source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(self, statuses): return all(s != ClientBatchStatus.PENDING for s in statuses.values())
has_no_pendings
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, statuses):\n return all(s != ClientBatchStatus.PENDING for s in statuses.values())\n", "role": "user" }, { "content": "has_no_pendings", "role": "assistant" } ]
def x(self, addresses): with self._lock: results = [] for add in addresses: self.validate_read(add) results.append(self._get(add)) return results
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n self.validate_read(add)\n results.append(self._get(add))\n return results\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, addresses): with self._lock: results = [] for add in addresses: results.append(self._get_if_set(add)) return results
get_if_set
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n results.append(self._get_if_set(add))\n return results\n", "role": "user" }, { "content": "get_if_set", "role": "assistant" } ]
def x(self, addresses): with self._lock: results = [] for add in addresses: results.append(self._get_if_deleted(add)) return results
get_if_deleted
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n results.append(self._get_if_deleted(add))\n return results\n", "role": "user" }, { "content": "get_if_deleted", "role": "assistant" } ]
def x(self, addresses): with self._lock: results = [] for add in addresses: results.append(self._get_if_not_set(add)) return results
get_if_not_set
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, addresses):\n with self._lock:\n results = []\n for add in addresses:\n results.append(self._get_if_not_set(add))\n return results\n", "role": "user" }, { "content": "get_if_not_set", "role": "assistant" } ]
def x(self): with self._lock: results = {} for add, fut in self._state.items(): if self._contains_and_set(add): results[add] = fut.result() return results
get_all_if_set
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n with self._lock:\n results = {}\n for add, fut in self._state.items():\n if self._contains_and_set(add):\n results[add] = fut.result()\n return results\n", "role": "user" }, { "content": "get_all_if_set", "role": "assistant" } ]
def x(self): with self._lock: results = {} for add, fut in self._state.items(): if self._contains_and_deleted(add): results[add] = fut.result() return results
get_all_if_deleted
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n with self._lock:\n results = {}\n for add, fut in self._state.items():\n if self._contains_and_deleted(add):\n results[add] = fut.result()\n return results\n", "role": "user" }, { "content": "get_all_if_deleted", "role": "assistant" } ]
def x(self, addresses): with self._lock: for add in addresses: self._state[add] = _ContextFuture(address=add, wait_for_tree=True)
create_prefetch
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, addresses):\n with self._lock:\n for add in addresses:\n self._state[add] = _ContextFuture(address=add, wait_for_tree=True)\n", "role": "user" }, { "content": "create_prefetch", "role": "assistant" } ]
def x(self, address_values): with self._lock: for add, val in address_values: self._state[add] = _ContextFuture(address=add, result=val)
create_initial
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, address_values):\n with self._lock:\n for add, val in address_values:\n self._state[add] = _ContextFuture(address=add, result=val)\n", "role": "user" }, { "content": "create_initial", "role": "assistant" } ]
def x(self, address_value_dict): for address, value in address_value_dict.items(): if address in self._state: self._state[address].set_result(result=value, from_tree=True)
set_from_tree
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, address_value_dict):\n for address, value in address_value_dict.items():\n if address in self._state:\n self._state[address].set_result(result=value, from_tree=True)\n", "role": "user" }, { "content": "set_from_tree", "role": "assistant" } ]
def x(self, addresses): with self._lock: for address in addresses: self._validate_write(address) if address in self._state: self._state[address].set_deleted() else: fut = _ContextFuture(address=address) self._state[address] = fut fut.set_deleted()
delete_direct
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, addresses):\n with self._lock:\n for address in addresses:\n self._validate_write(address)\n if address in self._state:\n self._state[address].set_deleted()\n else:\n fut = _ContextFuture(address=address)\n self._state[address] = fut\n fut.set_deleted()\n", "role": "user" }, { "content": "delete_direct", "role": "assistant" } ]
def x(self, address_value_dict): with self._lock: for address, value in address_value_dict.items(): self._validate_write(address) if address in self._state: self._state[address].set_result(result=value) else: fut = _ContextFuture(address=address) self._state[address] = fut fut.set_result(result=value)
set_direct
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, address_value_dict):\n with self._lock:\n for address, value in address_value_dict.items():\n self._validate_write(address)\n if address in self._state:\n self._state[address].set_result(result=value)\n else:\n fut = _ContextFuture(address=address)\n self._state[address] = fut\n fut.set_result(result=value)\n", "role": "user" }, { "content": "set_direct", "role": "assistant" } ]
def x(self, address): if not any(address.startswith(ns) for ns in self._write_list): raise AuthorizationException(address=address)
validate_write
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, address):\n if not any(address.startswith(ns) for ns in self._write_list):\n raise AuthorizationException(address=address)\n", "role": "user" }, { "content": "validate_write", "role": "assistant" } ]
def x(self, address): if not any(address.startswith(ns) for ns in self._read_list): raise AuthorizationException(address=address)
validate_read
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, address):\n if not any(address.startswith(ns) for ns in self._read_list):\n raise AuthorizationException(address=address)\n", "role": "user" }, { "content": "validate_read", "role": "assistant" } ]
def x(self): if self._read_only: return self._result with self._condition: if self._wait_for_tree and not self._result_set_in_context: self._condition.wait_for(lambda : self._tree_has_set or self. _result_set_in_context) return self._result
result
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self._read_only:\n return self._result\n with self._condition:\n if self._wait_for_tree and not self._result_set_in_context:\n self._condition.wait_for(lambda : self._tree_has_set or self.\n _result_set_in_context)\n return self._result\n", "role": "user" }, { "content": "result", "role": "assistant" } ]
def x(self, result, from_tree=False): if self._read_only: if not from_tree: LOGGER.warning('Tried to set address %s on a read-only context.', self.address) return with self._condition: if self._read_only: if not from_tree: LOGGER.warning( 'Tried to set address %s on a read-only context.', self .address) return if from_tree: if not self._result_set_in_context: self._result = result self._tree_has_set = True else: self._result = result self._result_set_in_context = True self._deleted = False self._condition.notify_all()
set_result
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, result, from_tree=False):\n if self._read_only:\n if not from_tree:\n LOGGER.warning('Tried to set address %s on a read-only context.',\n self.address)\n return\n with self._condition:\n if self._read_only:\n if not from_tree:\n LOGGER.warning(\n 'Tried to set address %s on a read-only context.', self\n .address)\n return\n if from_tree:\n if not self._result_set_in_context:\n self._result = result\n self._tree_has_set = True\n else:\n self._result = result\n self._result_set_in_context = True\n self._deleted = False\n self._condition.notify_all()\n", "role": "user" }, { "content": "set_result", "role": "assistant" } ]
def x(global_state_db, blockstore, bind_component, scheduler_type): state_view_factory = StateViewFactory(global_state_db) start_block, prev_state_root = search_for_present_state_root(blockstore, state_view_factory) if start_block is None: LOGGER.info( "Skipping state verification: chain head's state root is present") return LOGGER.info('Recomputing missing state from block %s with %s scheduler', start_block, scheduler_type) component_thread_pool = InstrumentedThreadPoolExecutor(max_workers=10, name='Component') component_dispatcher = Dispatcher() component_service = Interconnect(bind_component, component_dispatcher, secured=False, heartbeat=False, max_incoming_connections=20, monitor=True, max_future_callback_workers=10) context_manager = ContextManager(global_state_db) transaction_executor = TransactionExecutor(service=component_service, context_manager=context_manager, settings_view_factory= SettingsViewFactory(state_view_factory), scheduler_type= scheduler_type, invalid_observers=[]) component_service.set_check_connections(transaction_executor. check_connections) component_dispatcher.add_handler(validator_pb2.Message. TP_RECEIPT_ADD_DATA_REQUEST, tp_state_handlers. TpReceiptAddDataHandler(context_manager), component_thread_pool) component_dispatcher.add_handler(validator_pb2.Message. TP_EVENT_ADD_REQUEST, tp_state_handlers.TpEventAddHandler( context_manager), component_thread_pool) component_dispatcher.add_handler(validator_pb2.Message. TP_STATE_DELETE_REQUEST, tp_state_handlers.TpStateDeleteHandler( context_manager), component_thread_pool) component_dispatcher.add_handler(validator_pb2.Message. TP_STATE_GET_REQUEST, tp_state_handlers.TpStateGetHandler( context_manager), component_thread_pool) component_dispatcher.add_handler(validator_pb2.Message. TP_STATE_SET_REQUEST, tp_state_handlers.TpStateSetHandler( context_manager), component_thread_pool) component_dispatcher.add_handler(validator_pb2.Message. TP_REGISTER_REQUEST, processor_handlers.ProcessorRegisterHandler( transaction_executor.processor_manager), component_thread_pool) component_dispatcher.add_handler(validator_pb2.Message. TP_UNREGISTER_REQUEST, processor_handlers. ProcessorUnRegisterHandler(transaction_executor.processor_manager), component_thread_pool) component_dispatcher.start() component_service.start() process_blocks(initial_state_root=prev_state_root, blocks=blockstore. get_block_iter(start_block=start_block, reverse=False), transaction_executor=transaction_executor, context_manager= context_manager, state_view_factory=state_view_factory) component_dispatcher.stop() component_service.stop() component_thread_pool.shutdown(wait=True) transaction_executor.stop() context_manager.stop()
verify_state
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(global_state_db, blockstore, bind_component, scheduler_type):\n state_view_factory = StateViewFactory(global_state_db)\n start_block, prev_state_root = search_for_present_state_root(blockstore,\n state_view_factory)\n if start_block is None:\n LOGGER.info(\n \"Skipping state verification: chain head's state root is present\")\n return\n LOGGER.info('Recomputing missing state from block %s with %s scheduler',\n start_block, scheduler_type)\n component_thread_pool = InstrumentedThreadPoolExecutor(max_workers=10,\n name='Component')\n component_dispatcher = Dispatcher()\n component_service = Interconnect(bind_component, component_dispatcher,\n secured=False, heartbeat=False, max_incoming_connections=20,\n monitor=True, max_future_callback_workers=10)\n context_manager = ContextManager(global_state_db)\n transaction_executor = TransactionExecutor(service=component_service,\n context_manager=context_manager, settings_view_factory=\n SettingsViewFactory(state_view_factory), scheduler_type=\n scheduler_type, invalid_observers=[])\n component_service.set_check_connections(transaction_executor.\n check_connections)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_RECEIPT_ADD_DATA_REQUEST, tp_state_handlers.\n TpReceiptAddDataHandler(context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_EVENT_ADD_REQUEST, tp_state_handlers.TpEventAddHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_STATE_DELETE_REQUEST, tp_state_handlers.TpStateDeleteHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_STATE_GET_REQUEST, tp_state_handlers.TpStateGetHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_STATE_SET_REQUEST, tp_state_handlers.TpStateSetHandler(\n context_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_REGISTER_REQUEST, processor_handlers.ProcessorRegisterHandler(\n transaction_executor.processor_manager), component_thread_pool)\n component_dispatcher.add_handler(validator_pb2.Message.\n TP_UNREGISTER_REQUEST, processor_handlers.\n ProcessorUnRegisterHandler(transaction_executor.processor_manager),\n component_thread_pool)\n component_dispatcher.start()\n component_service.start()\n process_blocks(initial_state_root=prev_state_root, blocks=blockstore.\n get_block_iter(start_block=start_block, reverse=False),\n transaction_executor=transaction_executor, context_manager=\n context_manager, state_view_factory=state_view_factory)\n component_dispatcher.stop()\n component_service.stop()\n component_thread_pool.shutdown(wait=True)\n transaction_executor.stop()\n context_manager.stop()\n", "role": "user" }, { "content": "verify_state", "role": "assistant" } ]
def x(blockstore, state_view_factory): block = blockstore.chain_head if block is None: return None, None if state_db_has_root(state_view_factory, block.state_root_hash): return None, None prev_state_root = INIT_ROOT_KEY for block in blockstore.get_block_iter(reverse=False): if not state_db_has_root(state_view_factory, block.state_root_hash): return block, prev_state_root prev_state_root = block.state_root_hash raise ExecutionError( 'Chain head state both missing but all blocks had state root present')
search_for_present_state_root
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(blockstore, state_view_factory):\n block = blockstore.chain_head\n if block is None:\n return None, None\n if state_db_has_root(state_view_factory, block.state_root_hash):\n return None, None\n prev_state_root = INIT_ROOT_KEY\n for block in blockstore.get_block_iter(reverse=False):\n if not state_db_has_root(state_view_factory, block.state_root_hash):\n return block, prev_state_root\n prev_state_root = block.state_root_hash\n raise ExecutionError(\n 'Chain head state both missing but all blocks had state root present')\n", "role": "user" }, { "content": "search_for_present_state_root", "role": "assistant" } ]
def x(interfaces, endpoint): result = urlparse(endpoint) hostname = result.hostname if hostname is None: return False for interface in interfaces: if interface == hostname: return False return True
is_valid_endpoint_host
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(interfaces, endpoint):\n result = urlparse(endpoint)\n hostname = result.hostname\n if hostname is None:\n return False\n for interface in interfaces:\n if interface == hostname:\n return False\n return True\n", "role": "user" }, { "content": "is_valid_endpoint_host", "role": "assistant" } ]
def x(self, connection_id, message_content): message = ConnectionRequest() message.ParseFromString(message_content) LOGGER.debug('got connect message from %s. sending ack', connection_id) interfaces = ['*', '.'.join(['0', '0', '0', '0'])] interfaces += netifaces.interfaces() if self.is_valid_endpoint_host(interfaces, message.endpoint) is False: LOGGER.warning( 'Connecting peer provided an invalid endpoint: %s; Ignoring connection request.' , message.endpoint) connection_response = ConnectionResponse(status=ConnectionResponse. ERROR) return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out= connection_response, message_type=validator_pb2.Message. AUTHORIZATION_CONNECTION_RESPONSE) LOGGER.debug('Endpoint of connecting node is %s', message.endpoint) self._network.update_connection_endpoint(connection_id, message.endpoint) roles = self._network.roles auth_type = roles.get('network') if auth_type == AuthorizationType.TRUST: role_type = ConnectionResponse.RoleEntry(role=RoleType.Value( 'NETWORK'), auth_type=ConnectionResponse.TRUST) connection_response = ConnectionResponse(roles=[role_type]) elif auth_type == AuthorizationType.CHALLENGE: role_type = ConnectionResponse.RoleEntry(role=RoleType.Value( 'NETWORK'), auth_type=ConnectionResponse.CHALLENGE) connection_response = ConnectionResponse(roles=[role_type]) else: LOGGER.warning( 'Network role is set to an unsupportedAuthorization Type: %s', auth_type) connection_response = ConnectionResponse(status=ConnectionResponse. ERROR) return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out= connection_response, message_type=validator_pb2.Message. AUTHORIZATION_CONNECTION_RESPONSE) try: is_outbound_connection = self._network.is_outbound_connection( connection_id) except KeyError: return HandlerResult(HandlerStatus.DROP) if not is_outbound_connection: if self._network.allow_inbound_connection(): LOGGER.debug('Allowing incoming connection: %s', connection_id) connection_response.status = connection_response.OK else: connection_response.status = connection_response.ERROR return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=connection_response, message_type=validator_pb2 .Message.AUTHORIZATION_CONNECTION_RESPONSE) if self._network.get_connection_status(connection_id) is not None: LOGGER.debug( 'Connection has already sent ConnectionRequest: %s, Remove connection.' , connection_id) connection_response.status = connection_response.ERROR return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out= connection_response, message_type=validator_pb2.Message. AUTHORIZATION_CONNECTION_RESPONSE) self._network.update_connection_status(connection_id, ConnectionStatus. CONNECTION_REQUEST) return HandlerResult(HandlerStatus.RETURN, message_out= connection_response, message_type=validator_pb2.Message. AUTHORIZATION_CONNECTION_RESPONSE)
handle
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, connection_id, message_content):\n message = ConnectionRequest()\n message.ParseFromString(message_content)\n LOGGER.debug('got connect message from %s. sending ack', connection_id)\n interfaces = ['*', '.'.join(['0', '0', '0', '0'])]\n interfaces += netifaces.interfaces()\n if self.is_valid_endpoint_host(interfaces, message.endpoint) is False:\n LOGGER.warning(\n 'Connecting peer provided an invalid endpoint: %s; Ignoring connection request.'\n , message.endpoint)\n connection_response = ConnectionResponse(status=ConnectionResponse.\n ERROR)\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n LOGGER.debug('Endpoint of connecting node is %s', message.endpoint)\n self._network.update_connection_endpoint(connection_id, message.endpoint)\n roles = self._network.roles\n auth_type = roles.get('network')\n if auth_type == AuthorizationType.TRUST:\n role_type = ConnectionResponse.RoleEntry(role=RoleType.Value(\n 'NETWORK'), auth_type=ConnectionResponse.TRUST)\n connection_response = ConnectionResponse(roles=[role_type])\n elif auth_type == AuthorizationType.CHALLENGE:\n role_type = ConnectionResponse.RoleEntry(role=RoleType.Value(\n 'NETWORK'), auth_type=ConnectionResponse.CHALLENGE)\n connection_response = ConnectionResponse(roles=[role_type])\n else:\n LOGGER.warning(\n 'Network role is set to an unsupportedAuthorization Type: %s',\n auth_type)\n connection_response = ConnectionResponse(status=ConnectionResponse.\n ERROR)\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n try:\n is_outbound_connection = self._network.is_outbound_connection(\n connection_id)\n except KeyError:\n return HandlerResult(HandlerStatus.DROP)\n if not is_outbound_connection:\n if self._network.allow_inbound_connection():\n LOGGER.debug('Allowing incoming connection: %s', connection_id)\n connection_response.status = connection_response.OK\n else:\n connection_response.status = connection_response.ERROR\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE,\n message_out=connection_response, message_type=validator_pb2\n .Message.AUTHORIZATION_CONNECTION_RESPONSE)\n if self._network.get_connection_status(connection_id) is not None:\n LOGGER.debug(\n 'Connection has already sent ConnectionRequest: %s, Remove connection.'\n , connection_id)\n connection_response.status = connection_response.ERROR\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n CONNECTION_REQUEST)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n connection_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CONNECTION_RESPONSE)\n", "role": "user" }, { "content": "handle", "role": "assistant" } ]
def x(self, connection_id, message_content): if self._network.get_connection_status(connection_id ) != ConnectionStatus.CONNECTION_REQUEST: LOGGER.debug( "Connection's previous message was not a ConnectionRequest, Remove connection to %s" , connection_id) violation = AuthorizationViolation(violation=RoleType.Value('NETWORK')) return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out= violation, message_type=validator_pb2.Message. AUTHORIZATION_VIOLATION) request = AuthorizationTrustRequest() request.ParseFromString(message_content) roles = self._network.roles for role in request.roles: if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'): permitted = False if 'network' in roles: permitted = self._permission_verifier.check_network_role( request.public_key) if not permitted: violation = AuthorizationViolation(violation=RoleType.Value ('NETWORK')) return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=violation, message_type=validator_pb2. Message.AUTHORIZATION_VIOLATION) self._network.update_connection_public_key(connection_id, request. public_key) if RoleType.Value('NETWORK') in request.roles: try: is_outbound_connection = self._network.is_outbound_connection( connection_id) except KeyError: return HandlerResult(HandlerStatus.DROP) if not is_outbound_connection: self._network.send_connect_request(connection_id) else: self._gossip.connect_success(connection_id) auth_trust_response = AuthorizationTrustResponse(roles=[RoleType.Value( 'NETWORK')]) LOGGER.debug('Connection: %s is approved', connection_id) self._network.update_connection_status(connection_id, ConnectionStatus. CONNECTED) return HandlerResult(HandlerStatus.RETURN, message_out= auth_trust_response, message_type=validator_pb2.Message. AUTHORIZATION_TRUST_RESPONSE)
handle
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, connection_id, message_content):\n if self._network.get_connection_status(connection_id\n ) != ConnectionStatus.CONNECTION_REQUEST:\n LOGGER.debug(\n \"Connection's previous message was not a ConnectionRequest, Remove connection to %s\"\n , connection_id)\n violation = AuthorizationViolation(violation=RoleType.Value('NETWORK'))\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n violation, message_type=validator_pb2.Message.\n AUTHORIZATION_VIOLATION)\n request = AuthorizationTrustRequest()\n request.ParseFromString(message_content)\n roles = self._network.roles\n for role in request.roles:\n if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'):\n permitted = False\n if 'network' in roles:\n permitted = self._permission_verifier.check_network_role(\n request.public_key)\n if not permitted:\n violation = AuthorizationViolation(violation=RoleType.Value\n ('NETWORK'))\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE,\n message_out=violation, message_type=validator_pb2.\n Message.AUTHORIZATION_VIOLATION)\n self._network.update_connection_public_key(connection_id, request.\n public_key)\n if RoleType.Value('NETWORK') in request.roles:\n try:\n is_outbound_connection = self._network.is_outbound_connection(\n connection_id)\n except KeyError:\n return HandlerResult(HandlerStatus.DROP)\n if not is_outbound_connection:\n self._network.send_connect_request(connection_id)\n else:\n self._gossip.connect_success(connection_id)\n auth_trust_response = AuthorizationTrustResponse(roles=[RoleType.Value(\n 'NETWORK')])\n LOGGER.debug('Connection: %s is approved', connection_id)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n CONNECTED)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n auth_trust_response, message_type=validator_pb2.Message.\n AUTHORIZATION_TRUST_RESPONSE)\n", "role": "user" }, { "content": "handle", "role": "assistant" } ]
def x(self, connection_id, message_content): if self._network.get_connection_status(connection_id ) != ConnectionStatus.CONNECTION_REQUEST: LOGGER.debug( "Connection's previous message was not a ConnectionRequest, Remove connection to %s" , connection_id) violation = AuthorizationViolation(violation=RoleType.Value('NETWORK')) return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out= violation, message_type=validator_pb2.Message. AUTHORIZATION_VIOLATION) random_payload = os.urandom(PAYLOAD_LENGTH) self._challenge_payload_cache[connection_id] = random_payload auth_challenge_response = AuthorizationChallengeResponse(payload= random_payload) self._network.update_connection_status(connection_id, ConnectionStatus. AUTH_CHALLENGE_REQUEST) return HandlerResult(HandlerStatus.RETURN, message_out= auth_challenge_response, message_type=validator_pb2.Message. AUTHORIZATION_CHALLENGE_RESPONSE)
handle
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, connection_id, message_content):\n if self._network.get_connection_status(connection_id\n ) != ConnectionStatus.CONNECTION_REQUEST:\n LOGGER.debug(\n \"Connection's previous message was not a ConnectionRequest, Remove connection to %s\"\n , connection_id)\n violation = AuthorizationViolation(violation=RoleType.Value('NETWORK'))\n return HandlerResult(HandlerStatus.RETURN_AND_CLOSE, message_out=\n violation, message_type=validator_pb2.Message.\n AUTHORIZATION_VIOLATION)\n random_payload = os.urandom(PAYLOAD_LENGTH)\n self._challenge_payload_cache[connection_id] = random_payload\n auth_challenge_response = AuthorizationChallengeResponse(payload=\n random_payload)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n AUTH_CHALLENGE_REQUEST)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n auth_challenge_response, message_type=validator_pb2.Message.\n AUTHORIZATION_CHALLENGE_RESPONSE)\n", "role": "user" }, { "content": "handle", "role": "assistant" } ]
def x(self, connection_id, message_content): if self._network.get_connection_status(connection_id ) != ConnectionStatus.AUTH_CHALLENGE_REQUEST: LOGGER.debug( "Connection's previous message was not a AuthorizationChallengeRequest, Remove connection to%s" , connection_id) return AuthorizationChallengeSubmitHandler._network_violation_result() auth_challenge_submit = AuthorizationChallengeSubmit() auth_challenge_submit.ParseFromString(message_content) try: payload = self._challenge_payload_cache[connection_id] except KeyError: LOGGER.warning( "Connection's challenge payload expired before aresponse was received. %s" , connection_id) return AuthorizationChallengeSubmitHandler._network_violation_result() context = create_context('secp256k1') try: public_key = Secp256k1PublicKey.from_hex(auth_challenge_submit. public_key) except ParseError: LOGGER.warning( 'Authorization Challenge Request cannot be verified. Invalid public key %s' , auth_challenge_submit.public_key) return AuthorizationChallengeSubmitHandler._network_violation_result() if not context.verify(auth_challenge_submit.signature, payload, public_key ): LOGGER.warning( 'Signature was not able to be verified. Remove connection to %s', connection_id) return AuthorizationChallengeSubmitHandler._network_violation_result() roles = self._network.roles for role in auth_challenge_submit.roles: if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'): permitted = False if 'network' in roles: permitted = self._permission_verifier.check_network_role( auth_challenge_submit.public_key) if not permitted: return (AuthorizationChallengeSubmitHandler. _network_violation_result()) self._network.update_connection_public_key(connection_id, auth_challenge_submit.public_key) if RoleType.Value('NETWORK') in auth_challenge_submit.roles: try: is_outbound_connection = self._network.is_outbound_connection( connection_id) except KeyError: return HandlerResult(HandlerStatus.DROP) if not is_outbound_connection: self._network.send_connect_request(connection_id) else: self._gossip.connect_success(connection_id) auth_challenge_result = AuthorizationChallengeResult(roles=[RoleType. Value('NETWORK')]) LOGGER.debug('Connection: %s is approved', connection_id) self._network.update_connection_status(connection_id, ConnectionStatus. CONNECTED) return HandlerResult(HandlerStatus.RETURN, message_out= auth_challenge_result, message_type=validator_pb2.Message. AUTHORIZATION_CHALLENGE_RESULT)
handle
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, connection_id, message_content):\n if self._network.get_connection_status(connection_id\n ) != ConnectionStatus.AUTH_CHALLENGE_REQUEST:\n LOGGER.debug(\n \"Connection's previous message was not a AuthorizationChallengeRequest, Remove connection to%s\"\n , connection_id)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n auth_challenge_submit = AuthorizationChallengeSubmit()\n auth_challenge_submit.ParseFromString(message_content)\n try:\n payload = self._challenge_payload_cache[connection_id]\n except KeyError:\n LOGGER.warning(\n \"Connection's challenge payload expired before aresponse was received. %s\"\n , connection_id)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n context = create_context('secp256k1')\n try:\n public_key = Secp256k1PublicKey.from_hex(auth_challenge_submit.\n public_key)\n except ParseError:\n LOGGER.warning(\n 'Authorization Challenge Request cannot be verified. Invalid public key %s'\n , auth_challenge_submit.public_key)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n if not context.verify(auth_challenge_submit.signature, payload, public_key\n ):\n LOGGER.warning(\n 'Signature was not able to be verified. Remove connection to %s',\n connection_id)\n return AuthorizationChallengeSubmitHandler._network_violation_result()\n roles = self._network.roles\n for role in auth_challenge_submit.roles:\n if role == RoleType.Value('NETWORK') or role == RoleType.Value('ALL'):\n permitted = False\n if 'network' in roles:\n permitted = self._permission_verifier.check_network_role(\n auth_challenge_submit.public_key)\n if not permitted:\n return (AuthorizationChallengeSubmitHandler.\n _network_violation_result())\n self._network.update_connection_public_key(connection_id,\n auth_challenge_submit.public_key)\n if RoleType.Value('NETWORK') in auth_challenge_submit.roles:\n try:\n is_outbound_connection = self._network.is_outbound_connection(\n connection_id)\n except KeyError:\n return HandlerResult(HandlerStatus.DROP)\n if not is_outbound_connection:\n self._network.send_connect_request(connection_id)\n else:\n self._gossip.connect_success(connection_id)\n auth_challenge_result = AuthorizationChallengeResult(roles=[RoleType.\n Value('NETWORK')])\n LOGGER.debug('Connection: %s is approved', connection_id)\n self._network.update_connection_status(connection_id, ConnectionStatus.\n CONNECTED)\n return HandlerResult(HandlerStatus.RETURN, message_out=\n auth_challenge_result, message_type=validator_pb2.Message.\n AUTHORIZATION_CHALLENGE_RESULT)\n", "role": "user" }, { "content": "handle", "role": "assistant" } ]
def x(self, connection_id, message_content): LOGGER.warning('Received AuthorizationViolation from %s', connection_id) endpoint = self._network.connection_id_to_endpoint(connection_id) self._network.remove_connection(connection_id) self._gossip.remove_temp_endpoint(endpoint) return HandlerResult(HandlerStatus.DROP)
handle
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, connection_id, message_content):\n LOGGER.warning('Received AuthorizationViolation from %s', connection_id)\n endpoint = self._network.connection_id_to_endpoint(connection_id)\n self._network.remove_connection(connection_id)\n self._gossip.remove_temp_endpoint(endpoint)\n return HandlerResult(HandlerStatus.DROP)\n", "role": "user" }, { "content": "handle", "role": "assistant" } ]
def x(args): rest_client = RestClient(args.url, args.user) if args.subcommand == 'list': transactions = rest_client.list_transactions() keys = 'transaction_id', 'family', 'version', 'size', 'payload' headers = tuple(k.upper() if k != 'version' else 'VERS' for k in keys) def x(transaction, decode=True): decoded = b64decode(transaction['payload']) return transaction['header_signature'], transaction['header'][ 'family_name'], transaction['header']['family_version'], len( decoded), str(decoded) if decode else transaction['payload'] if args.format == 'default': fmt.print_terminal_table(headers, transactions, parse_txn_row) elif args.format == 'csv': fmt.print_csv(headers, transactions, parse_txn_row) elif args.format == 'json' or args.format == 'yaml': data = [{k: d for k, d in zip(keys, parse_txn_row(b, False))} for b in transactions] if args.format == 'yaml': fmt.print_yaml(data) elif args.format == 'json': fmt.print_json(data) else: raise AssertionError('Missing handler: {}'.format(args.format)) else: raise AssertionError('Missing handler: {}'.format(args.format)) if args.subcommand == 'show': output = rest_client.get_transaction(args.transaction_id) if args.key: if args.key == 'payload': output = b64decode(output['payload']) elif args.key in output: output = output[args.key] elif args.key in output['header']: output = output['header'][args.key] else: raise CliException( 'Key "{}" not found in transaction or header'.format( args.key)) if args.format == 'yaml': fmt.print_yaml(output) elif args.format == 'json': fmt.print_json(output) else: raise AssertionError('Missing handler: {}'.format(args.format))
do_transaction
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(args):\n rest_client = RestClient(args.url, args.user)\n if args.subcommand == 'list':\n transactions = rest_client.list_transactions()\n keys = 'transaction_id', 'family', 'version', 'size', 'payload'\n headers = tuple(k.upper() if k != 'version' else 'VERS' for k in keys)\n\n def x(transaction, decode=True):\n decoded = b64decode(transaction['payload'])\n return transaction['header_signature'], transaction['header'][\n 'family_name'], transaction['header']['family_version'], len(\n decoded), str(decoded) if decode else transaction['payload']\n if args.format == 'default':\n fmt.print_terminal_table(headers, transactions, parse_txn_row)\n elif args.format == 'csv':\n fmt.print_csv(headers, transactions, parse_txn_row)\n elif args.format == 'json' or args.format == 'yaml':\n data = [{k: d for k, d in zip(keys, parse_txn_row(b, False))} for\n b in transactions]\n if args.format == 'yaml':\n fmt.print_yaml(data)\n elif args.format == 'json':\n fmt.print_json(data)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n if args.subcommand == 'show':\n output = rest_client.get_transaction(args.transaction_id)\n if args.key:\n if args.key == 'payload':\n output = b64decode(output['payload'])\n elif args.key in output:\n output = output[args.key]\n elif args.key in output['header']:\n output = output['header'][args.key]\n else:\n raise CliException(\n 'Key \"{}\" not found in transaction or header'.format(\n args.key))\n if args.format == 'yaml':\n fmt.print_yaml(output)\n elif args.format == 'json':\n fmt.print_json(output)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n", "role": "user" }, { "content": "do_transaction", "role": "assistant" } ]
def x(args): default_cli_config = _load_default_cli_config() toml_config = _load_toml_cli_config() for config in (toml_config, default_cli_config): for key, val in config.items(): if key in args and getattr(args, key) is not None: pass else: setattr(args, key, val)
load_cli_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(args):\n default_cli_config = _load_default_cli_config()\n toml_config = _load_toml_cli_config()\n for config in (toml_config, default_cli_config):\n for key, val in config.items():\n if key in args and getattr(args, key) is not None:\n pass\n else:\n setattr(args, key, val)\n", "role": "user" }, { "content": "load_cli_config", "role": "assistant" } ]
def x(self, txn_id): if txn_id not in self._receipt_db: raise KeyError('Unknown transaction id {}'.format(txn_id)) txn_receipt_bytes = self._receipt_db[txn_id] txn_receipt = TransactionReceipt() txn_receipt.ParseFromString(txn_receipt_bytes) return txn_receipt
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, txn_id):\n if txn_id not in self._receipt_db:\n raise KeyError('Unknown transaction id {}'.format(txn_id))\n txn_receipt_bytes = self._receipt_db[txn_id]\n txn_receipt = TransactionReceipt()\n txn_receipt.ParseFromString(txn_receipt_bytes)\n return txn_receipt\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, batch_list): if isinstance(batch_list, BaseMessage): batch_list = batch_list.SerializeToString() return self._post('/batches', batch_list)
send_batches
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, batch_list):\n if isinstance(batch_list, BaseMessage):\n batch_list = batch_list.SerializeToString()\n return self._post('/batches', batch_list)\n", "role": "user" }, { "content": "send_batches", "role": "assistant" } ]
def x(self, url, params=None, data=None, headers=None, method='GET'): if headers is None: headers = {} if self._auth_header is not None: headers['Authorization'] = self._auth_header try: if method == 'POST': result = requests.post(url, params=params, data=data, headers= headers) elif method == 'GET': result = requests.get(url, params=params, data=data, headers= headers) result.raise_for_status() return result.status_code, result.json() except requests.exceptions.HTTPError as e: return e.response.status_code, e.response.reason except RemoteDisconnected as e: raise CliException(e) except (requests.exceptions.MissingSchema, requests.exceptions.InvalidURL ) as e: raise CliException(e) except requests.exceptions.ConnectionError as e: raise CliException( 'Unable to connect to "{}": make sure URL is correct'.format( self._base_url))
submit_request
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, url, params=None, data=None, headers=None, method='GET'):\n if headers is None:\n headers = {}\n if self._auth_header is not None:\n headers['Authorization'] = self._auth_header\n try:\n if method == 'POST':\n result = requests.post(url, params=params, data=data, headers=\n headers)\n elif method == 'GET':\n result = requests.get(url, params=params, data=data, headers=\n headers)\n result.raise_for_status()\n return result.status_code, result.json()\n except requests.exceptions.HTTPError as e:\n return e.response.status_code, e.response.reason\n except RemoteDisconnected as e:\n raise CliException(e)\n except (requests.exceptions.MissingSchema, requests.exceptions.InvalidURL\n ) as e:\n raise CliException(e)\n except requests.exceptions.ConnectionError as e:\n raise CliException(\n 'Unable to connect to \"{}\": make sure URL is correct'.format(\n self._base_url))\n", "role": "user" }, { "content": "submit_request", "role": "assistant" } ]
def x(subparsers, parent_parser): parser = subparsers.add_parser('list-blocks', help= 'List blocks from different nodes.', formatter_class=argparse. RawDescriptionHelpFormatter, epilog='', parents=[parent_parser, base_multinode_parser()]) parser.add_argument('-n', '--count', default=10, type=int, help= 'the number of blocks to list')
add_list_blocks_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(subparsers, parent_parser):\n parser = subparsers.add_parser('list-blocks', help=\n 'List blocks from different nodes.', formatter_class=argparse.\n RawDescriptionHelpFormatter, epilog='', parents=[parent_parser,\n base_multinode_parser()])\n parser.add_argument('-n', '--count', default=10, type=int, help=\n 'the number of blocks to list')\n", "role": "user" }, { "content": "add_list_blocks_parser", "role": "assistant" } ]
def x(self, block, receipts): block_events = BlockEventExtractor(block).extract([EventSubscription( event_type='sawtooth/block-commit')]) receipt_events = ReceiptEventExtractor(receipts).extract([ EventSubscription(event_type='identity/update')]) for event in block_events: forked = self._handle_block_commit(event) if forked: return for event in receipt_events: if event.event_type == 'identity/update': self._handle_txn_commit(event)
chain_update
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, block, receipts):\n block_events = BlockEventExtractor(block).extract([EventSubscription(\n event_type='sawtooth/block-commit')])\n receipt_events = ReceiptEventExtractor(receipts).extract([\n EventSubscription(event_type='identity/update')])\n for event in block_events:\n forked = self._handle_block_commit(event)\n if forked:\n return\n for event in receipt_events:\n if event.event_type == 'identity/update':\n self._handle_txn_commit(event)\n", "role": "user" }, { "content": "chain_update", "role": "assistant" } ]
def x(filename): if not os.path.exists(filename): LOGGER.info( 'Skipping rest api loading from non-existent config file: %s', filename) return RestApiConfig() LOGGER.info('Loading rest api information from config: %s', filename) try: with open(filename) as fd: raw_config = fd.read() except IOError as e: raise RestApiConfigurationError( 'Unable to load rest api configuration file: {}'.format(str(e))) toml_config = toml.loads(raw_config) invalid_keys = set(toml_config.keys()).difference(['bind', 'connect', 'timeout', 'opentsdb_db', 'opentsdb_url', 'opentsdb_username', 'opentsdb_password', 'client_max_size']) if invalid_keys: raise RestApiConfigurationError('Invalid keys in rest api config: {}' .format(', '.join(sorted(list(invalid_keys))))) config = RestApiConfig(bind=toml_config.get('bind', None), connect= toml_config.get('connect', None), timeout=toml_config.get('timeout', None), opentsdb_url=toml_config.get('opentsdb_url', None), opentsdb_db=toml_config.get('opentsdb_db', None), opentsdb_username =toml_config.get('opentsdb_username', None), opentsdb_password= toml_config.get('opentsdb_password', None), client_max_size= toml_config.get('client_max_size', None)) return config
load_toml_rest_api_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filename):\n if not os.path.exists(filename):\n LOGGER.info(\n 'Skipping rest api loading from non-existent config file: %s',\n filename)\n return RestApiConfig()\n LOGGER.info('Loading rest api information from config: %s', filename)\n try:\n with open(filename) as fd:\n raw_config = fd.read()\n except IOError as e:\n raise RestApiConfigurationError(\n 'Unable to load rest api configuration file: {}'.format(str(e)))\n toml_config = toml.loads(raw_config)\n invalid_keys = set(toml_config.keys()).difference(['bind', 'connect',\n 'timeout', 'opentsdb_db', 'opentsdb_url', 'opentsdb_username',\n 'opentsdb_password', 'client_max_size'])\n if invalid_keys:\n raise RestApiConfigurationError('Invalid keys in rest api config: {}'\n .format(', '.join(sorted(list(invalid_keys)))))\n config = RestApiConfig(bind=toml_config.get('bind', None), connect=\n toml_config.get('connect', None), timeout=toml_config.get('timeout',\n None), opentsdb_url=toml_config.get('opentsdb_url', None),\n opentsdb_db=toml_config.get('opentsdb_db', None), opentsdb_username\n =toml_config.get('opentsdb_username', None), opentsdb_password=\n toml_config.get('opentsdb_password', None), client_max_size=\n toml_config.get('client_max_size', None))\n return config\n", "role": "user" }, { "content": "load_toml_rest_api_config", "role": "assistant" } ]
def x(configs): bind = None connect = None timeout = None opentsdb_url = None opentsdb_db = None opentsdb_username = None opentsdb_password = None client_max_size = None for config in reversed(configs): if config.bind is not None: bind = config.bind if config.connect is not None: connect = config.connect if config.timeout is not None: timeout = config.timeout if config.opentsdb_url is not None: opentsdb_url = config.opentsdb_url if config.opentsdb_db is not None: opentsdb_db = config.opentsdb_db if config.opentsdb_username is not None: opentsdb_username = config.opentsdb_username if config.opentsdb_password is not None: opentsdb_password = config.opentsdb_password if config.client_max_size is not None: client_max_size = config.client_max_size return RestApiConfig(bind=bind, connect=connect, timeout=timeout, opentsdb_url=opentsdb_url, opentsdb_db=opentsdb_db, opentsdb_username=opentsdb_username, opentsdb_password= opentsdb_password, client_max_size=client_max_size)
merge_rest_api_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(configs):\n bind = None\n connect = None\n timeout = None\n opentsdb_url = None\n opentsdb_db = None\n opentsdb_username = None\n opentsdb_password = None\n client_max_size = None\n for config in reversed(configs):\n if config.bind is not None:\n bind = config.bind\n if config.connect is not None:\n connect = config.connect\n if config.timeout is not None:\n timeout = config.timeout\n if config.opentsdb_url is not None:\n opentsdb_url = config.opentsdb_url\n if config.opentsdb_db is not None:\n opentsdb_db = config.opentsdb_db\n if config.opentsdb_username is not None:\n opentsdb_username = config.opentsdb_username\n if config.opentsdb_password is not None:\n opentsdb_password = config.opentsdb_password\n if config.client_max_size is not None:\n client_max_size = config.client_max_size\n return RestApiConfig(bind=bind, connect=connect, timeout=timeout,\n opentsdb_url=opentsdb_url, opentsdb_db=opentsdb_db,\n opentsdb_username=opentsdb_username, opentsdb_password=\n opentsdb_password, client_max_size=client_max_size)\n", "role": "user" }, { "content": "merge_rest_api_config", "role": "assistant" } ]
def x(subparsers, parent_parser): parser = subparsers.add_parser('block', description= 'Provides subcommands to display information about the blocks in the current blockchain.' , help='Displays information on blocks in the current blockchain') grand_parsers = parser.add_subparsers(title='subcommands', dest= 'subcommand') grand_parsers.required = True description = ( 'Displays information for all blocks on the current blockchain, including the block id and number, public keys all of allsigners, and number of transactions and batches.' ) list_parser = grand_parsers.add_parser('list', help= 'Displays information for all blocks on the current blockchain', description=description, parents=[base_http_parser(), base_list_parser()], formatter_class=argparse. RawDescriptionHelpFormatter) list_parser.add_argument('-n', '--count', default=100, type=int, help= 'the number of blocks to list') description = ( 'Displays information about the specified block on the current blockchain' ) show_parser = grand_parsers.add_parser('show', help=description, description=description + '.', parents=[base_http_parser(), base_show_parser()], formatter_class=argparse. RawDescriptionHelpFormatter) show_parser.add_argument('block_id', type=str, help= 'id (header_signature) of the block')
add_block_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(subparsers, parent_parser):\n parser = subparsers.add_parser('block', description=\n 'Provides subcommands to display information about the blocks in the current blockchain.'\n , help='Displays information on blocks in the current blockchain')\n grand_parsers = parser.add_subparsers(title='subcommands', dest=\n 'subcommand')\n grand_parsers.required = True\n description = (\n 'Displays information for all blocks on the current blockchain, including the block id and number, public keys all of allsigners, and number of transactions and batches.'\n )\n list_parser = grand_parsers.add_parser('list', help=\n 'Displays information for all blocks on the current blockchain',\n description=description, parents=[base_http_parser(),\n base_list_parser()], formatter_class=argparse.\n RawDescriptionHelpFormatter)\n list_parser.add_argument('-n', '--count', default=100, type=int, help=\n 'the number of blocks to list')\n description = (\n 'Displays information about the specified block on the current blockchain'\n )\n show_parser = grand_parsers.add_parser('show', help=description,\n description=description + '.', parents=[base_http_parser(),\n base_show_parser()], formatter_class=argparse.\n RawDescriptionHelpFormatter)\n show_parser.add_argument('block_id', type=str, help=\n 'id (header_signature) of the block')\n", "role": "user" }, { "content": "add_block_parser", "role": "assistant" } ]
def x(args): rest_client = RestClient(args.url, args.user) if args.subcommand == 'list': block_generator = rest_client.list_blocks() blocks = [] left = args.count for block in block_generator: blocks.append(block) left -= 1 if left <= 0: break keys = 'num', 'block_id', 'batches', 'txns', 'signer' headers = tuple(k.upper() if k != 'batches' else 'BATS' for k in keys) def x(block): batches = block.get('batches', []) txns = [t for b in batches for t in b['transactions']] return block['header'].get('block_num', 0), block[ 'header_signature'], len(batches), len(txns), block['header'][ 'signer_public_key'] if args.format == 'default': fmt.print_terminal_table(headers, blocks, parse_block_row) elif args.format == 'csv': fmt.print_csv(headers, blocks, parse_block_row) elif args.format == 'json' or args.format == 'yaml': data = [{k: d for k, d in zip(keys, parse_block_row(b))} for b in blocks] if args.format == 'yaml': fmt.print_yaml(data) elif args.format == 'json': fmt.print_json(data) else: raise AssertionError('Missing handler: {}'.format(args.format)) else: raise AssertionError('Missing handler: {}'.format(args.format)) if args.subcommand == 'show': output = rest_client.get_block(args.block_id) if args.key: if args.key in output: output = output[args.key] elif args.key in output['header']: output = output['header'][args.key] else: raise CliException('key "{}" not found in block or header'. format(args.key)) if args.format == 'yaml': fmt.print_yaml(output) elif args.format == 'json': fmt.print_json(output) else: raise AssertionError('Missing handler: {}'.format(args.format))
do_block
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(args):\n rest_client = RestClient(args.url, args.user)\n if args.subcommand == 'list':\n block_generator = rest_client.list_blocks()\n blocks = []\n left = args.count\n for block in block_generator:\n blocks.append(block)\n left -= 1\n if left <= 0:\n break\n keys = 'num', 'block_id', 'batches', 'txns', 'signer'\n headers = tuple(k.upper() if k != 'batches' else 'BATS' for k in keys)\n\n def x(block):\n batches = block.get('batches', [])\n txns = [t for b in batches for t in b['transactions']]\n return block['header'].get('block_num', 0), block[\n 'header_signature'], len(batches), len(txns), block['header'][\n 'signer_public_key']\n if args.format == 'default':\n fmt.print_terminal_table(headers, blocks, parse_block_row)\n elif args.format == 'csv':\n fmt.print_csv(headers, blocks, parse_block_row)\n elif args.format == 'json' or args.format == 'yaml':\n data = [{k: d for k, d in zip(keys, parse_block_row(b))} for b in\n blocks]\n if args.format == 'yaml':\n fmt.print_yaml(data)\n elif args.format == 'json':\n fmt.print_json(data)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n if args.subcommand == 'show':\n output = rest_client.get_block(args.block_id)\n if args.key:\n if args.key in output:\n output = output[args.key]\n elif args.key in output['header']:\n output = output['header'][args.key]\n else:\n raise CliException('key \"{}\" not found in block or header'.\n format(args.key))\n if args.format == 'yaml':\n fmt.print_yaml(output)\n elif args.format == 'json':\n fmt.print_json(output)\n else:\n raise AssertionError('Missing handler: {}'.format(args.format))\n", "role": "user" }, { "content": "do_block", "role": "assistant" } ]
async def incoming(self): """Returns the next incoming message. """ msg = await self._queue.get() self._queue.task_done() return msg
incoming
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "async def incoming(self):\n \"\"\"Returns the next incoming message.\n \"\"\"\n msg = await self._queue.get()\n self._queue.task_done()\n return msg\n", "role": "user" }, { "content": "incoming", "role": "assistant" } ]
async def await_reply(self, correlation_id, timeout=None): """Wait for a reply to a given correlation id. If a timeout is provided, it will raise a asyncio.TimeoutError. """ try: result = await asyncio.wait_for(self._futures[correlation_id], timeout=timeout) return result finally: del self._futures[correlation_id]
await_reply
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "async def await_reply(self, correlation_id, timeout=None):\n \"\"\"Wait for a reply to a given correlation id. If a timeout is\n provided, it will raise a asyncio.TimeoutError.\n \"\"\"\n try:\n result = await asyncio.wait_for(self._futures[correlation_id],\n timeout=timeout)\n return result\n finally:\n del self._futures[correlation_id]\n", "role": "user" }, { "content": "await_reply", "role": "assistant" } ]
def x(self, err): for c_id in self._futures: self._fail_reply(c_id, err)
fail_all
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, err):\n for c_id in self._futures:\n self._fail_reply(c_id, err)\n", "role": "user" }, { "content": "fail_all", "role": "assistant" } ]
async def route_msg(self, msg): """Given a message, route it either to the incoming queue, or to the future associated with its correlation_id. """ if msg.correlation_id in self._futures: self._set_reply(msg.correlation_id, msg) else: await self._push_incoming(msg)
route_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "async def route_msg(self, msg):\n \"\"\"Given a message, route it either to the incoming queue, or to the\n future associated with its correlation_id.\n \"\"\"\n if msg.correlation_id in self._futures:\n self._set_reply(msg.correlation_id, msg)\n else:\n await self._push_incoming(msg)\n", "role": "user" }, { "content": "route_msg", "role": "assistant" } ]
async def start(self): """Starts receiving messages on the underlying socket and passes them to the message router. """ self._is_running = True while self._is_running: try: zmq_msg = await self._socket.recv_multipart() message = Message() message.ParseFromString(zmq_msg[-1]) await self._msg_router.route_msg(message) except DecodeError as e: LOGGER.warning('Unable to decode: %s', e) except zmq.ZMQError as e: LOGGER.warning('Unable to receive: %s', e) return except asyncio.CancelledError: self._is_running = False
start
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "async def start(self):\n \"\"\"Starts receiving messages on the underlying socket and passes them\n to the message router.\n \"\"\"\n self._is_running = True\n while self._is_running:\n try:\n zmq_msg = await self._socket.recv_multipart()\n message = Message()\n message.ParseFromString(zmq_msg[-1])\n await self._msg_router.route_msg(message)\n except DecodeError as e:\n LOGGER.warning('Unable to decode: %s', e)\n except zmq.ZMQError as e:\n LOGGER.warning('Unable to receive: %s', e)\n return\n except asyncio.CancelledError:\n self._is_running = False\n", "role": "user" }, { "content": "start", "role": "assistant" } ]
def x(self): LOGGER.info('Connecting to %s', self._url) asyncio.ensure_future(self._do_start())
open
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n LOGGER.info('Connecting to %s', self._url)\n asyncio.ensure_future(self._do_start())\n", "role": "user" }, { "content": "open", "role": "assistant" } ]
def x(self, event_type, callback): listeners = self._connection_state_listeners.get(event_type, []) listeners.append(callback) self._connection_state_listeners[event_type] = listeners
on_connection_state_change
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, event_type, callback):\n listeners = self._connection_state_listeners.get(event_type, [])\n listeners.append(callback)\n self._connection_state_listeners[event_type] = listeners\n", "role": "user" }, { "content": "on_connection_state_change", "role": "assistant" } ]
async def send(self, message_type, message_content, timeout=None): """Sends a message and returns a future for the response. """ return await self._sender.send(message_type, message_content, timeout= timeout)
send
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "async def send(self, message_type, message_content, timeout=None):\n \"\"\"Sends a message and returns a future for the response.\n \"\"\"\n return await self._sender.send(message_type, message_content, timeout=\n timeout)\n", "role": "user" }, { "content": "send", "role": "assistant" } ]
def x(self): if self._recv_task: self._recv_task.cancel() self._disable_monitoring() if self._monitor_task and not self._monitor_task.done(): self._monitor_task.cancel() self._receiver.cancel() self._socket.close(linger=0) self._msg_router.fail_all(DisconnectError())
close
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self._recv_task:\n self._recv_task.cancel()\n self._disable_monitoring()\n if self._monitor_task and not self._monitor_task.done():\n self._monitor_task.cancel()\n self._receiver.cancel()\n self._socket.close(linger=0)\n self._msg_router.fail_all(DisconnectError())\n", "role": "user" }, { "content": "close", "role": "assistant" } ]
def x(self, key): with self._lmdb.begin(write=True, buffers=True) as txn: txn.delete(key.encode())
delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, key):\n with self._lmdb.begin(write=True, buffers=True) as txn:\n txn.delete(key.encode())\n", "role": "user" }, { "content": "delete", "role": "assistant" } ]
def x(self, index=None): with self._lmdb.begin() as txn: return [key.decode() for key, _ in txn.cursor()]
keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, index=None):\n with self._lmdb.begin() as txn:\n return [key.decode() for key, _ in txn.cursor()]\n", "role": "user" }, { "content": "keys", "role": "assistant" } ]
def x(self): header_bytes = self.block_header.SerializeToString() block = Block(header=header_bytes, header_signature=self._header_signature) block.batches.extend(self.batches) return block
build_block
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n header_bytes = self.block_header.SerializeToString()\n block = Block(header=header_bytes, header_signature=self._header_signature)\n block.batches.extend(self.batches)\n return block\n", "role": "user" }, { "content": "build_block", "role": "assistant" } ]
def x(self, txn_signature, is_valid, context_id, state_changes, events, data, error_message, error_data): raise NotImplementedError()
set_transaction_execution_result
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, txn_signature, is_valid, context_id, state_changes, events,\n data, error_message, error_data):\n raise NotImplementedError()\n", "role": "user" }, { "content": "set_transaction_execution_result", "role": "assistant" } ]
def x(self, chain): with self._lock: chain.sort(key=lambda x: x.block_num) for block in chain: block_id = block.header_signature if block_id not in self._cache: self._cache[block_id] = self.CachedValue(block) if block.previous_block_id in self._cache: self._cache[block.previous_block_id].inc_count() if time.time() > self._next_purge_time: self._purge_expired() self._next_purge_time = time.time() + self._purge_frequency
add_chain
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, chain):\n with self._lock:\n chain.sort(key=lambda x: x.block_num)\n for block in chain:\n block_id = block.header_signature\n if block_id not in self._cache:\n self._cache[block_id] = self.CachedValue(block)\n if block.previous_block_id in self._cache:\n self._cache[block.previous_block_id].inc_count()\n if time.time() > self._next_purge_time:\n self._purge_expired()\n self._next_purge_time = time.time() + self._purge_frequency\n", "role": "user" }, { "content": "add_chain", "role": "assistant" } ]
def x(self): time_horizon = time.time() - self._keep_time new_cache = {} dec_count_for = [] for k, v in self._cache.items(): if v.count > 0: if k not in self._block_store: new_cache[k] = v elif v.timestamp > time_horizon: new_cache[k] = v else: block = v.value if block is not None: dec_count_for.append(block.previous_block_id) elif v.timestamp > time_horizon: new_cache[k] = v else: block = v.value if block is not None: dec_count_for.append(block.previous_block_id) self._cache = new_cache for block_id in dec_count_for: if block_id in self._cache: self._cache[block_id].dec_count()
purge_expired
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n time_horizon = time.time() - self._keep_time\n new_cache = {}\n dec_count_for = []\n for k, v in self._cache.items():\n if v.count > 0:\n if k not in self._block_store:\n new_cache[k] = v\n elif v.timestamp > time_horizon:\n new_cache[k] = v\n else:\n block = v.value\n if block is not None:\n dec_count_for.append(block.previous_block_id)\n elif v.timestamp > time_horizon:\n new_cache[k] = v\n else:\n block = v.value\n if block is not None:\n dec_count_for.append(block.previous_block_id)\n self._cache = new_cache\n for block_id in dec_count_for:\n if block_id in self._cache:\n self._cache[block_id].dec_count()\n", "role": "user" }, { "content": "purge_expired", "role": "assistant" } ]
def x(cls, status): assert cls.trigger is not None, 'Invalid ErrorTrap, trigger not set' assert cls.error is not None, 'Invalid ErrorTrap, error not set' if status == cls.trigger: raise cls.error()
check
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, status):\n assert cls.trigger is not None, 'Invalid ErrorTrap, trigger not set'\n assert cls.error is not None, 'Invalid ErrorTrap, error not set'\n if status == cls.trigger:\n raise cls.error()\n", "role": "user" }, { "content": "check", "role": "assistant" } ]
def x(self, block, keep_batches): clone = Block() clone.header = block.header clone.header_signature = block.header_signature clone.batches.extend([batch for batch in block.batches if batch. header_signature in keep_batches]) return clone
remove_batches
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, block, keep_batches):\n clone = Block()\n clone.header = block.header\n clone.header_signature = block.header_signature\n clone.batches.extend([batch for batch in block.batches if batch.\n header_signature in keep_batches])\n return clone\n", "role": "user" }, { "content": "remove_batches", "role": "assistant" } ]
def x(self, block_header): state_view = BlockWrapper.state_view_for_block(self._block_cache. block_store.chain_head, self._state_view_factory) settings_view = SettingsView(state_view) self._min_wait_time = settings_view.get_setting( 'sawtooth.consensus.min_wait_time', self._min_wait_time, int) self._max_wait_time = settings_view.get_setting( 'sawtooth.consensus.max_wait_time', self._max_wait_time, int) self._valid_block_publishers = settings_view.get_setting( 'sawtooth.consensus.valid_block_publishers', self. _valid_block_publishers, list) block_header.consensus = b'Devmode' self._start_time = time.time() self._wait_time = random.uniform(self._min_wait_time, self._max_wait_time) return True
initialize_block
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, block_header):\n state_view = BlockWrapper.state_view_for_block(self._block_cache.\n block_store.chain_head, self._state_view_factory)\n settings_view = SettingsView(state_view)\n self._min_wait_time = settings_view.get_setting(\n 'sawtooth.consensus.min_wait_time', self._min_wait_time, int)\n self._max_wait_time = settings_view.get_setting(\n 'sawtooth.consensus.max_wait_time', self._max_wait_time, int)\n self._valid_block_publishers = settings_view.get_setting(\n 'sawtooth.consensus.valid_block_publishers', self.\n _valid_block_publishers, list)\n block_header.consensus = b'Devmode'\n self._start_time = time.time()\n self._wait_time = random.uniform(self._min_wait_time, self._max_wait_time)\n return True\n", "role": "user" }, { "content": "initialize_block", "role": "assistant" } ]
def x(self, block_header): if any(publisher_key != block_header.signer_public_key for publisher_key in self._valid_block_publishers): return False if self._min_wait_time == 0: return True if self._min_wait_time < 0: return False assert self._min_wait_time > 0 if self._max_wait_time <= 0: return self._start_time + self._min_wait_time <= time.time() assert self._max_wait_time > 0 if self._max_wait_time <= self._min_wait_time: return False assert 0 < self._min_wait_time < self._max_wait_time return self._start_time + self._wait_time <= time.time()
check_publish_block
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, block_header):\n if any(publisher_key != block_header.signer_public_key for\n publisher_key in self._valid_block_publishers):\n return False\n if self._min_wait_time == 0:\n return True\n if self._min_wait_time < 0:\n return False\n assert self._min_wait_time > 0\n if self._max_wait_time <= 0:\n return self._start_time + self._min_wait_time <= time.time()\n assert self._max_wait_time > 0\n if self._max_wait_time <= self._min_wait_time:\n return False\n assert 0 < self._min_wait_time < self._max_wait_time\n return self._start_time + self._wait_time <= time.time()\n", "role": "user" }, { "content": "check_publish_block", "role": "assistant" } ]
def x(self, cur_fork_head, new_fork_head): if new_fork_head.consensus != b'Devmode': raise TypeError('New fork head {} is not a DevMode block'.format( new_fork_head.identifier[:8])) if cur_fork_head.consensus != b'Devmode': if new_fork_head.previous_block_id == cur_fork_head.identifier: LOGGER.info( 'Choose new fork %s: New fork head switches consensus to DevMode' , new_fork_head.identifier[:8]) return True raise TypeError( 'Trying to compare a DevMode block {} to a non-DevMode block {} that is not the direct predecessor' .format(new_fork_head.identifier[:8], cur_fork_head.identifier[:8]) ) if new_fork_head.block_num == cur_fork_head.block_num: cur_fork_hash = self.hash_signer_public_key(cur_fork_head.header. signer_public_key, cur_fork_head.header.previous_block_id) new_fork_hash = self.hash_signer_public_key(new_fork_head.header. signer_public_key, new_fork_head.header.previous_block_id) result = new_fork_hash < cur_fork_hash else: result = new_fork_head.block_num > cur_fork_head.block_num return result
compare_forks
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, cur_fork_head, new_fork_head):\n if new_fork_head.consensus != b'Devmode':\n raise TypeError('New fork head {} is not a DevMode block'.format(\n new_fork_head.identifier[:8]))\n if cur_fork_head.consensus != b'Devmode':\n if new_fork_head.previous_block_id == cur_fork_head.identifier:\n LOGGER.info(\n 'Choose new fork %s: New fork head switches consensus to DevMode'\n , new_fork_head.identifier[:8])\n return True\n raise TypeError(\n 'Trying to compare a DevMode block {} to a non-DevMode block {} that is not the direct predecessor'\n .format(new_fork_head.identifier[:8], cur_fork_head.identifier[:8])\n )\n if new_fork_head.block_num == cur_fork_head.block_num:\n cur_fork_hash = self.hash_signer_public_key(cur_fork_head.header.\n signer_public_key, cur_fork_head.header.previous_block_id)\n new_fork_hash = self.hash_signer_public_key(new_fork_head.header.\n signer_public_key, new_fork_head.header.previous_block_id)\n result = new_fork_hash < cur_fork_hash\n else:\n result = new_fork_head.block_num > cur_fork_head.block_num\n return result\n", "role": "user" }, { "content": "compare_forks", "role": "assistant" } ]
def x(self, batch, state_root=None, from_state=False): if state_root is None: state_root = self._current_root_func() if state_root == INIT_ROOT_KEY: LOGGER.debug('Chain head is not set yet. Permit all.') return True self._cache.update_view(state_root) header = BatchHeader() header.ParseFromString(batch.header) role = self._cache.get_role('transactor.batch_signer', state_root, from_state) if role is None: role = self._cache.get_role('transactor', state_root, from_state) if role is None: policy_name = 'default' else: policy_name = role.policy_name policy = self._cache.get_policy(policy_name, state_root, from_state) if policy is None: allowed = True else: allowed = self._allowed(header.signer_public_key, policy) if allowed: return self.is_transaction_signer_authorized(batch.transactions, state_root, from_state) LOGGER.debug('Batch Signer: %s is not permitted.', header.signer_public_key ) return False
is_batch_signer_authorized
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, batch, state_root=None, from_state=False):\n if state_root is None:\n state_root = self._current_root_func()\n if state_root == INIT_ROOT_KEY:\n LOGGER.debug('Chain head is not set yet. Permit all.')\n return True\n self._cache.update_view(state_root)\n header = BatchHeader()\n header.ParseFromString(batch.header)\n role = self._cache.get_role('transactor.batch_signer', state_root,\n from_state)\n if role is None:\n role = self._cache.get_role('transactor', state_root, from_state)\n if role is None:\n policy_name = 'default'\n else:\n policy_name = role.policy_name\n policy = self._cache.get_policy(policy_name, state_root, from_state)\n if policy is None:\n allowed = True\n else:\n allowed = self._allowed(header.signer_public_key, policy)\n if allowed:\n return self.is_transaction_signer_authorized(batch.transactions,\n state_root, from_state)\n LOGGER.debug('Batch Signer: %s is not permitted.', header.signer_public_key\n )\n return False\n", "role": "user" }, { "content": "is_batch_signer_authorized", "role": "assistant" } ]
def x(self, transactions, state_root, from_state): role = None if role is None: role = self._cache.get_role('transactor.transaction_signer', state_root, from_state) if role is None: role = self._cache.get_role('transactor', state_root, from_state) if role is None: policy_name = 'default' else: policy_name = role.policy_name policy = self._cache.get_policy(policy_name, state_root, from_state) family_roles = {} for transaction in transactions: header = TransactionHeader() header.ParseFromString(transaction.header) family_policy = None if header.family_name not in family_roles: role = self._cache.get_role('transactor.transaction_signer.' + header.family_name, state_root, from_state) if role is not None: family_policy = self._cache.get_policy(role.policy_name, state_root, from_state) family_roles[header.family_name] = family_policy else: family_policy = family_roles[header.family_name] if family_policy is not None: if not self._allowed(header.signer_public_key, family_policy): LOGGER.debug('Transaction Signer: %s is not permitted.', header.signer_public_key) return False elif policy is not None: if not self._allowed(header.signer_public_key, policy): LOGGER.debug('Transaction Signer: %s is not permitted.', header.signer_public_key) return False return True
is_transaction_signer_authorized
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, transactions, state_root, from_state):\n role = None\n if role is None:\n role = self._cache.get_role('transactor.transaction_signer',\n state_root, from_state)\n if role is None:\n role = self._cache.get_role('transactor', state_root, from_state)\n if role is None:\n policy_name = 'default'\n else:\n policy_name = role.policy_name\n policy = self._cache.get_policy(policy_name, state_root, from_state)\n family_roles = {}\n for transaction in transactions:\n header = TransactionHeader()\n header.ParseFromString(transaction.header)\n family_policy = None\n if header.family_name not in family_roles:\n role = self._cache.get_role('transactor.transaction_signer.' +\n header.family_name, state_root, from_state)\n if role is not None:\n family_policy = self._cache.get_policy(role.policy_name,\n state_root, from_state)\n family_roles[header.family_name] = family_policy\n else:\n family_policy = family_roles[header.family_name]\n if family_policy is not None:\n if not self._allowed(header.signer_public_key, family_policy):\n LOGGER.debug('Transaction Signer: %s is not permitted.',\n header.signer_public_key)\n return False\n elif policy is not None:\n if not self._allowed(header.signer_public_key, policy):\n LOGGER.debug('Transaction Signer: %s is not permitted.',\n header.signer_public_key)\n return False\n return True\n", "role": "user" }, { "content": "is_transaction_signer_authorized", "role": "assistant" } ]
def x(self, batch): if self._permissions is None: return True header = BatchHeader() header.ParseFromString(batch.header) policy = None if 'transactor.batch_signer' in self._permissions: policy = self._permissions['transactor.batch_signer'] elif 'transactor' in self._permissions: policy = self._permissions['transactor'] allowed = True if policy is not None: allowed = self._allowed(header.signer_public_key, policy) if allowed: return self.check_off_chain_transaction_roles(batch.transactions) LOGGER.debug('Batch Signer: %s is not permitted by local configuration.', header.signer_public_key) return False
check_off_chain_batch_roles
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, batch):\n if self._permissions is None:\n return True\n header = BatchHeader()\n header.ParseFromString(batch.header)\n policy = None\n if 'transactor.batch_signer' in self._permissions:\n policy = self._permissions['transactor.batch_signer']\n elif 'transactor' in self._permissions:\n policy = self._permissions['transactor']\n allowed = True\n if policy is not None:\n allowed = self._allowed(header.signer_public_key, policy)\n if allowed:\n return self.check_off_chain_transaction_roles(batch.transactions)\n LOGGER.debug('Batch Signer: %s is not permitted by local configuration.',\n header.signer_public_key)\n return False\n", "role": "user" }, { "content": "check_off_chain_batch_roles", "role": "assistant" } ]
def x(self, transactions): policy = None if 'transactor.transaction_signer' in self._permissions: policy = self._permissions['transactor.transaction_signer'] elif 'transactor' in self._permissions: policy = self._permissions['transactor'] for transaction in transactions: header = TransactionHeader() header.ParseFromString(transaction.header) family_role = 'transactor.transaction_signer.' + header.family_name family_policy = None if family_role in self._permissions: family_policy = self._permissions[family_role] if family_policy is not None: if not self._allowed(header.signer_public_key, family_policy): LOGGER.debug( 'Transaction Signer: %s is not permittedby local configuration.' , header.signer_public_key) return False elif policy is not None: if not self._allowed(header.signer_public_key, policy): LOGGER.debug( 'Transaction Signer: %s is not permittedby local configuration.' , header.signer_public_key) return False return True
check_off_chain_transaction_roles
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, transactions):\n policy = None\n if 'transactor.transaction_signer' in self._permissions:\n policy = self._permissions['transactor.transaction_signer']\n elif 'transactor' in self._permissions:\n policy = self._permissions['transactor']\n for transaction in transactions:\n header = TransactionHeader()\n header.ParseFromString(transaction.header)\n family_role = 'transactor.transaction_signer.' + header.family_name\n family_policy = None\n if family_role in self._permissions:\n family_policy = self._permissions[family_role]\n if family_policy is not None:\n if not self._allowed(header.signer_public_key, family_policy):\n LOGGER.debug(\n 'Transaction Signer: %s is not permittedby local configuration.'\n , header.signer_public_key)\n return False\n elif policy is not None:\n if not self._allowed(header.signer_public_key, policy):\n LOGGER.debug(\n 'Transaction Signer: %s is not permittedby local configuration.'\n , header.signer_public_key)\n return False\n return True\n", "role": "user" }, { "content": "check_off_chain_transaction_roles", "role": "assistant" } ]
def x(self, public_key): state_root = self._current_root_func() if state_root == INIT_ROOT_KEY: LOGGER.debug('Chain head is not set yet. Permit all.') return True self._cache.update_view(state_root) role = self._cache.get_role('network', state_root) if role is None: policy_name = 'default' else: policy_name = role.policy_name policy = self._cache.get_policy(policy_name, state_root) if policy is not None: if not self._allowed(public_key, policy): LOGGER.debug('Node is not permitted: %s.', public_key) return False return True
check_network_role
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, public_key):\n state_root = self._current_root_func()\n if state_root == INIT_ROOT_KEY:\n LOGGER.debug('Chain head is not set yet. Permit all.')\n return True\n self._cache.update_view(state_root)\n role = self._cache.get_role('network', state_root)\n if role is None:\n policy_name = 'default'\n else:\n policy_name = role.policy_name\n policy = self._cache.get_policy(policy_name, state_root)\n if policy is not None:\n if not self._allowed(public_key, policy):\n LOGGER.debug('Node is not permitted: %s.', public_key)\n return False\n return True\n", "role": "user" }, { "content": "check_network_role", "role": "assistant" } ]
def x(self, item, state_root, from_state=False): if from_state: if self._identity_view is None: self.update_view(state_root) value = self._identity_view.get_role(item) return value value = self._cache.get(item) if value is None: if self._identity_view is None: self.update_view(state_root) value = self._identity_view.get_role(item) self._cache[item] = value return value
get_role
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, item, state_root, from_state=False):\n if from_state:\n if self._identity_view is None:\n self.update_view(state_root)\n value = self._identity_view.get_role(item)\n return value\n value = self._cache.get(item)\n if value is None:\n if self._identity_view is None:\n self.update_view(state_root)\n value = self._identity_view.get_role(item)\n self._cache[item] = value\n return value\n", "role": "user" }, { "content": "get_role", "role": "assistant" } ]
def x(statuses, batch_ids, tracker): proto_statuses = [] for batch_id in batch_ids: if statuses[batch_id ] == client_batch_submit_pb2.ClientBatchStatus.INVALID: invalid_txns = tracker.get_invalid_txn_info(batch_id) for txn_info in invalid_txns: try: txn_info['transaction_id'] = txn_info.pop('id') except KeyError as e: LOGGER.debug(e) else: invalid_txns = None proto_statuses.append(client_batch_submit_pb2.ClientBatchStatus( batch_id=batch_id, status=statuses[batch_id], invalid_transactions=invalid_txns)) return proto_statuses
format_batch_statuses
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(statuses, batch_ids, tracker):\n proto_statuses = []\n for batch_id in batch_ids:\n if statuses[batch_id\n ] == client_batch_submit_pb2.ClientBatchStatus.INVALID:\n invalid_txns = tracker.get_invalid_txn_info(batch_id)\n for txn_info in invalid_txns:\n try:\n txn_info['transaction_id'] = txn_info.pop('id')\n except KeyError as e:\n LOGGER.debug(e)\n else:\n invalid_txns = None\n proto_statuses.append(client_batch_submit_pb2.ClientBatchStatus(\n batch_id=batch_id, status=statuses[batch_id],\n invalid_transactions=invalid_txns))\n return proto_statuses\n", "role": "user" }, { "content": "format_batch_statuses", "role": "assistant" } ]
def x(self, connection_id, message_content): try: request = self._request_proto() request.ParseFromString(message_content) except DecodeError: LOGGER.info('Protobuf %s failed to deserialize', request) return self._wrap_result(self._status.INTERNAL_ERROR) try: response = self._respond(request) except _ResponseFailed as e: response = e.status return self._wrap_result(response)
handle
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, connection_id, message_content):\n try:\n request = self._request_proto()\n request.ParseFromString(message_content)\n except DecodeError:\n LOGGER.info('Protobuf %s failed to deserialize', request)\n return self._wrap_result(self._status.INTERNAL_ERROR)\n try:\n response = self._respond(request)\n except _ResponseFailed as e:\n response = e.status\n return self._wrap_result(response)\n", "role": "user" }, { "content": "handle", "role": "assistant" } ]
def x(self, response): if isinstance(response, int): response = self._wrap_response(response) return HandlerResult(status=HandlerStatus.RETURN, message_out=self. _response_proto(**response), message_type=self._response_type)
wrap_result
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, response):\n if isinstance(response, int):\n response = self._wrap_response(response)\n return HandlerResult(status=HandlerStatus.RETURN, message_out=self.\n _response_proto(**response), message_type=self._response_type)\n", "role": "user" }, { "content": "wrap_result", "role": "assistant" } ]
def x(self, status=None, **kwargs): kwargs['status'] = status if status is not None else self._status.OK return kwargs
wrap_response
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, status=None, **kwargs):\n kwargs['status'] = status if status is not None else self._status.OK\n return kwargs\n", "role": "user" }, { "content": "wrap_response", "role": "assistant" } ]
def x(self, request): if request.head_id: if self._id_regex.fullmatch(request.head_id) is None: LOGGER.debug('Invalid head id requested: %s', request.head_id) raise _ResponseFailed(self._status.NO_ROOT) try: return self._block_store[request.head_id] except KeyError as e: LOGGER.debug('Unable to find block "%s" in store', e) raise _ResponseFailed(self._status.NO_ROOT) else: return self._get_chain_head()
get_head_block
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, request):\n if request.head_id:\n if self._id_regex.fullmatch(request.head_id) is None:\n LOGGER.debug('Invalid head id requested: %s', request.head_id)\n raise _ResponseFailed(self._status.NO_ROOT)\n try:\n return self._block_store[request.head_id]\n except KeyError as e:\n LOGGER.debug('Unable to find block \"%s\" in store', e)\n raise _ResponseFailed(self._status.NO_ROOT)\n else:\n return self._get_chain_head()\n", "role": "user" }, { "content": "get_head_block", "role": "assistant" } ]
def x(self, request): if request.state_root: root = request.state_root else: head = self._get_chain_head() root = head.state_root_hash try: self._tree.set_merkle_root(root) except KeyError as e: LOGGER.debug('Unable to find root "%s" in database', e) raise _ResponseFailed(self._status.NO_ROOT) return root
set_root
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, request):\n if request.state_root:\n root = request.state_root\n else:\n head = self._get_chain_head()\n root = head.state_root_hash\n try:\n self._tree.set_merkle_root(root)\n except KeyError as e:\n LOGGER.debug('Unable to find root \"%s\" in database', e)\n raise _ResponseFailed(self._status.NO_ROOT)\n return root\n", "role": "user" }, { "content": "set_root", "role": "assistant" } ]
def x(self, request, head_id, filter_ids, resource_fetcher, block_xform): resources = [] if filter_ids and not request.head_id: for resource_id in filter_ids: try: resources.append(resource_fetcher(resource_id)) except (KeyError, ValueError, TypeError): pass else: current_id = head_id while current_id in self._block_store: block = self._block_store[current_id].block resources += block_xform(block) header = BlockHeader() header.ParseFromString(block.header) current_id = header.previous_block_id if request.head_id and filter_ids: matches = {r.header_signature: r for r in resources if r. header_signature in filter_ids} resources = [matches[i] for i in filter_ids if i in matches] return resources
list_store_resources
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, request, head_id, filter_ids, resource_fetcher, block_xform):\n resources = []\n if filter_ids and not request.head_id:\n for resource_id in filter_ids:\n try:\n resources.append(resource_fetcher(resource_id))\n except (KeyError, ValueError, TypeError):\n pass\n else:\n current_id = head_id\n while current_id in self._block_store:\n block = self._block_store[current_id].block\n resources += block_xform(block)\n header = BlockHeader()\n header.ParseFromString(block.header)\n current_id = header.previous_block_id\n if request.head_id and filter_ids:\n matches = {r.header_signature: r for r in resources if r.\n header_signature in filter_ids}\n resources = [matches[i] for i in filter_ids if i in matches]\n return resources\n", "role": "user" }, { "content": "list_store_resources", "role": "assistant" } ]
def x(self, resource_ids): for resource_id in resource_ids: if self._id_regex.fullmatch(resource_id) is None: LOGGER.debug('Invalid resource id requested: %s', resource_id) raise _ResponseFailed(self._status.INVALID_ID)
validate_ids
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, resource_ids):\n for resource_id in resource_ids:\n if self._id_regex.fullmatch(resource_id) is None:\n LOGGER.debug('Invalid resource id requested: %s', resource_id)\n raise _ResponseFailed(self._status.INVALID_ID)\n", "role": "user" }, { "content": "validate_ids", "role": "assistant" } ]
def x(self, state_root): if self._state_root_regex.fullmatch(state_root) is None: LOGGER.debug('Invalid state root: %s', state_root) raise _ResponseFailed(self._status.INVALID_ROOT)
validate_state_root
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, state_root):\n if self._state_root_regex.fullmatch(state_root) is None:\n LOGGER.debug('Invalid state root: %s', state_root)\n raise _ResponseFailed(self._status.INVALID_ROOT)\n", "role": "user" }, { "content": "validate_state_root", "role": "assistant" } ]
def x(self, namespace): if self._namespace_regex.fullmatch(namespace) is None: LOGGER.debug('Invalid namespace: %s', namespace) raise _ResponseFailed(self._status.INVALID_ADDRESS)
validate_namespace
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, namespace):\n if self._namespace_regex.fullmatch(namespace) is None:\n LOGGER.debug('Invalid namespace: %s', namespace)\n raise _ResponseFailed(self._status.INVALID_ADDRESS)\n", "role": "user" }, { "content": "validate_namespace", "role": "assistant" } ]
def x(cls, request, resources, on_fail_status): if not resources: return resources, client_list_control_pb2.ClientPagingResponse() paging = request.paging limit = min(paging.limit, MAX_PAGE_SIZE) or DEFAULT_PAGE_SIZE try: if paging.start: start_index = cls.index_by_id(paging.start, resources) else: start_index = 0 if start_index < 0 or start_index >= len(resources): raise AssertionError except AssertionError: raise _ResponseFailed(on_fail_status) paged_resources = resources[start_index:start_index + limit] if start_index + limit < len(resources): paging_response = client_list_control_pb2.ClientPagingResponse(next =cls.id_by_index(start_index + limit, resources), start=cls. id_by_index(start_index, resources), limit=limit) else: paging_response = client_list_control_pb2.ClientPagingResponse(start =cls.id_by_index(start_index, resources), limit=limit) return paged_resources, paging_response
paginate_resources
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, request, resources, on_fail_status):\n if not resources:\n return resources, client_list_control_pb2.ClientPagingResponse()\n paging = request.paging\n limit = min(paging.limit, MAX_PAGE_SIZE) or DEFAULT_PAGE_SIZE\n try:\n if paging.start:\n start_index = cls.index_by_id(paging.start, resources)\n else:\n start_index = 0\n if start_index < 0 or start_index >= len(resources):\n raise AssertionError\n except AssertionError:\n raise _ResponseFailed(on_fail_status)\n paged_resources = resources[start_index:start_index + limit]\n if start_index + limit < len(resources):\n paging_response = client_list_control_pb2.ClientPagingResponse(next\n =cls.id_by_index(start_index + limit, resources), start=cls.\n id_by_index(start_index, resources), limit=limit)\n else:\n paging_response = client_list_control_pb2.ClientPagingResponse(start\n =cls.id_by_index(start_index, resources), limit=limit)\n return paged_resources, paging_response\n", "role": "user" }, { "content": "paginate_resources", "role": "assistant" } ]
def x(cls, target_id, resources): for index in range(len(resources)): if cls.id_by_index(index, resources) == target_id: return index raise AssertionError
index_by_id
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, target_id, resources):\n for index in range(len(resources)):\n if cls.id_by_index(index, resources) == target_id:\n return index\n raise AssertionError\n", "role": "user" }, { "content": "index_by_id", "role": "assistant" } ]
def x(index, resources): if index < 0 or index >= len(resources): return '' try: return resources[index].header_signature except AttributeError: return resources[index].address
id_by_index
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(index, resources):\n if index < 0 or index >= len(resources):\n return ''\n try:\n return resources[index].header_signature\n except AttributeError:\n return resources[index].address\n", "role": "user" }, { "content": "id_by_index", "role": "assistant" } ]
def x(cls, request, resources, fail_enum, header_proto=None): if not request.sorting: return resources value_handlers = cls._get_handler_set(request, fail_enum, header_proto) def x(resource_a, resource_b): for handler in value_handlers: val_a, val_b = handler.get_sort_values(resource_a, resource_b) if val_a < val_b: return handler.xform_result(-1) if val_a > val_b: return handler.xform_result(1) return 0 return sorted(resources, key=cmp_to_key(sorter))
sort_resources
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, request, resources, fail_enum, header_proto=None):\n if not request.sorting:\n return resources\n value_handlers = cls._get_handler_set(request, fail_enum, header_proto)\n\n def x(resource_a, resource_b):\n for handler in value_handlers:\n val_a, val_b = handler.get_sort_values(resource_a, resource_b)\n if val_a < val_b:\n return handler.xform_result(-1)\n if val_a > val_b:\n return handler.xform_result(1)\n return 0\n return sorted(resources, key=cmp_to_key(sorter))\n", "role": "user" }, { "content": "sort_resources", "role": "assistant" } ]
def x(cls, request, fail_enum, header_proto=None): added = set() handlers = [] for controls in request.sorting: control_bytes = controls.SerializeToString() if control_bytes not in added: added.add(control_bytes) handlers.append(cls._ValueHandler(controls, fail_enum, header_proto)) return handlers
get_handler_set
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, request, fail_enum, header_proto=None):\n added = set()\n handlers = []\n for controls in request.sorting:\n control_bytes = controls.SerializeToString()\n if control_bytes not in added:\n added.add(control_bytes)\n handlers.append(cls._ValueHandler(controls, fail_enum,\n header_proto))\n return handlers\n", "role": "user" }, { "content": "get_handler_set", "role": "assistant" } ]
def x(self, statuses): with self._wait_condition: self._statuses = statuses self._wait_condition.notify()
notify_batches_finished
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, statuses):\n with self._wait_condition:\n self._statuses = statuses\n self._wait_condition.notify()\n", "role": "user" }, { "content": "notify_batches_finished", "role": "assistant" } ]
def x(self, batch_ids, timeout=None): self._batch_tracker.watch_statuses(self, batch_ids) timeout = timeout or DEFAULT_TIMEOUT start_time = time() with self._wait_condition: while True: if self._statuses is not None: return _format_batch_statuses(self._statuses, batch_ids, self._batch_tracker) if time() - start_time > timeout: statuses = self._batch_tracker.get_statuses(batch_ids) return _format_batch_statuses(statuses, batch_ids, self. _batch_tracker) self._wait_condition.wait(timeout - (time() - start_time))
wait_for_batches
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, batch_ids, timeout=None):\n self._batch_tracker.watch_statuses(self, batch_ids)\n timeout = timeout or DEFAULT_TIMEOUT\n start_time = time()\n with self._wait_condition:\n while True:\n if self._statuses is not None:\n return _format_batch_statuses(self._statuses, batch_ids,\n self._batch_tracker)\n if time() - start_time > timeout:\n statuses = self._batch_tracker.get_statuses(batch_ids)\n return _format_batch_statuses(statuses, batch_ids, self.\n _batch_tracker)\n self._wait_condition.wait(timeout - (time() - start_time))\n", "role": "user" }, { "content": "wait_for_batches", "role": "assistant" } ]
def x(path, human_readable_name): if not os.path.exists(path): LOGGER.error('%s directory does not exist: %s', human_readable_name, path) return False if not os.path.isdir(path): LOGGER.error('%s directory is not a directory: %s', human_readable_name, path) return False errors = True if not os.access(path, os.R_OK): LOGGER.error('%s directory is not readable: %s', human_readable_name, path) errors = False if not os.access(path, os.W_OK): LOGGER.error('%s directory is not writable: %s', human_readable_name, path) errors = False return errors
check_directory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, human_readable_name):\n if not os.path.exists(path):\n LOGGER.error('%s directory does not exist: %s', human_readable_name,\n path)\n return False\n if not os.path.isdir(path):\n LOGGER.error('%s directory is not a directory: %s',\n human_readable_name, path)\n return False\n errors = True\n if not os.access(path, os.R_OK):\n LOGGER.error('%s directory is not readable: %s',\n human_readable_name, path)\n errors = False\n if not os.access(path, os.W_OK):\n LOGGER.error('%s directory is not writable: %s',\n human_readable_name, path)\n errors = False\n return errors\n", "role": "user" }, { "content": "check_directory", "role": "assistant" } ]
def x(subparsers, parent_parser): parser = subparsers.add_parser('identity', help= 'Works with optional roles, policies, and permissions', description ='Provides subcommands to work with roles and policies.') identity_parsers = parser.add_subparsers(title='subcommands', dest= 'subcommand') identity_parsers.required = True policy_parser = identity_parsers.add_parser('policy', help= 'Provides subcommands to display existing policies and create new policies' , description= 'Provides subcommands to list the current policies stored in state and to create new policies.' ) policy_parsers = policy_parser.add_subparsers(title='policy', dest= 'policy_cmd') policy_parsers.required = True create_parser = policy_parsers.add_parser('create', help= 'Creates batches of sawtooth-identity transactions for setting a policy' , description= 'Creates a policy that can be set to a role or changes a policy without resetting the role.' ) create_parser.add_argument('-k', '--key', type=str, help= 'specify the signing key for the resulting batches') create_target_group = create_parser.add_mutually_exclusive_group() create_target_group.add_argument('-o', '--output', type=str, help= 'specify the output filename for the resulting batches') create_target_group.add_argument('--url', type=str, help= "identify the URL of a validator's REST API", default= 'http://localhost:8008') create_parser.add_argument('--wait', type=int, default=15, help= 'set time, in seconds, to wait for the policy to commit when submitting to the REST API.' ) create_parser.add_argument('name', type=str, help='name of the new policy') create_parser.add_argument('rule', type=str, nargs='+', help= 'rule with the format "PERMIT_KEY <key>" or "DENY_KEY <key> (multiple "rule" arguments can be specified)' ) list_parser = policy_parsers.add_parser('list', help= 'Lists the current policies', description= 'Lists the policies that are currently set in state.') list_parser.add_argument('--url', type=str, help= "identify the URL of a validator's REST API", default= 'http://localhost:8008') list_parser.add_argument('--format', default='default', choices=[ 'default', 'csv', 'json', 'yaml'], help='choose the output format') role_parser = identity_parsers.add_parser('role', help= 'Provides subcommands to display existing roles and create new roles', description= 'Provides subcommands to list the current roles stored in state and to create new roles.' ) role_parsers = role_parser.add_subparsers(title='role', dest='role_cmd') role_parsers.required = True create_parser = role_parsers.add_parser('create', help= 'Creates a new role that can be used to enforce permissions', description= 'Creates a new role that can be used to enforce permissions.') create_parser.add_argument('-k', '--key', type=str, help= 'specify the signing key for the resulting batches') create_parser.add_argument('--wait', type=int, default=15, help= 'set time, in seconds, to wait for a role to commit when submitting to the REST API.' ) create_target_group = create_parser.add_mutually_exclusive_group() create_target_group.add_argument('-o', '--output', type=str, help= 'specify the output filename for the resulting batches') create_target_group.add_argument('--url', type=str, help= "the URL of a validator's REST API", default='http://localhost:8008') create_parser.add_argument('name', type=str, help='name of the role') create_parser.add_argument('policy', type=str, help= 'identify policy that role will be restricted to') list_parser = role_parsers.add_parser('list', help= 'Lists the current keys and values of roles', description= 'Displays the roles that are currently set in state.') list_parser.add_argument('--url', type=str, help= "identify the URL of a validator's REST API", default= 'http://localhost:8008') list_parser.add_argument('--format', default='default', choices=[ 'default', 'csv', 'json', 'yaml'], help='choose the output format')
add_identity_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(subparsers, parent_parser):\n parser = subparsers.add_parser('identity', help=\n 'Works with optional roles, policies, and permissions', description\n ='Provides subcommands to work with roles and policies.')\n identity_parsers = parser.add_subparsers(title='subcommands', dest=\n 'subcommand')\n identity_parsers.required = True\n policy_parser = identity_parsers.add_parser('policy', help=\n 'Provides subcommands to display existing policies and create new policies'\n , description=\n 'Provides subcommands to list the current policies stored in state and to create new policies.'\n )\n policy_parsers = policy_parser.add_subparsers(title='policy', dest=\n 'policy_cmd')\n policy_parsers.required = True\n create_parser = policy_parsers.add_parser('create', help=\n 'Creates batches of sawtooth-identity transactions for setting a policy'\n , description=\n 'Creates a policy that can be set to a role or changes a policy without resetting the role.'\n )\n create_parser.add_argument('-k', '--key', type=str, help=\n 'specify the signing key for the resulting batches')\n create_target_group = create_parser.add_mutually_exclusive_group()\n create_target_group.add_argument('-o', '--output', type=str, help=\n 'specify the output filename for the resulting batches')\n create_target_group.add_argument('--url', type=str, help=\n \"identify the URL of a validator's REST API\", default=\n 'http://localhost:8008')\n create_parser.add_argument('--wait', type=int, default=15, help=\n 'set time, in seconds, to wait for the policy to commit when submitting to the REST API.'\n )\n create_parser.add_argument('name', type=str, help='name of the new policy')\n create_parser.add_argument('rule', type=str, nargs='+', help=\n 'rule with the format \"PERMIT_KEY <key>\" or \"DENY_KEY <key> (multiple \"rule\" arguments can be specified)'\n )\n list_parser = policy_parsers.add_parser('list', help=\n 'Lists the current policies', description=\n 'Lists the policies that are currently set in state.')\n list_parser.add_argument('--url', type=str, help=\n \"identify the URL of a validator's REST API\", default=\n 'http://localhost:8008')\n list_parser.add_argument('--format', default='default', choices=[\n 'default', 'csv', 'json', 'yaml'], help='choose the output format')\n role_parser = identity_parsers.add_parser('role', help=\n 'Provides subcommands to display existing roles and create new roles',\n description=\n 'Provides subcommands to list the current roles stored in state and to create new roles.'\n )\n role_parsers = role_parser.add_subparsers(title='role', dest='role_cmd')\n role_parsers.required = True\n create_parser = role_parsers.add_parser('create', help=\n 'Creates a new role that can be used to enforce permissions',\n description=\n 'Creates a new role that can be used to enforce permissions.')\n create_parser.add_argument('-k', '--key', type=str, help=\n 'specify the signing key for the resulting batches')\n create_parser.add_argument('--wait', type=int, default=15, help=\n 'set time, in seconds, to wait for a role to commit when submitting to the REST API.'\n )\n create_target_group = create_parser.add_mutually_exclusive_group()\n create_target_group.add_argument('-o', '--output', type=str, help=\n 'specify the output filename for the resulting batches')\n create_target_group.add_argument('--url', type=str, help=\n \"the URL of a validator's REST API\", default='http://localhost:8008')\n create_parser.add_argument('name', type=str, help='name of the role')\n create_parser.add_argument('policy', type=str, help=\n 'identify policy that role will be restricted to')\n list_parser = role_parsers.add_parser('list', help=\n 'Lists the current keys and values of roles', description=\n 'Displays the roles that are currently set in state.')\n list_parser.add_argument('--url', type=str, help=\n \"identify the URL of a validator's REST API\", default=\n 'http://localhost:8008')\n list_parser.add_argument('--format', default='default', choices=[\n 'default', 'csv', 'json', 'yaml'], help='choose the output format')\n", "role": "user" }, { "content": "add_identity_parser", "role": "assistant" } ]
def x(args): if args.subcommand == 'policy' and args.policy_cmd == 'create': _do_identity_policy_create(args) elif args.subcommand == 'policy' and args.policy_cmd == 'list': _do_identity_policy_list(args) elif args.subcommand == 'role' and args.role_cmd == 'create': _do_identity_role_create(args) elif args.subcommand == 'role' and args.role_cmd == 'list': _do_identity_role_list(args) else: raise AssertionError('"{}" is not a valid subcommand of "identity"' .format(args.subcommand))
do_identity
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(args):\n if args.subcommand == 'policy' and args.policy_cmd == 'create':\n _do_identity_policy_create(args)\n elif args.subcommand == 'policy' and args.policy_cmd == 'list':\n _do_identity_policy_list(args)\n elif args.subcommand == 'role' and args.role_cmd == 'create':\n _do_identity_role_create(args)\n elif args.subcommand == 'role' and args.role_cmd == 'list':\n _do_identity_role_list(args)\n else:\n raise AssertionError('\"{}\" is not a valid subcommand of \"identity\"'\n .format(args.subcommand))\n", "role": "user" }, { "content": "do_identity", "role": "assistant" } ]
def x(args): signer = _read_signer(args.key) txns = [_create_policy_txn(signer, args.name, args.rule)] batch = _create_batch(signer, txns) batch_list = BatchList(batches=[batch]) if args.output is not None: try: with open(args.output, 'wb') as batch_file: batch_file.write(batch_list.SerializeToString()) except IOError as e: raise CliException('Unable to write to batch file: {}'.format( str(e))) elif args.url is not None: rest_client = RestClient(args.url) rest_client.send_batches(batch_list) if args.wait and args.wait > 0: batch_id = batch.header_signature wait_time = 0 start_time = time.time() while wait_time < args.wait: statuses = rest_client.get_statuses([batch_id], args.wait - int(wait_time)) wait_time = time.time() - start_time if statuses[0]['status'] == 'COMMITTED': print('Policy committed in {:.6} sec'.format(wait_time)) return time.sleep(0.2) print('Wait timed out! Policy was not committed...') print('{:128.128} {}'.format(batch_id, statuses[0]['status'])) exit(1) else: raise AssertionError('No target for create set.')
do_identity_policy_create
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(args):\n signer = _read_signer(args.key)\n txns = [_create_policy_txn(signer, args.name, args.rule)]\n batch = _create_batch(signer, txns)\n batch_list = BatchList(batches=[batch])\n if args.output is not None:\n try:\n with open(args.output, 'wb') as batch_file:\n batch_file.write(batch_list.SerializeToString())\n except IOError as e:\n raise CliException('Unable to write to batch file: {}'.format(\n str(e)))\n elif args.url is not None:\n rest_client = RestClient(args.url)\n rest_client.send_batches(batch_list)\n if args.wait and args.wait > 0:\n batch_id = batch.header_signature\n wait_time = 0\n start_time = time.time()\n while wait_time < args.wait:\n statuses = rest_client.get_statuses([batch_id], args.wait -\n int(wait_time))\n wait_time = time.time() - start_time\n if statuses[0]['status'] == 'COMMITTED':\n print('Policy committed in {:.6} sec'.format(wait_time))\n return\n time.sleep(0.2)\n print('Wait timed out! Policy was not committed...')\n print('{:128.128} {}'.format(batch_id, statuses[0]['status']))\n exit(1)\n else:\n raise AssertionError('No target for create set.')\n", "role": "user" }, { "content": "do_identity_policy_create", "role": "assistant" } ]
def x(args): rest_client = RestClient(args.url) state = rest_client.list_state(subtree=IDENTITY_NAMESPACE + _ROLE_PREFIX) head = state['head'] state_values = state['data'] printable_roles = [] for state_value in state_values: role_list = RoleList() decoded = b64decode(state_value['data']) role_list.ParseFromString(decoded) for role in role_list.roles: printable_roles.append(role) printable_roles.sort(key=lambda r: r.name) if args.format == 'default': tty_width = tty.width() for role in printable_roles: width = tty_width - len(role.name) - 3 width = width if width > _MIN_PRINT_WIDTH else _MIN_PRINT_WIDTH value = role.policy_name[:width] + '...' if len(role.policy_name ) > width else role.policy_name print('{}: {}'.format(role.name, value)) elif args.format == 'csv': try: writer = csv.writer(sys.stdout, quoting=csv.QUOTE_ALL) writer.writerow(['KEY', 'VALUE']) for role in printable_roles: writer.writerow([role.name, role.policy_name]) except csv.Error: raise CliException('Error writing CSV') elif args.format == 'json' or args.format == 'yaml': roles_snapshot = {'head': head, 'roles': {role.name: role. policy_name for role in printable_roles}} if args.format == 'json': print(json.dumps(roles_snapshot, indent=2, sort_keys=True)) else: print(yaml.dump(roles_snapshot, default_flow_style=False)[0:-1]) else: raise AssertionError('Unknown format {}'.format(args.format))
do_identity_role_list
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(args):\n rest_client = RestClient(args.url)\n state = rest_client.list_state(subtree=IDENTITY_NAMESPACE + _ROLE_PREFIX)\n head = state['head']\n state_values = state['data']\n printable_roles = []\n for state_value in state_values:\n role_list = RoleList()\n decoded = b64decode(state_value['data'])\n role_list.ParseFromString(decoded)\n for role in role_list.roles:\n printable_roles.append(role)\n printable_roles.sort(key=lambda r: r.name)\n if args.format == 'default':\n tty_width = tty.width()\n for role in printable_roles:\n width = tty_width - len(role.name) - 3\n width = width if width > _MIN_PRINT_WIDTH else _MIN_PRINT_WIDTH\n value = role.policy_name[:width] + '...' if len(role.policy_name\n ) > width else role.policy_name\n print('{}: {}'.format(role.name, value))\n elif args.format == 'csv':\n try:\n writer = csv.writer(sys.stdout, quoting=csv.QUOTE_ALL)\n writer.writerow(['KEY', 'VALUE'])\n for role in printable_roles:\n writer.writerow([role.name, role.policy_name])\n except csv.Error:\n raise CliException('Error writing CSV')\n elif args.format == 'json' or args.format == 'yaml':\n roles_snapshot = {'head': head, 'roles': {role.name: role.\n policy_name for role in printable_roles}}\n if args.format == 'json':\n print(json.dumps(roles_snapshot, indent=2, sort_keys=True))\n else:\n print(yaml.dump(roles_snapshot, default_flow_style=False)[0:-1])\n else:\n raise AssertionError('Unknown format {}'.format(args.format))\n", "role": "user" }, { "content": "do_identity_role_list", "role": "assistant" } ]
def x(key_filename): filename = key_filename if filename is None: filename = os.path.join(os.path.expanduser('~'), '.sawtooth', 'keys', getpass.getuser() + '.priv') try: with open(filename, 'r') as key_file: signing_key = key_file.read().strip() except IOError as e: raise CliException('Unable to read key file: {}'.format(str(e))) try: private_key = Secp256k1PrivateKey.from_hex(signing_key) except ParseError as e: raise CliException('Unable to read key in file: {}'.format(str(e))) context = create_context('secp256k1') crypto_factory = CryptoFactory(context) return crypto_factory.new_signer(private_key)
read_signer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_filename):\n filename = key_filename\n if filename is None:\n filename = os.path.join(os.path.expanduser('~'), '.sawtooth',\n 'keys', getpass.getuser() + '.priv')\n try:\n with open(filename, 'r') as key_file:\n signing_key = key_file.read().strip()\n except IOError as e:\n raise CliException('Unable to read key file: {}'.format(str(e)))\n try:\n private_key = Secp256k1PrivateKey.from_hex(signing_key)\n except ParseError as e:\n raise CliException('Unable to read key in file: {}'.format(str(e)))\n context = create_context('secp256k1')\n crypto_factory = CryptoFactory(context)\n return crypto_factory.new_signer(private_key)\n", "role": "user" }, { "content": "read_signer", "role": "assistant" } ]
def x(signer, transactions): txn_ids = [txn.header_signature for txn in transactions] batch_header = BatchHeader(signer_public_key=signer.get_public_key(). as_hex(), transaction_ids=txn_ids).SerializeToString() return Batch(header=batch_header, header_signature=signer.sign( batch_header), transactions=transactions)
create_batch
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(signer, transactions):\n txn_ids = [txn.header_signature for txn in transactions]\n batch_header = BatchHeader(signer_public_key=signer.get_public_key().\n as_hex(), transaction_ids=txn_ids).SerializeToString()\n return Batch(header=batch_header, header_signature=signer.sign(\n batch_header), transactions=transactions)\n", "role": "user" }, { "content": "create_batch", "role": "assistant" } ]
def x(self, state_hash, base_contexts, inputs, outputs): for address in inputs: if not self.namespace_is_valid(address): raise CreateContextException( 'Address or namespace {} listed in inputs is not valid'. format(address)) for address in outputs: if not self.namespace_is_valid(address): raise CreateContextException( 'Address or namespace {} listed in outputs is not valid'. format(address)) addresses_to_find = [add for add in inputs if len(add) == 70] address_values, reads = self._find_address_values_in_chain(base_contexts =base_contexts, addresses_to_find=addresses_to_find) context = ExecutionContext(state_hash=state_hash, read_list=inputs, write_list=outputs, base_context_ids=base_contexts) contexts_asked_not_found = [cid for cid in base_contexts if cid not in self._contexts] if contexts_asked_not_found: raise KeyError( 'Basing a new context off of context ids {} that are not in context manager' .format(contexts_asked_not_found)) context.create_initial(address_values) self._contexts[context.session_id] = context if reads: context.create_prefetch(reads) self._address_queue.put_nowait((context.session_id, state_hash, reads)) return context.session_id
create_context
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, state_hash, base_contexts, inputs, outputs):\n for address in inputs:\n if not self.namespace_is_valid(address):\n raise CreateContextException(\n 'Address or namespace {} listed in inputs is not valid'.\n format(address))\n for address in outputs:\n if not self.namespace_is_valid(address):\n raise CreateContextException(\n 'Address or namespace {} listed in outputs is not valid'.\n format(address))\n addresses_to_find = [add for add in inputs if len(add) == 70]\n address_values, reads = self._find_address_values_in_chain(base_contexts\n =base_contexts, addresses_to_find=addresses_to_find)\n context = ExecutionContext(state_hash=state_hash, read_list=inputs,\n write_list=outputs, base_context_ids=base_contexts)\n contexts_asked_not_found = [cid for cid in base_contexts if cid not in\n self._contexts]\n if contexts_asked_not_found:\n raise KeyError(\n 'Basing a new context off of context ids {} that are not in context manager'\n .format(contexts_asked_not_found))\n context.create_initial(address_values)\n self._contexts[context.session_id] = context\n if reads:\n context.create_prefetch(reads)\n self._address_queue.put_nowait((context.session_id, state_hash, reads))\n return context.session_id\n", "role": "user" }, { "content": "create_context", "role": "assistant" } ]
def x(self, base_contexts, addresses_to_find): contexts_in_chain = deque() contexts_in_chain.extend(base_contexts) reads = list(addresses_to_find) address_values = [] context_ids_already_searched = [] context_ids_already_searched.extend(base_contexts) while reads: try: current_c_id = contexts_in_chain.popleft() except IndexError: break current_context = self._contexts[current_c_id] deleted_addresses = current_context.get_if_deleted(reads) for address in deleted_addresses: if address is not None: address_values.append((address, None)) reads = list(set(reads) - set(deleted_addresses)) values = current_context.get_if_set(reads) addresses_not_found = [] for address, value in zip(reads, values): if value is not None: address_values.append((address, value)) else: addresses_not_found.append(address) reads = addresses_not_found addresses_in_inputs = [address for address in reads if address in current_context] values = current_context.get_if_not_set(addresses_in_inputs) address_values.extend(list(zip(addresses_in_inputs, values))) for add in addresses_in_inputs: reads.remove(add) for c_id in current_context.base_contexts: if c_id not in context_ids_already_searched: contexts_in_chain.append(c_id) context_ids_already_searched.append(c_id) return address_values, reads
find_address_values_in_chain
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, base_contexts, addresses_to_find):\n contexts_in_chain = deque()\n contexts_in_chain.extend(base_contexts)\n reads = list(addresses_to_find)\n address_values = []\n context_ids_already_searched = []\n context_ids_already_searched.extend(base_contexts)\n while reads:\n try:\n current_c_id = contexts_in_chain.popleft()\n except IndexError:\n break\n current_context = self._contexts[current_c_id]\n deleted_addresses = current_context.get_if_deleted(reads)\n for address in deleted_addresses:\n if address is not None:\n address_values.append((address, None))\n reads = list(set(reads) - set(deleted_addresses))\n values = current_context.get_if_set(reads)\n addresses_not_found = []\n for address, value in zip(reads, values):\n if value is not None:\n address_values.append((address, value))\n else:\n addresses_not_found.append(address)\n reads = addresses_not_found\n addresses_in_inputs = [address for address in reads if address in\n current_context]\n values = current_context.get_if_not_set(addresses_in_inputs)\n address_values.extend(list(zip(addresses_in_inputs, values)))\n for add in addresses_in_inputs:\n reads.remove(add)\n for c_id in current_context.base_contexts:\n if c_id not in context_ids_already_searched:\n contexts_in_chain.append(c_id)\n context_ids_already_searched.append(c_id)\n return address_values, reads\n", "role": "user" }, { "content": "find_address_values_in_chain", "role": "assistant" } ]
def x(self, context_id_list): for c_id in context_id_list: if c_id in self._contexts: del self._contexts[c_id]
delete_contexts
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, context_id_list):\n for c_id in context_id_list:\n if c_id in self._contexts:\n del self._contexts[c_id]\n", "role": "user" }, { "content": "delete_contexts", "role": "assistant" } ]
def x(self, context_id, address_list): if context_id not in self._contexts: return False context = self._contexts[context_id] for add in address_list: if not self.address_is_valid(address=add): raise AuthorizationException(address=add) context.delete_direct(address_list) return True
delete
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, context_id, address_list):\n if context_id not in self._contexts:\n return False\n context = self._contexts[context_id]\n for add in address_list:\n if not self.address_is_valid(address=add):\n raise AuthorizationException(address=add)\n context.delete_direct(address_list)\n return True\n", "role": "user" }, { "content": "delete", "role": "assistant" } ]
def x(self, context_id, address_list): if context_id not in self._contexts: return [] for add in address_list: if not self.address_is_valid(address=add): raise AuthorizationException(address=add) context = self._contexts[context_id] addresses_in_ctx = [add for add in address_list if add in context] addresses_not_in_ctx = list(set(address_list) - set(addresses_in_ctx)) values = context.get(addresses_in_ctx) values_list = list(zip(addresses_in_ctx, values)) if addresses_not_in_ctx: for address in addresses_not_in_ctx: context.validate_read(address) try: address_values, reads = self._find_address_values_in_chain( base_contexts=[context_id], addresses_to_find= addresses_not_in_ctx) except KeyError: return [] values_list.extend(address_values) if reads: tree = MerkleDatabase(self._database, context.merkle_root) add_values = [] for add in reads: value = None try: value = tree.get(add) except KeyError: pass add_values.append((add, value)) values_list.extend(add_values) values_list.sort(key=lambda x: address_list.index(x[0])) return values_list
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, context_id, address_list):\n if context_id not in self._contexts:\n return []\n for add in address_list:\n if not self.address_is_valid(address=add):\n raise AuthorizationException(address=add)\n context = self._contexts[context_id]\n addresses_in_ctx = [add for add in address_list if add in context]\n addresses_not_in_ctx = list(set(address_list) - set(addresses_in_ctx))\n values = context.get(addresses_in_ctx)\n values_list = list(zip(addresses_in_ctx, values))\n if addresses_not_in_ctx:\n for address in addresses_not_in_ctx:\n context.validate_read(address)\n try:\n address_values, reads = self._find_address_values_in_chain(\n base_contexts=[context_id], addresses_to_find=\n addresses_not_in_ctx)\n except KeyError:\n return []\n values_list.extend(address_values)\n if reads:\n tree = MerkleDatabase(self._database, context.merkle_root)\n add_values = []\n for add in reads:\n value = None\n try:\n value = tree.get(add)\n except KeyError:\n pass\n add_values.append((add, value))\n values_list.extend(add_values)\n values_list.sort(key=lambda x: address_list.index(x[0]))\n return values_list\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, context_id, address_value_list): if context_id not in self._contexts: LOGGER.warning('Context_id not in contexts, %s', context_id) return False context = self._contexts.get(context_id) add_value_dict = {} for d in address_value_list: for add, val in d.items(): if not self.address_is_valid(address=add): raise AuthorizationException(address=add) add_value_dict[add] = val context.set_direct(add_value_dict) return True
set
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, context_id, address_value_list):\n if context_id not in self._contexts:\n LOGGER.warning('Context_id not in contexts, %s', context_id)\n return False\n context = self._contexts.get(context_id)\n add_value_dict = {}\n for d in address_value_list:\n for add, val in d.items():\n if not self.address_is_valid(address=add):\n raise AuthorizationException(address=add)\n add_value_dict[add] = val\n context.set_direct(add_value_dict)\n return True\n", "role": "user" }, { "content": "set", "role": "assistant" } ]
def x(self, context_id, data): if context_id not in self._contexts: LOGGER.warning('Context_id not in contexts, %s', context_id) return False context = self._contexts.get(context_id) context.add_execution_data(data) return True
add_execution_data
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, context_id, data):\n if context_id not in self._contexts:\n LOGGER.warning('Context_id not in contexts, %s', context_id)\n return False\n context = self._contexts.get(context_id)\n context.add_execution_data(data)\n return True\n", "role": "user" }, { "content": "add_execution_data", "role": "assistant" } ]
def x(self, context_id, event): if context_id not in self._contexts: LOGGER.warning('Context_id not in contexts, %s', context_id) return False context = self._contexts.get(context_id) context.add_execution_event(event) return True
add_execution_event
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, context_id, event):\n if context_id not in self._contexts:\n LOGGER.warning('Context_id not in contexts, %s', context_id)\n return False\n context = self._contexts.get(context_id)\n context.add_execution_event(event)\n return True\n", "role": "user" }, { "content": "add_execution_event", "role": "assistant" } ]
def x(self, puts, deletes): with self._lmdb.begin(write=True, buffers=True) as txn: cursor = txn.cursor(self._main_db) for key in deletes: if not cursor.set_key(key.encode()): continue value = self._deserializer(bytes(cursor.value())) cursor.delete() for index_db, index_key_fn in self._indexes.values(): index_keys = index_key_fn(value) index_cursor = txn.cursor(index_db) for idx_key in index_keys: if index_cursor.set_key(idx_key): index_cursor.delete() for key, value in puts: packed = self._serializer(value) cursor.put(key.encode(), packed, overwrite=True) for index_db, index_key_fn in self._indexes.values(): index_keys = index_key_fn(value) index_cursor = txn.cursor(index_db) for idx_key in index_keys: index_cursor.put(idx_key, key.encode()) self.sync()
update
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, puts, deletes):\n with self._lmdb.begin(write=True, buffers=True) as txn:\n cursor = txn.cursor(self._main_db)\n for key in deletes:\n if not cursor.set_key(key.encode()):\n continue\n value = self._deserializer(bytes(cursor.value()))\n cursor.delete()\n for index_db, index_key_fn in self._indexes.values():\n index_keys = index_key_fn(value)\n index_cursor = txn.cursor(index_db)\n for idx_key in index_keys:\n if index_cursor.set_key(idx_key):\n index_cursor.delete()\n for key, value in puts:\n packed = self._serializer(value)\n cursor.put(key.encode(), packed, overwrite=True)\n for index_db, index_key_fn in self._indexes.values():\n index_keys = index_key_fn(value)\n index_cursor = txn.cursor(index_db)\n for idx_key in index_keys:\n index_cursor.put(idx_key, key.encode())\n self.sync()\n", "role": "user" }, { "content": "update", "role": "assistant" } ]
def x(self, index=None): if index is not None and index not in self._indexes: raise ValueError('Index {} does not exist'.format(index)) db = self._indexes[index][0] if index else self._main_db with self._lmdb.begin(db=db) as txn: return [key.decode() for key in txn.cursor().iternext(keys=True, values=False)]
keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, index=None):\n if index is not None and index not in self._indexes:\n raise ValueError('Index {} does not exist'.format(index))\n db = self._indexes[index][0] if index else self._main_db\n with self._lmdb.begin(db=db) as txn:\n return [key.decode() for key in txn.cursor().iternext(keys=True,\n values=False)]\n", "role": "user" }, { "content": "keys", "role": "assistant" } ]
def x(self, transactions): txn_signatures = [txn.header_signature for txn in transactions] header = BatchHeader(signer_public_key=self._identity_signer. get_public_key().as_hex(), transaction_ids=txn_signatures ).SerializeToString() signature = self._identity_signer.sign(header) batch = Batch(header=header, transactions=transactions, header_signature=signature) self._batch_sender.send(batch)
send
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, transactions):\n txn_signatures = [txn.header_signature for txn in transactions]\n header = BatchHeader(signer_public_key=self._identity_signer.\n get_public_key().as_hex(), transaction_ids=txn_signatures\n ).SerializeToString()\n signature = self._identity_signer.sign(header)\n batch = Batch(header=header, transactions=transactions,\n header_signature=signature)\n self._batch_sender.send(batch)\n", "role": "user" }, { "content": "send", "role": "assistant" } ]
def x(): base_parser = ArgumentParser(add_help=False) base_parser.add_argument('urls', type=str, nargs='+', help= "The URLs of the validator's REST APIs of interest, separated by commas or spaces. (no default)" ) base_parser.add_argument('--users', type=str, action='append', metavar= 'USERNAME[:PASSWORD]', help= 'Specify the users to authorize requests, in the same order as the URLs, separate by commas. Passing empty strings between commas is supported.' ) return base_parser
base_multinode_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('urls', type=str, nargs='+', help=\n \"The URLs of the validator's REST APIs of interest, separated by commas or spaces. (no default)\"\n )\n base_parser.add_argument('--users', type=str, action='append', metavar=\n 'USERNAME[:PASSWORD]', help=\n 'Specify the users to authorize requests, in the same order as the URLs, separate by commas. Passing empty strings between commas is supported.'\n )\n return base_parser\n", "role": "user" }, { "content": "base_multinode_parser", "role": "assistant" } ]
def x(): base_parser = ArgumentParser(add_help=False) base_parser.add_argument('--url', type=str, help= "identify the URL of the validator's REST API (default: http://localhost:8008)" ) base_parser.add_argument('-u', '--user', type=str, metavar= 'USERNAME[:PASSWORD]', help='specify the user to authorize request') return base_parser
base_http_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('--url', type=str, help=\n \"identify the URL of the validator's REST API (default: http://localhost:8008)\"\n )\n base_parser.add_argument('-u', '--user', type=str, metavar=\n 'USERNAME[:PASSWORD]', help='specify the user to authorize request')\n return base_parser\n", "role": "user" }, { "content": "base_http_parser", "role": "assistant" } ]
def x(): base_parser = ArgumentParser(add_help=False) base_parser.add_argument('-F', '--format', action='store', default= 'default', choices=['csv', 'json', 'yaml', 'default'], help= 'choose the output format') return base_parser
base_list_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('-F', '--format', action='store', default=\n 'default', choices=['csv', 'json', 'yaml', 'default'], help=\n 'choose the output format')\n return base_parser\n", "role": "user" }, { "content": "base_list_parser", "role": "assistant" } ]
def x(): base_parser = ArgumentParser(add_help=False) base_parser.add_argument('-k', '--key', type=str, help= 'show a single property from the block or header') base_parser.add_argument('-F', '--format', action='store', default= 'yaml', choices=['yaml', 'json'], help= 'choose the output format (default: yaml)') return base_parser
base_show_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n base_parser = ArgumentParser(add_help=False)\n base_parser.add_argument('-k', '--key', type=str, help=\n 'show a single property from the block or header')\n base_parser.add_argument('-F', '--format', action='store', default=\n 'yaml', choices=['yaml', 'json'], help=\n 'choose the output format (default: yaml)')\n return base_parser\n", "role": "user" }, { "content": "base_show_parser", "role": "assistant" } ]