source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(self, key, max_age, **opts):
self.expire_at(key, time() + max_age, **opts)
| expire | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, max_age, **opts):\n self.expire_at(key, time() + max_age, **opts)\n",
"role": "user"
},
{
"content": "expire",
"role": "assistant... |
def x(self, key, **opts):
key, store = self._expand_opts(key, opts)
if hasattr(store, 'ttl'):
return store.ttl(key)
data = store.get(key)
if data is None:
return None
expiry = data[EXPIRY_INDEX]
if expiry is not None:
return max(0, expiry - time()) or None
| ttl | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, **opts):\n key, store = self._expand_opts(key, opts)\n if hasattr(store, 'ttl'):\n return store.ttl(key)\n data = store.get(key)\n ... |
def x(self, key, **opts):
key, store = self._expand_opts(key, opts)
data = store.get(key)
if not data or self._has_expired(data, opts):
return False
return True
| exists | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, **opts):\n key, store = self._expand_opts(key, opts)\n data = store.get(key)\n if not data or self._has_expired(data, opts):\n retur... |
def x(self):
self.unuse_region()
if self._rlist is not None:
try:
if len(self._rlist) == 0:
self._manager._fdict.pop(self._rlist.path_or_fd())
except (TypeError, KeyError):
pass
| destroy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.unuse_region()\n if self._rlist is not None:\n try:\n if len(self._rlist) == 0:\n self._manager._fdict.pop... |
def x(self, rhs):
self._manager = rhs._manager
self._rlist = type(rhs._rlist)(rhs._rlist)
self._region = rhs._region
self._ofs = rhs._ofs
self._size = rhs._size
for region in self._rlist:
region.increment_client_count()
if self._region is not None:
self._region.increment_client_count()
| copy_from | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rhs):\n self._manager = rhs._manager\n self._rlist = type(rhs._rlist)(rhs._rlist)\n self._region = rhs._region\n self._ofs = rhs._ofs\n se... |
def x(self, offset=0, size=0, flags=0):
need_region = True
man = self._manager
fsize = self._rlist.file_size()
size = min(size or fsize, man.window_size() or fsize)
if self._region is not None:
if self._region.includes_ofs(offset):
need_region = False
else:
self.unuse_region()
if offset >= fsize:
return self
if need_region:
self._region = man._obtain_region(self._rlist, offset, size, flags,
False)
self._region.increment_client_count()
self._ofs = offset - self._region._b
self._size = min(size, self._region.ofs_end() - offset)
return self
| use_region | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, offset=0, size=0, flags=0):\n need_region = True\n man = self._manager\n fsize = self._rlist.file_size()\n size = min(size or fsize, man.wind... |
def x(self):
return buffer(self._region.buffer(), self._ofs, self._size)
| buffer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return buffer(self._region.buffer(), self._ofs, self._size)\n",
"role": "user"
},
{
"content": "buffer",
"role": "assistant"
}
] |
def x(self, ofs):
return (self._region._b + self._ofs <= ofs < self._region._b + self.
_ofs + self._size)
| includes_ofs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ofs):\n return (self._region._b + self._ofs <= ofs < self._region._b + self.\n _ofs + self._size)\n",
"role": "user"
},
{
"content"... |
def x(self):
if isinstance(self._rlist.path_or_fd(), int):
raise ValueError(
'Path queried although mapping was applied to a file descriptor')
return self._rlist.path_or_fd()
| path | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if isinstance(self._rlist.path_or_fd(), int):\n raise ValueError(\n 'Path queried although mapping was applied to a file descript... |
def x(self):
if isinstance(self._rlist.path_or_fd(), string_types()):
raise ValueError(
'File descriptor queried although mapping was generated from path')
return self._rlist.path_or_fd()
| fd | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if isinstance(self._rlist.path_or_fd(), string_types()):\n raise ValueError(\n 'File descriptor queried although mapping was gene... |
def x(self, size):
num_found = 0
while size == 0 or self._memory_size + size > self._max_memory_size:
lru_region = None
lru_list = None
for regions in self._fdict.values():
for region in regions:
if region.client_count() == 1 and (lru_region is None or
region._uc < lru_region._uc):
lru_region = region
lru_list = regions
if lru_region is None:
break
num_found += 1
del lru_list[lru_list.index(lru_region)]
lru_region.increment_client_count(-1)
self._memory_size -= lru_region.size()
self._handle_count -= 1
return num_found
| collect_lru_region | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size):\n num_found = 0\n while size == 0 or self._memory_size + size > self._max_memory_size:\n lru_region = None\n lru_list = None\n... |
def x(self, a, offset, size, flags, is_recursive):
if self._memory_size + size > self._max_memory_size:
self._collect_lru_region(size)
r = None
if a:
assert len(a) == 1
r = a[0]
else:
try:
r = self.MapRegionCls(a.path_or_fd(), 0, sys.maxsize, flags)
except Exception:
if is_recursive:
raise
self._collect_lru_region(0)
return self._obtain_region(a, offset, size, flags, True)
self._handle_count += 1
self._memory_size += r.size()
a.append(r)
assert r.includes_ofs(offset)
return r
| obtain_region | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, a, offset, size, flags, is_recursive):\n if self._memory_size + size > self._max_memory_size:\n self._collect_lru_region(size)\n r = None\n ... |
def x(self, path_or_fd):
regions = self._fdict.get(path_or_fd)
if regions is None:
regions = self.MapRegionListCls(path_or_fd)
self._fdict[path_or_fd] = regions
return self.WindowCursorCls(self, regions)
| make_cursor | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, path_or_fd):\n regions = self._fdict.get(path_or_fd)\n if regions is None:\n regions = self.MapRegionListCls(path_or_fd)\n self._fdic... |
def x(self):
return reduce(lambda x, y: x + y, (1 for rlist in self._fdict.values() if
len(rlist) > 0), 0)
| num_open_files | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return reduce(lambda x, y: x + y, (1 for rlist in self._fdict.values() if\n len(rlist) > 0), 0)\n",
"role": "user"
},
{
"content... |
def x(self, base_path):
if sys.platform != 'win32':
return
num_closed = 0
for path, rlist in self._fdict.items():
if path.startswith(base_path):
for region in rlist:
region.release()
num_closed += 1
return num_closed
| force_map_handle_removal_win | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, base_path):\n if sys.platform != 'win32':\n return\n num_closed = 0\n for path, rlist in self._fdict.items():\n if path.startswith... |
def x(num, round_up):
res = num // ALLOCATIONGRANULARITY * ALLOCATIONGRANULARITY
if round_up and res != num:
res += ALLOCATIONGRANULARITY
return res
| align_to_mmap | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(num, round_up):\n res = num // ALLOCATIONGRANULARITY * ALLOCATIONGRANULARITY\n if round_up and res != num:\n res += ALLOCATIONGRANULARITY\n ret... |
def x(self):
nofs = align_to_mmap(self.ofs, 0)
self.size += self.ofs - nofs
self.ofs = nofs
self.size = align_to_mmap(self.size, 1)
| align | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n nofs = align_to_mmap(self.ofs, 0)\n self.size += self.ofs - nofs\n self.ofs = nofs\n self.size = align_to_mmap(self.size, 1)\n",
"role... |
def x(self, window, max_size):
rofs = self.ofs - window.ofs_end()
nsize = rofs + self.size
rofs -= nsize - min(nsize, max_size)
self.ofs = self.ofs - rofs
self.size += rofs
| extend_left_to | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, window, max_size):\n rofs = self.ofs - window.ofs_end()\n nsize = rofs + self.size\n rofs -= nsize - min(nsize, max_size)\n self.ofs = self.o... |
def x(self, window, max_size):
self.size = min(self.size + (window.ofs - self.ofs_end()), max_size)
| extend_right_to | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, window, max_size):\n self.size = min(self.size + (window.ofs - self.ofs_end()), max_size)\n",
"role": "user"
},
{
"content": "extend_right... |
def x(self, ofs):
return self._b <= ofs < self._b + self._size
| includes_ofs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ofs):\n return self._b <= ofs < self._b + self._size\n",
"role": "user"
},
{
"content": "includes_ofs",
"role": "assistant"
}
] |
def x(self, ofs=1):
self._uc += ofs
assert self._uc > -1, 'Increments must match decrements, usage counter negative: %i' % self._uc
if self.client_count() == 0:
self.release()
return True
else:
return False
| increment_client_count | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ofs=1):\n self._uc += ofs\n assert self._uc > -1, 'Increments must match decrements, usage counter negative: %i' % self._uc\n if self.client_cou... |
def x(self):
if self._file_size is None:
if isinstance(self._path_or_fd, string_types()):
self._file_size = os.stat(self._path_or_fd).st_size
else:
self._file_size = os.fstat(self._path_or_fd).st_size
return self._file_size
| file_size | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._file_size is None:\n if isinstance(self._path_or_fd, string_types()):\n self._file_size = os.stat(self._path_or_fd).st_s... |
def x(self, cursor=None, offset=0, size=sys.maxsize, flags=0):
if cursor:
self._c = cursor
if self._c is not None and self._c.is_associated():
res = self._c.use_region(offset, size, flags).is_valid()
if res:
if size > self._c.file_size():
size = self._c.file_size() - offset
self._size = size
return res
return False
| begin_access | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cursor=None, offset=0, size=sys.maxsize, flags=0):\n if cursor:\n self._c = cursor\n if self._c is not None and self._c.is_associated():\n ... |
def x():
parser = argparse.ArgumentParser(description=
'generate HTML from crawler JSON')
parser.add_argument('--data-dir', default='data', help=
u'Directory containing JSON data from crawler [%(default)s]')
parser.add_argument('--output-dir', default='html', help=
u'Directory to output the resulting HTML files [%(default)s]')
return parser
| make_parser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n parser = argparse.ArgumentParser(description=\n 'generate HTML from crawler JSON')\n parser.add_argument('--data-dir', default='data', help=\... |
def x():
parser = make_parser()
args = parser.parse_args()
data_dir = Path(args.data_dir).expand()
if not data_dir.isdir():
msg = u'Data directory {dir} does not exist'.format(dir=args.data_dir)
raise ValueError(msg)
data_filenames = [name for name in data_dir.files() if name.endswith(
'.json')]
if not data_filenames:
msg = u'Data directory {dir} contains no JSON files'.format(dir=
args.data_dir)
raise ValueError(msg)
output_dir = Path(args.output_dir).expand()
output_dir.makedirs_p()
return render_html(data_dir, output_dir)
| main | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n parser = make_parser()\n args = parser.parse_args()\n data_dir = Path(args.data_dir).expand()\n if not data_dir.isdir():\n msg = u'Data... |
def x(code):
bits = code.split('.')
for bit in reversed(bits):
if WCAG_REFS_RE.match(bit):
return bit.split(',')
return []
| wcag_refs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(code):\n bits = code.split('.')\n for bit in reversed(bits):\n if WCAG_REFS_RE.match(bit):\n return bit.split(',')\n return []\n",
... |
def x(env, html_path, template_filename, context):
template = env.get_template(template_filename)
rendered_html = template.render(**context)
html_path.write_text(rendered_html, encoding='utf-8')
| render_template | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(env, html_path, template_filename, context):\n template = env.get_template(template_filename)\n rendered_html = template.render(**context)\n html_path... |
def x(data_dir, output_dir):
env = Environment(loader=PackageLoader('pa11ycrawler', 'templates'))
env.globals['wcag_refs'] = wcag_refs
pages = []
counter = collections.Counter()
grouped_violations = collections.defaultdict(dict)
for data_file in data_dir.files('*.json'):
data = json.load(data_file.open())
num_error, num_warning, num_notice = pa11y_counts(data['pa11y'])
data['num_error'] = num_error
data['num_warning'] = num_warning
data['num_notice'] = num_notice
fname = data_file.namebase + '.html'
html_path = output_dir / fname
render_template(env, html_path, 'detail.html', data)
data['filename'] = fname
pages.append(data)
for violation in data['pa11y']:
violation_id = hashlib.md5((violation['selector'] + violation[
'code']).encode('utf-8')).hexdigest()
if violation_id not in grouped_violations[violation['type']]:
violation['pages'] = []
grouped_violations[violation['type']][violation_id] = violation
counter[violation['type']] += 1
grouped_violations[violation['type']][violation_id]['pages'
].append({'url': data['url'], 'page_title': data['page_title']}
)
def x(page):
return page['num_error'], page['num_warning'], page['num_notice']
index_path = output_dir / INDEX_TEMPLATE
render_template(env, index_path, INDEX_TEMPLATE, {'pages': sorted(pages,
key=extract_nums, reverse=True), 'num_error': counter['error'],
'num_warning': counter['warning'], 'num_notice': counter['notice']})
for violation_type in grouped_violations:
unique_path = output_dir / u'{}s.html'.format(violation_type)
render_template(env, unique_path, UNIQUE_TEMPLATE, {
'grouped_violations': sorted(grouped_violations[violation_type]
.values(), key=lambda item: len(item['pages']), reverse=True),
'current_type': violation_type, 'violation_counts': counter})
| render_html | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data_dir, output_dir):\n env = Environment(loader=PackageLoader('pa11ycrawler', 'templates'))\n env.globals['wcag_refs'] = wcag_refs\n pages = []\n ... |
def x(spider, url):
ignore_rules = getattr(spider, 'pa11y_ignore_rules', {}) or {}
return itertools.chain.from_iterable(rule_list for url_glob, rule_list in
ignore_rules.items() if fnmatch.fnmatch(url, url_glob))
| ignore_rules_for_url | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(spider, url):\n ignore_rules = getattr(spider, 'pa11y_ignore_rules', {}) or {}\n return itertools.chain.from_iterable(rule_list for url_glob, rule_list i... |
def x(ignore_rule, pa11y_result):
return all(fnmatch.fnmatch(pa11y_result.get(attr), ignore_rule.get(attr
)) for attr in ignore_rule.keys())
| ignore_rule_matches_result | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ignore_rule, pa11y_result):\n return all(fnmatch.fnmatch(pa11y_result.get(attr), ignore_rule.get(attr\n )) for attr in ignore_rule.keys())\n",
"r... |
def x(stdout, spider, url):
if not stdout:
return []
results = json.loads(stdout.decode('utf8'))
ignore_rules = ignore_rules_for_url(spider, url)
for rule in ignore_rules:
results = [result for result in results if not
ignore_rule_matches_result(rule, result)]
return results
| load_pa11y_results | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(stdout, spider, url):\n if not stdout:\n return []\n results = json.loads(stdout.decode('utf8'))\n ignore_rules = ignore_rules_for_url(spider, ... |
def x(item):
config = {'page': {'headers': item['request_headers']}}
config_file = tempfile.NamedTemporaryFile(mode='w', prefix=
'pa11y-config-', suffix='.json', delete=False)
json.dump(config, config_file)
config_file.close()
return config_file
| write_pa11y_config | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(item):\n config = {'page': {'headers': item['request_headers']}}\n config_file = tempfile.NamedTemporaryFile(mode='w', prefix=\n 'pa11y-config-', ... |
def x(expected_title, pa11y_results, logger):
if not pa11y_results:
return
title_errs = [err for err in pa11y_results if err['context'].startswith
('<title')]
for err in title_errs:
title_elmt = html.fragment_fromstring(err['context'])
elided_title = title_elmt.text.strip()
if elided_title.endswith('...'):
pa11y_title = elided_title[0:-4].strip()
else:
pa11y_title = elided_title
if pa11y_title not in expected_title:
msg = (
u'Parser mismatch! Scrapy saw full title "{scrapy_title}", Pa11y saw elided title "{elided_title}".'
.format(scrapy_title=expected_title, elided_title=elided_title)
)
logger.error(msg)
| check_title_match | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(expected_title, pa11y_results, logger):\n if not pa11y_results:\n return\n title_errs = [err for err in pa11y_results if err['context'].startswith... |
def x(pa11y_results, spider):
num_err, num_warn, num_notice = pa11y_counts(pa11y_results)
stats = spider.crawler.stats
stats.inc_value('pa11y/error', count=num_err, spider=spider)
stats.inc_value('pa11y/warning', count=num_warn, spider=spider)
stats.inc_value('pa11y/notice', count=num_notice, spider=spider)
| track_pa11y_stats | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pa11y_results, spider):\n num_err, num_warn, num_notice = pa11y_counts(pa11y_results)\n stats = spider.crawler.stats\n stats.inc_value('pa11y/error', ... |
def x(item, pa11y_results, data_dir):
data = dict(item)
data['pa11y'] = pa11y_results
hasher = hashlib.md5()
hasher.update(item['url'].encode('utf8'))
hasher.update(item['accessed_at'].isoformat().encode('utf8'))
basename = hasher.hexdigest()
filename = basename + '.json'
filepath = data_dir / filename
data_dir.makedirs_p()
text = json.dumps(data, cls=DateTimeEncoder)
filepath.write_text(text)
| write_pa11y_results | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(item, pa11y_results, data_dir):\n data = dict(item)\n data['pa11y'] = pa11y_results\n hasher = hashlib.md5()\n hasher.update(item['url'].encode('ut... |
def x(self, item, spider):
config_file = write_pa11y_config(item)
args = [self.pa11y_path, item['url'], '--config={file}'.format(file=
config_file.name)]
for flag, value in self.cli_flags.items():
args.append('--{flag}={value}'.format(flag=flag, value=value))
retries_remaining = 3
while retries_remaining:
logline = ' '.join(args)
if retries_remaining != 3:
logline += u' # (retry {num})'.format(num=3 - retries_remaining)
spider.logger.info(logline)
proc = sp.Popen(args, shell=False, stdout=sp.PIPE, stderr=sp.PIPE)
stdout, stderr = proc.communicate()
if proc.returncode in (0, 2):
break
else:
retries_remaining -= 1
if retries_remaining == 0:
raise DropItem(u"Couldn't get pa11y results for {url}. Error:\n{err}"
.format(url=item['url'], err=stderr))
pa11y_results = load_pa11y_results(stdout, spider, item['url'])
check_title_match(item['page_title'], pa11y_results, spider.logger)
track_pa11y_stats(pa11y_results, spider)
os.remove(config_file.name)
write_pa11y_results(item, pa11y_results, Path(spider.data_dir))
return item
| process_item | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, item, spider):\n config_file = write_pa11y_config(item)\n args = [self.pa11y_path, item['url'], '--config={file}'.format(file=\n config_file... |
def x(extension):
for ext in hamlpy.VALID_EXTENSIONS:
if extension.endswith('.' + ext):
return True
return False
| watched_extension | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(extension):\n for ext in hamlpy.VALID_EXTENSIONS:\n if extension.endswith('.' + ext):\n return True\n return False\n",
"role": "use... |
def x(folder, destination, compiler_args):
for dirpath, dirnames, filenames in os.walk(folder):
for filename in filenames:
if watched_extension(filename) and not filename.startswith('.#'):
fullpath = os.path.join(dirpath, filename)
subfolder = os.path.relpath(dirpath, folder)
mtime = os.stat(fullpath).st_mtime
compiled_folder = os.path.join(destination, subfolder)
if not os.path.exists(compiled_folder):
os.makedirs(compiled_folder)
compiled_path = _compiled_path(compiled_folder, filename)
if not fullpath in compiled or compiled[fullpath
] < mtime or not os.path.isfile(compiled_path):
compile_file(fullpath, compiled_path, compiler_args)
compiled[fullpath] = mtime
| watch_folder | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(folder, destination, compiler_args):\n for dirpath, dirnames, filenames in os.walk(folder):\n for filename in filenames:\n if watched_exte... |
def x(self, url):
return len(url.path.segments) == 6 and url.path.segments[0
] == 'courses' and url.path.segments[2
] == 'courseware' and url.path.segments[5] == '1'
| is_sequence_start_page | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, url):\n return len(url.path.segments) == 6 and url.path.segments[0\n ] == 'courses' and url.path.segments[2\n ] == 'courseware' and url.... |
def x(self, item, spider):
url = self.clean_url(item['url'])
if self.is_sequence_start_page(url):
url = url.parent
if url in self.urls_seen:
raise DropItem(u'Dropping duplicate url {url}'.format(url=item['url']))
else:
self.urls_seen.add(url)
return item
| process_item | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, item, spider):\n url = self.clean_url(item['url'])\n if self.is_sequence_start_page(url):\n url = url.parent\n if url in self.urls_seen:\... |
def x(self, item, spider):
url = URLObject(item['url'])
if url.path.startswith('/api/'):
raise DropItem(u'Dropping DRF url {url}'.format(url=url))
else:
return item
| process_item | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, item, spider):\n url = URLObject(item['url'])\n if url.path.startswith('/api/'):\n raise DropItem(u'Dropping DRF url {url}'.format(url=url))... |
def x(results):
num_error = 0
num_warning = 0
num_notice = 0
for result in results:
if result['type'] == 'error':
num_error += 1
elif result['type'] == 'warning':
num_warning += 1
elif result['type'] == 'notice':
num_notice += 1
return num_error, num_warning, num_notice
| pa11y_counts | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(results):\n num_error = 0\n num_warning = 0\n num_notice = 0\n for result in results:\n if result['type'] == 'error':\n num_error... |
def x(response):
cookie_headers = [h.decode('ascii') for h in response.headers.getlist(
'Set-Cookie')]
if not cookie_headers:
return None
csrf_headers = [h for h in cookie_headers if h.startswith('csrftoken=')]
if not csrf_headers:
return None
match = re.match('csrftoken=([^ ;]+);', csrf_headers[-1])
return match.group(1)
| get_csrf_token | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(response):\n cookie_headers = [h.decode('ascii') for h in response.headers.getlist(\n 'Set-Cookie')]\n if not cookie_headers:\n return None... |
def x(file=None, url=None):
if not file and not url:
return None
if file:
file = Path(file)
if not file.isfile():
msg = (
u'pa11y_ignore_rules_file specified, but file does not exist! {file}'
.format(file=file))
raise ValueError(msg)
return yaml.safe_load(file.text())
resp = requests.get(url)
if not resp.ok:
msg = (
u'pa11y_ignore_rules_url specified, but failed to fetch URL. status={status}'
.format(status=resp.status_code))
err = RuntimeError(msg)
err.response = resp
raise err
return yaml.safe_load(resp.text)
| load_pa11y_ignore_rules | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(file=None, url=None):\n if not file and not url:\n return None\n if file:\n file = Path(file)\n if not file.isfile():\n m... |
def x(self, failure):
self.logger.error(repr(failure))
if failure.check(HttpError):
response = failure.value.response
self.logger.error(u'HttpError on %s', response.url)
self.logger.error(u'HttpError Code: %s', response.status)
if response.status in (401, 403):
self.logger.error(
'Credentials failed. Either add/update the current credentials or remove them to enable auto auth'
)
elif failure.check(DNSLookupError):
request = failure.request
self.logger.error(u'DNSLookupError on %s', request.url)
| handle_error | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, failure):\n self.logger.error(repr(failure))\n if failure.check(HttpError):\n response = failure.value.response\n self.logger.error(u... |
def x(self):
if self.single_url:
port = urlparse(self.single_url).port
if port:
if port != self.port:
self.port = port
else:
yield scrapy.Request(self.single_url, callback=self.parse_item,
errback=self.handle_error)
return
if self.login_email and self.login_password:
login_url = URLObject('http://').with_hostname(self.domain).with_port(
self.port).with_path(LOGIN_HTML_PATH)
yield scrapy.Request(login_url, callback=self.after_initial_csrf,
errback=self.handle_error)
else:
self.logger.info(
'email/password unset, fetching credentials via auto_auth')
auth_url = URLObject('http://').with_hostname(self.domain).with_port(
self.port).with_path(AUTO_AUTH_PATH).set_query_params(staff=
'true', course_id=self.course_key)
headers = {b'Accept': b'application/json'}
yield scrapy.Request(auth_url, headers=headers, callback=self.
after_auto_auth, errback=self.handle_error)
| start_requests | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.single_url:\n port = urlparse(self.single_url).port\n if port:\n if port != self.port:\n self.port ... |
def x(self, response):
login_url = URLObject('http://').with_hostname(self.domain).with_port(self
.port).with_path(LOGIN_API_PATH)
credentials = {'email': self.login_email, 'password': self.login_password}
headers = {b'X-CSRFToken': get_csrf_token(response)}
yield scrapy.FormRequest(login_url, formdata=credentials, headers=
headers, callback=self.after_initial_login, errback=self.handle_error)
| after_initial_csrf | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n login_url = URLObject('http://').with_hostname(self.domain).with_port(self\n .port).with_path(LOGIN_API_PATH)\n credentials = {... |
def x(self, response):
if LOGIN_FAILURE_MSG in response.text:
self.logger.error(
'Credentials failed. Either add/update the current credentials or remove them to enable auto auth'
)
return
self.logger.info('successfully completed initial login')
if self.single_url:
yield scrapy.Request(self.single_url, callback=self.parse_item,
errback=self.handle_error)
else:
for url in self.start_urls:
yield scrapy.Request(url, callback=self.analyze_url_list,
errback=self.handle_error)
| after_initial_login | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n if LOGIN_FAILURE_MSG in response.text:\n self.logger.error(\n 'Credentials failed. Either add/update the current creden... |
def x(self, response):
result = json.loads(response.text)
self.login_email = result['email']
self.login_password = result['password']
msg = (
u'Obtained credentials via auto_auth! email={email} password={password}'
.format(**result))
self.logger.info(msg)
if self.single_url:
yield scrapy.Request(self.single_url, callback=self.parse_item,
errback=self.handle_error)
else:
for url in self.start_urls:
yield scrapy.Request(url, callback=self.analyze_url_list,
errback=self.handle_error)
| after_auto_auth | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n result = json.loads(response.text)\n self.login_email = result['email']\n self.login_password = result['password']\n msg = (\n ... |
def x(self, response):
response = json.loads(response.text)
for _, block in response['blocks'].items():
for attribute in block:
parsed = urlparse(block[attribute])
if parsed.scheme and parsed.netloc:
yield self.make_requests_from_url(block[attribute])
| analyze_url_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n response = json.loads(response.text)\n for _, block in response['blocks'].items():\n for attribute in block:\n parse... |
def x(self, response):
if URLObject(response.url).path == LOGIN_HTML_PATH:
reqs = self.handle_unexpected_redirect_to_login_page(response)
for req in reqs:
yield req
title = response.xpath('//title/text()').extract_first()
if title:
title = title.strip()
request_headers = {key.decode('ascii'): value[0].decode('ascii') for
key, value in response.request.headers.items()}
item = A11yItem(url=response.url, request_headers=request_headers,
accessed_at=datetime.utcnow(), page_title=title)
yield item
| parse_item | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n if URLObject(response.url).path == LOGIN_HTML_PATH:\n reqs = self.handle_unexpected_redirect_to_login_page(response)\n for ... |
def x(self, response):
next_url = URLObject(response.url).query_dict.get('next')
login_url = URLObject('http://').with_hostname(self.domain).with_port(self
.port).with_path(LOGIN_API_PATH)
if next_url:
login_url = login_url.set_query_param('next', next_url)
credentials = {'email': self.login_email, 'password': self.login_password}
headers = {b'X-CSRFToken': get_csrf_token(response)}
yield scrapy.FormRequest(login_url, formdata=credentials, headers=
headers, callback=self.after_login, errback=self.handle_error)
| handle_unexpected_redirect_to_login_page | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n next_url = URLObject(response.url).query_dict.get('next')\n login_url = URLObject('http://').with_hostname(self.domain).with_port(self... |
def x(self, v):
escaped = []
inside_tag = False
for i, _ in enumerate(v):
if v[i:i + 2] == '{%':
inside_tag = True
elif v[i:i + 2] == '%}':
inside_tag = False
if v[i] == self.attr_wrapper and not inside_tag:
escaped.append('\\')
escaped.append(v[i])
return ''.join(escaped)
| escape_attribute_quotes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, v):\n escaped = []\n inside_tag = False\n for i, _ in enumerate(v):\n if v[i:i + 2] == '{%':\n inside_tag = True\n elif... |
def x(self, child):
super(RootNode, self).add_child(child)
child.attr_wrapper = self.attr_wrapper
| add_child | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, child):\n super(RootNode, self).add_child(child)\n child.attr_wrapper = self.attr_wrapper\n",
"role": "user"
},
{
"content": "add_child... |
def x(self, element):
start = ['%s<%s' % (self.spaces, element.tag)]
if element.id:
start.append(' id=%s' % self.element.attr_wrap(self.
replace_inline_variables(element.id)))
if element.classes:
start.append(' class=%s' % self.element.attr_wrap(self.
replace_inline_variables(element.classes)))
if element.attributes:
start.append(' ' + self.replace_inline_variables(element.attributes))
content = self._render_inline_content(self.element.inline_content)
if element.nuke_inner_whitespace and content:
content = content.strip()
if element.self_close and not content:
start.append(' />')
elif content:
start.append('>%s' % content)
elif self.children:
start.append('>%s' % self.render_newlines())
else:
start.append('>')
return ''.join(start)
| render_before | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, element):\n start = ['%s<%s' % (self.spaces, element.tag)]\n if element.id:\n start.append(' id=%s' % self.element.attr_wrap(self.\n ... |
def x(self, element):
if element.inline_content:
return '</%s>%s' % (element.tag, self.render_newlines())
elif element.self_close:
return self.render_newlines()
elif self.children:
return '%s</%s>\n' % (self.spaces, element.tag)
else:
return '</%s>\n' % element.tag
| render_after | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, element):\n if element.inline_content:\n return '</%s>%s' % (element.tag, self.render_newlines())\n elif element.self_close:\n return... |
def x(self, user, password):
request = Request(AUTH_URL)
request.add_header('X-Simperium-API-Key', API_KEY)
if sys.version_info < (3, 3):
request.add_data(json.dumps({'username': user, 'password': password}))
else:
request.data = json.dumps({'username': user, 'password': password}
).encode()
try:
res = urllib2.urlopen(request).read()
token = json.loads(res.decode('utf-8'))['access_token']
except HTTPError:
raise SimplenoteLoginFailed('Login to Simplenote API failed!')
except IOError:
token = None
return token
| authenticate | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user, password):\n request = Request(AUTH_URL)\n request.add_header('X-Simperium-API-Key', API_KEY)\n if sys.version_info < (3, 3):\n req... |
def x(self):
if self.token == None:
self.token = self.authenticate(self.username, self.password)
try:
return str(self.token, 'utf-8')
except TypeError:
return self.token
| get_token | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.token == None:\n self.token = self.authenticate(self.username, self.password)\n try:\n return str(self.token, 'utf-8')\n ... |
def x(self, noteid, version=None):
params_version = ''
if version is not None:
params_version = '/v/' + str(version)
params = '/i/%s%s' % (str(noteid), params_version)
request = Request(DATA_URL + params)
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
note = json.loads(response.read().decode('utf-8'))
note = self.__add_simplenote_api_fields(note, noteid, int(response.info
().get('X-Simperium-Version')))
if 'tags' in note:
note['tags'] = sorted(note['tags'])
return note, 0
| get_note | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, noteid, version=None):\n params_version = ''\n if version is not None:\n params_version = '/v/' + str(version)\n params = '/i/%s%s' % (st... |
def x(self, note):
if 'key' in note:
noteid = note.pop('key', None)
else:
noteid = uuid.uuid4().hex
if 'version' in note:
version = note.pop('version', None)
url = '%s/i/%s/v/%s?response=1' % (DATA_URL, noteid, version)
else:
url = '%s/i/%s?response=1' % (DATA_URL, noteid)
note = self.__remove_simplenote_api_fields(note)
request = Request(url, data=json.dumps(note).encode('utf-8'))
request.add_header(self.header, self.get_token())
request.add_header('Content-Type', 'application/json')
response = ''
try:
response = urllib2.urlopen(request)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
note = json.loads(response.read().decode('utf-8'))
note = self.__add_simplenote_api_fields(note, noteid, int(response.info
().get('X-Simperium-Version')))
return note, 0
| update_note | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note):\n if 'key' in note:\n noteid = note.pop('key', None)\n else:\n noteid = uuid.uuid4().hex\n if 'version' in note:\n v... |
def x(self, note):
if type(note) == str:
return self.update_note({'content': note})
elif type(note) == dict and 'content' in note:
return self.update_note(note)
else:
return 'No string or valid note.', -1
| add_note | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note):\n if type(note) == str:\n return self.update_note({'content': note})\n elif type(note) == dict and 'content' in note:\n return... |
def x(self, data=True, since=None, tags=[]):
status = 0
ret = []
response_notes = {}
notes = {'index': []}
params = '/index?limit=%s' % str(NOTE_FETCH_LENGTH)
if since is not None:
params += '&since=%s' % since
if data:
params += '&data=true'
request = Request(DATA_URL + params)
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
response_notes = json.loads(response.read().decode('utf-8'))
note_objects = []
for n in response_notes['index']:
if not data:
n['d'] = {}
note_object = self.__add_simplenote_api_fields(n['d'], n['id'],
n['v'])
note_objects.append(note_object)
notes['index'].extend(note_objects)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
while 'mark' in response_notes:
params += '&mark=%s' % response_notes['mark']
request = Request(DATA_URL + params)
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
response_notes = json.loads(response.read().decode('utf-8'))
note_objects = []
for n in response_notes['index']:
if not data:
n['d'] = {}
note_object = n['d']
note_object = self.__add_simplenote_api_fields(n['d'], n[
'id'], n['v'])
note_objects.append(note_object)
notes['index'].extend(note_objects)
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
except IOError as e:
return e, -1
note_list = notes['index']
self.current = response_notes['current']
if len(tags) > 0:
note_list = [n for n in note_list if len(set(n['tags']).
intersection(tags)) > 0]
return note_list, status
| get_note_list | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data=True, since=None, tags=[]):\n status = 0\n ret = []\n response_notes = {}\n notes = {'index': []}\n params = '/index?limit=%s' % str(... |
def x(self, note_id):
note, status = self.get_note(note_id)
if status == -1:
return note, status
if not note['deleted']:
note['deleted'] = True
note['modificationDate'] = time.time()
return self.update_note(note)
else:
return note, 0
| trash_note | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note_id):\n note, status = self.get_note(note_id)\n if status == -1:\n return note, status\n if not note['deleted']:\n note['delet... |
def x(self, note_id):
note, status = self.trash_note(note_id)
if status == -1:
return note, status
params = '/i/%s' % str(note_id)
request = Request(url=DATA_URL + params, method='DELETE')
request.add_header(self.header, self.get_token())
try:
response = urllib2.urlopen(request)
except IOError as e:
return e, -1
except HTTPError as e:
if e.code == 401:
raise SimplenoteLoginFailed(
'Login to Simplenote API failed! Check Token.')
else:
return e, -1
return {}, 0
| delete_note | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, note_id):\n note, status = self.trash_note(note_id)\n if status == -1:\n return note, status\n params = '/i/%s' % str(note_id)\n reque... |
def x(self, token):
try:
user_info = self.get_user_info(token)
except UserInfoRetrievalFailed:
msg = 'Failed to retrieve user info. Unable to authenticate.'
logger.error(msg)
raise exceptions.AuthenticationFailed(msg)
user, __ = get_user_model().objects.get_or_create(username=user_info[
'username'], defaults=user_info)
if not user.is_active:
raise exceptions.AuthenticationFailed('User inactive or deleted.')
return user, token
| authenticate_credentials | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token):\n try:\n user_info = self.get_user_info(token)\n except UserInfoRetrievalFailed:\n msg = 'Failed to retrieve user info. Unabl... |
def x(self, token):
url = self.get_user_info_url()
try:
headers = {'Authorization': 'Bearer {}'.format(token)}
response = requests.get(url, headers=headers)
except requests.RequestException:
logger.exception(
'Failed to retrieve user info due to a request exception.')
raise UserInfoRetrievalFailed
if response.status_code == 200:
return self.process_user_info_response(response.json())
else:
msg = (
'Failed to retrieve user info. Server [{server}] responded with status [{status}].'
.format(server=url, status=response.status_code))
raise UserInfoRetrievalFailed(msg)
| get_user_info | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token):\n url = self.get_user_info_url()\n try:\n headers = {'Authorization': 'Bearer {}'.format(token)}\n response = requests.get(ur... |
def x(self, response):
mapping = ('username', 'preferred_username'), ('email', 'email'), (
'last_name', 'family_name'), ('first_name', 'given_name')
return {dest: response[source] for dest, source in mapping}
| process_user_info_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n mapping = ('username', 'preferred_username'), ('email', 'email'), (\n 'last_name', 'family_name'), ('first_name', 'given_name')\n ... |
def x(self, payload):
username = payload.get('preferred_username') or payload.get('username')
if username is None:
raise exceptions.AuthenticationFailed(
'JWT must include a preferred_username or username claim!')
else:
try:
user, __ = get_user_model().objects.get_or_create(username=username
)
attributes_updated = False
for claim, attr in self.get_jwt_claim_attribute_map().items():
payload_value = payload.get(claim)
if getattr(user, attr
) != payload_value and payload_value is not None:
setattr(user, attr, payload_value)
attributes_updated = True
if attributes_updated:
user.save()
except:
msg = 'User retrieval failed.'
logger.exception(msg)
raise exceptions.AuthenticationFailed(msg)
return user
| authenticate_credentials | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, payload):\n username = payload.get('preferred_username') or payload.get('username')\n if username is None:\n raise exceptions.Authentication... |
def x(self, view_class):
view_permissions = list(getattr(view_class, 'permission_classes', []))
permission_classes = []
classes_to_add = []
while view_permissions:
permission = view_permissions.pop()
if not hasattr(permission, 'perms_or_conds'):
permission_classes.append(permission)
else:
for child in getattr(permission, 'perms_or_conds', []):
view_permissions.append(child)
for perm_class in self._required_permission_classes:
if not self._includes_base_class(permission_classes, perm_class):
log.warning(
u'The view %s allows Jwt Authentication but needs to include the %s permission class (adding it for you)'
, view_class.__name__, perm_class.__name__)
classes_to_add.append(perm_class)
if classes_to_add:
view_class.permission_classes += tuple(classes_to_add)
| add_missing_jwt_permission_classes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, view_class):\n view_permissions = list(getattr(view_class, 'permission_classes', []))\n permission_classes = []\n classes_to_add = []\n while... |
def x(self, cookie_name):
cookie_missing_message = (
'{} cookie is missing. JWT auth cookies will not be reconstituted.'
.format(cookie_name))
request_jwt_cookie = 'missing-{}'.format(cookie_name)
return cookie_missing_message, request_jwt_cookie
| get_missing_cookie_message_and_metric | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cookie_name):\n cookie_missing_message = (\n '{} cookie is missing. JWT auth cookies will not be reconstituted.'\n .format(cookie_name))... |
def x(self, request):
use_jwt_cookie_requested = request.META.get(USE_JWT_COOKIE_HEADER)
header_payload_cookie = request.COOKIES.get(jwt_cookie_header_payload_name
())
signature_cookie = request.COOKIES.get(jwt_cookie_signature_name())
if not use_jwt_cookie_requested:
metric_value = 'not-requested'
elif header_payload_cookie and signature_cookie:
request.COOKIES[jwt_cookie_name()] = '{}{}{}'.format(
header_payload_cookie, JWT_DELIMITER, signature_cookie)
metric_value = 'success'
elif header_payload_cookie or signature_cookie:
if not header_payload_cookie:
log_message, metric_value = (self.
_get_missing_cookie_message_and_metric(
jwt_cookie_header_payload_name()))
if not signature_cookie:
log_message, metric_value = (self.
_get_missing_cookie_message_and_metric(
jwt_cookie_signature_name()))
log.warning(log_message)
else:
metric_value = 'missing-both'
monitoring.set_custom_metric('request_jwt_cookie', metric_value)
| process_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n use_jwt_cookie_requested = request.META.get(USE_JWT_COOKIE_HEADER)\n header_payload_cookie = request.COOKIES.get(jwt_cookie_header_payl... |
def x(token):
jwt_issuer = get_first_jwt_issuer()
_verify_jwt_signature(token, jwt_issuer)
decoded_token = _decode_and_verify_token(token, jwt_issuer)
return _set_token_defaults(decoded_token)
| jwt_decode_handler | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(token):\n jwt_issuer = get_first_jwt_issuer()\n _verify_jwt_signature(token, jwt_issuer)\n decoded_token = _decode_and_verify_token(token, jwt_issuer)... |
def x(token):
def x(jwt_version):
supported_version = Version(settings.JWT_AUTH.get(
'JWT_SUPPORTED_VERSION', JwtTokenVersion.default_latest_supported))
if jwt_version.major > supported_version.major:
logger.info(
'Token decode failed due to unsupported JWT version number [%s]'
, str(jwt_version))
raise jwt.InvalidTokenError(
'JWT version number [%s] is unsupported', str(jwt_version))
def x(token):
if 'version' not in token:
token['version'] = str(JwtTokenVersion.starting_version)
return Version(token['version'])
def x(token):
if 'is_restricted' not in token:
token['is_restricted'] = False
def x(token):
if 'filters' not in token:
token['filters'] = []
token_version = _get_and_set_version(token)
_verify_version(token_version)
_set_is_restricted(token)
_set_filters(token)
return token
| set_token_defaults | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(token):\n\n def x(jwt_version):\n supported_version = Version(settings.JWT_AUTH.get(\n 'JWT_SUPPORTED_VERSION', JwtTokenVersion.default_la... |
def x(jwt_issuer):
key_set = KEYS()
signing_jwk_set = settings.JWT_AUTH.get('JWT_PUBLIC_SIGNING_JWK_SET')
if signing_jwk_set:
key_set.load_jwks(signing_jwk_set)
key_set.add({'key': jwt_issuer['SECRET_KEY'], 'kty': 'oct'})
return key_set
| get_signing_jwk_key_set | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwt_issuer):\n key_set = KEYS()\n signing_jwk_set = settings.JWT_AUTH.get('JWT_PUBLIC_SIGNING_JWK_SET')\n if signing_jwk_set:\n key_set.load_jw... |
def x(object_class, search_results, page_size, page):
paginator = Paginator(search_results['results'], page_size)
try:
page_number = paginator.validate_number(page)
except InvalidPage:
if page == 'last':
page_number = paginator.num_pages
else:
raise Http404(
"Page is not 'last', nor can it be converted to an int.")
try:
paged_results = paginator.page(page_number)
except InvalidPage as exception:
raise Http404('Invalid page {page_number}: {message}'.format(
page_number=page_number, message=str(exception)))
search_queryset_pks = [item['data']['pk'] for item in paged_results.
object_list]
queryset = object_class.objects.filter(pk__in=search_queryset_pks)
def x(primary_key):
for obj in queryset:
if obj.pk == primary_key:
return obj
object_results = list(map(ordered_objects, search_queryset_pks))
paged_results.object_list = object_results
return paged_results
| paginate_search_results | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(object_class, search_results, page_size, page):\n paginator = Paginator(search_results['results'], page_size)\n try:\n page_number = paginator.val... |
def x(self, data):
return Response({'next': self.get_next_link(), 'previous': self.
get_previous_link(), 'count': self.page.paginator.count,
'num_pages': self.page.paginator.num_pages, 'current_page': self.
page.number, 'start': (self.page.number - 1) * self.get_page_size(
self.request), 'results': data})
| get_paginated_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n return Response({'next': self.get_next_link(), 'previous': self.\n get_previous_link(), 'count': self.page.paginator.count,\n '... |
def x(self, data):
metadata = {'next': self.get_next_link(), 'previous': self.
get_previous_link(), 'count': self.get_result_count(), 'num_pages':
self.get_num_pages()}
if isinstance(data, dict):
if 'results' not in data:
raise TypeError(u'Malformed result dict')
data['pagination'] = metadata
else:
data = {'results': data, 'pagination': metadata}
return Response(data)
| get_paginated_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n metadata = {'next': self.get_next_link(), 'previous': self.\n get_previous_link(), 'count': self.get_result_count(), 'num_pages':\n ... |
def x(request):
jwt_cookie = request.COOKIES.get(jwt_cookie_name(), None)
if not jwt_cookie:
return None
return jwt_decode_handler(jwt_cookie)
| get_decoded_jwt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request):\n jwt_cookie = request.COOKIES.get(jwt_cookie_name(), None)\n if not jwt_cookie:\n return None\n return jwt_decode_handler(jwt_cookie... |
def x(self, request):
request = request._request
user = getattr(request, 'user', None)
if not user or user.is_anonymous:
return None
self.enforce_csrf(request)
return user, None
| authenticate | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n request = request._request\n user = getattr(request, 'user', None)\n if not user or user.is_anonymous:\n return None\n sel... |
def x(self, request, view):
course_key = CourseKey.from_string(view.kwargs.get('course_id'))
jwt_filters = decode_jwt_filters(request.auth)
for filter_type, filter_value in jwt_filters:
if filter_type == 'content_org' and filter_value == course_key.org:
return True
log.warning(
u'Permission JwtHasContentOrgFilterForRequestedCourse: no filter found for %s.'
, course_key.org)
return False
| has_permission | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, view):\n course_key = CourseKey.from_string(view.kwargs.get('course_id'))\n jwt_filters = decode_jwt_filters(request.auth)\n for filter... |
def x(self, request, view):
user_filter = self._get_user_filter(request)
if not user_filter:
return True
username_param = get_username_param(request)
allowed = user_filter == username_param
if not allowed:
log.warning(
u"Permission JwtHasUserFilterForRequestedUser: user_filter %s doesn't match username %s."
, user_filter, username_param)
return allowed
| has_permission | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, view):\n user_filter = self._get_user_filter(request)\n if not user_filter:\n return True\n username_param = get_username_param(... |
def x():
warnings.warn(
"'JWT_ISSUERS' list not defined, checking for deprecated settings.",
DeprecationWarning)
return [{'ISSUER': api_settings.JWT_ISSUER, 'SECRET_KEY': api_settings.
JWT_SECRET_KEY, 'AUDIENCE': api_settings.JWT_AUDIENCE}]
| get_deprecated_jwt_issuers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n warnings.warn(\n \"'JWT_ISSUERS' list not defined, checking for deprecated settings.\",\n DeprecationWarning)\n return [{'ISSUER': api... |
def x(self, request, response):
self._set_request_auth_type_metric(request)
self._set_request_user_agent_metrics(request)
self._set_request_referer_metric(request)
self._set_request_user_id_metric(request)
return response
| process_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, response):\n self._set_request_auth_type_metric(request)\n self._set_request_user_agent_metrics(request)\n self._set_request_referer_me... |
def x(self, request):
if hasattr(request, 'user') and hasattr(request.user, 'id'
) and request.user.id:
monitoring.set_custom_metric('request_user_id', request.user.id)
| set_request_user_id_metric | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if hasattr(request, 'user') and hasattr(request.user, 'id'\n ) and request.user.id:\n monitoring.set_custom_metric('request_... |
def x(self, request):
if 'HTTP_REFERER' in request.META and request.META['HTTP_REFERER']:
monitoring.set_custom_metric('request_referer', request.META[
'HTTP_REFERER'])
| set_request_referer_metric | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if 'HTTP_REFERER' in request.META and request.META['HTTP_REFERER']:\n monitoring.set_custom_metric('request_referer', request.META[... |
def x(self, request):
if 'HTTP_USER_AGENT' in request.META and request.META['HTTP_USER_AGENT']:
user_agent = request.META['HTTP_USER_AGENT']
monitoring.set_custom_metric('request_user_agent', user_agent)
if user_agent:
user_agent_parts = user_agent.split()
if len(user_agent_parts) == 3 and user_agent_parts[1].startswith(
'edx-rest-api-client/'):
monitoring.set_custom_metric('request_client_name',
user_agent_parts[2])
| set_request_user_agent_metrics | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if 'HTTP_USER_AGENT' in request.META and request.META['HTTP_USER_AGENT']:\n user_agent = request.META['HTTP_USER_AGENT']\n m... |
def x(self, request):
if 'HTTP_AUTHORIZATION' in request.META and request.META[
'HTTP_AUTHORIZATION']:
token_parts = request.META['HTTP_AUTHORIZATION'].split()
if len(token_parts) == 2:
auth_type = token_parts[0].lower()
else:
auth_type = 'other-token-type'
elif not hasattr(request, 'user') or not request.user:
auth_type = 'no-user'
elif not request.user.is_authenticated:
auth_type = 'unauthenticated'
else:
auth_type = 'session-or-unknown'
monitoring.set_custom_metric('request_auth_type', auth_type)
| set_request_auth_type_metric | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request):\n if 'HTTP_AUTHORIZATION' in request.META and request.META[\n 'HTTP_AUTHORIZATION']:\n token_parts = request.META['HTTP_AUTHOR... |
def x(method, identifier, params=None):
return '{}\r\n'.format(json.dumps({'id': identifier, 'method': method,
'params': params or {}, 'jsonrpc': '2.0'})).encode()
| jsonrpc_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(method, identifier, params=None):\n return '{}\\r\\n'.format(json.dumps({'id': identifier, 'method': method,\n 'params': params or {}, 'jsonrpc': '2.... |
def x(self, data):
self._data_buffer += data.decode()
if not self._data_buffer.endswith('\r\n'):
return
data = self._data_buffer
self._data_buffer = ''
for cmd in data.strip().split('\r\n'):
data = json.loads(cmd)
if not isinstance(data, list):
data = [data]
for item in data:
self.handle_data(item)
| data_received | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n self._data_buffer += data.decode()\n if not self._data_buffer.endswith('\\r\\n'):\n return\n data = self._data_buffer\n self.... |
def x(self, data):
if 'id' in data:
self.handle_response(data)
else:
self.handle_notification(data)
| handle_data | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n if 'id' in data:\n self.handle_response(data)\n else:\n self.handle_notification(data)\n",
"role": "user"
},
{
"... |
def x(self, data):
identifier = data.get('id')
self._buffer[identifier]['data'] = data.get('result')
self._buffer[identifier]['flag'].set()
| handle_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n identifier = data.get('id')\n self._buffer[identifier]['data'] = data.get('result')\n self._buffer[identifier]['flag'].set()\n",
"r... |
def x(self, data):
if data.get('method') in self._callbacks:
self._callbacks.get(data.get('method'))(data.get('params'))
| handle_notification | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data):\n if data.get('method') in self._callbacks:\n self._callbacks.get(data.get('method'))(data.get('params'))\n",
"role": "user"
},
... |
def x(self, method, params):
identifier = random.randint(1, 1000)
self._transport.write(jsonrpc_request(method, identifier, params))
self._buffer[identifier] = {'flag': asyncio.Event()}
yield from self._buffer[identifier]['flag'].wait()
result = self._buffer[identifier]['data']
del self._buffer[identifier]['data']
return result
| request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, params):\n identifier = random.randint(1, 1000)\n self._transport.write(jsonrpc_request(method, identifier, params))\n self._buffer[iden... |
def x(self):
yield from self._do_connect()
_LOGGER.info('connected to snapserver on %s:%s', self._host, self._port)
status = yield from self.status()
self.synchronize(status)
self._on_server_connect()
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n yield from self._do_connect()\n _LOGGER.info('connected to snapserver on %s:%s', self._host, self._port)\n status = yield from self.status()\... |
def x(self):
_, self._protocol = yield from self._loop.create_connection(lambda :
SnapcastProtocol(self._callbacks), self._host, self._port)
| do_connect | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n _, self._protocol = yield from self._loop.create_connection(lambda :\n SnapcastProtocol(self._callbacks), self._host, self._port)\n",
"r... |
def x(self):
@asyncio.coroutine
def x():
try:
yield from self._do_connect()
except IOError:
self._loop.call_later(SERVER_RECONNECT_DELAY, self._reconnect_cb)
asyncio.ensure_future(try_reconnect())
| reconnect_cb | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n\n @asyncio.coroutine\n def x():\n try:\n yield from self._do_connect()\n except IOError:\n self._loop.call_l... |
def x(self, method, params=None):
result = yield from self._protocol.request(method, params)
return result
| transact | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, params=None):\n result = yield from self._protocol.request(method, params)\n return result\n",
"role": "user"
},
{
"content": "... |
def x(self, identifier):
params = {'id': identifier}
response = yield from self._transact(SERVER_DELETECLIENT, params)
self.synchronize(response)
| delete_client | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, identifier):\n params = {'id': identifier}\n response = yield from self._transact(SERVER_DELETECLIENT, params)\n self.synchronize(response)\n",
... |
def x(self, status):
self._version = status.get('server').get('version')
self._groups = {}
self._clients = {}
self._streams = {}
for stream in status.get('server').get('streams'):
self._streams[stream.get('id')] = Snapstream(stream)
_LOGGER.debug('stream found: %s', self._streams[stream.get('id')])
for group in status.get('server').get('groups'):
self._groups[group.get('id')] = Snapgroup(self, group)
_LOGGER.debug('group found: %s', self._groups[group.get('id')])
for client in group.get('clients'):
self._clients[client.get('id')] = Snapclient(self, client)
_LOGGER.debug('client found: %s', self._clients[client.get('id')])
| synchronize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, status):\n self._version = status.get('server').get('version')\n self._groups = {}\n self._clients = {}\n self._streams = {}\n for stream ... |
def x(self, method, identifier, key=None, value=None):
params = {'id': identifier}
if key is not None and value is not None:
params[key] = value
result = yield from self._transact(method, params)
return result.get(key)
| request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, method, identifier, key=None, value=None):\n params = {'id': identifier}\n if key is not None and value is not None:\n params[key] = value\n... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.