source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(f):
if asyncio.iscoroutinefunction(f):
raise TypeError(
'outbound_message_filter must not be a coroutine function')
add_handler_spec(f, HandlerSpec((_apply_outbound_message_filter, ())))
return f
| outbound_message_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(f):\n if asyncio.iscoroutinefunction(f):\n raise TypeError(\n 'outbound_message_filter must not be a coroutine function')\n add_handler_spec(f, HandlerSpec((_apply_outbound_message_filter, ())))\n return f\n",
"role": "user"
},
{
"content": "outbound_message_filter",
"role": "assistant"
}
] |
def x(f):
if asyncio.iscoroutinefunction(f):
raise TypeError(
'outbound_presence_filter must not be a coroutine function')
add_handler_spec(f, HandlerSpec((_apply_outbound_presence_filter, ())))
return f
| outbound_presence_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(f):\n if asyncio.iscoroutinefunction(f):\n raise TypeError(\n 'outbound_presence_filter must not be a coroutine function')\n add_handler_spec(f, HandlerSpec((_apply_outbound_presence_filter, ())))\n return f\n",
"role": "user"
},
{
"content": "outbound_presence_filter",
"role": "assistant"
}
] |
def x(class_, signal_name, *, defer=False):
def x(f):
add_handler_spec(f, _depsignal_spec(class_, signal_name, f, defer))
return f
return decorator
| depsignal | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(class_, signal_name, *, defer=False):\n\n def x(f):\n add_handler_spec(f, _depsignal_spec(class_, signal_name, f, defer))\n return f\n return decorator\n",
"role": "user"
},
{
"content": "depsignal",
"role": "assistant"
}
] |
def x(descriptor, signal_name, *, defer=False):
def x(f):
add_handler_spec(f, _attrsignal_spec(descriptor, signal_name, f, defer)
)
return f
return decorator
| attrsignal | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(descriptor, signal_name, *, defer=False):\n\n def x(f):\n add_handler_spec(f, _attrsignal_spec(descriptor, signal_name, f, defer)\n )\n return f\n return decorator\n",
"role": "user"
},
{
"content": "attrsignal",
"role": "assistant"
}
] |
def x(class_, filter_name):
spec = _depfilter_spec(class_, filter_name)
def x(f):
add_handler_spec(f, spec)
return f
return decorator
| depfilter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(class_, filter_name):\n spec = _depfilter_spec(class_, filter_name)\n\n def x(f):\n add_handler_spec(f, spec)\n return f\n return decorator\n",
"role": "user"
},
{
"content": "depfilter",
"role": "assistant"
}
] |
def x(type_, payload_cls, coro, *, with_send_reply=False):
try:
handlers = get_magic_attr(coro)
except AttributeError:
return False
hs = HandlerSpec((_apply_iq_handler, (type_, payload_cls)))
try:
return handlers[hs] == dict(with_send_reply=with_send_reply)
except KeyError:
return False
| is_iq_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(type_, payload_cls, coro, *, with_send_reply=False):\n try:\n handlers = get_magic_attr(coro)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_iq_handler, (type_, payload_cls)))\n try:\n return handlers[hs] == dict(with_send_reply=with_send_reply)\n except KeyError:\n return False\n",
"role": "user"
},
{
"content": "is_iq_handler",
"role": "assistant"
}
] |
def x(type_, from_, cb):
import aioxmpp.dispatcher
return aioxmpp.dispatcher.is_message_handler(type_, from_, cb)
| is_message_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(type_, from_, cb):\n import aioxmpp.dispatcher\n return aioxmpp.dispatcher.is_message_handler(type_, from_, cb)\n",
"role": "user"
},
{
"content": "is_message_handler",
"role": "assistant"
}
] |
def x(type_, from_, cb):
import aioxmpp.dispatcher
return aioxmpp.dispatcher.is_presence_handler(type_, from_, cb)
| is_presence_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(type_, from_, cb):\n import aioxmpp.dispatcher\n return aioxmpp.dispatcher.is_presence_handler(type_, from_, cb)\n",
"role": "user"
},
{
"content": "is_presence_handler",
"role": "assistant"
}
] |
def x(cb):
try:
handlers = get_magic_attr(cb)
except AttributeError:
return False
hs = HandlerSpec((_apply_inbound_message_filter, ()))
return hs in handlers
| is_inbound_message_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_inbound_message_filter, ()))\n return hs in handlers\n",
"role": "user"
},
{
"content": "is_inbound_message_filter",
"role": "assistant"
}
] |
def x(cb):
try:
handlers = get_magic_attr(cb)
except AttributeError:
return False
hs = HandlerSpec((_apply_inbound_presence_filter, ()))
return hs in handlers
| is_inbound_presence_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_inbound_presence_filter, ()))\n return hs in handlers\n",
"role": "user"
},
{
"content": "is_inbound_presence_filter",
"role": "assistant"
}
] |
def x(cb):
try:
handlers = get_magic_attr(cb)
except AttributeError:
return False
hs = HandlerSpec((_apply_outbound_message_filter, ()))
return hs in handlers
| is_outbound_message_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_outbound_message_filter, ()))\n return hs in handlers\n",
"role": "user"
},
{
"content": "is_outbound_message_filter",
"role": "assistant"
}
] |
def x(cb):
try:
handlers = get_magic_attr(cb)
except AttributeError:
return False
hs = HandlerSpec((_apply_outbound_presence_filter, ()))
return hs in handlers
| is_outbound_presence_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cb):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n hs = HandlerSpec((_apply_outbound_presence_filter, ()))\n return hs in handlers\n",
"role": "user"
},
{
"content": "is_outbound_presence_filter",
"role": "assistant"
}
] |
def x(class_, signal_name, cb, *, defer=False):
try:
handlers = get_magic_attr(cb)
except AttributeError:
return False
return _depsignal_spec(class_, signal_name, cb, defer) in handlers
| is_depsignal_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(class_, signal_name, cb, *, defer=False):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n return _depsignal_spec(class_, signal_name, cb, defer) in handlers\n",
"role": "user"
},
{
"content": "is_depsignal_handler",
"role": "assistant"
}
] |
def x(class_, filter_name, filter_):
try:
handlers = get_magic_attr(filter_)
except AttributeError:
return False
return _depfilter_spec(class_, filter_name) in handlers
| is_depfilter_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(class_, filter_name, filter_):\n try:\n handlers = get_magic_attr(filter_)\n except AttributeError:\n return False\n return _depfilter_spec(class_, filter_name) in handlers\n",
"role": "user"
},
{
"content": "is_depfilter_handler",
"role": "assistant"
}
] |
def x(descriptor, signal_name, cb, *, defer=False):
try:
handlers = get_magic_attr(cb)
except AttributeError:
return False
return _attrsignal_spec(descriptor, signal_name, cb, defer) in handlers
| is_attrsignal_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(descriptor, signal_name, cb, *, defer=False):\n try:\n handlers = get_magic_attr(cb)\n except AttributeError:\n return False\n return _attrsignal_spec(descriptor, signal_name, cb, defer) in handlers\n",
"role": "user"
},
{
"content": "is_attrsignal_handler",
"role": "assistant"
}
] |
def x(self, instance, stack):
cm = self.init_cm(instance)
obj = stack.enter_context(cm)
self._data[instance] = cm, obj
return obj
| add_to_stack | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, instance, stack):\n cm = self.init_cm(instance)\n obj = stack.enter_context(cm)\n self._data[instance] = cm, obj\n return obj\n",
"role": "user"
},
{
"content": "add_to_stack",
"role": "assistant"
}
] |
def x(self, other, *, visited=None):
return self.orders_after_any(frozenset([other]), visited=visited)
| orders_after | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, other, *, visited=None):\n return self.orders_after_any(frozenset([other]), visited=visited)\n",
"role": "user"
},
{
"content": "orders_after",
"role": "assistant"
}
] |
def x(self, other, *, visited=None):
if not other:
return False
if visited is None:
visited = set()
elif self in visited:
return False
visited.add(self)
for item in self.PATCHED_ORDER_AFTER:
if item in visited:
continue
if item in other:
return True
if item.orders_after_any(other, visited=visited):
return True
return False
| orders_after_any | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, other, *, visited=None):\n if not other:\n return False\n if visited is None:\n visited = set()\n elif self in visited:\n return False\n visited.add(self)\n for item in self.PATCHED_ORDER_AFTER:\n if item in visited:\n continue\n if item in other:\n return True\n if item.orders_after_any(other, visited=visited):\n return True\n return False\n",
"role": "user"
},
{
"content": "orders_after_any",
"role": "assistant"
}
] |
def x(self, other):
if self is other:
return False
return not self.orders_after(other) and not other.orders_after(self)
| independent_from | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, other):\n if self is other:\n return False\n return not self.orders_after(other) and not other.orders_after(self)\n",
"role": "user"
},
{
"content": "independent_from",
"role": "assistant"
}
] |
def x(self, logger):
parts = type(self).__module__.split('.')[1:]
if parts[-1] == 'service' and len(parts) > 1:
del parts[-1]
return logger.getChild('.'.join(parts + [type(self).__qualname__]))
| derive_logger | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, logger):\n parts = type(self).__module__.split('.')[1:]\n if parts[-1] == 'service' and len(parts) > 1:\n del parts[-1]\n return logger.getChild('.'.join(parts + [type(self).__qualname__]))\n",
"role": "user"
},
{
"content": "derive_logger",
"role": "assistant"
}
] |
def x(self, group, new_limit):
if new_limit is None:
self._group_limits.pop(group, None)
return
self._group_limits[group] = new_limit
| set_limit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group, new_limit):\n if new_limit is None:\n self._group_limits.pop(group, None)\n return\n self._group_limits[group] = new_limit\n",
"role": "user"
},
{
"content": "set_limit",
"role": "assistant"
}
] |
def x(self, __groups, __coro_fun, *args, **kwargs):
__groups = set(__groups) | {()}
return asyncio.ensure_future(__coro_fun(*args, **kwargs))
| spawn | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, __groups, __coro_fun, *args, **kwargs):\n __groups = set(__groups) | {()}\n return asyncio.ensure_future(__coro_fun(*args, **kwargs))\n",
"role": "user"
},
{
"content": "spawn",
"role": "assistant"
}
] |
def x(self):
yield from self._check_for_feature()
iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Enable())
yield from self.client.send(iq)
| enable | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n yield from self._check_for_feature()\n iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Enable())\n yield from self.client.send(iq)\n",
"role": "user"
},
{
"content": "enable",
"role": "assistant"
}
] |
def x(self):
yield from self._check_for_feature()
iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Disable())
yield from self.client.send(iq)
| disable | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n yield from self._check_for_feature()\n iq = aioxmpp.IQ(type_=aioxmpp.IQType.SET, payload=carbons_xso.Disable())\n yield from self.client.send(iq)\n",
"role": "user"
},
{
"content": "disable",
"role": "assistant"
}
] |
def x(stream, type_, payload_cls, coro, *, with_send_reply=False):
stream.register_iq_request_handler(type_, payload_cls, coro,
with_send_reply=with_send_reply)
try:
yield
finally:
stream.unregister_iq_request_handler(type_, payload_cls)
| iq_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(stream, type_, payload_cls, coro, *, with_send_reply=False):\n stream.register_iq_request_handler(type_, payload_cls, coro,\n with_send_reply=with_send_reply)\n try:\n yield\n finally:\n stream.unregister_iq_request_handler(type_, payload_cls)\n",
"role": "user"
},
{
"content": "iq_handler",
"role": "assistant"
}
] |
def x(stream, type_, from_, cb):
stream.register_message_callback(type_, from_, cb)
try:
yield
finally:
stream.unregister_message_callback(type_, from_)
| message_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(stream, type_, from_, cb):\n stream.register_message_callback(type_, from_, cb)\n try:\n yield\n finally:\n stream.unregister_message_callback(type_, from_)\n",
"role": "user"
},
{
"content": "message_handler",
"role": "assistant"
}
] |
def x(stream, type_, from_, cb):
stream.register_presence_callback(type_, from_, cb)
try:
yield
finally:
stream.unregister_presence_callback(type_, from_)
| presence_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(stream, type_, from_, cb):\n stream.register_presence_callback(type_, from_, cb)\n try:\n yield\n finally:\n stream.unregister_presence_callback(type_, from_)\n",
"role": "user"
},
{
"content": "presence_handler",
"role": "assistant"
}
] |
def x(filter_, func, order=_Undefined):
if order is not _Undefined:
return filter_.context_register(func, order)
else:
return filter_.context_register(func)
| stanza_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filter_, func, order=_Undefined):\n if order is not _Undefined:\n return filter_.context_register(func, order)\n else:\n return filter_.context_register(func)\n",
"role": "user"
},
{
"content": "stanza_filter",
"role": "assistant"
}
] |
def x(self):
if (self._state != StanzaState.ACTIVE and self._state != StanzaState.
ABORTED):
raise RuntimeError('cannot abort stanza (already sent)')
self._set_state(StanzaState.ABORTED)
| abort | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if (self._state != StanzaState.ACTIVE and self._state != StanzaState.\n ABORTED):\n raise RuntimeError('cannot abort stanza (already sent)')\n self._set_state(StanzaState.ABORTED)\n",
"role": "user"
},
{
"content": "abort",
"role": "assistant"
}
] |
def x(self, task):
try:
task.result()
except asyncio.CancelledError:
pass
except Exception as err:
try:
if self._sm_enabled:
self._xmlstream.abort()
else:
self._xmlstream.close()
except Exception:
pass
self.on_failure(err)
self._logger.exception('broker task failed')
| done_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, task):\n try:\n task.result()\n except asyncio.CancelledError:\n pass\n except Exception as err:\n try:\n if self._sm_enabled:\n self._xmlstream.abort()\n else:\n self._xmlstream.close()\n except Exception:\n pass\n self.on_failure(err)\n self._logger.exception('broker task failed')\n",
"role": "user"
},
{
"content": "done_handler",
"role": "assistant"
}
] |
def x(self, exc):
self._logger.debug('destroying stream state (exc=%r)', exc)
self._iq_response_map.close_all(exc)
for task in self._iq_request_tasks:
task.cancel()
while not self._active_queue.empty():
token = self._active_queue.get_nowait()
token._set_state(StanzaState.DISCONNECTED)
if self._established:
self.on_stream_destroyed(exc)
self._established = False
| destroy_stream_state | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, exc):\n self._logger.debug('destroying stream state (exc=%r)', exc)\n self._iq_response_map.close_all(exc)\n for task in self._iq_request_tasks:\n task.cancel()\n while not self._active_queue.empty():\n token = self._active_queue.get_nowait()\n token._set_state(StanzaState.DISCONNECTED)\n if self._established:\n self.on_stream_destroyed(exc)\n self._established = False\n",
"role": "user"
},
{
"content": "destroy_stream_state",
"role": "assistant"
}
] |
def x(self, request, task):
try:
payload = task.result()
except errors.XMPPError as err:
self._send_iq_reply(request, err)
except Exception:
response = self._compose_undefined_condition(request)
self._enqueue(response)
self._logger.exception('IQ request coroutine failed')
else:
self._send_iq_reply(request, payload)
| iq_request_coro_done_send_reply | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, task):\n try:\n payload = task.result()\n except errors.XMPPError as err:\n self._send_iq_reply(request, err)\n except Exception:\n response = self._compose_undefined_condition(request)\n self._enqueue(response)\n self._logger.exception('IQ request coroutine failed')\n else:\n self._send_iq_reply(request, payload)\n",
"role": "user"
},
{
"content": "iq_request_coro_done_send_reply",
"role": "assistant"
}
] |
def x(self, stanza_obj):
self._logger.debug('incoming iq: %r', stanza_obj)
if stanza_obj.type_.is_response:
self._logger.debug('iq is response')
keys = [(stanza_obj.from_, stanza_obj.id_)]
if self._local_jid is not None:
if keys[0][0] == self._local_jid:
keys.append((None, keys[0][1]))
elif keys[0][0] is None:
keys.append((self._local_jid, keys[0][1]))
for key in keys:
try:
self._iq_response_map.unicast(key, stanza_obj)
self._logger.debug('iq response delivered to key %r', key)
break
except KeyError:
pass
else:
self._logger.warning('unexpected IQ response: from=%r, id=%r', *key
)
else:
self._logger.debug('iq is request')
key = stanza_obj.type_, type(stanza_obj.payload)
try:
coro, with_send_reply = self._iq_request_map[key]
except KeyError:
self._logger.warning(
'unhandleable IQ request: from=%r, type_=%r, payload=%r',
stanza_obj.from_, stanza_obj.type_, stanza_obj.payload)
response = stanza_obj.make_reply(type_=structs.IQType.ERROR)
response.error = stanza.Error(condition=errors.ErrorCondition.
SERVICE_UNAVAILABLE)
self._enqueue(response)
return
args = [stanza_obj]
if with_send_reply:
def x(result=None):
nonlocal task, stanza_obj, send_reply_callback
if task.done():
raise RuntimeError(
'send_reply called after the handler is done')
if task.remove_done_callback(send_reply_callback) == 0:
raise RuntimeError('send_reply called more than once')
task.add_done_callback(self._iq_request_coro_done_check)
self._send_iq_reply(stanza_obj, result)
args.append(send_reply)
try:
awaitable = coro(*args)
except Exception as exc:
awaitable = asyncio.Future()
awaitable.set_exception(exc)
task = asyncio.ensure_future(awaitable)
send_reply_callback = functools.partial(self.
_iq_request_coro_done_send_reply, stanza_obj)
task.add_done_callback(self._iq_request_coro_done_remove_task)
task.add_done_callback(send_reply_callback)
self._iq_request_tasks.append(task)
self._logger.debug('started task to handle request: %r', task)
| process_incoming_iq | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stanza_obj):\n self._logger.debug('incoming iq: %r', stanza_obj)\n if stanza_obj.type_.is_response:\n self._logger.debug('iq is response')\n keys = [(stanza_obj.from_, stanza_obj.id_)]\n if self._local_jid is not None:\n if keys[0][0] == self._local_jid:\n keys.append((None, keys[0][1]))\n elif keys[0][0] is None:\n keys.append((self._local_jid, keys[0][1]))\n for key in keys:\n try:\n self._iq_response_map.unicast(key, stanza_obj)\n self._logger.debug('iq response delivered to key %r', key)\n break\n except KeyError:\n pass\n else:\n self._logger.warning('unexpected IQ response: from=%r, id=%r', *key\n )\n else:\n self._logger.debug('iq is request')\n key = stanza_obj.type_, type(stanza_obj.payload)\n try:\n coro, with_send_reply = self._iq_request_map[key]\n except KeyError:\n self._logger.warning(\n 'unhandleable IQ request: from=%r, type_=%r, payload=%r',\n stanza_obj.from_, stanza_obj.type_, stanza_obj.payload)\n response = stanza_obj.make_reply(type_=structs.IQType.ERROR)\n response.error = stanza.Error(condition=errors.ErrorCondition.\n SERVICE_UNAVAILABLE)\n self._enqueue(response)\n return\n args = [stanza_obj]\n if with_send_reply:\n\n def x(result=None):\n nonlocal task, stanza_obj, send_reply_callback\n if task.done():\n raise RuntimeError(\n 'send_reply called after the handler is done')\n if task.remove_done_callback(send_reply_callback) == 0:\n raise RuntimeError('send_reply called more than once')\n task.add_done_callback(self._iq_request_coro_done_check)\n self._send_iq_reply(stanza_obj, result)\n args.append(send_reply)\n try:\n awaitable = coro(*args)\n except Exception as exc:\n awaitable = asyncio.Future()\n awaitable.set_exception(exc)\n task = asyncio.ensure_future(awaitable)\n send_reply_callback = functools.partial(self.\n _iq_request_coro_done_send_reply, stanza_obj)\n task.add_done_callback(self._iq_request_coro_done_remove_task)\n task.add_done_callback(send_reply_callback)\n self._iq_request_tasks.append(task)\n self._logger.debug('started task to handle request: %r', task)\n",
"role": "user"
},
{
"content": "process_incoming_iq",
"role": "assistant"
}
] |
def x(self, stanza_obj):
self._logger.debug('incoming message: %r', stanza_obj)
stanza_obj = self.service_inbound_message_filter.filter(stanza_obj)
if stanza_obj is None:
self._logger.debug('incoming message dropped by service filter chain')
return
stanza_obj = self.app_inbound_message_filter.filter(stanza_obj)
if stanza_obj is None:
self._logger.debug(
'incoming message dropped by application filter chain')
return
self.on_message_received(stanza_obj)
| process_incoming_message | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stanza_obj):\n self._logger.debug('incoming message: %r', stanza_obj)\n stanza_obj = self.service_inbound_message_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug('incoming message dropped by service filter chain')\n return\n stanza_obj = self.app_inbound_message_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug(\n 'incoming message dropped by application filter chain')\n return\n self.on_message_received(stanza_obj)\n",
"role": "user"
},
{
"content": "process_incoming_message",
"role": "assistant"
}
] |
def x(self, stanza_obj):
self._logger.debug('incoming presence: %r', stanza_obj)
stanza_obj = self.service_inbound_presence_filter.filter(stanza_obj)
if stanza_obj is None:
self._logger.debug('incoming presence dropped by service filter chain')
return
stanza_obj = self.app_inbound_presence_filter.filter(stanza_obj)
if stanza_obj is None:
self._logger.debug(
'incoming presence dropped by application filter chain')
return
self.on_presence_received(stanza_obj)
| process_incoming_presence | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stanza_obj):\n self._logger.debug('incoming presence: %r', stanza_obj)\n stanza_obj = self.service_inbound_presence_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug('incoming presence dropped by service filter chain')\n return\n stanza_obj = self.app_inbound_presence_filter.filter(stanza_obj)\n if stanza_obj is None:\n self._logger.debug(\n 'incoming presence dropped by application filter chain')\n return\n self.on_presence_received(stanza_obj)\n",
"role": "user"
},
{
"content": "process_incoming_presence",
"role": "assistant"
}
] |
def x(self, xmlstream, queue_entry):
stanza_obj, exc = queue_entry
if isinstance(stanza_obj, nonza.SMAcknowledgement):
self._logger.debug('received SM ack: %r', stanza_obj)
if not self._sm_enabled:
self._logger.warning('received SM ack, but SM not enabled')
return
self.sm_ack(stanza_obj.counter)
return
elif isinstance(stanza_obj, nonza.SMRequest):
self._logger.debug('received SM request: %r', stanza_obj)
if not self._sm_enabled:
self._logger.warning('received SM request, but SM not enabled')
return
response = nonza.SMAcknowledgement()
response.counter = self._sm_inbound_ctr
self._logger.debug('sending SM ack: %r', response)
xmlstream.send_xso(response)
return
if not isinstance(stanza_obj, stanza.StanzaBase):
raise RuntimeError('unexpected stanza class: {}'.format(stanza_obj))
if self._sm_enabled:
self._sm_inbound_ctr += 1
self._sm_inbound_ctr &= 4294967295
if exc is not None:
self._process_incoming_erroneous_stanza(stanza_obj, exc)
return
if isinstance(stanza_obj, stanza.IQ):
self._process_incoming_iq(stanza_obj)
elif isinstance(stanza_obj, stanza.Message):
self._process_incoming_message(stanza_obj)
elif isinstance(stanza_obj, stanza.Presence):
self._process_incoming_presence(stanza_obj)
| process_incoming | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, xmlstream, queue_entry):\n stanza_obj, exc = queue_entry\n if isinstance(stanza_obj, nonza.SMAcknowledgement):\n self._logger.debug('received SM ack: %r', stanza_obj)\n if not self._sm_enabled:\n self._logger.warning('received SM ack, but SM not enabled')\n return\n self.sm_ack(stanza_obj.counter)\n return\n elif isinstance(stanza_obj, nonza.SMRequest):\n self._logger.debug('received SM request: %r', stanza_obj)\n if not self._sm_enabled:\n self._logger.warning('received SM request, but SM not enabled')\n return\n response = nonza.SMAcknowledgement()\n response.counter = self._sm_inbound_ctr\n self._logger.debug('sending SM ack: %r', response)\n xmlstream.send_xso(response)\n return\n if not isinstance(stanza_obj, stanza.StanzaBase):\n raise RuntimeError('unexpected stanza class: {}'.format(stanza_obj))\n if self._sm_enabled:\n self._sm_inbound_ctr += 1\n self._sm_inbound_ctr &= 4294967295\n if exc is not None:\n self._process_incoming_erroneous_stanza(stanza_obj, exc)\n return\n if isinstance(stanza_obj, stanza.IQ):\n self._process_incoming_iq(stanza_obj)\n elif isinstance(stanza_obj, stanza.Message):\n self._process_incoming_message(stanza_obj)\n elif isinstance(stanza_obj, stanza.Presence):\n self._process_incoming_presence(stanza_obj)\n",
"role": "user"
},
{
"content": "process_incoming",
"role": "assistant"
}
] |
def x(self):
while True:
try:
stanza_obj = self._incoming_queue.get_nowait()
except asyncio.QueueEmpty:
break
self._process_incoming(None, stanza_obj)
| flush_incoming | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n while True:\n try:\n stanza_obj = self._incoming_queue.get_nowait()\n except asyncio.QueueEmpty:\n break\n self._process_incoming(None, stanza_obj)\n",
"role": "user"
},
{
"content": "flush_incoming",
"role": "assistant"
}
] |
def x(self, xmlstream, token):
if token.state == StanzaState.ABORTED:
return
stanza_obj = token.stanza
if isinstance(stanza_obj, stanza.Presence):
stanza_obj = self.app_outbound_presence_filter.filter(stanza_obj)
if stanza_obj is not None:
stanza_obj = self.service_outbound_presence_filter.filter(
stanza_obj)
elif isinstance(stanza_obj, stanza.Message):
stanza_obj = self.app_outbound_message_filter.filter(stanza_obj)
if stanza_obj is not None:
stanza_obj = self.service_outbound_message_filter.filter(stanza_obj
)
if stanza_obj is None:
token._set_state(StanzaState.DROPPED)
self._logger.debug('outgoing stanza %r dropped by filter chain',
token.stanza)
return
self._logger.debug('forwarding stanza to xmlstream: %r', stanza_obj)
try:
xmlstream.send_xso(stanza_obj)
except Exception as exc:
self._logger.warning('failed to send stanza', exc_info=True)
token._set_state(StanzaState.FAILED, exc)
return
if self._sm_enabled:
token._set_state(StanzaState.SENT)
self._sm_unacked_list.append(token)
else:
token._set_state(StanzaState.SENT_WITHOUT_SM)
| send_stanza | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, xmlstream, token):\n if token.state == StanzaState.ABORTED:\n return\n stanza_obj = token.stanza\n if isinstance(stanza_obj, stanza.Presence):\n stanza_obj = self.app_outbound_presence_filter.filter(stanza_obj)\n if stanza_obj is not None:\n stanza_obj = self.service_outbound_presence_filter.filter(\n stanza_obj)\n elif isinstance(stanza_obj, stanza.Message):\n stanza_obj = self.app_outbound_message_filter.filter(stanza_obj)\n if stanza_obj is not None:\n stanza_obj = self.service_outbound_message_filter.filter(stanza_obj\n )\n if stanza_obj is None:\n token._set_state(StanzaState.DROPPED)\n self._logger.debug('outgoing stanza %r dropped by filter chain',\n token.stanza)\n return\n self._logger.debug('forwarding stanza to xmlstream: %r', stanza_obj)\n try:\n xmlstream.send_xso(stanza_obj)\n except Exception as exc:\n self._logger.warning('failed to send stanza', exc_info=True)\n token._set_state(StanzaState.FAILED, exc)\n return\n if self._sm_enabled:\n token._set_state(StanzaState.SENT)\n self._sm_unacked_list.append(token)\n else:\n token._set_state(StanzaState.SENT_WITHOUT_SM)\n",
"role": "user"
},
{
"content": "send_stanza",
"role": "assistant"
}
] |
def x(self, xmlstream, token):
self._send_stanza(xmlstream, token)
while True:
try:
token = self._active_queue.get_nowait()
except asyncio.QueueEmpty:
break
self._send_stanza(xmlstream, token)
if self._sm_enabled:
self._logger.debug('sending SM req')
xmlstream.send_xso(nonza.SMRequest())
| process_outgoing | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, xmlstream, token):\n self._send_stanza(xmlstream, token)\n while True:\n try:\n token = self._active_queue.get_nowait()\n except asyncio.QueueEmpty:\n break\n self._send_stanza(xmlstream, token)\n if self._sm_enabled:\n self._logger.debug('sending SM req')\n xmlstream.send_xso(nonza.SMRequest())\n",
"role": "user"
},
{
"content": "process_outgoing",
"role": "assistant"
}
] |
def x(self, from_, id_, cb):
self._iq_response_map.add_listener((from_, id_), callbacks.
OneshotAsyncTagListener(cb, loop=self._loop))
self._logger.debug('iq response callback registered: from=%r, id=%r',
from_, id_)
| register_iq_response_callback | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, from_, id_, cb):\n self._iq_response_map.add_listener((from_, id_), callbacks.\n OneshotAsyncTagListener(cb, loop=self._loop))\n self._logger.debug('iq response callback registered: from=%r, id=%r',\n from_, id_)\n",
"role": "user"
},
{
"content": "register_iq_response_callback",
"role": "assistant"
}
] |
def x(self, from_, id_, fut):
self._iq_response_map.add_listener((from_, id_),
StanzaErrorAwareListener(callbacks.FutureListener(fut)))
self._logger.debug('iq response future registered: from=%r, id=%r',
from_, id_)
| register_iq_response_future | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, from_, id_, fut):\n self._iq_response_map.add_listener((from_, id_),\n StanzaErrorAwareListener(callbacks.FutureListener(fut)))\n self._logger.debug('iq response future registered: from=%r, id=%r',\n from_, id_)\n",
"role": "user"
},
{
"content": "register_iq_response_future",
"role": "assistant"
}
] |
def x(self, from_, id_):
self._iq_response_map.remove_listener((from_, id_))
self._logger.debug('iq response unregistered: from=%r, id=%r', from_, id_)
| unregister_iq_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, from_, id_):\n self._iq_response_map.remove_listener((from_, id_))\n self._logger.debug('iq response unregistered: from=%r, id=%r', from_, id_)\n",
"role": "user"
},
{
"content": "unregister_iq_response",
"role": "assistant"
}
] |
def x(self, type_, payload_cls, coro):
warnings.warn(
'register_iq_request_coro is a deprecated alias to register_iq_request_handler and will be removed in aioxmpp 1.0'
, DeprecationWarning, stacklevel=2)
return self.register_iq_request_handler(type_, payload_cls, coro)
| register_iq_request_coro | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, type_, payload_cls, coro):\n warnings.warn(\n 'register_iq_request_coro is a deprecated alias to register_iq_request_handler and will be removed in aioxmpp 1.0'\n , DeprecationWarning, stacklevel=2)\n return self.register_iq_request_handler(type_, payload_cls, coro)\n",
"role": "user"
},
{
"content": "register_iq_request_coro",
"role": "assistant"
}
] |
def x(self, type_, payload_cls, cb, *, with_send_reply=False):
type_ = self._coerce_enum(type_, structs.IQType)
if not type_.is_request:
raise ValueError('{!r} is not a request IQType'.format(type_))
key = type_, payload_cls
if key in self._iq_request_map:
raise ValueError('only one listener is allowed per tag')
self._iq_request_map[key] = cb, with_send_reply
self._logger.debug('iq request coroutine registered: type=%r, payload=%r',
type_, payload_cls)
| register_iq_request_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, type_, payload_cls, cb, *, with_send_reply=False):\n type_ = self._coerce_enum(type_, structs.IQType)\n if not type_.is_request:\n raise ValueError('{!r} is not a request IQType'.format(type_))\n key = type_, payload_cls\n if key in self._iq_request_map:\n raise ValueError('only one listener is allowed per tag')\n self._iq_request_map[key] = cb, with_send_reply\n self._logger.debug('iq request coroutine registered: type=%r, payload=%r',\n type_, payload_cls)\n",
"role": "user"
},
{
"content": "register_iq_request_handler",
"role": "assistant"
}
] |
def x(self, type_, payload_cls):
type_ = self._coerce_enum(type_, structs.IQType)
del self._iq_request_map[type_, payload_cls]
self._logger.debug('iq request coroutine unregistered: type=%r, payload=%r'
, type_, payload_cls)
| unregister_iq_request_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, type_, payload_cls):\n type_ = self._coerce_enum(type_, structs.IQType)\n del self._iq_request_map[type_, payload_cls]\n self._logger.debug('iq request coroutine unregistered: type=%r, payload=%r'\n , type_, payload_cls)\n",
"role": "user"
},
{
"content": "unregister_iq_request_handler",
"role": "assistant"
}
] |
def x(self, type_, from_, cb):
if type_ is not None:
type_ = self._coerce_enum(type_, structs.MessageType)
warnings.warn(
'register_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead'
, DeprecationWarning, stacklevel=2)
self._xxx_message_dispatcher.register_callback(type_, from_, cb)
| register_message_callback | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, type_, from_, cb):\n if type_ is not None:\n type_ = self._coerce_enum(type_, structs.MessageType)\n warnings.warn(\n 'register_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_message_dispatcher.register_callback(type_, from_, cb)\n",
"role": "user"
},
{
"content": "register_message_callback",
"role": "assistant"
}
] |
def x(self, type_, from_):
if type_ is not None:
type_ = self._coerce_enum(type_, structs.MessageType)
warnings.warn(
'unregister_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead'
, DeprecationWarning, stacklevel=2)
self._xxx_message_dispatcher.unregister_callback(type_, from_)
| unregister_message_callback | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, type_, from_):\n if type_ is not None:\n type_ = self._coerce_enum(type_, structs.MessageType)\n warnings.warn(\n 'unregister_message_callback is deprecated; use aioxmpp.dispatcher.SimpleMessageDispatcher instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_message_dispatcher.unregister_callback(type_, from_)\n",
"role": "user"
},
{
"content": "unregister_message_callback",
"role": "assistant"
}
] |
def x(self, type_, from_, cb):
type_ = self._coerce_enum(type_, structs.PresenceType)
warnings.warn(
'register_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead'
, DeprecationWarning, stacklevel=2)
self._xxx_presence_dispatcher.register_callback(type_, from_, cb)
| register_presence_callback | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, type_, from_, cb):\n type_ = self._coerce_enum(type_, structs.PresenceType)\n warnings.warn(\n 'register_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_presence_dispatcher.register_callback(type_, from_, cb)\n",
"role": "user"
},
{
"content": "register_presence_callback",
"role": "assistant"
}
] |
def x(self, type_, from_):
type_ = self._coerce_enum(type_, structs.PresenceType)
warnings.warn(
'unregister_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead'
, DeprecationWarning, stacklevel=2)
self._xxx_presence_dispatcher.unregister_callback(type_, from_)
| unregister_presence_callback | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, type_, from_):\n type_ = self._coerce_enum(type_, structs.PresenceType)\n warnings.warn(\n 'unregister_presence_callback is deprecated; use aioxmpp.dispatcher.SimplePresenceDispatcher or aioxmpp.PresenceClient instead'\n , DeprecationWarning, stacklevel=2)\n self._xxx_presence_dispatcher.unregister_callback(type_, from_)\n",
"role": "user"
},
{
"content": "unregister_presence_callback",
"role": "assistant"
}
] |
def x(self, xmlstream):
if self.running:
raise RuntimeError('already started')
self._start_prepare(xmlstream, self.recv_stanza)
self._closed = False
self._start_commit(xmlstream)
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, xmlstream):\n if self.running:\n raise RuntimeError('already started')\n self._start_prepare(xmlstream, self.recv_stanza)\n self._closed = False\n self._start_commit(xmlstream)\n",
"role": "user"
},
{
"content": "start",
"role": "assistant"
}
] |
def x(self):
if not self.running:
return
self._logger.debug('sending stop signal to task')
self._task.cancel()
| stop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.running:\n return\n self._logger.debug('sending stop signal to task')\n self._task.cancel()\n",
"role": "user"
},
{
"content": "stop",
"role": "assistant"
}
] |
def x(self):
if not self.running:
return
self.stop()
try:
yield from self._task
except asyncio.CancelledError:
pass
| wait_stop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.running:\n return\n self.stop()\n try:\n yield from self._task\n except asyncio.CancelledError:\n pass\n",
"role": "user"
},
{
"content": "wait_stop",
"role": "assistant"
}
] |
def x(self):
exc = DestructionRequested('close() called')
if self.running:
if self.sm_enabled:
self._xmlstream.send_xso(nonza.SMAcknowledgement(counter=self.
_sm_inbound_ctr))
yield from self._xmlstream.close_and_wait()
yield from self.wait_stop()
self._closed = True
self._xmlstream_exception = exc
self._destroy_stream_state(self._xmlstream_exception)
if self.sm_enabled:
self.stop_sm()
| close | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n exc = DestructionRequested('close() called')\n if self.running:\n if self.sm_enabled:\n self._xmlstream.send_xso(nonza.SMAcknowledgement(counter=self.\n _sm_inbound_ctr))\n yield from self._xmlstream.close_and_wait()\n yield from self.wait_stop()\n self._closed = True\n self._xmlstream_exception = exc\n self._destroy_stream_state(self._xmlstream_exception)\n if self.sm_enabled:\n self.stop_sm()\n",
"role": "user"
},
{
"content": "close",
"role": "assistant"
}
] |
def x(self, request_resumption=True, resumption_timeout=None):
if not self.running:
raise RuntimeError(
'cannot start Stream Management while StanzaStream is not running')
if self.sm_enabled:
raise RuntimeError('Stream Management already enabled')
if resumption_timeout == 0:
request_resumption = False
resumption_timeout = None
def x(response):
if isinstance(response, nonza.SMFailed):
return
self._sm_outbound_base = 0
self._sm_inbound_ctr = 0
self._sm_unacked_list = []
self._sm_enabled = True
self._sm_id = response.id_
self._sm_resumable = response.resume
self._sm_max = response.max_
self._sm_location = response.location
self._logger.info('SM started: resumable=%s, stream id=%r', self.
_sm_resumable, self._sm_id)
self._xmlstream.stanza_parser.add_class(nonza.SMRequest, self.
recv_stanza)
self._xmlstream.stanza_parser.add_class(nonza.SMAcknowledgement,
self.recv_stanza)
with (yield from self._broker_lock):
response = yield from protocol.send_and_wait_for(self._xmlstream, [
nonza.SMEnable(resume=bool(request_resumption), max_=
resumption_timeout)], [nonza.SMEnabled, nonza.SMFailed], cb=
handle_response)
if isinstance(response, nonza.SMFailed):
raise errors.StreamNegotiationFailure('Server rejected SM request')
| start_sm | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request_resumption=True, resumption_timeout=None):\n if not self.running:\n raise RuntimeError(\n 'cannot start Stream Management while StanzaStream is not running')\n if self.sm_enabled:\n raise RuntimeError('Stream Management already enabled')\n if resumption_timeout == 0:\n request_resumption = False\n resumption_timeout = None\n\n def x(response):\n if isinstance(response, nonza.SMFailed):\n return\n self._sm_outbound_base = 0\n self._sm_inbound_ctr = 0\n self._sm_unacked_list = []\n self._sm_enabled = True\n self._sm_id = response.id_\n self._sm_resumable = response.resume\n self._sm_max = response.max_\n self._sm_location = response.location\n self._logger.info('SM started: resumable=%s, stream id=%r', self.\n _sm_resumable, self._sm_id)\n self._xmlstream.stanza_parser.add_class(nonza.SMRequest, self.\n recv_stanza)\n self._xmlstream.stanza_parser.add_class(nonza.SMAcknowledgement,\n self.recv_stanza)\n with (yield from self._broker_lock):\n response = yield from protocol.send_and_wait_for(self._xmlstream, [\n nonza.SMEnable(resume=bool(request_resumption), max_=\n resumption_timeout)], [nonza.SMEnabled, nonza.SMFailed], cb=\n handle_response)\n if isinstance(response, nonza.SMFailed):\n raise errors.StreamNegotiationFailure('Server rejected SM request')\n",
"role": "user"
},
{
"content": "start_sm",
"role": "assistant"
}
] |
def x(self, remote_ctr):
self._logger.info('resuming SM stream with remote_ctr=%d', remote_ctr)
self.sm_ack(remote_ctr)
for token in self._sm_unacked_list:
self._active_queue.putleft_nowait(token)
self._sm_unacked_list.clear()
| resume_sm | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, remote_ctr):\n self._logger.info('resuming SM stream with remote_ctr=%d', remote_ctr)\n self.sm_ack(remote_ctr)\n for token in self._sm_unacked_list:\n self._active_queue.putleft_nowait(token)\n self._sm_unacked_list.clear()\n",
"role": "user"
},
{
"content": "resume_sm",
"role": "assistant"
}
] |
def x(self, xmlstream):
if self.running:
raise RuntimeError(
'Cannot resume Stream Management while StanzaStream is running')
self._start_prepare(xmlstream, self.recv_stanza)
try:
response = yield from protocol.send_and_wait_for(xmlstream, [nonza.
SMResume(previd=self.sm_id, counter=self._sm_inbound_ctr)], [
nonza.SMResumed, nonza.SMFailed])
if isinstance(response, nonza.SMFailed):
exc = errors.StreamNegotiationFailure(
'Server rejected SM resumption')
if response.counter is not None:
self.sm_ack(response.counter)
self._clear_unacked(StanzaState.DISCONNECTED)
xmlstream.stanza_parser.remove_class(nonza.SMRequest)
xmlstream.stanza_parser.remove_class(nonza.SMAcknowledgement)
self.stop_sm()
raise exc
self._resume_sm(response.counter)
except:
self._start_rollback(xmlstream)
raise
self._start_commit(xmlstream)
| resume_sm | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, xmlstream):\n if self.running:\n raise RuntimeError(\n 'Cannot resume Stream Management while StanzaStream is running')\n self._start_prepare(xmlstream, self.recv_stanza)\n try:\n response = yield from protocol.send_and_wait_for(xmlstream, [nonza.\n SMResume(previd=self.sm_id, counter=self._sm_inbound_ctr)], [\n nonza.SMResumed, nonza.SMFailed])\n if isinstance(response, nonza.SMFailed):\n exc = errors.StreamNegotiationFailure(\n 'Server rejected SM resumption')\n if response.counter is not None:\n self.sm_ack(response.counter)\n self._clear_unacked(StanzaState.DISCONNECTED)\n xmlstream.stanza_parser.remove_class(nonza.SMRequest)\n xmlstream.stanza_parser.remove_class(nonza.SMAcknowledgement)\n self.stop_sm()\n raise exc\n self._resume_sm(response.counter)\n except:\n self._start_rollback(xmlstream)\n raise\n self._start_commit(xmlstream)\n",
"role": "user"
},
{
"content": "resume_sm",
"role": "assistant"
}
] |
def x(self):
if not self.sm_enabled:
raise RuntimeError('Stream Management is not enabled')
self._logger.info('stopping SM stream')
self._sm_enabled = False
del self._sm_outbound_base
del self._sm_inbound_ctr
self._clear_unacked(StanzaState.SENT_WITHOUT_SM)
del self._sm_unacked_list
self._destroy_stream_state(ConnectionError('stream management disabled'))
| stop_sm | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.sm_enabled:\n raise RuntimeError('Stream Management is not enabled')\n self._logger.info('stopping SM stream')\n self._sm_enabled = False\n del self._sm_outbound_base\n del self._sm_inbound_ctr\n self._clear_unacked(StanzaState.SENT_WITHOUT_SM)\n del self._sm_unacked_list\n self._destroy_stream_state(ConnectionError('stream management disabled'))\n",
"role": "user"
},
{
"content": "stop_sm",
"role": "assistant"
}
] |
def x(self, remote_ctr):
if not self._sm_enabled:
raise RuntimeError('Stream Management is not enabled')
self._logger.debug('sm_ack(%d)', remote_ctr)
to_drop = remote_ctr - self._sm_outbound_base & 4294967295
self._logger.debug('sm_ack: to drop %d, unacked: %d', to_drop, len(self
._sm_unacked_list))
if to_drop > len(self._sm_unacked_list):
raise errors.StreamNegotiationFailure(
'acked more stanzas than have been sent (outbound_base={}, remote_ctr={})'
.format(self._sm_outbound_base, remote_ctr))
acked = self._sm_unacked_list[:to_drop]
del self._sm_unacked_list[:to_drop]
self._sm_outbound_base = remote_ctr
if acked:
self._logger.debug('%d stanzas acked by remote', len(acked))
for token in acked:
token._set_state(StanzaState.ACKED)
| sm_ack | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, remote_ctr):\n if not self._sm_enabled:\n raise RuntimeError('Stream Management is not enabled')\n self._logger.debug('sm_ack(%d)', remote_ctr)\n to_drop = remote_ctr - self._sm_outbound_base & 4294967295\n self._logger.debug('sm_ack: to drop %d, unacked: %d', to_drop, len(self\n ._sm_unacked_list))\n if to_drop > len(self._sm_unacked_list):\n raise errors.StreamNegotiationFailure(\n 'acked more stanzas than have been sent (outbound_base={}, remote_ctr={})'\n .format(self._sm_outbound_base, remote_ctr))\n acked = self._sm_unacked_list[:to_drop]\n del self._sm_unacked_list[:to_drop]\n self._sm_outbound_base = remote_ctr\n if acked:\n self._logger.debug('%d stanzas acked by remote', len(acked))\n for token in acked:\n token._set_state(StanzaState.ACKED)\n",
"role": "user"
},
{
"content": "sm_ack",
"role": "assistant"
}
] |
def x(self, iq, *, timeout=None):
warnings.warn(
'send_iq_and_wait_for_reply is deprecated and will be removed in 1.0',
DeprecationWarning, stacklevel=1)
return (yield from self.send(iq, timeout=timeout))
| send_iq_and_wait_for_reply | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, iq, *, timeout=None):\n warnings.warn(\n 'send_iq_and_wait_for_reply is deprecated and will be removed in 1.0',\n DeprecationWarning, stacklevel=1)\n return (yield from self.send(iq, timeout=timeout))\n",
"role": "user"
},
{
"content": "send_iq_and_wait_for_reply",
"role": "assistant"
}
] |
def x(self, stanza):
warnings.warn(
'send_and_wait_for_sent is deprecated and will be removed in 1.0',
DeprecationWarning, stacklevel=1)
yield from self._enqueue(stanza)
| send_and_wait_for_sent | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stanza):\n warnings.warn(\n 'send_and_wait_for_sent is deprecated and will be removed in 1.0',\n DeprecationWarning, stacklevel=1)\n yield from self._enqueue(stanza)\n",
"role": "user"
},
{
"content": "send_and_wait_for_sent",
"role": "assistant"
}
] |
def x(self, stanza, *, timeout=None, cb=None):
stanza.autoset_id()
self._logger.debug('sending %r and waiting for it to be sent', stanza)
if not isinstance(stanza, stanza_.IQ) or stanza.type_.is_response:
if cb is not None:
raise ValueError('cb not supported with non-IQ non-request stanzas'
)
yield from self._enqueue(stanza)
return
fut = asyncio.Future()
def x(task):
nonlocal fut
if task.exception() is None:
fut.set_result(task.result())
else:
fut.set_exception(task.exception())
def x(stanza):
nonlocal fut
if fut.cancelled():
return
if cb is not None:
try:
nested_fut = cb(stanza)
except Exception as exc:
fut.set_exception(exc)
else:
if nested_fut is not None:
nested_fut.add_done_callback(nested_cb)
return
if stanza.type_.is_error:
fut.set_exception(stanza.error.to_exception())
else:
fut.set_result(stanza.payload)
def x(exc):
nonlocal fut
if fut.cancelled():
return
fut.set_exception(exc)
listener = callbacks.OneshotTagListener(handler_ok, handler_error)
listener_tag = stanza.to, stanza.id_
self._iq_response_map.add_listener(listener_tag, listener)
try:
yield from self._enqueue(stanza)
except Exception:
listener.cancel()
raise
try:
if not timeout:
reply = yield from fut
else:
try:
reply = yield from asyncio.wait_for(fut, timeout=timeout)
except asyncio.TimeoutError:
raise TimeoutError
finally:
try:
self._iq_response_map.remove_listener(listener_tag)
except KeyError:
pass
return reply
| send_immediately | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stanza, *, timeout=None, cb=None):\n stanza.autoset_id()\n self._logger.debug('sending %r and waiting for it to be sent', stanza)\n if not isinstance(stanza, stanza_.IQ) or stanza.type_.is_response:\n if cb is not None:\n raise ValueError('cb not supported with non-IQ non-request stanzas'\n )\n yield from self._enqueue(stanza)\n return\n fut = asyncio.Future()\n\n def x(task):\n nonlocal fut\n if task.exception() is None:\n fut.set_result(task.result())\n else:\n fut.set_exception(task.exception())\n\n def x(stanza):\n nonlocal fut\n if fut.cancelled():\n return\n if cb is not None:\n try:\n nested_fut = cb(stanza)\n except Exception as exc:\n fut.set_exception(exc)\n else:\n if nested_fut is not None:\n nested_fut.add_done_callback(nested_cb)\n return\n if stanza.type_.is_error:\n fut.set_exception(stanza.error.to_exception())\n else:\n fut.set_result(stanza.payload)\n\n def x(exc):\n nonlocal fut\n if fut.cancelled():\n return\n fut.set_exception(exc)\n listener = callbacks.OneshotTagListener(handler_ok, handler_error)\n listener_tag = stanza.to, stanza.id_\n self._iq_response_map.add_listener(listener_tag, listener)\n try:\n yield from self._enqueue(stanza)\n except Exception:\n listener.cancel()\n raise\n try:\n if not timeout:\n reply = yield from fut\n else:\n try:\n reply = yield from asyncio.wait_for(fut, timeout=timeout)\n except asyncio.TimeoutError:\n raise TimeoutError\n finally:\n try:\n self._iq_response_map.remove_listener(listener_tag)\n except KeyError:\n pass\n return reply\n",
"role": "user"
},
{
"content": "send_immediately",
"role": "assistant"
}
] |
def x(features):
parts = [(feature.encode('utf-8') + b'\x1f') for feature in features]
parts.sort()
return b''.join(parts) + b'\x1c'
| process_features | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(features):\n parts = [(feature.encode('utf-8') + b'\\x1f') for feature in features]\n parts.sort()\n return b''.join(parts) + b'\\x1c'\n",
"role": "user"
},
{
"content": "process_features",
"role": "assistant"
}
] |
def x(identities):
parts = [_process_identity(identity) for identity in identities]
parts.sort()
return b''.join(parts) + b'\x1c'
| process_identities | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(identities):\n parts = [_process_identity(identity) for identity in identities]\n parts.sort()\n return b''.join(parts) + b'\\x1c'\n",
"role": "user"
},
{
"content": "process_identities",
"role": "assistant"
}
] |
def x(exts):
parts = [_process_form(form) for form in exts]
parts.sort()
return b''.join(parts) + b'\x1c'
| process_extensions | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(exts):\n parts = [_process_form(form) for form in exts]\n parts.sort()\n return b''.join(parts) + b'\\x1c'\n",
"role": "user"
},
{
"content": "process_extensions",
"role": "assistant"
}
] |
def x(self, instance, class_=None):
if class_ is None:
class_ = type(instance)
self._toplevels[class_] = instance
| set_toplevel_object | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, instance, class_=None):\n if class_ is None:\n class_ = type(instance)\n self._toplevels[class_] = instance\n",
"role": "user"
},
{
"content": "set_toplevel_object",
"role": "assistant"
}
] |
def x(self, expr):
result = expr.eval(self)
iterator = iter(result)
try:
next(iterator)
except StopIteration:
return False
else:
return True
finally:
if hasattr(iterator, 'close'):
iterator.close()
| eval_bool | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, expr):\n result = expr.eval(self)\n iterator = iter(result)\n try:\n next(iterator)\n except StopIteration:\n return False\n else:\n return True\n finally:\n if hasattr(iterator, 'close'):\n iterator.close()\n",
"role": "user"
},
{
"content": "eval_bool",
"role": "assistant"
}
] |
def x(self, new_state):
if new_state > self._state:
raise ValueError('cannot forward using rewind ({} > {})'.format(
new_state, self._state))
self._state = new_state
| rewind | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_state):\n if new_state > self._state:\n raise ValueError('cannot forward using rewind ({} > {})'.format(\n new_state, self._state))\n self._state = new_state\n",
"role": "user"
},
{
"content": "rewind",
"role": "assistant"
}
] |
def x(self, new_state):
if self._state == new_state:
return
if self._state > new_state:
raise OrderedStateSkipped(new_state)
fut = asyncio.Future(loop=self.loop)
self._exact_waiters.append((new_state, fut))
yield from fut
| wait_for | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_state):\n if self._state == new_state:\n return\n if self._state > new_state:\n raise OrderedStateSkipped(new_state)\n fut = asyncio.Future(loop=self.loop)\n self._exact_waiters.append((new_state, fut))\n yield from fut\n",
"role": "user"
},
{
"content": "wait_for",
"role": "assistant"
}
] |
def x(self, new_state):
if not self._state < new_state:
return
fut = asyncio.Future(loop=self.loop)
self._least_waiters.append((new_state, fut))
yield from fut
| wait_for_at_least | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, new_state):\n if not self._state < new_state:\n return\n fut = asyncio.Future(loop=self.loop)\n self._least_waiters.append((new_state, fut))\n yield from fut\n",
"role": "user"
},
{
"content": "wait_for_at_least",
"role": "assistant"
}
] |
def x(cls):
Item.register_child(Item.registered_payload, cls)
EventItem.register_child(EventItem.registered_payload, cls)
return cls
| as_payload_class | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls):\n Item.register_child(Item.registered_payload, cls)\n EventItem.register_child(EventItem.registered_payload, cls)\n return cls\n",
"role": "user"
},
{
"content": "as_payload_class",
"role": "assistant"
}
] |
def x(self, peer_jid):
presences = sorted(self.get_peer_resources(peer_jid).items(), key=lambda
item: aioxmpp.structs.PresenceState.from_stanza(item[1]))
if not presences:
return None
return presences[-1][1]
| get_most_available_stanza | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer_jid):\n presences = sorted(self.get_peer_resources(peer_jid).items(), key=lambda\n item: aioxmpp.structs.PresenceState.from_stanza(item[1]))\n if not presences:\n return None\n return presences[-1][1]\n",
"role": "user"
},
{
"content": "get_most_available_stanza",
"role": "assistant"
}
] |
def x(self, peer_jid):
try:
d = dict(self._presences[peer_jid])
d.pop(None, None)
return d
except KeyError:
return {}
| get_peer_resources | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer_jid):\n try:\n d = dict(self._presences[peer_jid])\n d.pop(None, None)\n return d\n except KeyError:\n return {}\n",
"role": "user"
},
{
"content": "get_peer_resources",
"role": "assistant"
}
] |
def x(self, peer_jid):
try:
return self._presences[peer_jid.bare()][peer_jid.resource]
except KeyError:
pass
try:
return self._presences[peer_jid.bare()][None]
except KeyError:
pass
| get_stanza | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, peer_jid):\n try:\n return self._presences[peer_jid.bare()][peer_jid.resource]\n except KeyError:\n pass\n try:\n return self._presences[peer_jid.bare()][None]\n except KeyError:\n pass\n",
"role": "user"
},
{
"content": "get_stanza",
"role": "assistant"
}
] |
def x(self):
stanza = aioxmpp.Presence()
self._state.apply_to_stanza(stanza)
stanza.status.update(self._status)
return stanza
| make_stanza | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n stanza = aioxmpp.Presence()\n self._state.apply_to_stanza(stanza)\n stanza.status.update(self._status)\n return stanza\n",
"role": "user"
},
{
"content": "make_stanza",
"role": "assistant"
}
] |
def x(self, state, status={}, priority=0):
if not isinstance(priority, numbers.Integral):
raise TypeError('invalid priority: got {}, expected integer'.format
(type(priority)))
if not isinstance(state, aioxmpp.PresenceState):
raise TypeError('invalid state: got {}, expected aioxmpp.PresenceState'
.format(type(state)))
if isinstance(status, str):
new_status = {None: status}
else:
new_status = dict(status)
new_priority = int(priority)
emit_state_event = self._state != state
emit_overall_event = (emit_state_event or self._priority !=
new_priority or self._status != new_status)
self._state = state
self._status = new_status
self._priority = new_priority
if emit_state_event:
self.on_presence_state_changed()
if emit_overall_event:
self.on_presence_changed()
return self.resend_presence()
| set_presence | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state, status={}, priority=0):\n if not isinstance(priority, numbers.Integral):\n raise TypeError('invalid priority: got {}, expected integer'.format\n (type(priority)))\n if not isinstance(state, aioxmpp.PresenceState):\n raise TypeError('invalid state: got {}, expected aioxmpp.PresenceState'\n .format(type(state)))\n if isinstance(status, str):\n new_status = {None: status}\n else:\n new_status = dict(status)\n new_priority = int(priority)\n emit_state_event = self._state != state\n emit_overall_event = (emit_state_event or self._priority !=\n new_priority or self._status != new_status)\n self._state = state\n self._status = new_status\n self._priority = new_priority\n if emit_state_event:\n self.on_presence_state_changed()\n if emit_overall_event:\n self.on_presence_changed()\n return self.resend_presence()\n",
"role": "user"
},
{
"content": "set_presence",
"role": "assistant"
}
] |
def x(self):
if self.client.established:
return self.client.enqueue(self.make_stanza())
| resend_presence | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.client.established:\n return self.client.enqueue(self.make_stanza())\n",
"role": "user"
},
{
"content": "resend_presence",
"role": "assistant"
}
] |
def x(x509):
result = {'subject': ((('commonName', x509.get_subject().commonName),),)}
for ext_idx in range(x509.get_extension_count()):
ext = x509.get_extension(ext_idx)
sn = ext.get_short_name()
if sn != b'subjectAltName':
continue
data = pyasn1.codec.der.decoder.decode(ext.get_data(), asn1Spec=
pyasn1_modules.rfc2459.SubjectAltName())[0]
for name in data:
dNSName = name.getComponentByPosition(2)
if dNSName is None:
continue
if hasattr(dNSName, 'isValue') and not dNSName.isValue:
continue
result.setdefault('subjectAltName', []).append(('DNS', str(
dNSName)))
return result
| extract_python_dict_from_x509 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(x509):\n result = {'subject': ((('commonName', x509.get_subject().commonName),),)}\n for ext_idx in range(x509.get_extension_count()):\n ext = x509.get_extension(ext_idx)\n sn = ext.get_short_name()\n if sn != b'subjectAltName':\n continue\n data = pyasn1.codec.der.decoder.decode(ext.get_data(), asn1Spec=\n pyasn1_modules.rfc2459.SubjectAltName())[0]\n for name in data:\n dNSName = name.getComponentByPosition(2)\n if dNSName is None:\n continue\n if hasattr(dNSName, 'isValue') and not dNSName.isValue:\n continue\n result.setdefault('subjectAltName', []).append(('DNS', str(\n dNSName)))\n return result\n",
"role": "user"
},
{
"content": "extract_python_dict_from_x509",
"role": "assistant"
}
] |
def x(blob):
return pyasn1.codec.der.decoder.decode(blob, asn1Spec=pyasn1_modules.
rfc2459.Certificate())[0]
| blob_to_pyasn1 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(blob):\n return pyasn1.codec.der.decoder.decode(blob, asn1Spec=pyasn1_modules.\n rfc2459.Certificate())[0]\n",
"role": "user"
},
{
"content": "blob_to_pyasn1",
"role": "assistant"
}
] |
def x(pyasn1_struct):
pk = pyasn1_struct.getComponentByName('tbsCertificate').getComponentByName(
'subjectPublicKeyInfo')
return pyasn1.codec.der.encoder.encode(pk)
| extract_pk_blob_from_pyasn1 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pyasn1_struct):\n pk = pyasn1_struct.getComponentByName('tbsCertificate').getComponentByName(\n 'subjectPublicKeyInfo')\n return pyasn1.codec.der.encoder.encode(pk)\n",
"role": "user"
},
{
"content": "extract_pk_blob_from_pyasn1",
"role": "assistant"
}
] |
def x(x509, hostname):
cert_structure = extract_python_dict_from_x509(x509)
try:
ssl.match_hostname(cert_structure, hostname)
except ssl.CertificateError:
return False
return True
| check_x509_hostname | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(x509, hostname):\n cert_structure = extract_python_dict_from_x509(x509)\n try:\n ssl.match_hostname(cert_structure, hostname)\n except ssl.CertificateError:\n return False\n return True\n",
"role": "user"
},
{
"content": "check_x509_hostname",
"role": "assistant"
}
] |
def x():
ctx = OpenSSL.SSL.Context(OpenSSL.SSL.SSLv23_METHOD)
ctx.set_options(OpenSSL.SSL.OP_NO_SSLv2 | OpenSSL.SSL.OP_NO_SSLv3)
ctx.set_verify(OpenSSL.SSL.VERIFY_PEER, default_verify_callback)
return ctx
| default_ssl_context | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n ctx = OpenSSL.SSL.Context(OpenSSL.SSL.SSLv23_METHOD)\n ctx.set_options(OpenSSL.SSL.OP_NO_SSLv2 | OpenSSL.SSL.OP_NO_SSLv3)\n ctx.set_verify(OpenSSL.SSL.VERIFY_PEER, default_verify_callback)\n return ctx\n",
"role": "user"
},
{
"content": "default_ssl_context",
"role": "assistant"
}
] |
def x(transport, xmlstream, sasl_providers, negotiation_timeout, jid, features
):
if not transport.get_extra_info('sslcontext'):
transport = None
last_auth_error = None
for sasl_provider in sasl_providers:
try:
result = yield from sasl_provider.execute(jid, features,
xmlstream, transport)
except ValueError as err:
raise errors.StreamNegotiationFailure('invalid credentials: {}'
.format(err)) from err
except aiosasl.AuthenticationFailure as err:
last_auth_error = err
continue
if result:
features = yield from protocol.reset_stream_and_get_features(
xmlstream)
break
else:
if last_auth_error:
raise last_auth_error
else:
raise errors.SASLUnavailable('No common mechanisms')
return features
| negotiate_sasl | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(transport, xmlstream, sasl_providers, negotiation_timeout, jid, features\n ):\n if not transport.get_extra_info('sslcontext'):\n transport = None\n last_auth_error = None\n for sasl_provider in sasl_providers:\n try:\n result = yield from sasl_provider.execute(jid, features,\n xmlstream, transport)\n except ValueError as err:\n raise errors.StreamNegotiationFailure('invalid credentials: {}'\n .format(err)) from err\n except aiosasl.AuthenticationFailure as err:\n last_auth_error = err\n continue\n if result:\n features = yield from protocol.reset_stream_and_get_features(\n xmlstream)\n break\n else:\n if last_auth_error:\n raise last_auth_error\n else:\n raise errors.SASLUnavailable('No common mechanisms')\n return features\n",
"role": "user"
},
{
"content": "negotiate_sasl",
"role": "assistant"
}
] |
def x(tls_provider, sasl_providers):
sasl_providers = tuple(sasl_providers)
if not sasl_providers:
raise ValueError('At least one SASL provider must be given.')
for sasl_provider in sasl_providers:
sasl_provider.execute
result = SecurityLayer(tls_provider.ssl_context_factory, tls_provider.
certificate_verifier_factory, tls_provider.tls_required, sasl_providers
)
return result
| security_layer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(tls_provider, sasl_providers):\n sasl_providers = tuple(sasl_providers)\n if not sasl_providers:\n raise ValueError('At least one SASL provider must be given.')\n for sasl_provider in sasl_providers:\n sasl_provider.execute\n result = SecurityLayer(tls_provider.ssl_context_factory, tls_provider.\n certificate_verifier_factory, tls_provider.tls_required, sasl_providers\n )\n return result\n",
"role": "user"
},
{
"content": "security_layer",
"role": "assistant"
}
] |
def x(password_provider, ssl_context_factory=default_ssl_context,
max_auth_attempts=3, certificate_verifier_factory=PKIXCertificateVerifier):
tls_kwargs = {}
if certificate_verifier_factory is not None:
tls_kwargs['certificate_verifier_factory'
] = certificate_verifier_factory
return SecurityLayer(ssl_context_factory, certificate_verifier_factory,
True, (PasswordSASLProvider(password_provider, max_auth_attempts=
max_auth_attempts),))
| tls_with_password_based_authentication | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(password_provider, ssl_context_factory=default_ssl_context,\n max_auth_attempts=3, certificate_verifier_factory=PKIXCertificateVerifier):\n tls_kwargs = {}\n if certificate_verifier_factory is not None:\n tls_kwargs['certificate_verifier_factory'\n ] = certificate_verifier_factory\n return SecurityLayer(ssl_context_factory, certificate_verifier_factory,\n True, (PasswordSASLProvider(password_provider, max_auth_attempts=\n max_auth_attempts),))\n",
"role": "user"
},
{
"content": "tls_with_password_based_authentication",
"role": "assistant"
}
] |
def x(password_provider, *, pin_store=None, pin_type=PinType.PUBLIC_KEY,
post_handshake_deferred_failure=None, anonymous=False,
ssl_context_factory=default_ssl_context, no_verify=False):
if isinstance(password_provider, str):
static_password = password_provider
@asyncio.coroutine
def x(jid, nattempt):
if nattempt == 0:
return static_password
return None
if pin_store is not None:
if post_handshake_deferred_failure is None:
@asyncio.coroutine
def x(verifier):
return False
if not isinstance(pin_store, AbstractPinStore):
pin_data = pin_store
if pin_type == PinType.PUBLIC_KEY:
logger.debug('using PublicKeyPinStore')
pin_store = PublicKeyPinStore()
else:
logger.debug('using CertificatePinStore')
pin_store = CertificatePinStore()
pin_store.import_from_json(pin_data)
def x():
return PinningPKIXCertificateVerifier(pin_store.query,
post_handshake_deferred_failure)
elif no_verify:
certificate_verifier_factory = _NullVerifier
else:
certificate_verifier_factory = PKIXCertificateVerifier
sasl_providers = []
if anonymous is not False:
if AnonymousSASLProvider is None:
raise RuntimeError(
'aiosasl does not support ANONYMOUS, please upgrade')
sasl_providers.append(AnonymousSASLProvider(anonymous))
if password_provider is not None:
sasl_providers.append(PasswordSASLProvider(password_provider))
return SecurityLayer(ssl_context_factory, certificate_verifier_factory,
True, tuple(sasl_providers))
| make | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(password_provider, *, pin_store=None, pin_type=PinType.PUBLIC_KEY,\n post_handshake_deferred_failure=None, anonymous=False,\n ssl_context_factory=default_ssl_context, no_verify=False):\n if isinstance(password_provider, str):\n static_password = password_provider\n\n @asyncio.coroutine\n def x(jid, nattempt):\n if nattempt == 0:\n return static_password\n return None\n if pin_store is not None:\n if post_handshake_deferred_failure is None:\n\n @asyncio.coroutine\n def x(verifier):\n return False\n if not isinstance(pin_store, AbstractPinStore):\n pin_data = pin_store\n if pin_type == PinType.PUBLIC_KEY:\n logger.debug('using PublicKeyPinStore')\n pin_store = PublicKeyPinStore()\n else:\n logger.debug('using CertificatePinStore')\n pin_store = CertificatePinStore()\n pin_store.import_from_json(pin_data)\n\n def x():\n return PinningPKIXCertificateVerifier(pin_store.query,\n post_handshake_deferred_failure)\n elif no_verify:\n certificate_verifier_factory = _NullVerifier\n else:\n certificate_verifier_factory = PKIXCertificateVerifier\n sasl_providers = []\n if anonymous is not False:\n if AnonymousSASLProvider is None:\n raise RuntimeError(\n 'aiosasl does not support ANONYMOUS, please upgrade')\n sasl_providers.append(AnonymousSASLProvider(anonymous))\n if password_provider is not None:\n sasl_providers.append(PasswordSASLProvider(password_provider))\n return SecurityLayer(ssl_context_factory, certificate_verifier_factory,\n True, tuple(sasl_providers))\n",
"role": "user"
},
{
"content": "make",
"role": "assistant"
}
] |
def x(self, hostname, x509):
key = self._x509_key(x509)
self._storage.setdefault(hostname, set()).add(key)
| pin | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, hostname, x509):\n key = self._x509_key(x509)\n self._storage.setdefault(hostname, set()).add(key)\n",
"role": "user"
},
{
"content": "pin",
"role": "assistant"
}
] |
def x(self, hostname, x509):
key = self._x509_key(x509)
try:
pins = self._storage[hostname]
except KeyError:
return None
if key in pins:
return True
return None
| query | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, hostname, x509):\n key = self._x509_key(x509)\n try:\n pins = self._storage[hostname]\n except KeyError:\n return None\n if key in pins:\n return True\n return None\n",
"role": "user"
},
{
"content": "query",
"role": "assistant"
}
] |
def x(self):
return {hostname: sorted(self._encode_key(key) for key in pins) for
hostname, pins in self._storage.items()}
| export_to_json | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return {hostname: sorted(self._encode_key(key) for key in pins) for \n hostname, pins in self._storage.items()}\n",
"role": "user"
},
{
"content": "export_to_json",
"role": "assistant"
}
] |
def x(self, data, *, override=False):
if override:
self._storage = {hostname: set(self._decode_key(key) for key in
pins) for hostname, pins in data.items()}
return
for hostname, pins in data.items():
existing_pins = self._storage.setdefault(hostname, set())
existing_pins.update(self._decode_key(key) for key in pins)
| import_from_json | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data, *, override=False):\n if override:\n self._storage = {hostname: set(self._decode_key(key) for key in\n pins) for hostname, pins in data.items()}\n return\n for hostname, pins in data.items():\n existing_pins = self._storage.setdefault(hostname, set())\n existing_pins.update(self._decode_key(key) for key in pins)\n",
"role": "user"
},
{
"content": "import_from_json",
"role": "assistant"
}
] |
def x(self, features, mechanism_classes):
try:
mechanisms = features[SASLMechanisms]
except KeyError:
logger.error('No sasl mechanisms: %r', list(features))
raise errors.SASLUnavailable('Remote side does not support SASL'
) from None
remote_mechanism_list = mechanisms.get_mechanism_list()
for our_mechanism in mechanism_classes:
token = our_mechanism.any_supported(remote_mechanism_list)
if token is not None:
return our_mechanism, token
return None, None
| find_supported | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, features, mechanism_classes):\n try:\n mechanisms = features[SASLMechanisms]\n except KeyError:\n logger.error('No sasl mechanisms: %r', list(features))\n raise errors.SASLUnavailable('Remote side does not support SASL'\n ) from None\n remote_mechanism_list = mechanisms.get_mechanism_list()\n for our_mechanism in mechanism_classes:\n token = our_mechanism.any_supported(remote_mechanism_list)\n if token is not None:\n return our_mechanism, token\n return None, None\n",
"role": "user"
},
{
"content": "find_supported",
"role": "assistant"
}
] |
def x(self, intf, mechanism, token):
sm = aiosasl.SASLStateMachine(intf)
try:
yield from mechanism.authenticate(sm, token)
return True
except aiosasl.SASLFailure as err:
if err.opaque_error in self.AUTHENTICATION_FAILURES:
raise aiosasl.AuthenticationFailure(opaque_error=err.
opaque_error, text=err.text)
elif err.opaque_error in self.MECHANISM_REJECTED_FAILURES:
return False
raise
| execute | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, intf, mechanism, token):\n sm = aiosasl.SASLStateMachine(intf)\n try:\n yield from mechanism.authenticate(sm, token)\n return True\n except aiosasl.SASLFailure as err:\n if err.opaque_error in self.AUTHENTICATION_FAILURES:\n raise aiosasl.AuthenticationFailure(opaque_error=err.\n opaque_error, text=err.text)\n elif err.opaque_error in self.MECHANISM_REJECTED_FAILURES:\n return False\n raise\n",
"role": "user"
},
{
"content": "execute",
"role": "assistant"
}
] |
def x(self, loop, metadata, domain: str, host, port, negotiation_timeout,
base_logger=None):
features_future = asyncio.Future(loop=loop)
stream = protocol.XMLStream(to=domain, features_future=features_future,
base_logger=base_logger)
if base_logger is not None:
logger = base_logger.getChild(type(self).__name__)
else:
logger = logging.getLogger('.'.join([__name__, type(self).
__qualname__]))
try:
transport, _ = yield from ssl_transport.create_starttls_connection(loop
, lambda : stream, host=host, port=port, peer_hostname=host,
server_hostname=to_ascii(domain), use_starttls=True)
except:
stream.abort()
raise
stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout)
features = yield from features_future
try:
features[nonza.StartTLSFeature]
except KeyError:
if not metadata.tls_required:
return transport, stream, (yield from features_future)
logger.debug(
'attempting STARTTLS despite not announced since it is required')
try:
response = yield from protocol.send_and_wait_for(stream, [nonza.
StartTLS()], [nonza.StartTLSFailure, nonza.StartTLSProceed])
except errors.StreamError:
raise errors.TLSUnavailable(
'STARTTLS not supported by server, but required by client')
if not isinstance(response, nonza.StartTLSProceed):
if metadata.tls_required:
message = 'server failed to STARTTLS'
protocol.send_stream_error_and_close(stream, condition=errors.
StreamErrorCondition.POLICY_VIOLATION, text=message)
raise errors.TLSUnavailable(message)
return transport, stream, (yield from features_future)
verifier = metadata.certificate_verifier_factory()
yield from verifier.pre_handshake(domain, host, port, metadata)
ssl_context = metadata.ssl_context_factory()
verifier.setup_context(ssl_context, transport)
yield from stream.starttls(ssl_context=ssl_context,
post_handshake_callback=verifier.post_handshake)
features_future = yield from protocol.reset_stream_and_get_features(stream,
timeout=negotiation_timeout)
return transport, stream, features_future
| connect | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, loop, metadata, domain: str, host, port, negotiation_timeout,\n base_logger=None):\n features_future = asyncio.Future(loop=loop)\n stream = protocol.XMLStream(to=domain, features_future=features_future,\n base_logger=base_logger)\n if base_logger is not None:\n logger = base_logger.getChild(type(self).__name__)\n else:\n logger = logging.getLogger('.'.join([__name__, type(self).\n __qualname__]))\n try:\n transport, _ = yield from ssl_transport.create_starttls_connection(loop\n , lambda : stream, host=host, port=port, peer_hostname=host,\n server_hostname=to_ascii(domain), use_starttls=True)\n except:\n stream.abort()\n raise\n stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout)\n features = yield from features_future\n try:\n features[nonza.StartTLSFeature]\n except KeyError:\n if not metadata.tls_required:\n return transport, stream, (yield from features_future)\n logger.debug(\n 'attempting STARTTLS despite not announced since it is required')\n try:\n response = yield from protocol.send_and_wait_for(stream, [nonza.\n StartTLS()], [nonza.StartTLSFailure, nonza.StartTLSProceed])\n except errors.StreamError:\n raise errors.TLSUnavailable(\n 'STARTTLS not supported by server, but required by client')\n if not isinstance(response, nonza.StartTLSProceed):\n if metadata.tls_required:\n message = 'server failed to STARTTLS'\n protocol.send_stream_error_and_close(stream, condition=errors.\n StreamErrorCondition.POLICY_VIOLATION, text=message)\n raise errors.TLSUnavailable(message)\n return transport, stream, (yield from features_future)\n verifier = metadata.certificate_verifier_factory()\n yield from verifier.pre_handshake(domain, host, port, metadata)\n ssl_context = metadata.ssl_context_factory()\n verifier.setup_context(ssl_context, transport)\n yield from stream.starttls(ssl_context=ssl_context,\n post_handshake_callback=verifier.post_handshake)\n features_future = yield from protocol.reset_stream_and_get_features(stream,\n timeout=negotiation_timeout)\n return transport, stream, features_future\n",
"role": "user"
},
{
"content": "connect",
"role": "assistant"
}
] |
def x(self, loop, metadata, domain, host, port, negotiation_timeout,
base_logger=None):
features_future = asyncio.Future(loop=loop)
stream = protocol.XMLStream(to=domain, features_future=features_future,
base_logger=base_logger)
if base_logger is not None:
logger = base_logger.getChild(type(self).__name__)
else:
logger = logging.getLogger('.'.join([__name__, type(self).
__qualname__]))
verifier = metadata.certificate_verifier_factory()
yield from verifier.pre_handshake(domain, host, port, metadata)
context_factory = self._context_factory_factory(logger, metadata, verifier)
try:
transport, _ = yield from ssl_transport.create_starttls_connection(loop
, lambda : stream, host=host, port=port, peer_hostname=host,
server_hostname=to_ascii(domain), post_handshake_callback=
verifier.post_handshake, ssl_context_factory=context_factory,
use_starttls=False)
except:
stream.abort()
raise
stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout)
return transport, stream, (yield from features_future)
| connect | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, loop, metadata, domain, host, port, negotiation_timeout,\n base_logger=None):\n features_future = asyncio.Future(loop=loop)\n stream = protocol.XMLStream(to=domain, features_future=features_future,\n base_logger=base_logger)\n if base_logger is not None:\n logger = base_logger.getChild(type(self).__name__)\n else:\n logger = logging.getLogger('.'.join([__name__, type(self).\n __qualname__]))\n verifier = metadata.certificate_verifier_factory()\n yield from verifier.pre_handshake(domain, host, port, metadata)\n context_factory = self._context_factory_factory(logger, metadata, verifier)\n try:\n transport, _ = yield from ssl_transport.create_starttls_connection(loop\n , lambda : stream, host=host, port=port, peer_hostname=host,\n server_hostname=to_ascii(domain), post_handshake_callback=\n verifier.post_handshake, ssl_context_factory=context_factory,\n use_starttls=False)\n except:\n stream.abort()\n raise\n stream.deadtime_hard_limit = timedelta(seconds=negotiation_timeout)\n return transport, stream, (yield from features_future)\n",
"role": "user"
},
{
"content": "connect",
"role": "assistant"
}
] |
def x(tag):
if isinstance(tag, str):
namespace_uri, sep, localname = tag.partition('}')
if sep:
if not namespace_uri.startswith('{'):
raise ValueError('not a valid etree-format tag')
namespace_uri = namespace_uri[1:]
else:
localname = namespace_uri
namespace_uri = None
return namespace_uri, localname
elif len(tag) != 2:
raise ValueError('not a valid tuple-format tag')
else:
if any(part is not None and not isinstance(part, str) for part in tag):
raise TypeError('tuple-format tags must only contain str and None')
if tag[1] is None:
raise ValueError('tuple-format localname must not be None')
return tag
| normalize_tag | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(tag):\n if isinstance(tag, str):\n namespace_uri, sep, localname = tag.partition('}')\n if sep:\n if not namespace_uri.startswith('{'):\n raise ValueError('not a valid etree-format tag')\n namespace_uri = namespace_uri[1:]\n else:\n localname = namespace_uri\n namespace_uri = None\n return namespace_uri, localname\n elif len(tag) != 2:\n raise ValueError('not a valid tuple-format tag')\n else:\n if any(part is not None and not isinstance(part, str) for part in tag):\n raise TypeError('tuple-format tags must only contain str and None')\n if tag[1] is None:\n raise ValueError('tuple-format localname must not be None')\n return tag\n",
"role": "user"
},
{
"content": "normalize_tag",
"role": "assistant"
}
] |
def x(self, body):
token, tracker = self.send_message_tracked(body)
tracker.cancel()
return token
| send_message | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, body):\n token, tracker = self.send_message_tracked(body)\n tracker.cancel()\n return token\n",
"role": "user"
},
{
"content": "send_message",
"role": "assistant"
}
] |
def x(self, address, text=None, *, mode=InviteMode.DIRECT, allow_upgrade=False
):
raise self._not_implemented_error('inviting entities')
| invite | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, address, text=None, *, mode=InviteMode.DIRECT, allow_upgrade=False\n ):\n raise self._not_implemented_error('inviting entities')\n",
"role": "user"
},
{
"content": "invite",
"role": "assistant"
}
] |
async def stdout_writer():
"""
This is a bit complex, as stdout can be a pipe or a file.
If it is a file, we cannot use
:meth:`asycnio.BaseEventLoop.connect_write_pipe`.
"""
if sys.stdout.seekable():
return sys.stdout.buffer.raw
if os.isatty(sys.stdin.fileno()):
fd_to_use = 0
else:
fd_to_use = 1
twrite, pwrite = await loop.connect_write_pipe(asyncio.streams.
FlowControlMixin, os.fdopen(fd_to_use, 'wb'))
swrite = asyncio.StreamWriter(twrite, pwrite, None, loop)
return swrite
| stdout_writer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "async def stdout_writer():\n \"\"\"\n This is a bit complex, as stdout can be a pipe or a file.\n\n If it is a file, we cannot use\n :meth:`asycnio.BaseEventLoop.connect_write_pipe`.\n \"\"\"\n if sys.stdout.seekable():\n return sys.stdout.buffer.raw\n if os.isatty(sys.stdin.fileno()):\n fd_to_use = 0\n else:\n fd_to_use = 1\n twrite, pwrite = await loop.connect_write_pipe(asyncio.streams.\n FlowControlMixin, os.fdopen(fd_to_use, 'wb'))\n swrite = asyncio.StreamWriter(twrite, pwrite, None, loop)\n return swrite\n",
"role": "user"
},
{
"content": "stdout_writer",
"role": "assistant"
}
] |
def x(algo):
try:
enabled, (fun_name, fun_args, fun_kwargs) = _HASH_ALGO_MAP[algo]
except KeyError:
raise NotImplementedError('hash algorithm {!r} unknown'.format(algo)
) from None
if not enabled:
raise ValueError('support of {} in XMPP is forbidden'.format(algo))
try:
fun = getattr(hashlib, fun_name)
except AttributeError as exc:
raise NotImplementedError('{} not supported by hashlib'.format(algo)
) from exc
return fun(*fun_args, **fun_kwargs)
| hash_from_algo | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(algo):\n try:\n enabled, (fun_name, fun_args, fun_kwargs) = _HASH_ALGO_MAP[algo]\n except KeyError:\n raise NotImplementedError('hash algorithm {!r} unknown'.format(algo)\n ) from None\n if not enabled:\n raise ValueError('support of {} in XMPP is forbidden'.format(algo))\n try:\n fun = getattr(hashlib, fun_name)\n except AttributeError as exc:\n raise NotImplementedError('{} not supported by hashlib'.format(algo)\n ) from exc\n return fun(*fun_args, **fun_kwargs)\n",
"role": "user"
},
{
"content": "hash_from_algo",
"role": "assistant"
}
] |
def x(h):
try:
enabled, algo = _HASH_ALGO_REVERSE_MAP[h.name]
except KeyError:
pass
else:
if not enabled:
raise ValueError('support of {} in XMPP is forbidden'.format(algo))
return algo
if h.name == 'blake2b':
return 'blake2b-{}'.format(h.digest_size * 8)
raise ValueError('unknown hash implementation: {!r}'.format(h))
| algo_of_hash | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(h):\n try:\n enabled, algo = _HASH_ALGO_REVERSE_MAP[h.name]\n except KeyError:\n pass\n else:\n if not enabled:\n raise ValueError('support of {} in XMPP is forbidden'.format(algo))\n return algo\n if h.name == 'blake2b':\n return 'blake2b-{}'.format(h.digest_size * 8)\n raise ValueError('unknown hash implementation: {!r}'.format(h))\n",
"role": "user"
},
{
"content": "algo_of_hash",
"role": "assistant"
}
] |
def x(self, other_entity):
disco_info = yield from self._disco_client.query_info(other_entity)
intersection = disco_info.features & SUPPORTED_HASH_FEATURES
if (not intersection and namespaces.xep0300_hashes2 not in disco_info.
features):
raise RuntimeError(
'Remote does not support the urn:xmpp:hashes:2 feature.')
return intersection
| select_common_hashes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, other_entity):\n disco_info = yield from self._disco_client.query_info(other_entity)\n intersection = disco_info.features & SUPPORTED_HASH_FEATURES\n if (not intersection and namespaces.xep0300_hashes2 not in disco_info.\n features):\n raise RuntimeError(\n 'Remote does not support the urn:xmpp:hashes:2 feature.')\n return intersection\n",
"role": "user"
},
{
"content": "select_common_hashes",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.