source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(name, query, config, context=None):
endpoint = config.get('replay_endpoints', {}).get(name, None)
if not endpoint:
raise IOError('No appropriate replay endpoint found for {0}'.format
(name))
if not context:
context = zmq.Context(config['io_threads'])
socket = context.socket(zmq.REQ)
try:
socket.connect(endpoint)
except zmq.ZMQError as e:
raise IOError("Error when connecting to the replay endpoint: '{0}'"
.format(str(e)))
socket.send(fedmsg.encoding.dumps(query).encode('utf-8'))
msgs = socket.recv_multipart()
socket.close()
for m in msgs:
try:
yield fedmsg.encoding.loads(m.decode('utf-8'))
except ValueError:
raise ValueError(m)
|
get_replay
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(name, query, config, context=None):\n endpoint = config.get('replay_endpoints', {}).get(name, None)\n if not endpoint:\n raise IOError('No appropriate replay endpoint found for {0}'.format\n (name))\n if not context:\n context = zmq.Context(config['io_threads'])\n socket = context.socket(zmq.REQ)\n try:\n socket.connect(endpoint)\n except zmq.ZMQError as e:\n raise IOError(\"Error when connecting to the replay endpoint: '{0}'\"\n .format(str(e)))\n socket.send(fedmsg.encoding.dumps(query).encode('utf-8'))\n msgs = socket.recv_multipart()\n socket.close()\n for m in msgs:\n try:\n yield fedmsg.encoding.loads(m.decode('utf-8'))\n except ValueError:\n raise ValueError(m)\n",
"role": "user"
},
{
"content": "get_replay",
"role": "assistant"
}
] |
def x(name, names_to_seq_id, msg, config, context=None):
prev_seq_id = names_to_seq_id.get(name, None)
cur_seq_id = msg.get('seq_id', None)
if prev_seq_id is None or cur_seq_id is None:
return [msg]
if cur_seq_id <= prev_seq_id:
return []
if cur_seq_id == prev_seq_id + 1 or prev_seq_id < 0:
ret = [msg]
else:
ret = list(get_replay(name, {'seq_id_range': (prev_seq_id,
cur_seq_id)}, config, context))
if len(ret) == 0 or ret[-1]['seq_id'] < msg['seq_id']:
ret.append(msg)
names_to_seq_id[name] = cur_seq_id
return ret
|
check_for_replay
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(name, names_to_seq_id, msg, config, context=None):\n prev_seq_id = names_to_seq_id.get(name, None)\n cur_seq_id = msg.get('seq_id', None)\n if prev_seq_id is None or cur_seq_id is None:\n return [msg]\n if cur_seq_id <= prev_seq_id:\n return []\n if cur_seq_id == prev_seq_id + 1 or prev_seq_id < 0:\n ret = [msg]\n else:\n ret = list(get_replay(name, {'seq_id_range': (prev_seq_id,\n cur_seq_id)}, config, context))\n if len(ret) == 0 or ret[-1]['seq_id'] < msg['seq_id']:\n ret.append(msg)\n names_to_seq_id[name] = cur_seq_id\n return ret\n",
"role": "user"
},
{
"content": "check_for_replay",
"role": "assistant"
}
] |
def x(message):
if not ('source_name' in message and 'source_version' in message):
return message
message = message.copy()
del message['source_name']
del message['source_version']
if 'headers' in message and not message['headers']:
del message['headers']
if 'timestamp' in message:
message['timestamp'] = int(message['timestamp'])
return message
|
fix_datagrepper_message
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(message):\n if not ('source_name' in message and 'source_version' in message):\n return message\n message = message.copy()\n del message['source_name']\n del message['source_version']\n if 'headers' in message and not message['headers']:\n del message['headers']\n if 'timestamp' in message:\n message['timestamp'] = int(message['timestamp'])\n return message\n",
"role": "user"
},
{
"content": "fix_datagrepper_message",
"role": "assistant"
}
] |
def x(topic, signer, routing_policy, nitpicky=False):
if topic in routing_policy:
if signer in routing_policy[topic]:
return True
else:
_log.error(
'Authorization/routing_policy error. Topic %r. Signer %r.' %
(topic, signer))
return False
elif nitpicky:
_log.error('Authorization/routing_policy underspecified.')
return False
else:
_log.warning(
'No routing policy defined for "{t}" but routing_nitpicky is False so the message is being treated as authorized.'
.format(t=topic))
return True
|
validate_policy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(topic, signer, routing_policy, nitpicky=False):\n if topic in routing_policy:\n if signer in routing_policy[topic]:\n return True\n else:\n _log.error(\n 'Authorization/routing_policy error. Topic %r. Signer %r.' %\n (topic, signer))\n return False\n elif nitpicky:\n _log.error('Authorization/routing_policy underspecified.')\n return False\n else:\n _log.warning(\n 'No routing policy defined for \"{t}\" but routing_nitpicky is False so the message is being treated as authorized.'\n .format(t=topic))\n return True\n",
"role": "user"
},
{
"content": "validate_policy",
"role": "assistant"
}
] |
def x(ca_location, crl_location=None, invalidate_cache=False):
if crl_location is None:
crl_location = ''
try:
if invalidate_cache:
del _cached_certificates[ca_location + crl_location]
else:
return _cached_certificates[ca_location + crl_location]
except KeyError:
pass
ca, crl = None, None
if ca_location:
ca = _load_certificate(ca_location)
if crl_location:
crl = _load_certificate(crl_location)
_cached_certificates[ca_location + crl_location] = ca, crl
return ca, crl
|
load_certificates
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ca_location, crl_location=None, invalidate_cache=False):\n if crl_location is None:\n crl_location = ''\n try:\n if invalidate_cache:\n del _cached_certificates[ca_location + crl_location]\n else:\n return _cached_certificates[ca_location + crl_location]\n except KeyError:\n pass\n ca, crl = None, None\n if ca_location:\n ca = _load_certificate(ca_location)\n if crl_location:\n crl = _load_certificate(crl_location)\n _cached_certificates[ca_location + crl_location] = ca, crl\n return ca, crl\n",
"role": "user"
},
{
"content": "load_certificates",
"role": "assistant"
}
] |
def x(location):
if location.startswith('https://'):
_log.info('Downloading x509 certificate from %s', location)
with requests.Session() as session:
session.mount('https://', requests.adapters.HTTPAdapter(
max_retries=3))
response = session.get(location, timeout=30)
response.raise_for_status()
return response.text
else:
_log.info('Loading local x509 certificate from %s', location)
with open(location, 'rb') as fd:
return fd.read().decode('ascii')
|
load_certificate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(location):\n if location.startswith('https://'):\n _log.info('Downloading x509 certificate from %s', location)\n with requests.Session() as session:\n session.mount('https://', requests.adapters.HTTPAdapter(\n max_retries=3))\n response = session.get(location, timeout=30)\n response.raise_for_status()\n return response.text\n else:\n _log.info('Loading local x509 certificate from %s', location)\n with open(location, 'rb') as fd:\n return fd.read().decode('ascii')\n",
"role": "user"
},
{
"content": "load_certificate",
"role": "assistant"
}
] |
def x():
config_paths = []
if os.environ.get('FEDMSG_CONFIG'):
config_location = os.environ['FEDMSG_CONFIG']
else:
config_location = '/etc/fedmsg.d'
if os.path.isfile(config_location):
config_paths.append(config_location)
elif os.path.isdir(config_location):
possible_config_files = [os.path.join(config_location, p) for p in
os.listdir(config_location) if p.endswith('.py')]
for p in possible_config_files:
if os.path.isfile(p):
config_paths.append(p)
if not config_paths:
_log.info('No configuration files found in %s', config_location)
return config_paths
|
get_config_files
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n config_paths = []\n if os.environ.get('FEDMSG_CONFIG'):\n config_location = os.environ['FEDMSG_CONFIG']\n else:\n config_location = '/etc/fedmsg.d'\n if os.path.isfile(config_location):\n config_paths.append(config_location)\n elif os.path.isdir(config_location):\n possible_config_files = [os.path.join(config_location, p) for p in\n os.listdir(config_location) if p.endswith('.py')]\n for p in possible_config_files:\n if os.path.isfile(p):\n config_paths.append(p)\n if not config_paths:\n _log.info('No configuration files found in %s', config_location)\n return config_paths\n",
"role": "user"
},
{
"content": "get_config_files",
"role": "assistant"
}
] |
def x(t):
def x(setting):
if setting is not None and not isinstance(setting, t):
raise ValueError('"{}" is not "{}"'.format(setting, t))
return setting
return _validate
|
validate_none_or_type
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(t):\n\n def x(setting):\n if setting is not None and not isinstance(setting, t):\n raise ValueError('\"{}\" is not \"{}\"'.format(setting, t))\n return setting\n return _validate\n",
"role": "user"
},
{
"content": "validate_none_or_type",
"role": "assistant"
}
] |
def x(value):
if isinstance(value, six.text_type):
if value.strip().lower() == 'true':
value = True
elif value.strip().lower() == 'false':
value = False
else:
raise ValueError('"{}" must be a boolean ("True" or "False")'.
format(value))
if not isinstance(value, bool):
raise ValueError('"{}" is not a boolean value.'.format(value))
return value
|
validate_bool
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(value):\n if isinstance(value, six.text_type):\n if value.strip().lower() == 'true':\n value = True\n elif value.strip().lower() == 'false':\n value = False\n else:\n raise ValueError('\"{}\" must be a boolean (\"True\" or \"False\")'.\n format(value))\n if not isinstance(value, bool):\n raise ValueError('\"{}\" is not a boolean value.'.format(value))\n return value\n",
"role": "user"
},
{
"content": "validate_bool",
"role": "assistant"
}
] |
def x(extra_args=None, doc=None, filenames=None, invalidate_cache=False,
fedmsg_command=False, disable_defaults=False):
warnings.warn(
'Using "load_config" is deprecated and will be removed in a future release; use the "fedmsg.config.conf" dictionary instead.'
, DeprecationWarning)
global __cache
if invalidate_cache:
__cache = {}
if __cache:
return __cache
extra_args = extra_args or []
doc = doc or ''
if not disable_defaults:
config = copy.deepcopy(defaults)
else:
config = {}
config.update(_process_config_file(filenames=filenames))
if fedmsg_command:
config.update(_process_arguments(extra_args, doc, config))
if not filenames and config.get('config_filename', None):
return load_config(extra_args, doc, filenames=[config[
'config_filename']], fedmsg_command=fedmsg_command,
disable_defaults=disable_defaults)
if config.get('print_config'):
print(pretty_dumps(config))
sys.exit(0)
if not disable_defaults and 'endpoints' not in config:
raise ValueError("No config value 'endpoints' found.")
if not isinstance(config.get('endpoints', {}), dict):
raise ValueError("The 'endpoints' config value must be a dict.")
if 'endpoints' in config:
config['endpoints'] = dict([(k, list(iterate(v))) for k, v in
config['endpoints'].items()])
if 'srv_endpoints' in config and len(config['srv_endpoints']) > 0:
from dns.resolver import query, NXDOMAIN, Timeout, NoNameservers
for e in config['srv_endpoints']:
urls = []
try:
records = query('_fedmsg._tcp.{0}'.format(e), 'SRV')
except NXDOMAIN:
warnings.warn('There is no appropriate SRV records ' +
'for {0}'.format(e))
continue
except Timeout:
warnings.warn('The DNS query for the SRV records of' +
' {0} timed out.'.format(e))
continue
except NoNameservers:
warnings.warn('No name server is available, please ' +
'check the configuration')
break
for rec in records:
urls.append('tcp://{hostname}:{port}'.format(hostname=rec.
target.to_text(), port=rec.port))
config['endpoints'][e] = list(iterate(urls))
if 'topic_prefix_re' not in config and 'topic_prefix' in config:
config['topic_prefix_re'] = config['topic_prefix'].replace('.', '\\.'
) + '\\.[^\\W\\d_]+'
__cache = config
return config
|
load_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(extra_args=None, doc=None, filenames=None, invalidate_cache=False,\n fedmsg_command=False, disable_defaults=False):\n warnings.warn(\n 'Using \"load_config\" is deprecated and will be removed in a future release; use the \"fedmsg.config.conf\" dictionary instead.'\n , DeprecationWarning)\n global __cache\n if invalidate_cache:\n __cache = {}\n if __cache:\n return __cache\n extra_args = extra_args or []\n doc = doc or ''\n if not disable_defaults:\n config = copy.deepcopy(defaults)\n else:\n config = {}\n config.update(_process_config_file(filenames=filenames))\n if fedmsg_command:\n config.update(_process_arguments(extra_args, doc, config))\n if not filenames and config.get('config_filename', None):\n return load_config(extra_args, doc, filenames=[config[\n 'config_filename']], fedmsg_command=fedmsg_command,\n disable_defaults=disable_defaults)\n if config.get('print_config'):\n print(pretty_dumps(config))\n sys.exit(0)\n if not disable_defaults and 'endpoints' not in config:\n raise ValueError(\"No config value 'endpoints' found.\")\n if not isinstance(config.get('endpoints', {}), dict):\n raise ValueError(\"The 'endpoints' config value must be a dict.\")\n if 'endpoints' in config:\n config['endpoints'] = dict([(k, list(iterate(v))) for k, v in\n config['endpoints'].items()])\n if 'srv_endpoints' in config and len(config['srv_endpoints']) > 0:\n from dns.resolver import query, NXDOMAIN, Timeout, NoNameservers\n for e in config['srv_endpoints']:\n urls = []\n try:\n records = query('_fedmsg._tcp.{0}'.format(e), 'SRV')\n except NXDOMAIN:\n warnings.warn('There is no appropriate SRV records ' +\n 'for {0}'.format(e))\n continue\n except Timeout:\n warnings.warn('The DNS query for the SRV records of' +\n ' {0} timed out.'.format(e))\n continue\n except NoNameservers:\n warnings.warn('No name server is available, please ' +\n 'check the configuration')\n break\n for rec in records:\n urls.append('tcp://{hostname}:{port}'.format(hostname=rec.\n target.to_text(), port=rec.port))\n config['endpoints'][e] = list(iterate(urls))\n if 'topic_prefix_re' not in config and 'topic_prefix' in config:\n config['topic_prefix_re'] = config['topic_prefix'].replace('.', '\\\\.'\n ) + '\\\\.[^\\\\W\\\\d_]+'\n __cache = config\n return config\n",
"role": "user"
},
{
"content": "load_config",
"role": "assistant"
}
] |
def x(declared_args, doc, config=None, prog=None):
config = config or copy.deepcopy(defaults)
prog = prog or sys.argv[0]
parser = argparse.ArgumentParser(description=textwrap.dedent(doc),
formatter_class=argparse.RawDescriptionHelpFormatter, prog=prog)
parser.add_argument('--io-threads', dest='io_threads', type=int, help=
'Number of io threads for 0mq to use', default=config['io_threads'])
parser.add_argument('--topic-prefix', dest='topic_prefix', type=str,
help='Prefix for the topic of each message sent.', default=config[
'topic_prefix'])
parser.add_argument('--post-init-sleep', dest='post_init_sleep', type=
float, help='Number of seconds to sleep after initializing.',
default=config['post_init_sleep'])
parser.add_argument('--config-filename', dest='config_filename', help=
'Config file to use.', default=None)
parser.add_argument('--print-config', dest='print_config', help=
'Simply print out the configuration and exit. No action taken.',
default=False, action='store_true')
parser.add_argument('--timeout', dest='timeout', help=
'Timeout in seconds for any blocking zmq operations.', type=float,
default=config['timeout'])
parser.add_argument('--high-water-mark', dest='high_water_mark', help=
'Limit on the number of messages in the queue before blocking.',
type=int, default=config['high_water_mark'])
parser.add_argument('--linger', dest='zmq_linger', help=
'Number of milliseconds to wait before timing out connections.',
type=int, default=config['zmq_linger'])
for args, kwargs in declared_args:
if all([(k in kwargs) for k in ['dest', 'default']]):
kwargs['default'] = config.get(kwargs['dest'], kwargs['default'])
parser.add_argument(*args, **kwargs)
return parser
|
build_parser
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(declared_args, doc, config=None, prog=None):\n config = config or copy.deepcopy(defaults)\n prog = prog or sys.argv[0]\n parser = argparse.ArgumentParser(description=textwrap.dedent(doc),\n formatter_class=argparse.RawDescriptionHelpFormatter, prog=prog)\n parser.add_argument('--io-threads', dest='io_threads', type=int, help=\n 'Number of io threads for 0mq to use', default=config['io_threads'])\n parser.add_argument('--topic-prefix', dest='topic_prefix', type=str,\n help='Prefix for the topic of each message sent.', default=config[\n 'topic_prefix'])\n parser.add_argument('--post-init-sleep', dest='post_init_sleep', type=\n float, help='Number of seconds to sleep after initializing.',\n default=config['post_init_sleep'])\n parser.add_argument('--config-filename', dest='config_filename', help=\n 'Config file to use.', default=None)\n parser.add_argument('--print-config', dest='print_config', help=\n 'Simply print out the configuration and exit. No action taken.',\n default=False, action='store_true')\n parser.add_argument('--timeout', dest='timeout', help=\n 'Timeout in seconds for any blocking zmq operations.', type=float,\n default=config['timeout'])\n parser.add_argument('--high-water-mark', dest='high_water_mark', help=\n 'Limit on the number of messages in the queue before blocking.',\n type=int, default=config['high_water_mark'])\n parser.add_argument('--linger', dest='zmq_linger', help=\n 'Number of milliseconds to wait before timing out connections.',\n type=int, default=config['zmq_linger'])\n for args, kwargs in declared_args:\n if all([(k in kwargs) for k in ['dest', 'default']]):\n kwargs['default'] = config.get(kwargs['dest'], kwargs['default'])\n parser.add_argument(*args, **kwargs)\n return parser\n",
"role": "user"
},
{
"content": "build_parser",
"role": "assistant"
}
] |
def x(directory):
try:
return sorted([os.path.join(directory, fname) for fname in os.
listdir(directory) if fname.endswith('.py')])
except OSError:
return []
|
gather_configs_in
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(directory):\n try:\n return sorted([os.path.join(directory, fname) for fname in os.\n listdir(directory) if fname.endswith('.py')])\n except OSError:\n return []\n",
"role": "user"
},
{
"content": "gather_configs_in",
"role": "assistant"
}
] |
def x(d1, d2):
for k in set(d1).intersection(d2):
if isinstance(d1[k], dict) and isinstance(d2[k], dict):
d1[k] = _recursive_update(d1[k], d2[k])
else:
d1[k] = d2[k]
for k in set(d2).difference(d1):
d1[k] = d2[k]
return d1
|
recursive_update
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(d1, d2):\n for k in set(d1).intersection(d2):\n if isinstance(d1[k], dict) and isinstance(d2[k], dict):\n d1[k] = _recursive_update(d1[k], d2[k])\n else:\n d1[k] = d2[k]\n for k in set(d2).difference(d1):\n d1[k] = d2[k]\n return d1\n",
"role": "user"
},
{
"content": "recursive_update",
"role": "assistant"
}
] |
def x(fname, variables):
with open(fname) as f:
code = compile(f.read(), fname, 'exec')
exec(code, variables)
|
execfile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(fname, variables):\n with open(fname) as f:\n code = compile(f.read(), fname, 'exec')\n exec(code, variables)\n",
"role": "user"
},
{
"content": "execfile",
"role": "assistant"
}
] |
def x(self, *args, **kw):
if not self._loaded:
self.load_config()
return super(FedmsgConfig, self).get(*args, **kw)
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *args, **kw):\n if not self._loaded:\n self.load_config()\n return super(FedmsgConfig, self).get(*args, **kw)\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, *args, **kw):
if not self._loaded:
self.load_config()
return super(FedmsgConfig, self).copy(*args, **kw)
|
copy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *args, **kw):\n if not self._loaded:\n self.load_config()\n return super(FedmsgConfig, self).copy(*args, **kw)\n",
"role": "user"
},
{
"content": "copy",
"role": "assistant"
}
] |
def x(self, settings=None):
self._load_defaults()
if settings:
self.update(settings)
else:
config_paths = _get_config_files()
for p in config_paths:
conf = _process_config_file([p])
self.update(conf)
self._loaded = True
self._validate()
|
load_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, settings=None):\n self._load_defaults()\n if settings:\n self.update(settings)\n else:\n config_paths = _get_config_files()\n for p in config_paths:\n conf = _process_config_file([p])\n self.update(conf)\n self._loaded = True\n self._validate()\n",
"role": "user"
},
{
"content": "load_config",
"role": "assistant"
}
] |
def x(self):
for k, v in self._defaults.items():
self[k] = v['default']
|
load_defaults
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for k, v in self._defaults.items():\n self[k] = v['default']\n",
"role": "user"
},
{
"content": "load_defaults",
"role": "assistant"
}
] |
def x(self):
errors = []
for k in self._defaults.keys():
try:
validator = self._defaults[k]['validator']
if validator is not None:
self[k] = validator(self[k])
except ValueError as e:
errors.append('\t{}: {}'.format(k, six.text_type(e)))
if errors:
raise ValueError('Invalid configuration values were set: \n{}'.
format('\n'.join(errors)))
|
validate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n errors = []\n for k in self._defaults.keys():\n try:\n validator = self._defaults[k]['validator']\n if validator is not None:\n self[k] = validator(self[k])\n except ValueError as e:\n errors.append('\\t{}: {}'.format(k, six.text_type(e)))\n if errors:\n raise ValueError('Invalid configuration values were set: \\n{}'.\n format('\\n'.join(errors)))\n",
"role": "user"
},
{
"content": "validate",
"role": "assistant"
}
] |
def x(**config):
global processors
if processors:
return
import pkg_resources
processors = []
for processor in pkg_resources.iter_entry_points('fedmsg.meta'):
try:
processors.append(processor.load()(_, **config))
except Exception as e:
log.warn('Failed to load %r processor.' % processor.name)
log.exception(e)
processors.append(DefaultProcessor(_, **config))
if len(processors) == 3:
log.warn('No fedmsg.meta plugins found. fedmsg.meta.msg2* crippled')
|
make_processors
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(**config):\n global processors\n if processors:\n return\n import pkg_resources\n processors = []\n for processor in pkg_resources.iter_entry_points('fedmsg.meta'):\n try:\n processors.append(processor.load()(_, **config))\n except Exception as e:\n log.warn('Failed to load %r processor.' % processor.name)\n log.exception(e)\n processors.append(DefaultProcessor(_, **config))\n if len(processors) == 3:\n log.warn('No fedmsg.meta plugins found. fedmsg.meta.msg2* crippled')\n",
"role": "user"
},
{
"content": "make_processors",
"role": "assistant"
}
] |
def x(msg, **config):
for processor in processors:
if processor.handle_msg(msg, **config) is not None:
return processor
else:
return processors[-1]
|
msg2processor
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, **config):\n for processor in processors:\n if processor.handle_msg(msg, **config) is not None:\n return processor\n else:\n return processors[-1]\n",
"role": "user"
},
{
"content": "msg2processor",
"role": "assistant"
}
] |
def x(cls):
def x(f):
@functools.wraps(f)
def x(msg, **config):
try:
return f(msg, **config)
except KeyError:
log.exception('%r failed on %r' % (f, msg.get('msg_id')))
return cls()
return __wrapper
return _wrapper
|
graceful
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls):\n\n def x(f):\n\n @functools.wraps(f)\n def x(msg, **config):\n try:\n return f(msg, **config)\n except KeyError:\n log.exception('%r failed on %r' % (f, msg.get('msg_id')))\n return cls()\n return __wrapper\n return _wrapper\n",
"role": "user"
},
{
"content": "graceful",
"role": "assistant"
}
] |
def x(messages, subject=None, lexers=False, **config):
for processor in processors:
messages = processor.conglomerate(messages, subject=subject, **config)
for i, message in enumerate(messages):
if 'msg_ids' in message:
continue
messages[i] = BaseConglomerator.produce_template([message], subject
=subject, lexers=lexers, **config)
messages[i].update({'link': msg2link(message, **config), 'subtitle':
msg2subtitle(message, **config), 'subjective': msg2subjective(
message, subject=subject, **config), 'secondary_icon':
msg2secondary_icon(message, **config)})
return messages
|
conglomerate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(messages, subject=None, lexers=False, **config):\n for processor in processors:\n messages = processor.conglomerate(messages, subject=subject, **config)\n for i, message in enumerate(messages):\n if 'msg_ids' in message:\n continue\n messages[i] = BaseConglomerator.produce_template([message], subject\n =subject, lexers=lexers, **config)\n messages[i].update({'link': msg2link(message, **config), 'subtitle':\n msg2subtitle(message, **config), 'subjective': msg2subjective(\n message, subject=subject, **config), 'secondary_icon':\n msg2secondary_icon(message, **config)})\n return messages\n",
"role": "user"
},
{
"content": "conglomerate",
"role": "assistant"
}
] |
def x(msg, processor, **config):
fmt = u'{title} -- {subtitle} {link}'
title = msg2title(msg, **config)
subtitle = processor.subtitle(msg, **config)
link = processor.link(msg, **config) or ''
return fmt.format(**locals())
|
msg2repr
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, processor, **config):\n fmt = u'{title} -- {subtitle} {link}'\n title = msg2title(msg, **config)\n subtitle = processor.subtitle(msg, **config)\n link = processor.link(msg, **config) or ''\n return fmt.format(**locals())\n",
"role": "user"
},
{
"content": "msg2repr",
"role": "assistant"
}
] |
def x(msg, processor, **config):
result = processor.long_form(msg, **config)
if not result:
result = processor.subtitle(msg, **config)
return result
|
msg2long_form
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, processor, **config):\n result = processor.long_form(msg, **config)\n if not result:\n result = processor.subtitle(msg, **config)\n return result\n",
"role": "user"
},
{
"content": "msg2long_form",
"role": "assistant"
}
] |
def x(msg, processor=None, legacy=False, **config):
return processor.usernames(msg, **config)
|
msg2usernames
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, processor=None, legacy=False, **config):\n return processor.usernames(msg, **config)\n",
"role": "user"
},
{
"content": "msg2usernames",
"role": "assistant"
}
] |
def x(msg, processor=None, legacy=False, **config):
if processor.agent is not NotImplemented:
return processor.agent(msg, **config)
else:
usernames = processor.usernames(msg, **config)
if usernames:
return usernames.pop()
return None
|
msg2agent
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, processor=None, legacy=False, **config):\n if processor.agent is not NotImplemented:\n return processor.agent(msg, **config)\n else:\n usernames = processor.usernames(msg, **config)\n if usernames:\n return usernames.pop()\n return None\n",
"role": "user"
},
{
"content": "msg2agent",
"role": "assistant"
}
] |
def x(msg, processor, subject, **config):
text = processor.subjective(msg, subject, **config)
if not text:
text = processor.subtitle(msg, **config)
return text
|
msg2subjective
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, processor, subject, **config):\n text = processor.subjective(msg, subject, **config)\n if not text:\n text = processor.subtitle(msg, **config)\n return text\n",
"role": "user"
},
{
"content": "msg2subjective",
"role": "assistant"
}
] |
def x(self, command, message):
proc = subprocess.Popen(["echo '%s' | %s" % (fedmsg.encoding.dumps(
message), command)], shell=True, executable='/bin/bash')
return proc.wait()
|
run_command
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, command, message):\n proc = subprocess.Popen([\"echo '%s' | %s\" % (fedmsg.encoding.dumps(\n message), command)], shell=True, executable='/bin/bash')\n return proc.wait()\n",
"role": "user"
},
{
"content": "run_command",
"role": "assistant"
}
] |
def x(message, ssldir=None, certname=None, **config):
if ssldir is None or certname is None:
error = 'You must set the ssldir and certname keyword arguments.'
raise ValueError(error)
message['crypto'] = 'x509'
certificate = M2Crypto.X509.load_cert('%s/%s.crt' % (ssldir, certname)
).as_pem()
rsa_private = M2Crypto.RSA.load_key('%s/%s.key' % (ssldir, certname))
digest = M2Crypto.EVP.MessageDigest('sha1')
digest.update(fedmsg.encoding.dumps(message))
signature = rsa_private.sign(digest.digest())
return dict(message.items() + [('signature', signature.encode('base64')
.decode('ascii')), ('certificate', certificate.encode('base64').
decode('ascii'))])
|
m2crypto_sign
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(message, ssldir=None, certname=None, **config):\n if ssldir is None or certname is None:\n error = 'You must set the ssldir and certname keyword arguments.'\n raise ValueError(error)\n message['crypto'] = 'x509'\n certificate = M2Crypto.X509.load_cert('%s/%s.crt' % (ssldir, certname)\n ).as_pem()\n rsa_private = M2Crypto.RSA.load_key('%s/%s.key' % (ssldir, certname))\n digest = M2Crypto.EVP.MessageDigest('sha1')\n digest.update(fedmsg.encoding.dumps(message))\n signature = rsa_private.sign(digest.digest())\n return dict(message.items() + [('signature', signature.encode('base64')\n .decode('ascii')), ('certificate', certificate.encode('base64').\n decode('ascii'))])\n",
"role": "user"
},
{
"content": "m2crypto_sign",
"role": "assistant"
}
] |
def x(message, ssldir=None, **config):
if ssldir is None:
raise ValueError('You must set the ssldir keyword argument.')
def x(reason):
_log.warn('Failed validation. %s' % reason)
return False
for field in ['signature', 'certificate']:
if field not in message:
return fail('No %r field found.' % field)
if not isinstance(message[field], six.text_type):
_log.error('msg[%r] is not a unicode string' % field)
try:
message[field] = message[field].decode('utf-8')
except UnicodeError as e:
_log.error("Unable to decode the message '%s' field: %s",
field, str(e))
return False
signature = message['signature'].decode('base64')
certificate = message['certificate'].decode('base64')
message = fedmsg.crypto.strip_credentials(message)
cert = M2Crypto.X509.load_cert_string(certificate)
ca_location = config.get('ca_cert_location',
'https://fedoraproject.org/fedmsg/ca.crt')
crl_location = config.get('crl_location',
'https://fedoraproject.org/fedmsg/crl.pem')
fd, cafile = tempfile.mkstemp()
try:
ca_certificate, crl = utils.load_certificates(ca_location, crl_location
)
os.write(fd, ca_certificate.encode('ascii'))
os.fsync(fd)
ctx = m2ext.SSL.Context()
ctx.load_verify_locations(cafile=cafile)
if not ctx.validate_certificate(cert):
ca_certificate, crl = utils.load_certificates(ca_location,
crl_location, invalidate_cache=True)
with open(cafile, 'w') as f:
f.write(ca_certificate)
ctx = m2ext.SSL.Context()
ctx.load_verify_locations(cafile=cafile)
if not ctx.validate_certificate(cert):
return fail('X509 certificate is not valid.')
except (IOError, RequestException) as e:
_log.error(str(e))
return False
finally:
os.close(fd)
os.remove(cafile)
if crl:
try:
fd, crlfile = tempfile.mkstemp(text=True)
os.write(fd, crl.encode('ascii'))
os.fsync(fd)
crl = M2Crypto.X509.load_crl(crlfile)
finally:
os.close(fd)
os.remove(crlfile)
revoked_serials = [long(line.split(': ')[1].strip(), base=16) for
line in crl.as_text().split('\n') if 'Serial Number:' in line]
if cert.get_serial_number() in revoked_serials:
subject = cert.get_subject()
signer = '(no CN)'
if subject.nid.get('CN'):
entry = subject.get_entries_by_nid(subject.nid['CN'])[0]
if entry:
signer = entry.get_data().as_text()
return fail('X509 cert %r, %r is in the Revocation List (CRL)' %
(signer, cert.get_serial_number()))
rsa_public = cert.get_pubkey().get_rsa()
digest = M2Crypto.EVP.MessageDigest('sha1')
digest.update(fedmsg.encoding.dumps(message))
try:
if not rsa_public.verify(digest.digest(), signature):
raise M2Crypto.RSA.RSAError('RSA signature failed to validate.')
except M2Crypto.RSA.RSAError as e:
return fail(str(e))
routing_policy = config.get('routing_policy', {})
subject = cert.get_subject()
signer = subject.get_entries_by_nid(subject.nid['CN'])[0].get_data(
).as_text()
return utils.validate_policy(message.get('topic'), signer,
routing_policy, config.get('routing_nitpicky', False))
|
m2crypto_validate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(message, ssldir=None, **config):\n if ssldir is None:\n raise ValueError('You must set the ssldir keyword argument.')\n\n def x(reason):\n _log.warn('Failed validation. %s' % reason)\n return False\n for field in ['signature', 'certificate']:\n if field not in message:\n return fail('No %r field found.' % field)\n if not isinstance(message[field], six.text_type):\n _log.error('msg[%r] is not a unicode string' % field)\n try:\n message[field] = message[field].decode('utf-8')\n except UnicodeError as e:\n _log.error(\"Unable to decode the message '%s' field: %s\",\n field, str(e))\n return False\n signature = message['signature'].decode('base64')\n certificate = message['certificate'].decode('base64')\n message = fedmsg.crypto.strip_credentials(message)\n cert = M2Crypto.X509.load_cert_string(certificate)\n ca_location = config.get('ca_cert_location',\n 'https://fedoraproject.org/fedmsg/ca.crt')\n crl_location = config.get('crl_location',\n 'https://fedoraproject.org/fedmsg/crl.pem')\n fd, cafile = tempfile.mkstemp()\n try:\n ca_certificate, crl = utils.load_certificates(ca_location, crl_location\n )\n os.write(fd, ca_certificate.encode('ascii'))\n os.fsync(fd)\n ctx = m2ext.SSL.Context()\n ctx.load_verify_locations(cafile=cafile)\n if not ctx.validate_certificate(cert):\n ca_certificate, crl = utils.load_certificates(ca_location,\n crl_location, invalidate_cache=True)\n with open(cafile, 'w') as f:\n f.write(ca_certificate)\n ctx = m2ext.SSL.Context()\n ctx.load_verify_locations(cafile=cafile)\n if not ctx.validate_certificate(cert):\n return fail('X509 certificate is not valid.')\n except (IOError, RequestException) as e:\n _log.error(str(e))\n return False\n finally:\n os.close(fd)\n os.remove(cafile)\n if crl:\n try:\n fd, crlfile = tempfile.mkstemp(text=True)\n os.write(fd, crl.encode('ascii'))\n os.fsync(fd)\n crl = M2Crypto.X509.load_crl(crlfile)\n finally:\n os.close(fd)\n os.remove(crlfile)\n revoked_serials = [long(line.split(': ')[1].strip(), base=16) for\n line in crl.as_text().split('\\n') if 'Serial Number:' in line]\n if cert.get_serial_number() in revoked_serials:\n subject = cert.get_subject()\n signer = '(no CN)'\n if subject.nid.get('CN'):\n entry = subject.get_entries_by_nid(subject.nid['CN'])[0]\n if entry:\n signer = entry.get_data().as_text()\n return fail('X509 cert %r, %r is in the Revocation List (CRL)' %\n (signer, cert.get_serial_number()))\n rsa_public = cert.get_pubkey().get_rsa()\n digest = M2Crypto.EVP.MessageDigest('sha1')\n digest.update(fedmsg.encoding.dumps(message))\n try:\n if not rsa_public.verify(digest.digest(), signature):\n raise M2Crypto.RSA.RSAError('RSA signature failed to validate.')\n except M2Crypto.RSA.RSAError as e:\n return fail(str(e))\n routing_policy = config.get('routing_policy', {})\n subject = cert.get_subject()\n signer = subject.get_entries_by_nid(subject.nid['CN'])[0].get_data(\n ).as_text()\n return utils.validate_policy(message.get('topic'), signer,\n routing_policy, config.get('routing_nitpicky', False))\n",
"role": "user"
},
{
"content": "m2crypto_validate",
"role": "assistant"
}
] |
def x(self, messages, **config):
for conglomerator in self.conglomerator_objects:
messages = conglomerator.conglomerate(messages, **config)
return messages
|
conglomerate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, messages, **config):\n for conglomerator in self.conglomerator_objects:\n messages = conglomerator.conglomerate(messages, **config)\n return messages\n",
"role": "user"
},
{
"content": "conglomerate",
"role": "assistant"
}
] |
def x(self, msg, **config):
match = self.__prefix__.match(msg['topic'])
if match:
return match.groups()[-1] or ''
|
handle_msg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, **config):\n match = self.__prefix__.match(msg['topic'])\n if match:\n return match.groups()[-1] or ''\n",
"role": "user"
},
{
"content": "handle_msg",
"role": "assistant"
}
] |
def x(self, args):
self.preferred_auth_policies = []
policies_str = args.get('preferred_auth_policies')
if policies_str:
if isinstance(policies_str, bytes):
policies_str = str(policies_str, encoding='utf-8')
for uri in policies_str.split(' '):
if uri not in self.preferred_auth_policies:
self.preferred_auth_policies.append(uri)
max_auth_age_str = args.get('max_auth_age')
self.max_auth_age = None
if max_auth_age_str:
try:
self.max_auth_age = int(max_auth_age_str)
except ValueError:
pass
|
parseExtensionArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, args):\n self.preferred_auth_policies = []\n policies_str = args.get('preferred_auth_policies')\n if policies_str:\n if isinstance(policies_str, bytes):\n policies_str = str(policies_str, encoding='utf-8')\n for uri in policies_str.split(' '):\n if uri not in self.preferred_auth_policies:\n self.preferred_auth_policies.append(uri)\n max_auth_age_str = args.get('max_auth_age')\n self.max_auth_age = None\n if max_auth_age_str:\n try:\n self.max_auth_age = int(max_auth_age_str)\n except ValueError:\n pass\n",
"role": "user"
},
{
"content": "parseExtensionArgs",
"role": "assistant"
}
] |
def x(self, user_url, anonymous=False):
disco = Discovery(self.session, user_url, self.session_key_prefix)
try:
service = disco.getNextService(self._discover)
except fetchers.HTTPFetchingError as why:
raise DiscoveryFailure('Error fetching XRDS document: %s' % (why.
why,), None)
if service is None:
raise DiscoveryFailure('No usable OpenID services found for %s' % (
user_url,), None)
else:
return self.beginWithoutDiscovery(service, anonymous)
|
begin
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user_url, anonymous=False):\n disco = Discovery(self.session, user_url, self.session_key_prefix)\n try:\n service = disco.getNextService(self._discover)\n except fetchers.HTTPFetchingError as why:\n raise DiscoveryFailure('Error fetching XRDS document: %s' % (why.\n why,), None)\n if service is None:\n raise DiscoveryFailure('No usable OpenID services found for %s' % (\n user_url,), None)\n else:\n return self.beginWithoutDiscovery(service, anonymous)\n",
"role": "user"
},
{
"content": "begin",
"role": "assistant"
}
] |
def x(self, service, anonymous=False):
auth_req = self.consumer.begin(service)
self.session[self._token_key] = auth_req.endpoint
try:
auth_req.setAnonymous(anonymous)
except ValueError as why:
raise ProtocolError(str(why))
return auth_req
|
beginWithoutDiscovery
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, service, anonymous=False):\n auth_req = self.consumer.begin(service)\n self.session[self._token_key] = auth_req.endpoint\n try:\n auth_req.setAnonymous(anonymous)\n except ValueError as why:\n raise ProtocolError(str(why))\n return auth_req\n",
"role": "user"
},
{
"content": "beginWithoutDiscovery",
"role": "assistant"
}
] |
def x(self, message, return_to):
try:
self._verifyReturnToArgs(message.toPostArgs())
except ProtocolError as why:
logging.exception('Verifying return_to arguments: %s' % (why,))
return False
msg_return_to = message.getArg(OPENID_NS, 'return_to')
app_parts = urlparse(urinorm.urinorm(return_to))
msg_parts = urlparse(urinorm.urinorm(msg_return_to))
for part in range(0, 3):
if app_parts[part] != msg_parts[part]:
return False
return True
|
checkReturnTo
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, message, return_to):\n try:\n self._verifyReturnToArgs(message.toPostArgs())\n except ProtocolError as why:\n logging.exception('Verifying return_to arguments: %s' % (why,))\n return False\n msg_return_to = message.getArg(OPENID_NS, 'return_to')\n app_parts = urlparse(urinorm.urinorm(return_to))\n msg_parts = urlparse(urinorm.urinorm(msg_return_to))\n for part in range(0, 3):\n if app_parts[part] != msg_parts[part]:\n return False\n return True\n",
"role": "user"
},
{
"content": "checkReturnTo",
"role": "assistant"
}
] |
def x(self, claimed_id, services, to_match_endpoints):
failure_messages = []
for endpoint in services:
for to_match_endpoint in to_match_endpoints:
try:
self._verifyDiscoverySingle(endpoint, to_match_endpoint)
except ProtocolError as why:
failure_messages.append(str(why))
else:
return endpoint
else:
logging.error('Discovery verification failure for %s' % (claimed_id,))
for failure_message in failure_messages:
logging.error(' * Endpoint mismatch: ' + failure_message)
raise DiscoveryFailure(
'No matching endpoint found after discovering %s' % (claimed_id
,), None)
|
verifyDiscoveredServices
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, claimed_id, services, to_match_endpoints):\n failure_messages = []\n for endpoint in services:\n for to_match_endpoint in to_match_endpoints:\n try:\n self._verifyDiscoverySingle(endpoint, to_match_endpoint)\n except ProtocolError as why:\n failure_messages.append(str(why))\n else:\n return endpoint\n else:\n logging.error('Discovery verification failure for %s' % (claimed_id,))\n for failure_message in failure_messages:\n logging.error(' * Endpoint mismatch: ' + failure_message)\n raise DiscoveryFailure(\n 'No matching endpoint found after discovering %s' % (claimed_id\n ,), None)\n",
"role": "user"
},
{
"content": "verifyDiscoveredServices",
"role": "assistant"
}
] |
def x(self, message, server_url):
logging.info('Using OpenID check_authentication')
request = self._createCheckAuthRequest(message)
if request is None:
return False
try:
response = self._makeKVPost(request, server_url)
except (fetchers.HTTPFetchingError, ServerError) as e:
e0 = e.args[0]
logging.exception('check_authentication failed: %s' % e0)
return False
else:
return self._processCheckAuthResponse(response, server_url)
|
checkAuth
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, message, server_url):\n logging.info('Using OpenID check_authentication')\n request = self._createCheckAuthRequest(message)\n if request is None:\n return False\n try:\n response = self._makeKVPost(request, server_url)\n except (fetchers.HTTPFetchingError, ServerError) as e:\n e0 = e.args[0]\n logging.exception('check_authentication failed: %s' % e0)\n return False\n else:\n return self._processCheckAuthResponse(response, server_url)\n",
"role": "user"
},
{
"content": "checkAuth",
"role": "assistant"
}
] |
def x(self, message):
signed = message.getArg(OPENID_NS, 'signed')
if signed:
if isinstance(signed, bytes):
signed = str(signed, encoding='utf-8')
for k in signed.split(','):
logging.info(k)
val = message.getAliasedArg(k)
if val is None:
logging.info('Missing signed field %r' % (k,))
return None
check_auth_message = message.copy()
check_auth_message.setArg(OPENID_NS, 'mode', 'check_authentication')
return check_auth_message
|
createCheckAuthRequest
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, message):\n signed = message.getArg(OPENID_NS, 'signed')\n if signed:\n if isinstance(signed, bytes):\n signed = str(signed, encoding='utf-8')\n for k in signed.split(','):\n logging.info(k)\n val = message.getAliasedArg(k)\n if val is None:\n logging.info('Missing signed field %r' % (k,))\n return None\n check_auth_message = message.copy()\n check_auth_message.setArg(OPENID_NS, 'mode', 'check_authentication')\n return check_auth_message\n",
"role": "user"
},
{
"content": "createCheckAuthRequest",
"role": "assistant"
}
] |
def x(self, endpoint):
assoc_type, session_type = self.negotiator.getAllowedType()
try:
assoc = self._requestAssociation(endpoint, assoc_type, session_type)
except ServerError as why:
supportedTypes = self._extractSupportedAssociationType(why,
endpoint, assoc_type)
if supportedTypes is not None:
assoc_type, session_type = supportedTypes
try:
assoc = self._requestAssociation(endpoint, assoc_type,
session_type)
except ServerError as why:
logging.error(
'Server %s refused its suggested association type: session_type=%s, assoc_type=%s'
% (endpoint.server_url, session_type, assoc_type))
return None
else:
return assoc
else:
return assoc
|
negotiateAssociation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, endpoint):\n assoc_type, session_type = self.negotiator.getAllowedType()\n try:\n assoc = self._requestAssociation(endpoint, assoc_type, session_type)\n except ServerError as why:\n supportedTypes = self._extractSupportedAssociationType(why,\n endpoint, assoc_type)\n if supportedTypes is not None:\n assoc_type, session_type = supportedTypes\n try:\n assoc = self._requestAssociation(endpoint, assoc_type,\n session_type)\n except ServerError as why:\n logging.error(\n 'Server %s refused its suggested association type: session_type=%s, assoc_type=%s'\n % (endpoint.server_url, session_type, assoc_type))\n return None\n else:\n return assoc\n else:\n return assoc\n",
"role": "user"
},
{
"content": "negotiateAssociation",
"role": "assistant"
}
] |
def x(self, assoc_response):
session_type = assoc_response.getArg(OPENID1_NS, 'session_type')
if session_type == 'no-encryption':
logging.warning('OpenID server sent "no-encryption"for OpenID 1.X')
elif session_type == '' or session_type is None:
session_type = 'no-encryption'
return session_type
|
getOpenID1SessionType
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, assoc_response):\n session_type = assoc_response.getArg(OPENID1_NS, 'session_type')\n if session_type == 'no-encryption':\n logging.warning('OpenID server sent \"no-encryption\"for OpenID 1.X')\n elif session_type == '' or session_type is None:\n session_type = 'no-encryption'\n return session_type\n",
"role": "user"
},
{
"content": "getOpenID1SessionType",
"role": "assistant"
}
] |
def x(url):
try:
normalized = urinorm.urinorm(url)
except ValueError as why:
raise DiscoveryFailure('Normalizing identifier: %s' % (why,), None)
else:
return urllib.parse.urldefrag(normalized)[0]
|
normalizeURL
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url):\n try:\n normalized = urinorm.urinorm(url)\n except ValueError as why:\n raise DiscoveryFailure('Normalizing identifier: %s' % (why,), None)\n else:\n return urllib.parse.urldefrag(normalized)[0]\n",
"role": "user"
},
{
"content": "normalizeURL",
"role": "assistant"
}
] |
def x(self):
if self.display_identifier is not None:
return self.display_identifier
if self.claimed_id is None:
return None
else:
return urllib.parse.urldefrag(self.claimed_id)[0]
|
getDisplayIdentifier
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.display_identifier is not None:\n return self.display_identifier\n if self.claimed_id is None:\n return None\n else:\n return urllib.parse.urldefrag(self.claimed_id)[0]\n",
"role": "user"
},
{
"content": "getDisplayIdentifier",
"role": "assistant"
}
] |
def x(text):
try:
bytestring = text.encode('utf8') if isinstance(text, str) else text
element = SafeElementTree.XML(bytestring)
except (SystemExit, MemoryError, AssertionError, ImportError):
raise
except Exception as why:
exc = XRDSError('Error parsing document as XML')
exc.reason = why
raise exc
else:
tree = ElementTree.ElementTree(element)
if not isXRDS(tree):
raise XRDSError('Not an XRDS document')
return tree
|
parseXRDS
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(text):\n try:\n bytestring = text.encode('utf8') if isinstance(text, str) else text\n element = SafeElementTree.XML(bytestring)\n except (SystemExit, MemoryError, AssertionError, ImportError):\n raise\n except Exception as why:\n exc = XRDSError('Error parsing document as XML')\n exc.reason = why\n raise exc\n else:\n tree = ElementTree.ElementTree(element)\n if not isXRDS(tree):\n raise XRDSError('Not an XRDS document')\n return tree\n",
"role": "user"
},
{
"content": "parseXRDS",
"role": "assistant"
}
] |
def x(elements):
random.shuffle(elements)
sorted_elems = sorted(elements, key=getPriority)
return sorted_elems
|
prioSort
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(elements):\n random.shuffle(elements)\n sorted_elems = sorted(elements, key=getPriority)\n return sorted_elems\n",
"role": "user"
},
{
"content": "prioSort",
"role": "assistant"
}
] |
def x(module_names=None):
if module_names is None:
module_names = xxe_safe_elementtree_modules
try:
return importElementTree(module_names)
except ImportError:
raise ImportError(
'Unable to find a ElementTree module that is not vulnerable to XXE. Tried importing %r'
% (module_names,))
|
importSafeElementTree
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(module_names=None):\n if module_names is None:\n module_names = xxe_safe_elementtree_modules\n try:\n return importElementTree(module_names)\n except ImportError:\n raise ImportError(\n 'Unable to find a ElementTree module that is not vulnerable to XXE. Tried importing %r'\n % (module_names,))\n",
"role": "user"
},
{
"content": "importSafeElementTree",
"role": "assistant"
}
] |
def x(url, args):
if hasattr(args, 'items'):
args = sorted(args.items())
else:
args = list(args)
if not isinstance(url, str):
url = str(url, encoding='utf-8')
if not args:
return url
if '?' in url:
sep = '&'
else:
sep = '?'
i = 0
for k, v in args:
if not isinstance(k, bytes):
k = k.encode('utf-8')
if not isinstance(v, bytes):
v = v.encode('utf-8')
args[i] = k, v
i += 1
return '%s%s%s' % (url, sep, urlencode(args))
|
appendArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url, args):\n if hasattr(args, 'items'):\n args = sorted(args.items())\n else:\n args = list(args)\n if not isinstance(url, str):\n url = str(url, encoding='utf-8')\n if not args:\n return url\n if '?' in url:\n sep = '&'\n else:\n sep = '?'\n i = 0\n for k, v in args:\n if not isinstance(k, bytes):\n k = k.encode('utf-8')\n if not isinstance(v, bytes):\n v = v.encode('utf-8')\n args[i] = k, v\n i += 1\n return '%s%s%s' % (url, sep, urlencode(args))\n",
"role": "user"
},
{
"content": "appendArgs",
"role": "assistant"
}
] |
def x(s):
if isinstance(s, str):
s = s.encode('utf-8')
return binascii.b2a_base64(s)[:-1]
|
toBase64
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(s):\n if isinstance(s, str):\n s = s.encode('utf-8')\n return binascii.b2a_base64(s)[:-1]\n",
"role": "user"
},
{
"content": "toBase64",
"role": "assistant"
}
] |
def x(self):
remove = []
for handle, assoc in self.assocs.items():
if assoc.expiresIn == 0:
remove.append(handle)
for handle in remove:
del self.assocs[handle]
return len(remove), len(self.assocs)
|
cleanup
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n remove = []\n for handle, assoc in self.assocs.items():\n if assoc.expiresIn == 0:\n remove.append(handle)\n for handle in remove:\n del self.assocs[handle]\n return len(remove), len(self.assocs)\n",
"role": "user"
},
{
"content": "cleanup",
"role": "assistant"
}
] |
def x(self, ax_args):
mode = ax_args.get('mode')
if isinstance(mode, bytes):
mode = str(mode, encoding='utf-8')
if mode != self.mode:
if not mode:
raise NotAXMessage()
else:
raise AXError('Expected mode %r; got %r' % (self.mode, mode))
|
checkMode
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ax_args):\n mode = ax_args.get('mode')\n if isinstance(mode, bytes):\n mode = str(mode, encoding='utf-8')\n if mode != self.mode:\n if not mode:\n raise NotAXMessage()\n else:\n raise AXError('Expected mode %r; got %r' % (self.mode, mode))\n",
"role": "user"
},
{
"content": "checkMode",
"role": "assistant"
}
] |
def x(self):
aliases = NamespaceMap()
required = []
if_available = []
ax_args = self._newArgs()
for type_uri, attribute in self.requested_attributes.items():
if attribute.alias is None:
alias = aliases.add(type_uri)
else:
alias = aliases.addAlias(type_uri, attribute.alias)
if attribute.required:
required.append(alias)
else:
if_available.append(alias)
if attribute.count != 1:
ax_args['count.' + alias] = str(attribute.count)
ax_args['type.' + alias] = type_uri
if required:
ax_args['required'] = ','.join(required)
if if_available:
ax_args['if_available'] = ','.join(if_available)
return ax_args
|
getExtensionArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n aliases = NamespaceMap()\n required = []\n if_available = []\n ax_args = self._newArgs()\n for type_uri, attribute in self.requested_attributes.items():\n if attribute.alias is None:\n alias = aliases.add(type_uri)\n else:\n alias = aliases.addAlias(type_uri, attribute.alias)\n if attribute.required:\n required.append(alias)\n else:\n if_available.append(alias)\n if attribute.count != 1:\n ax_args['count.' + alias] = str(attribute.count)\n ax_args['type.' + alias] = type_uri\n if required:\n ax_args['required'] = ','.join(required)\n if if_available:\n ax_args['if_available'] = ','.join(if_available)\n return ax_args\n",
"role": "user"
},
{
"content": "getExtensionArgs",
"role": "assistant"
}
] |
def x(self):
required = []
for type_uri, attribute in self.requested_attributes.items():
if attribute.required:
required.append(type_uri)
return required
|
getRequiredAttrs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n required = []\n for type_uri, attribute in self.requested_attributes.items():\n if attribute.required:\n required.append(type_uri)\n return required\n",
"role": "user"
},
{
"content": "getRequiredAttrs",
"role": "assistant"
}
] |
def x(cls, openid_request):
message = openid_request.message
ax_args = message.getArgs(cls.ns_uri)
self = cls()
try:
self.parseExtensionArgs(ax_args)
except NotAXMessage as err:
return None
if self.update_url:
realm = message.getArg(OPENID_NS, 'realm', message.getArg(OPENID_NS,
'return_to'))
if not realm:
raise AXError(('Cannot validate update_url %r ' +
'against absent realm') % (self.update_url,))
tr = TrustRoot.parse(realm)
if not tr.validateURL(self.update_url):
raise AXError(
'Update URL %r failed validation against realm %r' % (self.
update_url, realm))
return self
|
fromOpenIDRequest
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, openid_request):\n message = openid_request.message\n ax_args = message.getArgs(cls.ns_uri)\n self = cls()\n try:\n self.parseExtensionArgs(ax_args)\n except NotAXMessage as err:\n return None\n if self.update_url:\n realm = message.getArg(OPENID_NS, 'realm', message.getArg(OPENID_NS,\n 'return_to'))\n if not realm:\n raise AXError(('Cannot validate update_url %r ' +\n 'against absent realm') % (self.update_url,))\n tr = TrustRoot.parse(realm)\n if not tr.validateURL(self.update_url):\n raise AXError(\n 'Update URL %r failed validation against realm %r' % (self.\n update_url, realm))\n return self\n",
"role": "user"
},
{
"content": "fromOpenIDRequest",
"role": "assistant"
}
] |
def x(self, ax_args):
self._checkMode(ax_args)
aliases = NamespaceMap()
for key, value in ax_args.items():
if key.startswith('type.'):
alias = key[5:]
type_uri = value
aliases.addAlias(type_uri, alias)
count_key = 'count.' + alias
count_s = ax_args.get(count_key)
if count_s:
try:
count = int(count_s)
if count <= 0:
raise AXError(
'Count %r must be greater than zero, got %r' %
(count_key, count_s))
except ValueError:
if count_s != UNLIMITED_VALUES:
raise AXError('Invalid count value for %r: %r' % (
count_key, count_s))
count = count_s
else:
count = 1
self.add(AttrInfo(type_uri, alias=alias, count=count))
required = toTypeURIs(aliases, ax_args.get('required'))
for type_uri in required:
self.requested_attributes[type_uri].required = True
if_available = toTypeURIs(aliases, ax_args.get('if_available'))
all_type_uris = required + if_available
for type_uri in aliases.iterNamespaceURIs():
if type_uri not in all_type_uris:
raise AXError(
'Type URI %r was in the request but not present in "required" or "if_available"'
% (type_uri,))
self.update_url = ax_args.get('update_url')
|
parseExtensionArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ax_args):\n self._checkMode(ax_args)\n aliases = NamespaceMap()\n for key, value in ax_args.items():\n if key.startswith('type.'):\n alias = key[5:]\n type_uri = value\n aliases.addAlias(type_uri, alias)\n count_key = 'count.' + alias\n count_s = ax_args.get(count_key)\n if count_s:\n try:\n count = int(count_s)\n if count <= 0:\n raise AXError(\n 'Count %r must be greater than zero, got %r' %\n (count_key, count_s))\n except ValueError:\n if count_s != UNLIMITED_VALUES:\n raise AXError('Invalid count value for %r: %r' % (\n count_key, count_s))\n count = count_s\n else:\n count = 1\n self.add(AttrInfo(type_uri, alias=alias, count=count))\n required = toTypeURIs(aliases, ax_args.get('required'))\n for type_uri in required:\n self.requested_attributes[type_uri].required = True\n if_available = toTypeURIs(aliases, ax_args.get('if_available'))\n all_type_uris = required + if_available\n for type_uri in aliases.iterNamespaceURIs():\n if type_uri not in all_type_uris:\n raise AXError(\n 'Type URI %r was in the request but not present in \"required\" or \"if_available\"'\n % (type_uri,))\n self.update_url = ax_args.get('update_url')\n",
"role": "user"
},
{
"content": "parseExtensionArgs",
"role": "assistant"
}
] |
def x(link_attrs_list, target_rel):
matchesTarget = lambda attrs: linkHasRel(attrs, target_rel)
return list(filter(matchesTarget, link_attrs_list))
|
findLinksRel
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(link_attrs_list, target_rel):\n matchesTarget = lambda attrs: linkHasRel(attrs, target_rel)\n return list(filter(matchesTarget, link_attrs_list))\n",
"role": "user"
},
{
"content": "findLinksRel",
"role": "assistant"
}
] |
def x(self, server_url, handle=None):
if handle is not None:
self.db_get_assoc(server_url, handle)
else:
self.db_get_assocs(server_url)
rows = self.cur.fetchall()
if len(rows) == 0:
return None
else:
associations = []
for values in rows:
values = list(values)
values[1] = self.blobDecode(values[1])
assoc = Association(*values)
if assoc.expiresIn == 0:
self.txn_removeAssociation(server_url, assoc.handle)
else:
associations.append((assoc.issued, assoc))
if associations:
associations.sort()
return associations[-1][1]
else:
return None
|
txn_getAssociation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, server_url, handle=None):\n if handle is not None:\n self.db_get_assoc(server_url, handle)\n else:\n self.db_get_assocs(server_url)\n rows = self.cur.fetchall()\n if len(rows) == 0:\n return None\n else:\n associations = []\n for values in rows:\n values = list(values)\n values[1] = self.blobDecode(values[1])\n assoc = Association(*values)\n if assoc.expiresIn == 0:\n self.txn_removeAssociation(server_url, assoc.handle)\n else:\n associations.append((assoc.issued, assoc))\n if associations:\n associations.sort()\n return associations[-1][1]\n else:\n return None\n",
"role": "user"
},
{
"content": "txn_getAssociation",
"role": "assistant"
}
] |
def x(self, urllib2_response):
resp = HTTPResponse()
resp.body = urllib2_response.read(MAX_RESPONSE_KB * 1024)
resp.final_url = urllib2_response.geturl()
resp.headers = self._lowerCaseKeys(dict(list(urllib2_response.info().
items())))
if hasattr(urllib2_response, 'code'):
resp.status = urllib2_response.code
else:
resp.status = 200
_, extra_dict = self._parseHeaderValue(resp.headers.get('content-type', '')
)
charset = extra_dict.get('charset', 'latin1')
try:
resp.body = resp.body.decode(charset)
except Exception:
pass
return resp
|
makeResponse
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, urllib2_response):\n resp = HTTPResponse()\n resp.body = urllib2_response.read(MAX_RESPONSE_KB * 1024)\n resp.final_url = urllib2_response.geturl()\n resp.headers = self._lowerCaseKeys(dict(list(urllib2_response.info().\n items())))\n if hasattr(urllib2_response, 'code'):\n resp.status = urllib2_response.code\n else:\n resp.status = 200\n _, extra_dict = self._parseHeaderValue(resp.headers.get('content-type', '')\n )\n charset = extra_dict.get('charset', 'latin1')\n try:\n resp.body = resp.body.decode(charset)\n except Exception:\n pass\n return resp\n",
"role": "user"
},
{
"content": "makeResponse",
"role": "assistant"
}
] |
def x(self, header_value):
values = header_value.split(';', 1)
if len(values) == 1:
return values[0], {}
main_value, extra_values = values[0], values[1].split(';')
extra_dict = {}
for value_string in extra_values:
try:
key, value = value_string.split('=', 1)
extra_dict[key.strip()] = value.strip()
except ValueError:
pass
return main_value, extra_dict
|
parseHeaderValue
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, header_value):\n values = header_value.split(';', 1)\n if len(values) == 1:\n return values[0], {}\n main_value, extra_values = values[0], values[1].split(';')\n extra_dict = {}\n for value_string in extra_values:\n try:\n key, value = value_string.split('=', 1)\n extra_dict[key.strip()] = value.strip()\n except ValueError:\n pass\n return main_value, extra_dict\n",
"role": "user"
},
{
"content": "parseHeaderValue",
"role": "assistant"
}
] |
def x(namespace_uri, alias):
global registered_aliases
if registered_aliases.get(alias) == namespace_uri:
return
if namespace_uri in list(registered_aliases.values()):
raise NamespaceAliasRegistrationError(
'Namespace uri %r already registered' % (namespace_uri,))
if alias in registered_aliases:
raise NamespaceAliasRegistrationError('Alias %r already registered' %
(alias,))
registered_aliases[alias] = namespace_uri
|
registerNamespaceAlias
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(namespace_uri, alias):\n global registered_aliases\n if registered_aliases.get(alias) == namespace_uri:\n return\n if namespace_uri in list(registered_aliases.values()):\n raise NamespaceAliasRegistrationError(\n 'Namespace uri %r already registered' % (namespace_uri,))\n if alias in registered_aliases:\n raise NamespaceAliasRegistrationError('Alias %r already registered' %\n (alias,))\n registered_aliases[alias] = namespace_uri\n",
"role": "user"
},
{
"content": "registerNamespaceAlias",
"role": "assistant"
}
] |
def x(self, openid_ns_uri, implicit):
if isinstance(openid_ns_uri, bytes):
openid_ns_uri = str(openid_ns_uri, encoding='utf-8')
if openid_ns_uri not in self.allowed_openid_namespaces:
raise InvalidOpenIDNamespace(openid_ns_uri)
self.namespaces.addAlias(openid_ns_uri, NULL_NAMESPACE, implicit)
self._openid_ns_uri = openid_ns_uri
|
setOpenIDNamespace
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, openid_ns_uri, implicit):\n if isinstance(openid_ns_uri, bytes):\n openid_ns_uri = str(openid_ns_uri, encoding='utf-8')\n if openid_ns_uri not in self.allowed_openid_namespaces:\n raise InvalidOpenIDNamespace(openid_ns_uri)\n self.namespaces.addAlias(openid_ns_uri, NULL_NAMESPACE, implicit)\n self._openid_ns_uri = openid_ns_uri\n",
"role": "user"
},
{
"content": "setOpenIDNamespace",
"role": "assistant"
}
] |
def x(self):
args = {}
for ns_uri, alias in self.namespaces.items():
if self.namespaces.isImplicit(ns_uri):
continue
if alias == NULL_NAMESPACE:
ns_key = 'openid.ns'
else:
ns_key = 'openid.ns.' + alias
args[ns_key] = oidutil.toUnicode(ns_uri)
for (ns_uri, ns_key), value in self.args.items():
key = self.getKey(ns_uri, ns_key)
args[key] = oidutil.toUnicode(value)
return args
|
toPostArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n args = {}\n for ns_uri, alias in self.namespaces.items():\n if self.namespaces.isImplicit(ns_uri):\n continue\n if alias == NULL_NAMESPACE:\n ns_key = 'openid.ns'\n else:\n ns_key = 'openid.ns.' + alias\n args[ns_key] = oidutil.toUnicode(ns_uri)\n for (ns_uri, ns_key), value in self.args.items():\n key = self.getKey(ns_uri, ns_key)\n args[key] = oidutil.toUnicode(value)\n return args\n",
"role": "user"
},
{
"content": "toPostArgs",
"role": "assistant"
}
] |
def x(self):
post_args = self.toPostArgs()
kvargs = {}
for k, v in post_args.items():
if not k.startswith('openid.'):
raise ValueError(
'This message can only be encoded as a POST, because it contains arguments that are not prefixed with "openid."'
)
else:
kvargs[k[7:]] = v
return kvargs
|
toArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n post_args = self.toPostArgs()\n kvargs = {}\n for k, v in post_args.items():\n if not k.startswith('openid.'):\n raise ValueError(\n 'This message can only be encoded as a POST, because it contains arguments that are not prefixed with \"openid.\"'\n )\n else:\n kvargs[k[7:]] = v\n return kvargs\n",
"role": "user"
},
{
"content": "toArgs",
"role": "assistant"
}
] |
def x(self, action_url, form_tag_attrs=None, submit_text='Continue'):
if ElementTree is None:
raise RuntimeError('This function requires ElementTree.')
assert action_url is not None
form = ElementTree.Element('form')
if form_tag_attrs:
for name, attr in form_tag_attrs.items():
form.attrib[name] = attr
form.attrib['action'] = oidutil.toUnicode(action_url)
form.attrib['method'] = 'post'
form.attrib['accept-charset'] = 'UTF-8'
form.attrib['enctype'] = 'application/x-www-form-urlencoded'
for name, value in self.toPostArgs().items():
attrs = {'type': 'hidden', 'name': oidutil.toUnicode(name), 'value':
oidutil.toUnicode(value)}
form.append(ElementTree.Element('input', attrs))
submit = ElementTree.Element('input', {'type': 'submit', 'value':
oidutil.toUnicode(submit_text)})
form.append(submit)
return str(ElementTree.tostring(form, encoding='utf-8'), encoding='utf-8')
|
toFormMarkup
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, action_url, form_tag_attrs=None, submit_text='Continue'):\n if ElementTree is None:\n raise RuntimeError('This function requires ElementTree.')\n assert action_url is not None\n form = ElementTree.Element('form')\n if form_tag_attrs:\n for name, attr in form_tag_attrs.items():\n form.attrib[name] = attr\n form.attrib['action'] = oidutil.toUnicode(action_url)\n form.attrib['method'] = 'post'\n form.attrib['accept-charset'] = 'UTF-8'\n form.attrib['enctype'] = 'application/x-www-form-urlencoded'\n for name, value in self.toPostArgs().items():\n attrs = {'type': 'hidden', 'name': oidutil.toUnicode(name), 'value':\n oidutil.toUnicode(value)}\n form.append(ElementTree.Element('input', attrs))\n submit = ElementTree.Element('input', {'type': 'submit', 'value':\n oidutil.toUnicode(submit_text)})\n form.append(submit)\n return str(ElementTree.tostring(form, encoding='utf-8'), encoding='utf-8')\n",
"role": "user"
},
{
"content": "toFormMarkup",
"role": "assistant"
}
] |
def x(self):
args = sorted(self.toPostArgs().items())
return urllib.parse.urlencode(args)
|
toURLEncoded
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n args = sorted(self.toPostArgs().items())\n return urllib.parse.urlencode(args)\n",
"role": "user"
},
{
"content": "toURLEncoded",
"role": "assistant"
}
] |
def x(self, namespace):
if isinstance(namespace, bytes):
namespace = str(namespace, encoding='utf-8')
if namespace == OPENID_NS:
if self._openid_ns_uri is None:
raise UndefinedOpenIDNamespace('OpenID namespace not set')
else:
namespace = self._openid_ns_uri
if namespace != BARE_NS and not isinstance(namespace, str):
raise TypeError(
'Namespace must be BARE_NS, OPENID_NS or a string. got %r' % (
namespace,))
if namespace != BARE_NS and ':' not in namespace:
fmt = 'OpenID 2.0 namespace identifiers SHOULD be URIs. Got %r'
warnings.warn(fmt % (namespace,), DeprecationWarning)
if namespace == 'sreg':
fmt = 'Using %r instead of "sreg" as namespace'
warnings.warn(fmt % (SREG_URI,), DeprecationWarning)
return SREG_URI
return namespace
|
fixNS
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, namespace):\n if isinstance(namespace, bytes):\n namespace = str(namespace, encoding='utf-8')\n if namespace == OPENID_NS:\n if self._openid_ns_uri is None:\n raise UndefinedOpenIDNamespace('OpenID namespace not set')\n else:\n namespace = self._openid_ns_uri\n if namespace != BARE_NS and not isinstance(namespace, str):\n raise TypeError(\n 'Namespace must be BARE_NS, OPENID_NS or a string. got %r' % (\n namespace,))\n if namespace != BARE_NS and ':' not in namespace:\n fmt = 'OpenID 2.0 namespace identifiers SHOULD be URIs. Got %r'\n warnings.warn(fmt % (namespace,), DeprecationWarning)\n if namespace == 'sreg':\n fmt = 'Using %r instead of \"sreg\" as namespace'\n warnings.warn(fmt % (SREG_URI,), DeprecationWarning)\n return SREG_URI\n return namespace\n",
"role": "user"
},
{
"content": "fixNS",
"role": "assistant"
}
] |
def x(self, namespace):
namespace = self._fixNS(namespace)
args = []
for (pair_ns, ns_key), value in self.args.items():
if pair_ns == namespace:
if isinstance(ns_key, bytes):
k = str(ns_key, encoding='utf-8')
else:
k = ns_key
if isinstance(value, bytes):
v = str(value, encoding='utf-8')
else:
v = value
args.append((k, v))
return dict(args)
|
getArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, namespace):\n namespace = self._fixNS(namespace)\n args = []\n for (pair_ns, ns_key), value in self.args.items():\n if pair_ns == namespace:\n if isinstance(ns_key, bytes):\n k = str(ns_key, encoding='utf-8')\n else:\n k = ns_key\n if isinstance(value, bytes):\n v = str(value, encoding='utf-8')\n else:\n v = value\n args.append((k, v))\n return dict(args)\n",
"role": "user"
},
{
"content": "getArgs",
"role": "assistant"
}
] |
def x(self, namespace, key, value):
assert key is not None
assert value is not None
namespace = self._fixNS(namespace)
if isinstance(value, bytes):
value = str(value, encoding='utf-8')
self.args[namespace, key] = value
if not namespace is BARE_NS:
self.namespaces.add(namespace)
|
setArg
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, namespace, key, value):\n assert key is not None\n assert value is not None\n namespace = self._fixNS(namespace)\n if isinstance(value, bytes):\n value = str(value, encoding='utf-8')\n self.args[namespace, key] = value\n if not namespace is BARE_NS:\n self.namespaces.add(namespace)\n",
"role": "user"
},
{
"content": "setArg",
"role": "assistant"
}
] |
def x(self, namespace_uri, desired_alias, implicit=False):
if isinstance(namespace_uri, bytes):
namespace_uri = str(namespace_uri, encoding='utf-8')
assert desired_alias not in OPENID_PROTOCOL_FIELDS, '%r is not an allowed namespace alias' % (
desired_alias,)
if isinstance(desired_alias, str):
assert '.' not in desired_alias, '%r must not contain a dot' % (
desired_alias,)
current_namespace_uri = self.alias_to_namespace.get(desired_alias)
if (current_namespace_uri is not None and current_namespace_uri !=
namespace_uri):
fmt = 'Cannot map %r to alias %r. %r is already mapped to alias %r'
msg = fmt % (namespace_uri, desired_alias, current_namespace_uri,
desired_alias)
raise KeyError(msg)
alias = self.namespace_to_alias.get(namespace_uri)
if alias is not None and alias != desired_alias:
fmt = 'Cannot map %r to alias %r. It is already mapped to alias %r'
raise KeyError(fmt % (namespace_uri, desired_alias, alias))
assert desired_alias == NULL_NAMESPACE or type(desired_alias) in [str, str
], repr(desired_alias)
assert namespace_uri not in self.implicit_namespaces
self.alias_to_namespace[desired_alias] = namespace_uri
self.namespace_to_alias[namespace_uri] = desired_alias
if implicit:
self.implicit_namespaces.append(namespace_uri)
return desired_alias
|
addAlias
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, namespace_uri, desired_alias, implicit=False):\n if isinstance(namespace_uri, bytes):\n namespace_uri = str(namespace_uri, encoding='utf-8')\n assert desired_alias not in OPENID_PROTOCOL_FIELDS, '%r is not an allowed namespace alias' % (\n desired_alias,)\n if isinstance(desired_alias, str):\n assert '.' not in desired_alias, '%r must not contain a dot' % (\n desired_alias,)\n current_namespace_uri = self.alias_to_namespace.get(desired_alias)\n if (current_namespace_uri is not None and current_namespace_uri !=\n namespace_uri):\n fmt = 'Cannot map %r to alias %r. %r is already mapped to alias %r'\n msg = fmt % (namespace_uri, desired_alias, current_namespace_uri,\n desired_alias)\n raise KeyError(msg)\n alias = self.namespace_to_alias.get(namespace_uri)\n if alias is not None and alias != desired_alias:\n fmt = 'Cannot map %r to alias %r. It is already mapped to alias %r'\n raise KeyError(fmt % (namespace_uri, desired_alias, alias))\n assert desired_alias == NULL_NAMESPACE or type(desired_alias) in [str, str\n ], repr(desired_alias)\n assert namespace_uri not in self.implicit_namespaces\n self.alias_to_namespace[desired_alias] = namespace_uri\n self.namespace_to_alias[namespace_uri] = desired_alias\n if implicit:\n self.implicit_namespaces.append(namespace_uri)\n return desired_alias\n",
"role": "user"
},
{
"content": "addAlias",
"role": "assistant"
}
] |
def x(url, args):
if hasattr(args, 'items'):
args = list(args.items())
args.sort()
if len(args) == 0:
return url
if '?' in url.rstrip('?'):
sep = '&'
else:
sep = '?'
return '%s%s%s' % (url, sep, urlencode(args))
|
appendArgs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url, args):\n if hasattr(args, 'items'):\n args = list(args.items())\n args.sort()\n if len(args) == 0:\n return url\n if '?' in url.rstrip('?'):\n sep = '&'\n else:\n sep = '?'\n return '%s%s%s' % (url, sep, urlencode(args))\n",
"role": "user"
},
{
"content": "appendArgs",
"role": "assistant"
}
] |
def x(filestore_path, table_prefix):
db_engine = settings.DATABASES['default']['ENGINE']
if not db_engine:
return FileOpenIDStore(filestore_path)
connection.cursor()
tablenames = {'associations_table': table_prefix +
'openid_associations', 'nonces_table': table_prefix + 'openid_nonces'}
types = {'django.db.backends.postgresql_psycopg2': sqlstore.
PostgreSQLStore, 'django.db.backends.mysql': sqlstore.MySQLStore,
'django.db.backends.sqlite3': sqlstore.SQLiteStore}
if db_engine not in types:
raise ImproperlyConfigured(
'Database engine %s not supported by OpenID library' % db_engine)
s = types[db_engine](connection.connection, **tablenames)
try:
s.createTables()
except (SystemExit, KeyboardInterrupt, MemoryError):
raise
except:
pass
return s
|
getOpenIDStore
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filestore_path, table_prefix):\n db_engine = settings.DATABASES['default']['ENGINE']\n if not db_engine:\n return FileOpenIDStore(filestore_path)\n connection.cursor()\n tablenames = {'associations_table': table_prefix +\n 'openid_associations', 'nonces_table': table_prefix + 'openid_nonces'}\n types = {'django.db.backends.postgresql_psycopg2': sqlstore.\n PostgreSQLStore, 'django.db.backends.mysql': sqlstore.MySQLStore,\n 'django.db.backends.sqlite3': sqlstore.SQLiteStore}\n if db_engine not in types:\n raise ImproperlyConfigured(\n 'Database engine %s not supported by OpenID library' % db_engine)\n s = types[db_engine](connection.connection, **tablenames)\n try:\n s.createTables()\n except (SystemExit, KeyboardInterrupt, MemoryError):\n raise\n except:\n pass\n return s\n",
"role": "user"
},
{
"content": "getOpenIDStore",
"role": "assistant"
}
] |
def x(request, type_uris, endpoint_urls):
response = render_to_response('xrds.xml', {'type_uris': type_uris,
'endpoint_urls': endpoint_urls}, context_instance=RequestContext(
request))
response['Content-Type'] = YADIS_CONTENT_TYPE
return response
|
renderXRDS
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request, type_uris, endpoint_urls):\n response = render_to_response('xrds.xml', {'type_uris': type_uris,\n 'endpoint_urls': endpoint_urls}, context_instance=RequestContext(\n request))\n response['Content-Type'] = YADIS_CONTENT_TYPE\n return response\n",
"role": "user"
},
{
"content": "renderXRDS",
"role": "assistant"
}
] |
def x(err):
chunk = err.object[err.start:err.end]
replacements = _pct_encoded_replacements(chunk)
return ''.join(replacements), err.end
|
pct_escape_handler
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(err):\n chunk = err.object[err.start:err.end]\n replacements = _pct_encoded_replacements(chunk)\n return ''.join(replacements), err.end\n",
"role": "user"
},
{
"content": "pct_escape_handler",
"role": "assistant"
}
] |
def x(seq, strict=False):
def x(msg):
formatted = 'seqToKV warning: %s: %r' % (msg, seq)
if strict:
raise KVFormError(formatted)
else:
logging.warning(formatted)
lines = []
for k, v in seq:
if isinstance(k, bytes):
k = k.decode('utf-8')
elif not isinstance(k, str):
err('Converting key to string: %r' % k)
k = str(k)
if '\n' in k:
raise KVFormError(
'Invalid input for seqToKV: key contains newline: %r' % (k,))
if ':' in k:
raise KVFormError(
'Invalid input for seqToKV: key contains colon: %r' % (k,))
if k.strip() != k:
err('Key has whitespace at beginning or end: %r' % (k,))
if isinstance(v, bytes):
v = v.decode('utf-8')
elif not isinstance(v, str):
err('Converting value to string: %r' % (v,))
v = str(v)
if '\n' in v:
raise KVFormError(
'Invalid input for seqToKV: value contains newline: %r' % (v,))
if v.strip() != v:
err('Value has whitespace at beginning or end: %r' % (v,))
lines.append(k + ':' + v + '\n')
return ''.join(lines).encode('utf-8')
|
seqToKV
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(seq, strict=False):\n\n def x(msg):\n formatted = 'seqToKV warning: %s: %r' % (msg, seq)\n if strict:\n raise KVFormError(formatted)\n else:\n logging.warning(formatted)\n lines = []\n for k, v in seq:\n if isinstance(k, bytes):\n k = k.decode('utf-8')\n elif not isinstance(k, str):\n err('Converting key to string: %r' % k)\n k = str(k)\n if '\\n' in k:\n raise KVFormError(\n 'Invalid input for seqToKV: key contains newline: %r' % (k,))\n if ':' in k:\n raise KVFormError(\n 'Invalid input for seqToKV: key contains colon: %r' % (k,))\n if k.strip() != k:\n err('Key has whitespace at beginning or end: %r' % (k,))\n if isinstance(v, bytes):\n v = v.decode('utf-8')\n elif not isinstance(v, str):\n err('Converting value to string: %r' % (v,))\n v = str(v)\n if '\\n' in v:\n raise KVFormError(\n 'Invalid input for seqToKV: value contains newline: %r' % (v,))\n if v.strip() != v:\n err('Value has whitespace at beginning or end: %r' % (v,))\n lines.append(k + ':' + v + '\\n')\n return ''.join(lines).encode('utf-8')\n",
"role": "user"
},
{
"content": "seqToKV",
"role": "assistant"
}
] |
def x(iri):
if isinstance(iri, bytes):
iri = str(iri, encoding='utf-8')
return iri.encode('ascii', errors='oid_percent_escape').decode()
|
iriToURI
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(iri):\n if isinstance(iri, bytes):\n iri = str(iri, encoding='utf-8')\n return iri.encode('ascii', errors='oid_percent_escape').decode()\n",
"role": "user"
},
{
"content": "iriToURI",
"role": "assistant"
}
] |
def x(uri):
if isinstance(uri, bytes):
uri = str(uri, encoding='utf-8')
uri = uri.encode('ascii', errors='oid_percent_escape').decode('utf-8')
illegal_mo = uri_illegal_char_re.search(uri)
if illegal_mo:
raise ValueError('Illegal characters in URI: %r at position %s' % (
illegal_mo.group(), illegal_mo.start()))
uri_mo = uri_re.match(uri)
scheme = uri_mo.group(2)
if scheme is None:
raise ValueError('No scheme specified')
scheme = scheme.lower()
if scheme not in ('http', 'https'):
raise ValueError('Not an absolute HTTP or HTTPS URI: %r' % (uri,))
authority = uri_mo.group(4)
if authority is None:
raise ValueError('Not an absolute URI: %r' % (uri,))
authority_mo = authority_re.match(authority)
if authority_mo is None:
raise ValueError('URI does not have a valid authority: %r' % (uri,))
userinfo, host, port = authority_mo.groups()
if userinfo is None:
userinfo = ''
if '%' in host:
host = host.lower()
host = pct_encoded_re.sub(_pct_encoded_replace, host)
host = host.encode('idna').decode()
else:
host = host.lower()
if port:
if (port == ':' or scheme == 'http' and port == ':80' or scheme ==
'https' and port == ':443'):
port = ''
else:
port = ''
authority = userinfo + host + port
path = uri_mo.group(5)
path = pct_encoded_re.sub(_pct_encoded_replace_unreserved, path)
path = remove_dot_segments(path)
if not path:
path = '/'
query = uri_mo.group(6)
if query is None:
query = ''
fragment = uri_mo.group(8)
if fragment is None:
fragment = ''
return scheme + '://' + authority + path + query + fragment
|
urinorm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(uri):\n if isinstance(uri, bytes):\n uri = str(uri, encoding='utf-8')\n uri = uri.encode('ascii', errors='oid_percent_escape').decode('utf-8')\n illegal_mo = uri_illegal_char_re.search(uri)\n if illegal_mo:\n raise ValueError('Illegal characters in URI: %r at position %s' % (\n illegal_mo.group(), illegal_mo.start()))\n uri_mo = uri_re.match(uri)\n scheme = uri_mo.group(2)\n if scheme is None:\n raise ValueError('No scheme specified')\n scheme = scheme.lower()\n if scheme not in ('http', 'https'):\n raise ValueError('Not an absolute HTTP or HTTPS URI: %r' % (uri,))\n authority = uri_mo.group(4)\n if authority is None:\n raise ValueError('Not an absolute URI: %r' % (uri,))\n authority_mo = authority_re.match(authority)\n if authority_mo is None:\n raise ValueError('URI does not have a valid authority: %r' % (uri,))\n userinfo, host, port = authority_mo.groups()\n if userinfo is None:\n userinfo = ''\n if '%' in host:\n host = host.lower()\n host = pct_encoded_re.sub(_pct_encoded_replace, host)\n host = host.encode('idna').decode()\n else:\n host = host.lower()\n if port:\n if (port == ':' or scheme == 'http' and port == ':80' or scheme ==\n 'https' and port == ':443'):\n port = ''\n else:\n port = ''\n authority = userinfo + host + port\n path = uri_mo.group(5)\n path = pct_encoded_re.sub(_pct_encoded_replace_unreserved, path)\n path = remove_dot_segments(path)\n if not path:\n path = '/'\n query = uri_mo.group(6)\n if query is None:\n query = ''\n fragment = uri_mo.group(8)\n if fragment is None:\n fragment = ''\n return scheme + '://' + authority + path + query + fragment\n",
"role": "user"
},
{
"content": "urinorm",
"role": "assistant"
}
] |
def x(request):
return render_to_response('server/index.html', {'user_url': getViewURL(
request, idPage), 'server_xrds_url': getViewURL(request, idpXrds)},
context_instance=RequestContext(request))
|
server
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request):\n return render_to_response('server/index.html', {'user_url': getViewURL(\n request, idPage), 'server_xrds_url': getViewURL(request, idpXrds)},\n context_instance=RequestContext(request))\n",
"role": "user"
},
{
"content": "server",
"role": "assistant"
}
] |
def x(request, openid_response):
s = getServer(request)
try:
webresponse = s.encodeResponse(openid_response)
except EncodingError as why:
text = why.response.encodeToKVForm()
return render_to_response('server/endpoint.html', {'error': cgi.
escape(text)}, context_instance=RequestContext(request))
r = http.HttpResponse(webresponse.body)
r.status_code = webresponse.code
for header, value in webresponse.headers.items():
r[header] = value
return r
|
displayResponse
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request, openid_response):\n s = getServer(request)\n try:\n webresponse = s.encodeResponse(openid_response)\n except EncodingError as why:\n text = why.response.encodeToKVForm()\n return render_to_response('server/endpoint.html', {'error': cgi.\n escape(text)}, context_instance=RequestContext(request))\n r = http.HttpResponse(webresponse.body)\n r.status_code = webresponse.code\n for header, value in webresponse.headers.items():\n r[header] = value\n return r\n",
"role": "user"
},
{
"content": "displayResponse",
"role": "assistant"
}
] |
def x(filename):
try:
os.unlink(filename)
except OSError as why:
if why.errno == ENOENT:
return 0
else:
raise
else:
return 1
|
removeIfPresent
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename):\n try:\n os.unlink(filename)\n except OSError as why:\n if why.errno == ENOENT:\n return 0\n else:\n raise\n else:\n return 1\n",
"role": "user"
},
{
"content": "removeIfPresent",
"role": "assistant"
}
] |
def x(self, server_url, association):
association_s = association.serialize()
filename = self.getAssociationFilename(server_url, association.handle)
tmp_file, tmp = self._mktemp()
try:
try:
tmp_file.write(association_s)
os.fsync(tmp_file.fileno())
finally:
tmp_file.close()
try:
os.rename(tmp, filename)
except OSError as why:
if why.errno != EEXIST:
raise
try:
os.unlink(filename)
except OSError as why:
if why.errno == ENOENT:
pass
else:
raise
os.rename(tmp, filename)
except:
_removeIfPresent(tmp)
raise
|
storeAssociation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, server_url, association):\n association_s = association.serialize()\n filename = self.getAssociationFilename(server_url, association.handle)\n tmp_file, tmp = self._mktemp()\n try:\n try:\n tmp_file.write(association_s)\n os.fsync(tmp_file.fileno())\n finally:\n tmp_file.close()\n try:\n os.rename(tmp, filename)\n except OSError as why:\n if why.errno != EEXIST:\n raise\n try:\n os.unlink(filename)\n except OSError as why:\n if why.errno == ENOENT:\n pass\n else:\n raise\n os.rename(tmp, filename)\n except:\n _removeIfPresent(tmp)\n raise\n",
"role": "user"
},
{
"content": "storeAssociation",
"role": "assistant"
}
] |
def x(self):
openid_url = self.query.get('openid_identifier')
if not openid_url:
self.render('Enter an OpenID Identifier to verify.', css_class=
'error', form_contents=openid_url)
return
immediate = 'immediate' in self.query
use_sreg = 'use_sreg' in self.query
use_pape = 'use_pape' in self.query
use_stateless = 'use_stateless' in self.query
oidconsumer = self.getConsumer(stateless=use_stateless)
try:
request = oidconsumer.begin(openid_url)
except consumer.DiscoveryFailure as exc:
fetch_error_string = 'Error in discovery: %s' % cgi.escape(str(exc))
self.render(fetch_error_string, css_class='error', form_contents=
openid_url)
else:
if request is None:
msg = 'No OpenID services found for <code>%s</code>' % (cgi.
escape(openid_url),)
self.render(msg, css_class='error', form_contents=openid_url)
else:
if use_sreg:
self.requestRegistrationData(request)
if use_pape:
self.requestPAPEDetails(request)
trust_root = self.server.base_url
return_to = self.buildURL('process')
if request.shouldSendRedirect():
redirect_url = request.redirectURL(trust_root, return_to,
immediate=immediate)
self.send_response(302)
self.send_header('Location', redirect_url)
self.writeUserHeader()
self.end_headers()
else:
form_html = request.htmlMarkup(trust_root, return_to,
form_tag_attrs={'id': 'openid_message'}, immediate=
immediate)
self.wfile.write(bytes(form_html, 'utf-8'))
|
doVerify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n openid_url = self.query.get('openid_identifier')\n if not openid_url:\n self.render('Enter an OpenID Identifier to verify.', css_class=\n 'error', form_contents=openid_url)\n return\n immediate = 'immediate' in self.query\n use_sreg = 'use_sreg' in self.query\n use_pape = 'use_pape' in self.query\n use_stateless = 'use_stateless' in self.query\n oidconsumer = self.getConsumer(stateless=use_stateless)\n try:\n request = oidconsumer.begin(openid_url)\n except consumer.DiscoveryFailure as exc:\n fetch_error_string = 'Error in discovery: %s' % cgi.escape(str(exc))\n self.render(fetch_error_string, css_class='error', form_contents=\n openid_url)\n else:\n if request is None:\n msg = 'No OpenID services found for <code>%s</code>' % (cgi.\n escape(openid_url),)\n self.render(msg, css_class='error', form_contents=openid_url)\n else:\n if use_sreg:\n self.requestRegistrationData(request)\n if use_pape:\n self.requestPAPEDetails(request)\n trust_root = self.server.base_url\n return_to = self.buildURL('process')\n if request.shouldSendRedirect():\n redirect_url = request.redirectURL(trust_root, return_to,\n immediate=immediate)\n self.send_response(302)\n self.send_header('Location', redirect_url)\n self.writeUserHeader()\n self.end_headers()\n else:\n form_html = request.htmlMarkup(trust_root, return_to,\n form_tag_attrs={'id': 'openid_message'}, immediate=\n immediate)\n self.wfile.write(bytes(form_html, 'utf-8'))\n",
"role": "user"
},
{
"content": "doVerify",
"role": "assistant"
}
] |
def x(self, action, **query):
base = urllib.parse.urljoin(self.server.base_url, action)
return appendArgs(base, query)
|
buildURL
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, action, **query):\n base = urllib.parse.urljoin(self.server.base_url, action)\n return appendArgs(base, query)\n",
"role": "user"
},
{
"content": "buildURL",
"role": "assistant"
}
] |
def x(self, assoc):
response = OpenIDResponse(self)
response.fields.updateArgs(OPENID_NS, {'expires_in': str(assoc.
expiresIn), 'assoc_type': self.assoc_type, 'assoc_handle': assoc.
handle})
response.fields.updateArgs(OPENID_NS, self.session.answer(assoc.secret))
if not (self.session.session_type == 'no-encryption' and self.message.
isOpenID1()):
response.fields.setArg(OPENID_NS, 'session_type', self.session.
session_type)
return response
|
answer
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, assoc):\n response = OpenIDResponse(self)\n response.fields.updateArgs(OPENID_NS, {'expires_in': str(assoc.\n expiresIn), 'assoc_type': self.assoc_type, 'assoc_handle': assoc.\n handle})\n response.fields.updateArgs(OPENID_NS, self.session.answer(assoc.secret))\n if not (self.session.session_type == 'no-encryption' and self.message.\n isOpenID1()):\n response.fields.setArg(OPENID_NS, 'session_type', self.session.\n session_type)\n return response\n",
"role": "user"
},
{
"content": "answer",
"role": "assistant"
}
] |
def x(self):
if self.request.mode in BROWSER_REQUEST_MODES:
if self.fields.getOpenIDNamespace() == OPENID2_NS and len(self.
encodeToURL()) > OPENID1_URL_LIMIT:
return ENCODE_HTML_FORM
else:
return ENCODE_URL
else:
return ENCODE_KVFORM
|
whichEncoding
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.request.mode in BROWSER_REQUEST_MODES:\n if self.fields.getOpenIDNamespace() == OPENID2_NS and len(self.\n encodeToURL()) > OPENID1_URL_LIMIT:\n return ENCODE_HTML_FORM\n else:\n return ENCODE_URL\n else:\n return ENCODE_KVFORM\n",
"role": "user"
},
{
"content": "whichEncoding",
"role": "assistant"
}
] |
def x(self):
for i in range(1000):
alias = 'cust%d' % (i,)
if alias not in self.auth_level_aliases:
return alias
raise RuntimeError('Could not find an unused alias (tried 1000!)')
|
generateAlias
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for i in range(1000):\n alias = 'cust%d' % (i,)\n if alias not in self.auth_level_aliases:\n return alias\n raise RuntimeError('Could not find an unused alias (tried 1000!)')\n",
"role": "user"
},
{
"content": "generateAlias",
"role": "assistant"
}
] |
def x(self, auth_level_uri):
for alias, existing_uri in self.auth_level_aliases.items():
if auth_level_uri == existing_uri:
return alias
raise KeyError(auth_level_uri)
|
getAlias
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, auth_level_uri):\n for alias, existing_uri in self.auth_level_aliases.items():\n if auth_level_uri == existing_uri:\n return alias\n raise KeyError(auth_level_uri)\n",
"role": "user"
},
{
"content": "getAlias",
"role": "assistant"
}
] |
def x(parts):
transformers = []
filters = []
for subfilter in parts:
try:
subfilter = list(subfilter)
except TypeError:
if hasattr(subfilter, 'getServiceEndpoints'):
filters.append(subfilter)
elif hasattr(subfilter, 'fromBasicServiceEndpoint'):
transformers.append(subfilter.fromBasicServiceEndpoint)
elif isinstance(subfilter, collections.Callable):
transformers.append(subfilter)
else:
raise filter_type_error
else:
filters.append(mkCompoundFilter(subfilter))
if transformers:
filters.append(TransformFilterMaker(transformers))
if len(filters) == 1:
return filters[0]
else:
return CompoundFilter(filters)
|
mkCompoundFilter
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(parts):\n transformers = []\n filters = []\n for subfilter in parts:\n try:\n subfilter = list(subfilter)\n except TypeError:\n if hasattr(subfilter, 'getServiceEndpoints'):\n filters.append(subfilter)\n elif hasattr(subfilter, 'fromBasicServiceEndpoint'):\n transformers.append(subfilter.fromBasicServiceEndpoint)\n elif isinstance(subfilter, collections.Callable):\n transformers.append(subfilter)\n else:\n raise filter_type_error\n else:\n filters.append(mkCompoundFilter(subfilter))\n if transformers:\n filters.append(TransformFilterMaker(transformers))\n if len(filters) == 1:\n return filters[0]\n else:\n return CompoundFilter(filters)\n",
"role": "user"
},
{
"content": "mkCompoundFilter",
"role": "assistant"
}
] |
def x(cronline, venusian_category='irc3.plugins.cron'):
def x(func):
def x(context, name, ob):
obj = context.context
crons = obj.get_plugin(Crons)
if info.scope == 'class':
callback = getattr(obj.get_plugin(ob), func.__name__)
else:
callback = irc3.utils.wraps_with_context(func, obj)
crons.add_cron(cronline, callback)
info = venusian.attach(func, callback, category=venusian_category)
return func
return wrapper
|
cron
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cronline, venusian_category='irc3.plugins.cron'):\n\n def x(func):\n\n def x(context, name, ob):\n obj = context.context\n crons = obj.get_plugin(Crons)\n if info.scope == 'class':\n callback = getattr(obj.get_plugin(ob), func.__name__)\n else:\n callback = irc3.utils.wraps_with_context(func, obj)\n crons.add_cron(cronline, callback)\n info = venusian.attach(func, callback, category=venusian_category)\n return func\n return wrapper\n",
"role": "user"
},
{
"content": "cron",
"role": "assistant"
}
] |
def x(self, f):
for http_code in default_exceptions:
self.error_handler_spec[None][http_code] = f
return f
|
default_errorhandler
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, f):\n for http_code in default_exceptions:\n self.error_handler_spec[None][http_code] = f\n return f\n",
"role": "user"
},
{
"content": "default_errorhandler",
"role": "assistant"
}
] |
def x(self):
response_mimetype = None
if not request.accept_mimetypes:
response_mimetype = self.default_mimetype
else:
all_media_types_wildcard = '*/*'
for mimetype, q in request.accept_mimetypes:
if mimetype == all_media_types_wildcard:
response_mimetype = self.default_mimetype
break
if mimetype in self.response_formatters:
response_mimetype = mimetype
break
return response_mimetype
|
response_mimetype_based_on_accept_header
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n response_mimetype = None\n if not request.accept_mimetypes:\n response_mimetype = self.default_mimetype\n else:\n all_media_types_wildcard = '*/*'\n for mimetype, q in request.accept_mimetypes:\n if mimetype == all_media_types_wildcard:\n response_mimetype = self.default_mimetype\n break\n if mimetype in self.response_formatters:\n response_mimetype = mimetype\n break\n return response_mimetype\n",
"role": "user"
},
{
"content": "response_mimetype_based_on_accept_header",
"role": "assistant"
}
] |
def x(self, rv):
status = headers = None
if isinstance(rv, tuple):
rv, status, headers = rv + (None,) * (3 - len(rv))
response_mimetype = self._response_mimetype_based_on_accept_header()
if response_mimetype is None:
default_formatter = self.response_formatters.get(self.default_mimetype)
available_mimetypes = default_formatter(mimetypes=list(self.
response_formatters))
rv = self.response_class(response=available_mimetypes, status=406,
mimetype=self.default_mimetype)
elif isinstance(rv, dict):
formatter = self.response_formatters.get(response_mimetype)
rv = self.response_class(response=formatter(**rv), mimetype=
response_mimetype)
return super(ResponsiveFlask, self).make_response(rv=(rv, status, headers))
|
make_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rv):\n status = headers = None\n if isinstance(rv, tuple):\n rv, status, headers = rv + (None,) * (3 - len(rv))\n response_mimetype = self._response_mimetype_based_on_accept_header()\n if response_mimetype is None:\n default_formatter = self.response_formatters.get(self.default_mimetype)\n available_mimetypes = default_formatter(mimetypes=list(self.\n response_formatters))\n rv = self.response_class(response=available_mimetypes, status=406,\n mimetype=self.default_mimetype)\n elif isinstance(rv, dict):\n formatter = self.response_formatters.get(response_mimetype)\n rv = self.response_class(response=formatter(**rv), mimetype=\n response_mimetype)\n return super(ResponsiveFlask, self).make_response(rv=(rv, status, headers))\n",
"role": "user"
},
{
"content": "make_response",
"role": "assistant"
}
] |
def x(regexp, callback=None, iotype='in', venusian_category='irc3.dcc'):
return event(regexp, callback=callback, iotype='dcc_' + iotype,
venusian_category=venusian_category)
|
dcc_event
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(regexp, callback=None, iotype='in', venusian_category='irc3.dcc'):\n return event(regexp, callback=callback, iotype='dcc_' + iotype,\n venusian_category=venusian_category)\n",
"role": "user"
},
{
"content": "dcc_event",
"role": "assistant"
}
] |
def x(func):
def x(context, name, ob):
obj = context.context
if info.scope == 'class':
f = getattr(obj.get_plugin(ob), func.__name__)
else:
f = func
setattr(obj, f.__name__, f.__get__(obj, obj.__class__))
info = venusian.attach(func, callback, category='irc3.extend')
return func
|
extend
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(func):\n\n def x(context, name, ob):\n obj = context.context\n if info.scope == 'class':\n f = getattr(obj.get_plugin(ob), func.__name__)\n else:\n f = func\n setattr(obj, f.__name__, f.__get__(obj, obj.__class__))\n info = venusian.attach(func, callback, category='irc3.extend')\n return func\n",
"role": "user"
},
{
"content": "extend",
"role": "assistant"
}
] |
def x(self, client, message):
if client and message:
messages = utils.split_message(message, self.config.max_length)
for msg in messages:
client.fwrite(':{c.srv} NOTICE {c.nick} :{msg}', msg=msg)
|
notice
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, client, message):\n if client and message:\n messages = utils.split_message(message, self.config.max_length)\n for msg in messages:\n client.fwrite(':{c.srv} NOTICE {c.nick} :{msg}', msg=msg)\n",
"role": "user"
},
{
"content": "notice",
"role": "assistant"
}
] |
def x(self, f):
@wraps(f)
def x(client_id):
client_key = f(client_id)
return {'id': client_id, 'key': client_key, 'algorithm':
current_app.config['HAWK_ALGORITHM']}
self._client_key_loader_func = wrapped_f
return wrapped_f
|
client_key_loader
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, f):\n\n @wraps(f)\n def x(client_id):\n client_key = f(client_id)\n return {'id': client_id, 'key': client_key, 'algorithm':\n current_app.config['HAWK_ALGORITHM']}\n self._client_key_loader_func = wrapped_f\n return wrapped_f\n",
"role": "user"
},
{
"content": "client_key_loader",
"role": "assistant"
}
] |
def x(self, view_func):
@wraps(view_func)
def x(*args, **kwargs):
if current_app.config['HAWK_ENABLED']:
if current_app.config['HAWK_ALLOW_COOKIE_AUTH'] and session:
self._auth_by_cookie()
else:
self._auth_by_signature()
return view_func(*args, **kwargs)
return wrapped_view_func
|
auth_required
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, view_func):\n\n @wraps(view_func)\n def x(*args, **kwargs):\n if current_app.config['HAWK_ENABLED']:\n if current_app.config['HAWK_ALLOW_COOKIE_AUTH'] and session:\n self._auth_by_cookie()\n else:\n self._auth_by_signature()\n return view_func(*args, **kwargs)\n return wrapped_view_func\n",
"role": "user"
},
{
"content": "auth_required",
"role": "assistant"
}
] |
def x(self, response):
if 'Authorization' not in request.headers:
return response
try:
mohawk_receiver = mohawk.Receiver(credentials_map=self.
_client_key_loader_func, request_header=request.headers[
'Authorization'], url=request.url, method=request.method,
content=request.get_data(), content_type=request.mimetype,
accept_untrusted_content=current_app.config[
'HAWK_ACCEPT_UNTRUSTED_CONTENT'], localtime_offset_in_seconds=
current_app.config['HAWK_LOCALTIME_OFFSET_IN_SECONDS'],
timestamp_skew_in_seconds=current_app.config[
'HAWK_TIMESTAMP_SKEW_IN_SECONDS'])
except mohawk.exc.HawkFail:
return response
response.headers['Server-Authorization'] = mohawk_receiver.respond(content
=response.data, content_type=response.mimetype)
return response
|
sign_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n if 'Authorization' not in request.headers:\n return response\n try:\n mohawk_receiver = mohawk.Receiver(credentials_map=self.\n _client_key_loader_func, request_header=request.headers[\n 'Authorization'], url=request.url, method=request.method,\n content=request.get_data(), content_type=request.mimetype,\n accept_untrusted_content=current_app.config[\n 'HAWK_ACCEPT_UNTRUSTED_CONTENT'], localtime_offset_in_seconds=\n current_app.config['HAWK_LOCALTIME_OFFSET_IN_SECONDS'],\n timestamp_skew_in_seconds=current_app.config[\n 'HAWK_TIMESTAMP_SKEW_IN_SECONDS'])\n except mohawk.exc.HawkFail:\n return response\n response.headers['Server-Authorization'] = mohawk_receiver.respond(content\n =response.data, content_type=response.mimetype)\n return response\n",
"role": "user"
},
{
"content": "sign_response",
"role": "assistant"
}
] |
def x(self, name_or_class, mask, filepath=None, **kwargs):
if isinstance(name_or_class, type):
name = name_or_class.type
protocol = name_or_class
else:
name = name_or_class
protocol = self.protocols[name]
assert name in DCC_TYPES
if filepath:
kwargs.setdefault('limit_rate', self.config['send_limit_rate'])
kwargs['filepath'] = filepath
if protocol.type == DCCSend.type:
kwargs.setdefault('offset', 0)
kwargs.update(filename_safe=slugify(os.path.basename(filepath)),
filesize=os.path.getsize(filepath))
elif protocol.type == DCCGet.type:
try:
offset = os.path.getsize(filepath)
except OSError:
offset = 0
kwargs.setdefault('offset', offset)
kwargs.setdefault('resume', False)
kwargs.setdefault('port', None)
f = protocol(mask=mask, ip=int(self.bot.ip), bot=self.bot, loop=self.
loop, **kwargs)
if kwargs['port']:
if self.bot.config.get('dcc_sock_factory'):
sock_factory = maybedotted(self.bot.config.dcc_sock_factory)
args = dict(sock=sock_factory(self.bot, f.host, f.port))
else:
args = dict(host=f.host, port=f.port)
task = self.bot.create_task(self.loop.create_connection(f.factory,
**args))
task.add_done_callback(partial(self.created, f))
else:
task = self.bot.create_task(self.loop.create_server(f.factory,
'0.0.0.0', 0, backlog=1))
task.add_done_callback(partial(self.created, f))
return f
|
create
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name_or_class, mask, filepath=None, **kwargs):\n if isinstance(name_or_class, type):\n name = name_or_class.type\n protocol = name_or_class\n else:\n name = name_or_class\n protocol = self.protocols[name]\n assert name in DCC_TYPES\n if filepath:\n kwargs.setdefault('limit_rate', self.config['send_limit_rate'])\n kwargs['filepath'] = filepath\n if protocol.type == DCCSend.type:\n kwargs.setdefault('offset', 0)\n kwargs.update(filename_safe=slugify(os.path.basename(filepath)),\n filesize=os.path.getsize(filepath))\n elif protocol.type == DCCGet.type:\n try:\n offset = os.path.getsize(filepath)\n except OSError:\n offset = 0\n kwargs.setdefault('offset', offset)\n kwargs.setdefault('resume', False)\n kwargs.setdefault('port', None)\n f = protocol(mask=mask, ip=int(self.bot.ip), bot=self.bot, loop=self.\n loop, **kwargs)\n if kwargs['port']:\n if self.bot.config.get('dcc_sock_factory'):\n sock_factory = maybedotted(self.bot.config.dcc_sock_factory)\n args = dict(sock=sock_factory(self.bot, f.host, f.port))\n else:\n args = dict(host=f.host, port=f.port)\n task = self.bot.create_task(self.loop.create_connection(f.factory,\n **args))\n task.add_done_callback(partial(self.created, f))\n else:\n task = self.bot.create_task(self.loop.create_server(f.factory,\n '0.0.0.0', 0, backlog=1))\n task.add_done_callback(partial(self.created, f))\n return f\n",
"role": "user"
},
{
"content": "create",
"role": "assistant"
}
] |
def x(self, mask, filename, port, pos):
self.connections['send']['masks'][mask][port].offset = pos
message = 'DCC ACCEPT %s %d %d' % (filename, port, pos)
self.bot.ctcp(mask, message)
|
resume
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, mask, filename, port, pos):\n self.connections['send']['masks'][mask][port].offset = pos\n message = 'DCC ACCEPT %s %d %d' % (filename, port, pos)\n self.bot.ctcp(mask, message)\n",
"role": "user"
},
{
"content": "resume",
"role": "assistant"
}
] |
def x(self, name_or_class, mask):
if isinstance(name_or_class, type):
name = name_or_class.type
else:
name = name_or_class
info = self.connections[name]
limit = self.config[name + '_limit']
if limit and info['total'] >= limit:
msg = (
'Sorry, there is too much DCC %s active. Please try again later.' %
name.upper())
self.bot.notice(mask, msg)
return False
if mask not in info['masks']:
return True
limit = self.config[name + '_user_limit']
if limit and info['masks'][mask] >= limit:
msg = (
'Sorry, you have too many DCC %s active. Close the other connection(s) or wait a few seconds and try again.'
% name.upper())
self.bot.notice(mask, msg)
return False
return True
|
is_allowed
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name_or_class, mask):\n if isinstance(name_or_class, type):\n name = name_or_class.type\n else:\n name = name_or_class\n info = self.connections[name]\n limit = self.config[name + '_limit']\n if limit and info['total'] >= limit:\n msg = (\n 'Sorry, there is too much DCC %s active. Please try again later.' %\n name.upper())\n self.bot.notice(mask, msg)\n return False\n if mask not in info['masks']:\n return True\n limit = self.config[name + '_user_limit']\n if limit and info['masks'][mask] >= limit:\n msg = (\n 'Sorry, you have too many DCC %s active. Close the other connection(s) or wait a few seconds and try again.'\n % name.upper())\n self.bot.notice(mask, msg)\n return False\n return True\n",
"role": "user"
},
{
"content": "is_allowed",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.