source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(self):
ipv6fs_table = self._global_tables.get(RF_IPv6_FLOWSPEC)
if not ipv6fs_table:
ipv6fs_table = IPv6FlowSpecTable(self._core_service, self._signal_bus)
self._global_tables[RF_IPv6_FLOWSPEC] = ipv6fs_table
self._tables[None, RF_IPv6_FLOWSPEC] = ipv6fs_table
return ipv6fs_table
| get_ipv6fs_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n ipv6fs_table = self._global_tables.get(RF_IPv6_FLOWSPEC)\n if not ipv6fs_table:\n ipv6fs_table = IPv6FlowSpecTable(self._core_service, se... |
def x(self):
vpnv4fs_table = self._global_tables.get(RF_VPNv4_FLOWSPEC)
if not vpnv4fs_table:
vpnv4fs_table = VPNv4FlowSpecTable(self._core_service, self._signal_bus
)
self._global_tables[RF_VPNv4_FLOWSPEC] = vpnv4fs_table
self._tables[None, RF_VPNv4_FLOWSPEC] = vpnv4fs_table
return vpnv4fs_table
| get_vpnv4fs_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vpnv4fs_table = self._global_tables.get(RF_VPNv4_FLOWSPEC)\n if not vpnv4fs_table:\n vpnv4fs_table = VPNv4FlowSpecTable(self._core_servic... |
def x(self):
vpnv6fs_table = self._global_tables.get(RF_VPNv6_FLOWSPEC)
if not vpnv6fs_table:
vpnv6fs_table = VPNv6FlowSpecTable(self._core_service, self._signal_bus
)
self._global_tables[RF_VPNv6_FLOWSPEC] = vpnv6fs_table
self._tables[None, RF_VPNv6_FLOWSPEC] = vpnv6fs_table
return vpnv6fs_table
| get_vpnv6fs_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n vpnv6fs_table = self._global_tables.get(RF_VPNv6_FLOWSPEC)\n if not vpnv6fs_table:\n vpnv6fs_table = VPNv6FlowSpecTable(self._core_servic... |
def x(self):
l2vpnfs_table = self._global_tables.get(RF_L2VPN_FLOWSPEC)
if not l2vpnfs_table:
l2vpnfs_table = L2VPNFlowSpecTable(self._core_service, self._signal_bus
)
self._global_tables[RF_L2VPN_FLOWSPEC] = l2vpnfs_table
self._tables[None, RF_L2VPN_FLOWSPEC] = l2vpnfs_table
return l2vpnfs_table
| get_l2vpnfs_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n l2vpnfs_table = self._global_tables.get(RF_L2VPN_FLOWSPEC)\n if not l2vpnfs_table:\n l2vpnfs_table = L2VPNFlowSpecTable(self._core_servic... |
def x(self, vrf_table, new_imp_rts, removed_imp_rts):
assert vrf_table
if new_imp_rts:
self._link_vrf_table(vrf_table, new_imp_rts)
if removed_imp_rts:
self._remove_links_to_vrf_table_for_rts(vrf_table, removed_imp_rts)
| update_vrf_table_links | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, vrf_table, new_imp_rts, removed_imp_rts):\n assert vrf_table\n if new_imp_rts:\n self._link_vrf_table(vrf_table, new_imp_rts)\n if remove... |
def x(self, vrf_table):
assert vrf_table
for dest in vrf_table.values():
for path in dest.known_path_list:
if path.source is None:
vrf_table.insert_vrf_path(nlri=path.nlri, next_hop=path.
nexthop, gen_lbl=True)
LOG.debug('Re-installed NC paths with current policy for table %s.',
vrf_table)
| re_install_net_ctrl_paths | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, vrf_table):\n assert vrf_table\n for dest in vrf_table.values():\n for path in dest.known_path_list:\n if path.source is None:\n ... |
def x(self, vrf_table):
assert vrf_table
vrf_conf = vrf_table.vrf_conf
self._remove_links_to_vrf_table_for_rts(vrf_table, vrf_conf.import_rts)
| remove_links_to_vrf_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, vrf_table):\n assert vrf_table\n vrf_conf = vrf_table.vrf_conf\n self._remove_links_to_vrf_table_for_rts(vrf_table, vrf_conf.import_rts)\n",
... |
def x(self, vrf_conf):
route_family = vrf_conf.route_family
if route_family == VRF_RF_IPV4:
vrf_table = Vrf4Table
elif route_family == VRF_RF_IPV6:
vrf_table = Vrf6Table
elif route_family == VRF_RF_L2_EVPN:
vrf_table = VrfEvpnTable
elif route_family == VRF_RF_IPV4_FLOWSPEC:
vrf_table = Vrf4FlowSpecTable
elif route_family == VRF_RF_IPV6_FLOWSPEC:
vrf_table = Vrf6FlowSpecTable
elif route_family == VRF_RF_L2VPN_FLOWSPEC:
vrf_table = L2vpnFlowSpecTable
else:
raise ValueError('Unsupported route family for VRF: %s' % route_family)
vrf_table = vrf_table(vrf_conf, self._core_service, self._signal_bus)
table_id = vrf_conf.route_dist, route_family
self._tables[table_id] = vrf_table
assert vrf_table is not None
LOG.debug('Added new VrfTable with route_dist:%s and route_family:%s',
vrf_conf.route_dist, route_family)
import_rts = vrf_conf.import_rts
if import_rts:
self._link_vrf_table(vrf_table, import_rts)
return vrf_table
| create_and_link_vrf_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, vrf_conf):\n route_family = vrf_conf.route_family\n if route_family == VRF_RF_IPV4:\n vrf_table = Vrf4Table\n elif route_family == VRF_RF... |
def x(self):
uninteresting_dest_count = 0
interested_rts = self._rt_mgr.global_interested_rts
LOG.debug('Cleaning uninteresting paths. Global interested RTs %s',
interested_rts)
for route_family in [RF_IPv4_VPN, RF_IPv6_VPN, RF_RTC_UC]:
if route_family == RF_RTC_UC:
continue
table = self.get_global_table_by_route_family(route_family)
uninteresting_dest_count += table.clean_uninteresting_paths(
interested_rts)
LOG.debug('Found %s number of destinations had uninteresting paths.',
uninteresting_dest_count)
| clean_global_uninteresting_paths | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n uninteresting_dest_count = 0\n interested_rts = self._rt_mgr.global_interested_rts\n LOG.debug('Cleaning uninteresting paths. Global interest... |
def x(self, vpn_path, path_rts=None):
LOG.debug('Importing path %s to qualifying VRFs', vpn_path)
if not path_rts:
LOG.info('Encountered a path with no RTs: %s', vpn_path)
return
interested_tables = set()
if vpn_path.route_family == RF_IPv4_VPN:
route_family = RF_IPv4_UC
elif vpn_path.route_family == RF_IPv6_VPN:
route_family = RF_IPv6_UC
elif vpn_path.route_family == RF_L2_EVPN:
route_family = RF_L2_EVPN
elif vpn_path.route_family == RF_VPNv4_FLOWSPEC:
route_family = RF_IPv4_FLOWSPEC
elif vpn_path.route_family == RF_VPNv6_FLOWSPEC:
route_family = RF_IPv6_FLOWSPEC
elif vpn_path.route_family == RF_L2VPN_FLOWSPEC:
route_family = RF_L2VPN_FLOWSPEC
else:
raise ValueError('Unsupported route family for VRF: %s' % vpn_path.
route_family)
for rt in path_rts:
rt_rf_id = rt + ':' + str(route_family)
vrf_rt_tables = self._tables_for_rt.get(rt_rf_id)
if vrf_rt_tables:
interested_tables.update(vrf_rt_tables)
if interested_tables:
route_dist = vpn_path.nlri.route_dist
for vrf_table in interested_tables:
if (vpn_path.source is not None or route_dist != vrf_table.
vrf_conf.route_dist):
update_vrf_dest = vrf_table.import_vpn_path(vpn_path)
if update_vrf_dest is not None:
self._signal_bus.dest_changed(update_vrf_dest)
else:
LOG.debug('No VRF table found that imports RTs: %s', path_rts)
| import_single_vpn_path_to_all_vrfs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, vpn_path, path_rts=None):\n LOG.debug('Importing path %s to qualifying VRFs', vpn_path)\n if not path_rts:\n LOG.info('Encountered a path wi... |
def x(self, route_dist, prefix=None, next_hop=None, route_family=None,
route_type=None, tunnel_type=None, is_withdraw=False, redundancy_mode=
None, pmsi_tunnel_type=None, **kwargs):
from ryu.services.protocols.bgp.core import BgpCoreError
assert route_dist
if is_withdraw:
gen_lbl = False
next_hop = None
else:
gen_lbl = True
if not (is_valid_ipv4(next_hop) or is_valid_ipv6(next_hop)):
raise BgpCoreError(desc='Invalid IPv4/IPv6 nexthop: %s' % next_hop)
vrf_table = self._tables.get((route_dist, route_family))
if vrf_table is None:
raise BgpCoreError(desc=
'VRF table does not exist: route_dist=%s, route_family=%s' % (
route_dist, route_family))
vni = kwargs.get('vni', None)
if route_family == VRF_RF_IPV4:
if not is_valid_ipv4_prefix(prefix):
raise BgpCoreError(desc='Invalid IPv4 prefix: %s' % prefix)
ip, masklen = prefix.split('/')
prefix = IPAddrPrefix(int(masklen), ip)
elif route_family == VRF_RF_IPV6:
if not is_valid_ipv6_prefix(prefix):
raise BgpCoreError(desc='Invalid IPv6 prefix: %s' % prefix)
ip6, masklen = prefix.split('/')
prefix = IP6AddrPrefix(int(masklen), ip6)
elif route_family == VRF_RF_L2_EVPN:
assert route_type
if route_type == EvpnMacIPAdvertisementNLRI.ROUTE_TYPE_NAME:
kwargs['mpls_labels'] = []
if route_type == EvpnInclusiveMulticastEthernetTagNLRI.ROUTE_TYPE_NAME:
vni = kwargs.pop('vni', None)
subclass = EvpnNLRI._lookup_type_name(route_type)
kwargs['route_dist'] = route_dist
esi = kwargs.get('esi', None)
if esi is not None:
if isinstance(esi, dict):
esi_type = esi.get('type', 0)
esi_class = EvpnEsi._lookup_type(esi_type)
kwargs['esi'] = esi_class.from_jsondict(esi)
else:
kwargs['esi'] = EvpnArbitraryEsi(type_desc.Int9.from_user(esi))
if vni is not None:
from ryu.services.protocols.bgp.api.prefix import TUNNEL_TYPE_VXLAN, TUNNEL_TYPE_NVGRE
assert tunnel_type in [None, TUNNEL_TYPE_VXLAN, TUNNEL_TYPE_NVGRE]
gen_lbl = False
prefix = subclass(**kwargs)
else:
raise BgpCoreError(desc='Unsupported route family %s' % route_family)
return vrf_table.insert_vrf_path(nlri=prefix, next_hop=next_hop,
gen_lbl=gen_lbl, is_withdraw=is_withdraw, redundancy_mode=
redundancy_mode, vni=vni, tunnel_type=tunnel_type, pmsi_tunnel_type
=pmsi_tunnel_type)
| update_vrf_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, route_dist, prefix=None, next_hop=None, route_family=None,\n route_type=None, tunnel_type=None, is_withdraw=False, redundancy_mode=\n None, pmsi_tu... |
def x(self, flowspec_family, route_dist, rules, actions=None, is_withdraw=False
):
from ryu.services.protocols.bgp.core import BgpCoreError
from ryu.services.protocols.bgp.api.prefix import FLOWSPEC_FAMILY_VPNV4, FLOWSPEC_FAMILY_VPNV6, FLOWSPEC_FAMILY_L2VPN
if flowspec_family == FLOWSPEC_FAMILY_VPNV4:
vrf_table = self._tables.get((route_dist, VRF_RF_IPV4_FLOWSPEC))
prefix = FlowSpecIPv4NLRI.from_user(**rules)
try:
communities = create_v4flowspec_actions(actions)
except ValueError as e:
raise BgpCoreError(desc=str(e))
elif flowspec_family == FLOWSPEC_FAMILY_VPNV6:
vrf_table = self._tables.get((route_dist, VRF_RF_IPV6_FLOWSPEC))
prefix = FlowSpecIPv6NLRI.from_user(**rules)
try:
communities = create_v6flowspec_actions(actions)
except ValueError as e:
raise BgpCoreError(desc=str(e))
elif flowspec_family == FLOWSPEC_FAMILY_L2VPN:
vrf_table = self._tables.get((route_dist, VRF_RF_L2VPN_FLOWSPEC))
prefix = FlowSpecL2VPNNLRI.from_user(route_dist, **rules)
try:
communities = create_l2vpnflowspec_actions(actions)
except ValueError as e:
raise BgpCoreError(desc=str(e))
else:
raise BgpCoreError(desc='Unsupported flowspec_family %s' %
flowspec_family)
if vrf_table is None:
raise BgpCoreError(desc=
'VRF table does not exist: route_dist=%s, flowspec_family=%s' %
(route_dist, flowspec_family))
vrf_table.insert_vrffs_path(nlri=prefix, communities=communities,
is_withdraw=is_withdraw)
| update_flowspec_vrf_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, flowspec_family, route_dist, rules, actions=None, is_withdraw=False\n ):\n from ryu.services.protocols.bgp.core import BgpCoreError\n from ryu.s... |
def x(self, prefix, next_hop=None, is_withdraw=False):
src_ver_num = 1
peer = None
origin = BGPPathAttributeOrigin(BGP_ATTR_ORIGIN_IGP)
aspath = BGPPathAttributeAsPath([[]])
pathattrs = OrderedDict()
pathattrs[BGP_ATTR_TYPE_ORIGIN] = origin
pathattrs[BGP_ATTR_TYPE_AS_PATH] = aspath
net = netaddr.IPNetwork(prefix)
addr = str(net.ip)
masklen = net.prefixlen
if ip.valid_ipv4(addr):
_nlri = IPAddrPrefix(masklen, addr)
if next_hop is None:
next_hop = '0.0.0.0'
p = Ipv4Path
else:
_nlri = IP6AddrPrefix(masklen, addr)
if next_hop is None:
next_hop = '::'
p = Ipv6Path
new_path = p(peer, _nlri, src_ver_num, pattrs=pathattrs, nexthop=
next_hop, is_withdraw=is_withdraw)
self.learn_path(new_path)
| update_global_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, prefix, next_hop=None, is_withdraw=False):\n src_ver_num = 1\n peer = None\n origin = BGPPathAttributeOrigin(BGP_ATTR_ORIGIN_IGP)\n aspath = ... |
def x(self, flowspec_family, rules, actions=None, is_withdraw=False):
from ryu.services.protocols.bgp.core import BgpCoreError
from ryu.services.protocols.bgp.api.prefix import FLOWSPEC_FAMILY_IPV4, FLOWSPEC_FAMILY_IPV6, FLOWSPEC_FAMILY_L2VPN
src_ver_num = 1
peer = None
origin = BGPPathAttributeOrigin(BGP_ATTR_ORIGIN_IGP)
aspath = BGPPathAttributeAsPath([[]])
pathattrs = OrderedDict()
pathattrs[BGP_ATTR_TYPE_ORIGIN] = origin
pathattrs[BGP_ATTR_TYPE_AS_PATH] = aspath
if flowspec_family == FLOWSPEC_FAMILY_IPV4:
_nlri = FlowSpecIPv4NLRI.from_user(**rules)
p = IPv4FlowSpecPath
try:
communities = create_v4flowspec_actions(actions)
except ValueError as e:
raise BgpCoreError(desc=str(e))
if communities:
pathattrs[BGP_ATTR_TYPE_EXTENDED_COMMUNITIES
] = BGPPathAttributeExtendedCommunities(communities=communities
)
elif flowspec_family == FLOWSPEC_FAMILY_IPV6:
_nlri = FlowSpecIPv6NLRI.from_user(**rules)
p = IPv6FlowSpecPath
try:
communities = create_v6flowspec_actions(actions)
except ValueError as e:
raise BgpCoreError(desc=str(e))
if communities:
pathattrs[BGP_ATTR_TYPE_EXTENDED_COMMUNITIES
] = BGPPathAttributeExtendedCommunities(communities=communities
)
elif flowspec_family == FLOWSPEC_FAMILY_L2VPN:
_nlri = FlowSpecL2VPNNLRI.from_user(**rules)
p = L2vpnFlowSpecPath
try:
communities = create_l2vpnflowspec_actions(actions)
except ValueError as e:
raise BgpCoreError(desc=str(e))
if communities:
pathattrs[BGP_ATTR_TYPE_EXTENDED_COMMUNITIES
] = BGPPathAttributeExtendedCommunities(communities=communities
)
else:
raise BgpCoreError(desc='Unsupported flowspec family %s' %
flowspec_family)
new_path = p(peer, _nlri, src_ver_num, pattrs=pathattrs, is_withdraw=
is_withdraw)
self.learn_path(new_path)
| update_flowspec_global_table | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, flowspec_family, rules, actions=None, is_withdraw=False):\n from ryu.services.protocols.bgp.core import BgpCoreError\n from ryu.services.protocols.... |
def x(self, peer, route_family=None):
if route_family is not None:
if route_family not in SUPPORTED_GLOBAL_RF:
raise ValueError('Given route family %s is not supported.' %
route_family)
tables = [self._global_tables.get(route_family)]
else:
tables = self._global_tables.values()
for table in tables:
table.cleanup_paths_for_peer(peer)
| clean_stale_routes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer, route_family=None):\n if route_family is not None:\n if route_family not in SUPPORTED_GLOBAL_RF:\n raise ValueError('Given rou... |
def x(self, dpid, port, mac):
old_port = self.mac_to_port[dpid].get(mac, None)
self.mac_to_port[dpid][mac] = port
if old_port is not None and old_port != port:
LOG.debug('port_add: 0x%016x 0x%04x %s', dpid, port, haddr_to_str(mac))
return old_port
| port_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpid, port, mac):\n old_port = self.mac_to_port[dpid].get(mac, None)\n self.mac_to_port[dpid][mac] = port\n if old_port is not None and old_port... |
def x(cls):
assert cls.nxm_headers is not None
assert cls.nxm_headers is not []
for nxm_header in cls.nxm_headers:
assert nxm_header not in _MF_FIELDS
_MF_FIELDS[nxm_header] = cls.make
return cls
| register_make | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls):\n assert cls.nxm_headers is not None\n assert cls.nxm_headers is not []\n for nxm_header in cls.nxm_headers:\n assert nxm_header not in _... |
def x(self):
assert self.flow_format() == ofproto_v1_0.NXFF_OPENFLOW10
wildcards = ofproto_v1_0.OFPFW_ALL
if not self.wc.wildcards & FWW_IN_PORT:
wildcards &= ~ofproto_v1_0.OFPFW_IN_PORT
if self.flow.dl_src != mac.DONTCARE:
wildcards &= ~ofproto_v1_0.OFPFW_DL_SRC
if self.flow.dl_dst != mac.DONTCARE:
wildcards &= ~ofproto_v1_0.OFPFW_DL_DST
if not self.wc.wildcards & FWW_DL_TYPE:
wildcards &= ~ofproto_v1_0.OFPFW_DL_TYPE
if self.flow.dl_vlan != 0:
wildcards &= ~ofproto_v1_0.OFPFW_DL_VLAN
if self.flow.dl_vlan_pcp != 0:
wildcards &= ~ofproto_v1_0.OFPFW_DL_VLAN_PCP
if self.flow.nw_tos != 0:
wildcards &= ~ofproto_v1_0.OFPFW_NW_TOS
if self.flow.nw_proto != 0:
wildcards &= ~ofproto_v1_0.OFPFW_NW_PROTO
if self.wc.nw_src_mask != 0 and '01' not in bin(self.wc.nw_src_mask):
wildcards &= ~ofproto_v1_0.OFPFW_NW_SRC_MASK
maskbits = bin(self.wc.nw_src_mask).count('0') - 1
wildcards |= maskbits << ofproto_v1_0.OFPFW_NW_SRC_SHIFT
if self.wc.nw_dst_mask != 0 and '01' not in bin(self.wc.nw_dst_mask):
wildcards &= ~ofproto_v1_0.OFPFW_NW_DST_MASK
maskbits = bin(self.wc.nw_dst_mask).count('0') - 1
wildcards |= maskbits << ofproto_v1_0.OFPFW_NW_DST_SHIFT
if self.flow.tp_src != 0:
wildcards &= ~ofproto_v1_0.OFPFW_TP_SRC
if self.flow.tp_dst != 0:
wildcards &= ~ofproto_v1_0.OFPFW_TP_DST
return (wildcards, self.flow.in_port, self.flow.dl_src, self.flow.
dl_dst, self.flow.dl_vlan, self.flow.dl_vlan_pcp, self.flow.dl_type,
self.flow.nw_tos & IP_DSCP_MASK, self.flow.nw_proto, self.flow.
nw_src, self.flow.nw_dst, self.flow.tp_src, self.flow.tp_dst)
| match_tuple | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n assert self.flow_format() == ofproto_v1_0.NXFF_OPENFLOW10\n wildcards = ofproto_v1_0.OFPFW_ALL\n if not self.wc.wildcards & FWW_IN_PORT:\n ... |
def x(name, pathname):
if six.PY2:
import imp
return imp.load_source(name, pathname)
else:
loader = importlib.machinery.SourceFileLoader(name, pathname)
return loader.load_module(name)
| load_source | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(name, pathname):\n if six.PY2:\n import imp\n return imp.load_source(name, pathname)\n else:\n loader = importlib.machinery.SourceFi... |
def x(addr):
e = ValueError('Invalid IP address and port pair: "%s"' % addr)
pair = addr.rsplit(':', 1)
if len(pair) != 2:
raise e
addr, port = pair
if addr.startswith('[') and addr.endswith(']'):
addr = addr.lstrip('[').rstrip(']')
if not ip.valid_ipv6(addr):
raise e
elif not ip.valid_ipv4(addr):
raise e
return addr, int(port, 0)
| split_addr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(addr):\n e = ValueError('Invalid IP address and port pair: \"%s\"' % addr)\n pair = addr.rsplit(':', 1)\n if len(pair) != 2:\n raise e\n add... |
def x(packet, vlan_id):
if vlan_id is None:
return
e = packet.protocols[0]
assert isinstance(e, ethernet.ethernet)
v = vlan.vlan(0, 0, vlan_id, e.ethertype)
e.ethertype = ether.ETH_TYPE_8021Q
packet.add_protocol(v)
| may_add_vlan | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, vlan_id):\n if vlan_id is None:\n return\n e = packet.protocols[0]\n assert isinstance(e, ethernet.ethernet)\n v = vlan.vlan(0, 0, v... |
def x(app, dpid):
switches = topo_api.get_switch(app, dpid)
if not switches:
return None
assert len(switches) == 1
return switches[0].dp
| get_dp | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app, dpid):\n switches = topo_api.get_switch(app, dpid)\n if not switches:\n return None\n assert len(switches) == 1\n return switches[0].dp... |
def x(path, new_rt_as):
assert path and new_rt_as
if not path or path.route_family != RF_RTC_UC:
raise ValueError('Expected RT_NLRI path')
old_nlri = path.nlri
new_rt_nlri = RouteTargetMembershipNLRI(new_rt_as, old_nlri.route_target)
return RtcPath(path.source, new_rt_nlri, path.source_version_num,
pattrs=path.pathattr_map, nexthop=path.nexthop, is_withdraw=path.
is_withdraw)
| clone_rtcpath_update_rt_as | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, new_rt_as):\n assert path and new_rt_as\n if not path or path.route_family != RF_RTC_UC:\n raise ValueError('Expected RT_NLRI path')\n ol... |
def x(bgp_id):
four_byte_id = None
try:
four_byte_id = ip.ipv4_to_int(bgp_id)
except ValueError:
LOG.debug('Invalid bgp id given for conversion to integer value %s',
bgp_id)
return four_byte_id
| from_inet_ptoi | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(bgp_id):\n four_byte_id = None\n try:\n four_byte_id = ip.ipv4_to_int(bgp_id)\n except ValueError:\n LOG.debug('Invalid bgp id given for... |
def x(path):
path_attrs = path.pathattr_map
unknown_opt_tran_attrs = {}
for _, attr in path_attrs.items():
if isinstance(attr, BGPPathAttributeUnknown) and attr.flags & (
BGP_ATTR_FLAG_OPTIONAL | BGP_ATTR_FLAG_TRANSITIVE) or isinstance(
attr, BGPPathAttributeAs4Path) or isinstance(attr,
BGPPathAttributeAs4Aggregator):
unknown_opt_tran_attrs[attr.type] = attr
return unknown_opt_tran_attrs
| get_unknown_opttrans_attr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path):\n path_attrs = path.pathattr_map\n unknown_opt_tran_attrs = {}\n for _, attr in path_attrs.items():\n if isinstance(attr, BGPPathAttribu... |
def x():
mpunreach_attr = BGPPathAttributeMpUnreachNLRI(RF_IPv4_VPN.afi,
RF_IPv4_VPN.safi, [])
eor = BGPUpdate(path_attributes=[mpunreach_attr])
return eor
| create_end_of_rib_update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n mpunreach_attr = BGPPathAttributeMpUnreachNLRI(RF_IPv4_VPN.afi,\n RF_IPv4_VPN.safi, [])\n eor = BGPUpdate(path_attributes=[mpunreach_attr])\n... |
def x(value, subtype=2):
global_admin, local_admin = value.split(':')
local_admin = int(local_admin)
if global_admin.isdigit() and 0 <= int(global_admin) <= 65535:
ext_com = BGPTwoOctetAsSpecificExtendedCommunity(subtype=subtype,
as_number=int(global_admin), local_administrator=local_admin)
elif global_admin.isdigit() and 65535 < int(global_admin) <= 4294967295:
ext_com = BGPFourOctetAsSpecificExtendedCommunity(subtype=subtype,
as_number=int(global_admin), local_administrator=local_admin)
elif ip.valid_ipv4(global_admin):
ext_com = BGPIPv4AddressSpecificExtendedCommunity(subtype=subtype,
ipv4_address=global_admin, local_administrator=local_admin)
else:
raise ValueError('Invalid Route Target or Route Origin value: %s' %
value)
return ext_com
| create_rt_extended_community | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(value, subtype=2):\n global_admin, local_admin = value.split(':')\n local_admin = int(local_admin)\n if global_admin.isdigit() and 0 <= int(global_adm... |
def x(actions=None):
from ryu.services.protocols.bgp.api.prefix import FLOWSPEC_ACTION_TRAFFIC_RATE, FLOWSPEC_ACTION_TRAFFIC_ACTION, FLOWSPEC_ACTION_REDIRECT, FLOWSPEC_ACTION_TRAFFIC_MARKING
action_types = {FLOWSPEC_ACTION_TRAFFIC_RATE:
BGPFlowSpecTrafficRateCommunity, FLOWSPEC_ACTION_TRAFFIC_ACTION:
BGPFlowSpecTrafficActionCommunity, FLOWSPEC_ACTION_REDIRECT:
BGPFlowSpecRedirectCommunity, FLOWSPEC_ACTION_TRAFFIC_MARKING:
BGPFlowSpecTrafficMarkingCommunity}
return _create_actions(actions, action_types)
| create_v4flowspec_actions | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(actions=None):\n from ryu.services.protocols.bgp.api.prefix import FLOWSPEC_ACTION_TRAFFIC_RATE, FLOWSPEC_ACTION_TRAFFIC_ACTION, FLOWSPEC_ACTION_REDIRECT, F... |
def x(actions=None):
from ryu.services.protocols.bgp.api.prefix import FLOWSPEC_ACTION_TRAFFIC_RATE, FLOWSPEC_ACTION_TRAFFIC_ACTION, FLOWSPEC_ACTION_REDIRECT, FLOWSPEC_ACTION_TRAFFIC_MARKING, FLOWSPEC_ACTION_VLAN, FLOWSPEC_ACTION_TPID
action_types = {FLOWSPEC_ACTION_TRAFFIC_RATE:
BGPFlowSpecTrafficRateCommunity, FLOWSPEC_ACTION_TRAFFIC_ACTION:
BGPFlowSpecTrafficActionCommunity, FLOWSPEC_ACTION_REDIRECT:
BGPFlowSpecRedirectCommunity, FLOWSPEC_ACTION_TRAFFIC_MARKING:
BGPFlowSpecTrafficMarkingCommunity, FLOWSPEC_ACTION_VLAN:
BGPFlowSpecVlanActionCommunity, FLOWSPEC_ACTION_TPID:
BGPFlowSpecTPIDActionCommunity}
return _create_actions(actions, action_types)
| create_l2vpnflowspec_actions | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(actions=None):\n from ryu.services.protocols.bgp.api.prefix import FLOWSPEC_ACTION_TRAFFIC_RATE, FLOWSPEC_ACTION_TRAFFIC_ACTION, FLOWSPEC_ACTION_REDIRECT, F... |
def x(cls, type_):
if type_ <= ether.ETH_TYPE_IEEE802_3:
type_ = ether.ETH_TYPE_IEEE802_3
return cls._TYPES.get(type_)
| get_packet_type | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, type_):\n if type_ <= ether.ETH_TYPE_IEEE802_3:\n type_ = ether.ETH_TYPE_IEEE802_3\n return cls._TYPES.get(type_)\n",
"role": "user"
},... |
def x(func):
@functools.wraps(func)
def x(session, *args, **kwargs):
ret = None
try:
ret = func(session, *args, **kwargs)
if session.dirty:
session.commit()
except Exception as e:
LOG.error('Error in %s: %s', func.__name__, e)
if session.dirty:
LOG.error('Do rolling back %s table', session.dirty[0].
__tablename__)
session.rollback()
return ret
return _wrapper
| sql_function | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(func):\n\n @functools.wraps(func)\n def x(session, *args, **kwargs):\n ret = None\n try:\n ret = func(session, *args, **kwargs)\... |
def x(app, msg, reply_cls=None, reply_multi=False):
return app.send_request(event.SendMsgRequest(msg=msg, reply_cls=
reply_cls, reply_multi=reply_multi))()
| send_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app, msg, reply_cls=None, reply_multi=False):\n return app.send_request(event.SendMsgRequest(msg=msg, reply_cls=\n reply_cls, reply_multi=reply_multi... |
def x(**kwargs):
if CORE_MANAGER.started:
raise RuntimeConfigError(
'Current context has to be stopped to start a new context.')
try:
waiter = kwargs.pop('waiter')
except KeyError:
waiter = hub.Event()
common_config = CommonConf(**kwargs)
hub.spawn(CORE_MANAGER.start, *[], **{'common_conf': common_config,
'waiter': waiter})
return True
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(**kwargs):\n if CORE_MANAGER.started:\n raise RuntimeConfigError(\n 'Current context has to be stopped to start a new context.')\n try:... |
def x(ip):
if not is_valid_ipv4(ip) and not is_valid_ipv6(ip):
raise ApplicationException(desc='Invalid RPC ip address: %s' % ip)
return ip
| validate_rpc_host | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ip):\n if not is_valid_ipv4(ip) and not is_valid_ipv6(ip):\n raise ApplicationException(desc='Invalid RPC ip address: %s' % ip)\n return ip\n",
... |
def x(config_file):
if not config_file or not os.path.isfile(config_file):
raise ApplicationException(desc='Invalid configuration file: %s' %
config_file)
try:
return load_source('bgpspeaker.application.settings', config_file)
except Exception as e:
raise ApplicationException(desc=str(e))
| load_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(config_file):\n if not config_file or not os.path.isfile(config_file):\n raise ApplicationException(desc='Invalid configuration file: %s' %\n ... |
def x(self, settings):
_required_settings = LOCAL_AS, ROUTER_ID
for required in _required_settings:
if required not in settings:
raise ApplicationException(desc=
'Required BGP configuration missing: %s' % required)
settings.setdefault('best_path_change_handler', self.
_notify_best_path_changed_event)
settings.setdefault('adj_rib_in_change_handler', self.
_notify_adj_rib_in_changed_event)
settings.setdefault('peer_down_handler', self._notify_peer_down_event)
settings.setdefault('peer_up_handler', self._notify_peer_up_event)
neighbors_settings = settings.pop('neighbors', [])
vrfs_settings = settings.pop('vrfs', [])
routes_settings = settings.pop('routes', [])
LOG.debug('Starting BGPSpeaker...')
settings.setdefault('as_number', settings.pop(LOCAL_AS))
self.speaker = BGPSpeaker(**settings)
LOG.debug('Adding neighbors...')
self._add_neighbors(neighbors_settings)
LOG.debug('Adding VRFs...')
self._add_vrfs(vrfs_settings)
LOG.debug('Adding routes...')
self._add_routes(routes_settings)
| start_speaker | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, settings):\n _required_settings = LOCAL_AS, ROUTER_ID\n for required in _required_settings:\n if required not in settings:\n rais... |
def x(self, settings):
for neighbor_settings in settings:
LOG.debug('Adding neighbor settings: %s', neighbor_settings)
try:
self.speaker.neighbor_add(**neighbor_settings)
except RuntimeConfigError as e:
LOG.exception(e)
| add_neighbors | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, settings):\n for neighbor_settings in settings:\n LOG.debug('Adding neighbor settings: %s', neighbor_settings)\n try:\n self.... |
def x(self, settings):
for vrf_settings in settings:
LOG.debug('Adding VRF settings: %s', vrf_settings)
try:
self.speaker.vrf_add(**vrf_settings)
except RuntimeConfigError as e:
LOG.exception(e)
| add_vrfs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, settings):\n for vrf_settings in settings:\n LOG.debug('Adding VRF settings: %s', vrf_settings)\n try:\n self.speaker.vrf_add... |
def x(self, settings):
for route_settings in settings:
if 'prefix' in route_settings:
prefix_add = self.speaker.prefix_add
elif 'route_type' in route_settings:
prefix_add = self.speaker.evpn_prefix_add
elif 'flowspec_family' in route_settings:
prefix_add = self.speaker.flowspec_prefix_add
else:
LOG.debug('Skip invalid route settings: %s', route_settings)
continue
LOG.debug('Adding route settings: %s', route_settings)
try:
prefix_add(**route_settings)
except RuntimeConfigError as e:
LOG.exception(e)
| add_routes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, settings):\n for route_settings in settings:\n if 'prefix' in route_settings:\n prefix_add = self.speaker.prefix_add\n elif '... |
def x(addr):
m = re.match('unix:(\\S+)', addr)
if m:
file = m.group(1)
return os.path.isfile(file)
m = re.match('(tcp|ssl):(\\S+):(\\d+)', addr)
if m:
address = m.group(2)
port = m.group(3)
if '[' in address:
address = address.strip('[').strip(']')
return ip.valid_ipv6(address) and port.isdigit()
else:
return ip.valid_ipv4(address) and port.isdigit()
return False
| valid_ovsdb_addr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(addr):\n m = re.match('unix:(\\\\S+)', addr)\n if m:\n file = m.group(1)\n return os.path.isfile(file)\n m = re.match('(tcp|ssl):(\\\\S+... |
def x(self, br_name, port_name, may_exist, fake_iface, iface_names,
settings=None):
settings = settings or []
self.populate_cache()
if may_exist:
vsctl_port = self.find_port(port_name, False)
if vsctl_port:
want_names = set(iface_names)
have_names = set(ovsrec_iface.name for ovsrec_iface in
vsctl_port.port_cfg.interfaces)
if vsctl_port.bridge().name != br_name:
vsctl_fatal(
'"%s" but %s is actually attached to vsctl_bridge %s' %
(br_name, port_name, vsctl_port.bridge().name))
if want_names != have_names:
want_names_string = ','.join(want_names)
have_names_string = ','.join(have_names)
vsctl_fatal('"%s" but %s actually has interface(s) %s' % (
want_names_string, port_name, have_names_string))
return
self.check_conflicts(port_name, 'cannot create a port named %s' % port_name
)
for iface_name in iface_names:
self.check_conflicts(iface_name,
'cannot create an interface named %s' % iface_name)
vsctl_bridge = self.find_bridge(br_name, True)
ifaces = []
for iface_name in iface_names:
ovsrec_iface = self.txn.insert(self.idl.tables[vswitch_idl.
OVSREC_TABLE_INTERFACE])
ovsrec_iface.name = iface_name
ifaces.append(ovsrec_iface)
ovsrec_port = self.txn.insert(self.idl.tables[vswitch_idl.
OVSREC_TABLE_PORT])
ovsrec_port.name = port_name
ovsrec_port.interfaces = ifaces
ovsrec_port.bond_fake_iface = fake_iface
if vsctl_bridge.parent:
tag = vsctl_bridge.vlan
ovsrec_port.tag = tag
for column, value in settings:
self.set_column(ovsrec_port, column, value)
if vsctl_bridge.parent:
ovsrec_bridge = vsctl_bridge.parent.br_cfg
else:
ovsrec_bridge = vsctl_bridge.br_cfg
self.bridge_insert_port(ovsrec_bridge, ovsrec_port)
vsctl_port = self.add_port_to_cache(vsctl_bridge, ovsrec_port)
for ovsrec_iface in ifaces:
self.add_iface_to_cache(vsctl_port, ovsrec_iface)
| add_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, br_name, port_name, may_exist, fake_iface, iface_names,\n settings=None):\n settings = settings or []\n self.populate_cache()\n if may_exist:... |
def x(setting_string):
if ':' in setting_string:
column, key = setting_string.split(':', 1)
else:
column = setting_string
key = None
return column, key
| parse_column_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(setting_string):\n if ':' in setting_string:\n column, key = setting_string.split(':', 1)\n else:\n column = setting_string\n key = ... |
def x(table_schema, setting_string):
if ':' in setting_string:
column, value = setting_string.split(':', 1)
elif '=' in setting_string:
column, value = setting_string.split('=', 1)
else:
column = setting_string
value = None
if value is not None:
type_ = table_schema.columns[column].type
value = datum_from_string(type_, value)
return column, value
| parse_column_key_value | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(table_schema, setting_string):\n if ':' in setting_string:\n column, value = setting_string.split(':', 1)\n elif '=' in setting_string:\n c... |
def x(self, commands):
self._reset()
self._init_schema_helper()
self._run_prerequisites(commands)
idl_ = idl.Idl(self.remote, self.schema_helper)
seqno = idl_.change_seqno
while True:
self._idl_wait(idl_, seqno)
seqno = idl_.change_seqno
if self._do_vsctl(idl_, commands):
break
if self.txn:
self.txn.abort()
self.txn = None
idl_.close()
| do_main | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, commands):\n self._reset()\n self._init_schema_helper()\n self._run_prerequisites(commands)\n idl_ = idl.Idl(self.remote, self.schema_helper)... |
def x(self, commands):
all_commands = {'init': (None, self._cmd_init), 'show': (self.
_pre_cmd_show, self._cmd_show), 'add-br': (self._pre_add_br, self.
_cmd_add_br), 'del-br': (self._pre_get_info, self._cmd_del_br),
'list-br': (self._pre_get_info, self._cmd_list_br), 'br-exists': (
self._pre_get_info, self._cmd_br_exists), 'br-to-vlan': (self.
_pre_get_info, self._cmd_br_to_vlan), 'br-to-parent': (self.
_pre_get_info, self._cmd_br_to_parent), 'br-set-external-id': (self
._pre_cmd_br_set_external_id, self._cmd_br_set_external_id),
'br-get-external-id': (self._pre_cmd_br_get_external_id, self.
_cmd_br_get_external_id), 'list-ports': (self._pre_get_info, self.
_cmd_list_ports), 'add-port': (self._pre_cmd_add_port, self.
_cmd_add_port), 'add-bond': (self._pre_cmd_add_bond, self.
_cmd_add_bond), 'del-port': (self._pre_get_info, self._cmd_del_port
), 'port-to-br': (self._pre_get_info, self._cmd_port_to_br),
'list-ifaces': (self._pre_get_info, self._cmd_list_ifaces),
'iface-to-br': (self._pre_get_info, self._cmd_iface_to_br),
'get-controller': (self._pre_controller, self._cmd_get_controller),
'del-controller': (self._pre_controller, self._cmd_del_controller),
'set-controller': (self._pre_controller, self._cmd_set_controller),
'get-fail-mode': (self._pre_fail_mode, self._cmd_get_fail_mode),
'del-fail-mode': (self._pre_fail_mode, self._cmd_del_fail_mode),
'set-fail-mode': (self._pre_fail_mode, self._cmd_set_fail_mode),
'list': (self._pre_cmd_list, self._cmd_list), 'find': (self.
_pre_cmd_find, self._cmd_find), 'get': (self._pre_cmd_get, self.
_cmd_get), 'set': (self._pre_cmd_set, self._cmd_set), 'add': (self.
_pre_cmd_add, self._cmd_add), 'remove': (self._pre_cmd_remove, self
._cmd_remove), 'clear': (self._pre_cmd_clear, self._cmd_clear),
'set-qos': (self._pre_cmd_set_qos, self._cmd_set_qos), 'set-queue':
(self._pre_cmd_set_queue, self._cmd_set_queue), 'del-qos': (self.
_pre_get_info, self._cmd_del_qos), 'list-ifaces-verbose': (self.
_pre_cmd_list_ifaces_verbose, self._cmd_list_ifaces_verbose)}
for command in commands:
funcs = all_commands[command.command]
command._prerequisite, command._run = funcs
self._do_main(commands)
| run_command | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, commands):\n all_commands = {'init': (None, self._cmd_init), 'show': (self.\n _pre_cmd_show, self._cmd_show), 'add-br': (self._pre_add_br, self... |
def x(self, commands, timeout_sec=None, exception=None):
if timeout_sec is None:
self._run_command(commands)
else:
with hub.Timeout(timeout_sec, exception):
self._run_command(commands)
| run_command | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, commands, timeout_sec=None, exception=None):\n if timeout_sec is None:\n self._run_command(commands)\n else:\n with hub.Timeout(timeo... |
def x(self, ovsrec_row, column_value):
column, value_json = column_value
column_schema = ovsrec_row._table.columns[column]
value = ovs.db.data.Datum.from_json(column_schema.type, value_json
).to_python(ovs.db.idl._uuid_to_row)
datum = getattr(ovsrec_row, column)
if column_schema.type.is_map():
for k, v in value.items():
if k in datum and datum[k] == v:
return True
elif datum == value:
return True
return False
| check_value | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ovsrec_row, column_value):\n column, value_json = column_value\n column_schema = ovsrec_row._table.columns[column]\n value = ovs.db.data.Datum.f... |
def x(self, ctx, table_name, column_values):
result = []
for ovsrec_row in ctx.idl.tables[table_name].rows.values():
LOG.debug('ovsrec_row %s', ovsrec_row_to_string(ovsrec_row))
if all(self._check_value(ovsrec_row, column_value) for column_value in
column_values):
result.append(ovsrec_row)
return result
| find | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ctx, table_name, column_values):\n result = []\n for ovsrec_row in ctx.idl.tables[table_name].rows.values():\n LOG.debug('ovsrec_row %s', ov... |
def x(self, ctx, table_name, record_id, column_values):
vsctl_table = self._get_table(table_name)
ovsrec_row = ctx.must_get_row(vsctl_table, record_id)
for column, value in column_values:
ctx.set_column(ovsrec_row, column, value)
ctx.invalidate_cache()
| set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ctx, table_name, record_id, column_values):\n vsctl_table = self._get_table(table_name)\n ovsrec_row = ctx.must_get_row(vsctl_table, record_id)\n ... |
def x(self, ctx, table_name, record_id, column_values):
vsctl_table = self._get_table(table_name)
ovsrec_row = ctx.must_get_row(vsctl_table, record_id)
for column, value in column_values:
ctx.add_column(ovsrec_row, column, value)
ctx.invalidate_cache()
| add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ctx, table_name, record_id, column_values):\n vsctl_table = self._get_table(table_name)\n ovsrec_row = ctx.must_get_row(vsctl_table, record_id)\n ... |
def x(self, ctx, table_name, record_id, column_values):
vsctl_table = self._get_table(table_name)
ovsrec_row = ctx.must_get_row(vsctl_table, record_id)
for column, value in column_values:
ctx.remove_column(ovsrec_row, column, value)
ctx.invalidate_cache()
| remove | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ctx, table_name, record_id, column_values):\n vsctl_table = self._get_table(table_name)\n ovsrec_row = ctx.must_get_row(vsctl_table, record_id)\n ... |
def x(code, sub_code, def_desc='unknown'):
if _EXCEPTION_REGISTRY.get((code, sub_code)) is not None:
raise ValueError(
'BGPSException with code %d and sub-code %d already defined.' %
(code, sub_code))
def x(subclass):
if issubclass(subclass, BGPSException):
_EXCEPTION_REGISTRY[code, sub_code] = subclass
subclass.CODE = code
subclass.SUB_CODE = sub_code
subclass.DEF_DESC = def_desc
return subclass
return decorator
| add_bgp_error_metadata | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(code, sub_code, def_desc='unknown'):\n if _EXCEPTION_REGISTRY.get((code, sub_code)) is not None:\n raise ValueError(\n 'BGPSException with... |
def x(**kwargs):
def x(func):
_VALIDATORS[kwargs.pop('name', func.__name__)] = func
return func
return decorator
| validate | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(**kwargs):\n\n def x(func):\n _VALIDATORS[kwargs.pop('name', func.__name__)] = func\n return func\n return decorator\n",
"role": "user"... |
def x(self):
outgoing_msg = self.outgoing_msg_list.pop_first()
if outgoing_msg is None:
self.outgoing_msg_event.clear()
self.outgoing_msg_event.wait()
outgoing_msg = self.outgoing_msg_list.pop_first()
return outgoing_msg
| next | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n outgoing_msg = self.outgoing_msg_list.pop_first()\n if outgoing_msg is None:\n self.outgoing_msg_event.clear()\n self.outgoing_msg... |
def x(self, commands):
self.vsctl.run_command(commands, self.timeout, self.exception)
| run_command | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, commands):\n self.vsctl.run_command(commands, self.timeout, self.exception)\n",
"role": "user"
},
{
"content": "run_command",
"role": ... |
def x(self):
if not valid_ovsdb_addr(self.ovsdb_addr):
raise ValueError('Invalid OVSDB address: %s' % self.ovsdb_addr)
if self.br_name is None:
self.br_name = self._get_bridge_name()
| init | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not valid_ovsdb_addr(self.ovsdb_addr):\n raise ValueError('Invalid OVSDB address: %s' % self.ovsdb_addr)\n if self.br_name is None:\n ... |
def x(self):
command = ovs_vsctl.VSCtlCommand('find', ('Bridge', 'datapath_id=%s' %
dpid_lib.dpid_to_str(self.datapath_id)))
self.run_command([command])
if not isinstance(command.result, list) or len(command.result) != 1:
raise OVSBridgeNotFound(datapath_id=dpid_lib.dpid_to_str(self.
datapath_id))
return command.result[0].name
| get_bridge_name | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n command = ovs_vsctl.VSCtlCommand('find', ('Bridge', 'datapath_id=%s' %\n dpid_lib.dpid_to_str(self.datapath_id)))\n self.run_command([com... |
def x(self):
command = ovs_vsctl.VSCtlCommand('get-controller', [self.br_name])
self.run_command([command])
result = command.result
return result[0] if len(result) == 1 else result
| get_controller | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n command = ovs_vsctl.VSCtlCommand('get-controller', [self.br_name])\n self.run_command([command])\n result = command.result\n return result... |
def x(self, controllers):
command = ovs_vsctl.VSCtlCommand('set-controller', [self.br_name])
command.args.extend(controllers)
self.run_command([command])
| set_controller | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, controllers):\n command = ovs_vsctl.VSCtlCommand('set-controller', [self.br_name])\n command.args.extend(controllers)\n self.run_command([comman... |
def x(self):
command = ovs_vsctl.VSCtlCommand('del-controller', [self.br_name])
self.run_command([command])
| del_controller | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n command = ovs_vsctl.VSCtlCommand('del-controller', [self.br_name])\n self.run_command([command])\n",
"role": "user"
},
{
"content": ... |
def x(self, table, record=None):
command = ovs_vsctl.VSCtlCommand('list', (table, record))
self.run_command([command])
if command.result:
return command.result
return []
| list_db_attributes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, table, record=None):\n command = ovs_vsctl.VSCtlCommand('list', (table, record))\n self.run_command([command])\n if command.result:\n ret... |
def x(self, table, *conditions):
args = [table]
args.extend(conditions)
command = ovs_vsctl.VSCtlCommand('find', args)
self.run_command([command])
if command.result:
return command.result
return []
| find_db_attributes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, table, *conditions):\n args = [table]\n args.extend(conditions)\n command = ovs_vsctl.VSCtlCommand('find', args)\n self.run_command([command]... |
def x(self, table, record, column, key=None):
if key is not None:
column = '%s:%s' % (column, key)
command = ovs_vsctl.VSCtlCommand('get', (table, record, column))
self.run_command([command])
if command.result:
return command.result[0]
return None
| get_db_attribute | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, table, record, column, key=None):\n if key is not None:\n column = '%s:%s' % (column, key)\n command = ovs_vsctl.VSCtlCommand('get', (table,... |
def x(self, table, record, column, value, key=None):
if key is not None:
column = '%s:%s' % (column, key)
command = ovs_vsctl.VSCtlCommand('set', (table, record, '%s=%s' % (
column, value)))
self.run_command([command])
| set_db_attribute | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, table, record, column, value, key=None):\n if key is not None:\n column = '%s:%s' % (column, key)\n command = ovs_vsctl.VSCtlCommand('set', ... |
def x(self, table, record, column):
command = ovs_vsctl.VSCtlCommand('clear', (table, record, column))
self.run_command([command])
| clear_db_attribute | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, table, record, column):\n command = ovs_vsctl.VSCtlCommand('clear', (table, record, column))\n self.run_command([command])\n",
"role": "user"
... |
def x(self, table, record, column):
command = ovs_vsctl.VSCtlCommand('get', (table, record, column))
self.run_command([command])
assert len(command.result) == 1
return command.result[0]
| db_get_val | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, table, record, column):\n command = ovs_vsctl.VSCtlCommand('get', (table, record, column))\n self.run_command([command])\n assert len(command.re... |
def x(self, table, record, column):
val = self.db_get_val(table, record, column)
assert isinstance(val, dict)
return val
| db_get_map | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, table, record, column):\n val = self.db_get_val(table, record, column)\n assert isinstance(val, dict)\n return val\n",
"role": "user"
},
... |
def x(self, port_name):
command = ovs_vsctl.VSCtlCommand('del-port', (self.br_name, port_name),
'--if-exists')
self.run_command([command])
| delete_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, port_name):\n command = ovs_vsctl.VSCtlCommand('del-port', (self.br_name, port_name),\n '--if-exists')\n self.run_command([command])\n",
... |
def x(self, port_name):
ofport_list = self.db_get_val('Interface', port_name, 'ofport')
assert len(ofport_list) == 1
return int(ofport_list[0])
| get_ofport | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, port_name):\n ofport_list = self.db_get_val('Interface', port_name, 'ofport')\n assert len(ofport_list) == 1\n return int(ofport_list[0])\n",
... |
def x(self):
command = ovs_vsctl.VSCtlCommand('list-ports', (self.br_name,))
self.run_command([command])
return command.result
| get_port_name_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n command = ovs_vsctl.VSCtlCommand('list-ports', (self.br_name,))\n self.run_command([command])\n return command.result\n",
"role": "user"
... |
def x(self, name, ifaces, bond_mode=None, lacp=None):
assert len(ifaces) >= 2
options = ''
if bond_mode:
options += 'bond_mode=%(bond_mode)s' % locals()
if lacp:
options += 'lacp=%(lacp)s' % locals()
command_add = ovs_vsctl.VSCtlCommand('add-bond', (self.br_name, name,
ifaces), options)
self.run_command([command_add])
| add_bond | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name, ifaces, bond_mode=None, lacp=None):\n assert len(ifaces) >= 2\n options = ''\n if bond_mode:\n options += 'bond_mode=%(bond_mode)s'... |
def x(self, name, tunnel_type, remote_ip, local_ip=None, key=None, ofport=None
):
options = 'remote_ip=%(remote_ip)s' % locals()
if key:
options += ',key=%(key)s' % locals()
if local_ip:
options += ',local_ip=%(local_ip)s' % locals()
args = ['Interface', name, 'type=%s' % tunnel_type, 'options:%s' % options]
if ofport:
args.append('ofport_request=%(ofport)s' % locals())
command_add = ovs_vsctl.VSCtlCommand('add-port', (self.br_name, name))
command_set = ovs_vsctl.VSCtlCommand('set', args)
self.run_command([command_add, command_set])
| add_tunnel_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name, tunnel_type, remote_ip, local_ip=None, key=None, ofport=None\n ):\n options = 'remote_ip=%(remote_ip)s' % locals()\n if key:\n opti... |
def x(self, name, remote_ip, local_ip=None, key=None, ofport=None):
self.add_tunnel_port(name, 'gre', remote_ip, local_ip=local_ip, key=key,
ofport=ofport)
| add_gre_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name, remote_ip, local_ip=None, key=None, ofport=None):\n self.add_tunnel_port(name, 'gre', remote_ip, local_ip=local_ip, key=key,\n ofport=ofp... |
def x(self, name, remote_ip, local_ip=None, key=None, ofport=None):
self.add_tunnel_port(name, 'vxlan', remote_ip, local_ip=local_ip, key=
key, ofport=ofport)
| add_vxlan_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name, remote_ip, local_ip=None, key=None, ofport=None):\n self.add_tunnel_port(name, 'vxlan', remote_ip, local_ip=local_ip, key=\n key, ofport=... |
def x(self, port_name):
command = ovs_vsctl.VSCtlCommand('del-port', (self.br_name, port_name))
self.run_command([command])
| del_port | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, port_name):\n command = ovs_vsctl.VSCtlCommand('del-port', (self.br_name, port_name))\n self.run_command([command])\n",
"role": "user"
},
{... |
def x(self, port_name, type='linux-htb', max_rate=None, queues=None):
queues = queues if queues else []
command_qos = ovs_vsctl.VSCtlCommand('set-qos', [port_name, type, max_rate]
)
command_queue = ovs_vsctl.VSCtlCommand('set-queue', [port_name, queues])
self.run_command([command_qos, command_queue])
if command_qos.result and command_queue.result:
return command_qos.result + command_queue.result
return None
| set_qos | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, port_name, type='linux-htb', max_rate=None, queues=None):\n queues = queues if queues else []\n command_qos = ovs_vsctl.VSCtlCommand('set-qos', [po... |
def x(self, port_name):
command = ovs_vsctl.VSCtlCommand('del-qos', [port_name])
self.run_command([command])
| del_qos | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, port_name):\n command = ovs_vsctl.VSCtlCommand('del-qos', [port_name])\n self.run_command([command])\n",
"role": "user"
},
{
"content":... |
def x(ipvx, length, payload):
if ipvx.version == 4:
header = struct.pack(_IPV4_PSEUDO_HEADER_PACK_STR, addrconv.ipv4.
text_to_bin(ipvx.src), addrconv.ipv4.text_to_bin(ipvx.dst),
ipvx.proto, length)
elif ipvx.version == 6:
header = struct.pack(_IPV6_PSEUDO_HEADER_PACK_STR, addrconv.ipv6.
text_to_bin(ipvx.src), addrconv.ipv6.text_to_bin(ipvx.dst),
length, ipvx.nxt)
else:
raise ValueError('Unknown IP version %d' % ipvx.version)
buf = header + payload
return checksum(buf)
| checksum_ip | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ipvx, length, payload):\n if ipvx.version == 4:\n header = struct.pack(_IPV4_PSEUDO_HEADER_PACK_STR, addrconv.ipv4.\n text_to_bin(ipvx.src... |
def x(data, offset):
c0 = 0
c1 = 0
pos = 0
length = len(data)
data = bytearray(data)
data[offset:offset + 2] = [0] * 2
while pos < length:
tlen = min(length - pos, _MODX)
for d in data[pos:pos + tlen]:
c0 += d
c1 += c0
c0 %= 255
c1 %= 255
pos += tlen
x = ((length - offset - 1) * c0 - c1) % 255
if x <= 0:
x += 255
y = 510 - c0 - x
if y > 255:
y -= 255
data[offset] = x
data[offset + 1] = y
return x << 8 | y & 255
| fletcher_checksum | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data, offset):\n c0 = 0\n c1 = 0\n pos = 0\n length = len(data)\n data = bytearray(data)\n data[offset:offset + 2] = [0] * 2\n while pos <... |
def x(app, interface, config):
config_request = vrrp_event.EventVRRPConfigRequest(interface, config)
config_request.sync = True
return app.send_request(config_request)
| vrrp_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app, interface, config):\n config_request = vrrp_event.EventVRRPConfigRequest(interface, config)\n config_request.sync = True\n return app.send_reques... |
def x(app, instance_name):
shutdown_request = vrrp_event.EventVRRPShutdownRequest(instance_name)
app.send_event(vrrp_event.VRRP_MANAGER_NAME, shutdown_request)
| vrrp_shutdown | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app, instance_name):\n shutdown_request = vrrp_event.EventVRRPShutdownRequest(instance_name)\n app.send_event(vrrp_event.VRRP_MANAGER_NAME, shutdown_requ... |
def x(app, monitor_name, data):
transmit_request = vrrp_event.EventVRRPTransmitRequest(data)
app.send_event(monitor_name, transmit_request)
| vrrp_transmit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app, monitor_name, data):\n transmit_request = vrrp_event.EventVRRPTransmitRequest(data)\n app.send_event(monitor_name, transmit_request)\n",
"role":... |
def x(app, instance_name=None):
list_request = vrrp_event.EventVRRPListRequest(instance_name)
list_request.dst = vrrp_event.VRRP_MANAGER_NAME
return app.send_request(list_request)
| vrrp_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app, instance_name=None):\n list_request = vrrp_event.EventVRRPListRequest(instance_name)\n list_request.dst = vrrp_event.VRRP_MANAGER_NAME\n return a... |
def x(app, instance_name, priority=None, advertisement_interval=None,
preempt_mode=None, accept_mode=None):
config_change = vrrp_event.EventVRRPConfigChangeRequest(instance_name,
priority, advertisement_interval, preempt_mode, accept_mode)
return app.send_event(vrrp_event.VRRP_MANAGER_NAME, config_change)
| vrrp_config_change | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(app, instance_name, priority=None, advertisement_interval=None,\n preempt_mode=None, accept_mode=None):\n config_change = vrrp_event.EventVRRPConfigChang... |
def x(cls, buf, offset):
match = OFPMatch()
type_, length = struct.unpack_from('!HH', buf, offset)
match.type = type_
match.length = length
offset += 4
length -= 4
fields = []
while length > 0:
n, value, mask, field_len = ofproto.oxm_parse(buf, offset)
k, uv = ofproto.oxm_to_user(n, value, mask)
fields.append((k, uv))
offset += field_len
length -= field_len
match._fields2 = fields
return match
| parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, buf, offset):\n match = OFPMatch()\n type_, length = struct.unpack_from('!HH', buf, offset)\n match.type = type_\n match.length = length\n ... |
def x(self, buf, offset):
fields = [ofproto.oxm_from_user(k, uv) for k, uv in self._fields2]
hdr_pack_str = '!HH'
field_offset = offset + struct.calcsize(hdr_pack_str)
for n, value, mask in fields:
field_offset += ofproto.oxm_serialize(n, value, mask, buf, field_offset
)
length = field_offset - offset
msg_pack_into(hdr_pack_str, buf, offset, ofproto.OFPMT_OXM, length)
self.length = length
pad_len = utils.round_up(length, 8) - length
msg_pack_into('%dx' % pad_len, buf, field_offset)
return length + pad_len
| serialize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, buf, offset):\n fields = [ofproto.oxm_from_user(k, uv) for k, uv in self._fields2]\n hdr_pack_str = '!HH'\n field_offset = offset + struct.calcs... |
def x(self):
body = {'oxm_fields': [ofproto.oxm_to_jsondict(k, uv) for k, uv in self
._fields2], 'length': self.length, 'type': self.type}
return {self.__class__.__name__: body}
| to_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n body = {'oxm_fields': [ofproto.oxm_to_jsondict(k, uv) for k, uv in self\n ._fields2], 'length': self.length, 'type': self.type}\n return ... |
def x(cls, dict_):
fields = [ofproto.oxm_from_jsondict(f) for f in dict_['oxm_fields']]
return OFPMatch(_ordered_fields=fields)
| from_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, dict_):\n fields = [ofproto.oxm_from_jsondict(f) for f in dict_['oxm_fields']]\n return OFPMatch(_ordered_fields=fields)\n",
"role": "user"
},... |
def x(cls, buf, offset):
stats = OFPStats()
reserved, length = struct.unpack_from('!HH', buf, offset)
stats.length = length
offset += 4
length -= 4
fields = []
while length > 0:
n, value, _, field_len = ofproto.oxs_parse(buf, offset)
k, uv = ofproto.oxs_to_user(n, value, None)
fields.append((k, uv))
offset += field_len
length -= field_len
stats.fields = fields
return stats
| parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, buf, offset):\n stats = OFPStats()\n reserved, length = struct.unpack_from('!HH', buf, offset)\n stats.length = length\n offset += 4\n leng... |
def x(self, buf, offset):
fields = [ofproto.oxs_from_user(k, uv) for k, uv in self.fields]
hdr_pack_str = '!HH'
field_offset = offset + struct.calcsize(hdr_pack_str)
for n, value, _ in fields:
field_offset += ofproto.oxs_serialize(n, value, None, buf, field_offset
)
reserved = 0
length = field_offset - offset
msg_pack_into(hdr_pack_str, buf, offset, reserved, length)
self.length = length
pad_len = utils.round_up(length, 8) - length
msg_pack_into('%dx' % pad_len, buf, field_offset)
return length + pad_len
| serialize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, buf, offset):\n fields = [ofproto.oxs_from_user(k, uv) for k, uv in self.fields]\n hdr_pack_str = '!HH'\n field_offset = offset + struct.calcsiz... |
def x(self):
body = {'oxs_fields': [ofproto.oxs_to_jsondict(k, uv) for k, uv in self
.fields], 'length': self.length}
return {self.__class__.__name__: body}
| to_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n body = {'oxs_fields': [ofproto.oxs_to_jsondict(k, uv) for k, uv in self\n .fields], 'length': self.length}\n return {self.__class__.__nam... |
def x(cls, dict_):
fields = [ofproto.oxs_from_jsondict(f) for f in dict_['oxs_fields']]
return OFPStats(_ordered_fields=fields)
| from_jsondict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, dict_):\n fields = [ofproto.oxs_from_jsondict(f) for f in dict_['oxs_fields']]\n return OFPStats(_ordered_fields=fields)\n",
"role": "user"
},... |
def x(ofproto, action_str):
action_re = re.compile('([a-z_]+)(\\([^)]*\\)|[^a-z_,()][^,()]*)*')
result = []
while len(action_str):
m = action_re.match(action_str)
if not m:
raise ryu.exception.OFPInvalidActionString(action_str=action_str)
action_name = m.group(1)
this_action = m.group(0)
paren_level = this_action.count('(') - this_action.count(')')
assert paren_level >= 0
try:
if paren_level > 0:
this_action, rest = _tokenize_paren_block(action_str, m.end(0))
else:
rest = action_str[m.end(0):]
if len(rest):
assert rest[0] == ','
rest = rest[1:]
except Exception:
raise ryu.exception.OFPInvalidActionString(action_str=action_str)
if action_name == 'drop':
assert this_action == 'drop'
assert len(result) == 0 and rest == ''
return []
converter = getattr(OfctlActionConverter, action_name, None)
if converter is None or not callable(converter):
raise ryu.exception.OFPInvalidActionString(action_str=action_name)
result.append(converter(ofproto, this_action))
action_str = rest
return result
| ofp_instruction_from_str | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ofproto, action_str):\n action_re = re.compile('([a-z_]+)(\\\\([^)]*\\\\)|[^a-z_,()][^,()]*)*')\n result = []\n while len(action_str):\n m = ac... |
def x(arg):
arg_re = re.compile('[^,()]*')
try:
rest = arg
result = []
while len(rest):
m = arg_re.match(rest)
if m.end(0) == len(rest):
result.append(rest)
return result
if rest[m.end(0)] == '(':
this_block, rest = _tokenize_paren_block(rest, m.end(0) + 1)
result.append(this_block)
elif rest[m.end(0)] == ',':
result.append(m.group(0))
rest = rest[m.end(0):]
else:
raise Exception
if len(rest):
assert rest[0] == ','
rest = rest[1:]
return result
except Exception:
raise ryu.exception.OFPInvalidActionString(action_str=arg)
| tokenize_ofp_instruction_arg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(arg):\n arg_re = re.compile('[^,()]*')\n try:\n rest = arg\n result = []\n while len(rest):\n m = arg_re.match(rest)\n ... |
def x(field):
mapped = _OXM_FIELD_OFCTL_ALIASES.get(field)
if mapped:
return mapped
if field.endswith('_dst'):
mapped = _OXM_FIELD_OFCTL_ALIASES.get(field[:-3] + 'src')
if mapped:
return mapped[:-3] + 'dst'
return field
| ofp_ofctl_field_name_to_ryu | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(field):\n mapped = _OXM_FIELD_OFCTL_ALIASES.get(field)\n if mapped:\n return mapped\n if field.endswith('_dst'):\n mapped = _OXM_FIELD_O... |
def x(field):
if field.endswith('_W'):
field = field[:-2]
prefix = field[:7]
field = field[7:].lower()
mapped_result = None
if prefix == 'NXM_NX_':
mapped_result = _NXM_FIELD_MAP.get(field)
elif prefix == 'NXM_OF_':
mapped_result = _NXM_OF_FIELD_MAP.get(field)
elif prefix == 'OXM_OF_':
pass
else:
raise ValueError
if mapped_result is not None:
return mapped_result
return field
| nxm_field_name_to_ryu | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(field):\n if field.endswith('_W'):\n field = field[:-2]\n prefix = field[:7]\n field = field[7:].lower()\n mapped_result = None\n if pref... |
def x(zclient, msg):
if not isinstance(msg, zebra.ZebraMessage):
return None
body_cls = msg.get_body_class(msg.version, msg.command)
ev_cls = getattr(MOD, _event_name(body_cls), None)
if ev_cls is None:
return None
return ev_cls(zclient, msg)
| message_to_event | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(zclient, msg):\n if not isinstance(msg, zebra.ZebraMessage):\n return None\n body_cls = msg.get_body_class(msg.version, msg.command)\n ev_cls =... |
def x(self, node):
try:
delattr(node, self.next_name)
delattr(node, self.prev_name)
except AttributeError:
pass
| node_del_attrs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, node):\n try:\n delattr(node, self.next_name)\n delattr(node, self.prev_name)\n except AttributeError:\n pass\n",
"role": ... |
def x(self, node):
next = self.node_next(node)
if next == node or next is None:
assert self.node_prev(node) is next
return False
return True
| node_is_on_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, node):\n next = self.node_next(node)\n if next == node or next is None:\n assert self.node_prev(node) is next\n return False\n ret... |
def x(self, node, new_node):
assert not self.node_is_on_list(new_node)
assert node is not new_node
next = self.node_next(node)
assert next is not None
self.node_set_next(node, new_node)
self.node_set_prev(new_node, node)
self.node_set_next(new_node, next)
self.node_set_prev(next, new_node)
| node_insert_after | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, node, new_node):\n assert not self.node_is_on_list(new_node)\n assert node is not new_node\n next = self.node_next(node)\n assert next is not... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.