source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(document):
webfinger = {'hcard_url': None}
try:
doc = json.loads(document)
for link in doc['links']:
if link['rel'] == 'http://microformats.org/profile/hcard':
webfinger['hcard_url'] = link['href']
break
else:
logger.warning(
'parse_diaspora_webfinger: found JSON webfinger but it has no hcard href'
)
raise ValueError
except Exception:
try:
xrd = XRD.parse_xrd(document)
webfinger['hcard_url'] = xrd.find_link(rels=
'http://microformats.org/profile/hcard').href
except xml.parsers.expat.ExpatError:
logger.warning(
'parse_diaspora_webfinger: found XML webfinger but it fails to parse (ExpatError)'
)
pass
return webfinger
|
parse_diaspora_webfinger
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(document):\n webfinger = {'hcard_url': None}\n try:\n doc = json.loads(document)\n for link in doc['links']:\n if link['rel'] == 'http://microformats.org/profile/hcard':\n webfinger['hcard_url'] = link['href']\n break\n else:\n logger.warning(\n 'parse_diaspora_webfinger: found JSON webfinger but it has no hcard href'\n )\n raise ValueError\n except Exception:\n try:\n xrd = XRD.parse_xrd(document)\n webfinger['hcard_url'] = xrd.find_link(rels=\n 'http://microformats.org/profile/hcard').href\n except xml.parsers.expat.ExpatError:\n logger.warning(\n 'parse_diaspora_webfinger: found XML webfinger but it fails to parse (ExpatError)'\n )\n pass\n return webfinger\n",
"role": "user"
},
{
"content": "parse_diaspora_webfinger",
"role": "assistant"
}
] |
def x(handle):
webfinger = retrieve_and_parse_diaspora_webfinger(handle)
document, code, exception = fetch_document(webfinger.get('hcard_url'))
if exception:
return None
return document
|
retrieve_diaspora_hcard
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(handle):\n webfinger = retrieve_and_parse_diaspora_webfinger(handle)\n document, code, exception = fetch_document(webfinger.get('hcard_url'))\n if exception:\n return None\n return document\n",
"role": "user"
},
{
"content": "retrieve_diaspora_hcard",
"role": "assistant"
}
] |
def x(handle):
try:
host = handle.split('@')[1]
except AttributeError:
logger.warning(
'retrieve_and_parse_diaspora_webfinger: invalid handle given: %s',
handle)
return None
document, code, exception = fetch_document(host=host, path=
'/.well-known/webfinger?resource=acct:%s' % quote(handle))
if document:
return parse_diaspora_webfinger(document)
hostmeta = retrieve_diaspora_host_meta(host)
if not hostmeta:
return None
url = hostmeta.find_link(rels='lrdd').template.replace('{uri}', quote(
handle))
document, code, exception = fetch_document(url)
if exception:
return None
return parse_diaspora_webfinger(document)
|
retrieve_and_parse_diaspora_webfinger
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(handle):\n try:\n host = handle.split('@')[1]\n except AttributeError:\n logger.warning(\n 'retrieve_and_parse_diaspora_webfinger: invalid handle given: %s',\n handle)\n return None\n document, code, exception = fetch_document(host=host, path=\n '/.well-known/webfinger?resource=acct:%s' % quote(handle))\n if document:\n return parse_diaspora_webfinger(document)\n hostmeta = retrieve_diaspora_host_meta(host)\n if not hostmeta:\n return None\n url = hostmeta.find_link(rels='lrdd').template.replace('{uri}', quote(\n handle))\n document, code, exception = fetch_document(url)\n if exception:\n return None\n return parse_diaspora_webfinger(document)\n",
"role": "user"
},
{
"content": "retrieve_and_parse_diaspora_webfinger",
"role": "assistant"
}
] |
def x(host):
document, code, exception = fetch_document(host=host, path=
'/.well-known/host-meta')
if exception:
return None
xrd = XRD.parse_xrd(document)
return xrd
|
retrieve_diaspora_host_meta
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(host):\n document, code, exception = fetch_document(host=host, path=\n '/.well-known/host-meta')\n if exception:\n return None\n xrd = XRD.parse_xrd(document)\n return xrd\n",
"role": "user"
},
{
"content": "retrieve_diaspora_host_meta",
"role": "assistant"
}
] |
def x(document, selector):
element = document.cssselect(selector)
if element:
return element[0].text
return None
|
get_element_text_or_none
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(document, selector):\n element = document.cssselect(selector)\n if element:\n return element[0].text\n return None\n",
"role": "user"
},
{
"content": "get_element_text_or_none",
"role": "assistant"
}
] |
def x(document, selector, attribute):
element = document.cssselect(selector)
if element:
return element[0].get(attribute)
return None
|
get_element_attr_or_none
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(document, selector, attribute):\n element = document.cssselect(selector)\n if element:\n return element[0].get(attribute)\n return None\n",
"role": "user"
},
{
"content": "get_element_attr_or_none",
"role": "assistant"
}
] |
def x(hcard: str, handle: str):
from federation.entities.diaspora.entities import DiasporaProfile
doc = html.fromstring(hcard)
profile = DiasporaProfile(name=_get_element_text_or_none(doc, '.fn'),
image_urls={'small': _get_element_attr_or_none(doc,
'.entity_photo_small .photo', 'src'), 'medium':
_get_element_attr_or_none(doc, '.entity_photo_medium .photo', 'src'
), 'large': _get_element_attr_or_none(doc, '.entity_photo .photo',
'src')}, public=True if _get_element_text_or_none(doc,
'.searchable') == 'true' else False, id=handle, handle=handle, guid
=_get_element_text_or_none(doc, '.uid'), public_key=
_get_element_text_or_none(doc, '.key'))
return profile
|
parse_profile_from_hcard
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(hcard: str, handle: str):\n from federation.entities.diaspora.entities import DiasporaProfile\n doc = html.fromstring(hcard)\n profile = DiasporaProfile(name=_get_element_text_or_none(doc, '.fn'),\n image_urls={'small': _get_element_attr_or_none(doc,\n '.entity_photo_small .photo', 'src'), 'medium':\n _get_element_attr_or_none(doc, '.entity_photo_medium .photo', 'src'\n ), 'large': _get_element_attr_or_none(doc, '.entity_photo .photo',\n 'src')}, public=True if _get_element_text_or_none(doc,\n '.searchable') == 'true' else False, id=handle, handle=handle, guid\n =_get_element_text_or_none(doc, '.uid'), public_key=\n _get_element_text_or_none(doc, '.key'))\n return profile\n",
"role": "user"
},
{
"content": "parse_profile_from_hcard",
"role": "assistant"
}
] |
def x(guid: str, handle: str, entity_type: str, sender_key_fetcher:
Callable[[str], str]=None):
if not validate_handle(handle):
return
_username, domain = handle.split('@')
url = get_fetch_content_endpoint(domain, entity_type.lower(), guid)
document, status_code, error = fetch_document(url)
if status_code == 200:
request = RequestType(body=document)
_sender, _protocol, entities = handle_receive(request,
sender_key_fetcher=sender_key_fetcher)
if len(entities) > 1:
logger.warning(
'retrieve_and_parse_content - more than one entity parsed from remote even though weexpected only one! ID %s'
, guid)
if entities:
return entities[0]
return
elif status_code == 404:
logger.warning(
'retrieve_and_parse_content - remote content %s not found', guid)
return
if error:
raise error
raise Exception(
'retrieve_and_parse_content - unknown problem when fetching document: %s, %s, %s'
% (document, status_code, error))
|
retrieve_and_parse_content
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(guid: str, handle: str, entity_type: str, sender_key_fetcher:\n Callable[[str], str]=None):\n if not validate_handle(handle):\n return\n _username, domain = handle.split('@')\n url = get_fetch_content_endpoint(domain, entity_type.lower(), guid)\n document, status_code, error = fetch_document(url)\n if status_code == 200:\n request = RequestType(body=document)\n _sender, _protocol, entities = handle_receive(request,\n sender_key_fetcher=sender_key_fetcher)\n if len(entities) > 1:\n logger.warning(\n 'retrieve_and_parse_content - more than one entity parsed from remote even though weexpected only one! ID %s'\n , guid)\n if entities:\n return entities[0]\n return\n elif status_code == 404:\n logger.warning(\n 'retrieve_and_parse_content - remote content %s not found', guid)\n return\n if error:\n raise error\n raise Exception(\n 'retrieve_and_parse_content - unknown problem when fetching document: %s, %s, %s'\n % (document, status_code, error))\n",
"role": "user"
},
{
"content": "retrieve_and_parse_content",
"role": "assistant"
}
] |
def x(handle):
hcard = retrieve_diaspora_hcard(handle)
if not hcard:
return None
profile = parse_profile_from_hcard(hcard, handle)
try:
profile.validate()
except ValueError as ex:
logger.warning(
"retrieve_and_parse_profile - found profile %s but it didn't validate: %s"
, profile, ex)
return None
return profile
|
retrieve_and_parse_profile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(handle):\n hcard = retrieve_diaspora_hcard(handle)\n if not hcard:\n return None\n profile = parse_profile_from_hcard(hcard, handle)\n try:\n profile.validate()\n except ValueError as ex:\n logger.warning(\n \"retrieve_and_parse_profile - found profile %s but it didn't validate: %s\"\n , profile, ex)\n return None\n return profile\n",
"role": "user"
},
{
"content": "retrieve_and_parse_profile",
"role": "assistant"
}
] |
def x(id: str, guid: str) ->str:
_username, domain = id.split('@')
return 'https://%s/receive/users/%s' % (domain, guid)
|
get_private_endpoint
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(id: str, guid: str) ->str:\n _username, domain = id.split('@')\n return 'https://%s/receive/users/%s' % (domain, guid)\n",
"role": "user"
},
{
"content": "get_private_endpoint",
"role": "assistant"
}
] |
def x(dt, tz=None):
if dt.tzinfo is None:
return dt.replace(tzinfo=tz or tzlocal())
else:
return dt
|
ensure_timezone
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(dt, tz=None):\n if dt.tzinfo is None:\n return dt.replace(tzinfo=tz or tzlocal())\n else:\n return dt\n",
"role": "user"
},
{
"content": "ensure_timezone",
"role": "assistant"
}
] |
def x(node, struct):
for obj in struct:
for k, v in obj.items():
etree.SubElement(node, k).text = v
|
struct_to_xml
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(node, struct):\n for obj in struct:\n for k, v in obj.items():\n etree.SubElement(node, k).text = v\n",
"role": "user"
},
{
"content": "struct_to_xml",
"role": "assistant"
}
] |
def x(entity, private_key):
from federation.entities.diaspora.mappers import get_outbound_entity
diaspora_entity = get_outbound_entity(entity, private_key)
xml = diaspora_entity.to_xml()
return '<XML><post>%s</post></XML>' % etree.tostring(xml).decode('utf-8')
|
get_full_xml_representation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(entity, private_key):\n from federation.entities.diaspora.mappers import get_outbound_entity\n diaspora_entity = get_outbound_entity(entity, private_key)\n xml = diaspora_entity.to_xml()\n return '<XML><post>%s</post></XML>' % etree.tostring(xml).decode('utf-8')\n",
"role": "user"
},
{
"content": "get_full_xml_representation",
"role": "assistant"
}
] |
def x(doc, tag, value):
element = doc.find('.//%s' % tag)
if element is None:
element = etree.SubElement(doc, tag)
element.text = value
|
add_element_to_doc
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(doc, tag, value):\n element = doc.find('.//%s' % tag)\n if element is None:\n element = etree.SubElement(doc, tag)\n element.text = value\n",
"role": "user"
},
{
"content": "add_element_to_doc",
"role": "assistant"
}
] |
def x(template=None, *args, **kwargs):
if template == 'diaspora':
hostmeta = DiasporaHostMeta(*args, **kwargs)
else:
hostmeta = BaseHostMeta(*args, **kwargs)
return hostmeta.render()
|
generate_host_meta
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(template=None, *args, **kwargs):\n if template == 'diaspora':\n hostmeta = DiasporaHostMeta(*args, **kwargs)\n else:\n hostmeta = BaseHostMeta(*args, **kwargs)\n return hostmeta.render()\n",
"role": "user"
},
{
"content": "generate_host_meta",
"role": "assistant"
}
] |
def x(template=None, *args, **kwargs):
if template == 'diaspora':
webfinger = DiasporaWebFinger(*args, **kwargs)
else:
webfinger = BaseLegacyWebFinger(*args, **kwargs)
return webfinger.render()
|
generate_legacy_webfinger
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(template=None, *args, **kwargs):\n if template == 'diaspora':\n webfinger = DiasporaWebFinger(*args, **kwargs)\n else:\n webfinger = BaseLegacyWebFinger(*args, **kwargs)\n return webfinger.render()\n",
"role": "user"
},
{
"content": "generate_legacy_webfinger",
"role": "assistant"
}
] |
def x(**kwargs):
return {'version': '1.0', 'server': {'baseUrl': kwargs['server'][
'baseUrl'], 'name': kwargs['server']['name'], 'software': kwargs[
'server']['software'], 'version': kwargs['server']['version']},
'organization': {'name': kwargs.get('organization', {}).get('name',
None), 'contact': kwargs.get('organization', {}).get('contact',
None), 'account': kwargs.get('organization', {}).get('account',
None)}, 'protocols': kwargs.get('protocols', ['diaspora']), 'relay':
kwargs.get('relay', ''), 'services': {'inbound': kwargs.get(
'service', {}).get('inbound', []), 'outbound': kwargs.get('service',
{}).get('outbound', [])}, 'openRegistrations': kwargs[
'openRegistrations'], 'usage': {'users': {'total': kwargs.get(
'usage', {}).get('users', {}).get('total'), 'activeHalfyear':
kwargs.get('usage', {}).get('users', {}).get('activeHalfyear'),
'activeMonth': kwargs.get('usage', {}).get('users', {}).get(
'activeMonth'), 'activeWeek': kwargs.get('usage', {}).get('users',
{}).get('activeWeek')}, 'localPosts': kwargs.get('usage', {}).get(
'localPosts'), 'localComments': kwargs.get('usage', {}).get(
'localComments')}}
|
generate_nodeinfo2_document
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(**kwargs):\n return {'version': '1.0', 'server': {'baseUrl': kwargs['server'][\n 'baseUrl'], 'name': kwargs['server']['name'], 'software': kwargs[\n 'server']['software'], 'version': kwargs['server']['version']},\n 'organization': {'name': kwargs.get('organization', {}).get('name',\n None), 'contact': kwargs.get('organization', {}).get('contact',\n None), 'account': kwargs.get('organization', {}).get('account',\n None)}, 'protocols': kwargs.get('protocols', ['diaspora']), 'relay':\n kwargs.get('relay', ''), 'services': {'inbound': kwargs.get(\n 'service', {}).get('inbound', []), 'outbound': kwargs.get('service',\n {}).get('outbound', [])}, 'openRegistrations': kwargs[\n 'openRegistrations'], 'usage': {'users': {'total': kwargs.get(\n 'usage', {}).get('users', {}).get('total'), 'activeHalfyear':\n kwargs.get('usage', {}).get('users', {}).get('activeHalfyear'),\n 'activeMonth': kwargs.get('usage', {}).get('users', {}).get(\n 'activeMonth'), 'activeWeek': kwargs.get('usage', {}).get('users',\n {}).get('activeWeek')}, 'localPosts': kwargs.get('usage', {}).get(\n 'localPosts'), 'localComments': kwargs.get('usage', {}).get(\n 'localComments')}}\n",
"role": "user"
},
{
"content": "generate_nodeinfo2_document",
"role": "assistant"
}
] |
def x(template=None, **kwargs):
if template == 'diaspora':
hcard = DiasporaHCard(**kwargs)
else:
raise NotImplementedError()
return hcard.render()
|
generate_hcard
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(template=None, **kwargs):\n if template == 'diaspora':\n hcard = DiasporaHCard(**kwargs)\n else:\n raise NotImplementedError()\n return hcard.render()\n",
"role": "user"
},
{
"content": "generate_hcard",
"role": "assistant"
}
] |
def x(id: str, guid: str=None, handle: str=None, entity_type: str=None,
sender_key_fetcher: Callable[[str], str]=None):
protocol_name = 'diaspora'
if not guid:
guid = id
utils = importlib.import_module('federation.utils.%s' % protocol_name)
return utils.retrieve_and_parse_content(guid=guid, handle=handle,
entity_type=entity_type, sender_key_fetcher=sender_key_fetcher)
|
retrieve_remote_content
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(id: str, guid: str=None, handle: str=None, entity_type: str=None,\n sender_key_fetcher: Callable[[str], str]=None):\n protocol_name = 'diaspora'\n if not guid:\n guid = id\n utils = importlib.import_module('federation.utils.%s' % protocol_name)\n return utils.retrieve_and_parse_content(guid=guid, handle=handle,\n entity_type=entity_type, sender_key_fetcher=sender_key_fetcher)\n",
"role": "user"
},
{
"content": "retrieve_remote_content",
"role": "assistant"
}
] |
def x(id: str) ->Optional[Profile]:
protocol = identify_protocol_by_id(id)
utils = importlib.import_module(
f'federation.utils.{protocol.PROTOCOL_NAME}')
return utils.retrieve_and_parse_profile(id)
|
retrieve_remote_profile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(id: str) ->Optional[Profile]:\n protocol = identify_protocol_by_id(id)\n utils = importlib.import_module(\n f'federation.utils.{protocol.PROTOCOL_NAME}')\n return utils.retrieve_and_parse_profile(id)\n",
"role": "user"
},
{
"content": "retrieve_remote_profile",
"role": "assistant"
}
] |
def x(request: RequestType, user: UserType=None, sender_key_fetcher:
Callable[[str], str]=None, skip_author_verification: bool=False) ->Tuple[
str, str, List]:
logger.debug('handle_receive: processing request: %s', request)
found_protocol = identify_protocol_by_request(request)
logger.debug('handle_receive: using protocol %s', found_protocol.
PROTOCOL_NAME)
protocol = found_protocol.Protocol()
sender, message = protocol.receive(request, user, sender_key_fetcher,
skip_author_verification=skip_author_verification)
logger.debug('handle_receive: sender %s, message %s', sender, message)
mappers = importlib.import_module('federation.entities.%s.mappers' %
found_protocol.PROTOCOL_NAME)
entities = mappers.message_to_objects(message, sender,
sender_key_fetcher, user)
logger.debug('handle_receive: entities %s', entities)
return sender, found_protocol.PROTOCOL_NAME, entities
|
handle_receive
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request: RequestType, user: UserType=None, sender_key_fetcher:\n Callable[[str], str]=None, skip_author_verification: bool=False) ->Tuple[\n str, str, List]:\n logger.debug('handle_receive: processing request: %s', request)\n found_protocol = identify_protocol_by_request(request)\n logger.debug('handle_receive: using protocol %s', found_protocol.\n PROTOCOL_NAME)\n protocol = found_protocol.Protocol()\n sender, message = protocol.receive(request, user, sender_key_fetcher,\n skip_author_verification=skip_author_verification)\n logger.debug('handle_receive: sender %s, message %s', sender, message)\n mappers = importlib.import_module('federation.entities.%s.mappers' %\n found_protocol.PROTOCOL_NAME)\n entities = mappers.message_to_objects(message, sender,\n sender_key_fetcher, user)\n logger.debug('handle_receive: entities %s', entities)\n return sender, found_protocol.PROTOCOL_NAME, entities\n",
"role": "user"
},
{
"content": "handle_receive",
"role": "assistant"
}
] |
def x(id: str) ->bool:
return re.match('^https?://', id, flags=re.IGNORECASE) is not None
|
identify_id
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(id: str) ->bool:\n return re.match('^https?://', id, flags=re.IGNORECASE) is not None\n",
"role": "user"
},
{
"content": "identify_id",
"role": "assistant"
}
] |
def x(request: RequestType) ->bool:
try:
data = json.loads(decode_if_bytes(request.body))
if '@context' in data:
return True
except Exception:
pass
return False
|
identify_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request: RequestType) ->bool:\n try:\n data = json.loads(decode_if_bytes(request.body))\n if '@context' in data:\n return True\n except Exception:\n pass\n return False\n",
"role": "user"
},
{
"content": "identify_request",
"role": "assistant"
}
] |
def x(self, entity: BaseEntity, from_user: UserType, to_user_key: RsaKey=None
) ->Union[str, Dict]:
if hasattr(entity, 'outbound_doc') and entity.outbound_doc is not None:
rendered = entity.outbound_doc
else:
rendered = entity.to_as2()
return rendered
|
build_send
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, entity: BaseEntity, from_user: UserType, to_user_key: RsaKey=None\n ) ->Union[str, Dict]:\n if hasattr(entity, 'outbound_doc') and entity.outbound_doc is not None:\n rendered = entity.outbound_doc\n else:\n rendered = entity.to_as2()\n return rendered\n",
"role": "user"
},
{
"content": "build_send",
"role": "assistant"
}
] |
def x(self, request: RequestType, user: UserType=None, sender_key_fetcher:
Callable[[str], str]=None, skip_author_verification: bool=False) ->Tuple[
str, dict]:
self.user = user
self.get_contact_key = sender_key_fetcher
self.payload = json.loads(decode_if_bytes(request.body))
self.request = request
self.extract_actor()
if not skip_author_verification:
self.verify_signature()
return self.actor, self.payload
|
receive
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request: RequestType, user: UserType=None, sender_key_fetcher:\n Callable[[str], str]=None, skip_author_verification: bool=False) ->Tuple[\n str, dict]:\n self.user = user\n self.get_contact_key = sender_key_fetcher\n self.payload = json.loads(decode_if_bytes(request.body))\n self.request = request\n self.extract_actor()\n if not skip_author_verification:\n self.verify_signature()\n return self.actor, self.payload\n",
"role": "user"
},
{
"content": "receive",
"role": "assistant"
}
] |
def x():
configuration = {'get_object_function': None, 'hcard_path':
'/hcard/users/', 'nodeinfo2_function': None,
'process_payload_function': None, 'search_path': None,
'activitypub': False}
configuration.update(settings.FEDERATION)
if not all(['get_private_key_function' in configuration,
'get_profile_function' in configuration, 'base_url' in configuration]):
raise ImproperlyConfigured(
'Missing required FEDERATION settings, please check documentation.'
)
return configuration
|
get_configuration
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n configuration = {'get_object_function': None, 'hcard_path':\n '/hcard/users/', 'nodeinfo2_function': None,\n 'process_payload_function': None, 'search_path': None,\n 'activitypub': False}\n configuration.update(settings.FEDERATION)\n if not all(['get_private_key_function' in configuration, \n 'get_profile_function' in configuration, 'base_url' in configuration]):\n raise ImproperlyConfigured(\n 'Missing required FEDERATION settings, please check documentation.'\n )\n return configuration\n",
"role": "user"
},
{
"content": "get_configuration",
"role": "assistant"
}
] |
def x(item):
config = get_configuration()
func_path = config.get(item)
module_path, func_name = func_path.rsplit('.', 1)
module = importlib.import_module(module_path)
func = getattr(module, func_name)
return func
|
get_function_from_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(item):\n config = get_configuration()\n func_path = config.get(item)\n module_path, func_name = func_path.rsplit('.', 1)\n module = importlib.import_module(module_path)\n func = getattr(module, func_name)\n return func\n",
"role": "user"
},
{
"content": "get_function_from_config",
"role": "assistant"
}
] |
def x(self) ->None:
from federation.utils.activitypub import retrieve_and_parse_profile
try:
from federation.utils.django import get_function_from_config
except ImportError:
logger.warning(
'ActivitypubFollow.post_receive - Unable to send automatic Accept back, only supported on Django currently'
)
return
get_private_key_function = get_function_from_config(
'get_private_key_function')
key = get_private_key_function(self.target_id)
if not key:
logger.warning(
'ActivitypubFollow.post_receive - Failed to send automatic Accept back: could not find profile to sign it with'
)
return
accept = ActivitypubAccept(activity_id=
f'{self.target_id}#accept-{uuid.uuid4()}', actor_id=self.target_id,
target_id=self.activity_id)
try:
profile = retrieve_and_parse_profile(self.actor_id)
except Exception:
profile = None
if not profile:
logger.warning(
'ActivitypubFollow.post_receive - Failed to fetch remote profile for sending back Accept'
)
return
try:
handle_send(accept, UserType(id=self.target_id, private_key=key),
recipients=[{'fid': profile.inboxes['private'], 'protocol':
'activitypub', 'public': False}])
except Exception:
logger.exception(
'ActivitypubFollow.post_receive - Failed to send Accept back')
|
post_receive
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self) ->None:\n from federation.utils.activitypub import retrieve_and_parse_profile\n try:\n from federation.utils.django import get_function_from_config\n except ImportError:\n logger.warning(\n 'ActivitypubFollow.post_receive - Unable to send automatic Accept back, only supported on Django currently'\n )\n return\n get_private_key_function = get_function_from_config(\n 'get_private_key_function')\n key = get_private_key_function(self.target_id)\n if not key:\n logger.warning(\n 'ActivitypubFollow.post_receive - Failed to send automatic Accept back: could not find profile to sign it with'\n )\n return\n accept = ActivitypubAccept(activity_id=\n f'{self.target_id}#accept-{uuid.uuid4()}', actor_id=self.target_id,\n target_id=self.activity_id)\n try:\n profile = retrieve_and_parse_profile(self.actor_id)\n except Exception:\n profile = None\n if not profile:\n logger.warning(\n 'ActivitypubFollow.post_receive - Failed to fetch remote profile for sending back Accept'\n )\n return\n try:\n handle_send(accept, UserType(id=self.target_id, private_key=key),\n recipients=[{'fid': profile.inboxes['private'], 'protocol':\n 'activitypub', 'public': False}])\n except Exception:\n logger.exception(\n 'ActivitypubFollow.post_receive - Failed to send Accept back')\n",
"role": "user"
},
{
"content": "post_receive",
"role": "assistant"
}
] |
def x(fid: str) ->Optional[Any]:
document, status_code, ex = fetch_document(fid, extra_headers={'accept':
'application/activity+json'})
if document:
document = json.loads(decode_if_bytes(document))
entities = message_to_objects(document, fid)
if entities:
return entities[0]
|
retrieve_and_parse_document
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(fid: str) ->Optional[Any]:\n document, status_code, ex = fetch_document(fid, extra_headers={'accept':\n 'application/activity+json'})\n if document:\n document = json.loads(decode_if_bytes(document))\n entities = message_to_objects(document, fid)\n if entities:\n return entities[0]\n",
"role": "user"
},
{
"content": "retrieve_and_parse_document",
"role": "assistant"
}
] |
def x(fid: str) ->Optional[ActivitypubProfile]:
profile = retrieve_and_parse_document(fid)
if not profile:
return
try:
profile.validate()
except ValueError as ex:
logger.warning(
"retrieve_and_parse_profile - found profile %s but it didn't validate: %s"
, profile, ex)
return
return profile
|
retrieve_and_parse_profile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(fid: str) ->Optional[ActivitypubProfile]:\n profile = retrieve_and_parse_document(fid)\n if not profile:\n return\n try:\n profile.validate()\n except ValueError as ex:\n logger.warning(\n \"retrieve_and_parse_profile - found profile %s but it didn't validate: %s\"\n , profile, ex)\n return\n return profile\n",
"role": "user"
},
{
"content": "retrieve_and_parse_profile",
"role": "assistant"
}
] |
def x(method, value):
for protocol_name in PROTOCOLS:
protocol = importlib.import_module(
f'federation.protocols.{protocol_name}.protocol')
if getattr(protocol, f'identify_{method}')(value):
return protocol
else:
raise NoSuitableProtocolFoundError()
|
identify_protocol
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, value):\n for protocol_name in PROTOCOLS:\n protocol = importlib.import_module(\n f'federation.protocols.{protocol_name}.protocol')\n if getattr(protocol, f'identify_{method}')(value):\n return protocol\n else:\n raise NoSuitableProtocolFoundError()\n",
"role": "user"
},
{
"content": "identify_protocol",
"role": "assistant"
}
] |
def x(request: RequestType):
try:
data = json.loads(decode_if_bytes(request.body))
if 'encrypted_magic_envelope' in data:
return True
except Exception:
pass
try:
xml = etree.fromstring(encode_if_text(request.body))
if xml.tag == MAGIC_ENV_TAG:
return True
except Exception:
pass
return False
|
identify_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request: RequestType):\n try:\n data = json.loads(decode_if_bytes(request.body))\n if 'encrypted_magic_envelope' in data:\n return True\n except Exception:\n pass\n try:\n xml = etree.fromstring(encode_if_text(request.body))\n if xml.tag == MAGIC_ENV_TAG:\n return True\n except Exception:\n pass\n return False\n",
"role": "user"
},
{
"content": "identify_request",
"role": "assistant"
}
] |
def x(self, payload):
private_key = self._get_user_key()
return EncryptedPayload.decrypt(payload=payload, private_key=private_key)
|
get_json_payload_magic_envelope
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, payload):\n private_key = self._get_user_key()\n return EncryptedPayload.decrypt(payload=payload, private_key=private_key)\n",
"role": "user"
},
{
"content": "get_json_payload_magic_envelope",
"role": "assistant"
}
] |
def x(self, payload):
try:
json_payload = json.loads(decode_if_bytes(payload))
except ValueError:
xml = unquote(decode_if_bytes(payload))
xml = xml.lstrip().encode('utf-8')
logger.debug(
'diaspora.protocol.store_magic_envelope_doc: xml payload: %s', xml)
self.doc = etree.fromstring(xml)
else:
logger.debug(
'diaspora.protocol.store_magic_envelope_doc: json payload: %s',
json_payload)
self.doc = self.get_json_payload_magic_envelope(json_payload)
|
store_magic_envelope_doc
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, payload):\n try:\n json_payload = json.loads(decode_if_bytes(payload))\n except ValueError:\n xml = unquote(decode_if_bytes(payload))\n xml = xml.lstrip().encode('utf-8')\n logger.debug(\n 'diaspora.protocol.store_magic_envelope_doc: xml payload: %s', xml)\n self.doc = etree.fromstring(xml)\n else:\n logger.debug(\n 'diaspora.protocol.store_magic_envelope_doc: json payload: %s',\n json_payload)\n self.doc = self.get_json_payload_magic_envelope(json_payload)\n",
"role": "user"
},
{
"content": "store_magic_envelope_doc",
"role": "assistant"
}
] |
def x(self, request: RequestType, user: UserType=None, sender_key_fetcher:
Callable[[str], str]=None, skip_author_verification: bool=False) ->Tuple[
str, str]:
self.user = user
self.get_contact_key = sender_key_fetcher
self.store_magic_envelope_doc(request.body)
self.content = self.get_message_content()
self.sender_handle = self.get_sender()
if not skip_author_verification:
self.verify_signature()
return self.sender_handle, self.content
|
receive
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request: RequestType, user: UserType=None, sender_key_fetcher:\n Callable[[str], str]=None, skip_author_verification: bool=False) ->Tuple[\n str, str]:\n self.user = user\n self.get_contact_key = sender_key_fetcher\n self.store_magic_envelope_doc(request.body)\n self.content = self.get_message_content()\n self.sender_handle = self.get_sender()\n if not skip_author_verification:\n self.verify_signature()\n return self.sender_handle, self.content\n",
"role": "user"
},
{
"content": "receive",
"role": "assistant"
}
] |
def x(self):
body = self.doc.find('.//{http://salmon-protocol.org/ns/magic-env}data'
).text
body = urlsafe_b64decode(body.encode('ascii'))
logger.debug('diaspora.protocol.get_message_content: %s', body)
return body
|
get_message_content
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n body = self.doc.find('.//{http://salmon-protocol.org/ns/magic-env}data'\n ).text\n body = urlsafe_b64decode(body.encode('ascii'))\n logger.debug('diaspora.protocol.get_message_content: %s', body)\n return body\n",
"role": "user"
},
{
"content": "get_message_content",
"role": "assistant"
}
] |
def x(self):
if self.get_contact_key:
sender_key = self.get_contact_key(self.sender_handle)
else:
sender_key = fetch_public_key(self.sender_handle)
if not sender_key:
raise NoSenderKeyFoundError(
'Could not find a sender contact to retrieve key')
MagicEnvelope(doc=self.doc, public_key=sender_key, verify=True)
|
verify_signature
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.get_contact_key:\n sender_key = self.get_contact_key(self.sender_handle)\n else:\n sender_key = fetch_public_key(self.sender_handle)\n if not sender_key:\n raise NoSenderKeyFoundError(\n 'Could not find a sender contact to retrieve key')\n MagicEnvelope(doc=self.doc, public_key=sender_key, verify=True)\n",
"role": "user"
},
{
"content": "verify_signature",
"role": "assistant"
}
] |
def x(self, entity: BaseEntity, from_user: UserType, to_user_key: RsaKey=None
) ->Union[str, Dict]:
if entity.outbound_doc is not None:
xml = entity.outbound_doc
else:
xml = entity.to_xml()
me = MagicEnvelope(etree.tostring(xml), private_key=from_user.
private_key, author_handle=from_user.handle)
rendered = me.render()
if to_user_key:
return EncryptedPayload.encrypt(rendered, to_user_key)
return rendered
|
build_send
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, entity: BaseEntity, from_user: UserType, to_user_key: RsaKey=None\n ) ->Union[str, Dict]:\n if entity.outbound_doc is not None:\n xml = entity.outbound_doc\n else:\n xml = entity.to_xml()\n me = MagicEnvelope(etree.tostring(xml), private_key=from_user.\n private_key, author_handle=from_user.handle)\n rendered = me.render()\n if to_user_key:\n return EncryptedPayload.encrypt(rendered, to_user_key)\n return rendered\n",
"role": "user"
},
{
"content": "build_send",
"role": "assistant"
}
] |
def x(self):
if self.reaction not in self._reaction_valid_values:
raise ValueError('reaction should be one of: {valid}'.format(valid=
', '.join(self._reaction_valid_values)))
|
validate_reaction
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.reaction not in self._reaction_valid_values:\n raise ValueError('reaction should be one of: {valid}'.format(valid=\n ', '.join(self._reaction_valid_values)))\n",
"role": "user"
},
{
"content": "validate_reaction",
"role": "assistant"
}
] |
def x(self):
if self.relationship not in self._relationship_valid_values:
raise ValueError('relationship should be one of: {valid}'.format(
valid=', '.join(self._relationship_valid_values)))
|
validate_relationship
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.relationship not in self._relationship_valid_values:\n raise ValueError('relationship should be one of: {valid}'.format(\n valid=', '.join(self._relationship_valid_values)))\n",
"role": "user"
},
{
"content": "validate_relationship",
"role": "assistant"
}
] |
def x(func):
def x(request, *args, **kwargs):
def x(request, *args, **kwargs):
config = get_configuration()
if not config.get('activitypub'):
return func(request, *args, **kwargs)
fallback = True
accept = request.META.get('HTTP_ACCEPT', '')
for content_type in ('application/json',
'application/activity+json', 'application/ld+json'):
if accept.find(content_type) > -1:
fallback = False
break
if fallback:
return func(request, *args, **kwargs)
get_object_function = get_function_from_config(
'get_object_function')
obj = get_object_function(request)
if not obj:
return HttpResponseNotFound()
as2_obj = obj.as_protocol('activitypub')
return JsonResponse(as2_obj.to_as2(), content_type=
'application/activity+json')
def x(request, *args, **kwargs):
process_payload_function = get_function_from_config(
'process_payload_function')
result = process_payload_function(request)
if result:
return JsonResponse({}, content_type='application/json',
status=202)
else:
return JsonResponse({'result': 'error'}, content_type=
'application/json', status=400)
if request.method == 'GET':
return get(request, *args, **kwargs)
elif request.method == 'POST' and request.path.endswith('/inbox/'):
return post(request, *args, **kwargs)
return HttpResponse(status=405)
return inner
|
activitypub_object_view
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(func):\n\n def x(request, *args, **kwargs):\n\n def x(request, *args, **kwargs):\n config = get_configuration()\n if not config.get('activitypub'):\n return func(request, *args, **kwargs)\n fallback = True\n accept = request.META.get('HTTP_ACCEPT', '')\n for content_type in ('application/json',\n 'application/activity+json', 'application/ld+json'):\n if accept.find(content_type) > -1:\n fallback = False\n break\n if fallback:\n return func(request, *args, **kwargs)\n get_object_function = get_function_from_config(\n 'get_object_function')\n obj = get_object_function(request)\n if not obj:\n return HttpResponseNotFound()\n as2_obj = obj.as_protocol('activitypub')\n return JsonResponse(as2_obj.to_as2(), content_type=\n 'application/activity+json')\n\n def x(request, *args, **kwargs):\n process_payload_function = get_function_from_config(\n 'process_payload_function')\n result = process_payload_function(request)\n if result:\n return JsonResponse({}, content_type='application/json',\n status=202)\n else:\n return JsonResponse({'result': 'error'}, content_type=\n 'application/json', status=400)\n if request.method == 'GET':\n return get(request, *args, **kwargs)\n elif request.method == 'POST' and request.path.endswith('/inbox/'):\n return post(request, *args, **kwargs)\n return HttpResponse(status=405)\n return inner\n",
"role": "user"
},
{
"content": "activitypub_object_view",
"role": "assistant"
}
] |
def x(payload: Dict) ->List:
entities = []
cls = MAPPINGS.get(payload.get('type'))
if not cls:
return []
transformed = transform_attributes(payload, cls)
entity = cls(**transformed)
if hasattr(entity, 'post_receive'):
entity.post_receive()
entities.append(entity)
return entities
|
element_to_objects
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(payload: Dict) ->List:\n entities = []\n cls = MAPPINGS.get(payload.get('type'))\n if not cls:\n return []\n transformed = transform_attributes(payload, cls)\n entity = cls(**transformed)\n if hasattr(entity, 'post_receive'):\n entity.post_receive()\n entities.append(entity)\n return entities\n",
"role": "user"
},
{
"content": "element_to_objects",
"role": "assistant"
}
] |
def x(entity: BaseEntity, private_key):
if getattr(entity, 'outbound_doc', None):
return entity
outbound = None
cls = entity.__class__
if cls in [ActivitypubAccept, ActivitypubFollow, ActivitypubProfile]:
outbound = entity
elif cls == Accept:
outbound = ActivitypubAccept.from_base(entity)
elif cls == Follow:
outbound = ActivitypubFollow.from_base(entity)
elif cls == Profile:
outbound = ActivitypubProfile.from_base(entity)
if not outbound:
raise ValueError(
"Don't know how to convert this base entity to ActivityPub protocol entities."
)
return outbound
|
get_outbound_entity
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(entity: BaseEntity, private_key):\n if getattr(entity, 'outbound_doc', None):\n return entity\n outbound = None\n cls = entity.__class__\n if cls in [ActivitypubAccept, ActivitypubFollow, ActivitypubProfile]:\n outbound = entity\n elif cls == Accept:\n outbound = ActivitypubAccept.from_base(entity)\n elif cls == Follow:\n outbound = ActivitypubFollow.from_base(entity)\n elif cls == Profile:\n outbound = ActivitypubProfile.from_base(entity)\n if not outbound:\n raise ValueError(\n \"Don't know how to convert this base entity to ActivityPub protocol entities.\"\n )\n return outbound\n",
"role": "user"
},
{
"content": "get_outbound_entity",
"role": "assistant"
}
] |
def x(message: Dict, sender: str, sender_key_fetcher: Callable[[str], str]=
None, user: UserType=None) ->List:
return element_to_objects(message)
|
message_to_objects
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(message: Dict, sender: str, sender_key_fetcher: Callable[[str], str]=\n None, user: UserType=None) ->List:\n return element_to_objects(message)\n",
"role": "user"
},
{
"content": "message_to_objects",
"role": "assistant"
}
] |
def x(self):
attributes = []
validates = []
for attr in dir(self):
if not attr.startswith('_'):
attr_type = type(getattr(self, attr))
if attr_type != 'method':
if getattr(self, 'validate_{attr}'.format(attr=attr), None):
validates.append(getattr(self, 'validate_{attr}'.format
(attr=attr)))
attributes.append(attr)
self._validate_empty_attributes(attributes)
self._validate_required(attributes)
self._validate_attributes(validates)
self._validate_children()
self._validate_signatures()
|
validate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n attributes = []\n validates = []\n for attr in dir(self):\n if not attr.startswith('_'):\n attr_type = type(getattr(self, attr))\n if attr_type != 'method':\n if getattr(self, 'validate_{attr}'.format(attr=attr), None):\n validates.append(getattr(self, 'validate_{attr}'.format\n (attr=attr)))\n attributes.append(attr)\n self._validate_empty_attributes(attributes)\n self._validate_required(attributes)\n self._validate_attributes(validates)\n self._validate_children()\n self._validate_signatures()\n",
"role": "user"
},
{
"content": "validate",
"role": "assistant"
}
] |
def x(self, attributes):
required_fulfilled = set(self._required).issubset(set(attributes))
if not required_fulfilled:
raise ValueError(
'Not all required attributes fulfilled. Required: {required}'.
format(required=set(self._required)))
|
validate_required
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, attributes):\n required_fulfilled = set(self._required).issubset(set(attributes))\n if not required_fulfilled:\n raise ValueError(\n 'Not all required attributes fulfilled. Required: {required}'.\n format(required=set(self._required)))\n",
"role": "user"
},
{
"content": "validate_required",
"role": "assistant"
}
] |
def x(self, attributes):
attrs_to_check = set(self._required) & set(attributes)
for attr in attrs_to_check:
value = getattr(self, attr)
if value is None or value == '':
raise ValueError(
'Attribute %s cannot be None or an empty string since it is required.'
% attr)
|
validate_empty_attributes
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, attributes):\n attrs_to_check = set(self._required) & set(attributes)\n for attr in attrs_to_check:\n value = getattr(self, attr)\n if value is None or value == '':\n raise ValueError(\n 'Attribute %s cannot be None or an empty string since it is required.'\n % attr)\n",
"role": "user"
},
{
"content": "validate_empty_attributes",
"role": "assistant"
}
] |
def x(self):
for child in self._children:
if child.__class__ not in self._allowed_children:
raise ValueError(
'Child %s is not allowed as a children for this %s type entity.'
% (child, self.__class__))
|
validate_children
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for child in self._children:\n if child.__class__ not in self._allowed_children:\n raise ValueError(\n 'Child %s is not allowed as a children for this %s type entity.'\n % (child, self.__class__))\n",
"role": "user"
},
{
"content": "validate_children",
"role": "assistant"
}
] |
def x(self):
if self.participation not in self._participation_valid_values:
raise ValueError('participation should be one of: {valid}'.format(
valid=', '.join(self._participation_valid_values)))
|
validate_participation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.participation not in self._participation_valid_values:\n raise ValueError('participation should be one of: {valid}'.format(\n valid=', '.join(self._participation_valid_values)))\n",
"role": "user"
},
{
"content": "validate_participation",
"role": "assistant"
}
] |
def x(self):
if not self.raw_content:
return set()
return {word.strip('#').lower() for word in self.raw_content.split() if
word.startswith('#') and len(word) > 1}
|
tags
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.raw_content:\n return set()\n return {word.strip('#').lower() for word in self.raw_content.split() if\n word.startswith('#') and len(word) > 1}\n",
"role": "user"
},
{
"content": "tags",
"role": "assistant"
}
] |
def x(entity: BaseEntity, author_user: UserType, protocol_name: str,
to_user_key: RsaKey=None, parent_user: UserType=None) ->str:
mappers = importlib.import_module(
f'federation.entities.{protocol_name}.mappers')
protocol = importlib.import_module(
f'federation.protocols.{protocol_name}.protocol')
protocol = protocol.Protocol()
outbound_entity = mappers.get_outbound_entity(entity, author_user.
private_key)
if parent_user:
outbound_entity.sign_with_parent(parent_user.private_key)
send_as_user = parent_user if parent_user else author_user
data = protocol.build_send(entity=outbound_entity, from_user=
send_as_user, to_user_key=to_user_key)
return data
|
handle_create_payload
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(entity: BaseEntity, author_user: UserType, protocol_name: str,\n to_user_key: RsaKey=None, parent_user: UserType=None) ->str:\n mappers = importlib.import_module(\n f'federation.entities.{protocol_name}.mappers')\n protocol = importlib.import_module(\n f'federation.protocols.{protocol_name}.protocol')\n protocol = protocol.Protocol()\n outbound_entity = mappers.get_outbound_entity(entity, author_user.\n private_key)\n if parent_user:\n outbound_entity.sign_with_parent(parent_user.private_key)\n send_as_user = parent_user if parent_user else author_user\n data = protocol.build_send(entity=outbound_entity, from_user=\n send_as_user, to_user_key=to_user_key)\n return data\n",
"role": "user"
},
{
"content": "handle_create_payload",
"role": "assistant"
}
] |
def x(entity: BaseEntity, author_user: UserType, recipients: List[Dict],
parent_user: UserType=None) ->None:
payloads = []
public_payloads = {'activitypub': {'auth': None, 'payload': None,
'urls': set()}, 'diaspora': {'auth': None, 'payload': None, 'urls':
set()}}
unique_recipients = unique_everseen(recipients)
for recipient in unique_recipients:
fid = recipient['fid']
public_key = recipient.get('public_key')
protocol = recipient['protocol']
public = recipient['public']
if protocol == 'activitypub':
try:
payload = handle_create_payload(entity, author_user,
protocol, parent_user=parent_user)
if public:
payload['to'
] = 'https://www.w3.org/ns/activitystreams#Public'
else:
payload['to'] = fid
payload = json.dumps(payload).encode('utf-8')
except Exception as ex:
logger.error(
'handle_send - failed to generate private payload for %s: %s'
, fid, ex)
continue
payloads.append({'auth': get_http_authentication(author_user.
private_key, f'{author_user.id}#main-key'), 'payload':
payload, 'content_type':
'application/ld+json; profile="https://www.w3.org/ns/activitystreams"'
, 'urls': {fid}})
elif protocol == 'diaspora':
if public:
if public_key:
raise ValueError(
'handle_send - Diaspora recipient cannot be public and use encrypted delivery'
)
if not public_payloads[protocol]['payload']:
public_payloads[protocol]['payload'
] = handle_create_payload(entity, author_user,
protocol, parent_user=parent_user)
public_payloads['diaspora']['urls'].add(fid)
else:
if not public_key:
raise ValueError(
'handle_send - Diaspora recipient cannot be private without a public key for encrypted delivery'
)
try:
payload = handle_create_payload(entity, author_user,
'diaspora', to_user_key=public_key, parent_user=
parent_user)
payload = json.dumps(payload)
except Exception as ex:
logger.error(
'handle_send - failed to generate private payload for %s: %s'
, fid, ex)
continue
payloads.append({'urls': {fid}, 'payload': payload,
'content_type': 'application/json', 'auth': None})
if public_payloads['diaspora']['payload']:
payloads.append({'urls': public_payloads['diaspora']['urls'],
'payload': public_payloads['diaspora']['payload'],
'content_type': 'application/magic-envelope+xml', 'auth': None})
logger.debug('handle_send - %s', payloads)
for payload in payloads:
for url in payload['urls']:
try:
send_document(url, payload['payload'], auth=payload['auth'],
headers={'Content-Type': payload['content_type']})
except Exception as ex:
logger.error(
'handle_send - failed to send payload to %s: %s, payload: %s'
, url, ex, payload['payload'])
|
handle_send
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(entity: BaseEntity, author_user: UserType, recipients: List[Dict],\n parent_user: UserType=None) ->None:\n payloads = []\n public_payloads = {'activitypub': {'auth': None, 'payload': None,\n 'urls': set()}, 'diaspora': {'auth': None, 'payload': None, 'urls':\n set()}}\n unique_recipients = unique_everseen(recipients)\n for recipient in unique_recipients:\n fid = recipient['fid']\n public_key = recipient.get('public_key')\n protocol = recipient['protocol']\n public = recipient['public']\n if protocol == 'activitypub':\n try:\n payload = handle_create_payload(entity, author_user,\n protocol, parent_user=parent_user)\n if public:\n payload['to'\n ] = 'https://www.w3.org/ns/activitystreams#Public'\n else:\n payload['to'] = fid\n payload = json.dumps(payload).encode('utf-8')\n except Exception as ex:\n logger.error(\n 'handle_send - failed to generate private payload for %s: %s'\n , fid, ex)\n continue\n payloads.append({'auth': get_http_authentication(author_user.\n private_key, f'{author_user.id}#main-key'), 'payload':\n payload, 'content_type':\n 'application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\"'\n , 'urls': {fid}})\n elif protocol == 'diaspora':\n if public:\n if public_key:\n raise ValueError(\n 'handle_send - Diaspora recipient cannot be public and use encrypted delivery'\n )\n if not public_payloads[protocol]['payload']:\n public_payloads[protocol]['payload'\n ] = handle_create_payload(entity, author_user,\n protocol, parent_user=parent_user)\n public_payloads['diaspora']['urls'].add(fid)\n else:\n if not public_key:\n raise ValueError(\n 'handle_send - Diaspora recipient cannot be private without a public key for encrypted delivery'\n )\n try:\n payload = handle_create_payload(entity, author_user,\n 'diaspora', to_user_key=public_key, parent_user=\n parent_user)\n payload = json.dumps(payload)\n except Exception as ex:\n logger.error(\n 'handle_send - failed to generate private payload for %s: %s'\n , fid, ex)\n continue\n payloads.append({'urls': {fid}, 'payload': payload,\n 'content_type': 'application/json', 'auth': None})\n if public_payloads['diaspora']['payload']:\n payloads.append({'urls': public_payloads['diaspora']['urls'],\n 'payload': public_payloads['diaspora']['payload'],\n 'content_type': 'application/magic-envelope+xml', 'auth': None})\n logger.debug('handle_send - %s', payloads)\n for payload in payloads:\n for url in payload['urls']:\n try:\n send_document(url, payload['payload'], auth=payload['auth'],\n headers={'Content-Type': payload['content_type']})\n except Exception as ex:\n logger.error(\n 'handle_send - failed to send payload to %s: %s, payload: %s'\n , url, ex, payload['payload'])\n",
"role": "user"
},
{
"content": "handle_send",
"role": "assistant"
}
] |
def x(doc):
key_id = doc.find('.//{%s}sig' % NAMESPACE).get('key_id')
return urlsafe_b64decode(key_id).decode('utf-8')
|
get_sender
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(doc):\n key_id = doc.find('.//{%s}sig' % NAMESPACE).get('key_id')\n return urlsafe_b64decode(key_id).decode('utf-8')\n",
"role": "user"
},
{
"content": "get_sender",
"role": "assistant"
}
] |
def x(self):
doc = etree.fromstring(self.message)
self.payload = etree.tostring(doc, encoding='utf-8')
self.payload = urlsafe_b64encode(self.payload).decode('ascii')
return self.payload
|
create_payload
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n doc = etree.fromstring(self.message)\n self.payload = etree.tostring(doc, encoding='utf-8')\n self.payload = urlsafe_b64encode(self.payload).decode('ascii')\n return self.payload\n",
"role": "user"
},
{
"content": "create_payload",
"role": "assistant"
}
] |
def x(self):
sig_contents = self.payload + '.' + b64encode(b'application/xml').decode(
'ascii') + '.' + b64encode(b'base64url').decode('ascii'
) + '.' + b64encode(b'RSA-SHA256').decode('ascii')
sig_hash = SHA256.new(sig_contents.encode('ascii'))
cipher = PKCS1_v1_5.new(self.private_key)
sig = urlsafe_b64encode(cipher.sign(sig_hash))
key_id = urlsafe_b64encode(bytes(self.author_handle, encoding='utf-8'))
return sig, key_id
|
build_signature
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n sig_contents = self.payload + '.' + b64encode(b'application/xml').decode(\n 'ascii') + '.' + b64encode(b'base64url').decode('ascii'\n ) + '.' + b64encode(b'RSA-SHA256').decode('ascii')\n sig_hash = SHA256.new(sig_contents.encode('ascii'))\n cipher = PKCS1_v1_5.new(self.private_key)\n sig = urlsafe_b64encode(cipher.sign(sig_hash))\n key_id = urlsafe_b64encode(bytes(self.author_handle, encoding='utf-8'))\n return sig, key_id\n",
"role": "user"
},
{
"content": "build_signature",
"role": "assistant"
}
] |
def x(self):
if not self.public_key:
self.fetch_public_key()
data = self.doc.find('.//{http://salmon-protocol.org/ns/magic-env}data'
).text
sig = self.doc.find('.//{http://salmon-protocol.org/ns/magic-env}sig').text
sig_contents = '.'.join([data, b64encode(b'application/xml').decode(
'ascii'), b64encode(b'base64url').decode('ascii'), b64encode(
b'RSA-SHA256').decode('ascii')])
sig_hash = SHA256.new(sig_contents.encode('ascii'))
cipher = PKCS1_v1_5.new(RSA.importKey(self.public_key))
if not cipher.verify(sig_hash, urlsafe_b64decode(sig)):
raise SignatureVerificationError(
'Signature cannot be verified using the given public key')
|
verify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.public_key:\n self.fetch_public_key()\n data = self.doc.find('.//{http://salmon-protocol.org/ns/magic-env}data'\n ).text\n sig = self.doc.find('.//{http://salmon-protocol.org/ns/magic-env}sig').text\n sig_contents = '.'.join([data, b64encode(b'application/xml').decode(\n 'ascii'), b64encode(b'base64url').decode('ascii'), b64encode(\n b'RSA-SHA256').decode('ascii')])\n sig_hash = SHA256.new(sig_contents.encode('ascii'))\n cipher = PKCS1_v1_5.new(RSA.importKey(self.public_key))\n if not cipher.verify(sig_hash, urlsafe_b64decode(sig)):\n raise SignatureVerificationError(\n 'Signature cannot be verified using the given public key')\n",
"role": "user"
},
{
"content": "verify",
"role": "assistant"
}
] |
def x(self):
if not hasattr(self, 'raw_content'):
return set()
mentions = re.findall('@{[^;]+; [\\w.-]+@[^}]+}', self.raw_content)
if not mentions:
return set()
mentions = {s.split(';')[1].strip(' }') for s in mentions}
mentions = {s for s in mentions}
return mentions
|
extract_mentions
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not hasattr(self, 'raw_content'):\n return set()\n mentions = re.findall('@{[^;]+; [\\\\w.-]+@[^}]+}', self.raw_content)\n if not mentions:\n return set()\n mentions = {s.split(';')[1].strip(' }') for s in mentions}\n mentions = {s for s in mentions}\n return mentions\n",
"role": "user"
},
{
"content": "extract_mentions",
"role": "assistant"
}
] |
def x(ip):
iplookup = ipdata.ipdata()
data = iplookup.lookup(ip)
if data.get('status') != 200:
return ''
return data.get('response', {}).get('country_code', '')
|
fetch_country_by_ip
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ip):\n iplookup = ipdata.ipdata()\n data = iplookup.lookup(ip)\n if data.get('status') != 200:\n return ''\n return data.get('response', {}).get('country_code', '')\n",
"role": "user"
},
{
"content": "fetch_country_by_ip",
"role": "assistant"
}
] |
def x(url=None, host=None, path='/', timeout=10, raise_ssl_errors=True,
extra_headers=None):
if not url and not host:
raise ValueError('Need url or host.')
logger.debug(
'fetch_document: url=%s, host=%s, path=%s, timeout=%s, raise_ssl_errors=%s'
, url, host, path, timeout, raise_ssl_errors)
headers = {'user-agent': USER_AGENT}
if extra_headers:
headers.update(extra_headers)
if url:
logger.debug('fetch_document: trying %s', url)
try:
response = requests.get(url, timeout=timeout, headers=headers)
logger.debug('fetch_document: found document, code %s',
response.status_code)
return response.text, response.status_code, None
except RequestException as ex:
logger.debug('fetch_document: exception %s', ex)
return None, None, ex
host_string = host.replace('http://', '').replace('https://', '').strip('/'
)
path_string = path if path.startswith('/') else '/%s' % path
url = 'https://%s%s' % (host_string, path_string)
logger.debug('fetch_document: trying %s', url)
try:
response = requests.get(url, timeout=timeout, headers=headers)
logger.debug('fetch_document: found document, code %s', response.
status_code)
response.raise_for_status()
return response.text, response.status_code, None
except (HTTPError, SSLError, ConnectionError) as ex:
if isinstance(ex, SSLError) and raise_ssl_errors:
logger.debug('fetch_document: exception %s', ex)
return None, None, ex
url = url.replace('https://', 'http://')
logger.debug('fetch_document: trying %s', url)
try:
response = requests.get(url, timeout=timeout, headers=headers)
logger.debug('fetch_document: found document, code %s',
response.status_code)
response.raise_for_status()
return response.text, response.status_code, None
except RequestException as ex:
logger.debug('fetch_document: exception %s', ex)
return None, None, ex
except RequestException as ex:
logger.debug('fetch_document: exception %s', ex)
return None, None, ex
|
fetch_document
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url=None, host=None, path='/', timeout=10, raise_ssl_errors=True,\n extra_headers=None):\n if not url and not host:\n raise ValueError('Need url or host.')\n logger.debug(\n 'fetch_document: url=%s, host=%s, path=%s, timeout=%s, raise_ssl_errors=%s'\n , url, host, path, timeout, raise_ssl_errors)\n headers = {'user-agent': USER_AGENT}\n if extra_headers:\n headers.update(extra_headers)\n if url:\n logger.debug('fetch_document: trying %s', url)\n try:\n response = requests.get(url, timeout=timeout, headers=headers)\n logger.debug('fetch_document: found document, code %s',\n response.status_code)\n return response.text, response.status_code, None\n except RequestException as ex:\n logger.debug('fetch_document: exception %s', ex)\n return None, None, ex\n host_string = host.replace('http://', '').replace('https://', '').strip('/'\n )\n path_string = path if path.startswith('/') else '/%s' % path\n url = 'https://%s%s' % (host_string, path_string)\n logger.debug('fetch_document: trying %s', url)\n try:\n response = requests.get(url, timeout=timeout, headers=headers)\n logger.debug('fetch_document: found document, code %s', response.\n status_code)\n response.raise_for_status()\n return response.text, response.status_code, None\n except (HTTPError, SSLError, ConnectionError) as ex:\n if isinstance(ex, SSLError) and raise_ssl_errors:\n logger.debug('fetch_document: exception %s', ex)\n return None, None, ex\n url = url.replace('https://', 'http://')\n logger.debug('fetch_document: trying %s', url)\n try:\n response = requests.get(url, timeout=timeout, headers=headers)\n logger.debug('fetch_document: found document, code %s',\n response.status_code)\n response.raise_for_status()\n return response.text, response.status_code, None\n except RequestException as ex:\n logger.debug('fetch_document: exception %s', ex)\n return None, None, ex\n except RequestException as ex:\n logger.debug('fetch_document: exception %s', ex)\n return None, None, ex\n",
"role": "user"
},
{
"content": "fetch_document",
"role": "assistant"
}
] |
def x(host: str) ->str:
try:
ip = socket.gethostbyname(host)
except socket.gaierror:
return ''
return ip
|
fetch_host_ip
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(host: str) ->str:\n try:\n ip = socket.gethostbyname(host)\n except socket.gaierror:\n return ''\n return ip\n",
"role": "user"
},
{
"content": "fetch_host_ip",
"role": "assistant"
}
] |
def x(host: str) ->Tuple:
ip = fetch_host_ip(host)
if not host:
return '', ''
country = fetch_country_by_ip(ip)
return ip, country
|
fetch_host_ip_and_country
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(host: str) ->Tuple:\n ip = fetch_host_ip(host)\n if not host:\n return '', ''\n country = fetch_country_by_ip(ip)\n return ip, country\n",
"role": "user"
},
{
"content": "fetch_host_ip_and_country",
"role": "assistant"
}
] |
def x(date):
MONTHS = 'jan feb mar apr may jun jul aug sep oct nov dec'.split()
__D = '(?P<day>\\d{2})'
__D2 = '(?P<day>[ \\d]\\d)'
__M = '(?P<mon>\\w{3})'
__Y = '(?P<year>\\d{4})'
__Y2 = '(?P<year>\\d{2})'
__T = '(?P<hour>\\d{2}):(?P<min>\\d{2}):(?P<sec>\\d{2})'
RFC1123_DATE = re.compile('^\\w{3}, %s %s %s %s GMT$' % (__D, __M, __Y,
__T))
RFC850_DATE = re.compile('^\\w{6,9}, %s-%s-%s %s GMT$' % (__D, __M,
__Y2, __T))
ASCTIME_DATE = re.compile('^\\w{3} %s %s %s %s$' % (__M, __D2, __T, __Y))
for regex in (RFC1123_DATE, RFC850_DATE, ASCTIME_DATE):
m = regex.match(date)
if m is not None:
break
else:
raise ValueError('%r is not in a valid HTTP date format' % date)
try:
year = int(m.group('year'))
if year < 100:
if year < 70:
year += 2000
else:
year += 1900
month = MONTHS.index(m.group('mon').lower()) + 1
day = int(m.group('day'))
hour = int(m.group('hour'))
min = int(m.group('min'))
sec = int(m.group('sec'))
result = datetime.datetime(year, month, day, hour, min, sec)
return calendar.timegm(result.utctimetuple())
except Exception as exc:
raise ValueError('%r is not a valid date' % date) from exc
|
parse_http_date
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(date):\n MONTHS = 'jan feb mar apr may jun jul aug sep oct nov dec'.split()\n __D = '(?P<day>\\\\d{2})'\n __D2 = '(?P<day>[ \\\\d]\\\\d)'\n __M = '(?P<mon>\\\\w{3})'\n __Y = '(?P<year>\\\\d{4})'\n __Y2 = '(?P<year>\\\\d{2})'\n __T = '(?P<hour>\\\\d{2}):(?P<min>\\\\d{2}):(?P<sec>\\\\d{2})'\n RFC1123_DATE = re.compile('^\\\\w{3}, %s %s %s %s GMT$' % (__D, __M, __Y,\n __T))\n RFC850_DATE = re.compile('^\\\\w{6,9}, %s-%s-%s %s GMT$' % (__D, __M,\n __Y2, __T))\n ASCTIME_DATE = re.compile('^\\\\w{3} %s %s %s %s$' % (__M, __D2, __T, __Y))\n for regex in (RFC1123_DATE, RFC850_DATE, ASCTIME_DATE):\n m = regex.match(date)\n if m is not None:\n break\n else:\n raise ValueError('%r is not in a valid HTTP date format' % date)\n try:\n year = int(m.group('year'))\n if year < 100:\n if year < 70:\n year += 2000\n else:\n year += 1900\n month = MONTHS.index(m.group('mon').lower()) + 1\n day = int(m.group('day'))\n hour = int(m.group('hour'))\n min = int(m.group('min'))\n sec = int(m.group('sec'))\n result = datetime.datetime(year, month, day, hour, min, sec)\n return calendar.timegm(result.utctimetuple())\n except Exception as exc:\n raise ValueError('%r is not a valid date' % date) from exc\n",
"role": "user"
},
{
"content": "parse_http_date",
"role": "assistant"
}
] |
def x(url, data, timeout=10, *args, **kwargs):
logger.debug('send_document: url=%s, data=%s, timeout=%s', url, data,
timeout)
headers = CaseInsensitiveDict({'User-Agent': USER_AGENT})
if 'headers' in kwargs:
headers.update(kwargs.get('headers'))
kwargs.update({'data': data, 'timeout': timeout, 'headers': headers})
try:
response = requests.post(url, *args, **kwargs)
logger.debug('send_document: response status code %s', response.
status_code)
return response.status_code, None
except RequestException as ex:
logger.debug('send_document: exception %s', ex)
return None, ex
|
send_document
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url, data, timeout=10, *args, **kwargs):\n logger.debug('send_document: url=%s, data=%s, timeout=%s', url, data,\n timeout)\n headers = CaseInsensitiveDict({'User-Agent': USER_AGENT})\n if 'headers' in kwargs:\n headers.update(kwargs.get('headers'))\n kwargs.update({'data': data, 'timeout': timeout, 'headers': headers})\n try:\n response = requests.post(url, *args, **kwargs)\n logger.debug('send_document: response status code %s', response.\n status_code)\n return response.status_code, None\n except RequestException as ex:\n logger.debug('send_document: exception %s', ex)\n return None, ex\n",
"role": "user"
},
{
"content": "send_document",
"role": "assistant"
}
] |
def x(private_key: RsaKey, private_key_id: str) ->HTTPSignatureHeaderAuth:
key = private_key.exportKey()
return HTTPSignatureHeaderAuth(headers=['(request-target)',
'user-agent', 'host', 'date'], algorithm='rsa-sha256', key=key,
key_id=private_key_id)
|
get_http_authentication
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(private_key: RsaKey, private_key_id: str) ->HTTPSignatureHeaderAuth:\n key = private_key.exportKey()\n return HTTPSignatureHeaderAuth(headers=['(request-target)',\n 'user-agent', 'host', 'date'], algorithm='rsa-sha256', key=key,\n key_id=private_key_id)\n",
"role": "user"
},
{
"content": "get_http_authentication",
"role": "assistant"
}
] |
def x(request: RequestType, public_key: Union[str, bytes]):
key = encode_if_text(public_key)
date_header = request.headers.get('Date')
if not date_header:
raise ValueError('Rquest Date header is missing')
ts = parse_http_date(date_header)
dt = datetime.datetime.utcfromtimestamp(ts).replace(tzinfo=pytz.utc)
delta = datetime.timedelta(seconds=30)
now = datetime.datetime.utcnow().replace(tzinfo=pytz.utc)
if dt < now - delta or dt > now + delta:
raise ValueError('Request Date is too far in future or past')
HTTPSignatureHeaderAuth.verify(request, key_resolver=lambda **kwargs: key)
|
verify_request_signature
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request: RequestType, public_key: Union[str, bytes]):\n key = encode_if_text(public_key)\n date_header = request.headers.get('Date')\n if not date_header:\n raise ValueError('Rquest Date header is missing')\n ts = parse_http_date(date_header)\n dt = datetime.datetime.utcfromtimestamp(ts).replace(tzinfo=pytz.utc)\n delta = datetime.timedelta(seconds=30)\n now = datetime.datetime.utcnow().replace(tzinfo=pytz.utc)\n if dt < now - delta or dt > now + delta:\n raise ValueError('Request Date is too far in future or past')\n HTTPSignatureHeaderAuth.verify(request, key_resolver=lambda **kwargs: key)\n",
"role": "user"
},
{
"content": "verify_request_signature",
"role": "assistant"
}
] |
def x(self):
element = etree.Element(self._tag_name)
struct_to_xml(element, [{'text': self.raw_content}, {'guid': self.guid},
{'author': self.handle}, {'public': 'true' if self.public else
'false'}, {'created_at': format_dt(self.created_at)}, {
'provider_display_name': self.provider_display_name}])
return element
|
to_xml
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n element = etree.Element(self._tag_name)\n struct_to_xml(element, [{'text': self.raw_content}, {'guid': self.guid},\n {'author': self.handle}, {'public': 'true' if self.public else\n 'false'}, {'created_at': format_dt(self.created_at)}, {\n 'provider_display_name': self.provider_display_name}])\n return element\n",
"role": "user"
},
{
"content": "to_xml",
"role": "assistant"
}
] |
def x(self):
element = etree.Element(self._tag_name)
struct_to_xml(element, [{'author': self.handle}, {'recipient': self.
target_handle}, {'following': 'true' if self.following else 'false'
}, {'sharing': 'true' if self.following else 'false'}])
return element
|
to_xml
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n element = etree.Element(self._tag_name)\n struct_to_xml(element, [{'author': self.handle}, {'recipient': self.\n target_handle}, {'following': 'true' if self.following else 'false'\n }, {'sharing': 'true' if self.following else 'false'}])\n return element\n",
"role": "user"
},
{
"content": "to_xml",
"role": "assistant"
}
] |
def x(self):
element = etree.Element(self._tag_name)
struct_to_xml(element, [{'author': self.handle}, {'first_name': self.
name}, {'last_name': ''}, {'image_url': self.image_urls['large']},
{'image_url_small': self.image_urls['small']}, {'image_url_medium':
self.image_urls['medium']}, {'gender': self.gender}, {'bio': self.
raw_content}, {'location': self.location}, {'searchable': 'true' if
self.public else 'false'}, {'nsfw': 'true' if self.nsfw else
'false'}, {'tag_string': ' '.join([('#%s' % tag) for tag in self.
tag_list])}])
return element
|
to_xml
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n element = etree.Element(self._tag_name)\n struct_to_xml(element, [{'author': self.handle}, {'first_name': self.\n name}, {'last_name': ''}, {'image_url': self.image_urls['large']},\n {'image_url_small': self.image_urls['small']}, {'image_url_medium':\n self.image_urls['medium']}, {'gender': self.gender}, {'bio': self.\n raw_content}, {'location': self.location}, {'searchable': 'true' if\n self.public else 'false'}, {'nsfw': 'true' if self.nsfw else\n 'false'}, {'tag_string': ' '.join([('#%s' % tag) for tag in self.\n tag_list])}])\n return element\n",
"role": "user"
},
{
"content": "to_xml",
"role": "assistant"
}
] |
def x(self):
element = etree.Element(self._tag_name)
struct_to_xml(element, [{'author': self.handle}, {'target_guid': self.
target_guid}, {'target_type': DiasporaRetraction.
entity_type_to_remote(self.entity_type)}])
return element
|
to_xml
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n element = etree.Element(self._tag_name)\n struct_to_xml(element, [{'author': self.handle}, {'target_guid': self.\n target_guid}, {'target_type': DiasporaRetraction.\n entity_type_to_remote(self.entity_type)}])\n return element\n",
"role": "user"
},
{
"content": "to_xml",
"role": "assistant"
}
] |
def x(value):
if value in DiasporaRetraction.mapped.values():
values = list(DiasporaRetraction.mapped.values())
index = values.index(value)
return list(DiasporaRetraction.mapped.keys())[index]
return value
|
entity_type_to_remote
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(value):\n if value in DiasporaRetraction.mapped.values():\n values = list(DiasporaRetraction.mapped.values())\n index = values.index(value)\n return list(DiasporaRetraction.mapped.keys())[index]\n return value\n",
"role": "user"
},
{
"content": "entity_type_to_remote",
"role": "assistant"
}
] |
def x(entity):
attributes = {}
cls = entity.__class__
for attr, _ in inspect.getmembers(cls, lambda o: not isinstance(o,
property) and not inspect.isroutine(o)):
if not attr.startswith('_'):
attributes[attr] = getattr(entity, attr)
return attributes
|
get_base_attributes
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(entity):\n attributes = {}\n cls = entity.__class__\n for attr, _ in inspect.getmembers(cls, lambda o: not isinstance(o,\n property) and not inspect.isroutine(o)):\n if not attr.startswith('_'):\n attributes[attr] = getattr(entity, attr)\n return attributes\n",
"role": "user"
},
{
"content": "get_base_attributes",
"role": "assistant"
}
] |
def x(inp, block_size):
val = block_size - len(inp) % block_size
if val == 0:
return inp + bytes([block_size]) * block_size
else:
return inp + bytes([val]) * val
|
pkcs7_pad
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(inp, block_size):\n val = block_size - len(inp) % block_size\n if val == 0:\n return inp + bytes([block_size]) * block_size\n else:\n return inp + bytes([val]) * val\n",
"role": "user"
},
{
"content": "pkcs7_pad",
"role": "assistant"
}
] |
def x(data):
if isinstance(data, str):
return data[0:-ord(data[-1])]
else:
return data[0:-data[-1]]
|
pkcs7_unpad
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n if isinstance(data, str):\n return data[0:-ord(data[-1])]\n else:\n return data[0:-data[-1]]\n",
"role": "user"
},
{
"content": "pkcs7_unpad",
"role": "assistant"
}
] |
def x(payload, private_key):
cipher = PKCS1_v1_5.new(private_key)
aes_key_str = cipher.decrypt(b64decode(payload.get('aes_key')),
sentinel=None)
aes_key = json.loads(aes_key_str.decode('utf-8'))
key = b64decode(aes_key.get('key'))
iv = b64decode(aes_key.get('iv'))
encrypted_magic_envelope = b64decode(payload.get(
'encrypted_magic_envelope'))
encrypter = AES.new(key, AES.MODE_CBC, iv)
content = encrypter.decrypt(encrypted_magic_envelope)
return etree.fromstring(pkcs7_unpad(content))
|
decrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(payload, private_key):\n cipher = PKCS1_v1_5.new(private_key)\n aes_key_str = cipher.decrypt(b64decode(payload.get('aes_key')),\n sentinel=None)\n aes_key = json.loads(aes_key_str.decode('utf-8'))\n key = b64decode(aes_key.get('key'))\n iv = b64decode(aes_key.get('iv'))\n encrypted_magic_envelope = b64decode(payload.get(\n 'encrypted_magic_envelope'))\n encrypter = AES.new(key, AES.MODE_CBC, iv)\n content = encrypter.decrypt(encrypted_magic_envelope)\n return etree.fromstring(pkcs7_unpad(content))\n",
"role": "user"
},
{
"content": "decrypt",
"role": "assistant"
}
] |
def x(payload, public_key):
iv, key, encrypter = EncryptedPayload.get_iv_key_encrypter()
aes_key_json = EncryptedPayload.get_aes_key_json(iv, key)
cipher = PKCS1_v1_5.new(public_key)
aes_key = b64encode(cipher.encrypt(aes_key_json))
padded_payload = pkcs7_pad(payload.encode('utf-8'), AES.block_size)
encrypted_me = b64encode(encrypter.encrypt(padded_payload))
return {'aes_key': aes_key.decode('utf-8'), 'encrypted_magic_envelope':
encrypted_me.decode('utf8')}
|
encrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(payload, public_key):\n iv, key, encrypter = EncryptedPayload.get_iv_key_encrypter()\n aes_key_json = EncryptedPayload.get_aes_key_json(iv, key)\n cipher = PKCS1_v1_5.new(public_key)\n aes_key = b64encode(cipher.encrypt(aes_key_json))\n padded_payload = pkcs7_pad(payload.encode('utf-8'), AES.block_size)\n encrypted_me = b64encode(encrypter.encrypt(padded_payload))\n return {'aes_key': aes_key.decode('utf-8'), 'encrypted_magic_envelope':\n encrypted_me.decode('utf8')}\n",
"role": "user"
},
{
"content": "encrypt",
"role": "assistant"
}
] |
def x(self):
if self._template:
return self._template
template_json = self.read_template(self.args.tmplname)
self._template = loads(template_json)
return self._template
|
template
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._template:\n return self._template\n template_json = self.read_template(self.args.tmplname)\n self._template = loads(template_json)\n return self._template\n",
"role": "user"
},
{
"content": "template",
"role": "assistant"
}
] |
def x(self, record, datefmt=None):
ct = self.converter(record.created)
if datefmt:
if datefmt == 'Z':
t = time.strftime('%Y-%m-%dT%H:%M:%S', ct)
s = '{}.{:03.0f}Z'.format(t, record.msecs)
else:
s = time.strftime(datefmt, ct)
else:
t = time.strftime(self.default_time_format, ct)
s = self.default_msec_format % (t, record.msecs)
return s
|
formatTime
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, record, datefmt=None):\n ct = self.converter(record.created)\n if datefmt:\n if datefmt == 'Z':\n t = time.strftime('%Y-%m-%dT%H:%M:%S', ct)\n s = '{}.{:03.0f}Z'.format(t, record.msecs)\n else:\n s = time.strftime(datefmt, ct)\n else:\n t = time.strftime(self.default_time_format, ct)\n s = self.default_msec_format % (t, record.msecs)\n return s\n",
"role": "user"
},
{
"content": "formatTime",
"role": "assistant"
}
] |
def x(self, mapping):
if not isinstance(mapping, dict):
return
for key, val in mapping.items():
if key in self._level_names:
self._level_names[key] = val
|
override_level_names
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, mapping):\n if not isinstance(mapping, dict):\n return\n for key, val in mapping.items():\n if key in self._level_names:\n self._level_names[key] = val\n",
"role": "user"
},
{
"content": "override_level_names",
"role": "assistant"
}
] |
def x(self, colors):
if not isinstance(colors, dict):
return
for key in self._color[True]:
if key in colors:
self._color[True][key] = colors[key]
|
override_colors
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, colors):\n if not isinstance(colors, dict):\n return\n for key in self._color[True]:\n if key in colors:\n self._color[True][key] = colors[key]\n",
"role": "user"
},
{
"content": "override_colors",
"role": "assistant"
}
] |
def x(self, record, enabled_fields):
message = record.getMessage()
if hasattr(record, 'prefix'):
message = '{}{}'.format(str(record.prefix) + ' ' if record.prefix else
'', message)
obj = {'name': record.name, 'asctime': self.formatTime(record, self.
datefmt), 'created': record.created, 'msecs': record.msecs,
'relativeCreated': record.relativeCreated, 'levelno': record.
levelno, 'levelname': self._level_names[record.levelname], 'thread':
record.thread, 'threadName': record.threadName, 'process': record.
process, 'pathname': record.pathname, 'filename': record.filename,
'module': record.module, 'lineno': record.lineno, 'funcName':
record.funcName, 'message': message, 'exception': record.exc_info[0
].__name__ if record.exc_info else None, 'stacktrace': record.exc_text}
if not isinstance(enabled_fields, list):
enabled_fields = [str(enabled_fields)]
ef = {}
for item in enabled_fields:
if not isinstance(item, (str, tuple)):
continue
if not isinstance(item, tuple):
ef[item] = item
else:
ef[item[0]] = item[1]
result = {}
for key, val in obj.items():
if key in ef:
result[ef[key]] = val
return result
|
prepare_record
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, record, enabled_fields):\n message = record.getMessage()\n if hasattr(record, 'prefix'):\n message = '{}{}'.format(str(record.prefix) + ' ' if record.prefix else\n '', message)\n obj = {'name': record.name, 'asctime': self.formatTime(record, self.\n datefmt), 'created': record.created, 'msecs': record.msecs,\n 'relativeCreated': record.relativeCreated, 'levelno': record.\n levelno, 'levelname': self._level_names[record.levelname], 'thread':\n record.thread, 'threadName': record.threadName, 'process': record.\n process, 'pathname': record.pathname, 'filename': record.filename,\n 'module': record.module, 'lineno': record.lineno, 'funcName':\n record.funcName, 'message': message, 'exception': record.exc_info[0\n ].__name__ if record.exc_info else None, 'stacktrace': record.exc_text}\n if not isinstance(enabled_fields, list):\n enabled_fields = [str(enabled_fields)]\n ef = {}\n for item in enabled_fields:\n if not isinstance(item, (str, tuple)):\n continue\n if not isinstance(item, tuple):\n ef[item] = item\n else:\n ef[item[0]] = item[1]\n result = {}\n for key, val in obj.items():\n if key in ef:\n result[ef[key]] = val\n return result\n",
"role": "user"
},
{
"content": "prepare_record",
"role": "assistant"
}
] |
def x(self, obj):
return json.dumps(obj, indent=self._indent, sort_keys=self._sort_keys)
|
obj2json
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, obj):\n return json.dumps(obj, indent=self._indent, sort_keys=self._sort_keys)\n",
"role": "user"
},
{
"content": "obj2json",
"role": "assistant"
}
] |
def x(cert, name):
cn = None
for t, v in cert.get_subject().get_components():
if t == b'CN':
cn = v
break
if cn == name:
return True
s_name = name.decode('ascii')
for i in range(cert.get_extension_count()):
ext = cert.get_extension(i)
if ext.get_short_name() == b'subjectAltName':
s = str(ext)
if s.startswith('DNS:') and s[4:] == s_name:
return True
return False
|
validate_host
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cert, name):\n cn = None\n for t, v in cert.get_subject().get_components():\n if t == b'CN':\n cn = v\n break\n if cn == name:\n return True\n s_name = name.decode('ascii')\n for i in range(cert.get_extension_count()):\n ext = cert.get_extension(i)\n if ext.get_short_name() == b'subjectAltName':\n s = str(ext)\n if s.startswith('DNS:') and s[4:] == s_name:\n return True\n return False\n",
"role": "user"
},
{
"content": "validate_host",
"role": "assistant"
}
] |
def x(tds_sock):
enc_conn = tds_sock.conn.sock
clear_conn = enc_conn._transport
enc_conn.shutdown()
tds_sock.conn.sock = clear_conn
tds_sock._writer._transport = clear_conn
tds_sock._reader._transport = clear_conn
|
revert_to_clear
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(tds_sock):\n enc_conn = tds_sock.conn.sock\n clear_conn = enc_conn._transport\n enc_conn.shutdown()\n tds_sock.conn.sock = clear_conn\n tds_sock._writer._transport = clear_conn\n tds_sock._reader._transport = clear_conn\n",
"role": "user"
},
{
"content": "revert_to_clear",
"role": "assistant"
}
] |
def x(password):
encoded = bytearray(ucs2_codec.encode(password)[0])
for i, ch in enumerate(encoded):
encoded[i] = (ch << 4 & 255 | ch >> 4) ^ 165
return encoded
|
tds7_crypt_pass
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(password):\n encoded = bytearray(ucs2_codec.encode(password)[0])\n for i, ch in enumerate(encoded):\n encoded[i] = (ch << 4 & 255 | ch >> 4) ^ 165\n return encoded\n",
"role": "user"
},
{
"content": "tds7_crypt_pass",
"role": "assistant"
}
] |
def x(self, struc):
buf, offset = readall_fast(self, struc.size)
return struc.unpack_from(buf, offset)
|
unpack
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, struc):\n buf, offset = readall_fast(self, struc.size)\n return struc.unpack_from(buf, offset)\n",
"role": "user"
},
{
"content": "unpack",
"role": "assistant"
}
] |
def x(self, num_chars):
buf = readall(self, num_chars * 2)
return ucs2_codec.decode(buf)[0]
|
read_ucs2
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, num_chars):\n buf = readall(self, num_chars * 2)\n return ucs2_codec.decode(buf)[0]\n",
"role": "user"
},
{
"content": "read_ucs2",
"role": "assistant"
}
] |
def x(self):
buf = readall(self, Collation.wire_size)
return Collation.unpack(buf)
|
get_collation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n buf = readall(self, Collation.wire_size)\n return Collation.unpack(buf)\n",
"role": "user"
},
{
"content": "get_collation",
"role": "assistant"
}
] |
def x(self):
try:
pos = 0
while pos < _header.size:
received = self._transport.recv_into(self._bufview[pos:_header.
size - pos])
if received == 0:
raise tds_base.ClosedConnectionError()
pos += received
except tds_base.TimeoutError:
self._session.put_cancel()
raise
self._pos = _header.size
self._type, self._status, self._size, self._session._spid, _ = (_header
.unpack_from(self._bufview, 0))
self._have = pos
while pos < self._size:
received = self._transport.recv_into(self._bufview[pos:], self.
_size - pos)
if received == 0:
raise tds_base.ClosedConnectionError()
pos += received
self._have += received
|
read_packet
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n try:\n pos = 0\n while pos < _header.size:\n received = self._transport.recv_into(self._bufview[pos:_header.\n size - pos])\n if received == 0:\n raise tds_base.ClosedConnectionError()\n pos += received\n except tds_base.TimeoutError:\n self._session.put_cancel()\n raise\n self._pos = _header.size\n self._type, self._status, self._size, self._session._spid, _ = (_header\n .unpack_from(self._bufview, 0))\n self._have = pos\n while pos < self._size:\n received = self._transport.recv_into(self._bufview[pos:], self.\n _size - pos)\n if received == 0:\n raise tds_base.ClosedConnectionError()\n pos += received\n self._have += received\n",
"role": "user"
},
{
"content": "read_packet",
"role": "assistant"
}
] |
def x(self):
self._read_packet()
return readall(self, self._size - _header.size)
|
read_whole_packet
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._read_packet()\n return readall(self, self._size - _header.size)\n",
"role": "user"
},
{
"content": "read_whole_packet",
"role": "assistant"
}
] |
def x(self, data):
data_off = 0
while data_off < len(data):
left = len(self._buf) - self._pos
if left <= 0:
self._write_packet(final=False)
else:
to_write = min(left, len(data) - data_off)
self._buf[self._pos:self._pos + to_write] = data[data_off:
data_off + to_write]
self._pos += to_write
data_off += to_write
|
write
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n data_off = 0\n while data_off < len(data):\n left = len(self._buf) - self._pos\n if left <= 0:\n self._write_packet(final=False)\n else:\n to_write = min(left, len(data) - data_off)\n self._buf[self._pos:self._pos + to_write] = data[data_off:\n data_off + to_write]\n self._pos += to_write\n data_off += to_write\n",
"role": "user"
},
{
"content": "write",
"role": "assistant"
}
] |
def x(self, s, codec):
for i in range(0, len(s), self.bufsize):
chunk = s[i:i + self.bufsize]
buf, consumed = codec.encode(chunk)
assert consumed == len(chunk)
self.write(buf)
|
write_string
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, s, codec):\n for i in range(0, len(s), self.bufsize):\n chunk = s[i:i + self.bufsize]\n buf, consumed = codec.encode(chunk)\n assert consumed == len(chunk)\n self.write(buf)\n",
"role": "user"
},
{
"content": "write_string",
"role": "assistant"
}
] |
def x(self, final):
status = 1 if final else 0
_header.pack_into(self._buf, 0, self._type, status, self._pos, 0, self.
_packet_no)
self._packet_no = (self._packet_no + 1) % 256
self._transport.sendall(self._buf[:self._pos])
self._pos = 8
|
write_packet
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, final):\n status = 1 if final else 0\n _header.pack_into(self._buf, 0, self._type, status, self._pos, 0, self.\n _packet_no)\n self._packet_no = (self._packet_no + 1) % 256\n self._transport.sendall(self._buf[:self._pos])\n self._pos = 8\n",
"role": "user"
},
{
"content": "write_packet",
"role": "assistant"
}
] |
def x(self):
if not self.messages:
raise tds_base.Error("Request failed, server didn't send error message"
)
msg = None
while True:
msg = self.messages[-1]
if msg['msgno'] == 3621:
self.messages = self.messages[:-1]
else:
break
error_msg = ' '.join(m['message'] for m in self.messages)
ex = _create_exception_by_message(msg, error_msg)
raise ex
|
raise_db_exception
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self.messages:\n raise tds_base.Error(\"Request failed, server didn't send error message\"\n )\n msg = None\n while True:\n msg = self.messages[-1]\n if msg['msgno'] == 3621:\n self.messages = self.messages[:-1]\n else:\n break\n error_msg = ' '.join(m['message'] for m in self.messages)\n ex = _create_exception_by_message(msg, error_msg)\n raise ex\n",
"role": "user"
},
{
"content": "raise_db_exception",
"role": "assistant"
}
] |
def x(self, curcol):
r = self._reader
if tds_base.IS_TDS72_PLUS(self):
user_type = r.get_uint()
else:
user_type = r.get_usmallint()
curcol.column_usertype = user_type
curcol.flags = r.get_usmallint()
type_id = r.get_byte()
serializer_class = self._tds.type_factory.get_type_serializer(type_id)
curcol.serializer = serializer_class.from_stream(r)
|
get_type_info
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, curcol):\n r = self._reader\n if tds_base.IS_TDS72_PLUS(self):\n user_type = r.get_uint()\n else:\n user_type = r.get_usmallint()\n curcol.column_usertype = user_type\n curcol.flags = r.get_usmallint()\n type_id = r.get_byte()\n serializer_class = self._tds.type_factory.get_type_serializer(type_id)\n curcol.serializer = serializer_class.from_stream(r)\n",
"role": "user"
},
{
"content": "get_type_info",
"role": "assistant"
}
] |
def x(self):
self.log_response_message('got COLMETADATA')
r = self._reader
num_cols = r.get_smallint()
if num_cols == -1:
return
self.param_info = None
self.has_status = False
self.ret_status = None
self.skipped_to_status = False
self.rows_affected = tds_base.TDS_NO_COUNT
self.more_rows = True
self.row = [None] * num_cols
self.res_info = info = _Results()
header_tuple = []
for col in range(num_cols):
curcol = tds_base.Column()
info.columns.append(curcol)
self.get_type_info(curcol)
curcol.column_name = r.read_ucs2(r.get_byte())
precision = curcol.serializer.precision
scale = curcol.serializer.scale
size = curcol.serializer.size
header_tuple.append((curcol.column_name, curcol.serializer.
get_typeid(), None, size, precision, scale, curcol.flags &
tds_base.Column.fNullable))
info.description = tuple(header_tuple)
return info
|
tds7_process_result
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.log_response_message('got COLMETADATA')\n r = self._reader\n num_cols = r.get_smallint()\n if num_cols == -1:\n return\n self.param_info = None\n self.has_status = False\n self.ret_status = None\n self.skipped_to_status = False\n self.rows_affected = tds_base.TDS_NO_COUNT\n self.more_rows = True\n self.row = [None] * num_cols\n self.res_info = info = _Results()\n header_tuple = []\n for col in range(num_cols):\n curcol = tds_base.Column()\n info.columns.append(curcol)\n self.get_type_info(curcol)\n curcol.column_name = r.read_ucs2(r.get_byte())\n precision = curcol.serializer.precision\n scale = curcol.serializer.scale\n size = curcol.serializer.size\n header_tuple.append((curcol.column_name, curcol.serializer.\n get_typeid(), None, size, precision, scale, curcol.flags &\n tds_base.Column.fNullable))\n info.description = tuple(header_tuple)\n return info\n",
"role": "user"
},
{
"content": "tds7_process_result",
"role": "assistant"
}
] |
def x(self):
self.log_response_message('got RETURNVALUE message')
r = self._reader
if tds_base.IS_TDS72_PLUS(self):
ordinal = r.get_usmallint()
else:
r.get_usmallint()
ordinal = self._out_params_indexes[self.return_value_index]
name = r.read_ucs2(r.get_byte())
r.get_byte()
param = tds_base.Column()
param.column_name = name
self.get_type_info(param)
param.value = param.serializer.read(r)
self.output_params[ordinal] = param
self.return_value_index += 1
|
process_param
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.log_response_message('got RETURNVALUE message')\n r = self._reader\n if tds_base.IS_TDS72_PLUS(self):\n ordinal = r.get_usmallint()\n else:\n r.get_usmallint()\n ordinal = self._out_params_indexes[self.return_value_index]\n name = r.read_ucs2(r.get_byte())\n r.get_byte()\n param = tds_base.Column()\n param.column_name = name\n self.get_type_info(param)\n param.value = param.serializer.read(r)\n self.output_params[ordinal] = param\n self.return_value_index += 1\n",
"role": "user"
},
{
"content": "process_param",
"role": "assistant"
}
] |
def x(self):
self.log_response_message('got CANCEL message')
if not self.in_cancel:
return
while True:
token_id = self.get_token_id()
self.process_token(token_id)
if not self.in_cancel:
return
|
process_cancel
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.log_response_message('got CANCEL message')\n if not self.in_cancel:\n return\n while True:\n token_id = self.get_token_id()\n self.process_token(token_id)\n if not self.in_cancel:\n return\n",
"role": "user"
},
{
"content": "process_cancel",
"role": "assistant"
}
] |
def x(self, marker):
self.log_response_message('got ERROR/INFO message')
r = self._reader
r.get_smallint()
msg = {'marker': marker, 'msgno': r.get_int(), 'state': r.get_byte(),
'severity': r.get_byte(), 'sql_state': None}
if marker == tds_base.TDS_INFO_TOKEN:
msg['priv_msg_type'] = 0
elif marker == tds_base.TDS_ERROR_TOKEN:
msg['priv_msg_type'] = 1
else:
logger.error('tds_process_msg() called with unknown marker "{0}"'.
format(marker))
msg['message'] = r.read_ucs2(r.get_smallint())
msg['server'] = r.read_ucs2(r.get_byte())
msg['proc_name'] = r.read_ucs2(r.get_byte())
msg['line_number'] = r.get_int() if tds_base.IS_TDS72_PLUS(self
) else r.get_smallint()
self.messages.append(msg)
|
process_msg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, marker):\n self.log_response_message('got ERROR/INFO message')\n r = self._reader\n r.get_smallint()\n msg = {'marker': marker, 'msgno': r.get_int(), 'state': r.get_byte(),\n 'severity': r.get_byte(), 'sql_state': None}\n if marker == tds_base.TDS_INFO_TOKEN:\n msg['priv_msg_type'] = 0\n elif marker == tds_base.TDS_ERROR_TOKEN:\n msg['priv_msg_type'] = 1\n else:\n logger.error('tds_process_msg() called with unknown marker \"{0}\"'.\n format(marker))\n msg['message'] = r.read_ucs2(r.get_smallint())\n msg['server'] = r.read_ucs2(r.get_byte())\n msg['proc_name'] = r.read_ucs2(r.get_byte())\n msg['line_number'] = r.get_int() if tds_base.IS_TDS72_PLUS(self\n ) else r.get_smallint()\n self.messages.append(msg)\n",
"role": "user"
},
{
"content": "process_msg",
"role": "assistant"
}
] |
def x(self):
self.log_response_message('got ROW message')
r = self._reader
info = self.res_info
info.row_count += 1
for i, curcol in enumerate(info.columns):
curcol.value = self.row[i] = curcol.serializer.read(r)
|
process_row
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.log_response_message('got ROW message')\n r = self._reader\n info = self.res_info\n info.row_count += 1\n for i, curcol in enumerate(info.columns):\n curcol.value = self.row[i] = curcol.serializer.read(r)\n",
"role": "user"
},
{
"content": "process_row",
"role": "assistant"
}
] |
def x(self):
self.log_response_message('got NBCROW message')
r = self._reader
info = self.res_info
if not info:
self.bad_stream('got row without info')
assert len(info.columns) > 0
info.row_count += 1
nbc = readall(r, (len(info.columns) + 7) // 8)
for i, curcol in enumerate(info.columns):
if tds_base.my_ord(nbc[i // 8]) & 1 << i % 8:
value = None
else:
value = curcol.serializer.read(r)
self.row[i] = value
|
process_nbcrow
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.log_response_message('got NBCROW message')\n r = self._reader\n info = self.res_info\n if not info:\n self.bad_stream('got row without info')\n assert len(info.columns) > 0\n info.row_count += 1\n nbc = readall(r, (len(info.columns) + 7) // 8)\n for i, curcol in enumerate(info.columns):\n if tds_base.my_ord(nbc[i // 8]) & 1 << i % 8:\n value = None\n else:\n value = curcol.serializer.read(r)\n self.row[i] = value\n",
"role": "user"
},
{
"content": "process_nbcrow",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.