source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(name, query, config, context=None): endpoint = config.get('replay_endpoints', {}).get(name, None) if not endpoint: raise IOError('No appropriate replay endpoint found for {0}'.format (name)) if not context: context = zmq.Context(config['io_threads']) socket = context.socket(zmq.REQ) try: socket.connect(endpoint) except zmq.ZMQError as e: raise IOError("Error when connecting to the replay endpoint: '{0}'" .format(str(e))) socket.send(fedmsg.encoding.dumps(query).encode('utf-8')) msgs = socket.recv_multipart() socket.close() for m in msgs: try: yield fedmsg.encoding.loads(m.decode('utf-8')) except ValueError: raise ValueError(m)
get_replay
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(name, query, config, context=None):\n endpoint = config.get('replay_endpoints', {}).get(name, None)\n if not endpoint:\n raise IOError('No appropriate replay endpoint found for {0}'.format\n (name))\n if not context:\n context = zmq.Context(config['io_threads'])\n socket = context.socket(zmq.REQ)\n try:\n socket.connect(endpoint)\n except zmq.ZMQError as e:\n raise IOError(\"Error when connecting to the replay endpoint: '{0}'\"\n .format(str(e)))\n socket.send(fedmsg.encoding.dumps(query).encode('utf-8'))\n msgs = socket.recv_multipart()\n socket.close()\n for m in msgs:\n try:\n yield fedmsg.encoding.loads(m.decode('utf-8'))\n except ValueError:\n raise ValueError(m)\n", "role": "user" }, { "content": "get_replay", "role": "assistant" } ]
def x(name, names_to_seq_id, msg, config, context=None): prev_seq_id = names_to_seq_id.get(name, None) cur_seq_id = msg.get('seq_id', None) if prev_seq_id is None or cur_seq_id is None: return [msg] if cur_seq_id <= prev_seq_id: return [] if cur_seq_id == prev_seq_id + 1 or prev_seq_id < 0: ret = [msg] else: ret = list(get_replay(name, {'seq_id_range': (prev_seq_id, cur_seq_id)}, config, context)) if len(ret) == 0 or ret[-1]['seq_id'] < msg['seq_id']: ret.append(msg) names_to_seq_id[name] = cur_seq_id return ret
check_for_replay
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(name, names_to_seq_id, msg, config, context=None):\n prev_seq_id = names_to_seq_id.get(name, None)\n cur_seq_id = msg.get('seq_id', None)\n if prev_seq_id is None or cur_seq_id is None:\n return [msg]\n if cur_seq_id <= prev_seq_id:\n return []\n if cur_seq_id == prev_seq_id + 1 or prev_seq_id < 0:\n ret = [msg]\n else:\n ret = list(get_replay(name, {'seq_id_range': (prev_seq_id,\n cur_seq_id)}, config, context))\n if len(ret) == 0 or ret[-1]['seq_id'] < msg['seq_id']:\n ret.append(msg)\n names_to_seq_id[name] = cur_seq_id\n return ret\n", "role": "user" }, { "content": "check_for_replay", "role": "assistant" } ]
def x(message): if not ('source_name' in message and 'source_version' in message): return message message = message.copy() del message['source_name'] del message['source_version'] if 'headers' in message and not message['headers']: del message['headers'] if 'timestamp' in message: message['timestamp'] = int(message['timestamp']) return message
fix_datagrepper_message
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(message):\n if not ('source_name' in message and 'source_version' in message):\n return message\n message = message.copy()\n del message['source_name']\n del message['source_version']\n if 'headers' in message and not message['headers']:\n del message['headers']\n if 'timestamp' in message:\n message['timestamp'] = int(message['timestamp'])\n return message\n", "role": "user" }, { "content": "fix_datagrepper_message", "role": "assistant" } ]
def x(topic, signer, routing_policy, nitpicky=False): if topic in routing_policy: if signer in routing_policy[topic]: return True else: _log.error( 'Authorization/routing_policy error. Topic %r. Signer %r.' % (topic, signer)) return False elif nitpicky: _log.error('Authorization/routing_policy underspecified.') return False else: _log.warning( 'No routing policy defined for "{t}" but routing_nitpicky is False so the message is being treated as authorized.' .format(t=topic)) return True
validate_policy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(topic, signer, routing_policy, nitpicky=False):\n if topic in routing_policy:\n if signer in routing_policy[topic]:\n return True\n else:\n _log.error(\n 'Authorization/routing_policy error. Topic %r. Signer %r.' %\n (topic, signer))\n return False\n elif nitpicky:\n _log.error('Authorization/routing_policy underspecified.')\n return False\n else:\n _log.warning(\n 'No routing policy defined for \"{t}\" but routing_nitpicky is False so the message is being treated as authorized.'\n .format(t=topic))\n return True\n", "role": "user" }, { "content": "validate_policy", "role": "assistant" } ]
def x(ca_location, crl_location=None, invalidate_cache=False): if crl_location is None: crl_location = '' try: if invalidate_cache: del _cached_certificates[ca_location + crl_location] else: return _cached_certificates[ca_location + crl_location] except KeyError: pass ca, crl = None, None if ca_location: ca = _load_certificate(ca_location) if crl_location: crl = _load_certificate(crl_location) _cached_certificates[ca_location + crl_location] = ca, crl return ca, crl
load_certificates
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(ca_location, crl_location=None, invalidate_cache=False):\n if crl_location is None:\n crl_location = ''\n try:\n if invalidate_cache:\n del _cached_certificates[ca_location + crl_location]\n else:\n return _cached_certificates[ca_location + crl_location]\n except KeyError:\n pass\n ca, crl = None, None\n if ca_location:\n ca = _load_certificate(ca_location)\n if crl_location:\n crl = _load_certificate(crl_location)\n _cached_certificates[ca_location + crl_location] = ca, crl\n return ca, crl\n", "role": "user" }, { "content": "load_certificates", "role": "assistant" } ]
def x(location): if location.startswith('https://'): _log.info('Downloading x509 certificate from %s', location) with requests.Session() as session: session.mount('https://', requests.adapters.HTTPAdapter( max_retries=3)) response = session.get(location, timeout=30) response.raise_for_status() return response.text else: _log.info('Loading local x509 certificate from %s', location) with open(location, 'rb') as fd: return fd.read().decode('ascii')
load_certificate
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(location):\n if location.startswith('https://'):\n _log.info('Downloading x509 certificate from %s', location)\n with requests.Session() as session:\n session.mount('https://', requests.adapters.HTTPAdapter(\n max_retries=3))\n response = session.get(location, timeout=30)\n response.raise_for_status()\n return response.text\n else:\n _log.info('Loading local x509 certificate from %s', location)\n with open(location, 'rb') as fd:\n return fd.read().decode('ascii')\n", "role": "user" }, { "content": "load_certificate", "role": "assistant" } ]
def x(): config_paths = [] if os.environ.get('FEDMSG_CONFIG'): config_location = os.environ['FEDMSG_CONFIG'] else: config_location = '/etc/fedmsg.d' if os.path.isfile(config_location): config_paths.append(config_location) elif os.path.isdir(config_location): possible_config_files = [os.path.join(config_location, p) for p in os.listdir(config_location) if p.endswith('.py')] for p in possible_config_files: if os.path.isfile(p): config_paths.append(p) if not config_paths: _log.info('No configuration files found in %s', config_location) return config_paths
get_config_files
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n config_paths = []\n if os.environ.get('FEDMSG_CONFIG'):\n config_location = os.environ['FEDMSG_CONFIG']\n else:\n config_location = '/etc/fedmsg.d'\n if os.path.isfile(config_location):\n config_paths.append(config_location)\n elif os.path.isdir(config_location):\n possible_config_files = [os.path.join(config_location, p) for p in\n os.listdir(config_location) if p.endswith('.py')]\n for p in possible_config_files:\n if os.path.isfile(p):\n config_paths.append(p)\n if not config_paths:\n _log.info('No configuration files found in %s', config_location)\n return config_paths\n", "role": "user" }, { "content": "get_config_files", "role": "assistant" } ]
def x(t): def x(setting): if setting is not None and not isinstance(setting, t): raise ValueError('"{}" is not "{}"'.format(setting, t)) return setting return _validate
validate_none_or_type
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(t):\n\n def x(setting):\n if setting is not None and not isinstance(setting, t):\n raise ValueError('\"{}\" is not \"{}\"'.format(setting, t))\n return setting\n return _validate\n", "role": "user" }, { "content": "validate_none_or_type", "role": "assistant" } ]
def x(value): if isinstance(value, six.text_type): if value.strip().lower() == 'true': value = True elif value.strip().lower() == 'false': value = False else: raise ValueError('"{}" must be a boolean ("True" or "False")'. format(value)) if not isinstance(value, bool): raise ValueError('"{}" is not a boolean value.'.format(value)) return value
validate_bool
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(value):\n if isinstance(value, six.text_type):\n if value.strip().lower() == 'true':\n value = True\n elif value.strip().lower() == 'false':\n value = False\n else:\n raise ValueError('\"{}\" must be a boolean (\"True\" or \"False\")'.\n format(value))\n if not isinstance(value, bool):\n raise ValueError('\"{}\" is not a boolean value.'.format(value))\n return value\n", "role": "user" }, { "content": "validate_bool", "role": "assistant" } ]
def x(extra_args=None, doc=None, filenames=None, invalidate_cache=False, fedmsg_command=False, disable_defaults=False): warnings.warn( 'Using "load_config" is deprecated and will be removed in a future release; use the "fedmsg.config.conf" dictionary instead.' , DeprecationWarning) global __cache if invalidate_cache: __cache = {} if __cache: return __cache extra_args = extra_args or [] doc = doc or '' if not disable_defaults: config = copy.deepcopy(defaults) else: config = {} config.update(_process_config_file(filenames=filenames)) if fedmsg_command: config.update(_process_arguments(extra_args, doc, config)) if not filenames and config.get('config_filename', None): return load_config(extra_args, doc, filenames=[config[ 'config_filename']], fedmsg_command=fedmsg_command, disable_defaults=disable_defaults) if config.get('print_config'): print(pretty_dumps(config)) sys.exit(0) if not disable_defaults and 'endpoints' not in config: raise ValueError("No config value 'endpoints' found.") if not isinstance(config.get('endpoints', {}), dict): raise ValueError("The 'endpoints' config value must be a dict.") if 'endpoints' in config: config['endpoints'] = dict([(k, list(iterate(v))) for k, v in config['endpoints'].items()]) if 'srv_endpoints' in config and len(config['srv_endpoints']) > 0: from dns.resolver import query, NXDOMAIN, Timeout, NoNameservers for e in config['srv_endpoints']: urls = [] try: records = query('_fedmsg._tcp.{0}'.format(e), 'SRV') except NXDOMAIN: warnings.warn('There is no appropriate SRV records ' + 'for {0}'.format(e)) continue except Timeout: warnings.warn('The DNS query for the SRV records of' + ' {0} timed out.'.format(e)) continue except NoNameservers: warnings.warn('No name server is available, please ' + 'check the configuration') break for rec in records: urls.append('tcp://{hostname}:{port}'.format(hostname=rec. target.to_text(), port=rec.port)) config['endpoints'][e] = list(iterate(urls)) if 'topic_prefix_re' not in config and 'topic_prefix' in config: config['topic_prefix_re'] = config['topic_prefix'].replace('.', '\\.' ) + '\\.[^\\W\\d_]+' __cache = config return config
load_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(extra_args=None, doc=None, filenames=None, invalidate_cache=False,\n fedmsg_command=False, disable_defaults=False):\n warnings.warn(\n 'Using \"load_config\" is deprecated and will be removed in a future release; use the \"fedmsg.config.conf\" dictionary instead.'\n , DeprecationWarning)\n global __cache\n if invalidate_cache:\n __cache = {}\n if __cache:\n return __cache\n extra_args = extra_args or []\n doc = doc or ''\n if not disable_defaults:\n config = copy.deepcopy(defaults)\n else:\n config = {}\n config.update(_process_config_file(filenames=filenames))\n if fedmsg_command:\n config.update(_process_arguments(extra_args, doc, config))\n if not filenames and config.get('config_filename', None):\n return load_config(extra_args, doc, filenames=[config[\n 'config_filename']], fedmsg_command=fedmsg_command,\n disable_defaults=disable_defaults)\n if config.get('print_config'):\n print(pretty_dumps(config))\n sys.exit(0)\n if not disable_defaults and 'endpoints' not in config:\n raise ValueError(\"No config value 'endpoints' found.\")\n if not isinstance(config.get('endpoints', {}), dict):\n raise ValueError(\"The 'endpoints' config value must be a dict.\")\n if 'endpoints' in config:\n config['endpoints'] = dict([(k, list(iterate(v))) for k, v in\n config['endpoints'].items()])\n if 'srv_endpoints' in config and len(config['srv_endpoints']) > 0:\n from dns.resolver import query, NXDOMAIN, Timeout, NoNameservers\n for e in config['srv_endpoints']:\n urls = []\n try:\n records = query('_fedmsg._tcp.{0}'.format(e), 'SRV')\n except NXDOMAIN:\n warnings.warn('There is no appropriate SRV records ' +\n 'for {0}'.format(e))\n continue\n except Timeout:\n warnings.warn('The DNS query for the SRV records of' +\n ' {0} timed out.'.format(e))\n continue\n except NoNameservers:\n warnings.warn('No name server is available, please ' +\n 'check the configuration')\n break\n for rec in records:\n urls.append('tcp://{hostname}:{port}'.format(hostname=rec.\n target.to_text(), port=rec.port))\n config['endpoints'][e] = list(iterate(urls))\n if 'topic_prefix_re' not in config and 'topic_prefix' in config:\n config['topic_prefix_re'] = config['topic_prefix'].replace('.', '\\\\.'\n ) + '\\\\.[^\\\\W\\\\d_]+'\n __cache = config\n return config\n", "role": "user" }, { "content": "load_config", "role": "assistant" } ]
def x(declared_args, doc, config=None, prog=None): config = config or copy.deepcopy(defaults) prog = prog or sys.argv[0] parser = argparse.ArgumentParser(description=textwrap.dedent(doc), formatter_class=argparse.RawDescriptionHelpFormatter, prog=prog) parser.add_argument('--io-threads', dest='io_threads', type=int, help= 'Number of io threads for 0mq to use', default=config['io_threads']) parser.add_argument('--topic-prefix', dest='topic_prefix', type=str, help='Prefix for the topic of each message sent.', default=config[ 'topic_prefix']) parser.add_argument('--post-init-sleep', dest='post_init_sleep', type= float, help='Number of seconds to sleep after initializing.', default=config['post_init_sleep']) parser.add_argument('--config-filename', dest='config_filename', help= 'Config file to use.', default=None) parser.add_argument('--print-config', dest='print_config', help= 'Simply print out the configuration and exit. No action taken.', default=False, action='store_true') parser.add_argument('--timeout', dest='timeout', help= 'Timeout in seconds for any blocking zmq operations.', type=float, default=config['timeout']) parser.add_argument('--high-water-mark', dest='high_water_mark', help= 'Limit on the number of messages in the queue before blocking.', type=int, default=config['high_water_mark']) parser.add_argument('--linger', dest='zmq_linger', help= 'Number of milliseconds to wait before timing out connections.', type=int, default=config['zmq_linger']) for args, kwargs in declared_args: if all([(k in kwargs) for k in ['dest', 'default']]): kwargs['default'] = config.get(kwargs['dest'], kwargs['default']) parser.add_argument(*args, **kwargs) return parser
build_parser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(declared_args, doc, config=None, prog=None):\n config = config or copy.deepcopy(defaults)\n prog = prog or sys.argv[0]\n parser = argparse.ArgumentParser(description=textwrap.dedent(doc),\n formatter_class=argparse.RawDescriptionHelpFormatter, prog=prog)\n parser.add_argument('--io-threads', dest='io_threads', type=int, help=\n 'Number of io threads for 0mq to use', default=config['io_threads'])\n parser.add_argument('--topic-prefix', dest='topic_prefix', type=str,\n help='Prefix for the topic of each message sent.', default=config[\n 'topic_prefix'])\n parser.add_argument('--post-init-sleep', dest='post_init_sleep', type=\n float, help='Number of seconds to sleep after initializing.',\n default=config['post_init_sleep'])\n parser.add_argument('--config-filename', dest='config_filename', help=\n 'Config file to use.', default=None)\n parser.add_argument('--print-config', dest='print_config', help=\n 'Simply print out the configuration and exit. No action taken.',\n default=False, action='store_true')\n parser.add_argument('--timeout', dest='timeout', help=\n 'Timeout in seconds for any blocking zmq operations.', type=float,\n default=config['timeout'])\n parser.add_argument('--high-water-mark', dest='high_water_mark', help=\n 'Limit on the number of messages in the queue before blocking.',\n type=int, default=config['high_water_mark'])\n parser.add_argument('--linger', dest='zmq_linger', help=\n 'Number of milliseconds to wait before timing out connections.',\n type=int, default=config['zmq_linger'])\n for args, kwargs in declared_args:\n if all([(k in kwargs) for k in ['dest', 'default']]):\n kwargs['default'] = config.get(kwargs['dest'], kwargs['default'])\n parser.add_argument(*args, **kwargs)\n return parser\n", "role": "user" }, { "content": "build_parser", "role": "assistant" } ]
def x(directory): try: return sorted([os.path.join(directory, fname) for fname in os. listdir(directory) if fname.endswith('.py')]) except OSError: return []
gather_configs_in
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(directory):\n try:\n return sorted([os.path.join(directory, fname) for fname in os.\n listdir(directory) if fname.endswith('.py')])\n except OSError:\n return []\n", "role": "user" }, { "content": "gather_configs_in", "role": "assistant" } ]
def x(d1, d2): for k in set(d1).intersection(d2): if isinstance(d1[k], dict) and isinstance(d2[k], dict): d1[k] = _recursive_update(d1[k], d2[k]) else: d1[k] = d2[k] for k in set(d2).difference(d1): d1[k] = d2[k] return d1
recursive_update
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(d1, d2):\n for k in set(d1).intersection(d2):\n if isinstance(d1[k], dict) and isinstance(d2[k], dict):\n d1[k] = _recursive_update(d1[k], d2[k])\n else:\n d1[k] = d2[k]\n for k in set(d2).difference(d1):\n d1[k] = d2[k]\n return d1\n", "role": "user" }, { "content": "recursive_update", "role": "assistant" } ]
def x(fname, variables): with open(fname) as f: code = compile(f.read(), fname, 'exec') exec(code, variables)
execfile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(fname, variables):\n with open(fname) as f:\n code = compile(f.read(), fname, 'exec')\n exec(code, variables)\n", "role": "user" }, { "content": "execfile", "role": "assistant" } ]
def x(self, *args, **kw): if not self._loaded: self.load_config() return super(FedmsgConfig, self).get(*args, **kw)
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *args, **kw):\n if not self._loaded:\n self.load_config()\n return super(FedmsgConfig, self).get(*args, **kw)\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, *args, **kw): if not self._loaded: self.load_config() return super(FedmsgConfig, self).copy(*args, **kw)
copy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *args, **kw):\n if not self._loaded:\n self.load_config()\n return super(FedmsgConfig, self).copy(*args, **kw)\n", "role": "user" }, { "content": "copy", "role": "assistant" } ]
def x(self, settings=None): self._load_defaults() if settings: self.update(settings) else: config_paths = _get_config_files() for p in config_paths: conf = _process_config_file([p]) self.update(conf) self._loaded = True self._validate()
load_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, settings=None):\n self._load_defaults()\n if settings:\n self.update(settings)\n else:\n config_paths = _get_config_files()\n for p in config_paths:\n conf = _process_config_file([p])\n self.update(conf)\n self._loaded = True\n self._validate()\n", "role": "user" }, { "content": "load_config", "role": "assistant" } ]
def x(self): for k, v in self._defaults.items(): self[k] = v['default']
load_defaults
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n for k, v in self._defaults.items():\n self[k] = v['default']\n", "role": "user" }, { "content": "load_defaults", "role": "assistant" } ]
def x(self): errors = [] for k in self._defaults.keys(): try: validator = self._defaults[k]['validator'] if validator is not None: self[k] = validator(self[k]) except ValueError as e: errors.append('\t{}: {}'.format(k, six.text_type(e))) if errors: raise ValueError('Invalid configuration values were set: \n{}'. format('\n'.join(errors)))
validate
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n errors = []\n for k in self._defaults.keys():\n try:\n validator = self._defaults[k]['validator']\n if validator is not None:\n self[k] = validator(self[k])\n except ValueError as e:\n errors.append('\\t{}: {}'.format(k, six.text_type(e)))\n if errors:\n raise ValueError('Invalid configuration values were set: \\n{}'.\n format('\\n'.join(errors)))\n", "role": "user" }, { "content": "validate", "role": "assistant" } ]
def x(**config): global processors if processors: return import pkg_resources processors = [] for processor in pkg_resources.iter_entry_points('fedmsg.meta'): try: processors.append(processor.load()(_, **config)) except Exception as e: log.warn('Failed to load %r processor.' % processor.name) log.exception(e) processors.append(DefaultProcessor(_, **config)) if len(processors) == 3: log.warn('No fedmsg.meta plugins found. fedmsg.meta.msg2* crippled')
make_processors
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(**config):\n global processors\n if processors:\n return\n import pkg_resources\n processors = []\n for processor in pkg_resources.iter_entry_points('fedmsg.meta'):\n try:\n processors.append(processor.load()(_, **config))\n except Exception as e:\n log.warn('Failed to load %r processor.' % processor.name)\n log.exception(e)\n processors.append(DefaultProcessor(_, **config))\n if len(processors) == 3:\n log.warn('No fedmsg.meta plugins found. fedmsg.meta.msg2* crippled')\n", "role": "user" }, { "content": "make_processors", "role": "assistant" } ]
def x(msg, **config): for processor in processors: if processor.handle_msg(msg, **config) is not None: return processor else: return processors[-1]
msg2processor
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg, **config):\n for processor in processors:\n if processor.handle_msg(msg, **config) is not None:\n return processor\n else:\n return processors[-1]\n", "role": "user" }, { "content": "msg2processor", "role": "assistant" } ]
def x(cls): def x(f): @functools.wraps(f) def x(msg, **config): try: return f(msg, **config) except KeyError: log.exception('%r failed on %r' % (f, msg.get('msg_id'))) return cls() return __wrapper return _wrapper
graceful
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls):\n\n def x(f):\n\n @functools.wraps(f)\n def x(msg, **config):\n try:\n return f(msg, **config)\n except KeyError:\n log.exception('%r failed on %r' % (f, msg.get('msg_id')))\n return cls()\n return __wrapper\n return _wrapper\n", "role": "user" }, { "content": "graceful", "role": "assistant" } ]
def x(messages, subject=None, lexers=False, **config): for processor in processors: messages = processor.conglomerate(messages, subject=subject, **config) for i, message in enumerate(messages): if 'msg_ids' in message: continue messages[i] = BaseConglomerator.produce_template([message], subject =subject, lexers=lexers, **config) messages[i].update({'link': msg2link(message, **config), 'subtitle': msg2subtitle(message, **config), 'subjective': msg2subjective( message, subject=subject, **config), 'secondary_icon': msg2secondary_icon(message, **config)}) return messages
conglomerate
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(messages, subject=None, lexers=False, **config):\n for processor in processors:\n messages = processor.conglomerate(messages, subject=subject, **config)\n for i, message in enumerate(messages):\n if 'msg_ids' in message:\n continue\n messages[i] = BaseConglomerator.produce_template([message], subject\n =subject, lexers=lexers, **config)\n messages[i].update({'link': msg2link(message, **config), 'subtitle':\n msg2subtitle(message, **config), 'subjective': msg2subjective(\n message, subject=subject, **config), 'secondary_icon':\n msg2secondary_icon(message, **config)})\n return messages\n", "role": "user" }, { "content": "conglomerate", "role": "assistant" } ]
def x(msg, processor, **config): fmt = u'{title} -- {subtitle} {link}' title = msg2title(msg, **config) subtitle = processor.subtitle(msg, **config) link = processor.link(msg, **config) or '' return fmt.format(**locals())
msg2repr
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg, processor, **config):\n fmt = u'{title} -- {subtitle} {link}'\n title = msg2title(msg, **config)\n subtitle = processor.subtitle(msg, **config)\n link = processor.link(msg, **config) or ''\n return fmt.format(**locals())\n", "role": "user" }, { "content": "msg2repr", "role": "assistant" } ]
def x(msg, processor, **config): result = processor.long_form(msg, **config) if not result: result = processor.subtitle(msg, **config) return result
msg2long_form
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg, processor, **config):\n result = processor.long_form(msg, **config)\n if not result:\n result = processor.subtitle(msg, **config)\n return result\n", "role": "user" }, { "content": "msg2long_form", "role": "assistant" } ]
def x(msg, processor=None, legacy=False, **config): return processor.usernames(msg, **config)
msg2usernames
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg, processor=None, legacy=False, **config):\n return processor.usernames(msg, **config)\n", "role": "user" }, { "content": "msg2usernames", "role": "assistant" } ]
def x(msg, processor=None, legacy=False, **config): if processor.agent is not NotImplemented: return processor.agent(msg, **config) else: usernames = processor.usernames(msg, **config) if usernames: return usernames.pop() return None
msg2agent
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg, processor=None, legacy=False, **config):\n if processor.agent is not NotImplemented:\n return processor.agent(msg, **config)\n else:\n usernames = processor.usernames(msg, **config)\n if usernames:\n return usernames.pop()\n return None\n", "role": "user" }, { "content": "msg2agent", "role": "assistant" } ]
def x(msg, processor, subject, **config): text = processor.subjective(msg, subject, **config) if not text: text = processor.subtitle(msg, **config) return text
msg2subjective
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg, processor, subject, **config):\n text = processor.subjective(msg, subject, **config)\n if not text:\n text = processor.subtitle(msg, **config)\n return text\n", "role": "user" }, { "content": "msg2subjective", "role": "assistant" } ]
def x(self, command, message): proc = subprocess.Popen(["echo '%s' | %s" % (fedmsg.encoding.dumps( message), command)], shell=True, executable='/bin/bash') return proc.wait()
run_command
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, command, message):\n proc = subprocess.Popen([\"echo '%s' | %s\" % (fedmsg.encoding.dumps(\n message), command)], shell=True, executable='/bin/bash')\n return proc.wait()\n", "role": "user" }, { "content": "run_command", "role": "assistant" } ]
def x(message, ssldir=None, certname=None, **config): if ssldir is None or certname is None: error = 'You must set the ssldir and certname keyword arguments.' raise ValueError(error) message['crypto'] = 'x509' certificate = M2Crypto.X509.load_cert('%s/%s.crt' % (ssldir, certname) ).as_pem() rsa_private = M2Crypto.RSA.load_key('%s/%s.key' % (ssldir, certname)) digest = M2Crypto.EVP.MessageDigest('sha1') digest.update(fedmsg.encoding.dumps(message)) signature = rsa_private.sign(digest.digest()) return dict(message.items() + [('signature', signature.encode('base64') .decode('ascii')), ('certificate', certificate.encode('base64'). decode('ascii'))])
m2crypto_sign
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(message, ssldir=None, certname=None, **config):\n if ssldir is None or certname is None:\n error = 'You must set the ssldir and certname keyword arguments.'\n raise ValueError(error)\n message['crypto'] = 'x509'\n certificate = M2Crypto.X509.load_cert('%s/%s.crt' % (ssldir, certname)\n ).as_pem()\n rsa_private = M2Crypto.RSA.load_key('%s/%s.key' % (ssldir, certname))\n digest = M2Crypto.EVP.MessageDigest('sha1')\n digest.update(fedmsg.encoding.dumps(message))\n signature = rsa_private.sign(digest.digest())\n return dict(message.items() + [('signature', signature.encode('base64')\n .decode('ascii')), ('certificate', certificate.encode('base64').\n decode('ascii'))])\n", "role": "user" }, { "content": "m2crypto_sign", "role": "assistant" } ]
def x(message, ssldir=None, **config): if ssldir is None: raise ValueError('You must set the ssldir keyword argument.') def x(reason): _log.warn('Failed validation. %s' % reason) return False for field in ['signature', 'certificate']: if field not in message: return fail('No %r field found.' % field) if not isinstance(message[field], six.text_type): _log.error('msg[%r] is not a unicode string' % field) try: message[field] = message[field].decode('utf-8') except UnicodeError as e: _log.error("Unable to decode the message '%s' field: %s", field, str(e)) return False signature = message['signature'].decode('base64') certificate = message['certificate'].decode('base64') message = fedmsg.crypto.strip_credentials(message) cert = M2Crypto.X509.load_cert_string(certificate) ca_location = config.get('ca_cert_location', 'https://fedoraproject.org/fedmsg/ca.crt') crl_location = config.get('crl_location', 'https://fedoraproject.org/fedmsg/crl.pem') fd, cafile = tempfile.mkstemp() try: ca_certificate, crl = utils.load_certificates(ca_location, crl_location ) os.write(fd, ca_certificate.encode('ascii')) os.fsync(fd) ctx = m2ext.SSL.Context() ctx.load_verify_locations(cafile=cafile) if not ctx.validate_certificate(cert): ca_certificate, crl = utils.load_certificates(ca_location, crl_location, invalidate_cache=True) with open(cafile, 'w') as f: f.write(ca_certificate) ctx = m2ext.SSL.Context() ctx.load_verify_locations(cafile=cafile) if not ctx.validate_certificate(cert): return fail('X509 certificate is not valid.') except (IOError, RequestException) as e: _log.error(str(e)) return False finally: os.close(fd) os.remove(cafile) if crl: try: fd, crlfile = tempfile.mkstemp(text=True) os.write(fd, crl.encode('ascii')) os.fsync(fd) crl = M2Crypto.X509.load_crl(crlfile) finally: os.close(fd) os.remove(crlfile) revoked_serials = [long(line.split(': ')[1].strip(), base=16) for line in crl.as_text().split('\n') if 'Serial Number:' in line] if cert.get_serial_number() in revoked_serials: subject = cert.get_subject() signer = '(no CN)' if subject.nid.get('CN'): entry = subject.get_entries_by_nid(subject.nid['CN'])[0] if entry: signer = entry.get_data().as_text() return fail('X509 cert %r, %r is in the Revocation List (CRL)' % (signer, cert.get_serial_number())) rsa_public = cert.get_pubkey().get_rsa() digest = M2Crypto.EVP.MessageDigest('sha1') digest.update(fedmsg.encoding.dumps(message)) try: if not rsa_public.verify(digest.digest(), signature): raise M2Crypto.RSA.RSAError('RSA signature failed to validate.') except M2Crypto.RSA.RSAError as e: return fail(str(e)) routing_policy = config.get('routing_policy', {}) subject = cert.get_subject() signer = subject.get_entries_by_nid(subject.nid['CN'])[0].get_data( ).as_text() return utils.validate_policy(message.get('topic'), signer, routing_policy, config.get('routing_nitpicky', False))
m2crypto_validate
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(message, ssldir=None, **config):\n if ssldir is None:\n raise ValueError('You must set the ssldir keyword argument.')\n\n def x(reason):\n _log.warn('Failed validation. %s' % reason)\n return False\n for field in ['signature', 'certificate']:\n if field not in message:\n return fail('No %r field found.' % field)\n if not isinstance(message[field], six.text_type):\n _log.error('msg[%r] is not a unicode string' % field)\n try:\n message[field] = message[field].decode('utf-8')\n except UnicodeError as e:\n _log.error(\"Unable to decode the message '%s' field: %s\",\n field, str(e))\n return False\n signature = message['signature'].decode('base64')\n certificate = message['certificate'].decode('base64')\n message = fedmsg.crypto.strip_credentials(message)\n cert = M2Crypto.X509.load_cert_string(certificate)\n ca_location = config.get('ca_cert_location',\n 'https://fedoraproject.org/fedmsg/ca.crt')\n crl_location = config.get('crl_location',\n 'https://fedoraproject.org/fedmsg/crl.pem')\n fd, cafile = tempfile.mkstemp()\n try:\n ca_certificate, crl = utils.load_certificates(ca_location, crl_location\n )\n os.write(fd, ca_certificate.encode('ascii'))\n os.fsync(fd)\n ctx = m2ext.SSL.Context()\n ctx.load_verify_locations(cafile=cafile)\n if not ctx.validate_certificate(cert):\n ca_certificate, crl = utils.load_certificates(ca_location,\n crl_location, invalidate_cache=True)\n with open(cafile, 'w') as f:\n f.write(ca_certificate)\n ctx = m2ext.SSL.Context()\n ctx.load_verify_locations(cafile=cafile)\n if not ctx.validate_certificate(cert):\n return fail('X509 certificate is not valid.')\n except (IOError, RequestException) as e:\n _log.error(str(e))\n return False\n finally:\n os.close(fd)\n os.remove(cafile)\n if crl:\n try:\n fd, crlfile = tempfile.mkstemp(text=True)\n os.write(fd, crl.encode('ascii'))\n os.fsync(fd)\n crl = M2Crypto.X509.load_crl(crlfile)\n finally:\n os.close(fd)\n os.remove(crlfile)\n revoked_serials = [long(line.split(': ')[1].strip(), base=16) for\n line in crl.as_text().split('\\n') if 'Serial Number:' in line]\n if cert.get_serial_number() in revoked_serials:\n subject = cert.get_subject()\n signer = '(no CN)'\n if subject.nid.get('CN'):\n entry = subject.get_entries_by_nid(subject.nid['CN'])[0]\n if entry:\n signer = entry.get_data().as_text()\n return fail('X509 cert %r, %r is in the Revocation List (CRL)' %\n (signer, cert.get_serial_number()))\n rsa_public = cert.get_pubkey().get_rsa()\n digest = M2Crypto.EVP.MessageDigest('sha1')\n digest.update(fedmsg.encoding.dumps(message))\n try:\n if not rsa_public.verify(digest.digest(), signature):\n raise M2Crypto.RSA.RSAError('RSA signature failed to validate.')\n except M2Crypto.RSA.RSAError as e:\n return fail(str(e))\n routing_policy = config.get('routing_policy', {})\n subject = cert.get_subject()\n signer = subject.get_entries_by_nid(subject.nid['CN'])[0].get_data(\n ).as_text()\n return utils.validate_policy(message.get('topic'), signer,\n routing_policy, config.get('routing_nitpicky', False))\n", "role": "user" }, { "content": "m2crypto_validate", "role": "assistant" } ]
def x(self, messages, **config): for conglomerator in self.conglomerator_objects: messages = conglomerator.conglomerate(messages, **config) return messages
conglomerate
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, messages, **config):\n for conglomerator in self.conglomerator_objects:\n messages = conglomerator.conglomerate(messages, **config)\n return messages\n", "role": "user" }, { "content": "conglomerate", "role": "assistant" } ]
def x(self, msg, **config): match = self.__prefix__.match(msg['topic']) if match: return match.groups()[-1] or ''
handle_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, msg, **config):\n match = self.__prefix__.match(msg['topic'])\n if match:\n return match.groups()[-1] or ''\n", "role": "user" }, { "content": "handle_msg", "role": "assistant" } ]
def x(self, args): self.preferred_auth_policies = [] policies_str = args.get('preferred_auth_policies') if policies_str: if isinstance(policies_str, bytes): policies_str = str(policies_str, encoding='utf-8') for uri in policies_str.split(' '): if uri not in self.preferred_auth_policies: self.preferred_auth_policies.append(uri) max_auth_age_str = args.get('max_auth_age') self.max_auth_age = None if max_auth_age_str: try: self.max_auth_age = int(max_auth_age_str) except ValueError: pass
parseExtensionArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, args):\n self.preferred_auth_policies = []\n policies_str = args.get('preferred_auth_policies')\n if policies_str:\n if isinstance(policies_str, bytes):\n policies_str = str(policies_str, encoding='utf-8')\n for uri in policies_str.split(' '):\n if uri not in self.preferred_auth_policies:\n self.preferred_auth_policies.append(uri)\n max_auth_age_str = args.get('max_auth_age')\n self.max_auth_age = None\n if max_auth_age_str:\n try:\n self.max_auth_age = int(max_auth_age_str)\n except ValueError:\n pass\n", "role": "user" }, { "content": "parseExtensionArgs", "role": "assistant" } ]
def x(self, user_url, anonymous=False): disco = Discovery(self.session, user_url, self.session_key_prefix) try: service = disco.getNextService(self._discover) except fetchers.HTTPFetchingError as why: raise DiscoveryFailure('Error fetching XRDS document: %s' % (why. why,), None) if service is None: raise DiscoveryFailure('No usable OpenID services found for %s' % ( user_url,), None) else: return self.beginWithoutDiscovery(service, anonymous)
begin
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, user_url, anonymous=False):\n disco = Discovery(self.session, user_url, self.session_key_prefix)\n try:\n service = disco.getNextService(self._discover)\n except fetchers.HTTPFetchingError as why:\n raise DiscoveryFailure('Error fetching XRDS document: %s' % (why.\n why,), None)\n if service is None:\n raise DiscoveryFailure('No usable OpenID services found for %s' % (\n user_url,), None)\n else:\n return self.beginWithoutDiscovery(service, anonymous)\n", "role": "user" }, { "content": "begin", "role": "assistant" } ]
def x(self, service, anonymous=False): auth_req = self.consumer.begin(service) self.session[self._token_key] = auth_req.endpoint try: auth_req.setAnonymous(anonymous) except ValueError as why: raise ProtocolError(str(why)) return auth_req
beginWithoutDiscovery
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, service, anonymous=False):\n auth_req = self.consumer.begin(service)\n self.session[self._token_key] = auth_req.endpoint\n try:\n auth_req.setAnonymous(anonymous)\n except ValueError as why:\n raise ProtocolError(str(why))\n return auth_req\n", "role": "user" }, { "content": "beginWithoutDiscovery", "role": "assistant" } ]
def x(self, message, return_to): try: self._verifyReturnToArgs(message.toPostArgs()) except ProtocolError as why: logging.exception('Verifying return_to arguments: %s' % (why,)) return False msg_return_to = message.getArg(OPENID_NS, 'return_to') app_parts = urlparse(urinorm.urinorm(return_to)) msg_parts = urlparse(urinorm.urinorm(msg_return_to)) for part in range(0, 3): if app_parts[part] != msg_parts[part]: return False return True
checkReturnTo
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, message, return_to):\n try:\n self._verifyReturnToArgs(message.toPostArgs())\n except ProtocolError as why:\n logging.exception('Verifying return_to arguments: %s' % (why,))\n return False\n msg_return_to = message.getArg(OPENID_NS, 'return_to')\n app_parts = urlparse(urinorm.urinorm(return_to))\n msg_parts = urlparse(urinorm.urinorm(msg_return_to))\n for part in range(0, 3):\n if app_parts[part] != msg_parts[part]:\n return False\n return True\n", "role": "user" }, { "content": "checkReturnTo", "role": "assistant" } ]
def x(self, claimed_id, services, to_match_endpoints): failure_messages = [] for endpoint in services: for to_match_endpoint in to_match_endpoints: try: self._verifyDiscoverySingle(endpoint, to_match_endpoint) except ProtocolError as why: failure_messages.append(str(why)) else: return endpoint else: logging.error('Discovery verification failure for %s' % (claimed_id,)) for failure_message in failure_messages: logging.error(' * Endpoint mismatch: ' + failure_message) raise DiscoveryFailure( 'No matching endpoint found after discovering %s' % (claimed_id ,), None)
verifyDiscoveredServices
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, claimed_id, services, to_match_endpoints):\n failure_messages = []\n for endpoint in services:\n for to_match_endpoint in to_match_endpoints:\n try:\n self._verifyDiscoverySingle(endpoint, to_match_endpoint)\n except ProtocolError as why:\n failure_messages.append(str(why))\n else:\n return endpoint\n else:\n logging.error('Discovery verification failure for %s' % (claimed_id,))\n for failure_message in failure_messages:\n logging.error(' * Endpoint mismatch: ' + failure_message)\n raise DiscoveryFailure(\n 'No matching endpoint found after discovering %s' % (claimed_id\n ,), None)\n", "role": "user" }, { "content": "verifyDiscoveredServices", "role": "assistant" } ]
def x(self, message, server_url): logging.info('Using OpenID check_authentication') request = self._createCheckAuthRequest(message) if request is None: return False try: response = self._makeKVPost(request, server_url) except (fetchers.HTTPFetchingError, ServerError) as e: e0 = e.args[0] logging.exception('check_authentication failed: %s' % e0) return False else: return self._processCheckAuthResponse(response, server_url)
checkAuth
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, message, server_url):\n logging.info('Using OpenID check_authentication')\n request = self._createCheckAuthRequest(message)\n if request is None:\n return False\n try:\n response = self._makeKVPost(request, server_url)\n except (fetchers.HTTPFetchingError, ServerError) as e:\n e0 = e.args[0]\n logging.exception('check_authentication failed: %s' % e0)\n return False\n else:\n return self._processCheckAuthResponse(response, server_url)\n", "role": "user" }, { "content": "checkAuth", "role": "assistant" } ]
def x(self, message): signed = message.getArg(OPENID_NS, 'signed') if signed: if isinstance(signed, bytes): signed = str(signed, encoding='utf-8') for k in signed.split(','): logging.info(k) val = message.getAliasedArg(k) if val is None: logging.info('Missing signed field %r' % (k,)) return None check_auth_message = message.copy() check_auth_message.setArg(OPENID_NS, 'mode', 'check_authentication') return check_auth_message
createCheckAuthRequest
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, message):\n signed = message.getArg(OPENID_NS, 'signed')\n if signed:\n if isinstance(signed, bytes):\n signed = str(signed, encoding='utf-8')\n for k in signed.split(','):\n logging.info(k)\n val = message.getAliasedArg(k)\n if val is None:\n logging.info('Missing signed field %r' % (k,))\n return None\n check_auth_message = message.copy()\n check_auth_message.setArg(OPENID_NS, 'mode', 'check_authentication')\n return check_auth_message\n", "role": "user" }, { "content": "createCheckAuthRequest", "role": "assistant" } ]
def x(self, endpoint): assoc_type, session_type = self.negotiator.getAllowedType() try: assoc = self._requestAssociation(endpoint, assoc_type, session_type) except ServerError as why: supportedTypes = self._extractSupportedAssociationType(why, endpoint, assoc_type) if supportedTypes is not None: assoc_type, session_type = supportedTypes try: assoc = self._requestAssociation(endpoint, assoc_type, session_type) except ServerError as why: logging.error( 'Server %s refused its suggested association type: session_type=%s, assoc_type=%s' % (endpoint.server_url, session_type, assoc_type)) return None else: return assoc else: return assoc
negotiateAssociation
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, endpoint):\n assoc_type, session_type = self.negotiator.getAllowedType()\n try:\n assoc = self._requestAssociation(endpoint, assoc_type, session_type)\n except ServerError as why:\n supportedTypes = self._extractSupportedAssociationType(why,\n endpoint, assoc_type)\n if supportedTypes is not None:\n assoc_type, session_type = supportedTypes\n try:\n assoc = self._requestAssociation(endpoint, assoc_type,\n session_type)\n except ServerError as why:\n logging.error(\n 'Server %s refused its suggested association type: session_type=%s, assoc_type=%s'\n % (endpoint.server_url, session_type, assoc_type))\n return None\n else:\n return assoc\n else:\n return assoc\n", "role": "user" }, { "content": "negotiateAssociation", "role": "assistant" } ]
def x(self, assoc_response): session_type = assoc_response.getArg(OPENID1_NS, 'session_type') if session_type == 'no-encryption': logging.warning('OpenID server sent "no-encryption"for OpenID 1.X') elif session_type == '' or session_type is None: session_type = 'no-encryption' return session_type
getOpenID1SessionType
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, assoc_response):\n session_type = assoc_response.getArg(OPENID1_NS, 'session_type')\n if session_type == 'no-encryption':\n logging.warning('OpenID server sent \"no-encryption\"for OpenID 1.X')\n elif session_type == '' or session_type is None:\n session_type = 'no-encryption'\n return session_type\n", "role": "user" }, { "content": "getOpenID1SessionType", "role": "assistant" } ]
def x(url): try: normalized = urinorm.urinorm(url) except ValueError as why: raise DiscoveryFailure('Normalizing identifier: %s' % (why,), None) else: return urllib.parse.urldefrag(normalized)[0]
normalizeURL
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(url):\n try:\n normalized = urinorm.urinorm(url)\n except ValueError as why:\n raise DiscoveryFailure('Normalizing identifier: %s' % (why,), None)\n else:\n return urllib.parse.urldefrag(normalized)[0]\n", "role": "user" }, { "content": "normalizeURL", "role": "assistant" } ]
def x(self): if self.display_identifier is not None: return self.display_identifier if self.claimed_id is None: return None else: return urllib.parse.urldefrag(self.claimed_id)[0]
getDisplayIdentifier
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.display_identifier is not None:\n return self.display_identifier\n if self.claimed_id is None:\n return None\n else:\n return urllib.parse.urldefrag(self.claimed_id)[0]\n", "role": "user" }, { "content": "getDisplayIdentifier", "role": "assistant" } ]
def x(text): try: bytestring = text.encode('utf8') if isinstance(text, str) else text element = SafeElementTree.XML(bytestring) except (SystemExit, MemoryError, AssertionError, ImportError): raise except Exception as why: exc = XRDSError('Error parsing document as XML') exc.reason = why raise exc else: tree = ElementTree.ElementTree(element) if not isXRDS(tree): raise XRDSError('Not an XRDS document') return tree
parseXRDS
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(text):\n try:\n bytestring = text.encode('utf8') if isinstance(text, str) else text\n element = SafeElementTree.XML(bytestring)\n except (SystemExit, MemoryError, AssertionError, ImportError):\n raise\n except Exception as why:\n exc = XRDSError('Error parsing document as XML')\n exc.reason = why\n raise exc\n else:\n tree = ElementTree.ElementTree(element)\n if not isXRDS(tree):\n raise XRDSError('Not an XRDS document')\n return tree\n", "role": "user" }, { "content": "parseXRDS", "role": "assistant" } ]
def x(elements): random.shuffle(elements) sorted_elems = sorted(elements, key=getPriority) return sorted_elems
prioSort
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(elements):\n random.shuffle(elements)\n sorted_elems = sorted(elements, key=getPriority)\n return sorted_elems\n", "role": "user" }, { "content": "prioSort", "role": "assistant" } ]
def x(module_names=None): if module_names is None: module_names = xxe_safe_elementtree_modules try: return importElementTree(module_names) except ImportError: raise ImportError( 'Unable to find a ElementTree module that is not vulnerable to XXE. Tried importing %r' % (module_names,))
importSafeElementTree
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(module_names=None):\n if module_names is None:\n module_names = xxe_safe_elementtree_modules\n try:\n return importElementTree(module_names)\n except ImportError:\n raise ImportError(\n 'Unable to find a ElementTree module that is not vulnerable to XXE. Tried importing %r'\n % (module_names,))\n", "role": "user" }, { "content": "importSafeElementTree", "role": "assistant" } ]
def x(url, args): if hasattr(args, 'items'): args = sorted(args.items()) else: args = list(args) if not isinstance(url, str): url = str(url, encoding='utf-8') if not args: return url if '?' in url: sep = '&' else: sep = '?' i = 0 for k, v in args: if not isinstance(k, bytes): k = k.encode('utf-8') if not isinstance(v, bytes): v = v.encode('utf-8') args[i] = k, v i += 1 return '%s%s%s' % (url, sep, urlencode(args))
appendArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(url, args):\n if hasattr(args, 'items'):\n args = sorted(args.items())\n else:\n args = list(args)\n if not isinstance(url, str):\n url = str(url, encoding='utf-8')\n if not args:\n return url\n if '?' in url:\n sep = '&'\n else:\n sep = '?'\n i = 0\n for k, v in args:\n if not isinstance(k, bytes):\n k = k.encode('utf-8')\n if not isinstance(v, bytes):\n v = v.encode('utf-8')\n args[i] = k, v\n i += 1\n return '%s%s%s' % (url, sep, urlencode(args))\n", "role": "user" }, { "content": "appendArgs", "role": "assistant" } ]
def x(s): if isinstance(s, str): s = s.encode('utf-8') return binascii.b2a_base64(s)[:-1]
toBase64
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(s):\n if isinstance(s, str):\n s = s.encode('utf-8')\n return binascii.b2a_base64(s)[:-1]\n", "role": "user" }, { "content": "toBase64", "role": "assistant" } ]
def x(self): remove = [] for handle, assoc in self.assocs.items(): if assoc.expiresIn == 0: remove.append(handle) for handle in remove: del self.assocs[handle] return len(remove), len(self.assocs)
cleanup
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n remove = []\n for handle, assoc in self.assocs.items():\n if assoc.expiresIn == 0:\n remove.append(handle)\n for handle in remove:\n del self.assocs[handle]\n return len(remove), len(self.assocs)\n", "role": "user" }, { "content": "cleanup", "role": "assistant" } ]
def x(self, ax_args): mode = ax_args.get('mode') if isinstance(mode, bytes): mode = str(mode, encoding='utf-8') if mode != self.mode: if not mode: raise NotAXMessage() else: raise AXError('Expected mode %r; got %r' % (self.mode, mode))
checkMode
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, ax_args):\n mode = ax_args.get('mode')\n if isinstance(mode, bytes):\n mode = str(mode, encoding='utf-8')\n if mode != self.mode:\n if not mode:\n raise NotAXMessage()\n else:\n raise AXError('Expected mode %r; got %r' % (self.mode, mode))\n", "role": "user" }, { "content": "checkMode", "role": "assistant" } ]
def x(self): aliases = NamespaceMap() required = [] if_available = [] ax_args = self._newArgs() for type_uri, attribute in self.requested_attributes.items(): if attribute.alias is None: alias = aliases.add(type_uri) else: alias = aliases.addAlias(type_uri, attribute.alias) if attribute.required: required.append(alias) else: if_available.append(alias) if attribute.count != 1: ax_args['count.' + alias] = str(attribute.count) ax_args['type.' + alias] = type_uri if required: ax_args['required'] = ','.join(required) if if_available: ax_args['if_available'] = ','.join(if_available) return ax_args
getExtensionArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n aliases = NamespaceMap()\n required = []\n if_available = []\n ax_args = self._newArgs()\n for type_uri, attribute in self.requested_attributes.items():\n if attribute.alias is None:\n alias = aliases.add(type_uri)\n else:\n alias = aliases.addAlias(type_uri, attribute.alias)\n if attribute.required:\n required.append(alias)\n else:\n if_available.append(alias)\n if attribute.count != 1:\n ax_args['count.' + alias] = str(attribute.count)\n ax_args['type.' + alias] = type_uri\n if required:\n ax_args['required'] = ','.join(required)\n if if_available:\n ax_args['if_available'] = ','.join(if_available)\n return ax_args\n", "role": "user" }, { "content": "getExtensionArgs", "role": "assistant" } ]
def x(self): required = [] for type_uri, attribute in self.requested_attributes.items(): if attribute.required: required.append(type_uri) return required
getRequiredAttrs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n required = []\n for type_uri, attribute in self.requested_attributes.items():\n if attribute.required:\n required.append(type_uri)\n return required\n", "role": "user" }, { "content": "getRequiredAttrs", "role": "assistant" } ]
def x(cls, openid_request): message = openid_request.message ax_args = message.getArgs(cls.ns_uri) self = cls() try: self.parseExtensionArgs(ax_args) except NotAXMessage as err: return None if self.update_url: realm = message.getArg(OPENID_NS, 'realm', message.getArg(OPENID_NS, 'return_to')) if not realm: raise AXError(('Cannot validate update_url %r ' + 'against absent realm') % (self.update_url,)) tr = TrustRoot.parse(realm) if not tr.validateURL(self.update_url): raise AXError( 'Update URL %r failed validation against realm %r' % (self. update_url, realm)) return self
fromOpenIDRequest
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, openid_request):\n message = openid_request.message\n ax_args = message.getArgs(cls.ns_uri)\n self = cls()\n try:\n self.parseExtensionArgs(ax_args)\n except NotAXMessage as err:\n return None\n if self.update_url:\n realm = message.getArg(OPENID_NS, 'realm', message.getArg(OPENID_NS,\n 'return_to'))\n if not realm:\n raise AXError(('Cannot validate update_url %r ' +\n 'against absent realm') % (self.update_url,))\n tr = TrustRoot.parse(realm)\n if not tr.validateURL(self.update_url):\n raise AXError(\n 'Update URL %r failed validation against realm %r' % (self.\n update_url, realm))\n return self\n", "role": "user" }, { "content": "fromOpenIDRequest", "role": "assistant" } ]
def x(self, ax_args): self._checkMode(ax_args) aliases = NamespaceMap() for key, value in ax_args.items(): if key.startswith('type.'): alias = key[5:] type_uri = value aliases.addAlias(type_uri, alias) count_key = 'count.' + alias count_s = ax_args.get(count_key) if count_s: try: count = int(count_s) if count <= 0: raise AXError( 'Count %r must be greater than zero, got %r' % (count_key, count_s)) except ValueError: if count_s != UNLIMITED_VALUES: raise AXError('Invalid count value for %r: %r' % ( count_key, count_s)) count = count_s else: count = 1 self.add(AttrInfo(type_uri, alias=alias, count=count)) required = toTypeURIs(aliases, ax_args.get('required')) for type_uri in required: self.requested_attributes[type_uri].required = True if_available = toTypeURIs(aliases, ax_args.get('if_available')) all_type_uris = required + if_available for type_uri in aliases.iterNamespaceURIs(): if type_uri not in all_type_uris: raise AXError( 'Type URI %r was in the request but not present in "required" or "if_available"' % (type_uri,)) self.update_url = ax_args.get('update_url')
parseExtensionArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, ax_args):\n self._checkMode(ax_args)\n aliases = NamespaceMap()\n for key, value in ax_args.items():\n if key.startswith('type.'):\n alias = key[5:]\n type_uri = value\n aliases.addAlias(type_uri, alias)\n count_key = 'count.' + alias\n count_s = ax_args.get(count_key)\n if count_s:\n try:\n count = int(count_s)\n if count <= 0:\n raise AXError(\n 'Count %r must be greater than zero, got %r' %\n (count_key, count_s))\n except ValueError:\n if count_s != UNLIMITED_VALUES:\n raise AXError('Invalid count value for %r: %r' % (\n count_key, count_s))\n count = count_s\n else:\n count = 1\n self.add(AttrInfo(type_uri, alias=alias, count=count))\n required = toTypeURIs(aliases, ax_args.get('required'))\n for type_uri in required:\n self.requested_attributes[type_uri].required = True\n if_available = toTypeURIs(aliases, ax_args.get('if_available'))\n all_type_uris = required + if_available\n for type_uri in aliases.iterNamespaceURIs():\n if type_uri not in all_type_uris:\n raise AXError(\n 'Type URI %r was in the request but not present in \"required\" or \"if_available\"'\n % (type_uri,))\n self.update_url = ax_args.get('update_url')\n", "role": "user" }, { "content": "parseExtensionArgs", "role": "assistant" } ]
def x(link_attrs_list, target_rel): matchesTarget = lambda attrs: linkHasRel(attrs, target_rel) return list(filter(matchesTarget, link_attrs_list))
findLinksRel
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(link_attrs_list, target_rel):\n matchesTarget = lambda attrs: linkHasRel(attrs, target_rel)\n return list(filter(matchesTarget, link_attrs_list))\n", "role": "user" }, { "content": "findLinksRel", "role": "assistant" } ]
def x(self, server_url, handle=None): if handle is not None: self.db_get_assoc(server_url, handle) else: self.db_get_assocs(server_url) rows = self.cur.fetchall() if len(rows) == 0: return None else: associations = [] for values in rows: values = list(values) values[1] = self.blobDecode(values[1]) assoc = Association(*values) if assoc.expiresIn == 0: self.txn_removeAssociation(server_url, assoc.handle) else: associations.append((assoc.issued, assoc)) if associations: associations.sort() return associations[-1][1] else: return None
txn_getAssociation
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, server_url, handle=None):\n if handle is not None:\n self.db_get_assoc(server_url, handle)\n else:\n self.db_get_assocs(server_url)\n rows = self.cur.fetchall()\n if len(rows) == 0:\n return None\n else:\n associations = []\n for values in rows:\n values = list(values)\n values[1] = self.blobDecode(values[1])\n assoc = Association(*values)\n if assoc.expiresIn == 0:\n self.txn_removeAssociation(server_url, assoc.handle)\n else:\n associations.append((assoc.issued, assoc))\n if associations:\n associations.sort()\n return associations[-1][1]\n else:\n return None\n", "role": "user" }, { "content": "txn_getAssociation", "role": "assistant" } ]
def x(self, urllib2_response): resp = HTTPResponse() resp.body = urllib2_response.read(MAX_RESPONSE_KB * 1024) resp.final_url = urllib2_response.geturl() resp.headers = self._lowerCaseKeys(dict(list(urllib2_response.info(). items()))) if hasattr(urllib2_response, 'code'): resp.status = urllib2_response.code else: resp.status = 200 _, extra_dict = self._parseHeaderValue(resp.headers.get('content-type', '') ) charset = extra_dict.get('charset', 'latin1') try: resp.body = resp.body.decode(charset) except Exception: pass return resp
makeResponse
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, urllib2_response):\n resp = HTTPResponse()\n resp.body = urllib2_response.read(MAX_RESPONSE_KB * 1024)\n resp.final_url = urllib2_response.geturl()\n resp.headers = self._lowerCaseKeys(dict(list(urllib2_response.info().\n items())))\n if hasattr(urllib2_response, 'code'):\n resp.status = urllib2_response.code\n else:\n resp.status = 200\n _, extra_dict = self._parseHeaderValue(resp.headers.get('content-type', '')\n )\n charset = extra_dict.get('charset', 'latin1')\n try:\n resp.body = resp.body.decode(charset)\n except Exception:\n pass\n return resp\n", "role": "user" }, { "content": "makeResponse", "role": "assistant" } ]
def x(self, header_value): values = header_value.split(';', 1) if len(values) == 1: return values[0], {} main_value, extra_values = values[0], values[1].split(';') extra_dict = {} for value_string in extra_values: try: key, value = value_string.split('=', 1) extra_dict[key.strip()] = value.strip() except ValueError: pass return main_value, extra_dict
parseHeaderValue
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, header_value):\n values = header_value.split(';', 1)\n if len(values) == 1:\n return values[0], {}\n main_value, extra_values = values[0], values[1].split(';')\n extra_dict = {}\n for value_string in extra_values:\n try:\n key, value = value_string.split('=', 1)\n extra_dict[key.strip()] = value.strip()\n except ValueError:\n pass\n return main_value, extra_dict\n", "role": "user" }, { "content": "parseHeaderValue", "role": "assistant" } ]
def x(namespace_uri, alias): global registered_aliases if registered_aliases.get(alias) == namespace_uri: return if namespace_uri in list(registered_aliases.values()): raise NamespaceAliasRegistrationError( 'Namespace uri %r already registered' % (namespace_uri,)) if alias in registered_aliases: raise NamespaceAliasRegistrationError('Alias %r already registered' % (alias,)) registered_aliases[alias] = namespace_uri
registerNamespaceAlias
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(namespace_uri, alias):\n global registered_aliases\n if registered_aliases.get(alias) == namespace_uri:\n return\n if namespace_uri in list(registered_aliases.values()):\n raise NamespaceAliasRegistrationError(\n 'Namespace uri %r already registered' % (namespace_uri,))\n if alias in registered_aliases:\n raise NamespaceAliasRegistrationError('Alias %r already registered' %\n (alias,))\n registered_aliases[alias] = namespace_uri\n", "role": "user" }, { "content": "registerNamespaceAlias", "role": "assistant" } ]
def x(self, openid_ns_uri, implicit): if isinstance(openid_ns_uri, bytes): openid_ns_uri = str(openid_ns_uri, encoding='utf-8') if openid_ns_uri not in self.allowed_openid_namespaces: raise InvalidOpenIDNamespace(openid_ns_uri) self.namespaces.addAlias(openid_ns_uri, NULL_NAMESPACE, implicit) self._openid_ns_uri = openid_ns_uri
setOpenIDNamespace
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, openid_ns_uri, implicit):\n if isinstance(openid_ns_uri, bytes):\n openid_ns_uri = str(openid_ns_uri, encoding='utf-8')\n if openid_ns_uri not in self.allowed_openid_namespaces:\n raise InvalidOpenIDNamespace(openid_ns_uri)\n self.namespaces.addAlias(openid_ns_uri, NULL_NAMESPACE, implicit)\n self._openid_ns_uri = openid_ns_uri\n", "role": "user" }, { "content": "setOpenIDNamespace", "role": "assistant" } ]
def x(self): args = {} for ns_uri, alias in self.namespaces.items(): if self.namespaces.isImplicit(ns_uri): continue if alias == NULL_NAMESPACE: ns_key = 'openid.ns' else: ns_key = 'openid.ns.' + alias args[ns_key] = oidutil.toUnicode(ns_uri) for (ns_uri, ns_key), value in self.args.items(): key = self.getKey(ns_uri, ns_key) args[key] = oidutil.toUnicode(value) return args
toPostArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n args = {}\n for ns_uri, alias in self.namespaces.items():\n if self.namespaces.isImplicit(ns_uri):\n continue\n if alias == NULL_NAMESPACE:\n ns_key = 'openid.ns'\n else:\n ns_key = 'openid.ns.' + alias\n args[ns_key] = oidutil.toUnicode(ns_uri)\n for (ns_uri, ns_key), value in self.args.items():\n key = self.getKey(ns_uri, ns_key)\n args[key] = oidutil.toUnicode(value)\n return args\n", "role": "user" }, { "content": "toPostArgs", "role": "assistant" } ]
def x(self): post_args = self.toPostArgs() kvargs = {} for k, v in post_args.items(): if not k.startswith('openid.'): raise ValueError( 'This message can only be encoded as a POST, because it contains arguments that are not prefixed with "openid."' ) else: kvargs[k[7:]] = v return kvargs
toArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n post_args = self.toPostArgs()\n kvargs = {}\n for k, v in post_args.items():\n if not k.startswith('openid.'):\n raise ValueError(\n 'This message can only be encoded as a POST, because it contains arguments that are not prefixed with \"openid.\"'\n )\n else:\n kvargs[k[7:]] = v\n return kvargs\n", "role": "user" }, { "content": "toArgs", "role": "assistant" } ]
def x(self, action_url, form_tag_attrs=None, submit_text='Continue'): if ElementTree is None: raise RuntimeError('This function requires ElementTree.') assert action_url is not None form = ElementTree.Element('form') if form_tag_attrs: for name, attr in form_tag_attrs.items(): form.attrib[name] = attr form.attrib['action'] = oidutil.toUnicode(action_url) form.attrib['method'] = 'post' form.attrib['accept-charset'] = 'UTF-8' form.attrib['enctype'] = 'application/x-www-form-urlencoded' for name, value in self.toPostArgs().items(): attrs = {'type': 'hidden', 'name': oidutil.toUnicode(name), 'value': oidutil.toUnicode(value)} form.append(ElementTree.Element('input', attrs)) submit = ElementTree.Element('input', {'type': 'submit', 'value': oidutil.toUnicode(submit_text)}) form.append(submit) return str(ElementTree.tostring(form, encoding='utf-8'), encoding='utf-8')
toFormMarkup
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, action_url, form_tag_attrs=None, submit_text='Continue'):\n if ElementTree is None:\n raise RuntimeError('This function requires ElementTree.')\n assert action_url is not None\n form = ElementTree.Element('form')\n if form_tag_attrs:\n for name, attr in form_tag_attrs.items():\n form.attrib[name] = attr\n form.attrib['action'] = oidutil.toUnicode(action_url)\n form.attrib['method'] = 'post'\n form.attrib['accept-charset'] = 'UTF-8'\n form.attrib['enctype'] = 'application/x-www-form-urlencoded'\n for name, value in self.toPostArgs().items():\n attrs = {'type': 'hidden', 'name': oidutil.toUnicode(name), 'value':\n oidutil.toUnicode(value)}\n form.append(ElementTree.Element('input', attrs))\n submit = ElementTree.Element('input', {'type': 'submit', 'value':\n oidutil.toUnicode(submit_text)})\n form.append(submit)\n return str(ElementTree.tostring(form, encoding='utf-8'), encoding='utf-8')\n", "role": "user" }, { "content": "toFormMarkup", "role": "assistant" } ]
def x(self): args = sorted(self.toPostArgs().items()) return urllib.parse.urlencode(args)
toURLEncoded
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n args = sorted(self.toPostArgs().items())\n return urllib.parse.urlencode(args)\n", "role": "user" }, { "content": "toURLEncoded", "role": "assistant" } ]
def x(self, namespace): if isinstance(namespace, bytes): namespace = str(namespace, encoding='utf-8') if namespace == OPENID_NS: if self._openid_ns_uri is None: raise UndefinedOpenIDNamespace('OpenID namespace not set') else: namespace = self._openid_ns_uri if namespace != BARE_NS and not isinstance(namespace, str): raise TypeError( 'Namespace must be BARE_NS, OPENID_NS or a string. got %r' % ( namespace,)) if namespace != BARE_NS and ':' not in namespace: fmt = 'OpenID 2.0 namespace identifiers SHOULD be URIs. Got %r' warnings.warn(fmt % (namespace,), DeprecationWarning) if namespace == 'sreg': fmt = 'Using %r instead of "sreg" as namespace' warnings.warn(fmt % (SREG_URI,), DeprecationWarning) return SREG_URI return namespace
fixNS
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, namespace):\n if isinstance(namespace, bytes):\n namespace = str(namespace, encoding='utf-8')\n if namespace == OPENID_NS:\n if self._openid_ns_uri is None:\n raise UndefinedOpenIDNamespace('OpenID namespace not set')\n else:\n namespace = self._openid_ns_uri\n if namespace != BARE_NS and not isinstance(namespace, str):\n raise TypeError(\n 'Namespace must be BARE_NS, OPENID_NS or a string. got %r' % (\n namespace,))\n if namespace != BARE_NS and ':' not in namespace:\n fmt = 'OpenID 2.0 namespace identifiers SHOULD be URIs. Got %r'\n warnings.warn(fmt % (namespace,), DeprecationWarning)\n if namespace == 'sreg':\n fmt = 'Using %r instead of \"sreg\" as namespace'\n warnings.warn(fmt % (SREG_URI,), DeprecationWarning)\n return SREG_URI\n return namespace\n", "role": "user" }, { "content": "fixNS", "role": "assistant" } ]
def x(self, namespace): namespace = self._fixNS(namespace) args = [] for (pair_ns, ns_key), value in self.args.items(): if pair_ns == namespace: if isinstance(ns_key, bytes): k = str(ns_key, encoding='utf-8') else: k = ns_key if isinstance(value, bytes): v = str(value, encoding='utf-8') else: v = value args.append((k, v)) return dict(args)
getArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, namespace):\n namespace = self._fixNS(namespace)\n args = []\n for (pair_ns, ns_key), value in self.args.items():\n if pair_ns == namespace:\n if isinstance(ns_key, bytes):\n k = str(ns_key, encoding='utf-8')\n else:\n k = ns_key\n if isinstance(value, bytes):\n v = str(value, encoding='utf-8')\n else:\n v = value\n args.append((k, v))\n return dict(args)\n", "role": "user" }, { "content": "getArgs", "role": "assistant" } ]
def x(self, namespace, key, value): assert key is not None assert value is not None namespace = self._fixNS(namespace) if isinstance(value, bytes): value = str(value, encoding='utf-8') self.args[namespace, key] = value if not namespace is BARE_NS: self.namespaces.add(namespace)
setArg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, namespace, key, value):\n assert key is not None\n assert value is not None\n namespace = self._fixNS(namespace)\n if isinstance(value, bytes):\n value = str(value, encoding='utf-8')\n self.args[namespace, key] = value\n if not namespace is BARE_NS:\n self.namespaces.add(namespace)\n", "role": "user" }, { "content": "setArg", "role": "assistant" } ]
def x(self, namespace_uri, desired_alias, implicit=False): if isinstance(namespace_uri, bytes): namespace_uri = str(namespace_uri, encoding='utf-8') assert desired_alias not in OPENID_PROTOCOL_FIELDS, '%r is not an allowed namespace alias' % ( desired_alias,) if isinstance(desired_alias, str): assert '.' not in desired_alias, '%r must not contain a dot' % ( desired_alias,) current_namespace_uri = self.alias_to_namespace.get(desired_alias) if (current_namespace_uri is not None and current_namespace_uri != namespace_uri): fmt = 'Cannot map %r to alias %r. %r is already mapped to alias %r' msg = fmt % (namespace_uri, desired_alias, current_namespace_uri, desired_alias) raise KeyError(msg) alias = self.namespace_to_alias.get(namespace_uri) if alias is not None and alias != desired_alias: fmt = 'Cannot map %r to alias %r. It is already mapped to alias %r' raise KeyError(fmt % (namespace_uri, desired_alias, alias)) assert desired_alias == NULL_NAMESPACE or type(desired_alias) in [str, str ], repr(desired_alias) assert namespace_uri not in self.implicit_namespaces self.alias_to_namespace[desired_alias] = namespace_uri self.namespace_to_alias[namespace_uri] = desired_alias if implicit: self.implicit_namespaces.append(namespace_uri) return desired_alias
addAlias
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, namespace_uri, desired_alias, implicit=False):\n if isinstance(namespace_uri, bytes):\n namespace_uri = str(namespace_uri, encoding='utf-8')\n assert desired_alias not in OPENID_PROTOCOL_FIELDS, '%r is not an allowed namespace alias' % (\n desired_alias,)\n if isinstance(desired_alias, str):\n assert '.' not in desired_alias, '%r must not contain a dot' % (\n desired_alias,)\n current_namespace_uri = self.alias_to_namespace.get(desired_alias)\n if (current_namespace_uri is not None and current_namespace_uri !=\n namespace_uri):\n fmt = 'Cannot map %r to alias %r. %r is already mapped to alias %r'\n msg = fmt % (namespace_uri, desired_alias, current_namespace_uri,\n desired_alias)\n raise KeyError(msg)\n alias = self.namespace_to_alias.get(namespace_uri)\n if alias is not None and alias != desired_alias:\n fmt = 'Cannot map %r to alias %r. It is already mapped to alias %r'\n raise KeyError(fmt % (namespace_uri, desired_alias, alias))\n assert desired_alias == NULL_NAMESPACE or type(desired_alias) in [str, str\n ], repr(desired_alias)\n assert namespace_uri not in self.implicit_namespaces\n self.alias_to_namespace[desired_alias] = namespace_uri\n self.namespace_to_alias[namespace_uri] = desired_alias\n if implicit:\n self.implicit_namespaces.append(namespace_uri)\n return desired_alias\n", "role": "user" }, { "content": "addAlias", "role": "assistant" } ]
def x(url, args): if hasattr(args, 'items'): args = list(args.items()) args.sort() if len(args) == 0: return url if '?' in url.rstrip('?'): sep = '&' else: sep = '?' return '%s%s%s' % (url, sep, urlencode(args))
appendArgs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(url, args):\n if hasattr(args, 'items'):\n args = list(args.items())\n args.sort()\n if len(args) == 0:\n return url\n if '?' in url.rstrip('?'):\n sep = '&'\n else:\n sep = '?'\n return '%s%s%s' % (url, sep, urlencode(args))\n", "role": "user" }, { "content": "appendArgs", "role": "assistant" } ]
def x(filestore_path, table_prefix): db_engine = settings.DATABASES['default']['ENGINE'] if not db_engine: return FileOpenIDStore(filestore_path) connection.cursor() tablenames = {'associations_table': table_prefix + 'openid_associations', 'nonces_table': table_prefix + 'openid_nonces'} types = {'django.db.backends.postgresql_psycopg2': sqlstore. PostgreSQLStore, 'django.db.backends.mysql': sqlstore.MySQLStore, 'django.db.backends.sqlite3': sqlstore.SQLiteStore} if db_engine not in types: raise ImproperlyConfigured( 'Database engine %s not supported by OpenID library' % db_engine) s = types[db_engine](connection.connection, **tablenames) try: s.createTables() except (SystemExit, KeyboardInterrupt, MemoryError): raise except: pass return s
getOpenIDStore
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filestore_path, table_prefix):\n db_engine = settings.DATABASES['default']['ENGINE']\n if not db_engine:\n return FileOpenIDStore(filestore_path)\n connection.cursor()\n tablenames = {'associations_table': table_prefix +\n 'openid_associations', 'nonces_table': table_prefix + 'openid_nonces'}\n types = {'django.db.backends.postgresql_psycopg2': sqlstore.\n PostgreSQLStore, 'django.db.backends.mysql': sqlstore.MySQLStore,\n 'django.db.backends.sqlite3': sqlstore.SQLiteStore}\n if db_engine not in types:\n raise ImproperlyConfigured(\n 'Database engine %s not supported by OpenID library' % db_engine)\n s = types[db_engine](connection.connection, **tablenames)\n try:\n s.createTables()\n except (SystemExit, KeyboardInterrupt, MemoryError):\n raise\n except:\n pass\n return s\n", "role": "user" }, { "content": "getOpenIDStore", "role": "assistant" } ]
def x(request, type_uris, endpoint_urls): response = render_to_response('xrds.xml', {'type_uris': type_uris, 'endpoint_urls': endpoint_urls}, context_instance=RequestContext( request)) response['Content-Type'] = YADIS_CONTENT_TYPE return response
renderXRDS
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(request, type_uris, endpoint_urls):\n response = render_to_response('xrds.xml', {'type_uris': type_uris,\n 'endpoint_urls': endpoint_urls}, context_instance=RequestContext(\n request))\n response['Content-Type'] = YADIS_CONTENT_TYPE\n return response\n", "role": "user" }, { "content": "renderXRDS", "role": "assistant" } ]
def x(err): chunk = err.object[err.start:err.end] replacements = _pct_encoded_replacements(chunk) return ''.join(replacements), err.end
pct_escape_handler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(err):\n chunk = err.object[err.start:err.end]\n replacements = _pct_encoded_replacements(chunk)\n return ''.join(replacements), err.end\n", "role": "user" }, { "content": "pct_escape_handler", "role": "assistant" } ]
def x(seq, strict=False): def x(msg): formatted = 'seqToKV warning: %s: %r' % (msg, seq) if strict: raise KVFormError(formatted) else: logging.warning(formatted) lines = [] for k, v in seq: if isinstance(k, bytes): k = k.decode('utf-8') elif not isinstance(k, str): err('Converting key to string: %r' % k) k = str(k) if '\n' in k: raise KVFormError( 'Invalid input for seqToKV: key contains newline: %r' % (k,)) if ':' in k: raise KVFormError( 'Invalid input for seqToKV: key contains colon: %r' % (k,)) if k.strip() != k: err('Key has whitespace at beginning or end: %r' % (k,)) if isinstance(v, bytes): v = v.decode('utf-8') elif not isinstance(v, str): err('Converting value to string: %r' % (v,)) v = str(v) if '\n' in v: raise KVFormError( 'Invalid input for seqToKV: value contains newline: %r' % (v,)) if v.strip() != v: err('Value has whitespace at beginning or end: %r' % (v,)) lines.append(k + ':' + v + '\n') return ''.join(lines).encode('utf-8')
seqToKV
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(seq, strict=False):\n\n def x(msg):\n formatted = 'seqToKV warning: %s: %r' % (msg, seq)\n if strict:\n raise KVFormError(formatted)\n else:\n logging.warning(formatted)\n lines = []\n for k, v in seq:\n if isinstance(k, bytes):\n k = k.decode('utf-8')\n elif not isinstance(k, str):\n err('Converting key to string: %r' % k)\n k = str(k)\n if '\\n' in k:\n raise KVFormError(\n 'Invalid input for seqToKV: key contains newline: %r' % (k,))\n if ':' in k:\n raise KVFormError(\n 'Invalid input for seqToKV: key contains colon: %r' % (k,))\n if k.strip() != k:\n err('Key has whitespace at beginning or end: %r' % (k,))\n if isinstance(v, bytes):\n v = v.decode('utf-8')\n elif not isinstance(v, str):\n err('Converting value to string: %r' % (v,))\n v = str(v)\n if '\\n' in v:\n raise KVFormError(\n 'Invalid input for seqToKV: value contains newline: %r' % (v,))\n if v.strip() != v:\n err('Value has whitespace at beginning or end: %r' % (v,))\n lines.append(k + ':' + v + '\\n')\n return ''.join(lines).encode('utf-8')\n", "role": "user" }, { "content": "seqToKV", "role": "assistant" } ]
def x(iri): if isinstance(iri, bytes): iri = str(iri, encoding='utf-8') return iri.encode('ascii', errors='oid_percent_escape').decode()
iriToURI
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(iri):\n if isinstance(iri, bytes):\n iri = str(iri, encoding='utf-8')\n return iri.encode('ascii', errors='oid_percent_escape').decode()\n", "role": "user" }, { "content": "iriToURI", "role": "assistant" } ]
def x(uri): if isinstance(uri, bytes): uri = str(uri, encoding='utf-8') uri = uri.encode('ascii', errors='oid_percent_escape').decode('utf-8') illegal_mo = uri_illegal_char_re.search(uri) if illegal_mo: raise ValueError('Illegal characters in URI: %r at position %s' % ( illegal_mo.group(), illegal_mo.start())) uri_mo = uri_re.match(uri) scheme = uri_mo.group(2) if scheme is None: raise ValueError('No scheme specified') scheme = scheme.lower() if scheme not in ('http', 'https'): raise ValueError('Not an absolute HTTP or HTTPS URI: %r' % (uri,)) authority = uri_mo.group(4) if authority is None: raise ValueError('Not an absolute URI: %r' % (uri,)) authority_mo = authority_re.match(authority) if authority_mo is None: raise ValueError('URI does not have a valid authority: %r' % (uri,)) userinfo, host, port = authority_mo.groups() if userinfo is None: userinfo = '' if '%' in host: host = host.lower() host = pct_encoded_re.sub(_pct_encoded_replace, host) host = host.encode('idna').decode() else: host = host.lower() if port: if (port == ':' or scheme == 'http' and port == ':80' or scheme == 'https' and port == ':443'): port = '' else: port = '' authority = userinfo + host + port path = uri_mo.group(5) path = pct_encoded_re.sub(_pct_encoded_replace_unreserved, path) path = remove_dot_segments(path) if not path: path = '/' query = uri_mo.group(6) if query is None: query = '' fragment = uri_mo.group(8) if fragment is None: fragment = '' return scheme + '://' + authority + path + query + fragment
urinorm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(uri):\n if isinstance(uri, bytes):\n uri = str(uri, encoding='utf-8')\n uri = uri.encode('ascii', errors='oid_percent_escape').decode('utf-8')\n illegal_mo = uri_illegal_char_re.search(uri)\n if illegal_mo:\n raise ValueError('Illegal characters in URI: %r at position %s' % (\n illegal_mo.group(), illegal_mo.start()))\n uri_mo = uri_re.match(uri)\n scheme = uri_mo.group(2)\n if scheme is None:\n raise ValueError('No scheme specified')\n scheme = scheme.lower()\n if scheme not in ('http', 'https'):\n raise ValueError('Not an absolute HTTP or HTTPS URI: %r' % (uri,))\n authority = uri_mo.group(4)\n if authority is None:\n raise ValueError('Not an absolute URI: %r' % (uri,))\n authority_mo = authority_re.match(authority)\n if authority_mo is None:\n raise ValueError('URI does not have a valid authority: %r' % (uri,))\n userinfo, host, port = authority_mo.groups()\n if userinfo is None:\n userinfo = ''\n if '%' in host:\n host = host.lower()\n host = pct_encoded_re.sub(_pct_encoded_replace, host)\n host = host.encode('idna').decode()\n else:\n host = host.lower()\n if port:\n if (port == ':' or scheme == 'http' and port == ':80' or scheme ==\n 'https' and port == ':443'):\n port = ''\n else:\n port = ''\n authority = userinfo + host + port\n path = uri_mo.group(5)\n path = pct_encoded_re.sub(_pct_encoded_replace_unreserved, path)\n path = remove_dot_segments(path)\n if not path:\n path = '/'\n query = uri_mo.group(6)\n if query is None:\n query = ''\n fragment = uri_mo.group(8)\n if fragment is None:\n fragment = ''\n return scheme + '://' + authority + path + query + fragment\n", "role": "user" }, { "content": "urinorm", "role": "assistant" } ]
def x(request): return render_to_response('server/index.html', {'user_url': getViewURL( request, idPage), 'server_xrds_url': getViewURL(request, idpXrds)}, context_instance=RequestContext(request))
server
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(request):\n return render_to_response('server/index.html', {'user_url': getViewURL(\n request, idPage), 'server_xrds_url': getViewURL(request, idpXrds)},\n context_instance=RequestContext(request))\n", "role": "user" }, { "content": "server", "role": "assistant" } ]
def x(request, openid_response): s = getServer(request) try: webresponse = s.encodeResponse(openid_response) except EncodingError as why: text = why.response.encodeToKVForm() return render_to_response('server/endpoint.html', {'error': cgi. escape(text)}, context_instance=RequestContext(request)) r = http.HttpResponse(webresponse.body) r.status_code = webresponse.code for header, value in webresponse.headers.items(): r[header] = value return r
displayResponse
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(request, openid_response):\n s = getServer(request)\n try:\n webresponse = s.encodeResponse(openid_response)\n except EncodingError as why:\n text = why.response.encodeToKVForm()\n return render_to_response('server/endpoint.html', {'error': cgi.\n escape(text)}, context_instance=RequestContext(request))\n r = http.HttpResponse(webresponse.body)\n r.status_code = webresponse.code\n for header, value in webresponse.headers.items():\n r[header] = value\n return r\n", "role": "user" }, { "content": "displayResponse", "role": "assistant" } ]
def x(filename): try: os.unlink(filename) except OSError as why: if why.errno == ENOENT: return 0 else: raise else: return 1
removeIfPresent
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filename):\n try:\n os.unlink(filename)\n except OSError as why:\n if why.errno == ENOENT:\n return 0\n else:\n raise\n else:\n return 1\n", "role": "user" }, { "content": "removeIfPresent", "role": "assistant" } ]
def x(self, server_url, association): association_s = association.serialize() filename = self.getAssociationFilename(server_url, association.handle) tmp_file, tmp = self._mktemp() try: try: tmp_file.write(association_s) os.fsync(tmp_file.fileno()) finally: tmp_file.close() try: os.rename(tmp, filename) except OSError as why: if why.errno != EEXIST: raise try: os.unlink(filename) except OSError as why: if why.errno == ENOENT: pass else: raise os.rename(tmp, filename) except: _removeIfPresent(tmp) raise
storeAssociation
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, server_url, association):\n association_s = association.serialize()\n filename = self.getAssociationFilename(server_url, association.handle)\n tmp_file, tmp = self._mktemp()\n try:\n try:\n tmp_file.write(association_s)\n os.fsync(tmp_file.fileno())\n finally:\n tmp_file.close()\n try:\n os.rename(tmp, filename)\n except OSError as why:\n if why.errno != EEXIST:\n raise\n try:\n os.unlink(filename)\n except OSError as why:\n if why.errno == ENOENT:\n pass\n else:\n raise\n os.rename(tmp, filename)\n except:\n _removeIfPresent(tmp)\n raise\n", "role": "user" }, { "content": "storeAssociation", "role": "assistant" } ]
def x(self): openid_url = self.query.get('openid_identifier') if not openid_url: self.render('Enter an OpenID Identifier to verify.', css_class= 'error', form_contents=openid_url) return immediate = 'immediate' in self.query use_sreg = 'use_sreg' in self.query use_pape = 'use_pape' in self.query use_stateless = 'use_stateless' in self.query oidconsumer = self.getConsumer(stateless=use_stateless) try: request = oidconsumer.begin(openid_url) except consumer.DiscoveryFailure as exc: fetch_error_string = 'Error in discovery: %s' % cgi.escape(str(exc)) self.render(fetch_error_string, css_class='error', form_contents= openid_url) else: if request is None: msg = 'No OpenID services found for <code>%s</code>' % (cgi. escape(openid_url),) self.render(msg, css_class='error', form_contents=openid_url) else: if use_sreg: self.requestRegistrationData(request) if use_pape: self.requestPAPEDetails(request) trust_root = self.server.base_url return_to = self.buildURL('process') if request.shouldSendRedirect(): redirect_url = request.redirectURL(trust_root, return_to, immediate=immediate) self.send_response(302) self.send_header('Location', redirect_url) self.writeUserHeader() self.end_headers() else: form_html = request.htmlMarkup(trust_root, return_to, form_tag_attrs={'id': 'openid_message'}, immediate= immediate) self.wfile.write(bytes(form_html, 'utf-8'))
doVerify
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n openid_url = self.query.get('openid_identifier')\n if not openid_url:\n self.render('Enter an OpenID Identifier to verify.', css_class=\n 'error', form_contents=openid_url)\n return\n immediate = 'immediate' in self.query\n use_sreg = 'use_sreg' in self.query\n use_pape = 'use_pape' in self.query\n use_stateless = 'use_stateless' in self.query\n oidconsumer = self.getConsumer(stateless=use_stateless)\n try:\n request = oidconsumer.begin(openid_url)\n except consumer.DiscoveryFailure as exc:\n fetch_error_string = 'Error in discovery: %s' % cgi.escape(str(exc))\n self.render(fetch_error_string, css_class='error', form_contents=\n openid_url)\n else:\n if request is None:\n msg = 'No OpenID services found for <code>%s</code>' % (cgi.\n escape(openid_url),)\n self.render(msg, css_class='error', form_contents=openid_url)\n else:\n if use_sreg:\n self.requestRegistrationData(request)\n if use_pape:\n self.requestPAPEDetails(request)\n trust_root = self.server.base_url\n return_to = self.buildURL('process')\n if request.shouldSendRedirect():\n redirect_url = request.redirectURL(trust_root, return_to,\n immediate=immediate)\n self.send_response(302)\n self.send_header('Location', redirect_url)\n self.writeUserHeader()\n self.end_headers()\n else:\n form_html = request.htmlMarkup(trust_root, return_to,\n form_tag_attrs={'id': 'openid_message'}, immediate=\n immediate)\n self.wfile.write(bytes(form_html, 'utf-8'))\n", "role": "user" }, { "content": "doVerify", "role": "assistant" } ]
def x(self, action, **query): base = urllib.parse.urljoin(self.server.base_url, action) return appendArgs(base, query)
buildURL
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, action, **query):\n base = urllib.parse.urljoin(self.server.base_url, action)\n return appendArgs(base, query)\n", "role": "user" }, { "content": "buildURL", "role": "assistant" } ]
def x(self, assoc): response = OpenIDResponse(self) response.fields.updateArgs(OPENID_NS, {'expires_in': str(assoc. expiresIn), 'assoc_type': self.assoc_type, 'assoc_handle': assoc. handle}) response.fields.updateArgs(OPENID_NS, self.session.answer(assoc.secret)) if not (self.session.session_type == 'no-encryption' and self.message. isOpenID1()): response.fields.setArg(OPENID_NS, 'session_type', self.session. session_type) return response
answer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, assoc):\n response = OpenIDResponse(self)\n response.fields.updateArgs(OPENID_NS, {'expires_in': str(assoc.\n expiresIn), 'assoc_type': self.assoc_type, 'assoc_handle': assoc.\n handle})\n response.fields.updateArgs(OPENID_NS, self.session.answer(assoc.secret))\n if not (self.session.session_type == 'no-encryption' and self.message.\n isOpenID1()):\n response.fields.setArg(OPENID_NS, 'session_type', self.session.\n session_type)\n return response\n", "role": "user" }, { "content": "answer", "role": "assistant" } ]
def x(self): if self.request.mode in BROWSER_REQUEST_MODES: if self.fields.getOpenIDNamespace() == OPENID2_NS and len(self. encodeToURL()) > OPENID1_URL_LIMIT: return ENCODE_HTML_FORM else: return ENCODE_URL else: return ENCODE_KVFORM
whichEncoding
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.request.mode in BROWSER_REQUEST_MODES:\n if self.fields.getOpenIDNamespace() == OPENID2_NS and len(self.\n encodeToURL()) > OPENID1_URL_LIMIT:\n return ENCODE_HTML_FORM\n else:\n return ENCODE_URL\n else:\n return ENCODE_KVFORM\n", "role": "user" }, { "content": "whichEncoding", "role": "assistant" } ]
def x(self): for i in range(1000): alias = 'cust%d' % (i,) if alias not in self.auth_level_aliases: return alias raise RuntimeError('Could not find an unused alias (tried 1000!)')
generateAlias
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n for i in range(1000):\n alias = 'cust%d' % (i,)\n if alias not in self.auth_level_aliases:\n return alias\n raise RuntimeError('Could not find an unused alias (tried 1000!)')\n", "role": "user" }, { "content": "generateAlias", "role": "assistant" } ]
def x(self, auth_level_uri): for alias, existing_uri in self.auth_level_aliases.items(): if auth_level_uri == existing_uri: return alias raise KeyError(auth_level_uri)
getAlias
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, auth_level_uri):\n for alias, existing_uri in self.auth_level_aliases.items():\n if auth_level_uri == existing_uri:\n return alias\n raise KeyError(auth_level_uri)\n", "role": "user" }, { "content": "getAlias", "role": "assistant" } ]
def x(parts): transformers = [] filters = [] for subfilter in parts: try: subfilter = list(subfilter) except TypeError: if hasattr(subfilter, 'getServiceEndpoints'): filters.append(subfilter) elif hasattr(subfilter, 'fromBasicServiceEndpoint'): transformers.append(subfilter.fromBasicServiceEndpoint) elif isinstance(subfilter, collections.Callable): transformers.append(subfilter) else: raise filter_type_error else: filters.append(mkCompoundFilter(subfilter)) if transformers: filters.append(TransformFilterMaker(transformers)) if len(filters) == 1: return filters[0] else: return CompoundFilter(filters)
mkCompoundFilter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(parts):\n transformers = []\n filters = []\n for subfilter in parts:\n try:\n subfilter = list(subfilter)\n except TypeError:\n if hasattr(subfilter, 'getServiceEndpoints'):\n filters.append(subfilter)\n elif hasattr(subfilter, 'fromBasicServiceEndpoint'):\n transformers.append(subfilter.fromBasicServiceEndpoint)\n elif isinstance(subfilter, collections.Callable):\n transformers.append(subfilter)\n else:\n raise filter_type_error\n else:\n filters.append(mkCompoundFilter(subfilter))\n if transformers:\n filters.append(TransformFilterMaker(transformers))\n if len(filters) == 1:\n return filters[0]\n else:\n return CompoundFilter(filters)\n", "role": "user" }, { "content": "mkCompoundFilter", "role": "assistant" } ]
def x(cronline, venusian_category='irc3.plugins.cron'): def x(func): def x(context, name, ob): obj = context.context crons = obj.get_plugin(Crons) if info.scope == 'class': callback = getattr(obj.get_plugin(ob), func.__name__) else: callback = irc3.utils.wraps_with_context(func, obj) crons.add_cron(cronline, callback) info = venusian.attach(func, callback, category=venusian_category) return func return wrapper
cron
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cronline, venusian_category='irc3.plugins.cron'):\n\n def x(func):\n\n def x(context, name, ob):\n obj = context.context\n crons = obj.get_plugin(Crons)\n if info.scope == 'class':\n callback = getattr(obj.get_plugin(ob), func.__name__)\n else:\n callback = irc3.utils.wraps_with_context(func, obj)\n crons.add_cron(cronline, callback)\n info = venusian.attach(func, callback, category=venusian_category)\n return func\n return wrapper\n", "role": "user" }, { "content": "cron", "role": "assistant" } ]
def x(self, f): for http_code in default_exceptions: self.error_handler_spec[None][http_code] = f return f
default_errorhandler
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, f):\n for http_code in default_exceptions:\n self.error_handler_spec[None][http_code] = f\n return f\n", "role": "user" }, { "content": "default_errorhandler", "role": "assistant" } ]
def x(self): response_mimetype = None if not request.accept_mimetypes: response_mimetype = self.default_mimetype else: all_media_types_wildcard = '*/*' for mimetype, q in request.accept_mimetypes: if mimetype == all_media_types_wildcard: response_mimetype = self.default_mimetype break if mimetype in self.response_formatters: response_mimetype = mimetype break return response_mimetype
response_mimetype_based_on_accept_header
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n response_mimetype = None\n if not request.accept_mimetypes:\n response_mimetype = self.default_mimetype\n else:\n all_media_types_wildcard = '*/*'\n for mimetype, q in request.accept_mimetypes:\n if mimetype == all_media_types_wildcard:\n response_mimetype = self.default_mimetype\n break\n if mimetype in self.response_formatters:\n response_mimetype = mimetype\n break\n return response_mimetype\n", "role": "user" }, { "content": "response_mimetype_based_on_accept_header", "role": "assistant" } ]
def x(self, rv): status = headers = None if isinstance(rv, tuple): rv, status, headers = rv + (None,) * (3 - len(rv)) response_mimetype = self._response_mimetype_based_on_accept_header() if response_mimetype is None: default_formatter = self.response_formatters.get(self.default_mimetype) available_mimetypes = default_formatter(mimetypes=list(self. response_formatters)) rv = self.response_class(response=available_mimetypes, status=406, mimetype=self.default_mimetype) elif isinstance(rv, dict): formatter = self.response_formatters.get(response_mimetype) rv = self.response_class(response=formatter(**rv), mimetype= response_mimetype) return super(ResponsiveFlask, self).make_response(rv=(rv, status, headers))
make_response
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, rv):\n status = headers = None\n if isinstance(rv, tuple):\n rv, status, headers = rv + (None,) * (3 - len(rv))\n response_mimetype = self._response_mimetype_based_on_accept_header()\n if response_mimetype is None:\n default_formatter = self.response_formatters.get(self.default_mimetype)\n available_mimetypes = default_formatter(mimetypes=list(self.\n response_formatters))\n rv = self.response_class(response=available_mimetypes, status=406,\n mimetype=self.default_mimetype)\n elif isinstance(rv, dict):\n formatter = self.response_formatters.get(response_mimetype)\n rv = self.response_class(response=formatter(**rv), mimetype=\n response_mimetype)\n return super(ResponsiveFlask, self).make_response(rv=(rv, status, headers))\n", "role": "user" }, { "content": "make_response", "role": "assistant" } ]
def x(regexp, callback=None, iotype='in', venusian_category='irc3.dcc'): return event(regexp, callback=callback, iotype='dcc_' + iotype, venusian_category=venusian_category)
dcc_event
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(regexp, callback=None, iotype='in', venusian_category='irc3.dcc'):\n return event(regexp, callback=callback, iotype='dcc_' + iotype,\n venusian_category=venusian_category)\n", "role": "user" }, { "content": "dcc_event", "role": "assistant" } ]
def x(func): def x(context, name, ob): obj = context.context if info.scope == 'class': f = getattr(obj.get_plugin(ob), func.__name__) else: f = func setattr(obj, f.__name__, f.__get__(obj, obj.__class__)) info = venusian.attach(func, callback, category='irc3.extend') return func
extend
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(func):\n\n def x(context, name, ob):\n obj = context.context\n if info.scope == 'class':\n f = getattr(obj.get_plugin(ob), func.__name__)\n else:\n f = func\n setattr(obj, f.__name__, f.__get__(obj, obj.__class__))\n info = venusian.attach(func, callback, category='irc3.extend')\n return func\n", "role": "user" }, { "content": "extend", "role": "assistant" } ]
def x(self, client, message): if client and message: messages = utils.split_message(message, self.config.max_length) for msg in messages: client.fwrite(':{c.srv} NOTICE {c.nick} :{msg}', msg=msg)
notice
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, client, message):\n if client and message:\n messages = utils.split_message(message, self.config.max_length)\n for msg in messages:\n client.fwrite(':{c.srv} NOTICE {c.nick} :{msg}', msg=msg)\n", "role": "user" }, { "content": "notice", "role": "assistant" } ]
def x(self, f): @wraps(f) def x(client_id): client_key = f(client_id) return {'id': client_id, 'key': client_key, 'algorithm': current_app.config['HAWK_ALGORITHM']} self._client_key_loader_func = wrapped_f return wrapped_f
client_key_loader
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, f):\n\n @wraps(f)\n def x(client_id):\n client_key = f(client_id)\n return {'id': client_id, 'key': client_key, 'algorithm':\n current_app.config['HAWK_ALGORITHM']}\n self._client_key_loader_func = wrapped_f\n return wrapped_f\n", "role": "user" }, { "content": "client_key_loader", "role": "assistant" } ]
def x(self, view_func): @wraps(view_func) def x(*args, **kwargs): if current_app.config['HAWK_ENABLED']: if current_app.config['HAWK_ALLOW_COOKIE_AUTH'] and session: self._auth_by_cookie() else: self._auth_by_signature() return view_func(*args, **kwargs) return wrapped_view_func
auth_required
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, view_func):\n\n @wraps(view_func)\n def x(*args, **kwargs):\n if current_app.config['HAWK_ENABLED']:\n if current_app.config['HAWK_ALLOW_COOKIE_AUTH'] and session:\n self._auth_by_cookie()\n else:\n self._auth_by_signature()\n return view_func(*args, **kwargs)\n return wrapped_view_func\n", "role": "user" }, { "content": "auth_required", "role": "assistant" } ]
def x(self, response): if 'Authorization' not in request.headers: return response try: mohawk_receiver = mohawk.Receiver(credentials_map=self. _client_key_loader_func, request_header=request.headers[ 'Authorization'], url=request.url, method=request.method, content=request.get_data(), content_type=request.mimetype, accept_untrusted_content=current_app.config[ 'HAWK_ACCEPT_UNTRUSTED_CONTENT'], localtime_offset_in_seconds= current_app.config['HAWK_LOCALTIME_OFFSET_IN_SECONDS'], timestamp_skew_in_seconds=current_app.config[ 'HAWK_TIMESTAMP_SKEW_IN_SECONDS']) except mohawk.exc.HawkFail: return response response.headers['Server-Authorization'] = mohawk_receiver.respond(content =response.data, content_type=response.mimetype) return response
sign_response
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, response):\n if 'Authorization' not in request.headers:\n return response\n try:\n mohawk_receiver = mohawk.Receiver(credentials_map=self.\n _client_key_loader_func, request_header=request.headers[\n 'Authorization'], url=request.url, method=request.method,\n content=request.get_data(), content_type=request.mimetype,\n accept_untrusted_content=current_app.config[\n 'HAWK_ACCEPT_UNTRUSTED_CONTENT'], localtime_offset_in_seconds=\n current_app.config['HAWK_LOCALTIME_OFFSET_IN_SECONDS'],\n timestamp_skew_in_seconds=current_app.config[\n 'HAWK_TIMESTAMP_SKEW_IN_SECONDS'])\n except mohawk.exc.HawkFail:\n return response\n response.headers['Server-Authorization'] = mohawk_receiver.respond(content\n =response.data, content_type=response.mimetype)\n return response\n", "role": "user" }, { "content": "sign_response", "role": "assistant" } ]
def x(self, name_or_class, mask, filepath=None, **kwargs): if isinstance(name_or_class, type): name = name_or_class.type protocol = name_or_class else: name = name_or_class protocol = self.protocols[name] assert name in DCC_TYPES if filepath: kwargs.setdefault('limit_rate', self.config['send_limit_rate']) kwargs['filepath'] = filepath if protocol.type == DCCSend.type: kwargs.setdefault('offset', 0) kwargs.update(filename_safe=slugify(os.path.basename(filepath)), filesize=os.path.getsize(filepath)) elif protocol.type == DCCGet.type: try: offset = os.path.getsize(filepath) except OSError: offset = 0 kwargs.setdefault('offset', offset) kwargs.setdefault('resume', False) kwargs.setdefault('port', None) f = protocol(mask=mask, ip=int(self.bot.ip), bot=self.bot, loop=self. loop, **kwargs) if kwargs['port']: if self.bot.config.get('dcc_sock_factory'): sock_factory = maybedotted(self.bot.config.dcc_sock_factory) args = dict(sock=sock_factory(self.bot, f.host, f.port)) else: args = dict(host=f.host, port=f.port) task = self.bot.create_task(self.loop.create_connection(f.factory, **args)) task.add_done_callback(partial(self.created, f)) else: task = self.bot.create_task(self.loop.create_server(f.factory, '0.0.0.0', 0, backlog=1)) task.add_done_callback(partial(self.created, f)) return f
create
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, name_or_class, mask, filepath=None, **kwargs):\n if isinstance(name_or_class, type):\n name = name_or_class.type\n protocol = name_or_class\n else:\n name = name_or_class\n protocol = self.protocols[name]\n assert name in DCC_TYPES\n if filepath:\n kwargs.setdefault('limit_rate', self.config['send_limit_rate'])\n kwargs['filepath'] = filepath\n if protocol.type == DCCSend.type:\n kwargs.setdefault('offset', 0)\n kwargs.update(filename_safe=slugify(os.path.basename(filepath)),\n filesize=os.path.getsize(filepath))\n elif protocol.type == DCCGet.type:\n try:\n offset = os.path.getsize(filepath)\n except OSError:\n offset = 0\n kwargs.setdefault('offset', offset)\n kwargs.setdefault('resume', False)\n kwargs.setdefault('port', None)\n f = protocol(mask=mask, ip=int(self.bot.ip), bot=self.bot, loop=self.\n loop, **kwargs)\n if kwargs['port']:\n if self.bot.config.get('dcc_sock_factory'):\n sock_factory = maybedotted(self.bot.config.dcc_sock_factory)\n args = dict(sock=sock_factory(self.bot, f.host, f.port))\n else:\n args = dict(host=f.host, port=f.port)\n task = self.bot.create_task(self.loop.create_connection(f.factory,\n **args))\n task.add_done_callback(partial(self.created, f))\n else:\n task = self.bot.create_task(self.loop.create_server(f.factory,\n '0.0.0.0', 0, backlog=1))\n task.add_done_callback(partial(self.created, f))\n return f\n", "role": "user" }, { "content": "create", "role": "assistant" } ]
def x(self, mask, filename, port, pos): self.connections['send']['masks'][mask][port].offset = pos message = 'DCC ACCEPT %s %d %d' % (filename, port, pos) self.bot.ctcp(mask, message)
resume
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, mask, filename, port, pos):\n self.connections['send']['masks'][mask][port].offset = pos\n message = 'DCC ACCEPT %s %d %d' % (filename, port, pos)\n self.bot.ctcp(mask, message)\n", "role": "user" }, { "content": "resume", "role": "assistant" } ]
def x(self, name_or_class, mask): if isinstance(name_or_class, type): name = name_or_class.type else: name = name_or_class info = self.connections[name] limit = self.config[name + '_limit'] if limit and info['total'] >= limit: msg = ( 'Sorry, there is too much DCC %s active. Please try again later.' % name.upper()) self.bot.notice(mask, msg) return False if mask not in info['masks']: return True limit = self.config[name + '_user_limit'] if limit and info['masks'][mask] >= limit: msg = ( 'Sorry, you have too many DCC %s active. Close the other connection(s) or wait a few seconds and try again.' % name.upper()) self.bot.notice(mask, msg) return False return True
is_allowed
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, name_or_class, mask):\n if isinstance(name_or_class, type):\n name = name_or_class.type\n else:\n name = name_or_class\n info = self.connections[name]\n limit = self.config[name + '_limit']\n if limit and info['total'] >= limit:\n msg = (\n 'Sorry, there is too much DCC %s active. Please try again later.' %\n name.upper())\n self.bot.notice(mask, msg)\n return False\n if mask not in info['masks']:\n return True\n limit = self.config[name + '_user_limit']\n if limit and info['masks'][mask] >= limit:\n msg = (\n 'Sorry, you have too many DCC %s active. Close the other connection(s) or wait a few seconds and try again.'\n % name.upper())\n self.bot.notice(mask, msg)\n return False\n return True\n", "role": "user" }, { "content": "is_allowed", "role": "assistant" } ]