source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
|---|---|---|
def x(self, key, max_age, **opts):
self.expire_at(key, time() + max_age, **opts)
|
expire
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, max_age, **opts):\n self.expire_at(key, time() + max_age, **opts)\n",
"role": "user"
},
{
"content": "expire",
"role": "assistant"
}
] |
def x(self, key, **opts):
key, store = self._expand_opts(key, opts)
if hasattr(store, 'ttl'):
return store.ttl(key)
data = store.get(key)
if data is None:
return None
expiry = data[EXPIRY_INDEX]
if expiry is not None:
return max(0, expiry - time()) or None
|
ttl
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, **opts):\n key, store = self._expand_opts(key, opts)\n if hasattr(store, 'ttl'):\n return store.ttl(key)\n data = store.get(key)\n if data is None:\n return None\n expiry = data[EXPIRY_INDEX]\n if expiry is not None:\n return max(0, expiry - time()) or None\n",
"role": "user"
},
{
"content": "ttl",
"role": "assistant"
}
] |
def x(self, key, **opts):
key, store = self._expand_opts(key, opts)
data = store.get(key)
if not data or self._has_expired(data, opts):
return False
return True
|
exists
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, **opts):\n key, store = self._expand_opts(key, opts)\n data = store.get(key)\n if not data or self._has_expired(data, opts):\n return False\n return True\n",
"role": "user"
},
{
"content": "exists",
"role": "assistant"
}
] |
def x(self):
self.unuse_region()
if self._rlist is not None:
try:
if len(self._rlist) == 0:
self._manager._fdict.pop(self._rlist.path_or_fd())
except (TypeError, KeyError):
pass
|
destroy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.unuse_region()\n if self._rlist is not None:\n try:\n if len(self._rlist) == 0:\n self._manager._fdict.pop(self._rlist.path_or_fd())\n except (TypeError, KeyError):\n pass\n",
"role": "user"
},
{
"content": "destroy",
"role": "assistant"
}
] |
def x(self, rhs):
self._manager = rhs._manager
self._rlist = type(rhs._rlist)(rhs._rlist)
self._region = rhs._region
self._ofs = rhs._ofs
self._size = rhs._size
for region in self._rlist:
region.increment_client_count()
if self._region is not None:
self._region.increment_client_count()
|
copy_from
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rhs):\n self._manager = rhs._manager\n self._rlist = type(rhs._rlist)(rhs._rlist)\n self._region = rhs._region\n self._ofs = rhs._ofs\n self._size = rhs._size\n for region in self._rlist:\n region.increment_client_count()\n if self._region is not None:\n self._region.increment_client_count()\n",
"role": "user"
},
{
"content": "copy_from",
"role": "assistant"
}
] |
def x(self, offset=0, size=0, flags=0):
need_region = True
man = self._manager
fsize = self._rlist.file_size()
size = min(size or fsize, man.window_size() or fsize)
if self._region is not None:
if self._region.includes_ofs(offset):
need_region = False
else:
self.unuse_region()
if offset >= fsize:
return self
if need_region:
self._region = man._obtain_region(self._rlist, offset, size, flags,
False)
self._region.increment_client_count()
self._ofs = offset - self._region._b
self._size = min(size, self._region.ofs_end() - offset)
return self
|
use_region
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, offset=0, size=0, flags=0):\n need_region = True\n man = self._manager\n fsize = self._rlist.file_size()\n size = min(size or fsize, man.window_size() or fsize)\n if self._region is not None:\n if self._region.includes_ofs(offset):\n need_region = False\n else:\n self.unuse_region()\n if offset >= fsize:\n return self\n if need_region:\n self._region = man._obtain_region(self._rlist, offset, size, flags,\n False)\n self._region.increment_client_count()\n self._ofs = offset - self._region._b\n self._size = min(size, self._region.ofs_end() - offset)\n return self\n",
"role": "user"
},
{
"content": "use_region",
"role": "assistant"
}
] |
def x(self):
return buffer(self._region.buffer(), self._ofs, self._size)
|
buffer
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return buffer(self._region.buffer(), self._ofs, self._size)\n",
"role": "user"
},
{
"content": "buffer",
"role": "assistant"
}
] |
def x(self, ofs):
return (self._region._b + self._ofs <= ofs < self._region._b + self.
_ofs + self._size)
|
includes_ofs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ofs):\n return (self._region._b + self._ofs <= ofs < self._region._b + self.\n _ofs + self._size)\n",
"role": "user"
},
{
"content": "includes_ofs",
"role": "assistant"
}
] |
def x(self):
if isinstance(self._rlist.path_or_fd(), int):
raise ValueError(
'Path queried although mapping was applied to a file descriptor')
return self._rlist.path_or_fd()
|
path
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if isinstance(self._rlist.path_or_fd(), int):\n raise ValueError(\n 'Path queried although mapping was applied to a file descriptor')\n return self._rlist.path_or_fd()\n",
"role": "user"
},
{
"content": "path",
"role": "assistant"
}
] |
def x(self):
if isinstance(self._rlist.path_or_fd(), string_types()):
raise ValueError(
'File descriptor queried although mapping was generated from path')
return self._rlist.path_or_fd()
|
fd
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if isinstance(self._rlist.path_or_fd(), string_types()):\n raise ValueError(\n 'File descriptor queried although mapping was generated from path')\n return self._rlist.path_or_fd()\n",
"role": "user"
},
{
"content": "fd",
"role": "assistant"
}
] |
def x(self, size):
num_found = 0
while size == 0 or self._memory_size + size > self._max_memory_size:
lru_region = None
lru_list = None
for regions in self._fdict.values():
for region in regions:
if region.client_count() == 1 and (lru_region is None or
region._uc < lru_region._uc):
lru_region = region
lru_list = regions
if lru_region is None:
break
num_found += 1
del lru_list[lru_list.index(lru_region)]
lru_region.increment_client_count(-1)
self._memory_size -= lru_region.size()
self._handle_count -= 1
return num_found
|
collect_lru_region
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size):\n num_found = 0\n while size == 0 or self._memory_size + size > self._max_memory_size:\n lru_region = None\n lru_list = None\n for regions in self._fdict.values():\n for region in regions:\n if region.client_count() == 1 and (lru_region is None or \n region._uc < lru_region._uc):\n lru_region = region\n lru_list = regions\n if lru_region is None:\n break\n num_found += 1\n del lru_list[lru_list.index(lru_region)]\n lru_region.increment_client_count(-1)\n self._memory_size -= lru_region.size()\n self._handle_count -= 1\n return num_found\n",
"role": "user"
},
{
"content": "collect_lru_region",
"role": "assistant"
}
] |
def x(self, a, offset, size, flags, is_recursive):
if self._memory_size + size > self._max_memory_size:
self._collect_lru_region(size)
r = None
if a:
assert len(a) == 1
r = a[0]
else:
try:
r = self.MapRegionCls(a.path_or_fd(), 0, sys.maxsize, flags)
except Exception:
if is_recursive:
raise
self._collect_lru_region(0)
return self._obtain_region(a, offset, size, flags, True)
self._handle_count += 1
self._memory_size += r.size()
a.append(r)
assert r.includes_ofs(offset)
return r
|
obtain_region
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, a, offset, size, flags, is_recursive):\n if self._memory_size + size > self._max_memory_size:\n self._collect_lru_region(size)\n r = None\n if a:\n assert len(a) == 1\n r = a[0]\n else:\n try:\n r = self.MapRegionCls(a.path_or_fd(), 0, sys.maxsize, flags)\n except Exception:\n if is_recursive:\n raise\n self._collect_lru_region(0)\n return self._obtain_region(a, offset, size, flags, True)\n self._handle_count += 1\n self._memory_size += r.size()\n a.append(r)\n assert r.includes_ofs(offset)\n return r\n",
"role": "user"
},
{
"content": "obtain_region",
"role": "assistant"
}
] |
def x(self, path_or_fd):
regions = self._fdict.get(path_or_fd)
if regions is None:
regions = self.MapRegionListCls(path_or_fd)
self._fdict[path_or_fd] = regions
return self.WindowCursorCls(self, regions)
|
make_cursor
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, path_or_fd):\n regions = self._fdict.get(path_or_fd)\n if regions is None:\n regions = self.MapRegionListCls(path_or_fd)\n self._fdict[path_or_fd] = regions\n return self.WindowCursorCls(self, regions)\n",
"role": "user"
},
{
"content": "make_cursor",
"role": "assistant"
}
] |
def x(self):
return reduce(lambda x, y: x + y, (1 for rlist in self._fdict.values() if
len(rlist) > 0), 0)
|
num_open_files
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return reduce(lambda x, y: x + y, (1 for rlist in self._fdict.values() if\n len(rlist) > 0), 0)\n",
"role": "user"
},
{
"content": "num_open_files",
"role": "assistant"
}
] |
def x(self, base_path):
if sys.platform != 'win32':
return
num_closed = 0
for path, rlist in self._fdict.items():
if path.startswith(base_path):
for region in rlist:
region.release()
num_closed += 1
return num_closed
|
force_map_handle_removal_win
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, base_path):\n if sys.platform != 'win32':\n return\n num_closed = 0\n for path, rlist in self._fdict.items():\n if path.startswith(base_path):\n for region in rlist:\n region.release()\n num_closed += 1\n return num_closed\n",
"role": "user"
},
{
"content": "force_map_handle_removal_win",
"role": "assistant"
}
] |
def x(num, round_up):
res = num // ALLOCATIONGRANULARITY * ALLOCATIONGRANULARITY
if round_up and res != num:
res += ALLOCATIONGRANULARITY
return res
|
align_to_mmap
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(num, round_up):\n res = num // ALLOCATIONGRANULARITY * ALLOCATIONGRANULARITY\n if round_up and res != num:\n res += ALLOCATIONGRANULARITY\n return res\n",
"role": "user"
},
{
"content": "align_to_mmap",
"role": "assistant"
}
] |
def x(self):
nofs = align_to_mmap(self.ofs, 0)
self.size += self.ofs - nofs
self.ofs = nofs
self.size = align_to_mmap(self.size, 1)
|
align
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n nofs = align_to_mmap(self.ofs, 0)\n self.size += self.ofs - nofs\n self.ofs = nofs\n self.size = align_to_mmap(self.size, 1)\n",
"role": "user"
},
{
"content": "align",
"role": "assistant"
}
] |
def x(self, window, max_size):
rofs = self.ofs - window.ofs_end()
nsize = rofs + self.size
rofs -= nsize - min(nsize, max_size)
self.ofs = self.ofs - rofs
self.size += rofs
|
extend_left_to
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, window, max_size):\n rofs = self.ofs - window.ofs_end()\n nsize = rofs + self.size\n rofs -= nsize - min(nsize, max_size)\n self.ofs = self.ofs - rofs\n self.size += rofs\n",
"role": "user"
},
{
"content": "extend_left_to",
"role": "assistant"
}
] |
def x(self, window, max_size):
self.size = min(self.size + (window.ofs - self.ofs_end()), max_size)
|
extend_right_to
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, window, max_size):\n self.size = min(self.size + (window.ofs - self.ofs_end()), max_size)\n",
"role": "user"
},
{
"content": "extend_right_to",
"role": "assistant"
}
] |
def x(self, ofs):
return self._b <= ofs < self._b + self._size
|
includes_ofs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ofs):\n return self._b <= ofs < self._b + self._size\n",
"role": "user"
},
{
"content": "includes_ofs",
"role": "assistant"
}
] |
def x(self, ofs=1):
self._uc += ofs
assert self._uc > -1, 'Increments must match decrements, usage counter negative: %i' % self._uc
if self.client_count() == 0:
self.release()
return True
else:
return False
|
increment_client_count
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ofs=1):\n self._uc += ofs\n assert self._uc > -1, 'Increments must match decrements, usage counter negative: %i' % self._uc\n if self.client_count() == 0:\n self.release()\n return True\n else:\n return False\n",
"role": "user"
},
{
"content": "increment_client_count",
"role": "assistant"
}
] |
def x(self):
if self._file_size is None:
if isinstance(self._path_or_fd, string_types()):
self._file_size = os.stat(self._path_or_fd).st_size
else:
self._file_size = os.fstat(self._path_or_fd).st_size
return self._file_size
|
file_size
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._file_size is None:\n if isinstance(self._path_or_fd, string_types()):\n self._file_size = os.stat(self._path_or_fd).st_size\n else:\n self._file_size = os.fstat(self._path_or_fd).st_size\n return self._file_size\n",
"role": "user"
},
{
"content": "file_size",
"role": "assistant"
}
] |
def x(self, cursor=None, offset=0, size=sys.maxsize, flags=0):
if cursor:
self._c = cursor
if self._c is not None and self._c.is_associated():
res = self._c.use_region(offset, size, flags).is_valid()
if res:
if size > self._c.file_size():
size = self._c.file_size() - offset
self._size = size
return res
return False
|
begin_access
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cursor=None, offset=0, size=sys.maxsize, flags=0):\n if cursor:\n self._c = cursor\n if self._c is not None and self._c.is_associated():\n res = self._c.use_region(offset, size, flags).is_valid()\n if res:\n if size > self._c.file_size():\n size = self._c.file_size() - offset\n self._size = size\n return res\n return False\n",
"role": "user"
},
{
"content": "begin_access",
"role": "assistant"
}
] |
def x():
parser = argparse.ArgumentParser(description=
'generate HTML from crawler JSON')
parser.add_argument('--data-dir', default='data', help=
u'Directory containing JSON data from crawler [%(default)s]')
parser.add_argument('--output-dir', default='html', help=
u'Directory to output the resulting HTML files [%(default)s]')
return parser
|
make_parser
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n parser = argparse.ArgumentParser(description=\n 'generate HTML from crawler JSON')\n parser.add_argument('--data-dir', default='data', help=\n u'Directory containing JSON data from crawler [%(default)s]')\n parser.add_argument('--output-dir', default='html', help=\n u'Directory to output the resulting HTML files [%(default)s]')\n return parser\n",
"role": "user"
},
{
"content": "make_parser",
"role": "assistant"
}
] |
def x():
parser = make_parser()
args = parser.parse_args()
data_dir = Path(args.data_dir).expand()
if not data_dir.isdir():
msg = u'Data directory {dir} does not exist'.format(dir=args.data_dir)
raise ValueError(msg)
data_filenames = [name for name in data_dir.files() if name.endswith(
'.json')]
if not data_filenames:
msg = u'Data directory {dir} contains no JSON files'.format(dir=
args.data_dir)
raise ValueError(msg)
output_dir = Path(args.output_dir).expand()
output_dir.makedirs_p()
return render_html(data_dir, output_dir)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n parser = make_parser()\n args = parser.parse_args()\n data_dir = Path(args.data_dir).expand()\n if not data_dir.isdir():\n msg = u'Data directory {dir} does not exist'.format(dir=args.data_dir)\n raise ValueError(msg)\n data_filenames = [name for name in data_dir.files() if name.endswith(\n '.json')]\n if not data_filenames:\n msg = u'Data directory {dir} contains no JSON files'.format(dir=\n args.data_dir)\n raise ValueError(msg)\n output_dir = Path(args.output_dir).expand()\n output_dir.makedirs_p()\n return render_html(data_dir, output_dir)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(code):
bits = code.split('.')
for bit in reversed(bits):
if WCAG_REFS_RE.match(bit):
return bit.split(',')
return []
|
wcag_refs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(code):\n bits = code.split('.')\n for bit in reversed(bits):\n if WCAG_REFS_RE.match(bit):\n return bit.split(',')\n return []\n",
"role": "user"
},
{
"content": "wcag_refs",
"role": "assistant"
}
] |
def x(env, html_path, template_filename, context):
template = env.get_template(template_filename)
rendered_html = template.render(**context)
html_path.write_text(rendered_html, encoding='utf-8')
|
render_template
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(env, html_path, template_filename, context):\n template = env.get_template(template_filename)\n rendered_html = template.render(**context)\n html_path.write_text(rendered_html, encoding='utf-8')\n",
"role": "user"
},
{
"content": "render_template",
"role": "assistant"
}
] |
def x(data_dir, output_dir):
env = Environment(loader=PackageLoader('pa11ycrawler', 'templates'))
env.globals['wcag_refs'] = wcag_refs
pages = []
counter = collections.Counter()
grouped_violations = collections.defaultdict(dict)
for data_file in data_dir.files('*.json'):
data = json.load(data_file.open())
num_error, num_warning, num_notice = pa11y_counts(data['pa11y'])
data['num_error'] = num_error
data['num_warning'] = num_warning
data['num_notice'] = num_notice
fname = data_file.namebase + '.html'
html_path = output_dir / fname
render_template(env, html_path, 'detail.html', data)
data['filename'] = fname
pages.append(data)
for violation in data['pa11y']:
violation_id = hashlib.md5((violation['selector'] + violation[
'code']).encode('utf-8')).hexdigest()
if violation_id not in grouped_violations[violation['type']]:
violation['pages'] = []
grouped_violations[violation['type']][violation_id] = violation
counter[violation['type']] += 1
grouped_violations[violation['type']][violation_id]['pages'
].append({'url': data['url'], 'page_title': data['page_title']}
)
def x(page):
return page['num_error'], page['num_warning'], page['num_notice']
index_path = output_dir / INDEX_TEMPLATE
render_template(env, index_path, INDEX_TEMPLATE, {'pages': sorted(pages,
key=extract_nums, reverse=True), 'num_error': counter['error'],
'num_warning': counter['warning'], 'num_notice': counter['notice']})
for violation_type in grouped_violations:
unique_path = output_dir / u'{}s.html'.format(violation_type)
render_template(env, unique_path, UNIQUE_TEMPLATE, {
'grouped_violations': sorted(grouped_violations[violation_type]
.values(), key=lambda item: len(item['pages']), reverse=True),
'current_type': violation_type, 'violation_counts': counter})
|
render_html
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data_dir, output_dir):\n env = Environment(loader=PackageLoader('pa11ycrawler', 'templates'))\n env.globals['wcag_refs'] = wcag_refs\n pages = []\n counter = collections.Counter()\n grouped_violations = collections.defaultdict(dict)\n for data_file in data_dir.files('*.json'):\n data = json.load(data_file.open())\n num_error, num_warning, num_notice = pa11y_counts(data['pa11y'])\n data['num_error'] = num_error\n data['num_warning'] = num_warning\n data['num_notice'] = num_notice\n fname = data_file.namebase + '.html'\n html_path = output_dir / fname\n render_template(env, html_path, 'detail.html', data)\n data['filename'] = fname\n pages.append(data)\n for violation in data['pa11y']:\n violation_id = hashlib.md5((violation['selector'] + violation[\n 'code']).encode('utf-8')).hexdigest()\n if violation_id not in grouped_violations[violation['type']]:\n violation['pages'] = []\n grouped_violations[violation['type']][violation_id] = violation\n counter[violation['type']] += 1\n grouped_violations[violation['type']][violation_id]['pages'\n ].append({'url': data['url'], 'page_title': data['page_title']}\n )\n\n def x(page):\n return page['num_error'], page['num_warning'], page['num_notice']\n index_path = output_dir / INDEX_TEMPLATE\n render_template(env, index_path, INDEX_TEMPLATE, {'pages': sorted(pages,\n key=extract_nums, reverse=True), 'num_error': counter['error'],\n 'num_warning': counter['warning'], 'num_notice': counter['notice']})\n for violation_type in grouped_violations:\n unique_path = output_dir / u'{}s.html'.format(violation_type)\n render_template(env, unique_path, UNIQUE_TEMPLATE, {\n 'grouped_violations': sorted(grouped_violations[violation_type]\n .values(), key=lambda item: len(item['pages']), reverse=True),\n 'current_type': violation_type, 'violation_counts': counter})\n",
"role": "user"
},
{
"content": "render_html",
"role": "assistant"
}
] |
def x(spider, url):
ignore_rules = getattr(spider, 'pa11y_ignore_rules', {}) or {}
return itertools.chain.from_iterable(rule_list for url_glob, rule_list in
ignore_rules.items() if fnmatch.fnmatch(url, url_glob))
|
ignore_rules_for_url
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(spider, url):\n ignore_rules = getattr(spider, 'pa11y_ignore_rules', {}) or {}\n return itertools.chain.from_iterable(rule_list for url_glob, rule_list in\n ignore_rules.items() if fnmatch.fnmatch(url, url_glob))\n",
"role": "user"
},
{
"content": "ignore_rules_for_url",
"role": "assistant"
}
] |
def x(ignore_rule, pa11y_result):
return all(fnmatch.fnmatch(pa11y_result.get(attr), ignore_rule.get(attr
)) for attr in ignore_rule.keys())
|
ignore_rule_matches_result
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ignore_rule, pa11y_result):\n return all(fnmatch.fnmatch(pa11y_result.get(attr), ignore_rule.get(attr\n )) for attr in ignore_rule.keys())\n",
"role": "user"
},
{
"content": "ignore_rule_matches_result",
"role": "assistant"
}
] |
def x(stdout, spider, url):
if not stdout:
return []
results = json.loads(stdout.decode('utf8'))
ignore_rules = ignore_rules_for_url(spider, url)
for rule in ignore_rules:
results = [result for result in results if not
ignore_rule_matches_result(rule, result)]
return results
|
load_pa11y_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(stdout, spider, url):\n if not stdout:\n return []\n results = json.loads(stdout.decode('utf8'))\n ignore_rules = ignore_rules_for_url(spider, url)\n for rule in ignore_rules:\n results = [result for result in results if not\n ignore_rule_matches_result(rule, result)]\n return results\n",
"role": "user"
},
{
"content": "load_pa11y_results",
"role": "assistant"
}
] |
def x(item):
config = {'page': {'headers': item['request_headers']}}
config_file = tempfile.NamedTemporaryFile(mode='w', prefix=
'pa11y-config-', suffix='.json', delete=False)
json.dump(config, config_file)
config_file.close()
return config_file
|
write_pa11y_config
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(item):\n config = {'page': {'headers': item['request_headers']}}\n config_file = tempfile.NamedTemporaryFile(mode='w', prefix=\n 'pa11y-config-', suffix='.json', delete=False)\n json.dump(config, config_file)\n config_file.close()\n return config_file\n",
"role": "user"
},
{
"content": "write_pa11y_config",
"role": "assistant"
}
] |
def x(expected_title, pa11y_results, logger):
if not pa11y_results:
return
title_errs = [err for err in pa11y_results if err['context'].startswith
('<title')]
for err in title_errs:
title_elmt = html.fragment_fromstring(err['context'])
elided_title = title_elmt.text.strip()
if elided_title.endswith('...'):
pa11y_title = elided_title[0:-4].strip()
else:
pa11y_title = elided_title
if pa11y_title not in expected_title:
msg = (
u'Parser mismatch! Scrapy saw full title "{scrapy_title}", Pa11y saw elided title "{elided_title}".'
.format(scrapy_title=expected_title, elided_title=elided_title)
)
logger.error(msg)
|
check_title_match
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(expected_title, pa11y_results, logger):\n if not pa11y_results:\n return\n title_errs = [err for err in pa11y_results if err['context'].startswith\n ('<title')]\n for err in title_errs:\n title_elmt = html.fragment_fromstring(err['context'])\n elided_title = title_elmt.text.strip()\n if elided_title.endswith('...'):\n pa11y_title = elided_title[0:-4].strip()\n else:\n pa11y_title = elided_title\n if pa11y_title not in expected_title:\n msg = (\n u'Parser mismatch! Scrapy saw full title \"{scrapy_title}\", Pa11y saw elided title \"{elided_title}\".'\n .format(scrapy_title=expected_title, elided_title=elided_title)\n )\n logger.error(msg)\n",
"role": "user"
},
{
"content": "check_title_match",
"role": "assistant"
}
] |
def x(pa11y_results, spider):
num_err, num_warn, num_notice = pa11y_counts(pa11y_results)
stats = spider.crawler.stats
stats.inc_value('pa11y/error', count=num_err, spider=spider)
stats.inc_value('pa11y/warning', count=num_warn, spider=spider)
stats.inc_value('pa11y/notice', count=num_notice, spider=spider)
|
track_pa11y_stats
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pa11y_results, spider):\n num_err, num_warn, num_notice = pa11y_counts(pa11y_results)\n stats = spider.crawler.stats\n stats.inc_value('pa11y/error', count=num_err, spider=spider)\n stats.inc_value('pa11y/warning', count=num_warn, spider=spider)\n stats.inc_value('pa11y/notice', count=num_notice, spider=spider)\n",
"role": "user"
},
{
"content": "track_pa11y_stats",
"role": "assistant"
}
] |
def x(item, pa11y_results, data_dir):
data = dict(item)
data['pa11y'] = pa11y_results
hasher = hashlib.md5()
hasher.update(item['url'].encode('utf8'))
hasher.update(item['accessed_at'].isoformat().encode('utf8'))
basename = hasher.hexdigest()
filename = basename + '.json'
filepath = data_dir / filename
data_dir.makedirs_p()
text = json.dumps(data, cls=DateTimeEncoder)
filepath.write_text(text)
|
write_pa11y_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(item, pa11y_results, data_dir):\n data = dict(item)\n data['pa11y'] = pa11y_results\n hasher = hashlib.md5()\n hasher.update(item['url'].encode('utf8'))\n hasher.update(item['accessed_at'].isoformat().encode('utf8'))\n basename = hasher.hexdigest()\n filename = basename + '.json'\n filepath = data_dir / filename\n data_dir.makedirs_p()\n text = json.dumps(data, cls=DateTimeEncoder)\n filepath.write_text(text)\n",
"role": "user"
},
{
"content": "write_pa11y_results",
"role": "assistant"
}
] |
def x(self, item, spider):
config_file = write_pa11y_config(item)
args = [self.pa11y_path, item['url'], '--config={file}'.format(file=
config_file.name)]
for flag, value in self.cli_flags.items():
args.append('--{flag}={value}'.format(flag=flag, value=value))
retries_remaining = 3
while retries_remaining:
logline = ' '.join(args)
if retries_remaining != 3:
logline += u' # (retry {num})'.format(num=3 - retries_remaining)
spider.logger.info(logline)
proc = sp.Popen(args, shell=False, stdout=sp.PIPE, stderr=sp.PIPE)
stdout, stderr = proc.communicate()
if proc.returncode in (0, 2):
break
else:
retries_remaining -= 1
if retries_remaining == 0:
raise DropItem(u"Couldn't get pa11y results for {url}. Error:\n{err}"
.format(url=item['url'], err=stderr))
pa11y_results = load_pa11y_results(stdout, spider, item['url'])
check_title_match(item['page_title'], pa11y_results, spider.logger)
track_pa11y_stats(pa11y_results, spider)
os.remove(config_file.name)
write_pa11y_results(item, pa11y_results, Path(spider.data_dir))
return item
|
process_item
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, item, spider):\n config_file = write_pa11y_config(item)\n args = [self.pa11y_path, item['url'], '--config={file}'.format(file=\n config_file.name)]\n for flag, value in self.cli_flags.items():\n args.append('--{flag}={value}'.format(flag=flag, value=value))\n retries_remaining = 3\n while retries_remaining:\n logline = ' '.join(args)\n if retries_remaining != 3:\n logline += u' # (retry {num})'.format(num=3 - retries_remaining)\n spider.logger.info(logline)\n proc = sp.Popen(args, shell=False, stdout=sp.PIPE, stderr=sp.PIPE)\n stdout, stderr = proc.communicate()\n if proc.returncode in (0, 2):\n break\n else:\n retries_remaining -= 1\n if retries_remaining == 0:\n raise DropItem(u\"Couldn't get pa11y results for {url}. Error:\\n{err}\"\n .format(url=item['url'], err=stderr))\n pa11y_results = load_pa11y_results(stdout, spider, item['url'])\n check_title_match(item['page_title'], pa11y_results, spider.logger)\n track_pa11y_stats(pa11y_results, spider)\n os.remove(config_file.name)\n write_pa11y_results(item, pa11y_results, Path(spider.data_dir))\n return item\n",
"role": "user"
},
{
"content": "process_item",
"role": "assistant"
}
] |
def x(extension):
for ext in hamlpy.VALID_EXTENSIONS:
if extension.endswith('.' + ext):
return True
return False
|
watched_extension
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(extension):\n for ext in hamlpy.VALID_EXTENSIONS:\n if extension.endswith('.' + ext):\n return True\n return False\n",
"role": "user"
},
{
"content": "watched_extension",
"role": "assistant"
}
] |
def x(folder, destination, compiler_args):
for dirpath, dirnames, filenames in os.walk(folder):
for filename in filenames:
if watched_extension(filename) and not filename.startswith('.#'):
fullpath = os.path.join(dirpath, filename)
subfolder = os.path.relpath(dirpath, folder)
mtime = os.stat(fullpath).st_mtime
compiled_folder = os.path.join(destination, subfolder)
if not os.path.exists(compiled_folder):
os.makedirs(compiled_folder)
compiled_path = _compiled_path(compiled_folder, filename)
if not fullpath in compiled or compiled[fullpath
] < mtime or not os.path.isfile(compiled_path):
compile_file(fullpath, compiled_path, compiler_args)
compiled[fullpath] = mtime
|
watch_folder
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(folder, destination, compiler_args):\n for dirpath, dirnames, filenames in os.walk(folder):\n for filename in filenames:\n if watched_extension(filename) and not filename.startswith('.#'):\n fullpath = os.path.join(dirpath, filename)\n subfolder = os.path.relpath(dirpath, folder)\n mtime = os.stat(fullpath).st_mtime\n compiled_folder = os.path.join(destination, subfolder)\n if not os.path.exists(compiled_folder):\n os.makedirs(compiled_folder)\n compiled_path = _compiled_path(compiled_folder, filename)\n if not fullpath in compiled or compiled[fullpath\n ] < mtime or not os.path.isfile(compiled_path):\n compile_file(fullpath, compiled_path, compiler_args)\n compiled[fullpath] = mtime\n",
"role": "user"
},
{
"content": "watch_folder",
"role": "assistant"
}
] |
def x(self, url):
return len(url.path.segments) == 6 and url.path.segments[0
] == 'courses' and url.path.segments[2
] == 'courseware' and url.path.segments[5] == '1'
|
is_sequence_start_page
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, url):\n return len(url.path.segments) == 6 and url.path.segments[0\n ] == 'courses' and url.path.segments[2\n ] == 'courseware' and url.path.segments[5] == '1'\n",
"role": "user"
},
{
"content": "is_sequence_start_page",
"role": "assistant"
}
] |
def x(self, item, spider):
url = self.clean_url(item['url'])
if self.is_sequence_start_page(url):
url = url.parent
if url in self.urls_seen:
raise DropItem(u'Dropping duplicate url {url}'.format(url=item['url']))
else:
self.urls_seen.add(url)
return item
|
process_item
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, item, spider):\n url = self.clean_url(item['url'])\n if self.is_sequence_start_page(url):\n url = url.parent\n if url in self.urls_seen:\n raise DropItem(u'Dropping duplicate url {url}'.format(url=item['url']))\n else:\n self.urls_seen.add(url)\n return item\n",
"role": "user"
},
{
"content": "process_item",
"role": "assistant"
}
] |
def x(self, item, spider):
url = URLObject(item['url'])
if url.path.startswith('/api/'):
raise DropItem(u'Dropping DRF url {url}'.format(url=url))
else:
return item
|
process_item
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, item, spider):\n url = URLObject(item['url'])\n if url.path.startswith('/api/'):\n raise DropItem(u'Dropping DRF url {url}'.format(url=url))\n else:\n return item\n",
"role": "user"
},
{
"content": "process_item",
"role": "assistant"
}
] |
def x(results):
num_error = 0
num_warning = 0
num_notice = 0
for result in results:
if result['type'] == 'error':
num_error += 1
elif result['type'] == 'warning':
num_warning += 1
elif result['type'] == 'notice':
num_notice += 1
return num_error, num_warning, num_notice
|
pa11y_counts
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(results):\n num_error = 0\n num_warning = 0\n num_notice = 0\n for result in results:\n if result['type'] == 'error':\n num_error += 1\n elif result['type'] == 'warning':\n num_warning += 1\n elif result['type'] == 'notice':\n num_notice += 1\n return num_error, num_warning, num_notice\n",
"role": "user"
},
{
"content": "pa11y_counts",
"role": "assistant"
}
] |
def x(response):
cookie_headers = [h.decode('ascii') for h in response.headers.getlist(
'Set-Cookie')]
if not cookie_headers:
return None
csrf_headers = [h for h in cookie_headers if h.startswith('csrftoken=')]
if not csrf_headers:
return None
match = re.match('csrftoken=([^ ;]+);', csrf_headers[-1])
return match.group(1)
|
get_csrf_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(response):\n cookie_headers = [h.decode('ascii') for h in response.headers.getlist(\n 'Set-Cookie')]\n if not cookie_headers:\n return None\n csrf_headers = [h for h in cookie_headers if h.startswith('csrftoken=')]\n if not csrf_headers:\n return None\n match = re.match('csrftoken=([^ ;]+);', csrf_headers[-1])\n return match.group(1)\n",
"role": "user"
},
{
"content": "get_csrf_token",
"role": "assistant"
}
] |
def x(file=None, url=None):
if not file and not url:
return None
if file:
file = Path(file)
if not file.isfile():
msg = (
u'pa11y_ignore_rules_file specified, but file does not exist! {file}'
.format(file=file))
raise ValueError(msg)
return yaml.safe_load(file.text())
resp = requests.get(url)
if not resp.ok:
msg = (
u'pa11y_ignore_rules_url specified, but failed to fetch URL. status={status}'
.format(status=resp.status_code))
err = RuntimeError(msg)
err.response = resp
raise err
return yaml.safe_load(resp.text)
|
load_pa11y_ignore_rules
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(file=None, url=None):\n if not file and not url:\n return None\n if file:\n file = Path(file)\n if not file.isfile():\n msg = (\n u'pa11y_ignore_rules_file specified, but file does not exist! {file}'\n .format(file=file))\n raise ValueError(msg)\n return yaml.safe_load(file.text())\n resp = requests.get(url)\n if not resp.ok:\n msg = (\n u'pa11y_ignore_rules_url specified, but failed to fetch URL. status={status}'\n .format(status=resp.status_code))\n err = RuntimeError(msg)\n err.response = resp\n raise err\n return yaml.safe_load(resp.text)\n",
"role": "user"
},
{
"content": "load_pa11y_ignore_rules",
"role": "assistant"
}
] |
def x(self, failure):
self.logger.error(repr(failure))
if failure.check(HttpError):
response = failure.value.response
self.logger.error(u'HttpError on %s', response.url)
self.logger.error(u'HttpError Code: %s', response.status)
if response.status in (401, 403):
self.logger.error(
'Credentials failed. Either add/update the current credentials or remove them to enable auto auth'
)
elif failure.check(DNSLookupError):
request = failure.request
self.logger.error(u'DNSLookupError on %s', request.url)
|
handle_error
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, failure):\n self.logger.error(repr(failure))\n if failure.check(HttpError):\n response = failure.value.response\n self.logger.error(u'HttpError on %s', response.url)\n self.logger.error(u'HttpError Code: %s', response.status)\n if response.status in (401, 403):\n self.logger.error(\n 'Credentials failed. Either add/update the current credentials or remove them to enable auto auth'\n )\n elif failure.check(DNSLookupError):\n request = failure.request\n self.logger.error(u'DNSLookupError on %s', request.url)\n",
"role": "user"
},
{
"content": "handle_error",
"role": "assistant"
}
] |
def x(self):
if self.single_url:
port = urlparse(self.single_url).port
if port:
if port != self.port:
self.port = port
else:
yield scrapy.Request(self.single_url, callback=self.parse_item,
errback=self.handle_error)
return
if self.login_email and self.login_password:
login_url = URLObject('http://').with_hostname(self.domain).with_port(
self.port).with_path(LOGIN_HTML_PATH)
yield scrapy.Request(login_url, callback=self.after_initial_csrf,
errback=self.handle_error)
else:
self.logger.info(
'email/password unset, fetching credentials via auto_auth')
auth_url = URLObject('http://').with_hostname(self.domain).with_port(
self.port).with_path(AUTO_AUTH_PATH).set_query_params(staff=
'true', course_id=self.course_key)
headers = {b'Accept': b'application/json'}
yield scrapy.Request(auth_url, headers=headers, callback=self.
after_auto_auth, errback=self.handle_error)
|
start_requests
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.single_url:\n port = urlparse(self.single_url).port\n if port:\n if port != self.port:\n self.port = port\n else:\n yield scrapy.Request(self.single_url, callback=self.parse_item,\n errback=self.handle_error)\n return\n if self.login_email and self.login_password:\n login_url = URLObject('http://').with_hostname(self.domain).with_port(\n self.port).with_path(LOGIN_HTML_PATH)\n yield scrapy.Request(login_url, callback=self.after_initial_csrf,\n errback=self.handle_error)\n else:\n self.logger.info(\n 'email/password unset, fetching credentials via auto_auth')\n auth_url = URLObject('http://').with_hostname(self.domain).with_port(\n self.port).with_path(AUTO_AUTH_PATH).set_query_params(staff=\n 'true', course_id=self.course_key)\n headers = {b'Accept': b'application/json'}\n yield scrapy.Request(auth_url, headers=headers, callback=self.\n after_auto_auth, errback=self.handle_error)\n",
"role": "user"
},
{
"content": "start_requests",
"role": "assistant"
}
] |
def x(self, response):
login_url = URLObject('http://').with_hostname(self.domain).with_port(self
.port).with_path(LOGIN_API_PATH)
credentials = {'email': self.login_email, 'password': self.login_password}
headers = {b'X-CSRFToken': get_csrf_token(response)}
yield scrapy.FormRequest(login_url, formdata=credentials, headers=
headers, callback=self.after_initial_login, errback=self.handle_error)
|
after_initial_csrf
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n login_url = URLObject('http://').with_hostname(self.domain).with_port(self\n .port).with_path(LOGIN_API_PATH)\n credentials = {'email': self.login_email, 'password': self.login_password}\n headers = {b'X-CSRFToken': get_csrf_token(response)}\n yield scrapy.FormRequest(login_url, formdata=credentials, headers=\n headers, callback=self.after_initial_login, errback=self.handle_error)\n",
"role": "user"
},
{
"content": "after_initial_csrf",
"role": "assistant"
}
] |
def x(self, response):
if LOGIN_FAILURE_MSG in response.text:
self.logger.error(
'Credentials failed. Either add/update the current credentials or remove them to enable auto auth'
)
return
self.logger.info('successfully completed initial login')
if self.single_url:
yield scrapy.Request(self.single_url, callback=self.parse_item,
errback=self.handle_error)
else:
for url in self.start_urls:
yield scrapy.Request(url, callback=self.analyze_url_list,
errback=self.handle_error)
|
after_initial_login
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n if LOGIN_FAILURE_MSG in response.text:\n self.logger.error(\n 'Credentials failed. Either add/update the current credentials or remove them to enable auto auth'\n )\n return\n self.logger.info('successfully completed initial login')\n if self.single_url:\n yield scrapy.Request(self.single_url, callback=self.parse_item,\n errback=self.handle_error)\n else:\n for url in self.start_urls:\n yield scrapy.Request(url, callback=self.analyze_url_list,\n errback=self.handle_error)\n",
"role": "user"
},
{
"content": "after_initial_login",
"role": "assistant"
}
] |
def x(self, response):
result = json.loads(response.text)
self.login_email = result['email']
self.login_password = result['password']
msg = (
u'Obtained credentials via auto_auth! email={email} password={password}'
.format(**result))
self.logger.info(msg)
if self.single_url:
yield scrapy.Request(self.single_url, callback=self.parse_item,
errback=self.handle_error)
else:
for url in self.start_urls:
yield scrapy.Request(url, callback=self.analyze_url_list,
errback=self.handle_error)
|
after_auto_auth
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n result = json.loads(response.text)\n self.login_email = result['email']\n self.login_password = result['password']\n msg = (\n u'Obtained credentials via auto_auth! email={email} password={password}'\n .format(**result))\n self.logger.info(msg)\n if self.single_url:\n yield scrapy.Request(self.single_url, callback=self.parse_item,\n errback=self.handle_error)\n else:\n for url in self.start_urls:\n yield scrapy.Request(url, callback=self.analyze_url_list,\n errback=self.handle_error)\n",
"role": "user"
},
{
"content": "after_auto_auth",
"role": "assistant"
}
] |
def x(self, response):
response = json.loads(response.text)
for _, block in response['blocks'].items():
for attribute in block:
parsed = urlparse(block[attribute])
if parsed.scheme and parsed.netloc:
yield self.make_requests_from_url(block[attribute])
|
analyze_url_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n response = json.loads(response.text)\n for _, block in response['blocks'].items():\n for attribute in block:\n parsed = urlparse(block[attribute])\n if parsed.scheme and parsed.netloc:\n yield self.make_requests_from_url(block[attribute])\n",
"role": "user"
},
{
"content": "analyze_url_list",
"role": "assistant"
}
] |
def x(self, response):
if URLObject(response.url).path == LOGIN_HTML_PATH:
reqs = self.handle_unexpected_redirect_to_login_page(response)
for req in reqs:
yield req
title = response.xpath('//title/text()').extract_first()
if title:
title = title.strip()
request_headers = {key.decode('ascii'): value[0].decode('ascii') for
key, value in response.request.headers.items()}
item = A11yItem(url=response.url, request_headers=request_headers,
accessed_at=datetime.utcnow(), page_title=title)
yield item
|
parse_item
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n if URLObject(response.url).path == LOGIN_HTML_PATH:\n reqs = self.handle_unexpected_redirect_to_login_page(response)\n for req in reqs:\n yield req\n title = response.xpath('//title/text()').extract_first()\n if title:\n title = title.strip()\n request_headers = {key.decode('ascii'): value[0].decode('ascii') for \n key, value in response.request.headers.items()}\n item = A11yItem(url=response.url, request_headers=request_headers,\n accessed_at=datetime.utcnow(), page_title=title)\n yield item\n",
"role": "user"
},
{
"content": "parse_item",
"role": "assistant"
}
] |
def x(self, response):
next_url = URLObject(response.url).query_dict.get('next')
login_url = URLObject('http://').with_hostname(self.domain).with_port(self
.port).with_path(LOGIN_API_PATH)
if next_url:
login_url = login_url.set_query_param('next', next_url)
credentials = {'email': self.login_email, 'password': self.login_password}
headers = {b'X-CSRFToken': get_csrf_token(response)}
yield scrapy.FormRequest(login_url, formdata=credentials, headers=
headers, callback=self.after_login, errback=self.handle_error)
|
handle_unexpected_redirect_to_login_page
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n next_url = URLObject(response.url).query_dict.get('next')\n login_url = URLObject('http://').with_hostname(self.domain).with_port(self\n .port).with_path(LOGIN_API_PATH)\n if next_url:\n login_url = login_url.set_query_param('next', next_url)\n credentials = {'email': self.login_email, 'password': self.login_password}\n headers = {b'X-CSRFToken': get_csrf_token(response)}\n yield scrapy.FormRequest(login_url, formdata=credentials, headers=\n headers, callback=self.after_login, errback=self.handle_error)\n",
"role": "user"
},
{
"content": "handle_unexpected_redirect_to_login_page",
"role": "assistant"
}
] |
def x(self, v):
escaped = []
inside_tag = False
for i, _ in enumerate(v):
if v[i:i + 2] == '{%':
inside_tag = True
elif v[i:i + 2] == '%}':
inside_tag = False
if v[i] == self.attr_wrapper and not inside_tag:
escaped.append('\\')
escaped.append(v[i])
return ''.join(escaped)
|
escape_attribute_quotes
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, v):\n escaped = []\n inside_tag = False\n for i, _ in enumerate(v):\n if v[i:i + 2] == '{%':\n inside_tag = True\n elif v[i:i + 2] == '%}':\n inside_tag = False\n if v[i] == self.attr_wrapper and not inside_tag:\n escaped.append('\\\\')\n escaped.append(v[i])\n return ''.join(escaped)\n",
"role": "user"
},
{
"content": "escape_attribute_quotes",
"role": "assistant"
}
] |
def x(self, child):
super(RootNode, self).add_child(child)
child.attr_wrapper = self.attr_wrapper
|
add_child
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, child):\n super(RootNode, self).add_child(child)\n child.attr_wrapper = self.attr_wrapper\n",
"role": "user"
},
{
"content": "add_child",
"role": "assistant"
}
] |
def x(self, element):
start = ['%s<%s' % (self.spaces, element.tag)]
if element.id:
start.append(' id=%s' % self.element.attr_wrap(self.
replace_inline_variables(element.id)))
if element.classes:
start.append(' class=%s' % self.element.attr_wrap(self.
replace_inline_variables(element.classes)))
if element.attributes:
start.append(' ' + self.replace_inline_variables(element.attributes))
content = self._render_inline_content(self.element.inline_content)
if element.nuke_inner_whitespace and content:
content = content.strip()
if element.self_close and not content:
start.append(' />')
elif content:
start.append('>%s' % content)
elif self.children:
start.append('>%s' % self.render_newlines())
else:
start.append('>')
return ''.join(start)
|
render_before
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, element):\n start = ['%s<%s' % (self.spaces, element.tag)]\n if element.id:\n start.append(' id=%s' % self.element.attr_wrap(self.\n replace_inline_variables(element.id)))\n if element.classes:\n start.append(' class=%s' % self.element.attr_wrap(self.\n replace_inline_variables(element.classes)))\n if element.attributes:\n start.append(' ' + self.replace_inline_variables(element.attributes))\n content = self._render_inline_content(self.element.inline_content)\n if element.nuke_inner_whitespace and content:\n content = content.strip()\n if element.self_close and not content:\n start.append(' />')\n elif content:\n start.append('>%s' % content)\n elif self.children:\n start.append('>%s' % self.render_newlines())\n else:\n start.append('>')\n return ''.join(start)\n",
"role": "user"
},
{
"content": "render_before",
"role": "assistant"
}
] |
def x(self, element):
if element.inline_content:
return '</%s>%s' % (element.tag, self.render_newlines())
elif element.self_close:
return self.render_newlines()
elif self.children:
return '%s</%s>\n' % (self.spaces, element.tag)
else:
return '</%s>\n' % element.tag
|
render_after
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, element):\n if element.inline_content:\n return '</%s>%s' % (element.tag, self.render_newlines())\n elif element.self_close:\n return self.render_newlines()\n elif self.children:\n return '%s</%s>\\n' % (self.spaces, element.tag)\n else:\n return '</%s>\\n' % element.tag\n",
"role": "user"
},
{
"content": "render_after",
"role": "assistant"
}
] |
def x(self, user, password):
request = Request(AUTH_URL)
request.add_header('X-Simperium-API-Key', API_KEY)
if sys.version_info < (3, 3):
request.add_data(json.dumps({'username': user, 'password': password}))
else:
request.data = json.dumps({'username': user, 'password': password}
).encode()
try:
res = urllib2.urlopen(request).read()
token = json.loads(res.decode('utf-8'))['access_token']
except HTTPError:
raise SimplenoteLoginFailed('Login to Simplenote API failed!')
except IOError:
token = None
return token
|
authenticate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user, password):\n request = Request(AUTH_URL)\n request.add_header('X-Simperium-API-Key', API_KEY)\n if sys.version_info < (3, 3):\n request.add_data(json.dumps({'username': user, 'password': password}))\n else:\n request.data = json.dumps({'username': user, 'password': password}\n ).encode()\n try:\n res = urllib2.urlopen(request).read()\n token = json.loads(res.decode('utf-8'))['access_token']\n except HTTPError:\n raise SimplenoteLoginFailed('Login to Simplenote API failed!')\n except IOError:\n token = None\n return token\n",
"role": "user"
},
{
"content": "authenticate",
"role": "assistant"
}
] |
def x(self):
if self.token == None:
self.token = self.authenticate(self.username, self.password)
try:
return str(self.token, 'utf-8')
except TypeError:
return self.token
|
get_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.token == None:\n self.token = self.authenticate(self.username, self.password)\n try:\n return str(self.token, 'utf-8')\n except TypeError:\n return self.token\n",
"role": "user"
},
{
"content": "get_token",
"role": "assistant"
}
] |
def x(self, noteid, version=None):
params_version = ''
if version is not None:
params_version = '/v/' + str(version)
params = '/i/%s%s' % (str(noteid), params_version)
request = Request(DATA_URL + params)
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
note = json.loads(response.read().decode('utf-8'))
note = self.__add_simplenote_api_fields(note, noteid, int(response.info
().get('X-Simperium-Version')))
if 'tags' in note:
note['tags'] = sorted(note['tags'])
return note, 0
|
get_note
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, noteid, version=None):\n params_version = ''\n if version is not None:\n params_version = '/v/' + str(version)\n params = '/i/%s%s' % (str(noteid), params_version)\n request = Request(DATA_URL + params)\n request.add_header(self.header, self.get_token())\n try:\n response = urllib2.urlopen(request)\n except HTTPError as e:\n if e.code == 401:\n raise SimplenoteLoginFailed(\n 'Login to Simplenote API failed! Check Token.')\n else:\n return e, -1\n except IOError as e:\n return e, -1\n note = json.loads(response.read().decode('utf-8'))\n note = self.__add_simplenote_api_fields(note, noteid, int(response.info\n ().get('X-Simperium-Version')))\n if 'tags' in note:\n note['tags'] = sorted(note['tags'])\n return note, 0\n",
"role": "user"
},
{
"content": "get_note",
"role": "assistant"
}
] |
def x(self, note):
if 'key' in note:
noteid = note.pop('key', None)
else:
noteid = uuid.uuid4().hex
if 'version' in note:
version = note.pop('version', None)
url = '%s/i/%s/v/%s?response=1' % (DATA_URL, noteid, version)
else:
url = '%s/i/%s?response=1' % (DATA_URL, noteid)
note = self.__remove_simplenote_api_fields(note)
request = Request(url, data=json.dumps(note).encode('utf-8'))
request.add_header(self.header, self.get_token())
request.add_header('Content-Type', 'application/json')
response = ''
try:
response = urllib2.urlopen(request)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
note = json.loads(response.read().decode('utf-8'))
note = self.__add_simplenote_api_fields(note, noteid, int(response.info
().get('X-Simperium-Version')))
return note, 0
|
update_note
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note):\n if 'key' in note:\n noteid = note.pop('key', None)\n else:\n noteid = uuid.uuid4().hex\n if 'version' in note:\n version = note.pop('version', None)\n url = '%s/i/%s/v/%s?response=1' % (DATA_URL, noteid, version)\n else:\n url = '%s/i/%s?response=1' % (DATA_URL, noteid)\n note = self.__remove_simplenote_api_fields(note)\n request = Request(url, data=json.dumps(note).encode('utf-8'))\n request.add_header(self.header, self.get_token())\n request.add_header('Content-Type', 'application/json')\n response = ''\n try:\n response = urllib2.urlopen(request)\n except HTTPError as e:\n if e.code == 401:\n raise SimplenoteLoginFailed(\n 'Login to Simplenote API failed! Check Token.')\n else:\n return e, -1\n except IOError as e:\n return e, -1\n note = json.loads(response.read().decode('utf-8'))\n note = self.__add_simplenote_api_fields(note, noteid, int(response.info\n ().get('X-Simperium-Version')))\n return note, 0\n",
"role": "user"
},
{
"content": "update_note",
"role": "assistant"
}
] |
def x(self, note):
if type(note) == str:
return self.update_note({'content': note})
elif type(note) == dict and 'content' in note:
return self.update_note(note)
else:
return 'No string or valid note.', -1
|
add_note
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note):\n if type(note) == str:\n return self.update_note({'content': note})\n elif type(note) == dict and 'content' in note:\n return self.update_note(note)\n else:\n return 'No string or valid note.', -1\n",
"role": "user"
},
{
"content": "add_note",
"role": "assistant"
}
] |
def x(self, data=True, since=None, tags=[]):
status = 0
ret = []
response_notes = {}
notes = {'index': []}
params = '/index?limit=%s' % str(NOTE_FETCH_LENGTH)
if since is not None:
params += '&since=%s' % since
if data:
params += '&data=true'
request = Request(DATA_URL + params)
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
response_notes = json.loads(response.read().decode('utf-8'))
note_objects = []
for n in response_notes['index']:
if not data:
n['d'] = {}
note_object = self.__add_simplenote_api_fields(n['d'], n['id'],
n['v'])
note_objects.append(note_object)
notes['index'].extend(note_objects)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
while 'mark' in response_notes:
params += '&mark=%s' % response_notes['mark']
request = Request(DATA_URL + params)
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
response_notes = json.loads(response.read().decode('utf-8'))
note_objects = []
for n in response_notes['index']:
if not data:
n['d'] = {}
note_object = n['d']
note_object = self.__add_simplenote_api_fields(n['d'], n[
'id'], n['v'])
note_objects.append(note_object)
notes['index'].extend(note_objects)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
note_list = notes['index']
self.current = response_notes['current']
if len(tags) > 0:
note_list = [n for n in note_list if len(set(n['tags']).
intersection(tags)) > 0]
return note_list, status
|
get_note_list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data=True, since=None, tags=[]):\n status = 0\n ret = []\n response_notes = {}\n notes = {'index': []}\n params = '/index?limit=%s' % str(NOTE_FETCH_LENGTH)\n if since is not None:\n params += '&since=%s' % since\n if data:\n params += '&data=true'\n request = Request(DATA_URL + params)\n request.add_header(self.header, self.get_token())\n try:\n response = urllib2.urlopen(request)\n response_notes = json.loads(response.read().decode('utf-8'))\n note_objects = []\n for n in response_notes['index']:\n if not data:\n n['d'] = {}\n note_object = self.__add_simplenote_api_fields(n['d'], n['id'],\n n['v'])\n note_objects.append(note_object)\n notes['index'].extend(note_objects)\n except HTTPError as e:\n if e.code == 401:\n raise SimplenoteLoginFailed(\n 'Login to Simplenote API failed! Check Token.')\n else:\n return e, -1\n except IOError as e:\n return e, -1\n while 'mark' in response_notes:\n params += '&mark=%s' % response_notes['mark']\n request = Request(DATA_URL + params)\n request.add_header(self.header, self.get_token())\n try:\n response = urllib2.urlopen(request)\n response_notes = json.loads(response.read().decode('utf-8'))\n note_objects = []\n for n in response_notes['index']:\n if not data:\n n['d'] = {}\n note_object = n['d']\n note_object = self.__add_simplenote_api_fields(n['d'], n[\n 'id'], n['v'])\n note_objects.append(note_object)\n notes['index'].extend(note_objects)\n except HTTPError as e:\n if e.code == 401:\n raise SimplenoteLoginFailed(\n 'Login to Simplenote API failed! Check Token.')\n else:\n return e, -1\n except IOError as e:\n return e, -1\n note_list = notes['index']\n self.current = response_notes['current']\n if len(tags) > 0:\n note_list = [n for n in note_list if len(set(n['tags']).\n intersection(tags)) > 0]\n return note_list, status\n",
"role": "user"
},
{
"content": "get_note_list",
"role": "assistant"
}
] |
def x(self, note_id):
note, status = self.get_note(note_id)
if status == -1:
return note, status
if not note['deleted']:
note['deleted'] = True
note['modificationDate'] = time.time()
return self.update_note(note)
else:
return note, 0
|
trash_note
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note_id):\n note, status = self.get_note(note_id)\n if status == -1:\n return note, status\n if not note['deleted']:\n note['deleted'] = True\n note['modificationDate'] = time.time()\n return self.update_note(note)\n else:\n return note, 0\n",
"role": "user"
},
{
"content": "trash_note",
"role": "assistant"
}
] |
def x(self, note_id):
note, status = self.trash_note(note_id)
if status == -1:
return note, status
params = '/i/%s' % str(note_id)
request = Request(url=DATA_URL + params, method='DELETE')
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
except IOError as e:
return e, -1
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
return {}, 0
|
delete_note
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note_id):\n note, status = self.trash_note(note_id)\n if status == -1:\n return note, status\n params = '/i/%s' % str(note_id)\n request = Request(url=DATA_URL + params, method='DELETE')\n request.add_header(self.header, self.get_token())\n try:\n response = urllib2.urlopen(request)\n except IOError as e:\n return e, -1\n except HTTPError as e:\n if e.code == 401:\n raise SimplenoteLoginFailed(\n 'Login to Simplenote API failed! Check Token.')\n else:\n return e, -1\n return {}, 0\n",
"role": "user"
},
{
"content": "delete_note",
"role": "assistant"
}
] |
def x(self, token):
try:
user_info = self.get_user_info(token)
except UserInfoRetrievalFailed:
msg = 'Failed to retrieve user info. Unable to authenticate.'
logger.error(msg)
raise exceptions.AuthenticationFailed(msg)
user, __ = get_user_model().objects.get_or_create(username=user_info[
'username'], defaults=user_info)
if not user.is_active:
raise exceptions.AuthenticationFailed('User inactive or deleted.')
return user, token
|
authenticate_credentials
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token):\n try:\n user_info = self.get_user_info(token)\n except UserInfoRetrievalFailed:\n msg = 'Failed to retrieve user info. Unable to authenticate.'\n logger.error(msg)\n raise exceptions.AuthenticationFailed(msg)\n user, __ = get_user_model().objects.get_or_create(username=user_info[\n 'username'], defaults=user_info)\n if not user.is_active:\n raise exceptions.AuthenticationFailed('User inactive or deleted.')\n return user, token\n",
"role": "user"
},
{
"content": "authenticate_credentials",
"role": "assistant"
}
] |
def x(self, token):
url = self.get_user_info_url()
try:
headers = {'Authorization': 'Bearer {}'.format(token)}
response = requests.get(url, headers=headers)
except requests.RequestException:
logger.exception(
'Failed to retrieve user info due to a request exception.')
raise UserInfoRetrievalFailed
if response.status_code == 200:
return self.process_user_info_response(response.json())
else:
msg = (
'Failed to retrieve user info. Server [{server}] responded with status [{status}].'
.format(server=url, status=response.status_code))
raise UserInfoRetrievalFailed(msg)
|
get_user_info
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token):\n url = self.get_user_info_url()\n try:\n headers = {'Authorization': 'Bearer {}'.format(token)}\n response = requests.get(url, headers=headers)\n except requests.RequestException:\n logger.exception(\n 'Failed to retrieve user info due to a request exception.')\n raise UserInfoRetrievalFailed\n if response.status_code == 200:\n return self.process_user_info_response(response.json())\n else:\n msg = (\n 'Failed to retrieve user info. Server [{server}] responded with status [{status}].'\n .format(server=url, status=response.status_code))\n raise UserInfoRetrievalFailed(msg)\n",
"role": "user"
},
{
"content": "get_user_info",
"role": "assistant"
}
] |
def x(self, response):
mapping = ('username', 'preferred_username'), ('email', 'email'), (
'last_name', 'family_name'), ('first_name', 'given_name')
return {dest: response[source] for dest, source in mapping}
|
process_user_info_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n mapping = ('username', 'preferred_username'), ('email', 'email'), (\n 'last_name', 'family_name'), ('first_name', 'given_name')\n return {dest: response[source] for dest, source in mapping}\n",
"role": "user"
},
{
"content": "process_user_info_response",
"role": "assistant"
}
] |
def x(self, payload):
username = payload.get('preferred_username') or payload.get('username')
if username is None:
raise exceptions.AuthenticationFailed(
'JWT must include a preferred_username or username claim!')
else:
try:
user, __ = get_user_model().objects.get_or_create(username=username
)
attributes_updated = False
for claim, attr in self.get_jwt_claim_attribute_map().items():
payload_value = payload.get(claim)
if getattr(user, attr
) != payload_value and payload_value is not None:
setattr(user, attr, payload_value)
attributes_updated = True
if attributes_updated:
user.save()
except:
msg = 'User retrieval failed.'
logger.exception(msg)
raise exceptions.AuthenticationFailed(msg)
return user
|
authenticate_credentials
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, payload):\n username = payload.get('preferred_username') or payload.get('username')\n if username is None:\n raise exceptions.AuthenticationFailed(\n 'JWT must include a preferred_username or username claim!')\n else:\n try:\n user, __ = get_user_model().objects.get_or_create(username=username\n )\n attributes_updated = False\n for claim, attr in self.get_jwt_claim_attribute_map().items():\n payload_value = payload.get(claim)\n if getattr(user, attr\n ) != payload_value and payload_value is not None:\n setattr(user, attr, payload_value)\n attributes_updated = True\n if attributes_updated:\n user.save()\n except:\n msg = 'User retrieval failed.'\n logger.exception(msg)\n raise exceptions.AuthenticationFailed(msg)\n return user\n",
"role": "user"
},
{
"content": "authenticate_credentials",
"role": "assistant"
}
] |
def x(self, view_class):
view_permissions = list(getattr(view_class, 'permission_classes', []))
permission_classes = []
classes_to_add = []
while view_permissions:
permission = view_permissions.pop()
if not hasattr(permission, 'perms_or_conds'):
permission_classes.append(permission)
else:
for child in getattr(permission, 'perms_or_conds', []):
view_permissions.append(child)
for perm_class in self._required_permission_classes:
if not self._includes_base_class(permission_classes, perm_class):
log.warning(
u'The view %s allows Jwt Authentication but needs to include the %s permission class (adding it for you)'
, view_class.__name__, perm_class.__name__)
classes_to_add.append(perm_class)
if classes_to_add:
view_class.permission_classes += tuple(classes_to_add)
|
add_missing_jwt_permission_classes
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, view_class):\n view_permissions = list(getattr(view_class, 'permission_classes', []))\n permission_classes = []\n classes_to_add = []\n while view_permissions:\n permission = view_permissions.pop()\n if not hasattr(permission, 'perms_or_conds'):\n permission_classes.append(permission)\n else:\n for child in getattr(permission, 'perms_or_conds', []):\n view_permissions.append(child)\n for perm_class in self._required_permission_classes:\n if not self._includes_base_class(permission_classes, perm_class):\n log.warning(\n u'The view %s allows Jwt Authentication but needs to include the %s permission class (adding it for you)'\n , view_class.__name__, perm_class.__name__)\n classes_to_add.append(perm_class)\n if classes_to_add:\n view_class.permission_classes += tuple(classes_to_add)\n",
"role": "user"
},
{
"content": "add_missing_jwt_permission_classes",
"role": "assistant"
}
] |
def x(self, cookie_name):
cookie_missing_message = (
'{} cookie is missing. JWT auth cookies will not be reconstituted.'
.format(cookie_name))
request_jwt_cookie = 'missing-{}'.format(cookie_name)
return cookie_missing_message, request_jwt_cookie
|
get_missing_cookie_message_and_metric
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cookie_name):\n cookie_missing_message = (\n '{} cookie is missing. JWT auth cookies will not be reconstituted.'\n .format(cookie_name))\n request_jwt_cookie = 'missing-{}'.format(cookie_name)\n return cookie_missing_message, request_jwt_cookie\n",
"role": "user"
},
{
"content": "get_missing_cookie_message_and_metric",
"role": "assistant"
}
] |
def x(self, request):
use_jwt_cookie_requested = request.META.get(USE_JWT_COOKIE_HEADER)
header_payload_cookie = request.COOKIES.get(jwt_cookie_header_payload_name
())
signature_cookie = request.COOKIES.get(jwt_cookie_signature_name())
if not use_jwt_cookie_requested:
metric_value = 'not-requested'
elif header_payload_cookie and signature_cookie:
request.COOKIES[jwt_cookie_name()] = '{}{}{}'.format(
header_payload_cookie, JWT_DELIMITER, signature_cookie)
metric_value = 'success'
elif header_payload_cookie or signature_cookie:
if not header_payload_cookie:
log_message, metric_value = (self.
_get_missing_cookie_message_and_metric(
jwt_cookie_header_payload_name()))
if not signature_cookie:
log_message, metric_value = (self.
_get_missing_cookie_message_and_metric(
jwt_cookie_signature_name()))
log.warning(log_message)
else:
metric_value = 'missing-both'
monitoring.set_custom_metric('request_jwt_cookie', metric_value)
|
process_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n use_jwt_cookie_requested = request.META.get(USE_JWT_COOKIE_HEADER)\n header_payload_cookie = request.COOKIES.get(jwt_cookie_header_payload_name\n ())\n signature_cookie = request.COOKIES.get(jwt_cookie_signature_name())\n if not use_jwt_cookie_requested:\n metric_value = 'not-requested'\n elif header_payload_cookie and signature_cookie:\n request.COOKIES[jwt_cookie_name()] = '{}{}{}'.format(\n header_payload_cookie, JWT_DELIMITER, signature_cookie)\n metric_value = 'success'\n elif header_payload_cookie or signature_cookie:\n if not header_payload_cookie:\n log_message, metric_value = (self.\n _get_missing_cookie_message_and_metric(\n jwt_cookie_header_payload_name()))\n if not signature_cookie:\n log_message, metric_value = (self.\n _get_missing_cookie_message_and_metric(\n jwt_cookie_signature_name()))\n log.warning(log_message)\n else:\n metric_value = 'missing-both'\n monitoring.set_custom_metric('request_jwt_cookie', metric_value)\n",
"role": "user"
},
{
"content": "process_request",
"role": "assistant"
}
] |
def x(token):
jwt_issuer = get_first_jwt_issuer()
_verify_jwt_signature(token, jwt_issuer)
decoded_token = _decode_and_verify_token(token, jwt_issuer)
return _set_token_defaults(decoded_token)
|
jwt_decode_handler
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(token):\n jwt_issuer = get_first_jwt_issuer()\n _verify_jwt_signature(token, jwt_issuer)\n decoded_token = _decode_and_verify_token(token, jwt_issuer)\n return _set_token_defaults(decoded_token)\n",
"role": "user"
},
{
"content": "jwt_decode_handler",
"role": "assistant"
}
] |
def x(token):
def x(jwt_version):
supported_version = Version(settings.JWT_AUTH.get(
'JWT_SUPPORTED_VERSION', JwtTokenVersion.default_latest_supported))
if jwt_version.major > supported_version.major:
logger.info(
'Token decode failed due to unsupported JWT version number [%s]'
, str(jwt_version))
raise jwt.InvalidTokenError(
'JWT version number [%s] is unsupported', str(jwt_version))
def x(token):
if 'version' not in token:
token['version'] = str(JwtTokenVersion.starting_version)
return Version(token['version'])
def x(token):
if 'is_restricted' not in token:
token['is_restricted'] = False
def x(token):
if 'filters' not in token:
token['filters'] = []
token_version = _get_and_set_version(token)
_verify_version(token_version)
_set_is_restricted(token)
_set_filters(token)
return token
|
set_token_defaults
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(token):\n\n def x(jwt_version):\n supported_version = Version(settings.JWT_AUTH.get(\n 'JWT_SUPPORTED_VERSION', JwtTokenVersion.default_latest_supported))\n if jwt_version.major > supported_version.major:\n logger.info(\n 'Token decode failed due to unsupported JWT version number [%s]'\n , str(jwt_version))\n raise jwt.InvalidTokenError(\n 'JWT version number [%s] is unsupported', str(jwt_version))\n\n def x(token):\n if 'version' not in token:\n token['version'] = str(JwtTokenVersion.starting_version)\n return Version(token['version'])\n\n def x(token):\n if 'is_restricted' not in token:\n token['is_restricted'] = False\n\n def x(token):\n if 'filters' not in token:\n token['filters'] = []\n token_version = _get_and_set_version(token)\n _verify_version(token_version)\n _set_is_restricted(token)\n _set_filters(token)\n return token\n",
"role": "user"
},
{
"content": "set_token_defaults",
"role": "assistant"
}
] |
def x(jwt_issuer):
key_set = KEYS()
signing_jwk_set = settings.JWT_AUTH.get('JWT_PUBLIC_SIGNING_JWK_SET')
if signing_jwk_set:
key_set.load_jwks(signing_jwk_set)
key_set.add({'key': jwt_issuer['SECRET_KEY'], 'kty': 'oct'})
return key_set
|
get_signing_jwk_key_set
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwt_issuer):\n key_set = KEYS()\n signing_jwk_set = settings.JWT_AUTH.get('JWT_PUBLIC_SIGNING_JWK_SET')\n if signing_jwk_set:\n key_set.load_jwks(signing_jwk_set)\n key_set.add({'key': jwt_issuer['SECRET_KEY'], 'kty': 'oct'})\n return key_set\n",
"role": "user"
},
{
"content": "get_signing_jwk_key_set",
"role": "assistant"
}
] |
def x(object_class, search_results, page_size, page):
paginator = Paginator(search_results['results'], page_size)
try:
page_number = paginator.validate_number(page)
except InvalidPage:
if page == 'last':
page_number = paginator.num_pages
else:
raise Http404(
"Page is not 'last', nor can it be converted to an int.")
try:
paged_results = paginator.page(page_number)
except InvalidPage as exception:
raise Http404('Invalid page {page_number}: {message}'.format(
page_number=page_number, message=str(exception)))
search_queryset_pks = [item['data']['pk'] for item in paged_results.
object_list]
queryset = object_class.objects.filter(pk__in=search_queryset_pks)
def x(primary_key):
for obj in queryset:
if obj.pk == primary_key:
return obj
object_results = list(map(ordered_objects, search_queryset_pks))
paged_results.object_list = object_results
return paged_results
|
paginate_search_results
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(object_class, search_results, page_size, page):\n paginator = Paginator(search_results['results'], page_size)\n try:\n page_number = paginator.validate_number(page)\n except InvalidPage:\n if page == 'last':\n page_number = paginator.num_pages\n else:\n raise Http404(\n \"Page is not 'last', nor can it be converted to an int.\")\n try:\n paged_results = paginator.page(page_number)\n except InvalidPage as exception:\n raise Http404('Invalid page {page_number}: {message}'.format(\n page_number=page_number, message=str(exception)))\n search_queryset_pks = [item['data']['pk'] for item in paged_results.\n object_list]\n queryset = object_class.objects.filter(pk__in=search_queryset_pks)\n\n def x(primary_key):\n for obj in queryset:\n if obj.pk == primary_key:\n return obj\n object_results = list(map(ordered_objects, search_queryset_pks))\n paged_results.object_list = object_results\n return paged_results\n",
"role": "user"
},
{
"content": "paginate_search_results",
"role": "assistant"
}
] |
def x(self, data):
return Response({'next': self.get_next_link(), 'previous': self.
get_previous_link(), 'count': self.page.paginator.count,
'num_pages': self.page.paginator.num_pages, 'current_page': self.
page.number, 'start': (self.page.number - 1) * self.get_page_size(
self.request), 'results': data})
|
get_paginated_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n return Response({'next': self.get_next_link(), 'previous': self.\n get_previous_link(), 'count': self.page.paginator.count,\n 'num_pages': self.page.paginator.num_pages, 'current_page': self.\n page.number, 'start': (self.page.number - 1) * self.get_page_size(\n self.request), 'results': data})\n",
"role": "user"
},
{
"content": "get_paginated_response",
"role": "assistant"
}
] |
def x(self, data):
metadata = {'next': self.get_next_link(), 'previous': self.
get_previous_link(), 'count': self.get_result_count(), 'num_pages':
self.get_num_pages()}
if isinstance(data, dict):
if 'results' not in data:
raise TypeError(u'Malformed result dict')
data['pagination'] = metadata
else:
data = {'results': data, 'pagination': metadata}
return Response(data)
|
get_paginated_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n metadata = {'next': self.get_next_link(), 'previous': self.\n get_previous_link(), 'count': self.get_result_count(), 'num_pages':\n self.get_num_pages()}\n if isinstance(data, dict):\n if 'results' not in data:\n raise TypeError(u'Malformed result dict')\n data['pagination'] = metadata\n else:\n data = {'results': data, 'pagination': metadata}\n return Response(data)\n",
"role": "user"
},
{
"content": "get_paginated_response",
"role": "assistant"
}
] |
def x(request):
jwt_cookie = request.COOKIES.get(jwt_cookie_name(), None)
if not jwt_cookie:
return None
return jwt_decode_handler(jwt_cookie)
|
get_decoded_jwt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request):\n jwt_cookie = request.COOKIES.get(jwt_cookie_name(), None)\n if not jwt_cookie:\n return None\n return jwt_decode_handler(jwt_cookie)\n",
"role": "user"
},
{
"content": "get_decoded_jwt",
"role": "assistant"
}
] |
def x(self, request):
request = request._request
user = getattr(request, 'user', None)
if not user or user.is_anonymous:
return None
self.enforce_csrf(request)
return user, None
|
authenticate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n request = request._request\n user = getattr(request, 'user', None)\n if not user or user.is_anonymous:\n return None\n self.enforce_csrf(request)\n return user, None\n",
"role": "user"
},
{
"content": "authenticate",
"role": "assistant"
}
] |
def x(self, request, view):
course_key = CourseKey.from_string(view.kwargs.get('course_id'))
jwt_filters = decode_jwt_filters(request.auth)
for filter_type, filter_value in jwt_filters:
if filter_type == 'content_org' and filter_value == course_key.org:
return True
log.warning(
u'Permission JwtHasContentOrgFilterForRequestedCourse: no filter found for %s.'
, course_key.org)
return False
|
has_permission
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, view):\n course_key = CourseKey.from_string(view.kwargs.get('course_id'))\n jwt_filters = decode_jwt_filters(request.auth)\n for filter_type, filter_value in jwt_filters:\n if filter_type == 'content_org' and filter_value == course_key.org:\n return True\n log.warning(\n u'Permission JwtHasContentOrgFilterForRequestedCourse: no filter found for %s.'\n , course_key.org)\n return False\n",
"role": "user"
},
{
"content": "has_permission",
"role": "assistant"
}
] |
def x(self, request, view):
user_filter = self._get_user_filter(request)
if not user_filter:
return True
username_param = get_username_param(request)
allowed = user_filter == username_param
if not allowed:
log.warning(
u"Permission JwtHasUserFilterForRequestedUser: user_filter %s doesn't match username %s."
, user_filter, username_param)
return allowed
|
has_permission
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, view):\n user_filter = self._get_user_filter(request)\n if not user_filter:\n return True\n username_param = get_username_param(request)\n allowed = user_filter == username_param\n if not allowed:\n log.warning(\n u\"Permission JwtHasUserFilterForRequestedUser: user_filter %s doesn't match username %s.\"\n , user_filter, username_param)\n return allowed\n",
"role": "user"
},
{
"content": "has_permission",
"role": "assistant"
}
] |
def x():
warnings.warn(
"'JWT_ISSUERS' list not defined, checking for deprecated settings.",
DeprecationWarning)
return [{'ISSUER': api_settings.JWT_ISSUER, 'SECRET_KEY': api_settings.
JWT_SECRET_KEY, 'AUDIENCE': api_settings.JWT_AUDIENCE}]
|
get_deprecated_jwt_issuers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n warnings.warn(\n \"'JWT_ISSUERS' list not defined, checking for deprecated settings.\",\n DeprecationWarning)\n return [{'ISSUER': api_settings.JWT_ISSUER, 'SECRET_KEY': api_settings.\n JWT_SECRET_KEY, 'AUDIENCE': api_settings.JWT_AUDIENCE}]\n",
"role": "user"
},
{
"content": "get_deprecated_jwt_issuers",
"role": "assistant"
}
] |
def x(self, request, response):
self._set_request_auth_type_metric(request)
self._set_request_user_agent_metrics(request)
self._set_request_referer_metric(request)
self._set_request_user_id_metric(request)
return response
|
process_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, response):\n self._set_request_auth_type_metric(request)\n self._set_request_user_agent_metrics(request)\n self._set_request_referer_metric(request)\n self._set_request_user_id_metric(request)\n return response\n",
"role": "user"
},
{
"content": "process_response",
"role": "assistant"
}
] |
def x(self, request):
if hasattr(request, 'user') and hasattr(request.user, 'id'
) and request.user.id:
monitoring.set_custom_metric('request_user_id', request.user.id)
|
set_request_user_id_metric
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if hasattr(request, 'user') and hasattr(request.user, 'id'\n ) and request.user.id:\n monitoring.set_custom_metric('request_user_id', request.user.id)\n",
"role": "user"
},
{
"content": "set_request_user_id_metric",
"role": "assistant"
}
] |
def x(self, request):
if 'HTTP_REFERER' in request.META and request.META['HTTP_REFERER']:
monitoring.set_custom_metric('request_referer', request.META[
'HTTP_REFERER'])
|
set_request_referer_metric
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if 'HTTP_REFERER' in request.META and request.META['HTTP_REFERER']:\n monitoring.set_custom_metric('request_referer', request.META[\n 'HTTP_REFERER'])\n",
"role": "user"
},
{
"content": "set_request_referer_metric",
"role": "assistant"
}
] |
def x(self, request):
if 'HTTP_USER_AGENT' in request.META and request.META['HTTP_USER_AGENT']:
user_agent = request.META['HTTP_USER_AGENT']
monitoring.set_custom_metric('request_user_agent', user_agent)
if user_agent:
user_agent_parts = user_agent.split()
if len(user_agent_parts) == 3 and user_agent_parts[1].startswith(
'edx-rest-api-client/'):
monitoring.set_custom_metric('request_client_name',
user_agent_parts[2])
|
set_request_user_agent_metrics
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if 'HTTP_USER_AGENT' in request.META and request.META['HTTP_USER_AGENT']:\n user_agent = request.META['HTTP_USER_AGENT']\n monitoring.set_custom_metric('request_user_agent', user_agent)\n if user_agent:\n user_agent_parts = user_agent.split()\n if len(user_agent_parts) == 3 and user_agent_parts[1].startswith(\n 'edx-rest-api-client/'):\n monitoring.set_custom_metric('request_client_name',\n user_agent_parts[2])\n",
"role": "user"
},
{
"content": "set_request_user_agent_metrics",
"role": "assistant"
}
] |
def x(self, request):
if 'HTTP_AUTHORIZATION' in request.META and request.META[
'HTTP_AUTHORIZATION']:
token_parts = request.META['HTTP_AUTHORIZATION'].split()
if len(token_parts) == 2:
auth_type = token_parts[0].lower()
else:
auth_type = 'other-token-type'
elif not hasattr(request, 'user') or not request.user:
auth_type = 'no-user'
elif not request.user.is_authenticated:
auth_type = 'unauthenticated'
else:
auth_type = 'session-or-unknown'
monitoring.set_custom_metric('request_auth_type', auth_type)
|
set_request_auth_type_metric
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if 'HTTP_AUTHORIZATION' in request.META and request.META[\n 'HTTP_AUTHORIZATION']:\n token_parts = request.META['HTTP_AUTHORIZATION'].split()\n if len(token_parts) == 2:\n auth_type = token_parts[0].lower()\n else:\n auth_type = 'other-token-type'\n elif not hasattr(request, 'user') or not request.user:\n auth_type = 'no-user'\n elif not request.user.is_authenticated:\n auth_type = 'unauthenticated'\n else:\n auth_type = 'session-or-unknown'\n monitoring.set_custom_metric('request_auth_type', auth_type)\n",
"role": "user"
},
{
"content": "set_request_auth_type_metric",
"role": "assistant"
}
] |
def x(method, identifier, params=None):
return '{}\r\n'.format(json.dumps({'id': identifier, 'method': method,
'params': params or {}, 'jsonrpc': '2.0'})).encode()
|
jsonrpc_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, identifier, params=None):\n return '{}\\r\\n'.format(json.dumps({'id': identifier, 'method': method,\n 'params': params or {}, 'jsonrpc': '2.0'})).encode()\n",
"role": "user"
},
{
"content": "jsonrpc_request",
"role": "assistant"
}
] |
def x(self, data):
self._data_buffer += data.decode()
if not self._data_buffer.endswith('\r\n'):
return
data = self._data_buffer
self._data_buffer = ''
for cmd in data.strip().split('\r\n'):
data = json.loads(cmd)
if not isinstance(data, list):
data = [data]
for item in data:
self.handle_data(item)
|
data_received
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n self._data_buffer += data.decode()\n if not self._data_buffer.endswith('\\r\\n'):\n return\n data = self._data_buffer\n self._data_buffer = ''\n for cmd in data.strip().split('\\r\\n'):\n data = json.loads(cmd)\n if not isinstance(data, list):\n data = [data]\n for item in data:\n self.handle_data(item)\n",
"role": "user"
},
{
"content": "data_received",
"role": "assistant"
}
] |
def x(self, data):
if 'id' in data:
self.handle_response(data)
else:
self.handle_notification(data)
|
handle_data
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n if 'id' in data:\n self.handle_response(data)\n else:\n self.handle_notification(data)\n",
"role": "user"
},
{
"content": "handle_data",
"role": "assistant"
}
] |
def x(self, data):
identifier = data.get('id')
self._buffer[identifier]['data'] = data.get('result')
self._buffer[identifier]['flag'].set()
|
handle_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n identifier = data.get('id')\n self._buffer[identifier]['data'] = data.get('result')\n self._buffer[identifier]['flag'].set()\n",
"role": "user"
},
{
"content": "handle_response",
"role": "assistant"
}
] |
def x(self, data):
if data.get('method') in self._callbacks:
self._callbacks.get(data.get('method'))(data.get('params'))
|
handle_notification
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n if data.get('method') in self._callbacks:\n self._callbacks.get(data.get('method'))(data.get('params'))\n",
"role": "user"
},
{
"content": "handle_notification",
"role": "assistant"
}
] |
def x(self, method, params):
identifier = random.randint(1, 1000)
self._transport.write(jsonrpc_request(method, identifier, params))
self._buffer[identifier] = {'flag': asyncio.Event()}
yield from self._buffer[identifier]['flag'].wait()
result = self._buffer[identifier]['data']
del self._buffer[identifier]['data']
return result
|
request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, params):\n identifier = random.randint(1, 1000)\n self._transport.write(jsonrpc_request(method, identifier, params))\n self._buffer[identifier] = {'flag': asyncio.Event()}\n yield from self._buffer[identifier]['flag'].wait()\n result = self._buffer[identifier]['data']\n del self._buffer[identifier]['data']\n return result\n",
"role": "user"
},
{
"content": "request",
"role": "assistant"
}
] |
def x(self):
yield from self._do_connect()
_LOGGER.info('connected to snapserver on %s:%s', self._host, self._port)
status = yield from self.status()
self.synchronize(status)
self._on_server_connect()
|
start
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n yield from self._do_connect()\n _LOGGER.info('connected to snapserver on %s:%s', self._host, self._port)\n status = yield from self.status()\n self.synchronize(status)\n self._on_server_connect()\n",
"role": "user"
},
{
"content": "start",
"role": "assistant"
}
] |
def x(self):
_, self._protocol = yield from self._loop.create_connection(lambda :
SnapcastProtocol(self._callbacks), self._host, self._port)
|
do_connect
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n _, self._protocol = yield from self._loop.create_connection(lambda :\n SnapcastProtocol(self._callbacks), self._host, self._port)\n",
"role": "user"
},
{
"content": "do_connect",
"role": "assistant"
}
] |
def x(self):
@asyncio.coroutine
def x():
try:
yield from self._do_connect()
except IOError:
self._loop.call_later(SERVER_RECONNECT_DELAY, self._reconnect_cb)
asyncio.ensure_future(try_reconnect())
|
reconnect_cb
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n\n @asyncio.coroutine\n def x():\n try:\n yield from self._do_connect()\n except IOError:\n self._loop.call_later(SERVER_RECONNECT_DELAY, self._reconnect_cb)\n asyncio.ensure_future(try_reconnect())\n",
"role": "user"
},
{
"content": "reconnect_cb",
"role": "assistant"
}
] |
def x(self, method, params=None):
result = yield from self._protocol.request(method, params)
return result
|
transact
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, params=None):\n result = yield from self._protocol.request(method, params)\n return result\n",
"role": "user"
},
{
"content": "transact",
"role": "assistant"
}
] |
def x(self, identifier):
params = {'id': identifier}
response = yield from self._transact(SERVER_DELETECLIENT, params)
self.synchronize(response)
|
delete_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, identifier):\n params = {'id': identifier}\n response = yield from self._transact(SERVER_DELETECLIENT, params)\n self.synchronize(response)\n",
"role": "user"
},
{
"content": "delete_client",
"role": "assistant"
}
] |
def x(self, status):
self._version = status.get('server').get('version')
self._groups = {}
self._clients = {}
self._streams = {}
for stream in status.get('server').get('streams'):
self._streams[stream.get('id')] = Snapstream(stream)
_LOGGER.debug('stream found: %s', self._streams[stream.get('id')])
for group in status.get('server').get('groups'):
self._groups[group.get('id')] = Snapgroup(self, group)
_LOGGER.debug('group found: %s', self._groups[group.get('id')])
for client in group.get('clients'):
self._clients[client.get('id')] = Snapclient(self, client)
_LOGGER.debug('client found: %s', self._clients[client.get('id')])
|
synchronize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, status):\n self._version = status.get('server').get('version')\n self._groups = {}\n self._clients = {}\n self._streams = {}\n for stream in status.get('server').get('streams'):\n self._streams[stream.get('id')] = Snapstream(stream)\n _LOGGER.debug('stream found: %s', self._streams[stream.get('id')])\n for group in status.get('server').get('groups'):\n self._groups[group.get('id')] = Snapgroup(self, group)\n _LOGGER.debug('group found: %s', self._groups[group.get('id')])\n for client in group.get('clients'):\n self._clients[client.get('id')] = Snapclient(self, client)\n _LOGGER.debug('client found: %s', self._clients[client.get('id')])\n",
"role": "user"
},
{
"content": "synchronize",
"role": "assistant"
}
] |
def x(self, method, identifier, key=None, value=None):
params = {'id': identifier}
if key is not None and value is not None:
params[key] = value
result = yield from self._transact(method, params)
return result.get(key)
|
request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, identifier, key=None, value=None):\n params = {'id': identifier}\n if key is not None and value is not None:\n params[key] = value\n result = yield from self._transact(method, params)\n return result.get(key)\n",
"role": "user"
},
{
"content": "request",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.