route) if not block: tm = self._core_service.table_manager tm.learn_path(w_path) else: LOG.debug('prefix : %s is blocked by in-bound filter: %s', w_nlri, blocked_cause)
extract_and_handle_mpbgp_withdraws
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, mp_unreach_attr):\n msg_rf = mp_unreach_attr.route_family\n if msg_rf not in SUPPORTED_GLOBAL_RF:\n LOG.info(\n 'Received route f...
def x(self, route_family): LOG.debug('Handling EOR for %s', route_family) if route_family == RF_RTC_UC: self._unschedule_sending_init_updates() tm = self._core_service.table_manager for rt_nlri in self._init_rtc_nlri_path: tm.learn_path(rt_nlri) self.pause(0) self._init_rtc_nlri_path = None
handle_eor
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, route_family):\n LOG.debug('Handling EOR for %s', route_family)\n if route_family == RF_RTC_UC:\n self._unschedule_sending_init_updates()\n ...
def x(self, msg): if msg.type == BGP_MSG_KEEPALIVE: if self.state.bgp_state == const.BGP_FSM_OPEN_CONFIRM: self.state.bgp_state = const.BGP_FSM_ESTABLISHED self._enqueue_init_updates() elif msg.type == BGP_MSG_UPDATE: assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED self._handle_update_msg(msg) elif msg.type == BGP_MSG_ROUTE_REFRESH: assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED self._handle_route_refresh_msg(msg) else: raise ValueError( 'Peer does not support handling of %s message during %s state' % (msg, self.state.bgp_state))
handle_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, msg):\n if msg.type == BGP_MSG_KEEPALIVE:\n if self.state.bgp_state == const.BGP_FSM_OPEN_CONFIRM:\n self.state.bgp_state = const.BG...
def x(self, sor): if self._protocol.is_enhanced_rr_cap_valid() and not sor.eor_sent: afi = sor.afi safi = sor.safi eor = BGPRouteRefresh(afi, safi, demarcation=2) self.enque_outgoing_msg(eor) sor.eor_sent = True
enqueue_eor_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sor):\n if self._protocol.is_enhanced_rr_cap_valid() and not sor.eor_sent:\n afi = sor.afi\n safi = sor.safi\n eor = BGPRouteRefr...
def x(self): def x(): LOG.debug('Scheduled queuing of initial Non-RTC UPDATEs') tm = self._core_service.table_manager self.comm_all_best_paths(tm.global_tables) self._sent_init_non_rtc_update = True self._rtc_eor_timer.stop() self._rtc_eor_timer = None self._sent_init_non_rtc_update = False self._rtc_eor_timer = self._create_timer(Peer.RTC_EOR_TIMER_NAME, _enqueue_non_rtc_init_updates) self._rtc_eor_timer.start(const.RTC_EOR_DEFAULT_TIME, now=False) LOG.debug('Scheduled sending of initial Non-RTC UPDATEs after: %s sec', const.RTC_EOR_DEFAULT_TIME)
schedule_sending_init_updates
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n\n def x():\n LOG.debug('Scheduled queuing of initial Non-RTC UPDATEs')\n tm = self._core_service.table_manager\n self.comm_all...
def x(self): LOG.debug( 'Un-scheduling sending of initial Non-RTC UPDATEs (init. UPDATEs already sent: %s)' , self._sent_init_non_rtc_update) if self._rtc_eor_timer: self._rtc_eor_timer.stop() self._rtc_eor_timer = None return True return False
unschedule_sending_init_updates
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n LOG.debug(\n 'Un-scheduling sending of initial Non-RTC UPDATEs (init. UPDATEs already sent: %s)'\n , self._sent_init_non_rtc_update)\...
def x(self): assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED if self.is_mbgp_cap_valid(RF_RTC_UC): self._peer_manager.comm_all_rt_nlris(self) self._schedule_sending_init_updates() else: tm = self._core_service.table_manager self.comm_all_best_paths(tm.global_tables)
enqueue_init_updates
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED\n if self.is_mbgp_cap_valid(RF_RTC_UC):\n self._peer_manager.comm_all_rt_nlris(s...
def x(self, global_tables): LOG.debug('Communicating current best path for all afi/safi except 1/132') for route_family, table in global_tables.items(): if route_family == RF_RTC_UC: continue if self.is_mbgp_cap_valid(route_family): for dest in table.values(): if dest.best_path: self.communicate_path(dest.best_path)
comm_all_best_paths
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, global_tables):\n LOG.debug('Communicating current best path for all afi/safi except 1/132')\n for route_family, table in global_tables.items():\n ...
def x(self, path): LOG.debug('Peer %s asked to communicate path', self) if not path: raise ValueError('Invalid path %s given.' % path) if not self.in_established(): LOG.debug( 'Skipping sending path as peer is not in ESTABLISHED state %s', path) return path_rf = path.route_family if not (self.is_mpbgp_cap_valid(path_rf) or path_rf in [RF_IPv4_UC, RF_IPv6_UC]): LOG.debug( 'Skipping sending path as %s route family is not available for this session' , path_rf) return if path_rf != RF_RTC_UC and self.is_mpbgp_cap_valid(RF_RTC_UC): rtfilter = self._peer_manager.curr_peer_rtfilter(self) if rtfilter and not path.has_rts_in(rtfilter): LOG.debug( 'Skipping sending path as rffilter %s and path rts %s have no RT in common' , rtfilter, path.get_rts()) return as_path = path.get_pattr(BGP_ATTR_TYPE_AS_PATH) if as_path and as_path.has_matching_leftmost(self.remote_as): LOG.debug('Skipping sending path as AS_PATH has peer AS %s', self. remote_as) return if self.is_route_server_client: outgoing_route = OutgoingRoute(path) self.enque_outgoing_msg(outgoing_route) if self._neigh_conf.multi_exit_disc: med_attr = path.get_pattr(BGP_ATTR_TYPE_MULTI_EXIT_DISC) if not med_attr: path = bgp_utils.clone_path_and_update_med_for_target_neighbor(path , self._neigh_conf.multi_exit_disc) if path.source is None: outgoing_route = OutgoingRoute(path) self.enque_outgoing_msg(outgoing_route) elif self != path.source or self.remote_as != path.source.remote_as: if (self.remote_as == self._core_service.asn and self.remote_as == path.source.remote_as and isinstance(path.source, Peer) and not path.source.is_route_reflector_client and not self. is_route_reflector_client): LOG.debug('Skipping sending iBGP route to iBGP peer %s AS %s', self.ip_address, self.remote_as) return comm_attr = path.get_pattr(BGP_ATTR_TYPE_COMMUNITIES) if comm_attr: comm_attr_na = comm_attr.has_comm_attr(BGPPathAttributeCommunities .NO_ADVERTISE) if comm_attr_na: LOG.debug( 'Path has community attr. NO_ADVERTISE = %s. Hence not advertising to peer' , comm_attr_na) return comm_attr_ne = comm_attr.has_comm_attr(BGPPathAttributeCommunities .NO_EXPORT) comm_attr_nes = comm_attr.has_comm_attr(BGPPathAttributeCommunities .NO_EXPORT_SUBCONFED) if (comm_attr_nes or comm_attr_ne ) and self.remote_as != self._core_service.asn: LOG.debug( 'Skipping sending UPDATE to peer: %s as per community attribute configuration' , self) return outgoing_route = OutgoingRoute(path) self.enque_outgoing_msg(outgoing_route) LOG.debug('Enqueued outgoing route %s for peer %s', outgoing_route. path.nlri, self)
communicate_path
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, path):\n LOG.debug('Peer %s asked to communicate path', self)\n if not path:\n raise ValueError('Invalid path %s given.' % path)\n if not...
def x(self): LOG.info('Connection to peer: %s established', self._neigh_conf. ip_address, extra={'resource_name': self._neigh_conf.name, 'resource_id': self._neigh_conf.id})
connection_made
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n LOG.info('Connection to peer: %s established', self._neigh_conf.\n ip_address, extra={'resource_name': self._neigh_conf.name,\n 'reso...
def x(self, reason): LOG.info( 'Connection to peer %s lost, reason: %s Resetting retry connect loop: %s' % (self._neigh_conf.ip_address, reason, self._connect_retry_event. is_set()), extra={'resource_name': self._neigh_conf.name, 'resource_id': self._neigh_conf.id}) self.state.bgp_state = const.BGP_FSM_IDLE if self._protocol: self._protocol.stop() self._protocol = None self._init_rtc_nlri_path = [] self._sent_init_non_rtc_update = False self.clear_outgoing_msg_list() self._unschedule_sending_init_updates() self.version_num += 1 self._peer_manager.on_peer_down(self) if self._neigh_conf.enabled: if not self._connect_retry_event.is_set(): self._connect_retry_event.set()
connection_lost
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, reason):\n LOG.info(\n 'Connection to peer %s lost, reason: %s Resetting retry connect loop: %s'\n % (self._neigh_conf.ip_address, reas...
def x(self, local_as, max_count=0): _count = 0 for as_path_seg in self.value: _count += list(as_path_seg).count(local_as) return _count > max_count
has_local_as
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, local_as, max_count=0):\n _count = 0\n for as_path_seg in self.value:\n _count += list(as_path_seg).count(local_as)\n return _count > max...
def x(self, remote_as): if not self.value or not remote_as: return False leftmost_seg = self.path_seg_list[0] if leftmost_seg and leftmost_seg[0] == remote_as: return True return False
has_matching_leftmost
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, remote_as):\n if not self.value or not remote_as:\n return False\n leftmost_seg = self.path_seg_list[0]\n if leftmost_seg and leftmost_se...
def x(cmd, redirect_output=True, check_exit_code=True): if redirect_output: stdout = subprocess.PIPE else: stdout = None proc = subprocess.Popen(cmd, cwd=ROOT, stdout=stdout) output = proc.communicate()[0] if check_exit_code and proc.returncode != 0: raise Exception('Command "%s" failed.\n%s' % (' '.join(cmd), output)) return output
run_command
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cmd, redirect_output=True, check_exit_code=True):\n if redirect_output:\n stdout = subprocess.PIPE\n else:\n stdout = None\n proc = subp...
def x(manager, table, record, column): row = row_by_name(manager, record, table) value = getattr(row, column, '') if isinstance(value, list) and len(value) == 1: value = value[0] return str(value)
get_column_value
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(manager, table, record, column):\n row = row_by_name(manager, record, table)\n value = getattr(row, column, '')\n if isinstance(value, list) and len(v...
def x(self, **kwargs): try: body = self.vtep_app.add_speaker(**kwargs) except DatapathNotFound as e: return e.to_response(status=404) return Response(content_type='application/json', body=json.dumps(body))
add_speaker
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.add_speaker(**kwargs)\n except DatapathNotFound as e:\n return e.to_response(status=404)\n ...
def x(self, **kwargs): try: body = self.vtep_app.get_speaker() except BGPSpeakerNotFound as e: return e.to_response(status=404) return Response(content_type='application/json', body=json.dumps(body))
get_speakers
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.get_speaker()\n except BGPSpeakerNotFound as e:\n return e.to_response(status=404)\n retu...
def x(self, **kwargs): try: body = self.vtep_app.del_network(**kwargs) except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound) as e: return e.to_response(status=404) return Response(content_type='application/json', body=json.dumps(body))
del_network
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.del_network(**kwargs)\n except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound) as e:\n r...
def x(self, **kwargs): try: body = self.vtep_app.del_client(**kwargs) except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound, ClientNotFound, ClientNotLocal) as e: return Response(body=str(e), status=500) return Response(content_type='application/json', body=json.dumps(body))
del_client
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.del_client(**kwargs)\n except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound,\n ClientNo...
def x(self, vrf_table, import_rts=None): if vrf_table.route_family == Vrf4Table.ROUTE_FAMILY: vpn_table = self.get_vpn4_table() elif vrf_table.route_family == Vrf6Table.ROUTE_FAMILY: vpn_table = self.get_vpn6_table() elif vrf_table.route_family == VrfEvpnTable.ROUTE_FAMILY: vpn_table = self.get_evpn_table() elif vrf_table.route_family == Vrf4FlowSpecTable.ROUTE_FAMILY: vpn_table = self.get_vpnv4fs_table() elif vrf_table.route_family == Vrf6FlowSpecTable.ROUTE_FAMILY: vpn_table = self.get_vpnv6fs_table() elif vrf_table.route_family == L2vpnFlowSpecTable.ROUTE_FAMILY: vpn_table = self.get_l2vpnfs_table() else: raise ValueError('Invalid VRF table route family: %s' % vrf_table. route_family) vrf_table.import_vpn_paths_from_table(vpn_table, import_rts)
import_all_vpn_paths_to_vrf
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, vrf_table, import_rts=None):\n if vrf_table.route_family == Vrf4Table.ROUTE_FAMILY:\n vpn_table = self.get_vpn4_table()\n elif vrf_table.rou...
def x(self, path): table = self.get_global_table_by_route_family(path.route_family) gpath_dest = table.insert(path) self._signal_bus.dest_changed(gpath_dest)
learn_path
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, path):\n table = self.get_global_table_by_route_family(path.route_family)\n gpath_dest = table.insert(path)\n self._signal_bus.dest_changed(gpat...
def x(self, sent_route): route_family = sent_route.path.route_family table = self.get_global_table_by_route_family(route_family) table.insert_sent_route(sent_route)
remember_sent_route
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sent_route):\n route_family = sent_route.path.route_family\n table = self.get_global_table_by_route_family(route_family)\n table.insert_sent_rou...
def x(self, new_global_rts, removed_global_rts): if new_global_rts: LOG.debug( 'Sending route_refresh to all neighbors that did not negotiate RTC capability.' ) pm = self._core_service.peer_manager pm.schedule_rr_to_non_rtc_peers() if removed_global_rts: LOG.debug( 'Cleaning up global tables as some interested RTs were removed') self._clean_global_uninteresting_paths()
on_interesting_rts_change
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, new_global_rts, removed_global_rts):\n if new_global_rts:\n LOG.debug(\n 'Sending route_refresh to all neighbors that did not negoti...
def x(self): vpn_table = self._global_tables.get(RF_IPv4_UC) if not vpn_table: vpn_table = Ipv4Table(self._core_service, self._signal_bus) self._global_tables[RF_IPv4_UC] = vpn_table self._tables[None, RF_IPv4_UC] = vpn_table return vpn_table
get_ipv4_table
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n vpn_table = self._global_tables.get(RF_IPv4_UC)\n if not vpn_table:\n vpn_table = Ipv4Table(self._core_service, self._signal_bus)\n ...
def x(self): vpn_table = self._global_tables.get(RF_IPv6_VPN) if not vpn_table: vpn_table = Vpnv6Table(self._core_service, self._signal_bus) self._global_tables[RF_IPv6_VPN] = vpn_table self._tables[None, RF_IPv6_VPN] = vpn_table return vpn_table
get_vpn6_table
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n vpn_table = self._global_tables.get(RF_IPv6_VPN)\n if not vpn_table:\n vpn_table = Vpnv6Table(self._core_service, self._signal_bus)\n ...
def x(self): vpn_table = self._global_tables.get(RF_IPv4_VPN) if not vpn_table: vpn_table = Vpnv4Table(self._core_service, self._signal_bus) self._global_tables[RF_IPv4_VPN] = vpn_table self._tables[None, RF_IPv4_VPN] = vpn_table return vpn_table
get_vpn4_table
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n vpn_table = self._global_tables.get(RF_IPv4_VPN)\n if not vpn_table:\n vpn_table = Vpnv4Table(self._core_service, self._signal_bus)\n ...
def x(self): evpn_table = self._global_tables.get(RF_L2_EVPN) if not evpn_table: evpn_table = EvpnTable(self._core_service, self._signal_bus) self._global_tables[RF_L2_EVPN] = evpn_table self._tables[None, RF_L2_EVPN] = evpn_table return evpn_table
get_evpn_table
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n evpn_table = self._global_tables.get(RF_L2_EVPN)\n if not evpn_table:\n evpn_table = EvpnTable(self._core_service, self._signal_bus)\n ...
def x(self): rtc_table = self._global_tables.get(RF_RTC_UC) if not rtc_table: rtc_table = RtcTable(self._core_service, self._signal_bus) self._global_tables[RF_RTC_UC] = rtc_table self._tables[None, RF_RTC_UC] = rtc_table return rtc_table
get_rtc_table
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n rtc_table = self._global_tables.get(RF_RTC_UC)\n if not rtc_table:\n rtc_table = RtcTable(self._core_service, self._signal_bus)\n ...
def x(self): ipv4fs_table = self._global_tables.get(RF_IPv4_FLOWSPEC) if not ipv4fs_table: ipv4fs_table = IPv4FlowSpecTable(self._core_service, self._signal_bus) self._global_tables[RF_IPv4_FLOWSPEC] = ipv4fs_table self._tables[None, RF_IPv4_FLOWSPEC] = ipv4fs_table return ipv4fs_table
get_ipv4fs_table
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n ipv4fs_table = self._global_tables.get(RF_IPv4_FLOWSPEC)\n if not ipv4fs_table:\n ipv4fs_table = IPv4FlowSpecTable(self._core_service, se...