source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(f): if asyncio.iscoroutinefunction(f): raise TypeError( 'outbound_message_filter must not be a coroutine function') add_handler_spec(f, HandlerSpec((_apply_outbound_message_filter, ()))) return f
outbound_message_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(f):\n if asyncio.iscoroutinefunction(f):\n raise TypeError(\n 'outbound_message_filter must not be a coroutine function')\n add_handler_spec(f, HandlerSpec((_apply_outbound_message_filter, ())))\n return f\n", "role": "user" }, { "content": "outbound_message_filter", "role": "assistant" } ]
def x(f): if asyncio.iscoroutinefunction(f): raise TypeError( 'outbound_presence_filter must not be a coroutine function') add_handler_spec(f, HandlerSpec((_apply_outbound_presence_filter, ()))) return f
outbound_presence_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(f):\n if asyncio.iscoroutinefunction(f):\n raise TypeError(\n 'outbound_presence_filter must not be a coroutine function')\n add_handler_spec(f, HandlerSpec((_apply_outbound_presence_filter, ())))\n return f\n", "role": "user" }, { "content": "outbound_presence_filter", "role": "assistant" } ]
def x(class_, signal_name, *, defer=False): def x(f): add_handler_spec(f, _depsignal_spec(class_, signal_name, f, defer)) return f return decorator
depsignal
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(class_, signal_name, *, defer=False):\n\n def x(f):\n add_handler_spec(f, _depsignal_spec(class_, signal_name, f, defer))\n return f\n return decorator\n", "role": "user" }, { "content": "depsignal", "role": "assistant" } ]
def x(descriptor, signal_name, *, defer=False): def x(f): add_handler_spec(f, _attrsignal_spec(descriptor, signal_name, f, defer) ) return f return decorator
attrsignal
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(descriptor, signal_name, *, defer=False):\n\n def x(f):\n add_handler_spec(f, _attrsignal_spec(descriptor, signal_name, f, defer)\n )\n return f\n return decorator\n", "role": "user" }, { "content": "attrsignal", "role": "assistant" } ]
def x(class_, filter_name): spec = _depfilter_spec(class_, filter_name) def x(f): add_handler_spec(f, spec) return f return decorator
depfilter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(class_, filter_name):\n spec = _depfilter_spec(class_, filter_name)\n\n def x(f):\n add_handler_spec(f, spec)\n return f\n return decorator\n", "role": "user" }, { "content": "depfilter", "role": "assistant" } ]
def x(type_, payload_cls, coro, *, with_send_reply=False): try: handlers = get_magic_attr(coro) except AttributeError: return False hs = HandlerSpec((_apply_iq_handler, (type_, payload_cls))) try: return handlers[hs] == dict(with_send_reply=with_send_reply) except KeyError: return False
is_iq_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(type_, payload_cls, coro, *, with_send_reply=False):\n try:\n handlers = get_magic_attr(coro)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_iq_handler, (type_, payload_cls)))\n try:\n return handlers[hs] == dict(with_send_reply=with_send_reply)\n except KeyError:\n return False\n", "role": "user" }, { "content": "is_iq_handler", "role": "assistant" } ]
def x(type_, from_, cb): import aioxmpp.dispatcher return aioxmpp.dispatcher.is_message_handler(type_, from_, cb)
is_message_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(type_, from_, cb):\n import aioxmpp.dispatcher\n return aioxmpp.dispatcher.is_message_handler(type_, from_, cb)\n", "role": "user" }, { "content": "is_message_handler", "role": "assistant" } ]
def x(type_, from_, cb): import aioxmpp.dispatcher return aioxmpp.dispatcher.is_presence_handler(type_, from_, cb)
is_presence_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(type_, from_, cb):\n import aioxmpp.dispatcher\n return aioxmpp.dispatcher.is_presence_handler(type_, from_, cb)\n", "role": "user" }, { "content": "is_presence_handler", "role": "assistant" } ]
def x(cb): try: handlers = get_magic_attr(cb) except AttributeError: return False hs = HandlerSpec((_apply_inbound_message_filter, ())) return hs in handlers
is_inbound_message_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_inbound_message_filter, ()))\n return hs in handlers\n", "role": "user" }, { "content": "is_inbound_message_filter", "role": "assistant" } ]
def x(cb): try: handlers = get_magic_attr(cb) except AttributeError: return False hs = HandlerSpec((_apply_inbound_presence_filter, ())) return hs in handlers
is_inbound_presence_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_inbound_presence_filter, ()))\n return hs in handlers\n", "role": "user" }, { "content": "is_inbound_presence_filter", "role": "assistant" } ]
def x(cb): try: handlers = get_magic_attr(cb) except AttributeError: return False hs = HandlerSpec((_apply_outbound_message_filter, ())) return hs in handlers
is_outbound_message_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_outbound_message_filter, ()))\n return hs in handlers\n", "role": "user" }, { "content": "is_outbound_message_filter", "role": "assistant" } ]
def x(cb): try: handlers = get_magic_attr(cb) except AttributeError: return False hs = HandlerSpec((_apply_outbound_presence_filter, ())) return hs in handlers
is_outbound_presence_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_outbound_presence_filter, ()))\n return hs in handlers\n", "role": "user" }, { "content": "is_outbound_presence_filter", "role": "assistant" } ]
def x(class_, signal_name, cb, *, defer=False): try: handlers = get_magic_attr(cb) except AttributeError: return False return _depsignal_spec(class_, signal_name, cb, defer) in handlers
is_depsignal_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(class_, signal_name, cb, *, defer=False):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n return _depsignal_spec(class_, signal_name, cb, defer) in handlers\n", "role": "user" }, { "content": "is_depsignal_handler", "role": "assistant" } ]
def x(class_, filter_name, filter_): try: handlers = get_magic_attr(filter_) except AttributeError: return False return _depfilter_spec(class_, filter_name) in handlers
is_depfilter_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(class_, filter_name, filter_):\n try:\n handlers = get_magic_attr(filter_)\n except AttributeError:\n return False\n return _depfilter_spec(class_, filter_name) in handlers\n", "role": "user" }, { "content": "is_depfilter_handler", "role": "assistant" } ]
def x(descriptor, signal_name, cb, *, defer=False): try: handlers = get_magic_attr(cb) except AttributeError: return False return _attrsignal_spec(descriptor, signal_name, cb, defer) in handlers
is_attrsignal_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(descriptor, signal_name, cb, *, defer=False):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n return _attrsignal_spec(descriptor, signal_name, cb, defer) in handlers\n", "role": "user" }, { "content": "is_attrsignal_handler", "role": "assistant" } ]
def x(self, instance, stack): cm = self.init_cm(instance) obj = stack.enter_context(cm) self._data[instance] = cm, obj return obj
add_to_stack
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, instance, stack):\n cm = self.init_cm(instance)\n obj = stack.enter_context(cm)\n self._data[instance] = cm, obj\n return obj\n", "role": "user" }, { "content": "add_to_stack", "role": "assistant" } ]
def x(self, other, *, visited=None): return self.orders_after_any(frozenset([other]), visited=visited)
orders_after
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, other, *, visited=None):\n return self.orders_after_any(frozenset([other]), visited=visited)\n", "role": "user" }, { "content": "orders_after", "role": "assistant" } ]
def x(self, other, *, visited=None): if not other: return False if visited is None: visited = set() elif self in visited: return False visited.add(self) for item in self.PATCHED_ORDER_AFTER: if item in visited: continue if item in other: return True if item.orders_after_any(other, visited=visited): return True return False
orders_after_any
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, other, *, visited=None):\n if not other:\n return False\n if visited is None:\n visited = set()\n elif self in visited:\n return False\n visited.add(self)\n for item in self.PATCHED_ORDER_AFTER:\n if item in visited:\n continue\n if item in other:\n return True\n if item.orders_after_any(other, visited=visited):\n return True\n return False\n", "role": "user" }, { "content": "orders_after_any", "role": "assistant" } ]
def x(self, other): if self is other: return False return not self.orders_after(other) and not other.orders_after(self)
independent_from
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, other):\n if self is other:\n return False\n return not self.orders_after(other) and not other.orders_after(self)\n", "role": "user" }, { "content": "independent_from", "role": "assistant" } ]
def x(self, logger): parts = type(self).__module__.split('.')[1:] if parts[-1] == 'service' and len(parts) > 1: del parts[-1] return logger.getChild('.'.join(parts + [type(self).__qualname__]))
derive_logger
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, logger):\n parts = type(self).__module__.split('.')[1:]\n if parts[-1] == 'service' and len(parts) > 1:\n del parts[-1]\n return logger.getChild('.'.join(parts + [type(self).__qualname__]))\n", "role": "user" }, { "content": "derive_logger", "role": "assistant" } ]
def x(self, group, new_limit): if new_limit is None: self._group_limits.pop(group, None) return self._group_limits[group] = new_limit
set_limit
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, group, new_limit):\n if new_limit is None:\n self._group_limits.pop(group, None)\n return\n self._group_limits[group] = new_limit\n", "role": "user" }, { "content": "set_limit", "role": "assistant" } ]
def x(self, __groups, __coro_fun, *args, **kwargs): __groups = set(__groups) | {()} return asyncio.ensure_future(__coro_fun(*args, **kwargs))
spawn
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, __groups, __coro_fun, *args, **kwargs):\n __groups = set(__groups) | {()}\n return asyncio.ensure_future(__coro_fun(*args, **kwargs))\n", "role": "user" }, { "content": "spawn", "role": "assistant" } ]
def x(self): yield from self._check_for_feature() iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Enable()) yield from self.client.send(iq)
enable
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n yield from self._check_for_feature()\n iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Enable())\n yield from self.client.send(iq)\n", "role": "user" }, { "content": "enable", "role": "assistant" } ]
def x(self): yield from self._check_for_feature() iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Disable()) yield from self.client.send(iq)
disable
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n yield from self._check_for_feature()\n iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Disable())\n yield from self.client.send(iq)\n", "role": "user" }, { "content": "disable", "role": "assistant" } ]
def x(stream, type_, payload_cls, coro, *, with_send_reply=False): stream.register_iq_request_handler(type_, payload_cls, coro, with_send_reply=with_send_reply) try: yield finally: stream.unregister_iq_request_handler(type_, payload_cls)
iq_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(stream, type_, payload_cls, coro, *, with_send_reply=False):\n stream.register_iq_request_handler(type_, payload_cls, coro,\n with_send_reply=with_send_reply)\n try:\n yield\n finally:\n stream.unregister_iq_request_handler(type_, payload_cls)\n", "role": "user" }, { "content": "iq_handler", "role": "assistant" } ]
def x(stream, type_, from_, cb): stream.register_message_callback(type_, from_, cb) try: yield finally: stream.unregister_message_callback(type_, from_)
message_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(stream, type_, from_, cb):\n stream.register_message_callback(type_, from_, cb)\n try:\n yield\n finally:\n stream.unregister_message_callback(type_, from_)\n", "role": "user" }, { "content": "message_handler", "role": "assistant" } ]
def x(stream, type_, from_, cb): stream.register_presence_callback(type_, from_, cb) try: yield finally: stream.unregister_presence_callback(type_, from_)
presence_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(stream, type_, from_, cb):\n stream.register_presence_callback(type_, from_, cb)\n try:\n yield\n finally:\n stream.unregister_presence_callback(type_, from_)\n", "role": "user" }, { "content": "presence_handler", "role": "assistant" } ]
def x(filter_, func, order=_Undefined): if order is not _Undefined: return filter_.context_register(func, order) else: return filter_.context_register(func)
stanza_filter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filter_, func, order=_Undefined):\n if order is not _Undefined:\n return filter_.context_register(func, order)\n else:\n return filter_.context_register(func)\n", "role": "user" }, { "content": "stanza_filter", "role": "assistant" } ]
def x(self): if (self._state != StanzaState.ACTIVE and self._state != StanzaState. ABORTED): raise RuntimeError('cannot abort stanza (already sent)') self._set_state(StanzaState.ABORTED)
abort
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if (self._state != StanzaState.ACTIVE and self._state != StanzaState.\n ABORTED):\n raise RuntimeError('cannot abort stanza (already sent)')\n self._set_state(StanzaState.ABORTED)\n", "role": "user" }, { "content": "abort", "role": "assistant" } ]
def x(self, task): try: task.result() except asyncio.CancelledError: pass except Exception as err: try: if self._sm_enabled: self._xmlstream.abort() else: self._xmlstream.close() except Exception: pass self.on_failure(err) self._logger.exception('broker task failed')
done_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, task):\n try:\n task.result()\n except asyncio.CancelledError:\n pass\n except Exception as err:\n try:\n if self._sm_enabled:\n self._xmlstream.abort()\n else:\n self._xmlstream.close()\n except Exception:\n pass\n self.on_failure(err)\n self._logger.exception('broker task failed')\n", "role": "user" }, { "content": "done_handler", "role": "assistant" } ]
def x(self, exc): self._logger.debug('destroying stream state (exc=%r)', exc) self._iq_response_map.close_all(exc) for task in self._iq_request_tasks: task.cancel() while not self._active_queue.empty(): token = self._active_queue.get_nowait() token._set_state(StanzaState.DISCONNECTED) if self._established: self.on_stream_destroyed(exc) self._established = False
destroy_stream_state
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, exc):\n self._logger.debug('destroying stream state (exc=%r)', exc)\n self._iq_response_map.close_all(exc)\n for task in self._iq_request_tasks:\n task.cancel()\n while not self._active_queue.empty():\n token = self._active_queue.get_nowait()\n token._set_state(StanzaState.DISCONNECTED)\n if self._established:\n self.on_stream_destroyed(exc)\n self._established = False\n", "role": "user" }, { "content": "destroy_stream_state", "role": "assistant" } ]
def x(self, request, task): try: payload = task.result() except errors.XMPPError as err: self._send_iq_reply(request, err) except Exception: response = self._compose_undefined_condition(request) self._enqueue(response) self._logger.exception('IQ request coroutine failed') else: self._send_iq_reply(request, payload)
iq_request_coro_done_send_reply
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, request, task):\n try:\n payload = task.result()\n except errors.XMPPError as err:\n self._send_iq_reply(request, err)\n except Exception:\n response = self._compose_undefined_condition(request)\n self._enqueue(response)\n self._logger.exception('IQ request coroutine failed')\n else:\n self._send_iq_reply(request, payload)\n", "role": "user" }, { "content": "iq_request_coro_done_send_reply", "role": "assistant" } ]
def x(self, stanza_obj): self._logger.debug('incoming iq: %r', stanza_obj) if stanza_obj.type_.is_response: self._logger.debug('iq is response') keys = [(stanza_obj.from_, stanza_obj.id_)] if self._local_jid is not None: if keys[0][0] == self._local_jid: keys.append((None, keys[0][1])) elif keys[0][0] is None: keys.append((self._local_jid, keys[0][1])) for key in keys: try: self._iq_response_map.unicast(key, stanza_obj) self._logger.debug('iq response delivered to key %r', key) break except KeyError: pass else: self._logger.warning('unexpected IQ response: from=%r, id=%r', *key ) else: self._logger.debug('iq is request') key = stanza_obj.type_, type(stanza_obj.payload) try: coro, with_send_reply = self._iq_request_map[key] except KeyError: self._logger.warning( 'unhandleable IQ request: from=%r, type_=%r, payload=%r', stanza_obj.from_, stanza_obj.type_, stanza_obj.payload) response = stanza_obj.make_reply(type_=structs.IQType.ERROR) response.error = stanza.Error(condition=errors.ErrorCondition. SERVICE_UNAVAILABLE) self._enqueue(response) return args = [stanza_obj] if with_send_reply: def x(result=None): nonlocal task, stanza_obj, send_reply_callback if task.done(): raise RuntimeError( 'send_reply called after the handler is done') if task.remove_done_callback(send_reply_callback) == 0: raise RuntimeError('send_reply called more than once') task.add_done_callback(self._iq_request_coro_done_check) self._send_iq_reply(stanza_obj, result) args.append(send_reply) try: awaitable = coro(*args) except Exception as exc: awaitable = asyncio.Future() awaitable.set_exception(exc) task = asyncio.ensure_future(awaitable) send_reply_callback = functools.partial(self. _iq_request_coro_done_send_reply, stanza_obj) task.add_done_callback(self._iq_request_coro_done_remove_task) task.add_done_callback(send_reply_callback) self._iq_request_tasks.append(task) self._logger.debug('started task to handle request: %r', task)
process_incoming_iq
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, stanza_obj):\n self._logger.debug('incoming iq: %r', stanza_obj)\n if stanza_obj.type_.is_response:\n self._logger.debug('iq is response')\n keys = [(stanza_obj.from_, stanza_obj.id_)]\n if self._local_jid is not None:\n if keys[0][0] == self._local_jid:\n keys.append((None, keys[0][1]))\n elif keys[0][0] is None:\n keys.append((self._local_jid, keys[0][1]))\n for key in keys:\n try:\n self._iq_response_map.unicast(key, stanza_obj)\n self._logger.debug('iq response delivered to key %r', key)\n break\n except KeyError:\n pass\n else:\n self._logger.warning('unexpected IQ response: from=%r, id=%r', *key\n )\n else:\n self._logger.debug('iq is request')\n key = stanza_obj.type_, type(stanza_obj.payload)\n try:\n coro, with_send_reply = self._iq_request_map[key]\n except KeyError:\n self._logger.warning(\n 'unhandleable IQ request: from=%r, type_=%r, payload=%r',\n stanza_obj.from_, stanza_obj.type_, stanza_obj.payload)\n response = stanza_obj.make_reply(type_=structs.IQType.ERROR)\n response.error = stanza.Error(condition=errors.ErrorCondition.\n SERVICE_UNAVAILABLE)\n self._enqueue(response)\n return\n args = [stanza_obj]\n if with_send_reply:\n\n def x(result=None):\n nonlocal task, stanza_obj, send_reply_callback\n if task.done():\n raise RuntimeError(\n 'send_reply called after the handler is done')\n if task.remove_done_callback(send_reply_callback) == 0:\n raise RuntimeError('send_reply called more than once')\n task.add_done_callback(self._iq_request_coro_done_check)\n self._send_iq_reply(stanza_obj, result)\n args.append(send_reply)\n try:\n awaitable = coro(*args)\n except Exception as exc:\n awaitable = asyncio.Future()\n awaitable.set_exception(exc)\n task = asyncio.ensure_future(awaitable)\n send_reply_callback = functools.partial(self.\n _iq_request_coro_done_send_reply, stanza_obj)\n task.add_done_callback(self._iq_request_coro_done_remove_task)\n task.add_done_callback(send_reply_callback)\n self._iq_request_tasks.append(task)\n self._logger.debug('started task to handle request: %r', task)\n", "role": "user" }, { "content": "process_incoming_iq", "role": "assistant" } ]
def x(self, stanza_obj): self._logger.debug('incoming message: %r', stanza_obj) stanza_obj = self.service_inbound_message_filter.filter(stanza_obj) if stanza_obj is None: self._logger.debug('incoming message dropped by service filter chain') return stanza_obj = self.app_inbound_message_filter.filter(stanza_obj) if stanza_obj is None: self._logger.debug( 'incoming message dropped by application filter chain') return self.on_message_received(stanza_obj)
process_incoming_message
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, stanza_obj):\n self._logger.debug('incoming message: %r', stanza_obj)\n stanza_obj = self.service_inbound_message_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug('incoming message dropped by service filter chain')\n return\n stanza_obj = self.app_inbound_message_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug(\n 'incoming message dropped by application filter chain')\n return\n self.on_message_received(stanza_obj)\n", "role": "user" }, { "content": "process_incoming_message", "role": "assistant" } ]
def x(self, stanza_obj): self._logger.debug('incoming presence: %r', stanza_obj) stanza_obj = self.service_inbound_presence_filter.filter(stanza_obj) if stanza_obj is None: self._logger.debug('incoming presence dropped by service filter chain') return stanza_obj = self.app_inbound_presence_filter.filter(stanza_obj) if stanza_obj is None: self._logger.debug( 'incoming presence dropped by application filter chain') return self.on_presence_received(stanza_obj)
process_incoming_presence
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, stanza_obj):\n self._logger.debug('incoming presence: %r', stanza_obj)\n stanza_obj = self.service_inbound_presence_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug('incoming presence dropped by service filter chain')\n return\n stanza_obj = self.app_inbound_presence_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug(\n 'incoming presence dropped by application filter chain')\n return\n self.on_presence_received(stanza_obj)\n", "role": "user" }, { "content": "process_incoming_presence", "role": "assistant" } ]
def x(self, xmlstream, queue_entry): stanza_obj, exc = queue_entry if isinstance(stanza_obj, nonza.SMAcknowledgement): self._logger.debug('received SM ack: %r', stanza_obj) if not self._sm_enabled: self._logger.warning('received SM ack, but SM not enabled') return self.sm_ack(stanza_obj.counter) return elif isinstance(stanza_obj, nonza.SMRequest): self._logger.debug('received SM request: %r', stanza_obj) if not self._sm_enabled: self._logger.warning('received SM request, but SM not enabled') return response = nonza.SMAcknowledgement() response.counter = self._sm_inbound_ctr self._logger.debug('sending SM ack: %r', response) xmlstream.send_xso(response) return if not isinstance(stanza_obj, stanza.StanzaBase): raise RuntimeError('unexpected stanza class: {}'.format(stanza_obj)) if self._sm_enabled: self._sm_inbound_ctr += 1 self._sm_inbound_ctr &= 4294967295 if exc is not None: self._process_incoming_erroneous_stanza(stanza_obj, exc) return if isinstance(stanza_obj, stanza.IQ): self._process_incoming_iq(stanza_obj) elif isinstance(stanza_obj, stanza.Message): self._process_incoming_message(stanza_obj) elif isinstance(stanza_obj, stanza.Presence): self._process_incoming_presence(stanza_obj)
process_incoming
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, xmlstream, queue_entry):\n stanza_obj, exc = queue_entry\n if isinstance(stanza_obj, nonza.SMAcknowledgement):\n self._logger.debug('received SM ack: %r', stanza_obj)\n if not self._sm_enabled:\n self._logger.warning('received SM ack, but SM not enabled')\n return\n self.sm_ack(stanza_obj.counter)\n return\n elif isinstance(stanza_obj, nonza.SMRequest):\n self._logger.debug('received SM request: %r', stanza_obj)\n if not self._sm_enabled:\n self._logger.warning('received SM request, but SM not enabled')\n return\n response = nonza.SMAcknowledgement()\n response.counter = self._sm_inbound_ctr\n self._logger.debug('sending SM ack: %r', response)\n xmlstream.send_xso(response)\n return\n if not isinstance(stanza_obj, stanza.StanzaBase):\n raise RuntimeError('unexpected stanza class: {}'.format(stanza_obj))\n if self._sm_enabled:\n self._sm_inbound_ctr += 1\n self._sm_inbound_ctr &= 4294967295\n if exc is not None:\n self._process_incoming_erroneous_stanza(stanza_obj, exc)\n return\n if isinstance(stanza_obj, stanza.IQ):\n self._process_incoming_iq(stanza_obj)\n elif isinstance(stanza_obj, stanza.Message):\n self._process_incoming_message(stanza_obj)\n elif isinstance(stanza_obj, stanza.Presence):\n self._process_incoming_presence(stanza_obj)\n", "role": "user" }, { "content": "process_incoming", "role": "assistant" } ]
def x(self): while True: try: stanza_obj = self._incoming_queue.get_nowait() except asyncio.QueueEmpty: break self._process_incoming(None, stanza_obj)
flush_incoming
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n while True:\n try:\n stanza_obj = self._incoming_queue.get_nowait()\n except asyncio.QueueEmpty:\n break\n self._process_incoming(None, stanza_obj)\n", "role": "user" }, { "content": "flush_incoming", "role": "assistant" } ]
def x(self, xmlstream, token): if token.state == StanzaState.ABORTED: return stanza_obj = token.stanza if isinstance(stanza_obj, stanza.Presence): stanza_obj = self.app_outbound_presence_filter.filter(stanza_obj) if stanza_obj is not None: stanza_obj = self.service_outbound_presence_filter.filter( stanza_obj) elif isinstance(stanza_obj, stanza.Message): stanza_obj = self.app_outbound_message_filter.filter(stanza_obj) if stanza_obj is not None: stanza_obj = self.service_outbound_message_filter.filter(stanza_obj ) if stanza_obj is None: token._set_state(StanzaState.DROPPED) self._logger.debug('outgoing stanza %r dropped by filter chain', token.stanza) return self._logger.debug('forwarding stanza to xmlstream: %r', stanza_obj) try: xmlstream.send_xso(stanza_obj) except Exception as exc: self._logger.warning('failed to send stanza', exc_info=True) token._set_state(StanzaState.FAILED, exc) return if self._sm_enabled: token._set_state(StanzaState.SENT) self._sm_unacked_list.append(token) else: token._set_state(StanzaState.SENT_WITHOUT_SM)
send_stanza
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, xmlstream, token):\n if token.state == StanzaState.ABORTED:\n return\n stanza_obj = token.stanza\n if isinstance(stanza_obj, stanza.Presence):\n stanza_obj = self.app_outbound_presence_filter.filter(stanza_obj)\n if stanza_obj is not None:\n stanza_obj = self.service_outbound_presence_filter.filter(\n stanza_obj)\n elif isinstance(stanza_obj, stanza.Message):\n stanza_obj = self.app_outbound_message_filter.filter(stanza_obj)\n if stanza_obj is not None:\n stanza_obj = self.service_outbound_message_filter.filter(stanza_obj\n )\n if stanza_obj is None:\n token._set_state(StanzaState.DROPPED)\n self._logger.debug('outgoing stanza %r dropped by filter chain',\n token.stanza)\n return\n self._logger.debug('forwarding stanza to xmlstream: %r', stanza_obj)\n try:\n xmlstream.send_xso(stanza_obj)\n except Exception as exc:\n self._logger.warning('failed to send stanza', exc_info=True)\n token._set_state(StanzaState.FAILED, exc)\n return\n if self._sm_enabled:\n token._set_state(StanzaState.SENT)\n self._sm_unacked_list.append(token)\n else:\n token._set_state(StanzaState.SENT_WITHOUT_SM)\n", "role": "user" }, { "content": "send_stanza", "role": "assistant" } ]
def x(self, xmlstream, token): self._send_stanza(xmlstream, token) while True: try: token = self._active_queue.get_nowait() except asyncio.QueueEmpty: break self._send_stanza(xmlstream, token) if self._sm_enabled: self._logger.debug('sending SM req') xmlstream.send_xso(nonza.SMRequest())
process_outgoing
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, xmlstream, token):\n self._send_stanza(xmlstream, token)\n while True:\n try:\n token = self._active_queue.get_nowait()\n except asyncio.QueueEmpty:\n break\n self._send_stanza(xmlstream, token)\n if self._sm_enabled:\n self._logger.debug('sending SM req')\n xmlstream.send_xso(nonza.SMRequest())\n", "role": "user" }, { "content": "process_outgoing", "role": "assistant" } ]
def x(self, from_, id_, cb): self._iq_response_map.add_listener((from_, id_), callbacks. OneshotAsyncTagListener(cb, loop=self._loop)) self._logger.debug('iq response callback registered: from=%r, id=%r', from_, id_)
register_iq_response_callback
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, from_, id_, cb):\n self._iq_response_map.add_listener((from_, id_), callbacks.\n OneshotAsyncTagListener(cb, loop=self._loop))\n self._logger.debug('iq response callback registered: from=%r, id=%r',\n from_, id_)\n", "role": "user" }, { "content": "register_iq_response_callback", "role": "assistant" } ]
def x(self, from_, id_, fut): self._iq_response_map.add_listener((from_, id_), StanzaErrorAwareListener(callbacks.FutureListener(fut))) self._logger.debug('iq response future registered: from=%r, id=%r', from_, id_)
register_iq_response_future
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, from_, id_, fut):\n self._iq_response_map.add_listener((from_, id_),\n StanzaErrorAwareListener(callbacks.FutureListener(fut)))\n self._logger.debug('iq response future registered: from=%r, id=%r',\n from_, id_)\n", "role": "user" }, { "content": "register_iq_response_future", "role": "assistant" } ]
def x(self, from_, id_): self._iq_response_map.remove_listener((from_, id_)) self._logger.debug('iq response unregistered: from=%r, id=%r', from_, id_)
unregister_iq_response
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, from_, id_):\n self._iq_response_map.remove_listener((from_, id_))\n self._logger.debug('iq response unregistered: from=%r, id=%r', from_, id_)\n", "role": "user" }, { "content": "unregister_iq_response", "role": "assistant" } ]
def x(self, type_, payload_cls, coro): warnings.warn( 'register_iq_request_coro is a deprecated alias to register_iq_request_handler and will be removed in aioxmpp 1.0' , DeprecationWarning, stacklevel=2) return self.register_iq_request_handler(type_, payload_cls, coro)
register_iq_request_coro
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, type_, payload_cls, coro):\n warnings.warn(\n 'register_iq_request_coro is a deprecated alias to register_iq_request_handler and will be removed in aioxmpp 1.0'\n , DeprecationWarning, stacklevel=2)\n return self.register_iq_request_handler(type_, payload_cls, coro)\n", "role": "user" }, { "content": "register_iq_request_coro", "role": "assistant" } ]
def x(self, type_, payload_cls, cb, *, with_send_reply=False): type_ = self._coerce_enum(type_, structs.IQType) if not type_.is_request: raise ValueError('{!r} is not a request IQType'.format(type_)) key = type_, payload_cls if key in self._iq_request_map: raise ValueError('only one listener is allowed per tag') self._iq_request_map[key] = cb, with_send_reply self._logger.debug('iq request coroutine registered: type=%r, payload=%r', type_, payload_cls)
register_iq_request_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, type_, payload_cls, cb, *, with_send_reply=False):\n type_ = self._coerce_enum(type_, structs.IQType)\n if not type_.is_request:\n raise ValueError('{!r} is not a request IQType'.format(type_))\n key = type_, payload_cls\n if key in self._iq_request_map:\n raise ValueError('only one listener is allowed per tag')\n self._iq_request_map[key] = cb, with_send_reply\n self._logger.debug('iq request coroutine registered: type=%r, payload=%r',\n type_, payload_cls)\n", "role": "user" }, { "content": "register_iq_request_handler", "role": "assistant" } ]
def x(self, type_, payload_cls): type_ = self._coerce_enum(type_, structs.IQType) del self._iq_request_map[type_, payload_cls] self._logger.debug('iq request coroutine unregistered: type=%r, payload=%r' , type_, payload_cls)
unregister_iq_request_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, type_, payload_cls):\n type_ = self._coerce_enum(type_, structs.IQType)\n del self._iq_request_map[type_, payload_cls]\n self._logger.debug('iq request coroutine unregistered: type=%r, payload=%r'\n , type_, payload_cls)\n", "role": "user" }, { "content": "unregister_iq_request_handler", "role": "assistant" } ]
def x(self, type_, from_, cb): if type_ is not None: type_ = self._coerce_enum(type_, structs.MessageType) warnings.warn( 'register_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead' , DeprecationWarning, stacklevel=2) self._xxx_message_dispatcher.register_callback(type_, from_, cb)
register_message_callback
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, type_, from_, cb):\n if type_ is not None:\n type_ = self._coerce_enum(type_, structs.MessageType)\n warnings.warn(\n 'register_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_message_dispatcher.register_callback(type_, from_, cb)\n", "role": "user" }, { "content": "register_message_callback", "role": "assistant" } ]
def x(self, type_, from_): if type_ is not None: type_ = self._coerce_enum(type_, structs.MessageType) warnings.warn( 'unregister_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead' , DeprecationWarning, stacklevel=2) self._xxx_message_dispatcher.unregister_callback(type_, from_)
unregister_message_callback
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, type_, from_):\n if type_ is not None:\n type_ = self._coerce_enum(type_, structs.MessageType)\n warnings.warn(\n 'unregister_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_message_dispatcher.unregister_callback(type_, from_)\n", "role": "user" }, { "content": "unregister_message_callback", "role": "assistant" } ]
def x(self, type_, from_, cb): type_ = self._coerce_enum(type_, structs.PresenceType) warnings.warn( 'register_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead' , DeprecationWarning, stacklevel=2) self._xxx_presence_dispatcher.register_callback(type_, from_, cb)
register_presence_callback
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, type_, from_, cb):\n type_ = self._coerce_enum(type_, structs.PresenceType)\n warnings.warn(\n 'register_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_presence_dispatcher.register_callback(type_, from_, cb)\n", "role": "user" }, { "content": "register_presence_callback", "role": "assistant" } ]
def x(self, type_, from_): type_ = self._coerce_enum(type_, structs.PresenceType) warnings.warn( 'unregister_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead' , DeprecationWarning, stacklevel=2) self._xxx_presence_dispatcher.unregister_callback(type_, from_)
unregister_presence_callback
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, type_, from_):\n type_ = self._coerce_enum(type_, structs.PresenceType)\n warnings.warn(\n 'unregister_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_presence_dispatcher.unregister_callback(type_, from_)\n", "role": "user" }, { "content": "unregister_presence_callback", "role": "assistant" } ]
def x(self, xmlstream): if self.running: raise RuntimeError('already started') self._start_prepare(xmlstream, self.recv_stanza) self._closed = False self._start_commit(xmlstream)
start
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, xmlstream):\n if self.running:\n raise RuntimeError('already started')\n self._start_prepare(xmlstream, self.recv_stanza)\n self._closed = False\n self._start_commit(xmlstream)\n", "role": "user" }, { "content": "start", "role": "assistant" } ]
def x(self): if not self.running: return self._logger.debug('sending stop signal to task') self._task.cancel()
stop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self.running:\n return\n self._logger.debug('sending stop signal to task')\n self._task.cancel()\n", "role": "user" }, { "content": "stop", "role": "assistant" } ]
def x(self): if not self.running: return self.stop() try: yield from self._task except asyncio.CancelledError: pass
wait_stop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self.running:\n return\n self.stop()\n try:\n yield from self._task\n except asyncio.CancelledError:\n pass\n", "role": "user" }, { "content": "wait_stop", "role": "assistant" } ]
def x(self): exc = DestructionRequested('close() called') if self.running: if self.sm_enabled: self._xmlstream.send_xso(nonza.SMAcknowledgement(counter=self. _sm_inbound_ctr)) yield from self._xmlstream.close_and_wait() yield from self.wait_stop() self._closed = True self._xmlstream_exception = exc self._destroy_stream_state(self._xmlstream_exception) if self.sm_enabled: self.stop_sm()
close
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n exc = DestructionRequested('close() called')\n if self.running:\n if self.sm_enabled:\n self._xmlstream.send_xso(nonza.SMAcknowledgement(counter=self.\n _sm_inbound_ctr))\n yield from self._xmlstream.close_and_wait()\n yield from self.wait_stop()\n self._closed = True\n self._xmlstream_exception = exc\n self._destroy_stream_state(self._xmlstream_exception)\n if self.sm_enabled:\n self.stop_sm()\n", "role": "user" }, { "content": "close", "role": "assistant" } ]
def x(self, request_resumption=True, resumption_timeout=None): if not self.running: raise RuntimeError( 'cannot start Stream Management while StanzaStream is not running') if self.sm_enabled: raise RuntimeError('Stream Management already enabled') if resumption_timeout == 0: request_resumption = False resumption_timeout = None def x(response): if isinstance(response, nonza.SMFailed): return self._sm_outbound_base = 0 self._sm_inbound_ctr = 0 self._sm_unacked_list = [] self._sm_enabled = True self._sm_id = response.id_ self._sm_resumable = response.resume self._sm_max = response.max_ self._sm_location = response.location self._logger.info('SM started: resumable=%s, stream id=%r', self. _sm_resumable, self._sm_id) self._xmlstream.stanza_parser.add_class(nonza.SMRequest, self. recv_stanza) self._xmlstream.stanza_parser.add_class(nonza.SMAcknowledgement, self.recv_stanza) with (yield from self._broker_lock): response = yield from protocol.send_and_wait_for(self._xmlstream, [ nonza.SMEnable(resume=bool(request_resumption), max_= resumption_timeout)], [nonza.SMEnabled, nonza.SMFailed], cb= handle_response) if isinstance(response, nonza.SMFailed): raise errors.StreamNegotiationFailure('Server rejected SM request')
start_sm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, request_resumption=True, resumption_timeout=None):\n if not self.running:\n raise RuntimeError(\n 'cannot start Stream Management while StanzaStream is not running')\n if self.sm_enabled:\n raise RuntimeError('Stream Management already enabled')\n if resumption_timeout == 0:\n request_resumption = False\n resumption_timeout = None\n\n def x(response):\n if isinstance(response, nonza.SMFailed):\n return\n self._sm_outbound_base = 0\n self._sm_inbound_ctr = 0\n self._sm_unacked_list = []\n self._sm_enabled = True\n self._sm_id = response.id_\n self._sm_resumable = response.resume\n self._sm_max = response.max_\n self._sm_location = response.location\n self._logger.info('SM started: resumable=%s, stream id=%r', self.\n _sm_resumable, self._sm_id)\n self._xmlstream.stanza_parser.add_class(nonza.SMRequest, self.\n recv_stanza)\n self._xmlstream.stanza_parser.add_class(nonza.SMAcknowledgement,\n self.recv_stanza)\n with (yield from self._broker_lock):\n response = yield from protocol.send_and_wait_for(self._xmlstream, [\n nonza.SMEnable(resume=bool(request_resumption), max_=\n resumption_timeout)], [nonza.SMEnabled, nonza.SMFailed], cb=\n handle_response)\n if isinstance(response, nonza.SMFailed):\n raise errors.StreamNegotiationFailure('Server rejected SM request')\n", "role": "user" }, { "content": "start_sm", "role": "assistant" } ]
def x(self, remote_ctr): self._logger.info('resuming SM stream with remote_ctr=%d', remote_ctr) self.sm_ack(remote_ctr) for token in self._sm_unacked_list: self._active_queue.putleft_nowait(token) self._sm_unacked_list.clear()
resume_sm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, remote_ctr):\n self._logger.info('resuming SM stream with remote_ctr=%d', remote_ctr)\n self.sm_ack(remote_ctr)\n for token in self._sm_unacked_list:\n self._active_queue.putleft_nowait(token)\n self._sm_unacked_list.clear()\n", "role": "user" }, { "content": "resume_sm", "role": "assistant" } ]
def x(self, xmlstream): if self.running: raise RuntimeError( 'Cannot resume Stream Management while StanzaStream is running') self._start_prepare(xmlstream, self.recv_stanza) try: response = yield from protocol.send_and_wait_for(xmlstream, [nonza. SMResume(previd=self.sm_id, counter=self._sm_inbound_ctr)], [ nonza.SMResumed, nonza.SMFailed]) if isinstance(response, nonza.SMFailed): exc = errors.StreamNegotiationFailure( 'Server rejected SM resumption') if response.counter is not None: self.sm_ack(response.counter) self._clear_unacked(StanzaState.DISCONNECTED) xmlstream.stanza_parser.remove_class(nonza.SMRequest) xmlstream.stanza_parser.remove_class(nonza.SMAcknowledgement) self.stop_sm() raise exc self._resume_sm(response.counter) except: self._start_rollback(xmlstream) raise self._start_commit(xmlstream)
resume_sm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, xmlstream):\n if self.running:\n raise RuntimeError(\n 'Cannot resume Stream Management while StanzaStream is running')\n self._start_prepare(xmlstream, self.recv_stanza)\n try:\n response = yield from protocol.send_and_wait_for(xmlstream, [nonza.\n SMResume(previd=self.sm_id, counter=self._sm_inbound_ctr)], [\n nonza.SMResumed, nonza.SMFailed])\n if isinstance(response, nonza.SMFailed):\n exc = errors.StreamNegotiationFailure(\n 'Server rejected SM resumption')\n if response.counter is not None:\n self.sm_ack(response.counter)\n self._clear_unacked(StanzaState.DISCONNECTED)\n xmlstream.stanza_parser.remove_class(nonza.SMRequest)\n xmlstream.stanza_parser.remove_class(nonza.SMAcknowledgement)\n self.stop_sm()\n raise exc\n self._resume_sm(response.counter)\n except:\n self._start_rollback(xmlstream)\n raise\n self._start_commit(xmlstream)\n", "role": "user" }, { "content": "resume_sm", "role": "assistant" } ]
def x(self): if not self.sm_enabled: raise RuntimeError('Stream Management is not enabled') self._logger.info('stopping SM stream') self._sm_enabled = False del self._sm_outbound_base del self._sm_inbound_ctr self._clear_unacked(StanzaState.SENT_WITHOUT_SM) del self._sm_unacked_list self._destroy_stream_state(ConnectionError('stream management disabled'))
stop_sm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self.sm_enabled:\n raise RuntimeError('Stream Management is not enabled')\n self._logger.info('stopping SM stream')\n self._sm_enabled = False\n del self._sm_outbound_base\n del self._sm_inbound_ctr\n self._clear_unacked(StanzaState.SENT_WITHOUT_SM)\n del self._sm_unacked_list\n self._destroy_stream_state(ConnectionError('stream management disabled'))\n", "role": "user" }, { "content": "stop_sm", "role": "assistant" } ]
def x(self, remote_ctr): if not self._sm_enabled: raise RuntimeError('Stream Management is not enabled') self._logger.debug('sm_ack(%d)', remote_ctr) to_drop = remote_ctr - self._sm_outbound_base & 4294967295 self._logger.debug('sm_ack: to drop %d, unacked: %d', to_drop, len(self ._sm_unacked_list)) if to_drop > len(self._sm_unacked_list): raise errors.StreamNegotiationFailure( 'acked more stanzas than have been sent (outbound_base={}, remote_ctr={})' .format(self._sm_outbound_base, remote_ctr)) acked = self._sm_unacked_list[:to_drop] del self._sm_unacked_list[:to_drop] self._sm_outbound_base = remote_ctr if acked: self._logger.debug('%d stanzas acked by remote', len(acked)) for token in acked: token._set_state(StanzaState.ACKED)
sm_ack
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, remote_ctr):\n if not self._sm_enabled:\n raise RuntimeError('Stream Management is not enabled')\n self._logger.debug('sm_ack(%d)', remote_ctr)\n to_drop = remote_ctr - self._sm_outbound_base & 4294967295\n self._logger.debug('sm_ack: to drop %d, unacked: %d', to_drop, len(self\n ._sm_unacked_list))\n if to_drop > len(self._sm_unacked_list):\n raise errors.StreamNegotiationFailure(\n 'acked more stanzas than have been sent (outbound_base={}, remote_ctr={})'\n .format(self._sm_outbound_base, remote_ctr))\n acked = self._sm_unacked_list[:to_drop]\n del self._sm_unacked_list[:to_drop]\n self._sm_outbound_base = remote_ctr\n if acked:\n self._logger.debug('%d stanzas acked by remote', len(acked))\n for token in acked:\n token._set_state(StanzaState.ACKED)\n", "role": "user" }, { "content": "sm_ack", "role": "assistant" } ]
def x(self, iq, *, timeout=None): warnings.warn( 'send_iq_and_wait_for_reply is deprecated and will be removed in 1.0', DeprecationWarning, stacklevel=1) return (yield from self.send(iq, timeout=timeout))
send_iq_and_wait_for_reply
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, iq, *, timeout=None):\n warnings.warn(\n 'send_iq_and_wait_for_reply is deprecated and will be removed in 1.0',\n DeprecationWarning, stacklevel=1)\n return (yield from self.send(iq, timeout=timeout))\n", "role": "user" }, { "content": "send_iq_and_wait_for_reply", "role": "assistant" } ]
def x(self, stanza): warnings.warn( 'send_and_wait_for_sent is deprecated and will be removed in 1.0', DeprecationWarning, stacklevel=1) yield from self._enqueue(stanza)
send_and_wait_for_sent
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, stanza):\n warnings.warn(\n 'send_and_wait_for_sent is deprecated and will be removed in 1.0',\n DeprecationWarning, stacklevel=1)\n yield from self._enqueue(stanza)\n", "role": "user" }, { "content": "send_and_wait_for_sent", "role": "assistant" } ]
def x(self, stanza, *, timeout=None, cb=None): stanza.autoset_id() self._logger.debug('sending %r and waiting for it to be sent', stanza) if not isinstance(stanza, stanza_.IQ) or stanza.type_.is_response: if cb is not None: raise ValueError('cb not supported with non-IQ non-request stanzas' ) yield from self._enqueue(stanza) return fut = asyncio.Future() def x(task): nonlocal fut if task.exception() is None: fut.set_result(task.result()) else: fut.set_exception(task.exception()) def x(stanza): nonlocal fut if fut.cancelled(): return if cb is not None: try: nested_fut = cb(stanza) except Exception as exc: fut.set_exception(exc) else: if nested_fut is not None: nested_fut.add_done_callback(nested_cb) return if stanza.type_.is_error: fut.set_exception(stanza.error.to_exception()) else: fut.set_result(stanza.payload) def x(exc): nonlocal fut if fut.cancelled(): return fut.set_exception(exc) listener = callbacks.OneshotTagListener(handler_ok, handler_error) listener_tag = stanza.to, stanza.id_ self._iq_response_map.add_listener(listener_tag, listener) try: yield from self._enqueue(stanza) except Exception: listener.cancel() raise try: if not timeout: reply = yield from fut else: try: reply = yield from asyncio.wait_for(fut, timeout=timeout) except asyncio.TimeoutError: raise TimeoutError finally: try: self._iq_response_map.remove_listener(listener_tag) except KeyError: pass return reply
send_immediately
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, stanza, *, timeout=None, cb=None):\n stanza.autoset_id()\n self._logger.debug('sending %r and waiting for it to be sent', stanza)\n if not isinstance(stanza, stanza_.IQ) or stanza.type_.is_response:\n if cb is not None:\n raise ValueError('cb not supported with non-IQ non-request stanzas'\n )\n yield from self._enqueue(stanza)\n return\n fut = asyncio.Future()\n\n def x(task):\n nonlocal fut\n if task.exception() is None:\n fut.set_result(task.result())\n else:\n fut.set_exception(task.exception())\n\n def x(stanza):\n nonlocal fut\n if fut.cancelled():\n return\n if cb is not None:\n try:\n nested_fut = cb(stanza)\n except Exception as exc:\n fut.set_exception(exc)\n else:\n if nested_fut is not None:\n nested_fut.add_done_callback(nested_cb)\n return\n if stanza.type_.is_error:\n fut.set_exception(stanza.error.to_exception())\n else:\n fut.set_result(stanza.payload)\n\n def x(exc):\n nonlocal fut\n if fut.cancelled():\n return\n fut.set_exception(exc)\n listener = callbacks.OneshotTagListener(handler_ok, handler_error)\n listener_tag = stanza.to, stanza.id_\n self._iq_response_map.add_listener(listener_tag, listener)\n try:\n yield from self._enqueue(stanza)\n except Exception:\n listener.cancel()\n raise\n try:\n if not timeout:\n reply = yield from fut\n else:\n try:\n reply = yield from asyncio.wait_for(fut, timeout=timeout)\n except asyncio.TimeoutError:\n raise TimeoutError\n finally:\n try:\n self._iq_response_map.remove_listener(listener_tag)\n except KeyError:\n pass\n return reply\n", "role": "user" }, { "content": "send_immediately", "role": "assistant" } ]
def x(features): parts = [(feature.encode('utf-8') + b'\x1f') for feature in features] parts.sort() return b''.join(parts) + b'\x1c'
process_features
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(features):\n parts = [(feature.encode('utf-8') + b'\\x1f') for feature in features]\n parts.sort()\n return b''.join(parts) + b'\\x1c'\n", "role": "user" }, { "content": "process_features", "role": "assistant" } ]
def x(identities): parts = [_process_identity(identity) for identity in identities] parts.sort() return b''.join(parts) + b'\x1c'
process_identities
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(identities):\n parts = [_process_identity(identity) for identity in identities]\n parts.sort()\n return b''.join(parts) + b'\\x1c'\n", "role": "user" }, { "content": "process_identities", "role": "assistant" } ]
def x(exts): parts = [_process_form(form) for form in exts] parts.sort() return b''.join(parts) + b'\x1c'
process_extensions
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(exts):\n parts = [_process_form(form) for form in exts]\n parts.sort()\n return b''.join(parts) + b'\\x1c'\n", "role": "user" }, { "content": "process_extensions", "role": "assistant" } ]
def x(self, instance, class_=None): if class_ is None: class_ = type(instance) self._toplevels[class_] = instance
set_toplevel_object
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, instance, class_=None):\n if class_ is None:\n class_ = type(instance)\n self._toplevels[class_] = instance\n", "role": "user" }, { "content": "set_toplevel_object", "role": "assistant" } ]
def x(self, expr): result = expr.eval(self) iterator = iter(result) try: next(iterator) except StopIteration: return False else: return True finally: if hasattr(iterator, 'close'): iterator.close()
eval_bool
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, expr):\n result = expr.eval(self)\n iterator = iter(result)\n try:\n next(iterator)\n except StopIteration:\n return False\n else:\n return True\n finally:\n if hasattr(iterator, 'close'):\n iterator.close()\n", "role": "user" }, { "content": "eval_bool", "role": "assistant" } ]
def x(self, new_state): if new_state > self._state: raise ValueError('cannot forward using rewind ({} > {})'.format( new_state, self._state)) self._state = new_state
rewind
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, new_state):\n if new_state > self._state:\n raise ValueError('cannot forward using rewind ({} > {})'.format(\n new_state, self._state))\n self._state = new_state\n", "role": "user" }, { "content": "rewind", "role": "assistant" } ]
def x(self, new_state): if self._state == new_state: return if self._state > new_state: raise OrderedStateSkipped(new_state) fut = asyncio.Future(loop=self.loop) self._exact_waiters.append((new_state, fut)) yield from fut
wait_for
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, new_state):\n if self._state == new_state:\n return\n if self._state > new_state:\n raise OrderedStateSkipped(new_state)\n fut = asyncio.Future(loop=self.loop)\n self._exact_waiters.append((new_state, fut))\n yield from fut\n", "role": "user" }, { "content": "wait_for", "role": "assistant" } ]
def x(self, new_state): if not self._state < new_state: return fut = asyncio.Future(loop=self.loop) self._least_waiters.append((new_state, fut)) yield from fut
wait_for_at_least
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, new_state):\n if not self._state < new_state:\n return\n fut = asyncio.Future(loop=self.loop)\n self._least_waiters.append((new_state, fut))\n yield from fut\n", "role": "user" }, { "content": "wait_for_at_least", "role": "assistant" } ]
def x(cls): Item.register_child(Item.registered_payload, cls) EventItem.register_child(EventItem.registered_payload, cls) return cls
as_payload_class
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls):\n Item.register_child(Item.registered_payload, cls)\n EventItem.register_child(EventItem.registered_payload, cls)\n return cls\n", "role": "user" }, { "content": "as_payload_class", "role": "assistant" } ]
def x(self, peer_jid): presences = sorted(self.get_peer_resources(peer_jid).items(), key=lambda item: aioxmpp.structs.PresenceState.from_stanza(item[1])) if not presences: return None return presences[-1][1]
get_most_available_stanza
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, peer_jid):\n presences = sorted(self.get_peer_resources(peer_jid).items(), key=lambda\n item: aioxmpp.structs.PresenceState.from_stanza(item[1]))\n if not presences:\n return None\n return presences[-1][1]\n", "role": "user" }, { "content": "get_most_available_stanza", "role": "assistant" } ]
def x(self, peer_jid): try: d = dict(self._presences[peer_jid]) d.pop(None, None) return d except KeyError: return {}
get_peer_resources
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, peer_jid):\n try:\n d = dict(self._presences[peer_jid])\n d.pop(None, None)\n return d\n except KeyError:\n return {}\n", "role": "user" }, { "content": "get_peer_resources", "role": "assistant" } ]
def x(self, peer_jid): try: return self._presences[peer_jid.bare()][peer_jid.resource] except KeyError: pass try: return self._presences[peer_jid.bare()][None] except KeyError: pass
get_stanza
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, peer_jid):\n try:\n return self._presences[peer_jid.bare()][peer_jid.resource]\n except KeyError:\n pass\n try:\n return self._presences[peer_jid.bare()][None]\n except KeyError:\n pass\n", "role": "user" }, { "content": "get_stanza", "role": "assistant" } ]
def x(self): stanza = aioxmpp.Presence() self._state.apply_to_stanza(stanza) stanza.status.update(self._status) return stanza
make_stanza
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n stanza = aioxmpp.Presence()\n self._state.apply_to_stanza(stanza)\n stanza.status.update(self._status)\n return stanza\n", "role": "user" }, { "content": "make_stanza", "role": "assistant" } ]
def x(self, state, status={}, priority=0): if not isinstance(priority, numbers.Integral): raise TypeError('invalid priority: got {}, expected integer'.format (type(priority))) if not isinstance(state, aioxmpp.PresenceState): raise TypeError('invalid state: got {}, expected aioxmpp.PresenceState' .format(type(state))) if isinstance(status, str): new_status = {None: status} else: new_status = dict(status) new_priority = int(priority) emit_state_event = self._state != state emit_overall_event = (emit_state_event or self._priority != new_priority or self._status != new_status) self._state = state self._status = new_status self._priority = new_priority if emit_state_event: self.on_presence_state_changed() if emit_overall_event: self.on_presence_changed() return self.resend_presence()
set_presence
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, state, status={}, priority=0):\n if not isinstance(priority, numbers.Integral):\n raise TypeError('invalid priority: got {}, expected integer'.format\n (type(priority)))\n if not isinstance(state, aioxmpp.PresenceState):\n raise TypeError('invalid state: got {}, expected aioxmpp.PresenceState'\n .format(type(state)))\n if isinstance(status, str):\n new_status = {None: status}\n else:\n new_status = dict(status)\n new_priority = int(priority)\n emit_state_event = self._state != state\n emit_overall_event = (emit_state_event or self._priority !=\n new_priority or self._status != new_status)\n self._state = state\n self._status = new_status\n self._priority = new_priority\n if emit_state_event:\n self.on_presence_state_changed()\n if emit_overall_event:\n self.on_presence_changed()\n return self.resend_presence()\n", "role": "user" }, { "content": "set_presence", "role": "assistant" } ]
def x(self): if self.client.established: return self.client.enqueue(self.make_stanza())
resend_presence
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.client.established:\n return self.client.enqueue(self.make_stanza())\n", "role": "user" }, { "content": "resend_presence", "role": "assistant" } ]
def x(x509): result = {'subject': ((('commonName', x509.get_subject().commonName),),)} for ext_idx in range(x509.get_extension_count()): ext = x509.get_extension(ext_idx) sn = ext.get_short_name() if sn != b'subjectAltName': continue data = pyasn1.codec.der.decoder.decode(ext.get_data(), asn1Spec= pyasn1_modules.rfc2459.SubjectAltName())[0] for name in data: dNSName = name.getComponentByPosition(2) if dNSName is None: continue if hasattr(dNSName, 'isValue') and not dNSName.isValue: continue result.setdefault('subjectAltName', []).append(('DNS', str( dNSName))) return result
extract_python_dict_from_x509
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(x509):\n result = {'subject': ((('commonName', x509.get_subject().commonName),),)}\n for ext_idx in range(x509.get_extension_count()):\n ext = x509.get_extension(ext_idx)\n sn = ext.get_short_name()\n if sn != b'subjectAltName':\n continue\n data = pyasn1.codec.der.decoder.decode(ext.get_data(), asn1Spec=\n pyasn1_modules.rfc2459.SubjectAltName())[0]\n for name in data:\n dNSName = name.getComponentByPosition(2)\n if dNSName is None:\n continue\n if hasattr(dNSName, 'isValue') and not dNSName.isValue:\n continue\n result.setdefault('subjectAltName', []).append(('DNS', str(\n dNSName)))\n return result\n", "role": "user" }, { "content": "extract_python_dict_from_x509", "role": "assistant" } ]
def x(blob): return pyasn1.codec.der.decoder.decode(blob, asn1Spec=pyasn1_modules. rfc2459.Certificate())[0]
blob_to_pyasn1
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(blob):\n return pyasn1.codec.der.decoder.decode(blob, asn1Spec=pyasn1_modules.\n rfc2459.Certificate())[0]\n", "role": "user" }, { "content": "blob_to_pyasn1", "role": "assistant" } ]
def x(pyasn1_struct): pk = pyasn1_struct.getComponentByName('tbsCertificate').getComponentByName( 'subjectPublicKeyInfo') return pyasn1.codec.der.encoder.encode(pk)
extract_pk_blob_from_pyasn1
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pyasn1_struct):\n pk = pyasn1_struct.getComponentByName('tbsCertificate').getComponentByName(\n 'subjectPublicKeyInfo')\n return pyasn1.codec.der.encoder.encode(pk)\n", "role": "user" }, { "content": "extract_pk_blob_from_pyasn1", "role": "assistant" } ]
def x(x509, hostname): cert_structure = extract_python_dict_from_x509(x509) try: ssl.match_hostname(cert_structure, hostname) except ssl.CertificateError: return False return True
check_x509_hostname
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(x509, hostname):\n cert_structure = extract_python_dict_from_x509(x509)\n try:\n ssl.match_hostname(cert_structure, hostname)\n except ssl.CertificateError:\n return False\n return True\n", "role": "user" }, { "content": "check_x509_hostname", "role": "assistant" } ]
def x(): ctx = OpenSSL.SSL.Context(OpenSSL.SSL.SSLv23_METHOD) ctx.set_options(OpenSSL.SSL.OP_NO_SSLv2 | OpenSSL.SSL.OP_NO_SSLv3) ctx.set_verify(OpenSSL.SSL.VERIFY_PEER, default_verify_callback) return ctx
default_ssl_context
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n ctx = OpenSSL.SSL.Context(OpenSSL.SSL.SSLv23_METHOD)\n ctx.set_options(OpenSSL.SSL.OP_NO_SSLv2 | OpenSSL.SSL.OP_NO_SSLv3)\n ctx.set_verify(OpenSSL.SSL.VERIFY_PEER, default_verify_callback)\n return ctx\n", "role": "user" }, { "content": "default_ssl_context", "role": "assistant" } ]
def x(transport, xmlstream, sasl_providers, negotiation_timeout, jid, features ): if not transport.get_extra_info('sslcontext'): transport = None last_auth_error = None for sasl_provider in sasl_providers: try: result = yield from sasl_provider.execute(jid, features, xmlstream, transport) except ValueError as err: raise errors.StreamNegotiationFailure('invalid credentials: {}' .format(err)) from err except aiosasl.AuthenticationFailure as err: last_auth_error = err continue if result: features = yield from protocol.reset_stream_and_get_features( xmlstream) break else: if last_auth_error: raise last_auth_error else: raise errors.SASLUnavailable('No common mechanisms') return features
negotiate_sasl
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(transport, xmlstream, sasl_providers, negotiation_timeout, jid, features\n ):\n if not transport.get_extra_info('sslcontext'):\n transport = None\n last_auth_error = None\n for sasl_provider in sasl_providers:\n try:\n result = yield from sasl_provider.execute(jid, features,\n xmlstream, transport)\n except ValueError as err:\n raise errors.StreamNegotiationFailure('invalid credentials: {}'\n .format(err)) from err\n except aiosasl.AuthenticationFailure as err:\n last_auth_error = err\n continue\n if result:\n features = yield from protocol.reset_stream_and_get_features(\n xmlstream)\n break\n else:\n if last_auth_error:\n raise last_auth_error\n else:\n raise errors.SASLUnavailable('No common mechanisms')\n return features\n", "role": "user" }, { "content": "negotiate_sasl", "role": "assistant" } ]
def x(tls_provider, sasl_providers): sasl_providers = tuple(sasl_providers) if not sasl_providers: raise ValueError('At least one SASL provider must be given.') for sasl_provider in sasl_providers: sasl_provider.execute result = SecurityLayer(tls_provider.ssl_context_factory, tls_provider. certificate_verifier_factory, tls_provider.tls_required, sasl_providers ) return result
security_layer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(tls_provider, sasl_providers):\n sasl_providers = tuple(sasl_providers)\n if not sasl_providers:\n raise ValueError('At least one SASL provider must be given.')\n for sasl_provider in sasl_providers:\n sasl_provider.execute\n result = SecurityLayer(tls_provider.ssl_context_factory, tls_provider.\n certificate_verifier_factory, tls_provider.tls_required, sasl_providers\n )\n return result\n", "role": "user" }, { "content": "security_layer", "role": "assistant" } ]
def x(password_provider, ssl_context_factory=default_ssl_context, max_auth_attempts=3, certificate_verifier_factory=PKIXCertificateVerifier): tls_kwargs = {} if certificate_verifier_factory is not None: tls_kwargs['certificate_verifier_factory' ] = certificate_verifier_factory return SecurityLayer(ssl_context_factory, certificate_verifier_factory, True, (PasswordSASLProvider(password_provider, max_auth_attempts= max_auth_attempts),))
tls_with_password_based_authentication
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(password_provider, ssl_context_factory=default_ssl_context,\n max_auth_attempts=3, certificate_verifier_factory=PKIXCertificateVerifier):\n tls_kwargs = {}\n if certificate_verifier_factory is not None:\n tls_kwargs['certificate_verifier_factory'\n ] = certificate_verifier_factory\n return SecurityLayer(ssl_context_factory, certificate_verifier_factory,\n True, (PasswordSASLProvider(password_provider, max_auth_attempts=\n max_auth_attempts),))\n", "role": "user" }, { "content": "tls_with_password_based_authentication", "role": "assistant" } ]
def x(password_provider, *, pin_store=None, pin_type=PinType.PUBLIC_KEY, post_handshake_deferred_failure=None, anonymous=False, ssl_context_factory=default_ssl_context, no_verify=False): if isinstance(password_provider, str): static_password = password_provider @asyncio.coroutine def x(jid, nattempt): if nattempt == 0: return static_password return None if pin_store is not None: if post_handshake_deferred_failure is None: @asyncio.coroutine def x(verifier): return False if not isinstance(pin_store, AbstractPinStore): pin_data = pin_store if pin_type == PinType.PUBLIC_KEY: logger.debug('using PublicKeyPinStore') pin_store = PublicKeyPinStore() else: logger.debug('using CertificatePinStore') pin_store = CertificatePinStore() pin_store.import_from_json(pin_data) def x(): return PinningPKIXCertificateVerifier(pin_store.query, post_handshake_deferred_failure) elif no_verify: certificate_verifier_factory = _NullVerifier else: certificate_verifier_factory = PKIXCertificateVerifier sasl_providers = [] if anonymous is not False: if AnonymousSASLProvider is None: raise RuntimeError( 'aiosasl does not support ANONYMOUS, please upgrade') sasl_providers.append(AnonymousSASLProvider(anonymous)) if password_provider is not None: sasl_providers.append(PasswordSASLProvider(password_provider)) return SecurityLayer(ssl_context_factory, certificate_verifier_factory, True, tuple(sasl_providers))
make
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(password_provider, *, pin_store=None, pin_type=PinType.PUBLIC_KEY,\n post_handshake_deferred_failure=None, anonymous=False,\n ssl_context_factory=default_ssl_context, no_verify=False):\n if isinstance(password_provider, str):\n static_password = password_provider\n\n @asyncio.coroutine\n def x(jid, nattempt):\n if nattempt == 0:\n return static_password\n return None\n if pin_store is not None:\n if post_handshake_deferred_failure is None:\n\n @asyncio.coroutine\n def x(verifier):\n return False\n if not isinstance(pin_store, AbstractPinStore):\n pin_data = pin_store\n if pin_type == PinType.PUBLIC_KEY:\n logger.debug('using PublicKeyPinStore')\n pin_store = PublicKeyPinStore()\n else:\n logger.debug('using CertificatePinStore')\n pin_store = CertificatePinStore()\n pin_store.import_from_json(pin_data)\n\n def x():\n return PinningPKIXCertificateVerifier(pin_store.query,\n post_handshake_deferred_failure)\n elif no_verify:\n certificate_verifier_factory = _NullVerifier\n else:\n certificate_verifier_factory = PKIXCertificateVerifier\n sasl_providers = []\n if anonymous is not False:\n if AnonymousSASLProvider is None:\n raise RuntimeError(\n 'aiosasl does not support ANONYMOUS, please upgrade')\n sasl_providers.append(AnonymousSASLProvider(anonymous))\n if password_provider is not None:\n sasl_providers.append(PasswordSASLProvider(password_provider))\n return SecurityLayer(ssl_context_factory, certificate_verifier_factory,\n True, tuple(sasl_providers))\n", "role": "user" }, { "content": "make", "role": "assistant" } ]
def x(self, hostname, x509): key = self._x509_key(x509) self._storage.setdefault(hostname, set()).add(key)
pin
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, hostname, x509):\n key = self._x509_key(x509)\n self._storage.setdefault(hostname, set()).add(key)\n", "role": "user" }, { "content": "pin", "role": "assistant" } ]
def x(self, hostname, x509): key = self._x509_key(x509) try: pins = self._storage[hostname] except KeyError: return None if key in pins: return True return None
query
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, hostname, x509):\n key = self._x509_key(x509)\n try:\n pins = self._storage[hostname]\n except KeyError:\n return None\n if key in pins:\n return True\n return None\n", "role": "user" }, { "content": "query", "role": "assistant" } ]
def x(self): return {hostname: sorted(self._encode_key(key) for key in pins) for hostname, pins in self._storage.items()}
export_to_json
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n return {hostname: sorted(self._encode_key(key) for key in pins) for \n hostname, pins in self._storage.items()}\n", "role": "user" }, { "content": "export_to_json", "role": "assistant" } ]
def x(self, data, *, override=False): if override: self._storage = {hostname: set(self._decode_key(key) for key in pins) for hostname, pins in data.items()} return for hostname, pins in data.items(): existing_pins = self._storage.setdefault(hostname, set()) existing_pins.update(self._decode_key(key) for key in pins)
import_from_json
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data, *, override=False):\n if override:\n self._storage = {hostname: set(self._decode_key(key) for key in\n pins) for hostname, pins in data.items()}\n return\n for hostname, pins in data.items():\n existing_pins = self._storage.setdefault(hostname, set())\n existing_pins.update(self._decode_key(key) for key in pins)\n", "role": "user" }, { "content": "import_from_json", "role": "assistant" } ]
def x(self, features, mechanism_classes): try: mechanisms = features[SASLMechanisms] except KeyError: logger.error('No sasl mechanisms: %r', list(features)) raise errors.SASLUnavailable('Remote side does not support SASL' ) from None remote_mechanism_list = mechanisms.get_mechanism_list() for our_mechanism in mechanism_classes: token = our_mechanism.any_supported(remote_mechanism_list) if token is not None: return our_mechanism, token return None, None
find_supported
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, features, mechanism_classes):\n try:\n mechanisms = features[SASLMechanisms]\n except KeyError:\n logger.error('No sasl mechanisms: %r', list(features))\n raise errors.SASLUnavailable('Remote side does not support SASL'\n ) from None\n remote_mechanism_list = mechanisms.get_mechanism_list()\n for our_mechanism in mechanism_classes:\n token = our_mechanism.any_supported(remote_mechanism_list)\n if token is not None:\n return our_mechanism, token\n return None, None\n", "role": "user" }, { "content": "find_supported", "role": "assistant" } ]
def x(self, intf, mechanism, token): sm = aiosasl.SASLStateMachine(intf) try: yield from mechanism.authenticate(sm, token) return True except aiosasl.SASLFailure as err: if err.opaque_error in self.AUTHENTICATION_FAILURES: raise aiosasl.AuthenticationFailure(opaque_error=err. opaque_error, text=err.text) elif err.opaque_error in self.MECHANISM_REJECTED_FAILURES: return False raise
execute
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, intf, mechanism, token):\n sm = aiosasl.SASLStateMachine(intf)\n try:\n yield from mechanism.authenticate(sm, token)\n return True\n except aiosasl.SASLFailure as err:\n if err.opaque_error in self.AUTHENTICATION_FAILURES:\n raise aiosasl.AuthenticationFailure(opaque_error=err.\n opaque_error, text=err.text)\n elif err.opaque_error in self.MECHANISM_REJECTED_FAILURES:\n return False\n raise\n", "role": "user" }, { "content": "execute", "role": "assistant" } ]
def x(self, loop, metadata, domain: str, host, port, negotiation_timeout, base_logger=None): features_future = asyncio.Future(loop=loop) stream = protocol.XMLStream(to=domain, features_future=features_future, base_logger=base_logger) if base_logger is not None: logger = base_logger.getChild(type(self).__name__) else: logger = logging.getLogger('.'.join([__name__, type(self). __qualname__])) try: transport, _ = yield from ssl_transport.create_starttls_connection(loop , lambda : stream, host=host, port=port, peer_hostname=host, server_hostname=to_ascii(domain), use_starttls=True) except: stream.abort() raise stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout) features = yield from features_future try: features[nonza.StartTLSFeature] except KeyError: if not metadata.tls_required: return transport, stream, (yield from features_future) logger.debug( 'attempting STARTTLS despite not announced since it is required') try: response = yield from protocol.send_and_wait_for(stream, [nonza. StartTLS()], [nonza.StartTLSFailure, nonza.StartTLSProceed]) except errors.StreamError: raise errors.TLSUnavailable( 'STARTTLS not supported by server, but required by client') if not isinstance(response, nonza.StartTLSProceed): if metadata.tls_required: message = 'server failed to STARTTLS' protocol.send_stream_error_and_close(stream, condition=errors. StreamErrorCondition.POLICY_VIOLATION, text=message) raise errors.TLSUnavailable(message) return transport, stream, (yield from features_future) verifier = metadata.certificate_verifier_factory() yield from verifier.pre_handshake(domain, host, port, metadata) ssl_context = metadata.ssl_context_factory() verifier.setup_context(ssl_context, transport) yield from stream.starttls(ssl_context=ssl_context, post_handshake_callback=verifier.post_handshake) features_future = yield from protocol.reset_stream_and_get_features(stream, timeout=negotiation_timeout) return transport, stream, features_future
connect
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, loop, metadata, domain: str, host, port, negotiation_timeout,\n base_logger=None):\n features_future = asyncio.Future(loop=loop)\n stream = protocol.XMLStream(to=domain, features_future=features_future,\n base_logger=base_logger)\n if base_logger is not None:\n logger = base_logger.getChild(type(self).__name__)\n else:\n logger = logging.getLogger('.'.join([__name__, type(self).\n __qualname__]))\n try:\n transport, _ = yield from ssl_transport.create_starttls_connection(loop\n , lambda : stream, host=host, port=port, peer_hostname=host,\n server_hostname=to_ascii(domain), use_starttls=True)\n except:\n stream.abort()\n raise\n stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout)\n features = yield from features_future\n try:\n features[nonza.StartTLSFeature]\n except KeyError:\n if not metadata.tls_required:\n return transport, stream, (yield from features_future)\n logger.debug(\n 'attempting STARTTLS despite not announced since it is required')\n try:\n response = yield from protocol.send_and_wait_for(stream, [nonza.\n StartTLS()], [nonza.StartTLSFailure, nonza.StartTLSProceed])\n except errors.StreamError:\n raise errors.TLSUnavailable(\n 'STARTTLS not supported by server, but required by client')\n if not isinstance(response, nonza.StartTLSProceed):\n if metadata.tls_required:\n message = 'server failed to STARTTLS'\n protocol.send_stream_error_and_close(stream, condition=errors.\n StreamErrorCondition.POLICY_VIOLATION, text=message)\n raise errors.TLSUnavailable(message)\n return transport, stream, (yield from features_future)\n verifier = metadata.certificate_verifier_factory()\n yield from verifier.pre_handshake(domain, host, port, metadata)\n ssl_context = metadata.ssl_context_factory()\n verifier.setup_context(ssl_context, transport)\n yield from stream.starttls(ssl_context=ssl_context,\n post_handshake_callback=verifier.post_handshake)\n features_future = yield from protocol.reset_stream_and_get_features(stream,\n timeout=negotiation_timeout)\n return transport, stream, features_future\n", "role": "user" }, { "content": "connect", "role": "assistant" } ]
def x(self, loop, metadata, domain, host, port, negotiation_timeout, base_logger=None): features_future = asyncio.Future(loop=loop) stream = protocol.XMLStream(to=domain, features_future=features_future, base_logger=base_logger) if base_logger is not None: logger = base_logger.getChild(type(self).__name__) else: logger = logging.getLogger('.'.join([__name__, type(self). __qualname__])) verifier = metadata.certificate_verifier_factory() yield from verifier.pre_handshake(domain, host, port, metadata) context_factory = self._context_factory_factory(logger, metadata, verifier) try: transport, _ = yield from ssl_transport.create_starttls_connection(loop , lambda : stream, host=host, port=port, peer_hostname=host, server_hostname=to_ascii(domain), post_handshake_callback= verifier.post_handshake, ssl_context_factory=context_factory, use_starttls=False) except: stream.abort() raise stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout) return transport, stream, (yield from features_future)
connect
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, loop, metadata, domain, host, port, negotiation_timeout,\n base_logger=None):\n features_future = asyncio.Future(loop=loop)\n stream = protocol.XMLStream(to=domain, features_future=features_future,\n base_logger=base_logger)\n if base_logger is not None:\n logger = base_logger.getChild(type(self).__name__)\n else:\n logger = logging.getLogger('.'.join([__name__, type(self).\n __qualname__]))\n verifier = metadata.certificate_verifier_factory()\n yield from verifier.pre_handshake(domain, host, port, metadata)\n context_factory = self._context_factory_factory(logger, metadata, verifier)\n try:\n transport, _ = yield from ssl_transport.create_starttls_connection(loop\n , lambda : stream, host=host, port=port, peer_hostname=host,\n server_hostname=to_ascii(domain), post_handshake_callback=\n verifier.post_handshake, ssl_context_factory=context_factory,\n use_starttls=False)\n except:\n stream.abort()\n raise\n stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout)\n return transport, stream, (yield from features_future)\n", "role": "user" }, { "content": "connect", "role": "assistant" } ]
def x(tag): if isinstance(tag, str): namespace_uri, sep, localname = tag.partition('}') if sep: if not namespace_uri.startswith('{'): raise ValueError('not a valid etree-format tag') namespace_uri = namespace_uri[1:] else: localname = namespace_uri namespace_uri = None return namespace_uri, localname elif len(tag) != 2: raise ValueError('not a valid tuple-format tag') else: if any(part is not None and not isinstance(part, str) for part in tag): raise TypeError('tuple-format tags must only contain str and None') if tag[1] is None: raise ValueError('tuple-format localname must not be None') return tag
normalize_tag
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(tag):\n if isinstance(tag, str):\n namespace_uri, sep, localname = tag.partition('}')\n if sep:\n if not namespace_uri.startswith('{'):\n raise ValueError('not a valid etree-format tag')\n namespace_uri = namespace_uri[1:]\n else:\n localname = namespace_uri\n namespace_uri = None\n return namespace_uri, localname\n elif len(tag) != 2:\n raise ValueError('not a valid tuple-format tag')\n else:\n if any(part is not None and not isinstance(part, str) for part in tag):\n raise TypeError('tuple-format tags must only contain str and None')\n if tag[1] is None:\n raise ValueError('tuple-format localname must not be None')\n return tag\n", "role": "user" }, { "content": "normalize_tag", "role": "assistant" } ]
def x(self, body): token, tracker = self.send_message_tracked(body) tracker.cancel() return token
send_message
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, body):\n token, tracker = self.send_message_tracked(body)\n tracker.cancel()\n return token\n", "role": "user" }, { "content": "send_message", "role": "assistant" } ]
def x(self, address, text=None, *, mode=InviteMode.DIRECT, allow_upgrade=False ): raise self._not_implemented_error('inviting entities')
invite
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, address, text=None, *, mode=InviteMode.DIRECT, allow_upgrade=False\n ):\n raise self._not_implemented_error('inviting entities')\n", "role": "user" }, { "content": "invite", "role": "assistant" } ]
async def stdout_writer(): """ This is a bit complex, as stdout can be a pipe or a file. If it is a file, we cannot use :meth:`asycnio.BaseEventLoop.connect_write_pipe`. """ if sys.stdout.seekable(): return sys.stdout.buffer.raw if os.isatty(sys.stdin.fileno()): fd_to_use = 0 else: fd_to_use = 1 twrite, pwrite = await loop.connect_write_pipe(asyncio.streams. FlowControlMixin, os.fdopen(fd_to_use, 'wb')) swrite = asyncio.StreamWriter(twrite, pwrite, None, loop) return swrite
stdout_writer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "async def stdout_writer():\n \"\"\"\n This is a bit complex, as stdout can be a pipe or a file.\n\n If it is a file, we cannot use\n :meth:`asycnio.BaseEventLoop.connect_write_pipe`.\n \"\"\"\n if sys.stdout.seekable():\n return sys.stdout.buffer.raw\n if os.isatty(sys.stdin.fileno()):\n fd_to_use = 0\n else:\n fd_to_use = 1\n twrite, pwrite = await loop.connect_write_pipe(asyncio.streams.\n FlowControlMixin, os.fdopen(fd_to_use, 'wb'))\n swrite = asyncio.StreamWriter(twrite, pwrite, None, loop)\n return swrite\n", "role": "user" }, { "content": "stdout_writer", "role": "assistant" } ]
def x(algo): try: enabled, (fun_name, fun_args, fun_kwargs) = _HASH_ALGO_MAP[algo] except KeyError: raise NotImplementedError('hash algorithm {!r} unknown'.format(algo) ) from None if not enabled: raise ValueError('support of {} in XMPP is forbidden'.format(algo)) try: fun = getattr(hashlib, fun_name) except AttributeError as exc: raise NotImplementedError('{} not supported by hashlib'.format(algo) ) from exc return fun(*fun_args, **fun_kwargs)
hash_from_algo
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(algo):\n try:\n enabled, (fun_name, fun_args, fun_kwargs) = _HASH_ALGO_MAP[algo]\n except KeyError:\n raise NotImplementedError('hash algorithm {!r} unknown'.format(algo)\n ) from None\n if not enabled:\n raise ValueError('support of {} in XMPP is forbidden'.format(algo))\n try:\n fun = getattr(hashlib, fun_name)\n except AttributeError as exc:\n raise NotImplementedError('{} not supported by hashlib'.format(algo)\n ) from exc\n return fun(*fun_args, **fun_kwargs)\n", "role": "user" }, { "content": "hash_from_algo", "role": "assistant" } ]
def x(h): try: enabled, algo = _HASH_ALGO_REVERSE_MAP[h.name] except KeyError: pass else: if not enabled: raise ValueError('support of {} in XMPP is forbidden'.format(algo)) return algo if h.name == 'blake2b': return 'blake2b-{}'.format(h.digest_size * 8) raise ValueError('unknown hash implementation: {!r}'.format(h))
algo_of_hash
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(h):\n try:\n enabled, algo = _HASH_ALGO_REVERSE_MAP[h.name]\n except KeyError:\n pass\n else:\n if not enabled:\n raise ValueError('support of {} in XMPP is forbidden'.format(algo))\n return algo\n if h.name == 'blake2b':\n return 'blake2b-{}'.format(h.digest_size * 8)\n raise ValueError('unknown hash implementation: {!r}'.format(h))\n", "role": "user" }, { "content": "algo_of_hash", "role": "assistant" } ]
def x(self, other_entity): disco_info = yield from self._disco_client.query_info(other_entity) intersection = disco_info.features & SUPPORTED_HASH_FEATURES if (not intersection and namespaces.xep0300_hashes2 not in disco_info. features): raise RuntimeError( 'Remote does not support the urn:xmpp:hashes:2 feature.') return intersection
select_common_hashes
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, other_entity):\n disco_info = yield from self._disco_client.query_info(other_entity)\n intersection = disco_info.features & SUPPORTED_HASH_FEATURES\n if (not intersection and namespaces.xep0300_hashes2 not in disco_info.\n features):\n raise RuntimeError(\n 'Remote does not support the urn:xmpp:hashes:2 feature.')\n return intersection\n", "role": "user" }, { "content": "select_common_hashes", "role": "assistant" } ]