source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(self, statuses):
return all(s != ClientBatchStatus.PENDING for s in statuses.values())
| has_no_pendings | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, statuses):\n return all(s != ClientBatchStatus.PENDING for s in statuses.values())\n",
"role": "user"
},
{
"content": "has_no_pendings",
"role": "assistant"
}
] |
def x(self, addresses):
with self._lock:
results = []
for add in addresses:
self.validate_read(add)
results.append(self._get(add))
return results
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n self.validate_read(add)\n results.append(self._get(add))\n return results\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, addresses):
with self._lock:
results = []
for add in addresses:
results.append(self._get_if_set(add))
return results
| get_if_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n results.append(self._get_if_set(add))\n return results\n",
"role": "user"
},
{
"content": "get_if_set",
"role": "assistant"
}
] |
def x(self, addresses):
with self._lock:
results = []
for add in addresses:
results.append(self._get_if_deleted(add))
return results
| get_if_deleted | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n results.append(self._get_if_deleted(add))\n return results\n",
"role": "user"
},
{
"content": "get_if_deleted",
"role": "assistant"
}
] |
def x(self, addresses):
with self._lock:
results = []
for add in addresses:
results.append(self._get_if_not_set(add))
return results
| get_if_not_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n results.append(self._get_if_not_set(add))\n return results\n",
"role": "user"
},
{
"content": "get_if_not_set",
"role": "assistant"
}
] |
def x(self):
with self._lock:
results = {}
for add, fut in self._state.items():
if self._contains_and_set(add):
results[add] = fut.result()
return results
| get_all_if_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n with self._lock:\n results = {}\n for add, fut in self._state.items():\n if self._contains_and_set(add):\n results[add] = fut.result()\n return results\n",
"role": "user"
},
{
"content": "get_all_if_set",
"role": "assistant"
}
] |
def x(self):
with self._lock:
results = {}
for add, fut in self._state.items():
if self._contains_and_deleted(add):
results[add] = fut.result()
return results
| get_all_if_deleted | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n with self._lock:\n results = {}\n for add, fut in self._state.items():\n if self._contains_and_deleted(add):\n results[add] = fut.result()\n return results\n",
"role": "user"
},
{
"content": "get_all_if_deleted",
"role": "assistant"
}
] |
def x(self, addresses):
with self._lock:
for add in addresses:
self._state[add] = _ContextFuture(address=add, wait_for_tree=True)
| create_prefetch | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, addresses):\n with self._lock:\n for add in addresses:\n self._state[add] = _ContextFuture(address=add, wait_for_tree=True)\n",
"role": "user"
},
{
"content": "create_prefetch",
"role": "assistant"
}
] |
def x(self, address_values):
with self._lock:
for add, val in address_values:
self._state[add] = _ContextFuture(address=add, result=val)
| create_initial | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address_values):\n with self._lock:\n for add, val in address_values:\n self._state[add] = _ContextFuture(address=add, result=val)\n",
"role": "user"
},
{
"content": "create_initial",
"role": "assistant"
}
] |
def x(self, address_value_dict):
for address, value in address_value_dict.items():
if address in self._state:
self._state[address].set_result(result=value, from_tree=True)
| set_from_tree | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address_value_dict):\n for address, value in address_value_dict.items():\n if address in self._state:\n self._state[address].set_result(result=value, from_tree=True)\n",
"role": "user"
},
{
"content": "set_from_tree",
"role": "assistant"
}
] |
def x(self, addresses):
with self._lock:
for address in addresses:
self._validate_write(address)
if address in self._state:
self._state[address].set_deleted()
else:
fut = _ContextFuture(address=address)
self._state[address] = fut
fut.set_deleted()
| delete_direct | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, addresses):\n with self._lock:\n for address in addresses:\n self._validate_write(address)\n if address in self._state:\n self._state[address].set_deleted()\n else:\n fut = _ContextFuture(address=address)\n self._state[address] = fut\n fut.set_deleted()\n",
"role": "user"
},
{
"content": "delete_direct",
"role": "assistant"
}
] |
def x(self, address_value_dict):
with self._lock:
for address, value in address_value_dict.items():
self._validate_write(address)
if address in self._state:
self._state[address].set_result(result=value)
else:
fut = _ContextFuture(address=address)
self._state[address] = fut
fut.set_result(result=value)
| set_direct | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address_value_dict):\n with self._lock:\n for address, value in address_value_dict.items():\n self._validate_write(address)\n if address in self._state:\n self._state[address].set_result(result=value)\n else:\n fut = _ContextFuture(address=address)\n self._state[address] = fut\n fut.set_result(result=value)\n",
"role": "user"
},
{
"content": "set_direct",
"role": "assistant"
}
] |
def x(self, address):
if not any(address.startswith(ns) for ns in self._write_list):
raise AuthorizationException(address=address)
| validate_write | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address):\n if not any(address.startswith(ns) for ns in self._write_list):\n raise AuthorizationException(address=address)\n",
"role": "user"
},
{
"content": "validate_write",
"role": "assistant"
}
] |
def x(self, address):
if not any(address.startswith(ns) for ns in self._read_list):
raise AuthorizationException(address=address)
| validate_read | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address):\n if not any(address.startswith(ns) for ns in self._read_list):\n raise AuthorizationException(address=address)\n",
"role": "user"
},
{
"content": "validate_read",
"role": "assistant"
}
] |
def x(self):
if self._read_only:
return self._result
with self._condition:
if self._wait_for_tree and not self._result_set_in_context:
self._condition.wait_for(lambda : self._tree_has_set or self.
_result_set_in_context)
return self._result
| result | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._read_only:\n return self._result\n with self._condition:\n if self._wait_for_tree and not self._result_set_in_context:\n self._condition.wait_for(lambda : self._tree_has_set or self.\n _result_set_in_context)\n return self._result\n",
"role": "user"
},
{
"content": "result",
"role": "assistant"
}
] |
def x(self, result, from_tree=False):
if self._read_only:
if not from_tree:
LOGGER.warning('Tried to set address %s on a read-only context.',
self.address)
return
with self._condition:
if self._read_only:
if not from_tree:
LOGGER.warning(
'Tried to set address %s on a read-only context.', self
.address)
return
if from_tree:
if not self._result_set_in_context:
self._result = result
self._tree_has_set = True
else:
self._result = result
self._result_set_in_context = True
self._deleted = False
self._condition.notify_all()
| set_result | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, result, from_tree=False):\n if self._read_only:\n if not from_tree:\n LOGGER.warning('Tried to set address %s on a read-only context.',\n self.address)\n return\n with self._condition:\n if self._read_only:\n if not from_tree:\n LOGGER.warning(\n 'Tried to set address %s on a read-only context.', self\n .address)\n return\n if from_tree:\n if not self._result_set_in_context:\n self._result = result\n self._tree_has_set = True\n else:\n self._result = result\n self._result_set_in_context = True\n self._deleted = False\n self._condition.notify_all()\n",
"role": "user"
},
{
"content": "set_result",
"role": "assistant"
}
] |
def x(global_state_db, blockstore, bind_component, scheduler_type):
state_view_factory = StateViewFactory(global_state_db)
start_block, prev_state_root = search_for_present_state_root(blockstore,
state_view_factory)
if start_block is None:
LOGGER.info(
"Skipping state verification: chain head's state root is present")
return
LOGGER.info('Recomputing missing state from block %s with %s scheduler',
start_block, scheduler_type)
component_thread_pool = InstrumentedThreadPoolExecutor(max_workers=10,
name='Component')
component_dispatcher = Dispatcher()
component_service = Interconnect(bind_component, component_dispatcher,
secured=False, heartbeat=False, max_incoming_connections=20,
monitor=True, max_future_callback_workers=10)
context_manager = ContextManager(global_state_db)
transaction_executor = TransactionExecutor(service=component_service,
context_manager=context_manager, settings_view_factory=
SettingsViewFactory(state_view_factory), scheduler_type=
scheduler_type, invalid_observers=[])
component_service.set_check_connections(transaction_executor.
check_connections)
component_dispatcher.add_handler(validator_pb2.Message.
TP_RECEIPT_ADD_DATA_REQUEST, tp_state_handlers.
TpReceiptAddDataHandler(context_manager), component_thread_pool)
component_dispatcher.add_handler(validator_pb2.Message.
TP_EVENT_ADD_REQUEST, tp_state_handlers.TpEventAddHandler(
context_manager), component_thread_pool)
component_dispatcher.add_handler(validator_pb2.Message.
TP_STATE_DELETE_REQUEST, tp_state_handlers.TpStateDeleteHandler(
context_manager), component_thread_pool)
component_dispatcher.add_handler(validator_pb2.Message.
TP_STATE_GET_REQUEST, tp_state_handlers.TpStateGetHandler(
context_manager), component_thread_pool)
component_dispatcher.add_handler(validator_pb2.Message.
TP_STATE_SET_REQUEST, tp_state_handlers.TpStateSetHandler(
context_manager), component_thread_pool)
component_dispatcher.add_handler(validator_pb2.Message.
TP_REGISTER_REQUEST, processor_handlers.ProcessorRegisterHandler(
transaction_executor.processor_manager), component_thread_pool)
component_dispatcher.add_handler(validator_pb2.Message.
TP_UNREGISTER_REQUEST, processor_handlers.
ProcessorUnRegisterHandler(transaction_executor.processor_manager),
component_thread_pool)
component_dispatcher.start()
component_service.start()
process_blocks(initial_state_root=prev_state_root, blocks=blockstore.
get_block_iter(start_block=start_block, reverse=False),
transaction_executor=transaction_executor, context_manager=
context_manager, state_view_factory=state_view_factory)
component_dispatcher.stop()
component_service.stop()
component_thread_pool.shutdown(wait=True)
transaction_executor.stop()
context_manager.stop()
| verify_state | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(global_state_db, blockstore, bind_component, scheduler_type):\n state_view_factory = StateViewFactory(global_state_db)\n start_block, prev_state_root = search_for_present_state_root(blockstore,\n state_view_factory)\n if start_block is None:\n LOGGER.info(\n \"Skipping state verification: chain head's state root is present\")\n return\n LOGGER.info('Recomputing missing state from block %s with %s scheduler',\n start_block, scheduler_type)\n component_thread_pool = InstrumentedThreadPoolExecutor(max_workers=10,\n name='Component')\n component_dispatcher = Dispatcher()\n component_service = Interconnect(bind_component, component_dispatcher,\n secured=False, heartbeat=False, max_incoming_connections=20,\n monitor=True, max_future_callback_workers=10)\n context_manager = ContextManager(global_state_db)\n transaction_executor = TransactionExecutor(service=component_service,\n context_manager=context_manager, settings_view_factory=\n SettingsViewFactory(state_view_factory), scheduler_type=\n scheduler_type, invalid_observers=[])\n component_service.set_check_connections(transaction_executor.\n check_connections)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_RECEIPT_ADD_DATA_REQUEST, tp_state_handlers.\n TpReceiptAddDataHandler(context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_EVENT_ADD_REQUEST, tp_state_handlers.TpEventAddHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_STATE_DELETE_REQUEST, tp_state_handlers.TpStateDeleteHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_STATE_GET_REQUEST, tp_state_handlers.TpStateGetHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_STATE_SET_REQUEST, tp_state_handlers.TpStateSetHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_REGISTER_REQUEST, processor_handlers.ProcessorRegisterHandler(\n transaction_executor.processor_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_UNREGISTER_REQUEST, processor_handlers.\n ProcessorUnRegisterHandler(transaction_executor.processor_manager),\n component_thread_pool)\n component_dispatcher.start()\n component_service.start()\n process_blocks(initial_state_root=prev_state_root, blocks=blockstore.\n get_block_iter(start_block=start_block, reverse=False),\n transaction_executor=transaction_executor, context_manager=\n context_manager, state_view_factory=state_view_factory)\n component_dispatcher.stop()\n component_service.stop()\n component_thread_pool.shutdown(wait=True)\n transaction_executor.stop()\n context_manager.stop()\n",
"role": "user"
},
{
"content": "verify_state",
"role": "assistant"
}
] |
def x(blockstore, state_view_factory):
block = blockstore.chain_head
if block is None:
return None, None
if state_db_has_root(state_view_factory, block.state_root_hash):
return None, None
prev_state_root = INIT_ROOT_KEY
for block in blockstore.get_block_iter(reverse=False):
if not state_db_has_root(state_view_factory, block.state_root_hash):
return block, prev_state_root
prev_state_root = block.state_root_hash
raise ExecutionError(
'Chain head state both missing but all blocks had state root present')
| search_for_present_state_root | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(blockstore, state_view_factory):\n block = blockstore.chain_head\n if block is None:\n return None, None\n if state_db_has_root(state_view_factory, block.state_root_hash):\n return None, None\n prev_state_root = INIT_ROOT_KEY\n for block in blockstore.get_block_iter(reverse=False):\n if not state_db_has_root(state_view_factory, block.state_root_hash):\n return block, prev_state_root\n prev_state_root = block.state_root_hash\n raise ExecutionError(\n 'Chain head state both missing but all blocks had state root present')\n",
"role": "user"
},
{
"content": "search_for_present_state_root",
"role": "assistant"
}
] |
def x(interfaces, endpoint):
result = urlparse(endpoint)
hostname = result.hostname
if hostname is None:
return False
for interface in interfaces:
if interface == hostname:
return False
return True
| is_valid_endpoint_host | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(interfaces, endpoint):\n result = urlparse(endpoint)\n hostname = result.hostname\n if hostname is None:\n return False\n for interface in interfaces:\n if interface == hostname:\n return False\n return True\n",
"role": "user"
},
{
"content": "is_valid_endpoint_host",
"role": "assistant"
}
] |
def x(self, connection_id, message_content):
message = ConnectionRequest()
message.ParseFromString(message_content)
LOGGER.debug('got connect message from %s. sending ack', connection_id)
interfaces = ['*', '.'.join(['0', '0', '0', '0'])]
interfaces += netifaces.interfaces()
if self.is_valid_endpoint_host(interfaces, message.endpoint) is False:
LOGGER.warning(
'Connecting peer provided an invalid endpoint: %s; Ignoring connection request.'
, message.endpoint)
connection_response = ConnectionResponse(status=ConnectionResponse.
ERROR)
return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=
connection_response, message_type=validator_pb2.Message.
AUTHORIZATION_CONNECTION_RESPONSE)
LOGGER.debug('Endpoint of connecting node is %s', message.endpoint)
self._network.update_connection_endpoint(connection_id, message.endpoint)
roles = self._network.roles
auth_type = roles.get('network')
if auth_type == AuthorizationType.TRUST:
role_type = ConnectionResponse.RoleEntry(role=RoleType.Value(
'NETWORK'), auth_type=ConnectionResponse.TRUST)
connection_response = ConnectionResponse(roles=[role_type])
elif auth_type == AuthorizationType.CHALLENGE:
role_type = ConnectionResponse.RoleEntry(role=RoleType.Value(
'NETWORK'), auth_type=ConnectionResponse.CHALLENGE)
connection_response = ConnectionResponse(roles=[role_type])
else:
LOGGER.warning(
'Network role is set to an unsupportedAuthorization Type: %s',
auth_type)
connection_response = ConnectionResponse(status=ConnectionResponse.
ERROR)
return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=
connection_response, message_type=validator_pb2.Message.
AUTHORIZATION_CONNECTION_RESPONSE)
try:
is_outbound_connection = self._network.is_outbound_connection(
connection_id)
except KeyError:
return HandlerResult(HandlerStatus.DROP)
if not is_outbound_connection:
if self._network.allow_inbound_connection():
LOGGER.debug('Allowing incoming connection: %s', connection_id)
connection_response.status = connection_response.OK
else:
connection_response.status = connection_response.ERROR
return HandlerResult(HandlerStatus.RETURN_AND_CLOSE,
message_out=connection_response, message_type=validator_pb2
.Message.AUTHORIZATION_CONNECTION_RESPONSE)
if self._network.get_connection_status(connection_id) is not None:
LOGGER.debug(
'Connection has already sent ConnectionRequest: %s, Remove connection.'
, connection_id)
connection_response.status = connection_response.ERROR
return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=
connection_response, message_type=validator_pb2.Message.
AUTHORIZATION_CONNECTION_RESPONSE)
self._network.update_connection_status(connection_id, ConnectionStatus.
CONNECTION_REQUEST)
return HandlerResult(HandlerStatus.RETURN, message_out=
connection_response, message_type=validator_pb2.Message.
AUTHORIZATION_CONNECTION_RESPONSE)
| handle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, connection_id, message_content):\n message = ConnectionRequest()\n message.ParseFromString(message_content)\n LOGGER.debug('got connect message from %s. sending ack', connection_id)\n interfaces = ['*', '.'.join(['0', '0', '0', '0'])]\n interfaces += netifaces.interfaces()\n if self.is_valid_endpoint_host(interfaces, message.endpoint) is False:\n LOGGER.warning(\n 'Connecting peer provided an invalid endpoint: %s; Ignoring connection request.'\n , message.endpoint)\n connection_response = ConnectionResponse(status=ConnectionResponse.\n ERROR)\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n LOGGER.debug('Endpoint of connecting node is %s', message.endpoint)\n self._network.update_connection_endpoint(connection_id, message.endpoint)\n roles = self._network.roles\n auth_type = roles.get('network')\n if auth_type == AuthorizationType.TRUST:\n role_type = ConnectionResponse.RoleEntry(role=RoleType.Value(\n 'NETWORK'), auth_type=ConnectionResponse.TRUST)\n connection_response = ConnectionResponse(roles=[role_type])\n elif auth_type == AuthorizationType.CHALLENGE:\n role_type = ConnectionResponse.RoleEntry(role=RoleType.Value(\n 'NETWORK'), auth_type=ConnectionResponse.CHALLENGE)\n connection_response = ConnectionResponse(roles=[role_type])\n else:\n LOGGER.warning(\n 'Network role is set to an unsupportedAuthorization Type: %s',\n auth_type)\n connection_response = ConnectionResponse(status=ConnectionResponse.\n ERROR)\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n try:\n is_outbound_connection = self._network.is_outbound_connection(\n connection_id)\n except KeyError:\n return HandlerResult(HandlerStatus.DROP)\n if not is_outbound_connection:\n if self._network.allow_inbound_connection():\n LOGGER.debug('Allowing incoming connection: %s', connection_id)\n connection_response.status = connection_response.OK\n else:\n connection_response.status = connection_response.ERROR\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE,\n message_out=connection_response, message_type=validator_pb2\n .Message.AUTHORIZATION_CONNECTION_RESPONSE)\n if self._network.get_connection_status(connection_id) is not None:\n LOGGER.debug(\n 'Connection has already sent ConnectionRequest: %s, Remove connection.'\n , connection_id)\n connection_response.status = connection_response.ERROR\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n CONNECTION_REQUEST)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n",
"role": "user"
},
{
"content": "handle",
"role": "assistant"
}
] |
def x(self, connection_id, message_content):
if self._network.get_connection_status(connection_id
) != ConnectionStatus.CONNECTION_REQUEST:
LOGGER.debug(
"Connection's previous message was not a ConnectionRequest, Remove connection to %s"
, connection_id)
violation = AuthorizationViolation(violation=RoleType.Value('NETWORK'))
return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=
violation, message_type=validator_pb2.Message.
AUTHORIZATION_VIOLATION)
request = AuthorizationTrustRequest()
request.ParseFromString(message_content)
roles = self._network.roles
for role in request.roles:
if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'):
permitted = False
if 'network' in roles:
permitted = self._permission_verifier.check_network_role(
request.public_key)
if not permitted:
violation = AuthorizationViolation(violation=RoleType.Value
('NETWORK'))
return HandlerResult(HandlerStatus.RETURN_AND_CLOSE,
message_out=violation, message_type=validator_pb2.
Message.AUTHORIZATION_VIOLATION)
self._network.update_connection_public_key(connection_id, request.
public_key)
if RoleType.Value('NETWORK') in request.roles:
try:
is_outbound_connection = self._network.is_outbound_connection(
connection_id)
except KeyError:
return HandlerResult(HandlerStatus.DROP)
if not is_outbound_connection:
self._network.send_connect_request(connection_id)
else:
self._gossip.connect_success(connection_id)
auth_trust_response = AuthorizationTrustResponse(roles=[RoleType.Value(
'NETWORK')])
LOGGER.debug('Connection: %s is approved', connection_id)
self._network.update_connection_status(connection_id, ConnectionStatus.
CONNECTED)
return HandlerResult(HandlerStatus.RETURN, message_out=
auth_trust_response, message_type=validator_pb2.Message.
AUTHORIZATION_TRUST_RESPONSE)
| handle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, connection_id, message_content):\n if self._network.get_connection_status(connection_id\n ) != ConnectionStatus.CONNECTION_REQUEST:\n LOGGER.debug(\n \"Connection's previous message was not a ConnectionRequest, Remove connection to %s\"\n , connection_id)\n violation = AuthorizationViolation(violation=RoleType.Value('NETWORK'))\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n violation, message_type=validator_pb2.Message.\n AUTHORIZATION_VIOLATION)\n request = AuthorizationTrustRequest()\n request.ParseFromString(message_content)\n roles = self._network.roles\n for role in request.roles:\n if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'):\n permitted = False\n if 'network' in roles:\n permitted = self._permission_verifier.check_network_role(\n request.public_key)\n if not permitted:\n violation = AuthorizationViolation(violation=RoleType.Value\n ('NETWORK'))\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE,\n message_out=violation, message_type=validator_pb2.\n Message.AUTHORIZATION_VIOLATION)\n self._network.update_connection_public_key(connection_id, request.\n public_key)\n if RoleType.Value('NETWORK') in request.roles:\n try:\n is_outbound_connection = self._network.is_outbound_connection(\n connection_id)\n except KeyError:\n return HandlerResult(HandlerStatus.DROP)\n if not is_outbound_connection:\n self._network.send_connect_request(connection_id)\n else:\n self._gossip.connect_success(connection_id)\n auth_trust_response = AuthorizationTrustResponse(roles=[RoleType.Value(\n 'NETWORK')])\n LOGGER.debug('Connection: %s is approved', connection_id)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n CONNECTED)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n auth_trust_response, message_type=validator_pb2.Message.\n AUTHORIZATION_TRUST_RESPONSE)\n",
"role": "user"
},
{
"content": "handle",
"role": "assistant"
}
] |
def x(self, connection_id, message_content):
if self._network.get_connection_status(connection_id
) != ConnectionStatus.CONNECTION_REQUEST:
LOGGER.debug(
"Connection's previous message was not a ConnectionRequest, Remove connection to %s"
, connection_id)
violation = AuthorizationViolation(violation=RoleType.Value('NETWORK'))
return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=
violation, message_type=validator_pb2.Message.
AUTHORIZATION_VIOLATION)
random_payload = os.urandom(PAYLOAD_LENGTH)
self._challenge_payload_cache[connection_id] = random_payload
auth_challenge_response = AuthorizationChallengeResponse(payload=
random_payload)
self._network.update_connection_status(connection_id, ConnectionStatus.
AUTH_CHALLENGE_REQUEST)
return HandlerResult(HandlerStatus.RETURN, message_out=
auth_challenge_response, message_type=validator_pb2.Message.
AUTHORIZATION_CHALLENGE_RESPONSE)
| handle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, connection_id, message_content):\n if self._network.get_connection_status(connection_id\n ) != ConnectionStatus.CONNECTION_REQUEST:\n LOGGER.debug(\n \"Connection's previous message was not a ConnectionRequest, Remove connection to %s\"\n , connection_id)\n violation = AuthorizationViolation(violation=RoleType.Value('NETWORK'))\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n violation, message_type=validator_pb2.Message.\n AUTHORIZATION_VIOLATION)\n random_payload = os.urandom(PAYLOAD_LENGTH)\n self._challenge_payload_cache[connection_id] = random_payload\n auth_challenge_response = AuthorizationChallengeResponse(payload=\n random_payload)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n AUTH_CHALLENGE_REQUEST)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n auth_challenge_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CHALLENGE_RESPONSE)\n",
"role": "user"
},
{
"content": "handle",
"role": "assistant"
}
] |
def x(self, connection_id, message_content):
if self._network.get_connection_status(connection_id
) != ConnectionStatus.AUTH_CHALLENGE_REQUEST:
LOGGER.debug(
"Connection's previous message was not a AuthorizationChallengeRequest, Remove connection to%s"
, connection_id)
return AuthorizationChallengeSubmitHandler._network_violation_result()
auth_challenge_submit = AuthorizationChallengeSubmit()
auth_challenge_submit.ParseFromString(message_content)
try:
payload = self._challenge_payload_cache[connection_id]
except KeyError:
LOGGER.warning(
"Connection's challenge payload expired before aresponse was received. %s"
, connection_id)
return AuthorizationChallengeSubmitHandler._network_violation_result()
context = create_context('secp256k1')
try:
public_key = Secp256k1PublicKey.from_hex(auth_challenge_submit.
public_key)
except ParseError:
LOGGER.warning(
'Authorization Challenge Request cannot be verified. Invalid public key %s'
, auth_challenge_submit.public_key)
return AuthorizationChallengeSubmitHandler._network_violation_result()
if not context.verify(auth_challenge_submit.signature, payload, public_key
):
LOGGER.warning(
'Signature was not able to be verified. Remove connection to %s',
connection_id)
return AuthorizationChallengeSubmitHandler._network_violation_result()
roles = self._network.roles
for role in auth_challenge_submit.roles:
if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'):
permitted = False
if 'network' in roles:
permitted = self._permission_verifier.check_network_role(
auth_challenge_submit.public_key)
if not permitted:
return (AuthorizationChallengeSubmitHandler.
_network_violation_result())
self._network.update_connection_public_key(connection_id,
auth_challenge_submit.public_key)
if RoleType.Value('NETWORK') in auth_challenge_submit.roles:
try:
is_outbound_connection = self._network.is_outbound_connection(
connection_id)
except KeyError:
return HandlerResult(HandlerStatus.DROP)
if not is_outbound_connection:
self._network.send_connect_request(connection_id)
else:
self._gossip.connect_success(connection_id)
auth_challenge_result = AuthorizationChallengeResult(roles=[RoleType.
Value('NETWORK')])
LOGGER.debug('Connection: %s is approved', connection_id)
self._network.update_connection_status(connection_id, ConnectionStatus.
CONNECTED)
return HandlerResult(HandlerStatus.RETURN, message_out=
auth_challenge_result, message_type=validator_pb2.Message.
AUTHORIZATION_CHALLENGE_RESULT)
| handle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, connection_id, message_content):\n if self._network.get_connection_status(connection_id\n ) != ConnectionStatus.AUTH_CHALLENGE_REQUEST:\n LOGGER.debug(\n \"Connection's previous message was not a AuthorizationChallengeRequest, Remove connection to%s\"\n , connection_id)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n auth_challenge_submit = AuthorizationChallengeSubmit()\n auth_challenge_submit.ParseFromString(message_content)\n try:\n payload = self._challenge_payload_cache[connection_id]\n except KeyError:\n LOGGER.warning(\n \"Connection's challenge payload expired before aresponse was received. %s\"\n , connection_id)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n context = create_context('secp256k1')\n try:\n public_key = Secp256k1PublicKey.from_hex(auth_challenge_submit.\n public_key)\n except ParseError:\n LOGGER.warning(\n 'Authorization Challenge Request cannot be verified. Invalid public key %s'\n , auth_challenge_submit.public_key)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n if not context.verify(auth_challenge_submit.signature, payload, public_key\n ):\n LOGGER.warning(\n 'Signature was not able to be verified. Remove connection to %s',\n connection_id)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n roles = self._network.roles\n for role in auth_challenge_submit.roles:\n if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'):\n permitted = False\n if 'network' in roles:\n permitted = self._permission_verifier.check_network_role(\n auth_challenge_submit.public_key)\n if not permitted:\n return (AuthorizationChallengeSubmitHandler.\n _network_violation_result())\n self._network.update_connection_public_key(connection_id,\n auth_challenge_submit.public_key)\n if RoleType.Value('NETWORK') in auth_challenge_submit.roles:\n try:\n is_outbound_connection = self._network.is_outbound_connection(\n connection_id)\n except KeyError:\n return HandlerResult(HandlerStatus.DROP)\n if not is_outbound_connection:\n self._network.send_connect_request(connection_id)\n else:\n self._gossip.connect_success(connection_id)\n auth_challenge_result = AuthorizationChallengeResult(roles=[RoleType.\n Value('NETWORK')])\n LOGGER.debug('Connection: %s is approved', connection_id)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n CONNECTED)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n auth_challenge_result, message_type=validator_pb2.Message.\n AUTHORIZATION_CHALLENGE_RESULT)\n",
"role": "user"
},
{
"content": "handle",
"role": "assistant"
}
] |
def x(self, connection_id, message_content):
LOGGER.warning('Received AuthorizationViolation from %s', connection_id)
endpoint = self._network.connection_id_to_endpoint(connection_id)
self._network.remove_connection(connection_id)
self._gossip.remove_temp_endpoint(endpoint)
return HandlerResult(HandlerStatus.DROP)
| handle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, connection_id, message_content):\n LOGGER.warning('Received AuthorizationViolation from %s', connection_id)\n endpoint = self._network.connection_id_to_endpoint(connection_id)\n self._network.remove_connection(connection_id)\n self._gossip.remove_temp_endpoint(endpoint)\n return HandlerResult(HandlerStatus.DROP)\n",
"role": "user"
},
{
"content": "handle",
"role": "assistant"
}
] |
def x(args):
rest_client = RestClient(args.url, args.user)
if args.subcommand == 'list':
transactions = rest_client.list_transactions()
keys = 'transaction_id', 'family', 'version', 'size', 'payload'
headers = tuple(k.upper() if k != 'version' else 'VERS' for k in keys)
def x(transaction, decode=True):
decoded = b64decode(transaction['payload'])
return transaction['header_signature'], transaction['header'][
'family_name'], transaction['header']['family_version'], len(
decoded), str(decoded) if decode else transaction['payload']
if args.format == 'default':
fmt.print_terminal_table(headers, transactions, parse_txn_row)
elif args.format == 'csv':
fmt.print_csv(headers, transactions, parse_txn_row)
elif args.format == 'json' or args.format == 'yaml':
data = [{k: d for k, d in zip(keys, parse_txn_row(b, False))} for
b in transactions]
if args.format == 'yaml':
fmt.print_yaml(data)
elif args.format == 'json':
fmt.print_json(data)
else:
raise AssertionError('Missing handler: {}'.format(args.format))
else:
raise AssertionError('Missing handler: {}'.format(args.format))
if args.subcommand == 'show':
output = rest_client.get_transaction(args.transaction_id)
if args.key:
if args.key == 'payload':
output = b64decode(output['payload'])
elif args.key in output:
output = output[args.key]
elif args.key in output['header']:
output = output['header'][args.key]
else:
raise CliException(
'Key "{}" not found in transaction or header'.format(
args.key))
if args.format == 'yaml':
fmt.print_yaml(output)
elif args.format == 'json':
fmt.print_json(output)
else:
raise AssertionError('Missing handler: {}'.format(args.format))
| do_transaction | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(args):\n rest_client = RestClient(args.url, args.user)\n if args.subcommand == 'list':\n transactions = rest_client.list_transactions()\n keys = 'transaction_id', 'family', 'version', 'size', 'payload'\n headers = tuple(k.upper() if k != 'version' else 'VERS' for k in keys)\n\n def x(transaction, decode=True):\n decoded = b64decode(transaction['payload'])\n return transaction['header_signature'], transaction['header'][\n 'family_name'], transaction['header']['family_version'], len(\n decoded), str(decoded) if decode else transaction['payload']\n if args.format == 'default':\n fmt.print_terminal_table(headers, transactions, parse_txn_row)\n elif args.format == 'csv':\n fmt.print_csv(headers, transactions, parse_txn_row)\n elif args.format == 'json' or args.format == 'yaml':\n data = [{k: d for k, d in zip(keys, parse_txn_row(b, False))} for\n b in transactions]\n if args.format == 'yaml':\n fmt.print_yaml(data)\n elif args.format == 'json':\n fmt.print_json(data)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n if args.subcommand == 'show':\n output = rest_client.get_transaction(args.transaction_id)\n if args.key:\n if args.key == 'payload':\n output = b64decode(output['payload'])\n elif args.key in output:\n output = output[args.key]\n elif args.key in output['header']:\n output = output['header'][args.key]\n else:\n raise CliException(\n 'Key \"{}\" not found in transaction or header'.format(\n args.key))\n if args.format == 'yaml':\n fmt.print_yaml(output)\n elif args.format == 'json':\n fmt.print_json(output)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n",
"role": "user"
},
{
"content": "do_transaction",
"role": "assistant"
}
] |
def x(args):
default_cli_config = _load_default_cli_config()
toml_config = _load_toml_cli_config()
for config in (toml_config, default_cli_config):
for key, val in config.items():
if key in args and getattr(args, key) is not None:
pass
else:
setattr(args, key, val)
| load_cli_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(args):\n default_cli_config = _load_default_cli_config()\n toml_config = _load_toml_cli_config()\n for config in (toml_config, default_cli_config):\n for key, val in config.items():\n if key in args and getattr(args, key) is not None:\n pass\n else:\n setattr(args, key, val)\n",
"role": "user"
},
{
"content": "load_cli_config",
"role": "assistant"
}
] |
def x(self, txn_id):
if txn_id not in self._receipt_db:
raise KeyError('Unknown transaction id {}'.format(txn_id))
txn_receipt_bytes = self._receipt_db[txn_id]
txn_receipt = TransactionReceipt()
txn_receipt.ParseFromString(txn_receipt_bytes)
return txn_receipt
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, txn_id):\n if txn_id not in self._receipt_db:\n raise KeyError('Unknown transaction id {}'.format(txn_id))\n txn_receipt_bytes = self._receipt_db[txn_id]\n txn_receipt = TransactionReceipt()\n txn_receipt.ParseFromString(txn_receipt_bytes)\n return txn_receipt\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, batch_list):
if isinstance(batch_list, BaseMessage):
batch_list = batch_list.SerializeToString()
return self._post('/batches', batch_list)
| send_batches | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, batch_list):\n if isinstance(batch_list, BaseMessage):\n batch_list = batch_list.SerializeToString()\n return self._post('/batches', batch_list)\n",
"role": "user"
},
{
"content": "send_batches",
"role": "assistant"
}
] |
def x(self, url, params=None, data=None, headers=None, method='GET'):
if headers is None:
headers = {}
if self._auth_header is not None:
headers['Authorization'] = self._auth_header
try:
if method == 'POST':
result = requests.post(url, params=params, data=data, headers=
headers)
elif method == 'GET':
result = requests.get(url, params=params, data=data, headers=
headers)
result.raise_for_status()
return result.status_code, result.json()
except requests.exceptions.HTTPError as e:
return e.response.status_code, e.response.reason
except RemoteDisconnected as e:
raise CliException(e)
except (requests.exceptions.MissingSchema, requests.exceptions.InvalidURL
) as e:
raise CliException(e)
except requests.exceptions.ConnectionError as e:
raise CliException(
'Unable to connect to "{}": make sure URL is correct'.format(
self._base_url))
| submit_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, url, params=None, data=None, headers=None, method='GET'):\n if headers is None:\n headers = {}\n if self._auth_header is not None:\n headers['Authorization'] = self._auth_header\n try:\n if method == 'POST':\n result = requests.post(url, params=params, data=data, headers=\n headers)\n elif method == 'GET':\n result = requests.get(url, params=params, data=data, headers=\n headers)\n result.raise_for_status()\n return result.status_code, result.json()\n except requests.exceptions.HTTPError as e:\n return e.response.status_code, e.response.reason\n except RemoteDisconnected as e:\n raise CliException(e)\n except (requests.exceptions.MissingSchema, requests.exceptions.InvalidURL\n ) as e:\n raise CliException(e)\n except requests.exceptions.ConnectionError as e:\n raise CliException(\n 'Unable to connect to \"{}\": make sure URL is correct'.format(\n self._base_url))\n",
"role": "user"
},
{
"content": "submit_request",
"role": "assistant"
}
] |
def x(subparsers, parent_parser):
parser = subparsers.add_parser('list-blocks', help=
'List blocks from different nodes.', formatter_class=argparse.
RawDescriptionHelpFormatter, epilog='', parents=[parent_parser,
base_multinode_parser()])
parser.add_argument('-n', '--count', default=10, type=int, help=
'the number of blocks to list')
| add_list_blocks_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(subparsers, parent_parser):\n parser = subparsers.add_parser('list-blocks', help=\n 'List blocks from different nodes.', formatter_class=argparse.\n RawDescriptionHelpFormatter, epilog='', parents=[parent_parser,\n base_multinode_parser()])\n parser.add_argument('-n', '--count', default=10, type=int, help=\n 'the number of blocks to list')\n",
"role": "user"
},
{
"content": "add_list_blocks_parser",
"role": "assistant"
}
] |
def x(self, block, receipts):
block_events = BlockEventExtractor(block).extract([EventSubscription(
event_type='sawtooth/block-commit')])
receipt_events = ReceiptEventExtractor(receipts).extract([
EventSubscription(event_type='identity/update')])
for event in block_events:
forked = self._handle_block_commit(event)
if forked:
return
for event in receipt_events:
if event.event_type == 'identity/update':
self._handle_txn_commit(event)
| chain_update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, block, receipts):\n block_events = BlockEventExtractor(block).extract([EventSubscription(\n event_type='sawtooth/block-commit')])\n receipt_events = ReceiptEventExtractor(receipts).extract([\n EventSubscription(event_type='identity/update')])\n for event in block_events:\n forked = self._handle_block_commit(event)\n if forked:\n return\n for event in receipt_events:\n if event.event_type == 'identity/update':\n self._handle_txn_commit(event)\n",
"role": "user"
},
{
"content": "chain_update",
"role": "assistant"
}
] |
def x(filename):
if not os.path.exists(filename):
LOGGER.info(
'Skipping rest api loading from non-existent config file: %s',
filename)
return RestApiConfig()
LOGGER.info('Loading rest api information from config: %s', filename)
try:
with open(filename) as fd:
raw_config = fd.read()
except IOError as e:
raise RestApiConfigurationError(
'Unable to load rest api configuration file: {}'.format(str(e)))
toml_config = toml.loads(raw_config)
invalid_keys = set(toml_config.keys()).difference(['bind', 'connect',
'timeout', 'opentsdb_db', 'opentsdb_url', 'opentsdb_username',
'opentsdb_password', 'client_max_size'])
if invalid_keys:
raise RestApiConfigurationError('Invalid keys in rest api config: {}'
.format(', '.join(sorted(list(invalid_keys)))))
config = RestApiConfig(bind=toml_config.get('bind', None), connect=
toml_config.get('connect', None), timeout=toml_config.get('timeout',
None), opentsdb_url=toml_config.get('opentsdb_url', None),
opentsdb_db=toml_config.get('opentsdb_db', None), opentsdb_username
=toml_config.get('opentsdb_username', None), opentsdb_password=
toml_config.get('opentsdb_password', None), client_max_size=
toml_config.get('client_max_size', None))
return config
| load_toml_rest_api_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename):\n if not os.path.exists(filename):\n LOGGER.info(\n 'Skipping rest api loading from non-existent config file: %s',\n filename)\n return RestApiConfig()\n LOGGER.info('Loading rest api information from config: %s', filename)\n try:\n with open(filename) as fd:\n raw_config = fd.read()\n except IOError as e:\n raise RestApiConfigurationError(\n 'Unable to load rest api configuration file: {}'.format(str(e)))\n toml_config = toml.loads(raw_config)\n invalid_keys = set(toml_config.keys()).difference(['bind', 'connect',\n 'timeout', 'opentsdb_db', 'opentsdb_url', 'opentsdb_username',\n 'opentsdb_password', 'client_max_size'])\n if invalid_keys:\n raise RestApiConfigurationError('Invalid keys in rest api config: {}'\n .format(', '.join(sorted(list(invalid_keys)))))\n config = RestApiConfig(bind=toml_config.get('bind', None), connect=\n toml_config.get('connect', None), timeout=toml_config.get('timeout',\n None), opentsdb_url=toml_config.get('opentsdb_url', None),\n opentsdb_db=toml_config.get('opentsdb_db', None), opentsdb_username\n =toml_config.get('opentsdb_username', None), opentsdb_password=\n toml_config.get('opentsdb_password', None), client_max_size=\n toml_config.get('client_max_size', None))\n return config\n",
"role": "user"
},
{
"content": "load_toml_rest_api_config",
"role": "assistant"
}
] |
def x(configs):
bind = None
connect = None
timeout = None
opentsdb_url = None
opentsdb_db = None
opentsdb_username = None
opentsdb_password = None
client_max_size = None
for config in reversed(configs):
if config.bind is not None:
bind = config.bind
if config.connect is not None:
connect = config.connect
if config.timeout is not None:
timeout = config.timeout
if config.opentsdb_url is not None:
opentsdb_url = config.opentsdb_url
if config.opentsdb_db is not None:
opentsdb_db = config.opentsdb_db
if config.opentsdb_username is not None:
opentsdb_username = config.opentsdb_username
if config.opentsdb_password is not None:
opentsdb_password = config.opentsdb_password
if config.client_max_size is not None:
client_max_size = config.client_max_size
return RestApiConfig(bind=bind, connect=connect, timeout=timeout,
opentsdb_url=opentsdb_url, opentsdb_db=opentsdb_db,
opentsdb_username=opentsdb_username, opentsdb_password=
opentsdb_password, client_max_size=client_max_size)
| merge_rest_api_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(configs):\n bind = None\n connect = None\n timeout = None\n opentsdb_url = None\n opentsdb_db = None\n opentsdb_username = None\n opentsdb_password = None\n client_max_size = None\n for config in reversed(configs):\n if config.bind is not None:\n bind = config.bind\n if config.connect is not None:\n connect = config.connect\n if config.timeout is not None:\n timeout = config.timeout\n if config.opentsdb_url is not None:\n opentsdb_url = config.opentsdb_url\n if config.opentsdb_db is not None:\n opentsdb_db = config.opentsdb_db\n if config.opentsdb_username is not None:\n opentsdb_username = config.opentsdb_username\n if config.opentsdb_password is not None:\n opentsdb_password = config.opentsdb_password\n if config.client_max_size is not None:\n client_max_size = config.client_max_size\n return RestApiConfig(bind=bind, connect=connect, timeout=timeout,\n opentsdb_url=opentsdb_url, opentsdb_db=opentsdb_db,\n opentsdb_username=opentsdb_username, opentsdb_password=\n opentsdb_password, client_max_size=client_max_size)\n",
"role": "user"
},
{
"content": "merge_rest_api_config",
"role": "assistant"
}
] |
def x(subparsers, parent_parser):
parser = subparsers.add_parser('block', description=
'Provides subcommands to display information about the blocks in the current blockchain.'
, help='Displays information on blocks in the current blockchain')
grand_parsers = parser.add_subparsers(title='subcommands', dest=
'subcommand')
grand_parsers.required = True
description = (
'Displays information for all blocks on the current blockchain, including the block id and number, public keys all of allsigners, and number of transactions and batches.'
)
list_parser = grand_parsers.add_parser('list', help=
'Displays information for all blocks on the current blockchain',
description=description, parents=[base_http_parser(),
base_list_parser()], formatter_class=argparse.
RawDescriptionHelpFormatter)
list_parser.add_argument('-n', '--count', default=100, type=int, help=
'the number of blocks to list')
description = (
'Displays information about the specified block on the current blockchain'
)
show_parser = grand_parsers.add_parser('show', help=description,
description=description + '.', parents=[base_http_parser(),
base_show_parser()], formatter_class=argparse.
RawDescriptionHelpFormatter)
show_parser.add_argument('block_id', type=str, help=
'id (header_signature) of the block')
| add_block_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(subparsers, parent_parser):\n parser = subparsers.add_parser('block', description=\n 'Provides subcommands to display information about the blocks in the current blockchain.'\n , help='Displays information on blocks in the current blockchain')\n grand_parsers = parser.add_subparsers(title='subcommands', dest=\n 'subcommand')\n grand_parsers.required = True\n description = (\n 'Displays information for all blocks on the current blockchain, including the block id and number, public keys all of allsigners, and number of transactions and batches.'\n )\n list_parser = grand_parsers.add_parser('list', help=\n 'Displays information for all blocks on the current blockchain',\n description=description, parents=[base_http_parser(),\n base_list_parser()], formatter_class=argparse.\n RawDescriptionHelpFormatter)\n list_parser.add_argument('-n', '--count', default=100, type=int, help=\n 'the number of blocks to list')\n description = (\n 'Displays information about the specified block on the current blockchain'\n )\n show_parser = grand_parsers.add_parser('show', help=description,\n description=description + '.', parents=[base_http_parser(),\n base_show_parser()], formatter_class=argparse.\n RawDescriptionHelpFormatter)\n show_parser.add_argument('block_id', type=str, help=\n 'id (header_signature) of the block')\n",
"role": "user"
},
{
"content": "add_block_parser",
"role": "assistant"
}
] |
def x(args):
rest_client = RestClient(args.url, args.user)
if args.subcommand == 'list':
block_generator = rest_client.list_blocks()
blocks = []
left = args.count
for block in block_generator:
blocks.append(block)
left -= 1
if left <= 0:
break
keys = 'num', 'block_id', 'batches', 'txns', 'signer'
headers = tuple(k.upper() if k != 'batches' else 'BATS' for k in keys)
def x(block):
batches = block.get('batches', [])
txns = [t for b in batches for t in b['transactions']]
return block['header'].get('block_num', 0), block[
'header_signature'], len(batches), len(txns), block['header'][
'signer_public_key']
if args.format == 'default':
fmt.print_terminal_table(headers, blocks, parse_block_row)
elif args.format == 'csv':
fmt.print_csv(headers, blocks, parse_block_row)
elif args.format == 'json' or args.format == 'yaml':
data = [{k: d for k, d in zip(keys, parse_block_row(b))} for b in
blocks]
if args.format == 'yaml':
fmt.print_yaml(data)
elif args.format == 'json':
fmt.print_json(data)
else:
raise AssertionError('Missing handler: {}'.format(args.format))
else:
raise AssertionError('Missing handler: {}'.format(args.format))
if args.subcommand == 'show':
output = rest_client.get_block(args.block_id)
if args.key:
if args.key in output:
output = output[args.key]
elif args.key in output['header']:
output = output['header'][args.key]
else:
raise CliException('key "{}" not found in block or header'.
format(args.key))
if args.format == 'yaml':
fmt.print_yaml(output)
elif args.format == 'json':
fmt.print_json(output)
else:
raise AssertionError('Missing handler: {}'.format(args.format))
| do_block | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(args):\n rest_client = RestClient(args.url, args.user)\n if args.subcommand == 'list':\n block_generator = rest_client.list_blocks()\n blocks = []\n left = args.count\n for block in block_generator:\n blocks.append(block)\n left -= 1\n if left <= 0:\n break\n keys = 'num', 'block_id', 'batches', 'txns', 'signer'\n headers = tuple(k.upper() if k != 'batches' else 'BATS' for k in keys)\n\n def x(block):\n batches = block.get('batches', [])\n txns = [t for b in batches for t in b['transactions']]\n return block['header'].get('block_num', 0), block[\n 'header_signature'], len(batches), len(txns), block['header'][\n 'signer_public_key']\n if args.format == 'default':\n fmt.print_terminal_table(headers, blocks, parse_block_row)\n elif args.format == 'csv':\n fmt.print_csv(headers, blocks, parse_block_row)\n elif args.format == 'json' or args.format == 'yaml':\n data = [{k: d for k, d in zip(keys, parse_block_row(b))} for b in\n blocks]\n if args.format == 'yaml':\n fmt.print_yaml(data)\n elif args.format == 'json':\n fmt.print_json(data)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n if args.subcommand == 'show':\n output = rest_client.get_block(args.block_id)\n if args.key:\n if args.key in output:\n output = output[args.key]\n elif args.key in output['header']:\n output = output['header'][args.key]\n else:\n raise CliException('key \"{}\" not found in block or header'.\n format(args.key))\n if args.format == 'yaml':\n fmt.print_yaml(output)\n elif args.format == 'json':\n fmt.print_json(output)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n",
"role": "user"
},
{
"content": "do_block",
"role": "assistant"
}
] |
async def incoming(self):
"""Returns the next incoming message.
"""
msg = await self._queue.get()
self._queue.task_done()
return msg
| incoming | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def incoming(self):\n \"\"\"Returns the next incoming message.\n \"\"\"\n msg = await self._queue.get()\n self._queue.task_done()\n return msg\n",
"role": "user"
},
{
"content": "incoming",
"role": "assistant"
}
] |
async def await_reply(self, correlation_id, timeout=None):
"""Wait for a reply to a given correlation id. If a timeout is
provided, it will raise a asyncio.TimeoutError.
"""
try:
result = await asyncio.wait_for(self._futures[correlation_id],
timeout=timeout)
return result
finally:
del self._futures[correlation_id]
| await_reply | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def await_reply(self, correlation_id, timeout=None):\n \"\"\"Wait for a reply to a given correlation id. If a timeout is\n provided, it will raise a asyncio.TimeoutError.\n \"\"\"\n try:\n result = await asyncio.wait_for(self._futures[correlation_id],\n timeout=timeout)\n return result\n finally:\n del self._futures[correlation_id]\n",
"role": "user"
},
{
"content": "await_reply",
"role": "assistant"
}
] |
def x(self, err):
for c_id in self._futures:
self._fail_reply(c_id, err)
| fail_all | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, err):\n for c_id in self._futures:\n self._fail_reply(c_id, err)\n",
"role": "user"
},
{
"content": "fail_all",
"role": "assistant"
}
] |
async def route_msg(self, msg):
"""Given a message, route it either to the incoming queue, or to the
future associated with its correlation_id.
"""
if msg.correlation_id in self._futures:
self._set_reply(msg.correlation_id, msg)
else:
await self._push_incoming(msg)
| route_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def route_msg(self, msg):\n \"\"\"Given a message, route it either to the incoming queue, or to the\n future associated with its correlation_id.\n \"\"\"\n if msg.correlation_id in self._futures:\n self._set_reply(msg.correlation_id, msg)\n else:\n await self._push_incoming(msg)\n",
"role": "user"
},
{
"content": "route_msg",
"role": "assistant"
}
] |
async def start(self):
"""Starts receiving messages on the underlying socket and passes them
to the message router.
"""
self._is_running = True
while self._is_running:
try:
zmq_msg = await self._socket.recv_multipart()
message = Message()
message.ParseFromString(zmq_msg[-1])
await self._msg_router.route_msg(message)
except DecodeError as e:
LOGGER.warning('Unable to decode: %s', e)
except zmq.ZMQError as e:
LOGGER.warning('Unable to receive: %s', e)
return
except asyncio.CancelledError:
self._is_running = False
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def start(self):\n \"\"\"Starts receiving messages on the underlying socket and passes them\n to the message router.\n \"\"\"\n self._is_running = True\n while self._is_running:\n try:\n zmq_msg = await self._socket.recv_multipart()\n message = Message()\n message.ParseFromString(zmq_msg[-1])\n await self._msg_router.route_msg(message)\n except DecodeError as e:\n LOGGER.warning('Unable to decode: %s', e)\n except zmq.ZMQError as e:\n LOGGER.warning('Unable to receive: %s', e)\n return\n except asyncio.CancelledError:\n self._is_running = False\n",
"role": "user"
},
{
"content": "start",
"role": "assistant"
}
] |
def x(self):
LOGGER.info('Connecting to %s', self._url)
asyncio.ensure_future(self._do_start())
| open | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n LOGGER.info('Connecting to %s', self._url)\n asyncio.ensure_future(self._do_start())\n",
"role": "user"
},
{
"content": "open",
"role": "assistant"
}
] |
def x(self, event_type, callback):
listeners = self._connection_state_listeners.get(event_type, [])
listeners.append(callback)
self._connection_state_listeners[event_type] = listeners
| on_connection_state_change | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, event_type, callback):\n listeners = self._connection_state_listeners.get(event_type, [])\n listeners.append(callback)\n self._connection_state_listeners[event_type] = listeners\n",
"role": "user"
},
{
"content": "on_connection_state_change",
"role": "assistant"
}
] |
async def send(self, message_type, message_content, timeout=None):
"""Sends a message and returns a future for the response.
"""
return await self._sender.send(message_type, message_content, timeout=
timeout)
| send | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def send(self, message_type, message_content, timeout=None):\n \"\"\"Sends a message and returns a future for the response.\n \"\"\"\n return await self._sender.send(message_type, message_content, timeout=\n timeout)\n",
"role": "user"
},
{
"content": "send",
"role": "assistant"
}
] |
def x(self):
if self._recv_task:
self._recv_task.cancel()
self._disable_monitoring()
if self._monitor_task and not self._monitor_task.done():
self._monitor_task.cancel()
self._receiver.cancel()
self._socket.close(linger=0)
self._msg_router.fail_all(DisconnectError())
| close | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._recv_task:\n self._recv_task.cancel()\n self._disable_monitoring()\n if self._monitor_task and not self._monitor_task.done():\n self._monitor_task.cancel()\n self._receiver.cancel()\n self._socket.close(linger=0)\n self._msg_router.fail_all(DisconnectError())\n",
"role": "user"
},
{
"content": "close",
"role": "assistant"
}
] |
def x(self, key):
with self._lmdb.begin(write=True, buffers=True) as txn:
txn.delete(key.encode())
| delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key):\n with self._lmdb.begin(write=True, buffers=True) as txn:\n txn.delete(key.encode())\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(self, index=None):
with self._lmdb.begin() as txn:
return [key.decode() for key, _ in txn.cursor()]
| keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, index=None):\n with self._lmdb.begin() as txn:\n return [key.decode() for key, _ in txn.cursor()]\n",
"role": "user"
},
{
"content": "keys",
"role": "assistant"
}
] |
def x(self):
header_bytes = self.block_header.SerializeToString()
block = Block(header=header_bytes, header_signature=self._header_signature)
block.batches.extend(self.batches)
return block
| build_block | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n header_bytes = self.block_header.SerializeToString()\n block = Block(header=header_bytes, header_signature=self._header_signature)\n block.batches.extend(self.batches)\n return block\n",
"role": "user"
},
{
"content": "build_block",
"role": "assistant"
}
] |
def x(self, txn_signature, is_valid, context_id, state_changes, events,
data, error_message, error_data):
raise NotImplementedError()
| set_transaction_execution_result | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, txn_signature, is_valid, context_id, state_changes, events,\n data, error_message, error_data):\n raise NotImplementedError()\n",
"role": "user"
},
{
"content": "set_transaction_execution_result",
"role": "assistant"
}
] |
def x(self, chain):
with self._lock:
chain.sort(key=lambda x: x.block_num)
for block in chain:
block_id = block.header_signature
if block_id not in self._cache:
self._cache[block_id] = self.CachedValue(block)
if block.previous_block_id in self._cache:
self._cache[block.previous_block_id].inc_count()
if time.time() > self._next_purge_time:
self._purge_expired()
self._next_purge_time = time.time() + self._purge_frequency
| add_chain | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, chain):\n with self._lock:\n chain.sort(key=lambda x: x.block_num)\n for block in chain:\n block_id = block.header_signature\n if block_id not in self._cache:\n self._cache[block_id] = self.CachedValue(block)\n if block.previous_block_id in self._cache:\n self._cache[block.previous_block_id].inc_count()\n if time.time() > self._next_purge_time:\n self._purge_expired()\n self._next_purge_time = time.time() + self._purge_frequency\n",
"role": "user"
},
{
"content": "add_chain",
"role": "assistant"
}
] |
def x(self):
time_horizon = time.time() - self._keep_time
new_cache = {}
dec_count_for = []
for k, v in self._cache.items():
if v.count > 0:
if k not in self._block_store:
new_cache[k] = v
elif v.timestamp > time_horizon:
new_cache[k] = v
else:
block = v.value
if block is not None:
dec_count_for.append(block.previous_block_id)
elif v.timestamp > time_horizon:
new_cache[k] = v
else:
block = v.value
if block is not None:
dec_count_for.append(block.previous_block_id)
self._cache = new_cache
for block_id in dec_count_for:
if block_id in self._cache:
self._cache[block_id].dec_count()
| purge_expired | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n time_horizon = time.time() - self._keep_time\n new_cache = {}\n dec_count_for = []\n for k, v in self._cache.items():\n if v.count > 0:\n if k not in self._block_store:\n new_cache[k] = v\n elif v.timestamp > time_horizon:\n new_cache[k] = v\n else:\n block = v.value\n if block is not None:\n dec_count_for.append(block.previous_block_id)\n elif v.timestamp > time_horizon:\n new_cache[k] = v\n else:\n block = v.value\n if block is not None:\n dec_count_for.append(block.previous_block_id)\n self._cache = new_cache\n for block_id in dec_count_for:\n if block_id in self._cache:\n self._cache[block_id].dec_count()\n",
"role": "user"
},
{
"content": "purge_expired",
"role": "assistant"
}
] |
def x(cls, status):
assert cls.trigger is not None, 'Invalid ErrorTrap, trigger not set'
assert cls.error is not None, 'Invalid ErrorTrap, error not set'
if status == cls.trigger:
raise cls.error()
| check | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, status):\n assert cls.trigger is not None, 'Invalid ErrorTrap, trigger not set'\n assert cls.error is not None, 'Invalid ErrorTrap, error not set'\n if status == cls.trigger:\n raise cls.error()\n",
"role": "user"
},
{
"content": "check",
"role": "assistant"
}
] |
def x(self, block, keep_batches):
clone = Block()
clone.header = block.header
clone.header_signature = block.header_signature
clone.batches.extend([batch for batch in block.batches if batch.
header_signature in keep_batches])
return clone
| remove_batches | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, block, keep_batches):\n clone = Block()\n clone.header = block.header\n clone.header_signature = block.header_signature\n clone.batches.extend([batch for batch in block.batches if batch.\n header_signature in keep_batches])\n return clone\n",
"role": "user"
},
{
"content": "remove_batches",
"role": "assistant"
}
] |
def x(self, block_header):
state_view = BlockWrapper.state_view_for_block(self._block_cache.
block_store.chain_head, self._state_view_factory)
settings_view = SettingsView(state_view)
self._min_wait_time = settings_view.get_setting(
'sawtooth.consensus.min_wait_time', self._min_wait_time, int)
self._max_wait_time = settings_view.get_setting(
'sawtooth.consensus.max_wait_time', self._max_wait_time, int)
self._valid_block_publishers = settings_view.get_setting(
'sawtooth.consensus.valid_block_publishers', self.
_valid_block_publishers, list)
block_header.consensus = b'Devmode'
self._start_time = time.time()
self._wait_time = random.uniform(self._min_wait_time, self._max_wait_time)
return True
| initialize_block | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, block_header):\n state_view = BlockWrapper.state_view_for_block(self._block_cache.\n block_store.chain_head, self._state_view_factory)\n settings_view = SettingsView(state_view)\n self._min_wait_time = settings_view.get_setting(\n 'sawtooth.consensus.min_wait_time', self._min_wait_time, int)\n self._max_wait_time = settings_view.get_setting(\n 'sawtooth.consensus.max_wait_time', self._max_wait_time, int)\n self._valid_block_publishers = settings_view.get_setting(\n 'sawtooth.consensus.valid_block_publishers', self.\n _valid_block_publishers, list)\n block_header.consensus = b'Devmode'\n self._start_time = time.time()\n self._wait_time = random.uniform(self._min_wait_time, self._max_wait_time)\n return True\n",
"role": "user"
},
{
"content": "initialize_block",
"role": "assistant"
}
] |
def x(self, block_header):
if any(publisher_key != block_header.signer_public_key for
publisher_key in self._valid_block_publishers):
return False
if self._min_wait_time == 0:
return True
if self._min_wait_time < 0:
return False
assert self._min_wait_time > 0
if self._max_wait_time <= 0:
return self._start_time + self._min_wait_time <= time.time()
assert self._max_wait_time > 0
if self._max_wait_time <= self._min_wait_time:
return False
assert 0 < self._min_wait_time < self._max_wait_time
return self._start_time + self._wait_time <= time.time()
| check_publish_block | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, block_header):\n if any(publisher_key != block_header.signer_public_key for\n publisher_key in self._valid_block_publishers):\n return False\n if self._min_wait_time == 0:\n return True\n if self._min_wait_time < 0:\n return False\n assert self._min_wait_time > 0\n if self._max_wait_time <= 0:\n return self._start_time + self._min_wait_time <= time.time()\n assert self._max_wait_time > 0\n if self._max_wait_time <= self._min_wait_time:\n return False\n assert 0 < self._min_wait_time < self._max_wait_time\n return self._start_time + self._wait_time <= time.time()\n",
"role": "user"
},
{
"content": "check_publish_block",
"role": "assistant"
}
] |
def x(self, cur_fork_head, new_fork_head):
if new_fork_head.consensus != b'Devmode':
raise TypeError('New fork head {} is not a DevMode block'.format(
new_fork_head.identifier[:8]))
if cur_fork_head.consensus != b'Devmode':
if new_fork_head.previous_block_id == cur_fork_head.identifier:
LOGGER.info(
'Choose new fork %s: New fork head switches consensus to DevMode'
, new_fork_head.identifier[:8])
return True
raise TypeError(
'Trying to compare a DevMode block {} to a non-DevMode block {} that is not the direct predecessor'
.format(new_fork_head.identifier[:8], cur_fork_head.identifier[:8])
)
if new_fork_head.block_num == cur_fork_head.block_num:
cur_fork_hash = self.hash_signer_public_key(cur_fork_head.header.
signer_public_key, cur_fork_head.header.previous_block_id)
new_fork_hash = self.hash_signer_public_key(new_fork_head.header.
signer_public_key, new_fork_head.header.previous_block_id)
result = new_fork_hash < cur_fork_hash
else:
result = new_fork_head.block_num > cur_fork_head.block_num
return result
| compare_forks | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cur_fork_head, new_fork_head):\n if new_fork_head.consensus != b'Devmode':\n raise TypeError('New fork head {} is not a DevMode block'.format(\n new_fork_head.identifier[:8]))\n if cur_fork_head.consensus != b'Devmode':\n if new_fork_head.previous_block_id == cur_fork_head.identifier:\n LOGGER.info(\n 'Choose new fork %s: New fork head switches consensus to DevMode'\n , new_fork_head.identifier[:8])\n return True\n raise TypeError(\n 'Trying to compare a DevMode block {} to a non-DevMode block {} that is not the direct predecessor'\n .format(new_fork_head.identifier[:8], cur_fork_head.identifier[:8])\n )\n if new_fork_head.block_num == cur_fork_head.block_num:\n cur_fork_hash = self.hash_signer_public_key(cur_fork_head.header.\n signer_public_key, cur_fork_head.header.previous_block_id)\n new_fork_hash = self.hash_signer_public_key(new_fork_head.header.\n signer_public_key, new_fork_head.header.previous_block_id)\n result = new_fork_hash < cur_fork_hash\n else:\n result = new_fork_head.block_num > cur_fork_head.block_num\n return result\n",
"role": "user"
},
{
"content": "compare_forks",
"role": "assistant"
}
] |
def x(self, batch, state_root=None, from_state=False):
if state_root is None:
state_root = self._current_root_func()
if state_root == INIT_ROOT_KEY:
LOGGER.debug('Chain head is not set yet. Permit all.')
return True
self._cache.update_view(state_root)
header = BatchHeader()
header.ParseFromString(batch.header)
role = self._cache.get_role('transactor.batch_signer', state_root,
from_state)
if role is None:
role = self._cache.get_role('transactor', state_root, from_state)
if role is None:
policy_name = 'default'
else:
policy_name = role.policy_name
policy = self._cache.get_policy(policy_name, state_root, from_state)
if policy is None:
allowed = True
else:
allowed = self._allowed(header.signer_public_key, policy)
if allowed:
return self.is_transaction_signer_authorized(batch.transactions,
state_root, from_state)
LOGGER.debug('Batch Signer: %s is not permitted.', header.signer_public_key
)
return False
| is_batch_signer_authorized | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, batch, state_root=None, from_state=False):\n if state_root is None:\n state_root = self._current_root_func()\n if state_root == INIT_ROOT_KEY:\n LOGGER.debug('Chain head is not set yet. Permit all.')\n return True\n self._cache.update_view(state_root)\n header = BatchHeader()\n header.ParseFromString(batch.header)\n role = self._cache.get_role('transactor.batch_signer', state_root,\n from_state)\n if role is None:\n role = self._cache.get_role('transactor', state_root, from_state)\n if role is None:\n policy_name = 'default'\n else:\n policy_name = role.policy_name\n policy = self._cache.get_policy(policy_name, state_root, from_state)\n if policy is None:\n allowed = True\n else:\n allowed = self._allowed(header.signer_public_key, policy)\n if allowed:\n return self.is_transaction_signer_authorized(batch.transactions,\n state_root, from_state)\n LOGGER.debug('Batch Signer: %s is not permitted.', header.signer_public_key\n )\n return False\n",
"role": "user"
},
{
"content": "is_batch_signer_authorized",
"role": "assistant"
}
] |
def x(self, transactions, state_root, from_state):
role = None
if role is None:
role = self._cache.get_role('transactor.transaction_signer',
state_root, from_state)
if role is None:
role = self._cache.get_role('transactor', state_root, from_state)
if role is None:
policy_name = 'default'
else:
policy_name = role.policy_name
policy = self._cache.get_policy(policy_name, state_root, from_state)
family_roles = {}
for transaction in transactions:
header = TransactionHeader()
header.ParseFromString(transaction.header)
family_policy = None
if header.family_name not in family_roles:
role = self._cache.get_role('transactor.transaction_signer.' +
header.family_name, state_root, from_state)
if role is not None:
family_policy = self._cache.get_policy(role.policy_name,
state_root, from_state)
family_roles[header.family_name] = family_policy
else:
family_policy = family_roles[header.family_name]
if family_policy is not None:
if not self._allowed(header.signer_public_key, family_policy):
LOGGER.debug('Transaction Signer: %s is not permitted.',
header.signer_public_key)
return False
elif policy is not None:
if not self._allowed(header.signer_public_key, policy):
LOGGER.debug('Transaction Signer: %s is not permitted.',
header.signer_public_key)
return False
return True
| is_transaction_signer_authorized | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, transactions, state_root, from_state):\n role = None\n if role is None:\n role = self._cache.get_role('transactor.transaction_signer',\n state_root, from_state)\n if role is None:\n role = self._cache.get_role('transactor', state_root, from_state)\n if role is None:\n policy_name = 'default'\n else:\n policy_name = role.policy_name\n policy = self._cache.get_policy(policy_name, state_root, from_state)\n family_roles = {}\n for transaction in transactions:\n header = TransactionHeader()\n header.ParseFromString(transaction.header)\n family_policy = None\n if header.family_name not in family_roles:\n role = self._cache.get_role('transactor.transaction_signer.' +\n header.family_name, state_root, from_state)\n if role is not None:\n family_policy = self._cache.get_policy(role.policy_name,\n state_root, from_state)\n family_roles[header.family_name] = family_policy\n else:\n family_policy = family_roles[header.family_name]\n if family_policy is not None:\n if not self._allowed(header.signer_public_key, family_policy):\n LOGGER.debug('Transaction Signer: %s is not permitted.',\n header.signer_public_key)\n return False\n elif policy is not None:\n if not self._allowed(header.signer_public_key, policy):\n LOGGER.debug('Transaction Signer: %s is not permitted.',\n header.signer_public_key)\n return False\n return True\n",
"role": "user"
},
{
"content": "is_transaction_signer_authorized",
"role": "assistant"
}
] |
def x(self, batch):
if self._permissions is None:
return True
header = BatchHeader()
header.ParseFromString(batch.header)
policy = None
if 'transactor.batch_signer' in self._permissions:
policy = self._permissions['transactor.batch_signer']
elif 'transactor' in self._permissions:
policy = self._permissions['transactor']
allowed = True
if policy is not None:
allowed = self._allowed(header.signer_public_key, policy)
if allowed:
return self.check_off_chain_transaction_roles(batch.transactions)
LOGGER.debug('Batch Signer: %s is not permitted by local configuration.',
header.signer_public_key)
return False
| check_off_chain_batch_roles | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, batch):\n if self._permissions is None:\n return True\n header = BatchHeader()\n header.ParseFromString(batch.header)\n policy = None\n if 'transactor.batch_signer' in self._permissions:\n policy = self._permissions['transactor.batch_signer']\n elif 'transactor' in self._permissions:\n policy = self._permissions['transactor']\n allowed = True\n if policy is not None:\n allowed = self._allowed(header.signer_public_key, policy)\n if allowed:\n return self.check_off_chain_transaction_roles(batch.transactions)\n LOGGER.debug('Batch Signer: %s is not permitted by local configuration.',\n header.signer_public_key)\n return False\n",
"role": "user"
},
{
"content": "check_off_chain_batch_roles",
"role": "assistant"
}
] |
def x(self, transactions):
policy = None
if 'transactor.transaction_signer' in self._permissions:
policy = self._permissions['transactor.transaction_signer']
elif 'transactor' in self._permissions:
policy = self._permissions['transactor']
for transaction in transactions:
header = TransactionHeader()
header.ParseFromString(transaction.header)
family_role = 'transactor.transaction_signer.' + header.family_name
family_policy = None
if family_role in self._permissions:
family_policy = self._permissions[family_role]
if family_policy is not None:
if not self._allowed(header.signer_public_key, family_policy):
LOGGER.debug(
'Transaction Signer: %s is not permittedby local configuration.'
, header.signer_public_key)
return False
elif policy is not None:
if not self._allowed(header.signer_public_key, policy):
LOGGER.debug(
'Transaction Signer: %s is not permittedby local configuration.'
, header.signer_public_key)
return False
return True
| check_off_chain_transaction_roles | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, transactions):\n policy = None\n if 'transactor.transaction_signer' in self._permissions:\n policy = self._permissions['transactor.transaction_signer']\n elif 'transactor' in self._permissions:\n policy = self._permissions['transactor']\n for transaction in transactions:\n header = TransactionHeader()\n header.ParseFromString(transaction.header)\n family_role = 'transactor.transaction_signer.' + header.family_name\n family_policy = None\n if family_role in self._permissions:\n family_policy = self._permissions[family_role]\n if family_policy is not None:\n if not self._allowed(header.signer_public_key, family_policy):\n LOGGER.debug(\n 'Transaction Signer: %s is not permittedby local configuration.'\n , header.signer_public_key)\n return False\n elif policy is not None:\n if not self._allowed(header.signer_public_key, policy):\n LOGGER.debug(\n 'Transaction Signer: %s is not permittedby local configuration.'\n , header.signer_public_key)\n return False\n return True\n",
"role": "user"
},
{
"content": "check_off_chain_transaction_roles",
"role": "assistant"
}
] |
def x(self, public_key):
state_root = self._current_root_func()
if state_root == INIT_ROOT_KEY:
LOGGER.debug('Chain head is not set yet. Permit all.')
return True
self._cache.update_view(state_root)
role = self._cache.get_role('network', state_root)
if role is None:
policy_name = 'default'
else:
policy_name = role.policy_name
policy = self._cache.get_policy(policy_name, state_root)
if policy is not None:
if not self._allowed(public_key, policy):
LOGGER.debug('Node is not permitted: %s.', public_key)
return False
return True
| check_network_role | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, public_key):\n state_root = self._current_root_func()\n if state_root == INIT_ROOT_KEY:\n LOGGER.debug('Chain head is not set yet. Permit all.')\n return True\n self._cache.update_view(state_root)\n role = self._cache.get_role('network', state_root)\n if role is None:\n policy_name = 'default'\n else:\n policy_name = role.policy_name\n policy = self._cache.get_policy(policy_name, state_root)\n if policy is not None:\n if not self._allowed(public_key, policy):\n LOGGER.debug('Node is not permitted: %s.', public_key)\n return False\n return True\n",
"role": "user"
},
{
"content": "check_network_role",
"role": "assistant"
}
] |
def x(self, item, state_root, from_state=False):
if from_state:
if self._identity_view is None:
self.update_view(state_root)
value = self._identity_view.get_role(item)
return value
value = self._cache.get(item)
if value is None:
if self._identity_view is None:
self.update_view(state_root)
value = self._identity_view.get_role(item)
self._cache[item] = value
return value
| get_role | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, item, state_root, from_state=False):\n if from_state:\n if self._identity_view is None:\n self.update_view(state_root)\n value = self._identity_view.get_role(item)\n return value\n value = self._cache.get(item)\n if value is None:\n if self._identity_view is None:\n self.update_view(state_root)\n value = self._identity_view.get_role(item)\n self._cache[item] = value\n return value\n",
"role": "user"
},
{
"content": "get_role",
"role": "assistant"
}
] |
def x(statuses, batch_ids, tracker):
proto_statuses = []
for batch_id in batch_ids:
if statuses[batch_id
] == client_batch_submit_pb2.ClientBatchStatus.INVALID:
invalid_txns = tracker.get_invalid_txn_info(batch_id)
for txn_info in invalid_txns:
try:
txn_info['transaction_id'] = txn_info.pop('id')
except KeyError as e:
LOGGER.debug(e)
else:
invalid_txns = None
proto_statuses.append(client_batch_submit_pb2.ClientBatchStatus(
batch_id=batch_id, status=statuses[batch_id],
invalid_transactions=invalid_txns))
return proto_statuses
| format_batch_statuses | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(statuses, batch_ids, tracker):\n proto_statuses = []\n for batch_id in batch_ids:\n if statuses[batch_id\n ] == client_batch_submit_pb2.ClientBatchStatus.INVALID:\n invalid_txns = tracker.get_invalid_txn_info(batch_id)\n for txn_info in invalid_txns:\n try:\n txn_info['transaction_id'] = txn_info.pop('id')\n except KeyError as e:\n LOGGER.debug(e)\n else:\n invalid_txns = None\n proto_statuses.append(client_batch_submit_pb2.ClientBatchStatus(\n batch_id=batch_id, status=statuses[batch_id],\n invalid_transactions=invalid_txns))\n return proto_statuses\n",
"role": "user"
},
{
"content": "format_batch_statuses",
"role": "assistant"
}
] |
def x(self, connection_id, message_content):
try:
request = self._request_proto()
request.ParseFromString(message_content)
except DecodeError:
LOGGER.info('Protobuf %s failed to deserialize', request)
return self._wrap_result(self._status.INTERNAL_ERROR)
try:
response = self._respond(request)
except _ResponseFailed as e:
response = e.status
return self._wrap_result(response)
| handle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, connection_id, message_content):\n try:\n request = self._request_proto()\n request.ParseFromString(message_content)\n except DecodeError:\n LOGGER.info('Protobuf %s failed to deserialize', request)\n return self._wrap_result(self._status.INTERNAL_ERROR)\n try:\n response = self._respond(request)\n except _ResponseFailed as e:\n response = e.status\n return self._wrap_result(response)\n",
"role": "user"
},
{
"content": "handle",
"role": "assistant"
}
] |
def x(self, response):
if isinstance(response, int):
response = self._wrap_response(response)
return HandlerResult(status=HandlerStatus.RETURN, message_out=self.
_response_proto(**response), message_type=self._response_type)
| wrap_result | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n if isinstance(response, int):\n response = self._wrap_response(response)\n return HandlerResult(status=HandlerStatus.RETURN, message_out=self.\n _response_proto(**response), message_type=self._response_type)\n",
"role": "user"
},
{
"content": "wrap_result",
"role": "assistant"
}
] |
def x(self, status=None, **kwargs):
kwargs['status'] = status if status is not None else self._status.OK
return kwargs
| wrap_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, status=None, **kwargs):\n kwargs['status'] = status if status is not None else self._status.OK\n return kwargs\n",
"role": "user"
},
{
"content": "wrap_response",
"role": "assistant"
}
] |
def x(self, request):
if request.head_id:
if self._id_regex.fullmatch(request.head_id) is None:
LOGGER.debug('Invalid head id requested: %s', request.head_id)
raise _ResponseFailed(self._status.NO_ROOT)
try:
return self._block_store[request.head_id]
except KeyError as e:
LOGGER.debug('Unable to find block "%s" in store', e)
raise _ResponseFailed(self._status.NO_ROOT)
else:
return self._get_chain_head()
| get_head_block | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if request.head_id:\n if self._id_regex.fullmatch(request.head_id) is None:\n LOGGER.debug('Invalid head id requested: %s', request.head_id)\n raise _ResponseFailed(self._status.NO_ROOT)\n try:\n return self._block_store[request.head_id]\n except KeyError as e:\n LOGGER.debug('Unable to find block \"%s\" in store', e)\n raise _ResponseFailed(self._status.NO_ROOT)\n else:\n return self._get_chain_head()\n",
"role": "user"
},
{
"content": "get_head_block",
"role": "assistant"
}
] |
def x(self, request):
if request.state_root:
root = request.state_root
else:
head = self._get_chain_head()
root = head.state_root_hash
try:
self._tree.set_merkle_root(root)
except KeyError as e:
LOGGER.debug('Unable to find root "%s" in database', e)
raise _ResponseFailed(self._status.NO_ROOT)
return root
| set_root | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if request.state_root:\n root = request.state_root\n else:\n head = self._get_chain_head()\n root = head.state_root_hash\n try:\n self._tree.set_merkle_root(root)\n except KeyError as e:\n LOGGER.debug('Unable to find root \"%s\" in database', e)\n raise _ResponseFailed(self._status.NO_ROOT)\n return root\n",
"role": "user"
},
{
"content": "set_root",
"role": "assistant"
}
] |
def x(self, request, head_id, filter_ids, resource_fetcher, block_xform):
resources = []
if filter_ids and not request.head_id:
for resource_id in filter_ids:
try:
resources.append(resource_fetcher(resource_id))
except (KeyError, ValueError, TypeError):
pass
else:
current_id = head_id
while current_id in self._block_store:
block = self._block_store[current_id].block
resources += block_xform(block)
header = BlockHeader()
header.ParseFromString(block.header)
current_id = header.previous_block_id
if request.head_id and filter_ids:
matches = {r.header_signature: r for r in resources if r.
header_signature in filter_ids}
resources = [matches[i] for i in filter_ids if i in matches]
return resources
| list_store_resources | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, head_id, filter_ids, resource_fetcher, block_xform):\n resources = []\n if filter_ids and not request.head_id:\n for resource_id in filter_ids:\n try:\n resources.append(resource_fetcher(resource_id))\n except (KeyError, ValueError, TypeError):\n pass\n else:\n current_id = head_id\n while current_id in self._block_store:\n block = self._block_store[current_id].block\n resources += block_xform(block)\n header = BlockHeader()\n header.ParseFromString(block.header)\n current_id = header.previous_block_id\n if request.head_id and filter_ids:\n matches = {r.header_signature: r for r in resources if r.\n header_signature in filter_ids}\n resources = [matches[i] for i in filter_ids if i in matches]\n return resources\n",
"role": "user"
},
{
"content": "list_store_resources",
"role": "assistant"
}
] |
def x(self, resource_ids):
for resource_id in resource_ids:
if self._id_regex.fullmatch(resource_id) is None:
LOGGER.debug('Invalid resource id requested: %s', resource_id)
raise _ResponseFailed(self._status.INVALID_ID)
| validate_ids | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, resource_ids):\n for resource_id in resource_ids:\n if self._id_regex.fullmatch(resource_id) is None:\n LOGGER.debug('Invalid resource id requested: %s', resource_id)\n raise _ResponseFailed(self._status.INVALID_ID)\n",
"role": "user"
},
{
"content": "validate_ids",
"role": "assistant"
}
] |
def x(self, state_root):
if self._state_root_regex.fullmatch(state_root) is None:
LOGGER.debug('Invalid state root: %s', state_root)
raise _ResponseFailed(self._status.INVALID_ROOT)
| validate_state_root | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state_root):\n if self._state_root_regex.fullmatch(state_root) is None:\n LOGGER.debug('Invalid state root: %s', state_root)\n raise _ResponseFailed(self._status.INVALID_ROOT)\n",
"role": "user"
},
{
"content": "validate_state_root",
"role": "assistant"
}
] |
def x(self, namespace):
if self._namespace_regex.fullmatch(namespace) is None:
LOGGER.debug('Invalid namespace: %s', namespace)
raise _ResponseFailed(self._status.INVALID_ADDRESS)
| validate_namespace | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, namespace):\n if self._namespace_regex.fullmatch(namespace) is None:\n LOGGER.debug('Invalid namespace: %s', namespace)\n raise _ResponseFailed(self._status.INVALID_ADDRESS)\n",
"role": "user"
},
{
"content": "validate_namespace",
"role": "assistant"
}
] |
def x(cls, request, resources, on_fail_status):
if not resources:
return resources, client_list_control_pb2.ClientPagingResponse()
paging = request.paging
limit = min(paging.limit, MAX_PAGE_SIZE) or DEFAULT_PAGE_SIZE
try:
if paging.start:
start_index = cls.index_by_id(paging.start, resources)
else:
start_index = 0
if start_index < 0 or start_index >= len(resources):
raise AssertionError
except AssertionError:
raise _ResponseFailed(on_fail_status)
paged_resources = resources[start_index:start_index + limit]
if start_index + limit < len(resources):
paging_response = client_list_control_pb2.ClientPagingResponse(next
=cls.id_by_index(start_index + limit, resources), start=cls.
id_by_index(start_index, resources), limit=limit)
else:
paging_response = client_list_control_pb2.ClientPagingResponse(start
=cls.id_by_index(start_index, resources), limit=limit)
return paged_resources, paging_response
| paginate_resources | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, request, resources, on_fail_status):\n if not resources:\n return resources, client_list_control_pb2.ClientPagingResponse()\n paging = request.paging\n limit = min(paging.limit, MAX_PAGE_SIZE) or DEFAULT_PAGE_SIZE\n try:\n if paging.start:\n start_index = cls.index_by_id(paging.start, resources)\n else:\n start_index = 0\n if start_index < 0 or start_index >= len(resources):\n raise AssertionError\n except AssertionError:\n raise _ResponseFailed(on_fail_status)\n paged_resources = resources[start_index:start_index + limit]\n if start_index + limit < len(resources):\n paging_response = client_list_control_pb2.ClientPagingResponse(next\n =cls.id_by_index(start_index + limit, resources), start=cls.\n id_by_index(start_index, resources), limit=limit)\n else:\n paging_response = client_list_control_pb2.ClientPagingResponse(start\n =cls.id_by_index(start_index, resources), limit=limit)\n return paged_resources, paging_response\n",
"role": "user"
},
{
"content": "paginate_resources",
"role": "assistant"
}
] |
def x(cls, target_id, resources):
for index in range(len(resources)):
if cls.id_by_index(index, resources) == target_id:
return index
raise AssertionError
| index_by_id | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, target_id, resources):\n for index in range(len(resources)):\n if cls.id_by_index(index, resources) == target_id:\n return index\n raise AssertionError\n",
"role": "user"
},
{
"content": "index_by_id",
"role": "assistant"
}
] |
def x(index, resources):
if index < 0 or index >= len(resources):
return ''
try:
return resources[index].header_signature
except AttributeError:
return resources[index].address
| id_by_index | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(index, resources):\n if index < 0 or index >= len(resources):\n return ''\n try:\n return resources[index].header_signature\n except AttributeError:\n return resources[index].address\n",
"role": "user"
},
{
"content": "id_by_index",
"role": "assistant"
}
] |
def x(cls, request, resources, fail_enum, header_proto=None):
if not request.sorting:
return resources
value_handlers = cls._get_handler_set(request, fail_enum, header_proto)
def x(resource_a, resource_b):
for handler in value_handlers:
val_a, val_b = handler.get_sort_values(resource_a, resource_b)
if val_a < val_b:
return handler.xform_result(-1)
if val_a > val_b:
return handler.xform_result(1)
return 0
return sorted(resources, key=cmp_to_key(sorter))
| sort_resources | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, request, resources, fail_enum, header_proto=None):\n if not request.sorting:\n return resources\n value_handlers = cls._get_handler_set(request, fail_enum, header_proto)\n\n def x(resource_a, resource_b):\n for handler in value_handlers:\n val_a, val_b = handler.get_sort_values(resource_a, resource_b)\n if val_a < val_b:\n return handler.xform_result(-1)\n if val_a > val_b:\n return handler.xform_result(1)\n return 0\n return sorted(resources, key=cmp_to_key(sorter))\n",
"role": "user"
},
{
"content": "sort_resources",
"role": "assistant"
}
] |
def x(cls, request, fail_enum, header_proto=None):
added = set()
handlers = []
for controls in request.sorting:
control_bytes = controls.SerializeToString()
if control_bytes not in added:
added.add(control_bytes)
handlers.append(cls._ValueHandler(controls, fail_enum,
header_proto))
return handlers
| get_handler_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, request, fail_enum, header_proto=None):\n added = set()\n handlers = []\n for controls in request.sorting:\n control_bytes = controls.SerializeToString()\n if control_bytes not in added:\n added.add(control_bytes)\n handlers.append(cls._ValueHandler(controls, fail_enum,\n header_proto))\n return handlers\n",
"role": "user"
},
{
"content": "get_handler_set",
"role": "assistant"
}
] |
def x(self, statuses):
with self._wait_condition:
self._statuses = statuses
self._wait_condition.notify()
| notify_batches_finished | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, statuses):\n with self._wait_condition:\n self._statuses = statuses\n self._wait_condition.notify()\n",
"role": "user"
},
{
"content": "notify_batches_finished",
"role": "assistant"
}
] |
def x(self, batch_ids, timeout=None):
self._batch_tracker.watch_statuses(self, batch_ids)
timeout = timeout or DEFAULT_TIMEOUT
start_time = time()
with self._wait_condition:
while True:
if self._statuses is not None:
return _format_batch_statuses(self._statuses, batch_ids,
self._batch_tracker)
if time() - start_time > timeout:
statuses = self._batch_tracker.get_statuses(batch_ids)
return _format_batch_statuses(statuses, batch_ids, self.
_batch_tracker)
self._wait_condition.wait(timeout - (time() - start_time))
| wait_for_batches | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, batch_ids, timeout=None):\n self._batch_tracker.watch_statuses(self, batch_ids)\n timeout = timeout or DEFAULT_TIMEOUT\n start_time = time()\n with self._wait_condition:\n while True:\n if self._statuses is not None:\n return _format_batch_statuses(self._statuses, batch_ids,\n self._batch_tracker)\n if time() - start_time > timeout:\n statuses = self._batch_tracker.get_statuses(batch_ids)\n return _format_batch_statuses(statuses, batch_ids, self.\n _batch_tracker)\n self._wait_condition.wait(timeout - (time() - start_time))\n",
"role": "user"
},
{
"content": "wait_for_batches",
"role": "assistant"
}
] |
def x(path, human_readable_name):
if not os.path.exists(path):
LOGGER.error('%s directory does not exist: %s', human_readable_name,
path)
return False
if not os.path.isdir(path):
LOGGER.error('%s directory is not a directory: %s',
human_readable_name, path)
return False
errors = True
if not os.access(path, os.R_OK):
LOGGER.error('%s directory is not readable: %s',
human_readable_name, path)
errors = False
if not os.access(path, os.W_OK):
LOGGER.error('%s directory is not writable: %s',
human_readable_name, path)
errors = False
return errors
| check_directory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, human_readable_name):\n if not os.path.exists(path):\n LOGGER.error('%s directory does not exist: %s', human_readable_name,\n path)\n return False\n if not os.path.isdir(path):\n LOGGER.error('%s directory is not a directory: %s',\n human_readable_name, path)\n return False\n errors = True\n if not os.access(path, os.R_OK):\n LOGGER.error('%s directory is not readable: %s',\n human_readable_name, path)\n errors = False\n if not os.access(path, os.W_OK):\n LOGGER.error('%s directory is not writable: %s',\n human_readable_name, path)\n errors = False\n return errors\n",
"role": "user"
},
{
"content": "check_directory",
"role": "assistant"
}
] |
def x(subparsers, parent_parser):
parser = subparsers.add_parser('identity', help=
'Works with optional roles, policies, and permissions', description
='Provides subcommands to work with roles and policies.')
identity_parsers = parser.add_subparsers(title='subcommands', dest=
'subcommand')
identity_parsers.required = True
policy_parser = identity_parsers.add_parser('policy', help=
'Provides subcommands to display existing policies and create new policies'
, description=
'Provides subcommands to list the current policies stored in state and to create new policies.'
)
policy_parsers = policy_parser.add_subparsers(title='policy', dest=
'policy_cmd')
policy_parsers.required = True
create_parser = policy_parsers.add_parser('create', help=
'Creates batches of sawtooth-identity transactions for setting a policy'
, description=
'Creates a policy that can be set to a role or changes a policy without resetting the role.'
)
create_parser.add_argument('-k', '--key', type=str, help=
'specify the signing key for the resulting batches')
create_target_group = create_parser.add_mutually_exclusive_group()
create_target_group.add_argument('-o', '--output', type=str, help=
'specify the output filename for the resulting batches')
create_target_group.add_argument('--url', type=str, help=
"identify the URL of a validator's REST API", default=
'http://localhost:8008')
create_parser.add_argument('--wait', type=int, default=15, help=
'set time, in seconds, to wait for the policy to commit when submitting to the REST API.'
)
create_parser.add_argument('name', type=str, help='name of the new policy')
create_parser.add_argument('rule', type=str, nargs='+', help=
'rule with the format "PERMIT_KEY <key>" or "DENY_KEY <key> (multiple "rule" arguments can be specified)'
)
list_parser = policy_parsers.add_parser('list', help=
'Lists the current policies', description=
'Lists the policies that are currently set in state.')
list_parser.add_argument('--url', type=str, help=
"identify the URL of a validator's REST API", default=
'http://localhost:8008')
list_parser.add_argument('--format', default='default', choices=[
'default', 'csv', 'json', 'yaml'], help='choose the output format')
role_parser = identity_parsers.add_parser('role', help=
'Provides subcommands to display existing roles and create new roles',
description=
'Provides subcommands to list the current roles stored in state and to create new roles.'
)
role_parsers = role_parser.add_subparsers(title='role', dest='role_cmd')
role_parsers.required = True
create_parser = role_parsers.add_parser('create', help=
'Creates a new role that can be used to enforce permissions',
description=
'Creates a new role that can be used to enforce permissions.')
create_parser.add_argument('-k', '--key', type=str, help=
'specify the signing key for the resulting batches')
create_parser.add_argument('--wait', type=int, default=15, help=
'set time, in seconds, to wait for a role to commit when submitting to the REST API.'
)
create_target_group = create_parser.add_mutually_exclusive_group()
create_target_group.add_argument('-o', '--output', type=str, help=
'specify the output filename for the resulting batches')
create_target_group.add_argument('--url', type=str, help=
"the URL of a validator's REST API", default='http://localhost:8008')
create_parser.add_argument('name', type=str, help='name of the role')
create_parser.add_argument('policy', type=str, help=
'identify policy that role will be restricted to')
list_parser = role_parsers.add_parser('list', help=
'Lists the current keys and values of roles', description=
'Displays the roles that are currently set in state.')
list_parser.add_argument('--url', type=str, help=
"identify the URL of a validator's REST API", default=
'http://localhost:8008')
list_parser.add_argument('--format', default='default', choices=[
'default', 'csv', 'json', 'yaml'], help='choose the output format')
| add_identity_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(subparsers, parent_parser):\n parser = subparsers.add_parser('identity', help=\n 'Works with optional roles, policies, and permissions', description\n ='Provides subcommands to work with roles and policies.')\n identity_parsers = parser.add_subparsers(title='subcommands', dest=\n 'subcommand')\n identity_parsers.required = True\n policy_parser = identity_parsers.add_parser('policy', help=\n 'Provides subcommands to display existing policies and create new policies'\n , description=\n 'Provides subcommands to list the current policies stored in state and to create new policies.'\n )\n policy_parsers = policy_parser.add_subparsers(title='policy', dest=\n 'policy_cmd')\n policy_parsers.required = True\n create_parser = policy_parsers.add_parser('create', help=\n 'Creates batches of sawtooth-identity transactions for setting a policy'\n , description=\n 'Creates a policy that can be set to a role or changes a policy without resetting the role.'\n )\n create_parser.add_argument('-k', '--key', type=str, help=\n 'specify the signing key for the resulting batches')\n create_target_group = create_parser.add_mutually_exclusive_group()\n create_target_group.add_argument('-o', '--output', type=str, help=\n 'specify the output filename for the resulting batches')\n create_target_group.add_argument('--url', type=str, help=\n \"identify the URL of a validator's REST API\", default=\n 'http://localhost:8008')\n create_parser.add_argument('--wait', type=int, default=15, help=\n 'set time, in seconds, to wait for the policy to commit when submitting to the REST API.'\n )\n create_parser.add_argument('name', type=str, help='name of the new policy')\n create_parser.add_argument('rule', type=str, nargs='+', help=\n 'rule with the format \"PERMIT_KEY <key>\" or \"DENY_KEY <key> (multiple \"rule\" arguments can be specified)'\n )\n list_parser = policy_parsers.add_parser('list', help=\n 'Lists the current policies', description=\n 'Lists the policies that are currently set in state.')\n list_parser.add_argument('--url', type=str, help=\n \"identify the URL of a validator's REST API\", default=\n 'http://localhost:8008')\n list_parser.add_argument('--format', default='default', choices=[\n 'default', 'csv', 'json', 'yaml'], help='choose the output format')\n role_parser = identity_parsers.add_parser('role', help=\n 'Provides subcommands to display existing roles and create new roles',\n description=\n 'Provides subcommands to list the current roles stored in state and to create new roles.'\n )\n role_parsers = role_parser.add_subparsers(title='role', dest='role_cmd')\n role_parsers.required = True\n create_parser = role_parsers.add_parser('create', help=\n 'Creates a new role that can be used to enforce permissions',\n description=\n 'Creates a new role that can be used to enforce permissions.')\n create_parser.add_argument('-k', '--key', type=str, help=\n 'specify the signing key for the resulting batches')\n create_parser.add_argument('--wait', type=int, default=15, help=\n 'set time, in seconds, to wait for a role to commit when submitting to the REST API.'\n )\n create_target_group = create_parser.add_mutually_exclusive_group()\n create_target_group.add_argument('-o', '--output', type=str, help=\n 'specify the output filename for the resulting batches')\n create_target_group.add_argument('--url', type=str, help=\n \"the URL of a validator's REST API\", default='http://localhost:8008')\n create_parser.add_argument('name', type=str, help='name of the role')\n create_parser.add_argument('policy', type=str, help=\n 'identify policy that role will be restricted to')\n list_parser = role_parsers.add_parser('list', help=\n 'Lists the current keys and values of roles', description=\n 'Displays the roles that are currently set in state.')\n list_parser.add_argument('--url', type=str, help=\n \"identify the URL of a validator's REST API\", default=\n 'http://localhost:8008')\n list_parser.add_argument('--format', default='default', choices=[\n 'default', 'csv', 'json', 'yaml'], help='choose the output format')\n",
"role": "user"
},
{
"content": "add_identity_parser",
"role": "assistant"
}
] |
def x(args):
if args.subcommand == 'policy' and args.policy_cmd == 'create':
_do_identity_policy_create(args)
elif args.subcommand == 'policy' and args.policy_cmd == 'list':
_do_identity_policy_list(args)
elif args.subcommand == 'role' and args.role_cmd == 'create':
_do_identity_role_create(args)
elif args.subcommand == 'role' and args.role_cmd == 'list':
_do_identity_role_list(args)
else:
raise AssertionError('"{}" is not a valid subcommand of "identity"'
.format(args.subcommand))
| do_identity | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(args):\n if args.subcommand == 'policy' and args.policy_cmd == 'create':\n _do_identity_policy_create(args)\n elif args.subcommand == 'policy' and args.policy_cmd == 'list':\n _do_identity_policy_list(args)\n elif args.subcommand == 'role' and args.role_cmd == 'create':\n _do_identity_role_create(args)\n elif args.subcommand == 'role' and args.role_cmd == 'list':\n _do_identity_role_list(args)\n else:\n raise AssertionError('\"{}\" is not a valid subcommand of \"identity\"'\n .format(args.subcommand))\n",
"role": "user"
},
{
"content": "do_identity",
"role": "assistant"
}
] |
def x(args):
signer = _read_signer(args.key)
txns = [_create_policy_txn(signer, args.name, args.rule)]
batch = _create_batch(signer, txns)
batch_list = BatchList(batches=[batch])
if args.output is not None:
try:
with open(args.output, 'wb') as batch_file:
batch_file.write(batch_list.SerializeToString())
except IOError as e:
raise CliException('Unable to write to batch file: {}'.format(
str(e)))
elif args.url is not None:
rest_client = RestClient(args.url)
rest_client.send_batches(batch_list)
if args.wait and args.wait > 0:
batch_id = batch.header_signature
wait_time = 0
start_time = time.time()
while wait_time < args.wait:
statuses = rest_client.get_statuses([batch_id], args.wait -
int(wait_time))
wait_time = time.time() - start_time
if statuses[0]['status'] == 'COMMITTED':
print('Policy committed in {:.6} sec'.format(wait_time))
return
time.sleep(0.2)
print('Wait timed out! Policy was not committed...')
print('{:128.128} {}'.format(batch_id, statuses[0]['status']))
exit(1)
else:
raise AssertionError('No target for create set.')
| do_identity_policy_create | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(args):\n signer = _read_signer(args.key)\n txns = [_create_policy_txn(signer, args.name, args.rule)]\n batch = _create_batch(signer, txns)\n batch_list = BatchList(batches=[batch])\n if args.output is not None:\n try:\n with open(args.output, 'wb') as batch_file:\n batch_file.write(batch_list.SerializeToString())\n except IOError as e:\n raise CliException('Unable to write to batch file: {}'.format(\n str(e)))\n elif args.url is not None:\n rest_client = RestClient(args.url)\n rest_client.send_batches(batch_list)\n if args.wait and args.wait > 0:\n batch_id = batch.header_signature\n wait_time = 0\n start_time = time.time()\n while wait_time < args.wait:\n statuses = rest_client.get_statuses([batch_id], args.wait -\n int(wait_time))\n wait_time = time.time() - start_time\n if statuses[0]['status'] == 'COMMITTED':\n print('Policy committed in {:.6} sec'.format(wait_time))\n return\n time.sleep(0.2)\n print('Wait timed out! Policy was not committed...')\n print('{:128.128} {}'.format(batch_id, statuses[0]['status']))\n exit(1)\n else:\n raise AssertionError('No target for create set.')\n",
"role": "user"
},
{
"content": "do_identity_policy_create",
"role": "assistant"
}
] |
def x(args):
rest_client = RestClient(args.url)
state = rest_client.list_state(subtree=IDENTITY_NAMESPACE + _ROLE_PREFIX)
head = state['head']
state_values = state['data']
printable_roles = []
for state_value in state_values:
role_list = RoleList()
decoded = b64decode(state_value['data'])
role_list.ParseFromString(decoded)
for role in role_list.roles:
printable_roles.append(role)
printable_roles.sort(key=lambda r: r.name)
if args.format == 'default':
tty_width = tty.width()
for role in printable_roles:
width = tty_width - len(role.name) - 3
width = width if width > _MIN_PRINT_WIDTH else _MIN_PRINT_WIDTH
value = role.policy_name[:width] + '...' if len(role.policy_name
) > width else role.policy_name
print('{}: {}'.format(role.name, value))
elif args.format == 'csv':
try:
writer = csv.writer(sys.stdout, quoting=csv.QUOTE_ALL)
writer.writerow(['KEY', 'VALUE'])
for role in printable_roles:
writer.writerow([role.name, role.policy_name])
except csv.Error:
raise CliException('Error writing CSV')
elif args.format == 'json' or args.format == 'yaml':
roles_snapshot = {'head': head, 'roles': {role.name: role.
policy_name for role in printable_roles}}
if args.format == 'json':
print(json.dumps(roles_snapshot, indent=2, sort_keys=True))
else:
print(yaml.dump(roles_snapshot, default_flow_style=False)[0:-1])
else:
raise AssertionError('Unknown format {}'.format(args.format))
| do_identity_role_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(args):\n rest_client = RestClient(args.url)\n state = rest_client.list_state(subtree=IDENTITY_NAMESPACE + _ROLE_PREFIX)\n head = state['head']\n state_values = state['data']\n printable_roles = []\n for state_value in state_values:\n role_list = RoleList()\n decoded = b64decode(state_value['data'])\n role_list.ParseFromString(decoded)\n for role in role_list.roles:\n printable_roles.append(role)\n printable_roles.sort(key=lambda r: r.name)\n if args.format == 'default':\n tty_width = tty.width()\n for role in printable_roles:\n width = tty_width - len(role.name) - 3\n width = width if width > _MIN_PRINT_WIDTH else _MIN_PRINT_WIDTH\n value = role.policy_name[:width] + '...' if len(role.policy_name\n ) > width else role.policy_name\n print('{}: {}'.format(role.name, value))\n elif args.format == 'csv':\n try:\n writer = csv.writer(sys.stdout, quoting=csv.QUOTE_ALL)\n writer.writerow(['KEY', 'VALUE'])\n for role in printable_roles:\n writer.writerow([role.name, role.policy_name])\n except csv.Error:\n raise CliException('Error writing CSV')\n elif args.format == 'json' or args.format == 'yaml':\n roles_snapshot = {'head': head, 'roles': {role.name: role.\n policy_name for role in printable_roles}}\n if args.format == 'json':\n print(json.dumps(roles_snapshot, indent=2, sort_keys=True))\n else:\n print(yaml.dump(roles_snapshot, default_flow_style=False)[0:-1])\n else:\n raise AssertionError('Unknown format {}'.format(args.format))\n",
"role": "user"
},
{
"content": "do_identity_role_list",
"role": "assistant"
}
] |
def x(key_filename):
filename = key_filename
if filename is None:
filename = os.path.join(os.path.expanduser('~'), '.sawtooth',
'keys', getpass.getuser() + '.priv')
try:
with open(filename, 'r') as key_file:
signing_key = key_file.read().strip()
except IOError as e:
raise CliException('Unable to read key file: {}'.format(str(e)))
try:
private_key = Secp256k1PrivateKey.from_hex(signing_key)
except ParseError as e:
raise CliException('Unable to read key in file: {}'.format(str(e)))
context = create_context('secp256k1')
crypto_factory = CryptoFactory(context)
return crypto_factory.new_signer(private_key)
| read_signer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_filename):\n filename = key_filename\n if filename is None:\n filename = os.path.join(os.path.expanduser('~'), '.sawtooth',\n 'keys', getpass.getuser() + '.priv')\n try:\n with open(filename, 'r') as key_file:\n signing_key = key_file.read().strip()\n except IOError as e:\n raise CliException('Unable to read key file: {}'.format(str(e)))\n try:\n private_key = Secp256k1PrivateKey.from_hex(signing_key)\n except ParseError as e:\n raise CliException('Unable to read key in file: {}'.format(str(e)))\n context = create_context('secp256k1')\n crypto_factory = CryptoFactory(context)\n return crypto_factory.new_signer(private_key)\n",
"role": "user"
},
{
"content": "read_signer",
"role": "assistant"
}
] |
def x(signer, transactions):
txn_ids = [txn.header_signature for txn in transactions]
batch_header = BatchHeader(signer_public_key=signer.get_public_key().
as_hex(), transaction_ids=txn_ids).SerializeToString()
return Batch(header=batch_header, header_signature=signer.sign(
batch_header), transactions=transactions)
| create_batch | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(signer, transactions):\n txn_ids = [txn.header_signature for txn in transactions]\n batch_header = BatchHeader(signer_public_key=signer.get_public_key().\n as_hex(), transaction_ids=txn_ids).SerializeToString()\n return Batch(header=batch_header, header_signature=signer.sign(\n batch_header), transactions=transactions)\n",
"role": "user"
},
{
"content": "create_batch",
"role": "assistant"
}
] |
def x(self, state_hash, base_contexts, inputs, outputs):
for address in inputs:
if not self.namespace_is_valid(address):
raise CreateContextException(
'Address or namespace {} listed in inputs is not valid'.
format(address))
for address in outputs:
if not self.namespace_is_valid(address):
raise CreateContextException(
'Address or namespace {} listed in outputs is not valid'.
format(address))
addresses_to_find = [add for add in inputs if len(add) == 70]
address_values, reads = self._find_address_values_in_chain(base_contexts
=base_contexts, addresses_to_find=addresses_to_find)
context = ExecutionContext(state_hash=state_hash, read_list=inputs,
write_list=outputs, base_context_ids=base_contexts)
contexts_asked_not_found = [cid for cid in base_contexts if cid not in
self._contexts]
if contexts_asked_not_found:
raise KeyError(
'Basing a new context off of context ids {} that are not in context manager'
.format(contexts_asked_not_found))
context.create_initial(address_values)
self._contexts[context.session_id] = context
if reads:
context.create_prefetch(reads)
self._address_queue.put_nowait((context.session_id, state_hash, reads))
return context.session_id
| create_context | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state_hash, base_contexts, inputs, outputs):\n for address in inputs:\n if not self.namespace_is_valid(address):\n raise CreateContextException(\n 'Address or namespace {} listed in inputs is not valid'.\n format(address))\n for address in outputs:\n if not self.namespace_is_valid(address):\n raise CreateContextException(\n 'Address or namespace {} listed in outputs is not valid'.\n format(address))\n addresses_to_find = [add for add in inputs if len(add) == 70]\n address_values, reads = self._find_address_values_in_chain(base_contexts\n =base_contexts, addresses_to_find=addresses_to_find)\n context = ExecutionContext(state_hash=state_hash, read_list=inputs,\n write_list=outputs, base_context_ids=base_contexts)\n contexts_asked_not_found = [cid for cid in base_contexts if cid not in\n self._contexts]\n if contexts_asked_not_found:\n raise KeyError(\n 'Basing a new context off of context ids {} that are not in context manager'\n .format(contexts_asked_not_found))\n context.create_initial(address_values)\n self._contexts[context.session_id] = context\n if reads:\n context.create_prefetch(reads)\n self._address_queue.put_nowait((context.session_id, state_hash, reads))\n return context.session_id\n",
"role": "user"
},
{
"content": "create_context",
"role": "assistant"
}
] |
def x(self, base_contexts, addresses_to_find):
contexts_in_chain = deque()
contexts_in_chain.extend(base_contexts)
reads = list(addresses_to_find)
address_values = []
context_ids_already_searched = []
context_ids_already_searched.extend(base_contexts)
while reads:
try:
current_c_id = contexts_in_chain.popleft()
except IndexError:
break
current_context = self._contexts[current_c_id]
deleted_addresses = current_context.get_if_deleted(reads)
for address in deleted_addresses:
if address is not None:
address_values.append((address, None))
reads = list(set(reads) - set(deleted_addresses))
values = current_context.get_if_set(reads)
addresses_not_found = []
for address, value in zip(reads, values):
if value is not None:
address_values.append((address, value))
else:
addresses_not_found.append(address)
reads = addresses_not_found
addresses_in_inputs = [address for address in reads if address in
current_context]
values = current_context.get_if_not_set(addresses_in_inputs)
address_values.extend(list(zip(addresses_in_inputs, values)))
for add in addresses_in_inputs:
reads.remove(add)
for c_id in current_context.base_contexts:
if c_id not in context_ids_already_searched:
contexts_in_chain.append(c_id)
context_ids_already_searched.append(c_id)
return address_values, reads
| find_address_values_in_chain | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, base_contexts, addresses_to_find):\n contexts_in_chain = deque()\n contexts_in_chain.extend(base_contexts)\n reads = list(addresses_to_find)\n address_values = []\n context_ids_already_searched = []\n context_ids_already_searched.extend(base_contexts)\n while reads:\n try:\n current_c_id = contexts_in_chain.popleft()\n except IndexError:\n break\n current_context = self._contexts[current_c_id]\n deleted_addresses = current_context.get_if_deleted(reads)\n for address in deleted_addresses:\n if address is not None:\n address_values.append((address, None))\n reads = list(set(reads) - set(deleted_addresses))\n values = current_context.get_if_set(reads)\n addresses_not_found = []\n for address, value in zip(reads, values):\n if value is not None:\n address_values.append((address, value))\n else:\n addresses_not_found.append(address)\n reads = addresses_not_found\n addresses_in_inputs = [address for address in reads if address in\n current_context]\n values = current_context.get_if_not_set(addresses_in_inputs)\n address_values.extend(list(zip(addresses_in_inputs, values)))\n for add in addresses_in_inputs:\n reads.remove(add)\n for c_id in current_context.base_contexts:\n if c_id not in context_ids_already_searched:\n contexts_in_chain.append(c_id)\n context_ids_already_searched.append(c_id)\n return address_values, reads\n",
"role": "user"
},
{
"content": "find_address_values_in_chain",
"role": "assistant"
}
] |
def x(self, context_id_list):
for c_id in context_id_list:
if c_id in self._contexts:
del self._contexts[c_id]
| delete_contexts | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context_id_list):\n for c_id in context_id_list:\n if c_id in self._contexts:\n del self._contexts[c_id]\n",
"role": "user"
},
{
"content": "delete_contexts",
"role": "assistant"
}
] |
def x(self, context_id, address_list):
if context_id not in self._contexts:
return False
context = self._contexts[context_id]
for add in address_list:
if not self.address_is_valid(address=add):
raise AuthorizationException(address=add)
context.delete_direct(address_list)
return True
| delete | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context_id, address_list):\n if context_id not in self._contexts:\n return False\n context = self._contexts[context_id]\n for add in address_list:\n if not self.address_is_valid(address=add):\n raise AuthorizationException(address=add)\n context.delete_direct(address_list)\n return True\n",
"role": "user"
},
{
"content": "delete",
"role": "assistant"
}
] |
def x(self, context_id, address_list):
if context_id not in self._contexts:
return []
for add in address_list:
if not self.address_is_valid(address=add):
raise AuthorizationException(address=add)
context = self._contexts[context_id]
addresses_in_ctx = [add for add in address_list if add in context]
addresses_not_in_ctx = list(set(address_list) - set(addresses_in_ctx))
values = context.get(addresses_in_ctx)
values_list = list(zip(addresses_in_ctx, values))
if addresses_not_in_ctx:
for address in addresses_not_in_ctx:
context.validate_read(address)
try:
address_values, reads = self._find_address_values_in_chain(
base_contexts=[context_id], addresses_to_find=
addresses_not_in_ctx)
except KeyError:
return []
values_list.extend(address_values)
if reads:
tree = MerkleDatabase(self._database, context.merkle_root)
add_values = []
for add in reads:
value = None
try:
value = tree.get(add)
except KeyError:
pass
add_values.append((add, value))
values_list.extend(add_values)
values_list.sort(key=lambda x: address_list.index(x[0]))
return values_list
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context_id, address_list):\n if context_id not in self._contexts:\n return []\n for add in address_list:\n if not self.address_is_valid(address=add):\n raise AuthorizationException(address=add)\n context = self._contexts[context_id]\n addresses_in_ctx = [add for add in address_list if add in context]\n addresses_not_in_ctx = list(set(address_list) - set(addresses_in_ctx))\n values = context.get(addresses_in_ctx)\n values_list = list(zip(addresses_in_ctx, values))\n if addresses_not_in_ctx:\n for address in addresses_not_in_ctx:\n context.validate_read(address)\n try:\n address_values, reads = self._find_address_values_in_chain(\n base_contexts=[context_id], addresses_to_find=\n addresses_not_in_ctx)\n except KeyError:\n return []\n values_list.extend(address_values)\n if reads:\n tree = MerkleDatabase(self._database, context.merkle_root)\n add_values = []\n for add in reads:\n value = None\n try:\n value = tree.get(add)\n except KeyError:\n pass\n add_values.append((add, value))\n values_list.extend(add_values)\n values_list.sort(key=lambda x: address_list.index(x[0]))\n return values_list\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, context_id, address_value_list):
if context_id not in self._contexts:
LOGGER.warning('Context_id not in contexts, %s', context_id)
return False
context = self._contexts.get(context_id)
add_value_dict = {}
for d in address_value_list:
for add, val in d.items():
if not self.address_is_valid(address=add):
raise AuthorizationException(address=add)
add_value_dict[add] = val
context.set_direct(add_value_dict)
return True
| set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context_id, address_value_list):\n if context_id not in self._contexts:\n LOGGER.warning('Context_id not in contexts, %s', context_id)\n return False\n context = self._contexts.get(context_id)\n add_value_dict = {}\n for d in address_value_list:\n for add, val in d.items():\n if not self.address_is_valid(address=add):\n raise AuthorizationException(address=add)\n add_value_dict[add] = val\n context.set_direct(add_value_dict)\n return True\n",
"role": "user"
},
{
"content": "set",
"role": "assistant"
}
] |
def x(self, context_id, data):
if context_id not in self._contexts:
LOGGER.warning('Context_id not in contexts, %s', context_id)
return False
context = self._contexts.get(context_id)
context.add_execution_data(data)
return True
| add_execution_data | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context_id, data):\n if context_id not in self._contexts:\n LOGGER.warning('Context_id not in contexts, %s', context_id)\n return False\n context = self._contexts.get(context_id)\n context.add_execution_data(data)\n return True\n",
"role": "user"
},
{
"content": "add_execution_data",
"role": "assistant"
}
] |
def x(self, context_id, event):
if context_id not in self._contexts:
LOGGER.warning('Context_id not in contexts, %s', context_id)
return False
context = self._contexts.get(context_id)
context.add_execution_event(event)
return True
| add_execution_event | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, context_id, event):\n if context_id not in self._contexts:\n LOGGER.warning('Context_id not in contexts, %s', context_id)\n return False\n context = self._contexts.get(context_id)\n context.add_execution_event(event)\n return True\n",
"role": "user"
},
{
"content": "add_execution_event",
"role": "assistant"
}
] |
def x(self, puts, deletes):
with self._lmdb.begin(write=True, buffers=True) as txn:
cursor = txn.cursor(self._main_db)
for key in deletes:
if not cursor.set_key(key.encode()):
continue
value = self._deserializer(bytes(cursor.value()))
cursor.delete()
for index_db, index_key_fn in self._indexes.values():
index_keys = index_key_fn(value)
index_cursor = txn.cursor(index_db)
for idx_key in index_keys:
if index_cursor.set_key(idx_key):
index_cursor.delete()
for key, value in puts:
packed = self._serializer(value)
cursor.put(key.encode(), packed, overwrite=True)
for index_db, index_key_fn in self._indexes.values():
index_keys = index_key_fn(value)
index_cursor = txn.cursor(index_db)
for idx_key in index_keys:
index_cursor.put(idx_key, key.encode())
self.sync()
| update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, puts, deletes):\n with self._lmdb.begin(write=True, buffers=True) as txn:\n cursor = txn.cursor(self._main_db)\n for key in deletes:\n if not cursor.set_key(key.encode()):\n continue\n value = self._deserializer(bytes(cursor.value()))\n cursor.delete()\n for index_db, index_key_fn in self._indexes.values():\n index_keys = index_key_fn(value)\n index_cursor = txn.cursor(index_db)\n for idx_key in index_keys:\n if index_cursor.set_key(idx_key):\n index_cursor.delete()\n for key, value in puts:\n packed = self._serializer(value)\n cursor.put(key.encode(), packed, overwrite=True)\n for index_db, index_key_fn in self._indexes.values():\n index_keys = index_key_fn(value)\n index_cursor = txn.cursor(index_db)\n for idx_key in index_keys:\n index_cursor.put(idx_key, key.encode())\n self.sync()\n",
"role": "user"
},
{
"content": "update",
"role": "assistant"
}
] |
def x(self, index=None):
if index is not None and index not in self._indexes:
raise ValueError('Index {} does not exist'.format(index))
db = self._indexes[index][0] if index else self._main_db
with self._lmdb.begin(db=db) as txn:
return [key.decode() for key in txn.cursor().iternext(keys=True,
values=False)]
| keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, index=None):\n if index is not None and index not in self._indexes:\n raise ValueError('Index {} does not exist'.format(index))\n db = self._indexes[index][0] if index else self._main_db\n with self._lmdb.begin(db=db) as txn:\n return [key.decode() for key in txn.cursor().iternext(keys=True,\n values=False)]\n",
"role": "user"
},
{
"content": "keys",
"role": "assistant"
}
] |
def x(self, transactions):
txn_signatures = [txn.header_signature for txn in transactions]
header = BatchHeader(signer_public_key=self._identity_signer.
get_public_key().as_hex(), transaction_ids=txn_signatures
).SerializeToString()
signature = self._identity_signer.sign(header)
batch = Batch(header=header, transactions=transactions,
header_signature=signature)
self._batch_sender.send(batch)
| send | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, transactions):\n txn_signatures = [txn.header_signature for txn in transactions]\n header = BatchHeader(signer_public_key=self._identity_signer.\n get_public_key().as_hex(), transaction_ids=txn_signatures\n ).SerializeToString()\n signature = self._identity_signer.sign(header)\n batch = Batch(header=header, transactions=transactions,\n header_signature=signature)\n self._batch_sender.send(batch)\n",
"role": "user"
},
{
"content": "send",
"role": "assistant"
}
] |
def x():
base_parser = ArgumentParser(add_help=False)
base_parser.add_argument('urls', type=str, nargs='+', help=
"The URLs of the validator's REST APIs of interest, separated by commas or spaces. (no default)"
)
base_parser.add_argument('--users', type=str, action='append', metavar=
'USERNAME[:PASSWORD]', help=
'Specify the users to authorize requests, in the same order as the URLs, separate by commas. Passing empty strings between commas is supported.'
)
return base_parser
| base_multinode_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('urls', type=str, nargs='+', help=\n \"The URLs of the validator's REST APIs of interest, separated by commas or spaces. (no default)\"\n )\n base_parser.add_argument('--users', type=str, action='append', metavar=\n 'USERNAME[:PASSWORD]', help=\n 'Specify the users to authorize requests, in the same order as the URLs, separate by commas. Passing empty strings between commas is supported.'\n )\n return base_parser\n",
"role": "user"
},
{
"content": "base_multinode_parser",
"role": "assistant"
}
] |
def x():
base_parser = ArgumentParser(add_help=False)
base_parser.add_argument('--url', type=str, help=
"identify the URL of the validator's REST API (default: http://localhost:8008)"
)
base_parser.add_argument('-u', '--user', type=str, metavar=
'USERNAME[:PASSWORD]', help='specify the user to authorize request')
return base_parser
| base_http_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('--url', type=str, help=\n \"identify the URL of the validator's REST API (default: http://localhost:8008)\"\n )\n base_parser.add_argument('-u', '--user', type=str, metavar=\n 'USERNAME[:PASSWORD]', help='specify the user to authorize request')\n return base_parser\n",
"role": "user"
},
{
"content": "base_http_parser",
"role": "assistant"
}
] |
def x():
base_parser = ArgumentParser(add_help=False)
base_parser.add_argument('-F', '--format', action='store', default=
'default', choices=['csv', 'json', 'yaml', 'default'], help=
'choose the output format')
return base_parser
| base_list_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('-F', '--format', action='store', default=\n 'default', choices=['csv', 'json', 'yaml', 'default'], help=\n 'choose the output format')\n return base_parser\n",
"role": "user"
},
{
"content": "base_list_parser",
"role": "assistant"
}
] |
def x():
base_parser = ArgumentParser(add_help=False)
base_parser.add_argument('-k', '--key', type=str, help=
'show a single property from the block or header')
base_parser.add_argument('-F', '--format', action='store', default=
'yaml', choices=['yaml', 'json'], help=
'choose the output format (default: yaml)')
return base_parser
| base_show_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('-k', '--key', type=str, help=\n 'show a single property from the block or header')\n base_parser.add_argument('-F', '--format', action='store', default=\n 'yaml', choices=['yaml', 'json'], help=\n 'choose the output format (default: yaml)')\n return base_parser\n",
"role": "user"
},
{
"content": "base_show_parser",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.