source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(service):
frame = inspect.currentframe()
m_name = frame.f_back.f_globals['__name__']
m = sys.modules[m_name]
m._SERVICE_NAME = service
| register_service | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(service):\n frame = inspect.currentframe()\n m_name = frame.f_back.f_globals['__name__']\n m = sys.modules[m_name]\n m._SERVICE_NAME = service\n",
... |
def x(neigh_ip_address):
neigh_conf = CORE_MANAGER.neighbors_conf.get_neighbor_conf(neigh_ip_address
)
if not neigh_conf:
raise RuntimeConfigError(desc=
'No Neighbor configuration with IP address %s' % neigh_ip_address)
assert isinstance(neigh_conf, NeighborConf)
return neigh_conf
| get_neighbor_conf | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(neigh_ip_address):\n neigh_conf = CORE_MANAGER.neighbors_conf.get_neighbor_conf(neigh_ip_address\n )\n if not neigh_conf:\n raise RuntimeCo... |
def x(neigh_ip_address):
core = CORE_MANAGER.get_core_service()
peer = core.peer_manager.get_by_addr(neigh_ip_address)
return peer.in_filters
| get_neighbor_in_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(neigh_ip_address):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_address)\n return peer.in_filters\n",
... |
def x(neigh_ip_address, filters):
core = CORE_MANAGER.get_core_service()
peer = core.peer_manager.get_by_addr(neigh_ip_address)
peer.in_filters = filters
return True
| set_neighbor_in_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(neigh_ip_address, filters):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_address)\n peer.in_filters = filt... |
def x(neigh_ip_address):
core = CORE_MANAGER.get_core_service()
ret = core.peer_manager.get_by_addr(neigh_ip_address).out_filters
return ret
| get_neighbor_out_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(neigh_ip_address):\n core = CORE_MANAGER.get_core_service()\n ret = core.peer_manager.get_by_addr(neigh_ip_address).out_filters\n return ret\n",
"... |
def x(neigh_ip_address, filters):
core = CORE_MANAGER.get_core_service()
peer = core.peer_manager.get_by_addr(neigh_ip_address)
peer.out_filters = filters
return True
| set_neighbor_out_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(neigh_ip_address, filters):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_address)\n peer.out_filters = fil... |
def x(neigh_ip_address, at_maps, route_dist=None, route_family=VRF_RF_IPV4):
core = CORE_MANAGER.get_core_service()
peer = core.peer_manager.get_by_addr(neigh_ip_address)
at_maps_key = const.ATTR_MAPS_LABEL_DEFAULT
at_maps_dict = {}
if route_dist is not None:
vrf_conf = CORE_MANAGER.vrfs_conf.get_vrf_conf(route_dist, route_family
)
if vrf_conf:
at_maps_key = ':'.join([route_dist, route_family])
else:
raise RuntimeConfigError(desc='No VrfConf with rd %s' % route_dist)
at_maps_dict[const.ATTR_MAPS_LABEL_KEY] = at_maps_key
at_maps_dict[const.ATTR_MAPS_VALUE] = at_maps
peer.attribute_maps = at_maps_dict
return True
| set_neighbor_attribute_map | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(neigh_ip_address, at_maps, route_dist=None, route_family=VRF_RF_IPV4):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(ne... |
def x(neigh_ip_address, route_dist=None, route_family=VRF_RF_IPV4):
core = CORE_MANAGER.get_core_service()
peer = core.peer_manager.get_by_addr(neigh_ip_address)
at_maps_key = const.ATTR_MAPS_LABEL_DEFAULT
if route_dist is not None:
at_maps_key = ':'.join([route_dist, route_family])
at_maps = peer.attribute_maps.get(at_maps_key)
if at_maps:
return at_maps.get(const.ATTR_MAPS_ORG_KEY)
else:
return []
| get_neighbor_attribute_map | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(neigh_ip_address, route_dist=None, route_family=VRF_RF_IPV4):\n core = CORE_MANAGER.get_core_service()\n peer = core.peer_manager.get_by_addr(neigh_ip_ad... |
def x(**kwargs):
def x(func):
_CALL_REGISTRY[kwargs.get(API_SYM, func.__name__)] = func
return func
return decorator
| register | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(**kwargs):\n\n def x(func):\n _CALL_REGISTRY[kwargs.get(API_SYM, func.__name__)] = func\n return func\n return decorator\n",
"role": "u... |
def x(symbol, **kwargs):
LOG.info('API method %s called with args: %s', symbol, str(kwargs))
from . import all
if not is_call_registered(symbol):
message = 'Did not find any method registered by symbol %s' % symbol
raise MethodNotFound(message)
if not symbol.startswith('core') and not CORE_MANAGER.started:
raise CoreNotStarted(desc='CoreManager is not active.')
call = get_call(symbol)
try:
return call(**kwargs)
except BGPSException as r:
LOG.error(traceback.format_exc())
raise r
except Exception as e:
LOG.error(traceback.format_exc())
raise ApiException(desc=str(e))
| call | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(symbol, **kwargs):\n LOG.info('API method %s called with args: %s', symbol, str(kwargs))\n from . import all\n if not is_call_registered(symbol):\n ... |
def x(mod, type_, code):
_, c_name = _get_error_names(mod, type_, code)
return '%s(%d)' % (c_name, code)
| error_code_to_str | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(mod, type_, code):\n _, c_name = _get_error_names(mod, type_, code)\n return '%s(%d)' % (c_name, code)\n",
"role": "user"
},
{
"content": "er... |
def x(mod, type_, code):
t_name, c_name = _get_error_names(mod, type_, code)
return {'type': '%s(%d)' % (t_name, type_), 'code': '%s(%d)' % (c_name,
code)}
| error_to_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(mod, type_, code):\n t_name, c_name = _get_error_names(mod, type_, code)\n return {'type': '%s(%d)' % (t_name, type_), 'code': '%s(%d)' % (c_name,\n ... |
def x(self):
cloned_setting = self._settings.copy()
cloned_setting[IMPORT_RTS] = self.import_rts
cloned_setting[EXPORT_RTS] = self.export_rts
cloned_setting[SITE_OF_ORIGINS] = self.soo_list
return cloned_setting
| settings | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n cloned_setting = self._settings.copy()\n cloned_setting[IMPORT_RTS] = self.import_rts\n cloned_setting[EXPORT_RTS] = self.export_rts\n clo... |
def x(self, **kwargs):
super(VrfConf, self).update(**kwargs)
vrf_id = kwargs.get(ConfWithId.ID)
vrf_rd = kwargs.get(ROUTE_DISTINGUISHER)
vrf_rf = kwargs.get(VRF_RF)
if (vrf_id != self.id or vrf_rd != self.route_dist or vrf_rf != self.
route_family):
raise ConfigValueError(desc=
'id/route-distinguisher/route-family do not match configured value.'
)
new_imp_rts, old_imp_rts = self._update_import_rts(**kwargs)
export_rts_changed = self._update_export_rts(**kwargs)
soos_list_changed = self._update_soo_list(**kwargs)
med_changed = self._update_med(**kwargs)
re_export_needed = export_rts_changed or soos_list_changed or med_changed
import_maps = kwargs.get(IMPORT_MAPS, [])
re_import_needed = self._update_importmaps(import_maps)
if (new_imp_rts is not None or old_imp_rts is not None or
re_export_needed or re_import_needed):
evt_value = (new_imp_rts, old_imp_rts, import_maps,
re_export_needed, re_import_needed)
self._notify_listeners(VrfConf.VRF_CHG_EVT, evt_value)
return True
| update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n super(VrfConf, self).update(**kwargs)\n vrf_id = kwargs.get(ConfWithId.ID)\n vrf_rd = kwargs.get(ROUTE_DISTINGUISHER)\n vrf_rf =... |
def x(self, route_dist=None, vrf_id=None, vrf_rf=None):
if route_dist is None and vrf_id is None:
raise RuntimeConfigError(desc='To delete supply route_dist or id.')
vrf_rfs = SUPPORTED_VRF_RF
if vrf_rf:
vrf_rfs = vrf_rf
removed_vrf_confs = []
for route_family in vrf_rfs:
if route_dist is not None:
rd_rf_id = VrfConf.create_rd_rf_id(route_dist, route_family)
vrf_conf = self._vrfs_by_rd_rf.pop(rd_rf_id, None)
if vrf_conf:
self._vrfs_by_id.pop(vrf_conf.id, None)
removed_vrf_confs.append(vrf_conf)
else:
vrf_conf = self._vrfs_by_id.pop(vrf_id, None)
if vrf_conf:
self._vrfs_by_rd_rf.pop(vrf_conf.rd_rd_id, None)
removed_vrf_confs.append(vrf_conf)
for vrf_conf in removed_vrf_confs:
self._notify_listeners(VrfsConf.REMOVE_VRF_CONF_EVT, vrf_conf)
return removed_vrf_confs
| remove_vrf_conf | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_dist=None, vrf_id=None, vrf_rf=None):\n if route_dist is None and vrf_id is None:\n raise RuntimeConfigError(desc='To delete supply route... |
def x(self, evt):
msg = evt.msg
dpid = msg.datapath.id
req_pkt = packet.Packet(msg.data)
req_igmp = req_pkt.get_protocol(igmp.igmp)
if req_igmp:
if self._querier.dpid == dpid:
self._querier.packet_in_handler(req_igmp, msg)
else:
self._snooper.packet_in_handler(req_pkt, req_igmp, msg)
else:
self.send_event_to_observers(EventPacketIn(msg))
| packet_in_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, evt):\n msg = evt.msg\n dpid = msg.datapath.id\n req_pkt = packet.Packet(msg.data)\n req_igmp = req_pkt.get_protocol(igmp.igmp)\n if req_i... |
def x(self, evt):
datapath = evt.datapath
assert datapath is not None
if datapath.id == self._querier.dpid:
if evt.state == MAIN_DISPATCHER:
self._querier.start_loop(datapath)
elif evt.state == DEAD_DISPATCHER:
self._querier.stop_loop()
| state_change_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, evt):\n datapath = evt.datapath\n assert datapath is not None\n if datapath.id == self._querier.dpid:\n if evt.state == MAIN_DISPATCHER:\... |
def x(self, datapath, actions, in_port, dst, src=None):
set_flow = self._set_flow_func.get(datapath.ofproto.OFP_VERSION)
assert set_flow
set_flow(datapath, actions, in_port, dst, src)
| set_flow_entry | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, datapath, actions, in_port, dst, src=None):\n set_flow = self._set_flow_func.get(datapath.ofproto.OFP_VERSION)\n assert set_flow\n set_flow(data... |
def x(self, datapath, in_port, dst, src=None):
del_flow = self._del_flow_func.get(datapath.ofproto.OFP_VERSION)
assert del_flow
del_flow(datapath, in_port, dst, src)
| del_flow_entry | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, datapath, in_port, dst, src=None):\n del_flow = self._del_flow_func.get(datapath.ofproto.OFP_VERSION)\n assert del_flow\n del_flow(datapath, in_... |
def x(self, datapath, data, in_port, actions):
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
out = parser.OFPPacketOut(datapath=datapath, buffer_id=ofproto.
OFP_NO_BUFFER, data=data, in_port=in_port, actions=actions)
datapath.send_msg(out)
| do_packet_out | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, datapath, data, in_port, actions):\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n out = parser.OFPPacketOut(datapath=datapath... |
def x(self, ip_text):
if ip_text is None:
return None
assert isinstance(ip_text, str)
return struct.unpack('!I', addrconv.ipv4.text_to_bin(ip_text))[0]
| ipv4_text_to_int | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ip_text):\n if ip_text is None:\n return None\n assert isinstance(ip_text, str)\n return struct.unpack('!I', addrconv.ipv4.text_to_bin(ip... |
def x(self, dpid, server_port):
self.dpid = dpid
self.server_port = server_port
if self._querier_thread:
hub.kill(self._querier_thread)
self._querier_thread = None
| set_querier_mode | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, server_port):\n self.dpid = dpid\n self.server_port = server_port\n if self._querier_thread:\n hub.kill(self._querier_thread)\n ... |
def x(self, req_igmp, msg):
ofproto = msg.datapath.ofproto
if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:
in_port = msg.in_port
else:
in_port = msg.match['in_port']
if (igmp.IGMP_TYPE_REPORT_V1 == req_igmp.msgtype or igmp.
IGMP_TYPE_REPORT_V2 == req_igmp.msgtype):
self._do_report(req_igmp, in_port, msg)
elif igmp.IGMP_TYPE_LEAVE == req_igmp.msgtype:
self._do_leave(req_igmp, in_port, msg)
| packet_in_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req_igmp, msg):\n ofproto = msg.datapath.ofproto\n if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:\n in_port = msg.in_port\n else:\n ... |
def x(self, datapath):
self._datapath = datapath
self._querier_thread = hub.spawn(self._send_query)
self.logger.info('started a querier.')
| start_loop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, datapath):\n self._datapath = datapath\n self._querier_thread = hub.spawn(self._send_query)\n self.logger.info('started a querier.')\n",
"ro... |
def x(self):
hub.kill(self._querier_thread)
self._querier_thread = None
self._datapath = None
self.logger.info('stopped a querier.')
| stop_loop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n hub.kill(self._querier_thread)\n self._querier_thread = None\n self._datapath = None\n self.logger.info('stopped a querier.')\n",
"rol... |
def x(self):
timeout = 60
ofproto = self._datapath.ofproto
parser = self._datapath.ofproto_parser
if ofproto_v1_0.OFP_VERSION == ofproto.OFP_VERSION:
send_port = ofproto.OFPP_NONE
else:
send_port = ofproto.OFPP_ANY
res_igmp = igmp.igmp(msgtype=igmp.IGMP_TYPE_QUERY, maxresp=igmp.
QUERY_RESPONSE_INTERVAL * 10, csum=0, address='0.0.0.0')
res_ipv4 = ipv4.ipv4(total_length=len(ipv4.ipv4()) + len(res_igmp),
proto=inet.IPPROTO_IGMP, ttl=1, src='0.0.0.0', dst=igmp.
MULTICAST_IP_ALL_HOST)
res_ether = ethernet.ethernet(dst=igmp.MULTICAST_MAC_ALL_HOST, src=self
._datapath.ports[ofproto.OFPP_LOCAL].hw_addr, ethertype=ether.
ETH_TYPE_IP)
res_pkt = packet.Packet()
res_pkt.add_protocol(res_ether)
res_pkt.add_protocol(res_ipv4)
res_pkt.add_protocol(res_igmp)
res_pkt.serialize()
flood = [parser.OFPActionOutput(ofproto.OFPP_FLOOD)]
while True:
for status in self._mcast.values():
for port in status.keys():
status[port] = False
self._do_packet_out(self._datapath, res_pkt.data, send_port, flood)
hub.sleep(igmp.QUERY_RESPONSE_INTERVAL)
del_groups = []
for group, status in self._mcast.items():
del_ports = []
actions = []
for port in status.keys():
if not status[port]:
del_ports.append(port)
else:
actions.append(parser.OFPActionOutput(port))
if len(actions) and len(del_ports):
self._set_flow_entry(self._datapath, actions, self.
server_port, group)
if not len(actions):
self._del_flow_entry(self._datapath, self.server_port, group)
del_groups.append(group)
if len(del_ports):
for port in del_ports:
self._del_flow_entry(self._datapath, port, group)
for port in del_ports:
del status[port]
for group in del_groups:
del self._mcast[group]
rest_time = timeout - igmp.QUERY_RESPONSE_INTERVAL
hub.sleep(rest_time)
| send_query | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n timeout = 60\n ofproto = self._datapath.ofproto\n parser = self._datapath.ofproto_parser\n if ofproto_v1_0.OFP_VERSION == ofproto.OFP_VERS... |
def x(self, report, in_port, msg):
datapath = msg.datapath
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:
size = 65535
else:
size = ofproto.OFPCML_MAX
update = False
self._mcast.setdefault(report.address, {})
if in_port not in self._mcast[report.address]:
update = True
self._mcast[report.address][in_port] = True
if update:
actions = []
for port in self._mcast[report.address]:
actions.append(parser.OFPActionOutput(port))
self._set_flow_entry(datapath, actions, self.server_port, report.
address)
self._set_flow_entry(datapath, [parser.OFPActionOutput(ofproto.
OFPP_CONTROLLER, size)], in_port, report.address)
| do_report | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, report, in_port, msg):\n datapath = msg.datapath\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n if ofproto.OFP_VERSION == ... |
def x(self, leave, in_port, msg):
datapath = msg.datapath
parser = datapath.ofproto_parser
self._mcast.setdefault(leave.address, {})
if in_port in self._mcast[leave.address]:
self._del_flow_entry(datapath, in_port, leave.address)
del self._mcast[leave.address][in_port]
actions = []
for port in self._mcast[leave.address]:
actions.append(parser.OFPActionOutput(port))
if len(actions):
self._set_flow_entry(datapath, actions, self.server_port, leave
.address)
else:
self._del_flow_entry(datapath, self.server_port, leave.address)
| do_leave | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, leave, in_port, msg):\n datapath = msg.datapath\n parser = datapath.ofproto_parser\n self._mcast.setdefault(leave.address, {})\n if in_port i... |
def x(self):
self.logger.propagate = False
hdl = logging.StreamHandler()
fmt_str = '[querier][%(levelname)s] %(message)s'
hdl.setFormatter(logging.Formatter(fmt_str))
self.logger.addHandler(hdl)
| set_logger | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.logger.propagate = False\n hdl = logging.StreamHandler()\n fmt_str = '[querier][%(levelname)s] %(message)s'\n hdl.setFormatter(loggin... |
def x(self, req_pkt, req_igmp, msg):
dpid = msg.datapath.id
ofproto = msg.datapath.ofproto
if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:
in_port = msg.in_port
else:
in_port = msg.match['in_port']
log = 'SW=%s PORT=%d IGMP received. ' % (dpid_to_str(dpid), in_port)
self.logger.debug(str(req_igmp))
if igmp.IGMP_TYPE_QUERY == req_igmp.msgtype:
self.logger.info(log + '[QUERY]')
req_ipv4, = req_pkt.get_protocols(ipv4.ipv4)
req_eth, = req_pkt.get_protocols(ethernet.ethernet)
self._do_query(req_igmp, req_ipv4, req_eth, in_port, msg)
elif igmp.IGMP_TYPE_REPORT_V1 == req_igmp.msgtype or igmp.IGMP_TYPE_REPORT_V2 == req_igmp.msgtype:
self.logger.info(log + '[REPORT]')
self._do_report(req_igmp, in_port, msg)
elif igmp.IGMP_TYPE_LEAVE == req_igmp.msgtype:
self.logger.info(log + '[LEAVE]')
self._do_leave(req_igmp, in_port, msg)
elif igmp.IGMP_TYPE_REPORT_V3 == req_igmp.msgtype:
self.logger.info(log + 'V3 is not supported yet.')
self._do_flood(in_port, msg)
else:
self.logger.info(log + '[unknown type:%d]', req_igmp.msgtype)
self._do_flood(in_port, msg)
| packet_in_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req_pkt, req_igmp, msg):\n dpid = msg.datapath.id\n ofproto = msg.datapath.ofproto\n if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:\n ... |
def x(self, query, iph, eth, in_port, msg):
datapath = msg.datapath
dpid = datapath.id
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
self._to_querier[dpid] = {'port': in_port, 'ip': iph.src, 'mac': eth.src}
timeout = igmp.QUERY_RESPONSE_INTERVAL
if query.maxresp:
timeout = query.maxresp / 10
self._to_hosts.setdefault(dpid, {})
if query.address == '0.0.0.0':
for group in self._to_hosts[dpid].values():
group['replied'] = False
group['leave'] = None
else:
group = self._to_hosts[dpid].get(query.address)
if group:
group['replied'] = False
group['leave'] = None
actions = [parser.OFPActionOutput(ofproto.OFPP_FLOOD)]
self._do_packet_out(datapath, msg.data, in_port, actions)
hub.spawn(self._do_timeout_for_query, timeout, datapath)
| do_query | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, query, iph, eth, in_port, msg):\n datapath = msg.datapath\n dpid = datapath.id\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parse... |
def x(self, report, in_port, msg):
datapath = msg.datapath
dpid = datapath.id
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:
size = 65535
else:
size = ofproto.OFPCML_MAX
outport = None
value = self._to_querier.get(dpid)
if value:
outport = value['port']
self._to_hosts.setdefault(dpid, {})
if not self._to_hosts[dpid].get(report.address):
self._send_event(EventMulticastGroupStateChanged(MG_GROUP_ADDED,
report.address, outport, []))
self._to_hosts[dpid].setdefault(report.address, {'replied': False,
'leave': None, 'ports': {}})
if not self._to_hosts[dpid][report.address]['ports'].get(in_port):
self._to_hosts[dpid][report.address]['ports'][in_port] = {'out':
False, 'in': False}
self._set_flow_entry(datapath, [parser.OFPActionOutput(ofproto.
OFPP_CONTROLLER, size)], in_port, report.address)
if not self._to_hosts[dpid][report.address]['ports'][in_port]['out']:
self._to_hosts[dpid][report.address]['ports'][in_port]['out'] = True
if not outport:
self.logger.info('no querier exists.')
return
if not self._to_hosts[dpid][report.address]['ports'][in_port]['in']:
actions = []
ports = []
for port in self._to_hosts[dpid][report.address]['ports']:
actions.append(parser.OFPActionOutput(port))
ports.append(port)
self._send_event(EventMulticastGroupStateChanged(MG_MEMBER_CHANGED,
report.address, outport, ports))
self._set_flow_entry(datapath, actions, outport, report.address)
self._to_hosts[dpid][report.address]['ports'][in_port]['in'] = True
if not self._to_hosts[dpid][report.address]['replied']:
actions = [parser.OFPActionOutput(outport, size)]
self._do_packet_out(datapath, msg.data, in_port, actions)
self._to_hosts[dpid][report.address]['replied'] = True
| do_report | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, report, in_port, msg):\n datapath = msg.datapath\n dpid = datapath.id\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n if... |
def x(self, leave, in_port, msg):
datapath = msg.datapath
dpid = datapath.id
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
if not self._to_querier.get(dpid):
self.logger.info('no querier exists.')
return
self._to_hosts.setdefault(dpid, {})
self._to_hosts[dpid].setdefault(leave.address, {'replied': False,
'leave': None, 'ports': {}})
self._to_hosts[dpid][leave.address]['leave'] = msg
self._to_hosts[dpid][leave.address]['ports'][in_port] = {'out': False,
'in': False}
timeout = igmp.LAST_MEMBER_QUERY_INTERVAL
res_igmp = igmp.igmp(msgtype=igmp.IGMP_TYPE_QUERY, maxresp=timeout * 10,
csum=0, address=leave.address)
res_ipv4 = ipv4.ipv4(total_length=len(ipv4.ipv4()) + len(res_igmp),
proto=inet.IPPROTO_IGMP, ttl=1, src=self._to_querier[dpid]['ip'],
dst=igmp.MULTICAST_IP_ALL_HOST)
res_ether = ethernet.ethernet(dst=igmp.MULTICAST_MAC_ALL_HOST, src=self
._to_querier[dpid]['mac'], ethertype=ether.ETH_TYPE_IP)
res_pkt = packet.Packet()
res_pkt.add_protocol(res_ether)
res_pkt.add_protocol(res_ipv4)
res_pkt.add_protocol(res_igmp)
res_pkt.serialize()
actions = [parser.OFPActionOutput(ofproto.OFPP_IN_PORT)]
self._do_packet_out(datapath, res_pkt.data, in_port, actions)
hub.spawn(self._do_timeout_for_leave, timeout, datapath, leave.address,
in_port)
| do_leave | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, leave, in_port, msg):\n datapath = msg.datapath\n dpid = datapath.id\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n if ... |
def x(self, in_port, msg):
datapath = msg.datapath
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
actions = [parser.OFPActionOutput(ofproto.OFPP_FLOOD)]
self._do_packet_out(datapath, msg.data, in_port, actions)
| do_flood | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, in_port, msg):\n datapath = msg.datapath\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n actions = [parser.OFPActionOutput(... |
def x(self, timeout, datapath):
dpid = datapath.id
hub.sleep(timeout)
outport = self._to_querier[dpid]['port']
remove_dsts = []
for dst in self._to_hosts[dpid]:
if not self._to_hosts[dpid][dst]['replied']:
self._remove_multicast_group(datapath, outport, dst)
remove_dsts.append(dst)
for dst in remove_dsts:
del self._to_hosts[dpid][dst]
| do_timeout_for_query | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout, datapath):\n dpid = datapath.id\n hub.sleep(timeout)\n outport = self._to_querier[dpid]['port']\n remove_dsts = []\n for dst in s... |
def x(self, timeout, datapath, dst, in_port):
parser = datapath.ofproto_parser
dpid = datapath.id
hub.sleep(timeout)
outport = self._to_querier[dpid]['port']
if self._to_hosts[dpid][dst]['ports'][in_port]['out']:
return
del self._to_hosts[dpid][dst]['ports'][in_port]
self._del_flow_entry(datapath, in_port, dst)
actions = []
ports = []
for port in self._to_hosts[dpid][dst]['ports']:
actions.append(parser.OFPActionOutput(port))
ports.append(port)
if len(actions):
self._send_event(EventMulticastGroupStateChanged(MG_MEMBER_CHANGED,
dst, outport, ports))
self._set_flow_entry(datapath, actions, outport, dst)
self._to_hosts[dpid][dst]['leave'] = None
else:
self._remove_multicast_group(datapath, outport, dst)
del self._to_hosts[dpid][dst]
| do_timeout_for_leave | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout, datapath, dst, in_port):\n parser = datapath.ofproto_parser\n dpid = datapath.id\n hub.sleep(timeout)\n outport = self._to_querier[d... |
def x(self, datapath, outport, dst):
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
dpid = datapath.id
self._send_event(EventMulticastGroupStateChanged(MG_GROUP_REMOVED, dst,
outport, []))
self._del_flow_entry(datapath, outport, dst)
for port in self._to_hosts[dpid][dst]['ports']:
self._del_flow_entry(datapath, port, dst)
leave = self._to_hosts[dpid][dst]['leave']
if leave:
if ofproto.OFP_VERSION == ofproto_v1_0.OFP_VERSION:
in_port = leave.in_port
else:
in_port = leave.match['in_port']
actions = [parser.OFPActionOutput(outport)]
self._do_packet_out(datapath, leave.data, in_port, actions)
| remove_multicast_group | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, datapath, outport, dst):\n ofproto = datapath.ofproto\n parser = datapath.ofproto_parser\n dpid = datapath.id\n self._send_event(EventMultica... |
def x(self):
curr_rtc_as_set = self._neighbors_conf.rtc_as_set
curr_rtc_as_set.add(self._core_service.asn)
removed_rtc_as_set = self._all_rtc_as_set - curr_rtc_as_set
new_rtc_as_set = curr_rtc_as_set - self._all_rtc_as_set
self._all_rtc_as_set = curr_rtc_as_set
for new_rtc_as in new_rtc_as_set:
for import_rt in self._all_vrfs_import_rts_set:
self._add_rt_nlri_for_as(new_rtc_as, import_rt)
for removed_rtc_as in removed_rtc_as_set:
for import_rt in self._all_vrfs_import_rts_set:
self._add_rt_nlri_for_as(removed_rtc_as, import_rt, is_withdraw
=True)
| update_rtc_as_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n curr_rtc_as_set = self._neighbors_conf.rtc_as_set\n curr_rtc_as_set.add(self._core_service.asn)\n removed_rtc_as_set = self._all_rtc_as_set -... |
def x(self):
current_conf_import_rts = set()
for vrf in self._vrfs_conf.vrf_confs:
current_conf_import_rts.update(vrf.import_rts)
removed_rts = self._all_vrfs_import_rts_set - current_conf_import_rts
new_rts = current_conf_import_rts - self._all_vrfs_import_rts_set
self._all_vrfs_import_rts_set = current_conf_import_rts
for new_rt in new_rts:
self.add_rt_nlri(new_rt)
for removed_rt in removed_rts:
self.add_rt_nlri(removed_rt, is_withdraw=True)
| update_local_rt_nlris | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n current_conf_import_rts = set()\n for vrf in self._vrfs_conf.vrf_confs:\n current_conf_import_rts.update(vrf.import_rts)\n removed_rts... |
def x(self):
interested_rts = set()
for rtfilter in self._peer_to_rtfilter_map.values():
interested_rts.update(rtfilter)
interested_rts.update(self._vrfs_conf.vrf_interested_rts)
interested_rts.add(RouteTargetMembershipNLRI.DEFAULT_RT)
interested_rts.remove(RouteTargetMembershipNLRI.DEFAULT_RT)
return interested_rts
| compute_global_interested_rts | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n interested_rts = set()\n for rtfilter in self._peer_to_rtfilter_map.values():\n interested_rts.update(rtfilter)\n interested_rts.updat... |
def x(self):
prev_global_rts = self._global_interested_rts
curr_global_rts = self._compute_global_interested_rts()
new_global_rts = curr_global_rts - prev_global_rts
removed_global_rts = prev_global_rts - curr_global_rts
self._global_interested_rts = curr_global_rts
LOG.debug('Global Interested RT changed, new RTs %s, removed RTs %s',
new_global_rts, removed_global_rts)
tm = self._core_service.table_manager
tm.on_interesting_rts_change(new_global_rts, removed_global_rts)
| update_interested_rts | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n prev_global_rts = self._global_interested_rts\n curr_global_rts = self._compute_global_interested_rts()\n new_global_rts = curr_global_rts - ... |
def x(ip):
if isinstance(ip, numbers.Integral):
return addrconv.ipv4.bin_to_text(struct.pack('!I', ip))
else:
return addrconv.ipv4.bin_to_text(ip)
| ipv4_to_str | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ip):\n if isinstance(ip, numbers.Integral):\n return addrconv.ipv4.bin_to_text(struct.pack('!I', ip))\n else:\n return addrconv.ipv4.bin_to... |
def x(ip):
if isinstance(ip, numbers.Integral):
return addrconv.ipv6.bin_to_text(type_desc.Int16.from_user(ip))
else:
return addrconv.ipv6.bin_to_text(ip)
| ipv6_to_str | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ip):\n if isinstance(ip, numbers.Integral):\n return addrconv.ipv6.bin_to_text(type_desc.Int16.from_user(ip))\n else:\n return addrconv.ipv... |
def x(ip):
if len(ip) == 4:
return ipv4_to_str(ip)
elif len(ip) == 16:
return ipv6_to_str(ip)
else:
raise struct.error('Invalid ip address length: %s' % len(ip))
| bin_to_text | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ip):\n if len(ip) == 4:\n return ipv4_to_str(ip)\n elif len(ip) == 16:\n return ipv6_to_str(ip)\n else:\n raise struct.error('Inv... |
def x(self, line):
def x(p, method, params):
result = p.call(method, params)
print('RESULT %s' % result)
self._request(line, f)
| do_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, method, params):\n result = p.call(method, params)\n print('RESULT %s' % result)\n self._request(line, f)\n",
... |
def x(self, line):
def x(p, method, params):
p.send_notification(method, params)
self._request(line, f)
| do_notify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, line):\n\n def x(p, method, params):\n p.send_notification(method, params)\n self._request(line, f)\n",
"role": "user"
},
{
"con... |
def x(self):
if self._composed_with_old_api():
o2 = OFPMatch()
o2.fields = self.fields[:]
buf = bytearray()
o2.serialize(buf, 0)
o = OFPMatch.parser(six.binary_type(buf), 0)
else:
o = self
body = {'oxm_fields': [ofproto.oxm_to_jsondict(k, uv) for k, uv in o.
_fields2], 'length': o.length, 'type': o.type}
return {self.__class__.__name__: body}
| to_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._composed_with_old_api():\n o2 = OFPMatch()\n o2.fields = self.fields[:]\n buf = bytearray()\n o2.serialize(buf... |
def x(cls, dict_):
fields = [ofproto.oxm_from_jsondict(f) for f in dict_['oxm_fields']]
o = OFPMatch(_ordered_fields=fields)
buf = bytearray()
o.serialize(buf, 0)
return OFPMatch.parser(six.binary_type(buf), 0)
| from_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, dict_):\n fields = [ofproto.oxm_from_jsondict(f) for f in dict_['oxm_fields']]\n o = OFPMatch(_ordered_fields=fields)\n buf = bytearray()\n o.... |
def x(self, header, value, mask=None):
self.fields.append(OFPMatchField.make(header, value, mask))
| append_field | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, header, value, mask=None):\n self.fields.append(OFPMatchField.make(header, value, mask))\n",
"role": "user"
},
{
"content": "append_field"... |
def x(self, path):
result = False
cause = None
for f in self.filters:
cause, result = f.evaluate(path)
if not result:
break
return cause, result
| evaluate | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, path):\n result = False\n cause = None\n for f in self.filters:\n cause, result = f.evaluate(path)\n if not result:\n b... |
def x(self):
cloned_filters = [f.clone() for f in self.filters]
return self.__class__(cloned_filters, self.attr_type, self.attr_value)
| clone | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n cloned_filters = [f.clone() for f in self.filters]\n return self.__class__(cloned_filters, self.attr_type, self.attr_value)\n",
"role": "use... |
def x(self):
return self.get_count(PeerCounterNames.SENT_REFRESH) + self.get_count(
PeerCounterNames.SENT_UPDATES)
| total_msg_sent | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return self.get_count(PeerCounterNames.SENT_REFRESH) + self.get_count(\n PeerCounterNames.SENT_UPDATES)\n",
"role": "user"
},
{
... |
def x(self):
return self.get_count(PeerCounterNames.RECV_UPDATES) + self.get_count(
PeerCounterNames.RECV_REFRESH) + self.get_count(PeerCounterNames.
RECV_NOTIFICATION)
| total_msg_recv | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return self.get_count(PeerCounterNames.RECV_UPDATES) + self.get_count(\n PeerCounterNames.RECV_REFRESH) + self.get_count(PeerCounterNames.\n... |
def x(self):
uptime = time.time(
) - self._established_time if self._established_time != 0 else -1
return {stats.UPDATE_MSG_IN: self.get_count(PeerCounterNames.
RECV_UPDATES), stats.UPDATE_MSG_OUT: self.get_count(
PeerCounterNames.SENT_UPDATES), stats.TOTAL_MSG_IN: self.
total_msg_recv, stats.TOTAL_MSG_OUT: self.total_msg_sent, stats.
FMS_EST_TRANS: self.get_count(PeerCounterNames.FSM_ESTB_TRANSITIONS
), stats.UPTIME: uptime}
| get_stats_summary_dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n uptime = time.time(\n ) - self._established_time if self._established_time != 0 else -1\n return {stats.UPDATE_MSG_IN: self.get_count(Pee... |
def x(self, conf_evt):
enabled = conf_evt.value
if enabled:
LOG.info('%s enabled', self)
if self._protocol and self._protocol.started:
LOG.error('Tried to enable neighbor that is already enabled')
else:
self.state.bgp_state = const.BGP_FSM_CONNECT
if not self._connect_retry_event.is_set():
self._connect_retry_event.set()
LOG.debug('Starting connect loop as neighbor is enabled.')
else:
LOG.info('%s disabled', self)
if self._protocol:
self._protocol.send_notification(BGP_ERROR_CEASE,
BGP_ERROR_SUB_ADMINISTRATIVE_SHUTDOWN)
self._protocol.stop()
self._protocol = None
self.state.bgp_state = const.BGP_FSM_IDLE
LOG.debug('Disabling connect-retry as neighbor was disabled')
self._connect_retry_event.clear()
| on_update_enabled | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, conf_evt):\n enabled = conf_evt.value\n if enabled:\n LOG.info('%s enabled', self)\n if self._protocol and self._protocol.started:\n ... |
def x(self, rr_msg):
assert rr_msg.type == BGP_MSG_ROUTE_REFRESH
self._protocol.send(rr_msg)
LOG.debug('RouteRefresh %s>> %s', self._neigh_conf.ip_address, rr_msg)
if rr_msg.demarcation == 0:
self.state.incr(PeerCounterNames.SENT_REFRESH)
elif rr_msg.demarcation == 1 and self._common_conf.refresh_max_eor_time != 0:
eor_timer = self._common_conf.refresh_max_eor_time
self._spawn_after('end-of-rib-timer', eor_timer, self.
_enqueue_eor_msg, rr_msg)
LOG.debug('Enhanced RR max. EOR timer set.')
| send_outgoing_route_refresh_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rr_msg):\n assert rr_msg.type == BGP_MSG_ROUTE_REFRESH\n self._protocol.send(rr_msg)\n LOG.debug('RouteRefresh %s>> %s', self._neigh_conf.ip_add... |
def x(self, outgoing_route):
path = outgoing_route.path
block, blocked_cause = self._apply_out_filter(path)
nlri_str = outgoing_route.path.nlri.formatted_nlri_str
sent_route = SentRoute(outgoing_route.path, self, block)
self._adj_rib_out[nlri_str] = sent_route
self._signal_bus.adj_rib_out_changed(self, sent_route)
if not block:
update_msg = self._construct_update(outgoing_route)
self._protocol.send(update_msg)
self.state.incr(PeerCounterNames.SENT_UPDATES)
else:
LOG.debug('prefix : %s is not sent by filter : %s', path.nlri,
blocked_cause)
if (not outgoing_route.path.is_withdraw and not outgoing_route.
for_route_refresh):
tm = self._core_service.table_manager
tm.remember_sent_route(sent_route)
| send_outgoing_route | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, outgoing_route):\n path = outgoing_route.path\n block, blocked_cause = self._apply_out_filter(path)\n nlri_str = outgoing_route.path.nlri.format... |
def x(self, *route_families):
if not self.in_established:
raise ValueError(
'Peer not in established state to satisfy this request.')
skip_validation = False
if len(route_families) == 0:
route_families = []
skip_validation = True
for route_family in SUPPORTED_GLOBAL_RF:
if self.is_mbgp_cap_valid(route_family):
route_families.append(route_family)
for route_family in route_families:
if (skip_validation or route_family in SUPPORTED_GLOBAL_RF and self
._protocol.is_mbgp_cap_valid(route_family)):
rr_req = BGPRouteRefresh(route_family.afi, route_family.safi)
self.enque_outgoing_msg(rr_req)
LOG.debug('Enqueued Route Refresh message to peer %s for rf: %s',
self, route_family)
| request_route_refresh | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *route_families):\n if not self.in_established:\n raise ValueError(\n 'Peer not in established state to satisfy this request.')\n ... |
def x(self, path):
route_family = path.route_family
if self._neigh_conf.next_hop:
next_hop = self._neigh_conf.next_hop
else:
next_hop = self.host_bind_ip
if route_family == RF_IPv6_VPN:
next_hop = self._ipv4_mapped_ipv6(next_hop)
return next_hop
| session_next_hop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, path):\n route_family = path.route_family\n if self._neigh_conf.next_hop:\n next_hop = self._neigh_conf.next_hop\n else:\n next_ho... |
def x(self, as_path_attr, as4_path_attr):
def x(li):
lo = []
for l in li:
if isinstance(l, list):
lo.extend(l)
elif isinstance(l, set):
lo.append(l)
else:
pass
return lo
if as4_path_attr is None:
return as_path_attr
if as_path_attr.get_as_path_len() < as4_path_attr.get_as_path_len():
return as_path_attr
org_as_path_list = _listify(as_path_attr.path_seg_list)
as4_path_list = _listify(as4_path_attr.path_seg_list)
org_as_path_list.reverse()
as4_path_list.reverse()
new_as_path_list = []
tmp_list = []
for as_path, as4_path in zip_longest(org_as_path_list, as4_path_list):
if as4_path is None:
if isinstance(as_path, int):
tmp_list.insert(0, as_path)
elif isinstance(as_path, set):
if tmp_list:
new_as_path_list.insert(0, tmp_list)
tmp_list = []
new_as_path_list.insert(0, as_path)
else:
pass
elif isinstance(as4_path, int):
tmp_list.insert(0, as4_path)
elif isinstance(as4_path, set):
if tmp_list:
new_as_path_list.insert(0, tmp_list)
tmp_list = []
new_as_path_list.insert(0, as4_path)
else:
pass
if tmp_list:
new_as_path_list.insert(0, tmp_list)
return bgp.BGPPathAttributeAsPath(new_as_path_list)
| construct_as_path_attr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, as_path_attr, as4_path_attr):\n\n def x(li):\n lo = []\n for l in li:\n if isinstance(l, list):\n lo.extend(l)... |
def x(self, as_path_list):
def x(n):
if is_valid_old_asn(n):
return n
else:
return bgp.AS_TRANS
if self.is_four_octet_as_number_cap_valid():
return as_path_list, None
else:
new_as_path_list = []
for as_path in as_path_list:
if isinstance(as_path, set):
path_set = set()
for as_num in as_path:
path_set.add(_swap(as_num))
new_as_path_list.append(path_set)
elif isinstance(as_path, list):
path_list = list()
for as_num in as_path:
path_list.append(_swap(as_num))
new_as_path_list.append(path_list)
else:
pass
if as_path_list == new_as_path_list:
return as_path_list, None
return new_as_path_list, as_path_list
| trans_as_path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, as_path_list):\n\n def x(n):\n if is_valid_old_asn(n):\n return n\n else:\n return bgp.AS_TRANS\n if self.is_fo... |
def x(self, client_factory):
if self._neigh_conf.enabled:
self._connect_retry_event.set()
while True:
self._connect_retry_event.wait()
self.pause(1.0)
if self.state.bgp_state in (const.BGP_FSM_IDLE, const.BGP_FSM_ACTIVE):
self.state.bgp_state = const.BGP_FSM_CONNECT
if (self._neigh_conf.host_bind_ip and self._neigh_conf.
host_bind_port):
bind_addr = (self._neigh_conf.host_bind_ip, self.
_neigh_conf.host_bind_port)
else:
bind_addr = None
peer_address = self._neigh_conf.ip_address, self._neigh_conf.port
if bind_addr:
LOG.debug('%s trying to connect from%s to %s', self,
bind_addr, peer_address)
else:
LOG.debug('%s trying to connect to %s', self, peer_address)
tcp_conn_timeout = self._common_conf.tcp_conn_timeout
try:
password = self._neigh_conf.password
self._connect_tcp(peer_address, client_factory, time_out=
tcp_conn_timeout, bind_address=bind_addr, password=password
)
except socket.error:
self.state.bgp_state = const.BGP_FSM_ACTIVE
if LOG.isEnabledFor(logging.DEBUG):
LOG.debug(
'Socket could not be created in time (%s secs), reason %s'
, tcp_conn_timeout, traceback.format_exc())
LOG.info('Will try to reconnect to %s after %s secs: %s',
self._neigh_conf.ip_address, self._common_conf.
bgp_conn_retry_time, self._connect_retry_event.is_set())
self.pause(self._common_conf.bgp_conn_retry_time)
| connect_loop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client_factory):\n if self._neigh_conf.enabled:\n self._connect_retry_event.set()\n while True:\n self._connect_retry_event.wait()\n ... |
def x(self, proto):
LOG.debug('Trying to bind protocol %s to peer %s', proto, self)
if not isinstance(proto, BgpProtocol):
raise ValueError(
'Currently only supports valid instances of `BgpProtocol`')
if proto.state != const.BGP_FSM_OPEN_CONFIRM:
raise ValueError('Only protocols in OpenConfirm state can be bound')
is_bound = False
if not self._protocol:
self._set_protocol(proto)
is_bound = True
else:
if self.state.bgp_state != const.BGP_FSM_IDLE:
LOG.debug(
'Currently in %s state, hence will send collision Notification to close this protocol.'
, self.state.bgp_state)
self._send_collision_err_and_stop(proto)
return
assert proto.is_colliding(self._protocol
), 'Tried to bind second protocol that is not colliding with first/bound protocol'
LOG.debug(
'Currently have one protocol in %s state and another protocol in %s state'
, self._protocol.state, proto.state)
first_protocol = self._protocol
assert first_protocol.is_reactive and not proto.is_reactive or proto.is_reactive and not first_protocol.is_reactive
reactive_proto = None
proactive_proto = None
if proto.is_reactive:
reactive_proto = proto
proactive_proto = self._protocol
else:
reactive_proto = self._protocol
proactive_proto = proto
LOG.debug('Pro-active/Active protocol %s', proactive_proto)
if proto.is_local_router_id_greater():
self._set_protocol(proactive_proto)
else:
self._set_protocol(reactive_proto)
if self._protocol is not proto:
is_bound = False
else:
self._send_collision_err_and_stop(first_protocol)
is_bound = True
return is_bound
| bind_protocol | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, proto):\n LOG.debug('Trying to bind protocol %s to peer %s', proto, self)\n if not isinstance(proto, BgpProtocol):\n raise ValueError(\n ... |
def x(self):
asnum = self.local_as
if not is_valid_old_asn(asnum):
asnum = bgp.AS_TRANS
bgpid = self._common_conf.router_id
holdtime = self._neigh_conf.hold_time
def x(L):
if isinstance(L, list):
for i in range(len(L)):
for e in flatten(L[i]):
yield e
else:
yield L
opts = list(flatten(list(self._neigh_conf.get_configured_capabilities()
.values())))
open_msg = BGPOpen(my_as=asnum, bgp_identifier=bgpid, version=const.
BGP_VERSION_NUM, hold_time=holdtime, opt_param=opts)
return open_msg
| create_open_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n asnum = self.local_as\n if not is_valid_old_asn(asnum):\n asnum = bgp.AS_TRANS\n bgpid = self._common_conf.router_id\n holdtime = s... |
def x(self, update_msg):
assert update_msg.type == BGP_MSG_UPDATE
if self.state.bgp_state != const.BGP_FSM_ESTABLISHED:
LOG.error('Received UPDATE message when not in ESTABLISHED state.')
raise bgp.FiniteStateMachineError()
mp_reach_attr = update_msg.get_path_attr(BGP_ATTR_TYPE_MP_REACH_NLRI)
mp_unreach_attr = update_msg.get_path_attr(BGP_ATTR_TYPE_MP_UNREACH_NLRI)
if not (mp_reach_attr or mp_unreach_attr):
if not self.is_mpbgp_cap_valid(RF_IPv4_UC):
LOG.error('Got UPDATE message with un-available afi/safi %s',
RF_IPv4_UC)
nlri_list = update_msg.nlri
if len(nlri_list) > 0:
aspath = update_msg.get_path_attr(BGP_ATTR_TYPE_AS_PATH)
if not aspath:
raise bgp.MissingWellKnown(BGP_ATTR_TYPE_AS_PATH)
if self.check_first_as and self.is_ebgp_peer(
) and not aspath.has_matching_leftmost(self.remote_as):
LOG.error('First AS check fails. Raise appropriate exception.')
raise bgp.MalformedAsPath()
origin = update_msg.get_path_attr(BGP_ATTR_TYPE_ORIGIN)
if not origin:
raise bgp.MissingWellKnown(BGP_ATTR_TYPE_ORIGIN)
nexthop = update_msg.get_path_attr(BGP_ATTR_TYPE_NEXT_HOP)
if not nexthop:
raise bgp.MissingWellKnown(BGP_ATTR_TYPE_NEXT_HOP)
return True
if mp_unreach_attr:
if not self.is_mpbgp_cap_valid(mp_unreach_attr.route_family):
LOG.error(
'Got UPDATE message with un-available afi/safi for MP_UNREACH path attribute (non-negotiated afi/safi) %s'
, mp_unreach_attr.route_family)
if mp_reach_attr:
if not self.is_mpbgp_cap_valid(mp_reach_attr.route_family):
LOG.error(
'Got UPDATE message with un-available afi/safi for MP_UNREACH path attribute (non-negotiated afi/safi) %s'
, mp_reach_attr.route_family)
aspath = update_msg.get_path_attr(BGP_ATTR_TYPE_AS_PATH)
if not aspath:
raise bgp.MissingWellKnown(BGP_ATTR_TYPE_AS_PATH)
if self.check_first_as and self.is_ebgp_peer(
) and not aspath.has_matching_leftmost(self.remote_as):
LOG.error('First AS check fails. Raise appropriate exception.')
raise bgp.MalformedAsPath()
origin = update_msg.get_path_attr(BGP_ATTR_TYPE_ORIGIN)
if not origin:
raise bgp.MissingWellKnown(BGP_ATTR_TYPE_ORIGIN)
if mp_reach_attr.route_family.safi in (subaddr_family.IP_FLOWSPEC,
subaddr_family.VPN_FLOWSPEC):
pass
elif not mp_reach_attr.next_hop or mp_reach_attr.next_hop == self.host_bind_ip:
LOG.error(
'Nexthop of received UPDATE msg. (%s) same as local interface address %s.'
, mp_reach_attr.next_hop, self.host_bind_ip)
return False
return True
| validate_update_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, update_msg):\n assert update_msg.type == BGP_MSG_UPDATE\n if self.state.bgp_state != const.BGP_FSM_ESTABLISHED:\n LOG.error('Received UPDATE... |
def x(self, update_msg):
assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED
self.state.incr(PeerCounterNames.RECV_UPDATES)
if not self._validate_update_msg(update_msg):
LOG.error('UPDATE message was invalid, hence ignoring its routes.')
return
self._extract_and_reconstruct_as_path(update_msg)
if self._is_looped_path_attrs(update_msg):
return
umsg_pattrs = update_msg.pathattr_map
mp_reach_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_REACH_NLRI, None)
if mp_reach_attr:
self._extract_and_handle_mpbgp_new_paths(update_msg)
mp_unreach_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_UNREACH_NLRI, None)
if mp_unreach_attr:
self._extract_and_handle_mpbgp_withdraws(mp_unreach_attr)
nlri_list = update_msg.nlri
if nlri_list:
self._extract_and_handle_bgp4_new_paths(update_msg)
withdraw_list = update_msg.withdrawn_routes
if withdraw_list:
self._extract_and_handle_bgp4_withdraws(withdraw_list)
| handle_update_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, update_msg):\n assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED\n self.state.incr(PeerCounterNames.RECV_UPDATES)\n if not self._validate... |
def x(self, update_msg):
umsg_pattrs = update_msg.pathattr_map
as_aggregator = umsg_pattrs.get(BGP_ATTR_TYPE_AGGREGATOR, None)
as4_aggregator = umsg_pattrs.get(BGP_ATTR_TYPE_AS4_AGGREGATOR, None)
if as_aggregator and as4_aggregator:
if as_aggregator.as_number != bgp.AS_TRANS:
update_msg.path_attributes.remove(as4_aggregator)
as4_path = umsg_pattrs.pop(BGP_ATTR_TYPE_AS4_PATH, None)
if as4_path:
update_msg.path_attributes.remove(as4_path)
else:
update_msg.path_attributes.remove(as_aggregator)
update_msg.path_attributes.remove(as4_aggregator)
update_msg.path_attributes.append(bgp.
BGPPathAttributeAggregator(as_number=as4_aggregator.
as_number, addr=as4_aggregator.addr))
as_path = umsg_pattrs.get(BGP_ATTR_TYPE_AS_PATH, None)
as4_path = umsg_pattrs.get(BGP_ATTR_TYPE_AS4_PATH, None)
if as_path and as4_path:
if as_path.get_as_path_len() < as4_path.get_as_path_len():
update_msg.path_attributes.remove(as4_path)
else:
update_msg.path_attributes.remove(as_path)
update_msg.path_attributes.remove(as4_path)
as_path = self._construct_as_path_attr(as_path, as4_path)
update_msg.path_attributes.append(as_path)
| extract_and_reconstruct_as_path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n as_aggregator = umsg_pattrs.get(BGP_ATTR_TYPE_AGGREGATOR, None)\n as4_aggregator = umsg_p... |
def x(self, update_msg):
umsg_pattrs = update_msg.pathattr_map
recv_open_msg = self.protocol.recv_open_msg
aspath = umsg_pattrs.get(BGP_ATTR_TYPE_AS_PATH)
if aspath is not None and aspath.has_local_as(self.local_as, max_count=
self._common_conf.allow_local_as_in_count):
LOG.error(
'AS_PATH on UPDATE message has loops. Ignoring this message: %s',
update_msg)
return
originator_id = umsg_pattrs.get(BGP_ATTR_TYPE_ORIGINATOR_ID, None)
if originator_id and recv_open_msg.bgp_identifier == originator_id:
LOG.error(
'ORIGINATOR_ID on UPDATE message has loops. Ignoring this message: %s'
, update_msg)
return
cluster_list = umsg_pattrs.get(BGP_ATTR_TYPE_CLUSTER_LIST, None)
if cluster_list and self._common_conf.cluster_id in cluster_list.value:
LOG.error(
'CLUSTER_LIST on UPDATE message has loops. Ignoring this message: %s'
, update_msg)
return
| is_looped_path_attrs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n recv_open_msg = self.protocol.recv_open_msg\n aspath = umsg_pattrs.get(BGP_ATTR_TYPE_AS_P... |
def x(self, update_msg):
umsg_pattrs = update_msg.pathattr_map
next_hop = update_msg.get_path_attr(BGP_ATTR_TYPE_NEXT_HOP).value
msg_nlri_list = update_msg.nlri
if not msg_nlri_list:
LOG.debug('Update message did not have any new MP_REACH_NLRIs.')
return
for msg_nlri in msg_nlri_list:
LOG.debug('NLRI: %s', msg_nlri)
new_path = bgp_utils.create_path(self, msg_nlri, pattrs=umsg_pattrs,
nexthop=next_hop)
LOG.debug('Extracted paths from Update msg.: %s', new_path)
block, blocked_cause = self._apply_in_filter(new_path)
nlri_str = new_path.nlri.formatted_nlri_str
received_route = ReceivedRoute(new_path, self, block)
self._adj_rib_in[nlri_str] = received_route
self._signal_bus.adj_rib_in_changed(self, received_route)
if not block:
tm = self._core_service.table_manager
tm.learn_path(new_path)
else:
LOG.debug('prefix : %s is blocked by in-bound filter: %s',
msg_nlri, blocked_cause)
if msg_nlri_list:
self.state.incr(PeerCounterNames.RECV_PREFIXES, incr_by=len(
msg_nlri_list))
if self._neigh_conf.exceeds_max_prefix_allowed(self.state.get_count
(PeerCounterNames.RECV_PREFIXES)):
LOG.error('Max. prefix allowed for this neighbor exceeded.')
| extract_and_handle_bgp4_new_paths | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n next_hop = update_msg.get_path_attr(BGP_ATTR_TYPE_NEXT_HOP).value\n msg_nlri_list = updat... |
def x(self, withdraw_list):
msg_rf = RF_IPv4_UC
w_nlris = withdraw_list
if not w_nlris:
self._handle_eor(msg_rf)
for w_nlri in w_nlris:
w_path = bgp_utils.create_path(self, w_nlri, is_withdraw=True)
block, blocked_cause = self._apply_in_filter(w_path)
received_route = ReceivedRoute(w_path, self, block)
nlri_str = w_nlri.formatted_nlri_str
if nlri_str in self._adj_rib_in:
del self._adj_rib_in[nlri_str]
self._signal_bus.adj_rib_in_changed(self, received_route)
if not block:
tm = self._core_service.table_manager
tm.learn_path(w_path)
else:
LOG.debug('prefix : %s is blocked by in-bound filter: %s',
nlri_str, blocked_cause)
| extract_and_handle_bgp4_withdraws | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, withdraw_list):\n msg_rf = RF_IPv4_UC\n w_nlris = withdraw_list\n if not w_nlris:\n self._handle_eor(msg_rf)\n for w_nlri in w_nlris:\... |
def x(self, update_msg):
umsg_pattrs = update_msg.pathattr_map
mpreach_nlri_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_REACH_NLRI)
assert mpreach_nlri_attr
msg_rf = mpreach_nlri_attr.route_family
if msg_rf not in SUPPORTED_GLOBAL_RF:
LOG.info(
'Received route for route family %s which is not supported. Ignoring paths from this UPDATE: %s'
% (msg_rf, update_msg))
return
if msg_rf in (RF_IPv4_VPN, RF_IPv6_VPN):
ext_comm_attr = umsg_pattrs.get(BGP_ATTR_TYPE_EXTENDED_COMMUNITIES)
if not ext_comm_attr:
LOG.info(
'Missing Extended Communities Attribute. Ignoring paths from this UPDATE: %s'
, update_msg)
return
msg_rts = ext_comm_attr.rt_list
if not msg_rts:
LOG.info(
'Received route with no RTs. Ignoring paths in this UPDATE: %s'
, update_msg)
return
interested_rts = self._core_service.global_interested_rts
if not interested_rts.intersection(msg_rts):
LOG.info(
'Received route with RT %s that is of no interest to any VRFs or Peers %s. Ignoring paths from this UPDATE: %s'
, msg_rts, interested_rts, update_msg)
return
next_hop = mpreach_nlri_attr.next_hop
msg_nlri_list = mpreach_nlri_attr.nlri
if not msg_nlri_list:
LOG.debug('Update message did not have any new MP_REACH_NLRIs.')
return
for msg_nlri in msg_nlri_list:
new_path = bgp_utils.create_path(self, msg_nlri, pattrs=umsg_pattrs,
nexthop=next_hop)
LOG.debug('Extracted paths from Update msg.: %s', new_path)
block, blocked_cause = self._apply_in_filter(new_path)
received_route = ReceivedRoute(new_path, self, block)
nlri_str = msg_nlri.formatted_nlri_str
self._adj_rib_in[nlri_str] = received_route
self._signal_bus.adj_rib_in_changed(self, received_route)
if not block:
if msg_rf == RF_RTC_UC and self._init_rtc_nlri_path is not None:
self._init_rtc_nlri_path.append(new_path)
else:
tm = self._core_service.table_manager
tm.learn_path(new_path)
else:
LOG.debug('prefix : %s is blocked by in-bound filter: %s',
msg_nlri, blocked_cause)
if msg_nlri_list:
self.state.incr(PeerCounterNames.RECV_PREFIXES, incr_by=len(
msg_nlri_list))
if self._neigh_conf.exceeds_max_prefix_allowed(self.state.get_count
(PeerCounterNames.RECV_PREFIXES)):
LOG.error('Max. prefix allowed for this neighbor exceeded.')
| extract_and_handle_mpbgp_new_paths | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, update_msg):\n umsg_pattrs = update_msg.pathattr_map\n mpreach_nlri_attr = umsg_pattrs.get(BGP_ATTR_TYPE_MP_REACH_NLRI)\n assert mpreach_nlri_at... |
def x(self, mp_unreach_attr):
msg_rf = mp_unreach_attr.route_family
if msg_rf not in SUPPORTED_GLOBAL_RF:
LOG.info(
'Received route family %s is not supported. Ignoring withdraw routes on this UPDATE message.'
, msg_rf)
return
w_nlris = mp_unreach_attr.withdrawn_routes
if not w_nlris:
self._handle_eor(msg_rf)
for w_nlri in w_nlris:
w_path = bgp_utils.create_path(self, w_nlri, is_withdraw=True)
block, blocked_cause = self._apply_in_filter(w_path)
received_route = ReceivedRoute(w_path, self, block)
nlri_str = w_nlri.formatted_nlri_str
if nlri_str in self._adj_rib_in:
del self._adj_rib_in[nlri_str]
self._signal_bus.adj_rib_in_changed(self, received_route)
if not block:
tm = self._core_service.table_manager
tm.learn_path(w_path)
else:
LOG.debug('prefix : %s is blocked by in-bound filter: %s',
w_nlri, blocked_cause)
| extract_and_handle_mpbgp_withdraws | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, mp_unreach_attr):\n msg_rf = mp_unreach_attr.route_family\n if msg_rf not in SUPPORTED_GLOBAL_RF:\n LOG.info(\n 'Received route f... |
def x(self, route_family):
LOG.debug('Handling EOR for %s', route_family)
if route_family == RF_RTC_UC:
self._unschedule_sending_init_updates()
tm = self._core_service.table_manager
for rt_nlri in self._init_rtc_nlri_path:
tm.learn_path(rt_nlri)
self.pause(0)
self._init_rtc_nlri_path = None
| handle_eor | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_family):\n LOG.debug('Handling EOR for %s', route_family)\n if route_family == RF_RTC_UC:\n self._unschedule_sending_init_updates()\n ... |
def x(self, msg):
if msg.type == BGP_MSG_KEEPALIVE:
if self.state.bgp_state == const.BGP_FSM_OPEN_CONFIRM:
self.state.bgp_state = const.BGP_FSM_ESTABLISHED
self._enqueue_init_updates()
elif msg.type == BGP_MSG_UPDATE:
assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED
self._handle_update_msg(msg)
elif msg.type == BGP_MSG_ROUTE_REFRESH:
assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED
self._handle_route_refresh_msg(msg)
else:
raise ValueError(
'Peer does not support handling of %s message during %s state' %
(msg, self.state.bgp_state))
| handle_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg):\n if msg.type == BGP_MSG_KEEPALIVE:\n if self.state.bgp_state == const.BGP_FSM_OPEN_CONFIRM:\n self.state.bgp_state = const.BG... |
def x(self, sor):
if self._protocol.is_enhanced_rr_cap_valid() and not sor.eor_sent:
afi = sor.afi
safi = sor.safi
eor = BGPRouteRefresh(afi, safi, demarcation=2)
self.enque_outgoing_msg(eor)
sor.eor_sent = True
| enqueue_eor_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sor):\n if self._protocol.is_enhanced_rr_cap_valid() and not sor.eor_sent:\n afi = sor.afi\n safi = sor.safi\n eor = BGPRouteRefr... |
def x(self):
def x():
LOG.debug('Scheduled queuing of initial Non-RTC UPDATEs')
tm = self._core_service.table_manager
self.comm_all_best_paths(tm.global_tables)
self._sent_init_non_rtc_update = True
self._rtc_eor_timer.stop()
self._rtc_eor_timer = None
self._sent_init_non_rtc_update = False
self._rtc_eor_timer = self._create_timer(Peer.RTC_EOR_TIMER_NAME,
_enqueue_non_rtc_init_updates)
self._rtc_eor_timer.start(const.RTC_EOR_DEFAULT_TIME, now=False)
LOG.debug('Scheduled sending of initial Non-RTC UPDATEs after: %s sec',
const.RTC_EOR_DEFAULT_TIME)
| schedule_sending_init_updates | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n\n def x():\n LOG.debug('Scheduled queuing of initial Non-RTC UPDATEs')\n tm = self._core_service.table_manager\n self.comm_all... |
def x(self):
LOG.debug(
'Un-scheduling sending of initial Non-RTC UPDATEs (init. UPDATEs already sent: %s)'
, self._sent_init_non_rtc_update)
if self._rtc_eor_timer:
self._rtc_eor_timer.stop()
self._rtc_eor_timer = None
return True
return False
| unschedule_sending_init_updates | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n LOG.debug(\n 'Un-scheduling sending of initial Non-RTC UPDATEs (init. UPDATEs already sent: %s)'\n , self._sent_init_non_rtc_update)\... |
def x(self):
assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED
if self.is_mbgp_cap_valid(RF_RTC_UC):
self._peer_manager.comm_all_rt_nlris(self)
self._schedule_sending_init_updates()
else:
tm = self._core_service.table_manager
self.comm_all_best_paths(tm.global_tables)
| enqueue_init_updates | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n assert self.state.bgp_state == const.BGP_FSM_ESTABLISHED\n if self.is_mbgp_cap_valid(RF_RTC_UC):\n self._peer_manager.comm_all_rt_nlris(s... |
def x(self, global_tables):
LOG.debug('Communicating current best path for all afi/safi except 1/132')
for route_family, table in global_tables.items():
if route_family == RF_RTC_UC:
continue
if self.is_mbgp_cap_valid(route_family):
for dest in table.values():
if dest.best_path:
self.communicate_path(dest.best_path)
| comm_all_best_paths | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, global_tables):\n LOG.debug('Communicating current best path for all afi/safi except 1/132')\n for route_family, table in global_tables.items():\n ... |
def x(self, path):
LOG.debug('Peer %s asked to communicate path', self)
if not path:
raise ValueError('Invalid path %s given.' % path)
if not self.in_established():
LOG.debug(
'Skipping sending path as peer is not in ESTABLISHED state %s',
path)
return
path_rf = path.route_family
if not (self.is_mpbgp_cap_valid(path_rf) or path_rf in [RF_IPv4_UC,
RF_IPv6_UC]):
LOG.debug(
'Skipping sending path as %s route family is not available for this session'
, path_rf)
return
if path_rf != RF_RTC_UC and self.is_mpbgp_cap_valid(RF_RTC_UC):
rtfilter = self._peer_manager.curr_peer_rtfilter(self)
if rtfilter and not path.has_rts_in(rtfilter):
LOG.debug(
'Skipping sending path as rffilter %s and path rts %s have no RT in common'
, rtfilter, path.get_rts())
return
as_path = path.get_pattr(BGP_ATTR_TYPE_AS_PATH)
if as_path and as_path.has_matching_leftmost(self.remote_as):
LOG.debug('Skipping sending path as AS_PATH has peer AS %s', self.
remote_as)
return
if self.is_route_server_client:
outgoing_route = OutgoingRoute(path)
self.enque_outgoing_msg(outgoing_route)
if self._neigh_conf.multi_exit_disc:
med_attr = path.get_pattr(BGP_ATTR_TYPE_MULTI_EXIT_DISC)
if not med_attr:
path = bgp_utils.clone_path_and_update_med_for_target_neighbor(path
, self._neigh_conf.multi_exit_disc)
if path.source is None:
outgoing_route = OutgoingRoute(path)
self.enque_outgoing_msg(outgoing_route)
elif self != path.source or self.remote_as != path.source.remote_as:
if (self.remote_as == self._core_service.asn and self.remote_as ==
path.source.remote_as and isinstance(path.source, Peer) and not
path.source.is_route_reflector_client and not self.
is_route_reflector_client):
LOG.debug('Skipping sending iBGP route to iBGP peer %s AS %s',
self.ip_address, self.remote_as)
return
comm_attr = path.get_pattr(BGP_ATTR_TYPE_COMMUNITIES)
if comm_attr:
comm_attr_na = comm_attr.has_comm_attr(BGPPathAttributeCommunities
.NO_ADVERTISE)
if comm_attr_na:
LOG.debug(
'Path has community attr. NO_ADVERTISE = %s. Hence not advertising to peer'
, comm_attr_na)
return
comm_attr_ne = comm_attr.has_comm_attr(BGPPathAttributeCommunities
.NO_EXPORT)
comm_attr_nes = comm_attr.has_comm_attr(BGPPathAttributeCommunities
.NO_EXPORT_SUBCONFED)
if (comm_attr_nes or comm_attr_ne
) and self.remote_as != self._core_service.asn:
LOG.debug(
'Skipping sending UPDATE to peer: %s as per community attribute configuration'
, self)
return
outgoing_route = OutgoingRoute(path)
self.enque_outgoing_msg(outgoing_route)
LOG.debug('Enqueued outgoing route %s for peer %s', outgoing_route.
path.nlri, self)
| communicate_path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, path):\n LOG.debug('Peer %s asked to communicate path', self)\n if not path:\n raise ValueError('Invalid path %s given.' % path)\n if not... |
def x(self):
LOG.info('Connection to peer: %s established', self._neigh_conf.
ip_address, extra={'resource_name': self._neigh_conf.name,
'resource_id': self._neigh_conf.id})
| connection_made | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n LOG.info('Connection to peer: %s established', self._neigh_conf.\n ip_address, extra={'resource_name': self._neigh_conf.name,\n 'reso... |
def x(self, reason):
LOG.info(
'Connection to peer %s lost, reason: %s Resetting retry connect loop: %s'
% (self._neigh_conf.ip_address, reason, self._connect_retry_event.
is_set()), extra={'resource_name': self._neigh_conf.name,
'resource_id': self._neigh_conf.id})
self.state.bgp_state = const.BGP_FSM_IDLE
if self._protocol:
self._protocol.stop()
self._protocol = None
self._init_rtc_nlri_path = []
self._sent_init_non_rtc_update = False
self.clear_outgoing_msg_list()
self._unschedule_sending_init_updates()
self.version_num += 1
self._peer_manager.on_peer_down(self)
if self._neigh_conf.enabled:
if not self._connect_retry_event.is_set():
self._connect_retry_event.set()
| connection_lost | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, reason):\n LOG.info(\n 'Connection to peer %s lost, reason: %s Resetting retry connect loop: %s'\n % (self._neigh_conf.ip_address, reas... |
def x(self, local_as, max_count=0):
_count = 0
for as_path_seg in self.value:
_count += list(as_path_seg).count(local_as)
return _count > max_count
| has_local_as | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, local_as, max_count=0):\n _count = 0\n for as_path_seg in self.value:\n _count += list(as_path_seg).count(local_as)\n return _count > max... |
def x(self, remote_as):
if not self.value or not remote_as:
return False
leftmost_seg = self.path_seg_list[0]
if leftmost_seg and leftmost_seg[0] == remote_as:
return True
return False
| has_matching_leftmost | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, remote_as):\n if not self.value or not remote_as:\n return False\n leftmost_seg = self.path_seg_list[0]\n if leftmost_seg and leftmost_se... |
def x(cmd, redirect_output=True, check_exit_code=True):
if redirect_output:
stdout = subprocess.PIPE
else:
stdout = None
proc = subprocess.Popen(cmd, cwd=ROOT, stdout=stdout)
output = proc.communicate()[0]
if check_exit_code and proc.returncode != 0:
raise Exception('Command "%s" failed.\n%s' % (' '.join(cmd), output))
return output
| run_command | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cmd, redirect_output=True, check_exit_code=True):\n if redirect_output:\n stdout = subprocess.PIPE\n else:\n stdout = None\n proc = subp... |
def x(manager, table, record, column):
row = row_by_name(manager, record, table)
value = getattr(row, column, '')
if isinstance(value, list) and len(value) == 1:
value = value[0]
return str(value)
| get_column_value | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(manager, table, record, column):\n row = row_by_name(manager, record, table)\n value = getattr(row, column, '')\n if isinstance(value, list) and len(v... |
def x(self, **kwargs):
try:
body = self.vtep_app.add_speaker(**kwargs)
except DatapathNotFound as e:
return e.to_response(status=404)
return Response(content_type='application/json', body=json.dumps(body))
| add_speaker | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.add_speaker(**kwargs)\n except DatapathNotFound as e:\n return e.to_response(status=404)\n ... |
def x(self, **kwargs):
try:
body = self.vtep_app.get_speaker()
except BGPSpeakerNotFound as e:
return e.to_response(status=404)
return Response(content_type='application/json', body=json.dumps(body))
| get_speakers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.get_speaker()\n except BGPSpeakerNotFound as e:\n return e.to_response(status=404)\n retu... |
def x(self, **kwargs):
try:
body = self.vtep_app.del_network(**kwargs)
except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound) as e:
return e.to_response(status=404)
return Response(content_type='application/json', body=json.dumps(body))
| del_network | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.del_network(**kwargs)\n except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound) as e:\n r... |
def x(self, **kwargs):
try:
body = self.vtep_app.del_client(**kwargs)
except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound,
ClientNotFound, ClientNotLocal) as e:
return Response(body=str(e), status=500)
return Response(content_type='application/json', body=json.dumps(body))
| del_client | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n try:\n body = self.vtep_app.del_client(**kwargs)\n except (BGPSpeakerNotFound, DatapathNotFound, VniNotFound,\n ClientNo... |
def x(self, vrf_table, import_rts=None):
if vrf_table.route_family == Vrf4Table.ROUTE_FAMILY:
vpn_table = self.get_vpn4_table()
elif vrf_table.route_family == Vrf6Table.ROUTE_FAMILY:
vpn_table = self.get_vpn6_table()
elif vrf_table.route_family == VrfEvpnTable.ROUTE_FAMILY:
vpn_table = self.get_evpn_table()
elif vrf_table.route_family == Vrf4FlowSpecTable.ROUTE_FAMILY:
vpn_table = self.get_vpnv4fs_table()
elif vrf_table.route_family == Vrf6FlowSpecTable.ROUTE_FAMILY:
vpn_table = self.get_vpnv6fs_table()
elif vrf_table.route_family == L2vpnFlowSpecTable.ROUTE_FAMILY:
vpn_table = self.get_l2vpnfs_table()
else:
raise ValueError('Invalid VRF table route family: %s' % vrf_table.
route_family)
vrf_table.import_vpn_paths_from_table(vpn_table, import_rts)
| import_all_vpn_paths_to_vrf | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, vrf_table, import_rts=None):\n if vrf_table.route_family == Vrf4Table.ROUTE_FAMILY:\n vpn_table = self.get_vpn4_table()\n elif vrf_table.rou... |
def x(self, path):
table = self.get_global_table_by_route_family(path.route_family)
gpath_dest = table.insert(path)
self._signal_bus.dest_changed(gpath_dest)
| learn_path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, path):\n table = self.get_global_table_by_route_family(path.route_family)\n gpath_dest = table.insert(path)\n self._signal_bus.dest_changed(gpat... |
def x(self, sent_route):
route_family = sent_route.path.route_family
table = self.get_global_table_by_route_family(route_family)
table.insert_sent_route(sent_route)
| remember_sent_route | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sent_route):\n route_family = sent_route.path.route_family\n table = self.get_global_table_by_route_family(route_family)\n table.insert_sent_rou... |
def x(self, new_global_rts, removed_global_rts):
if new_global_rts:
LOG.debug(
'Sending route_refresh to all neighbors that did not negotiate RTC capability.'
)
pm = self._core_service.peer_manager
pm.schedule_rr_to_non_rtc_peers()
if removed_global_rts:
LOG.debug(
'Cleaning up global tables as some interested RTs were removed')
self._clean_global_uninteresting_paths()
| on_interesting_rts_change | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_global_rts, removed_global_rts):\n if new_global_rts:\n LOG.debug(\n 'Sending route_refresh to all neighbors that did not negoti... |
def x(self):
vpn_table = self._global_tables.get(RF_IPv4_UC)
if not vpn_table:
vpn_table = Ipv4Table(self._core_service, self._signal_bus)
self._global_tables[RF_IPv4_UC] = vpn_table
self._tables[None, RF_IPv4_UC] = vpn_table
return vpn_table
| get_ipv4_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vpn_table = self._global_tables.get(RF_IPv4_UC)\n if not vpn_table:\n vpn_table = Ipv4Table(self._core_service, self._signal_bus)\n ... |
def x(self):
vpn_table = self._global_tables.get(RF_IPv6_VPN)
if not vpn_table:
vpn_table = Vpnv6Table(self._core_service, self._signal_bus)
self._global_tables[RF_IPv6_VPN] = vpn_table
self._tables[None, RF_IPv6_VPN] = vpn_table
return vpn_table
| get_vpn6_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vpn_table = self._global_tables.get(RF_IPv6_VPN)\n if not vpn_table:\n vpn_table = Vpnv6Table(self._core_service, self._signal_bus)\n ... |
def x(self):
vpn_table = self._global_tables.get(RF_IPv4_VPN)
if not vpn_table:
vpn_table = Vpnv4Table(self._core_service, self._signal_bus)
self._global_tables[RF_IPv4_VPN] = vpn_table
self._tables[None, RF_IPv4_VPN] = vpn_table
return vpn_table
| get_vpn4_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vpn_table = self._global_tables.get(RF_IPv4_VPN)\n if not vpn_table:\n vpn_table = Vpnv4Table(self._core_service, self._signal_bus)\n ... |
def x(self):
evpn_table = self._global_tables.get(RF_L2_EVPN)
if not evpn_table:
evpn_table = EvpnTable(self._core_service, self._signal_bus)
self._global_tables[RF_L2_EVPN] = evpn_table
self._tables[None, RF_L2_EVPN] = evpn_table
return evpn_table
| get_evpn_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n evpn_table = self._global_tables.get(RF_L2_EVPN)\n if not evpn_table:\n evpn_table = EvpnTable(self._core_service, self._signal_bus)\n ... |
def x(self):
rtc_table = self._global_tables.get(RF_RTC_UC)
if not rtc_table:
rtc_table = RtcTable(self._core_service, self._signal_bus)
self._global_tables[RF_RTC_UC] = rtc_table
self._tables[None, RF_RTC_UC] = rtc_table
return rtc_table
| get_rtc_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n rtc_table = self._global_tables.get(RF_RTC_UC)\n if not rtc_table:\n rtc_table = RtcTable(self._core_service, self._signal_bus)\n ... |
def x(self):
ipv4fs_table = self._global_tables.get(RF_IPv4_FLOWSPEC)
if not ipv4fs_table:
ipv4fs_table = IPv4FlowSpecTable(self._core_service, self._signal_bus)
self._global_tables[RF_IPv4_FLOWSPEC] = ipv4fs_table
self._tables[None, RF_IPv4_FLOWSPEC] = ipv4fs_table
return ipv4fs_table
| get_ipv4fs_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n ipv4fs_table = self._global_tables.get(RF_IPv4_FLOWSPEC)\n if not ipv4fs_table:\n ipv4fs_table = IPv4FlowSpecTable(self._core_service, se... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.