body
stringlengths
26
98.2k
body_hash
int64
-9,222,864,604,528,158,000
9,221,803,474B
docstring
stringlengths
1
16.8k
path
stringlengths
5
230
name
stringlengths
1
96
repository_name
stringlengths
7
89
lang
stringclasses
1 value
body_without_docstring
stringlengths
20
98.2k
def _datetime_object_to_rfc_date_str(datetime_obj): ' Returns a date string to the RFC 3339 standard ' return datetime_obj.strftime(_RFC3339_DATE_FORMAT)
-6,955,022,055,545,367,000
Returns a date string to the RFC 3339 standard
precisionmapper/__init__.py
_datetime_object_to_rfc_date_str
tducret/precisionmapper-python
python
def _datetime_object_to_rfc_date_str(datetime_obj): ' ' return datetime_obj.strftime(_RFC3339_DATE_FORMAT)
def _rfc_date_str_to_datetime_object(rfc_date_str): ' Returns a date string to the RFC 3339 standard ' return datetime.strptime(rfc_date_str, _RFC3339_DATE_FORMAT)
-4,682,690,617,751,041,000
Returns a date string to the RFC 3339 standard
precisionmapper/__init__.py
_rfc_date_str_to_datetime_object
tducret/precisionmapper-python
python
def _rfc_date_str_to_datetime_object(rfc_date_str): ' ' return datetime.strptime(rfc_date_str, _RFC3339_DATE_FORMAT)
def _datetime_object_to_short_date_str(datetime_obj): ' Returns a short date string ' return datetime_obj.strftime(_SHORT_DATE_FORMAT)
4,117,565,389,665,448,000
Returns a short date string
precisionmapper/__init__.py
_datetime_object_to_short_date_str
tducret/precisionmapper-python
python
def _datetime_object_to_short_date_str(datetime_obj): ' ' return datetime_obj.strftime(_SHORT_DATE_FORMAT)
def get_authenticity_token(self, url=_SIGNIN_URL): ' Returns an authenticity_token, mandatory for signing in ' res = self.client._get(url=url, expected_status_code=200) soup = BeautifulSoup(res.text, _DEFAULT_BEAUTIFULSOUP_PARSER) selection = soup.select(_AUTHENTICITY_TOKEN_SELECTOR) try: authenticity_token = selection[0].get('content') except: raise ValueError('authenticity_token not found in {} with {}\n{}'.format(_SIGNIN_URL, _AUTHENTICITY_TOKEN_SELECTOR, res.text)) return authenticity_token
2,306,949,847,597,205,500
Returns an authenticity_token, mandatory for signing in
precisionmapper/__init__.py
get_authenticity_token
tducret/precisionmapper-python
python
def get_authenticity_token(self, url=_SIGNIN_URL): ' ' res = self.client._get(url=url, expected_status_code=200) soup = BeautifulSoup(res.text, _DEFAULT_BEAUTIFULSOUP_PARSER) selection = soup.select(_AUTHENTICITY_TOKEN_SELECTOR) try: authenticity_token = selection[0].get('content') except: raise ValueError('authenticity_token not found in {} with {}\n{}'.format(_SIGNIN_URL, _AUTHENTICITY_TOKEN_SELECTOR, res.text)) return authenticity_token
def get_surveys(self, url=_SURVEYS_URL): ' Function to get the surveys for the account ' res = self.client._get(url=url, expected_status_code=200) soup = BeautifulSoup(res.text, _DEFAULT_BEAUTIFULSOUP_PARSER) surveys_soup = soup.select(_SURVEYS_SELECTOR) survey_list = [] for survey_soup in surveys_soup: survey_name = _css_select(survey_soup, _SURVEY_NAME_SELECTOR) try: url = survey_soup.select(_SURVEY_URL_SELECTOR)[0]['href'] except: raise ValueError('Cannot get URL for the survey with css selector {}'.format(_SURVEY_URL_SELECTOR)) try: id = int(url.split('survey_id=')[1].split('&')[0]) except: raise ValueError('Cannot extract id from URL {}'.format(url)) survey_location = _css_select(survey_soup, _SURVEY_LOCATION_SELECTOR) try: survey_epoch = int(survey_soup.select(_SURVEY_DATE_SELECTOR)[0]['epoch']) survey_date_obj = datetime.fromtimestamp(survey_epoch) survey_date = _datetime_object_to_rfc_date_str(survey_date_obj) except: raise ValueError('Cannot get date for the survey with css selector {}'.format(_SURVEY_DATE_SELECTOR)) survey_img_nb_and_size = survey_soup.select(_SURVEY_IMG_NB_AND_SIZE_SELECTOR) try: survey_img_nb = survey_img_nb_and_size[0].text survey_img_nb = int(survey_img_nb.split(' ')[0]) except: raise ValueError('Cannot get or convert image number, survey_img_nb_and_size = {}'.format(survey_img_nb_and_size)) try: survey_size = survey_img_nb_and_size[1].text except: raise ValueError('Cannot get survey size, survey_img_nb_and_size = {}'.format(survey_img_nb_and_size)) sensor = _css_select(survey_soup, _SURVEY_SENSOR_SELECTOR) survey = Survey(id=id, name=survey_name, url=url, date=survey_date, location=survey_location, image_nb=survey_img_nb, size=survey_size, sensor=sensor) survey_list.append(survey) return survey_list
-8,596,098,261,441,833,000
Function to get the surveys for the account
precisionmapper/__init__.py
get_surveys
tducret/precisionmapper-python
python
def get_surveys(self, url=_SURVEYS_URL): ' ' res = self.client._get(url=url, expected_status_code=200) soup = BeautifulSoup(res.text, _DEFAULT_BEAUTIFULSOUP_PARSER) surveys_soup = soup.select(_SURVEYS_SELECTOR) survey_list = [] for survey_soup in surveys_soup: survey_name = _css_select(survey_soup, _SURVEY_NAME_SELECTOR) try: url = survey_soup.select(_SURVEY_URL_SELECTOR)[0]['href'] except: raise ValueError('Cannot get URL for the survey with css selector {}'.format(_SURVEY_URL_SELECTOR)) try: id = int(url.split('survey_id=')[1].split('&')[0]) except: raise ValueError('Cannot extract id from URL {}'.format(url)) survey_location = _css_select(survey_soup, _SURVEY_LOCATION_SELECTOR) try: survey_epoch = int(survey_soup.select(_SURVEY_DATE_SELECTOR)[0]['epoch']) survey_date_obj = datetime.fromtimestamp(survey_epoch) survey_date = _datetime_object_to_rfc_date_str(survey_date_obj) except: raise ValueError('Cannot get date for the survey with css selector {}'.format(_SURVEY_DATE_SELECTOR)) survey_img_nb_and_size = survey_soup.select(_SURVEY_IMG_NB_AND_SIZE_SELECTOR) try: survey_img_nb = survey_img_nb_and_size[0].text survey_img_nb = int(survey_img_nb.split(' ')[0]) except: raise ValueError('Cannot get or convert image number, survey_img_nb_and_size = {}'.format(survey_img_nb_and_size)) try: survey_size = survey_img_nb_and_size[1].text except: raise ValueError('Cannot get survey size, survey_img_nb_and_size = {}'.format(survey_img_nb_and_size)) sensor = _css_select(survey_soup, _SURVEY_SENSOR_SELECTOR) survey = Survey(id=id, name=survey_name, url=url, date=survey_date, location=survey_location, image_nb=survey_img_nb, size=survey_size, sensor=sensor) survey_list.append(survey) return survey_list
def test_download_wheel_bad_output(mocker, for_py_version, session_app_data): 'if the download contains no match for what wheel was downloaded, pick one that matches from target' distribution = 'setuptools' p_open = mocker.MagicMock() mocker.patch('virtualenv.seed.wheels.acquire.Popen', return_value=p_open) p_open.communicate.return_value = ('', '') p_open.returncode = 0 embed = get_embed_wheel(distribution, for_py_version) as_path = mocker.MagicMock() available = discover_wheels(BUNDLE_FOLDER, 'setuptools', None, for_py_version) as_path.iterdir.return_value = [i.path for i in available] result = download_wheel(distribution, '=={}'.format(embed.version), for_py_version, [], session_app_data, as_path) assert (result.path == embed.path)
-8,604,230,394,771,363,000
if the download contains no match for what wheel was downloaded, pick one that matches from target
tests/unit/seed/wheels/test_acquire.py
test_download_wheel_bad_output
MShaffar19/virtualenv
python
def test_download_wheel_bad_output(mocker, for_py_version, session_app_data): distribution = 'setuptools' p_open = mocker.MagicMock() mocker.patch('virtualenv.seed.wheels.acquire.Popen', return_value=p_open) p_open.communicate.return_value = (, ) p_open.returncode = 0 embed = get_embed_wheel(distribution, for_py_version) as_path = mocker.MagicMock() available = discover_wheels(BUNDLE_FOLDER, 'setuptools', None, for_py_version) as_path.iterdir.return_value = [i.path for i in available] result = download_wheel(distribution, '=={}'.format(embed.version), for_py_version, [], session_app_data, as_path) assert (result.path == embed.path)
@transactional_session def add_identity(identity, type, email, password=None, session=None): '\n Creates a user identity.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, ssh, saml)\n :param email: The Email address associated with the identity.\n :param password: If type==userpass, this sets the password.\n :param session: The database session in use.\n ' if ((type == IdentityType.USERPASS) and (password is None)): raise exception.IdentityError('You must provide a password!') new_id = models.Identity() new_id.update({'identity': identity, 'identity_type': type, 'email': email}) if ((type == IdentityType.USERPASS) and (password is not None)): salt = os.urandom(255) if six.PY3: decoded_salt = b64encode(salt).decode() salted_password = ('%s%s' % (decoded_salt, password)).encode() else: salted_password = ('%s%s' % (salt, str(password))) password = hashlib.sha256(salted_password).hexdigest() new_id.update({'salt': salt, 'password': password, 'email': email}) try: new_id.save(session=session) except IntegrityError as e: if match('.*IntegrityError.*1062.*Duplicate entry.*for key.*', e.args[0]): raise exception.Duplicate(("Identity pair '%s','%s' already exists!" % (identity, type))) raise exception.DatabaseException(str(e))
-3,860,912,868,457,641,500
Creates a user identity. :param identity: The identity key name. For example x509 DN, or a username. :param type: The type of the authentication (x509, gss, userpass, ssh, saml) :param email: The Email address associated with the identity. :param password: If type==userpass, this sets the password. :param session: The database session in use.
lib/rucio/core/identity.py
add_identity
Pranay144/rucio
python
@transactional_session def add_identity(identity, type, email, password=None, session=None): '\n Creates a user identity.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, ssh, saml)\n :param email: The Email address associated with the identity.\n :param password: If type==userpass, this sets the password.\n :param session: The database session in use.\n ' if ((type == IdentityType.USERPASS) and (password is None)): raise exception.IdentityError('You must provide a password!') new_id = models.Identity() new_id.update({'identity': identity, 'identity_type': type, 'email': email}) if ((type == IdentityType.USERPASS) and (password is not None)): salt = os.urandom(255) if six.PY3: decoded_salt = b64encode(salt).decode() salted_password = ('%s%s' % (decoded_salt, password)).encode() else: salted_password = ('%s%s' % (salt, str(password))) password = hashlib.sha256(salted_password).hexdigest() new_id.update({'salt': salt, 'password': password, 'email': email}) try: new_id.save(session=session) except IntegrityError as e: if match('.*IntegrityError.*1062.*Duplicate entry.*for key.*', e.args[0]): raise exception.Duplicate(("Identity pair '%s','%s' already exists!" % (identity, type))) raise exception.DatabaseException(str(e))
@transactional_session def del_identity(identity, type, session=None): '\n Deletes a user identity.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param session: The database session in use.\n ' id = session.query(models.Identity).filter_by(identity=identity, identity_type=type).first() if (id is None): raise exception.IdentityError(("Identity ('%s','%s') does not exist!" % (identity, type))) id.delete(session=session)
-5,832,953,435,856,953,000
Deletes a user identity. :param identity: The identity key name. For example x509 DN, or a username. :param type: The type of the authentication (x509, gss, userpass, saml). :param session: The database session in use.
lib/rucio/core/identity.py
del_identity
Pranay144/rucio
python
@transactional_session def del_identity(identity, type, session=None): '\n Deletes a user identity.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param session: The database session in use.\n ' id = session.query(models.Identity).filter_by(identity=identity, identity_type=type).first() if (id is None): raise exception.IdentityError(("Identity ('%s','%s') does not exist!" % (identity, type))) id.delete(session=session)
@transactional_session def add_account_identity(identity, type, account, email, default=False, password=None, session=None): '\n Adds a membership association between identity and account.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, ssh, saml).\n :param account: The account name.\n :param email: The Email address associated with the identity.\n :param default: If True, the account should be used by default with the provided identity.\n :param password: Password if type is userpass.\n :param session: The database session in use.\n ' if (not account_exists(account, session=session)): raise exception.AccountNotFound(("Account '%s' does not exist." % account)) id = session.query(models.Identity).filter_by(identity=identity, identity_type=type).first() if (id is None): add_identity(identity=identity, type=type, email=email, password=password, session=session) id = session.query(models.Identity).filter_by(identity=identity, identity_type=type).first() iaa = models.IdentityAccountAssociation(identity=id.identity, identity_type=id.identity_type, account=account) try: iaa.save(session=session) except IntegrityError: raise exception.Duplicate(("Identity pair '%s','%s' already exists!" % (identity, type)))
5,409,784,752,029,731,000
Adds a membership association between identity and account. :param identity: The identity key name. For example x509 DN, or a username. :param type: The type of the authentication (x509, gss, userpass, ssh, saml). :param account: The account name. :param email: The Email address associated with the identity. :param default: If True, the account should be used by default with the provided identity. :param password: Password if type is userpass. :param session: The database session in use.
lib/rucio/core/identity.py
add_account_identity
Pranay144/rucio
python
@transactional_session def add_account_identity(identity, type, account, email, default=False, password=None, session=None): '\n Adds a membership association between identity and account.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, ssh, saml).\n :param account: The account name.\n :param email: The Email address associated with the identity.\n :param default: If True, the account should be used by default with the provided identity.\n :param password: Password if type is userpass.\n :param session: The database session in use.\n ' if (not account_exists(account, session=session)): raise exception.AccountNotFound(("Account '%s' does not exist." % account)) id = session.query(models.Identity).filter_by(identity=identity, identity_type=type).first() if (id is None): add_identity(identity=identity, type=type, email=email, password=password, session=session) id = session.query(models.Identity).filter_by(identity=identity, identity_type=type).first() iaa = models.IdentityAccountAssociation(identity=id.identity, identity_type=id.identity_type, account=account) try: iaa.save(session=session) except IntegrityError: raise exception.Duplicate(("Identity pair '%s','%s' already exists!" % (identity, type)))
@read_session def get_default_account(identity, type, session=None): '\n Retrieves the default account mapped to an identity.\n\n :param identity: The identity key name. For example, x509DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param session: The database session to use.\n :returns: The default account name, None otherwise.\n ' tmp = session.query(models.IdentityAccountAssociation).filter_by(identity=identity, identity_type=type, is_default=True).first() if (tmp is None): raise exception.IdentityError(('There is no default account for identity (%s, %s)' % (identity, type))) return tmp.account
-9,161,338,177,434,302,000
Retrieves the default account mapped to an identity. :param identity: The identity key name. For example, x509DN, or a username. :param type: The type of the authentication (x509, gss, userpass, saml). :param session: The database session to use. :returns: The default account name, None otherwise.
lib/rucio/core/identity.py
get_default_account
Pranay144/rucio
python
@read_session def get_default_account(identity, type, session=None): '\n Retrieves the default account mapped to an identity.\n\n :param identity: The identity key name. For example, x509DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param session: The database session to use.\n :returns: The default account name, None otherwise.\n ' tmp = session.query(models.IdentityAccountAssociation).filter_by(identity=identity, identity_type=type, is_default=True).first() if (tmp is None): raise exception.IdentityError(('There is no default account for identity (%s, %s)' % (identity, type))) return tmp.account
@transactional_session def del_account_identity(identity, type, account, session=None): '\n Removes a membership association between identity and account.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param account: The account name.\n :param session: The database session in use.\n ' aid = session.query(models.IdentityAccountAssociation).filter_by(identity=identity, identity_type=type, account=account).first() if (aid is None): raise exception.IdentityError(("Identity ('%s','%s') does not exist!" % (identity, type))) aid.delete(session=session)
-4,375,022,618,797,144,000
Removes a membership association between identity and account. :param identity: The identity key name. For example x509 DN, or a username. :param type: The type of the authentication (x509, gss, userpass, saml). :param account: The account name. :param session: The database session in use.
lib/rucio/core/identity.py
del_account_identity
Pranay144/rucio
python
@transactional_session def del_account_identity(identity, type, account, session=None): '\n Removes a membership association between identity and account.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param account: The account name.\n :param session: The database session in use.\n ' aid = session.query(models.IdentityAccountAssociation).filter_by(identity=identity, identity_type=type, account=account).first() if (aid is None): raise exception.IdentityError(("Identity ('%s','%s') does not exist!" % (identity, type))) aid.delete(session=session)
@read_session def list_identities(session=None, **kwargs): '\n Returns a list of all identities.\n\n :param session: The database session in use.\n\n returns: A list of all identities.\n ' id_list = [] for id in session.query(models.Identity).order_by(models.Identity.identity): id_list.append((id.identity, id.identity_type)) return id_list
-8,399,802,736,883,936,000
Returns a list of all identities. :param session: The database session in use. returns: A list of all identities.
lib/rucio/core/identity.py
list_identities
Pranay144/rucio
python
@read_session def list_identities(session=None, **kwargs): '\n Returns a list of all identities.\n\n :param session: The database session in use.\n\n returns: A list of all identities.\n ' id_list = [] for id in session.query(models.Identity).order_by(models.Identity.identity): id_list.append((id.identity, id.identity_type)) return id_list
@read_session def list_accounts_for_identity(identity, type, session=None): '\n Returns a list of all accounts for an identity.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param session: The database session in use.\n\n returns: A list of all accounts for the identity.\n ' account_list = [] for (account,) in session.query(models.IdentityAccountAssociation.account).filter_by(identity=identity, identity_type=type): account_list.append(account) return account_list
7,104,951,005,997,469,000
Returns a list of all accounts for an identity. :param identity: The identity key name. For example x509 DN, or a username. :param type: The type of the authentication (x509, gss, userpass, saml). :param session: The database session in use. returns: A list of all accounts for the identity.
lib/rucio/core/identity.py
list_accounts_for_identity
Pranay144/rucio
python
@read_session def list_accounts_for_identity(identity, type, session=None): '\n Returns a list of all accounts for an identity.\n\n :param identity: The identity key name. For example x509 DN, or a username.\n :param type: The type of the authentication (x509, gss, userpass, saml).\n :param session: The database session in use.\n\n returns: A list of all accounts for the identity.\n ' account_list = [] for (account,) in session.query(models.IdentityAccountAssociation.account).filter_by(identity=identity, identity_type=type): account_list.append(account) return account_list
def test_plain_ansi(self): '\n Test that printable characters do not get mangled.\n ' irc_ansi = irc.parse_ansi_to_irc(string.printable) ansi_irc = irc.parse_irc_to_ansi(string.printable) self.assertEqual(irc_ansi, string.printable) self.assertEqual(ansi_irc, string.printable)
2,886,767,279,122,754,000
Test that printable characters do not get mangled.
evennia/server/portal/tests.py
test_plain_ansi
Antrare/evennia
python
def test_plain_ansi(self): '\n \n ' irc_ansi = irc.parse_ansi_to_irc(string.printable) ansi_irc = irc.parse_irc_to_ansi(string.printable) self.assertEqual(irc_ansi, string.printable) self.assertEqual(ansi_irc, string.printable)
def test_identity(self): '\n Test that the composition of the function and\n its inverse gives the correct string.\n ' s = '|wthis|Xis|gis|Ma|C|complex|*string' self.assertEqual(irc.parse_irc_to_ansi(irc.parse_ansi_to_irc(s)), s)
-7,974,552,474,826,718,000
Test that the composition of the function and its inverse gives the correct string.
evennia/server/portal/tests.py
test_identity
Antrare/evennia
python
def test_identity(self): '\n Test that the composition of the function and\n its inverse gives the correct string.\n ' s = '|wthis|Xis|gis|Ma|C|complex|*string' self.assertEqual(irc.parse_irc_to_ansi(irc.parse_ansi_to_irc(s)), s)
def test_find_start_codons(): 'New test to test the function to find start codons' assert (DNA('ATGGTACATGCGA').find_start_codons() == [0, 7])
5,244,507,483,773,776,000
New test to test the function to find start codons
tests/test_dna.py
test_find_start_codons
nickdelgrosso/genomics_workshop_demo
python
def test_find_start_codons(): assert (DNA('ATGGTACATGCGA').find_start_codons() == [0, 7])