source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
---|---|---|
def x(self, data, fill_value=None):
not_alpha = [b for b in data.coords['bands'].values if b != 'A']
null_mask = data.sel(bands=not_alpha)
if np.issubdtype(data.dtype, np.integer) and fill_value is not None:
null_mask = null_mask != fill_value
else:
null_mask = null_mask.notnull()
null_mask = null_mask.any(dim='bands')
null_mask = null_mask.expand_dims('bands')
null_mask['bands'] = ['A']
return null_mask
|
create_alpha
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data, fill_value=None):\n not_alpha = [b for b in data.coords['bands'].values if b != 'A']\n null_mask = data.sel(bands=not_alpha)\n if np.issubdtype(data.dtype, np.integer) and fill_value is not None:\n null_mask = null_mask != fill_value\n else:\n null_mask = null_mask.notnull()\n null_mask = null_mask.any(dim='bands')\n null_mask = null_mask.expand_dims('bands')\n null_mask['bands'] = ['A']\n return null_mask\n",
"role": "user"
},
{
"content": "create_alpha",
"role": "assistant"
}
] |
def x(self, data, alpha=None):
null_mask = alpha if alpha is not None else self._create_alpha(data)
if np.issubdtype(data.dtype, np.integer):
null_mask = self._scale_to_dtype(null_mask, data.dtype).astype(data
.dtype)
data = xr.concat([data, null_mask], dim='bands')
return data
|
add_alpha
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data, alpha=None):\n null_mask = alpha if alpha is not None else self._create_alpha(data)\n if np.issubdtype(data.dtype, np.integer):\n null_mask = self._scale_to_dtype(null_mask, data.dtype).astype(data\n .dtype)\n data = xr.concat([data, null_mask], dim='bands')\n return data\n",
"role": "user"
},
{
"content": "add_alpha",
"role": "assistant"
}
] |
def x(self, data, dtype):
if np.issubdtype(dtype, np.integer):
if np.issubdtype(data, np.integer):
data = data.clip(np.iinfo(dtype).min, np.iinfo(dtype).max)
else:
dinfo = np.iinfo(dtype)
data = data.clip(0, 1) * (dinfo.max - dinfo.min) + dinfo.min
data = data.round()
return data
|
scale_to_dtype
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data, dtype):\n if np.issubdtype(dtype, np.integer):\n if np.issubdtype(data, np.integer):\n data = data.clip(np.iinfo(dtype).min, np.iinfo(dtype).max)\n else:\n dinfo = np.iinfo(dtype)\n data = data.clip(0, 1) * (dinfo.max - dinfo.min) + dinfo.min\n data = data.round()\n return data\n",
"role": "user"
},
{
"content": "scale_to_dtype",
"role": "assistant"
}
] |
def x(self, modes):
if not isinstance(modes, (tuple, list, set)):
modes = [modes]
if self.mode not in modes:
raise ValueError(
'Image not in suitable mode, expected: %s, got: %s' % (modes,
self.mode))
|
check_modes
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, modes):\n if not isinstance(modes, (tuple, list, set)):\n modes = [modes]\n if self.mode not in modes:\n raise ValueError(\n 'Image not in suitable mode, expected: %s, got: %s' % (modes,\n self.mode))\n",
"role": "user"
},
{
"content": "check_modes",
"role": "assistant"
}
] |
def x(self, mode):
self._check_modes(('P', 'PA'))
if not self.palette:
raise RuntimeError("Can't convert palettized image, missing palette.")
pal = np.array(self.palette)
pal = da.from_array(pal, chunks=pal.shape)
if pal.shape[1] == 4:
mode = 'RGBA'
alpha = None
elif self.mode.endswith('A'):
alpha = self.data.sel(bands='A').data[..., None]
mode = mode + 'A' if not mode.endswith('A') else mode
else:
alpha = None
flat_indexes = self.data.sel(bands='P').data.ravel().astype('int64')
dim_sizes = ((key, val) for key, val in self.data.sizes.items() if key !=
'bands')
dims, new_shape = zip(*dim_sizes)
dims = dims + ('bands',)
new_shape = new_shape + (pal.shape[1],)
new_data = pal[flat_indexes].reshape(new_shape)
coords = dict(self.data.coords)
coords['bands'] = list(mode)
if alpha is not None:
new_arr = da.concatenate((new_data, alpha), axis=-1)
data = xr.DataArray(new_arr, coords=coords, attrs=self.data.attrs,
dims=dims)
else:
data = xr.DataArray(new_data, coords=coords, attrs=self.data.attrs,
dims=dims)
return data
|
from_p
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, mode):\n self._check_modes(('P', 'PA'))\n if not self.palette:\n raise RuntimeError(\"Can't convert palettized image, missing palette.\")\n pal = np.array(self.palette)\n pal = da.from_array(pal, chunks=pal.shape)\n if pal.shape[1] == 4:\n mode = 'RGBA'\n alpha = None\n elif self.mode.endswith('A'):\n alpha = self.data.sel(bands='A').data[..., None]\n mode = mode + 'A' if not mode.endswith('A') else mode\n else:\n alpha = None\n flat_indexes = self.data.sel(bands='P').data.ravel().astype('int64')\n dim_sizes = ((key, val) for key, val in self.data.sizes.items() if key !=\n 'bands')\n dims, new_shape = zip(*dim_sizes)\n dims = dims + ('bands',)\n new_shape = new_shape + (pal.shape[1],)\n new_data = pal[flat_indexes].reshape(new_shape)\n coords = dict(self.data.coords)\n coords['bands'] = list(mode)\n if alpha is not None:\n new_arr = da.concatenate((new_data, alpha), axis=-1)\n data = xr.DataArray(new_arr, coords=coords, attrs=self.data.attrs,\n dims=dims)\n else:\n data = xr.DataArray(new_data, coords=coords, attrs=self.data.attrs,\n dims=dims)\n return data\n",
"role": "user"
},
{
"content": "from_p",
"role": "assistant"
}
] |
def x(self, mode):
self._check_modes(('L', 'LA'))
bands = ['L'] * 3
if mode[-1] == 'A':
bands.append('A')
data = self.data.sel(bands=bands)
data['bands'] = list(mode)
return data
|
l2rgb
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, mode):\n self._check_modes(('L', 'LA'))\n bands = ['L'] * 3\n if mode[-1] == 'A':\n bands.append('A')\n data = self.data.sel(bands=bands)\n data['bands'] = list(mode)\n return data\n",
"role": "user"
},
{
"content": "l2rgb",
"role": "assistant"
}
] |
def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None):
import warnings
warnings.warn("'_finalize' is deprecated, use 'finalize' instead.",
DeprecationWarning)
return self.finalize(fill_value, dtype, keep_palette, cmap)
|
finalize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None):\n import warnings\n warnings.warn(\"'_finalize' is deprecated, use 'finalize' instead.\",\n DeprecationWarning)\n return self.finalize(fill_value, dtype, keep_palette, cmap)\n",
"role": "user"
},
{
"content": "finalize",
"role": "assistant"
}
] |
def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None):
if keep_palette and not self.mode.startswith('P'):
keep_palette = False
if not keep_palette:
if self.mode == 'P':
return self.convert('RGB').finalize(fill_value=fill_value,
dtype=dtype, keep_palette=keep_palette, cmap=cmap)
if self.mode == 'PA':
return self.convert('RGBA').finalize(fill_value=fill_value,
dtype=dtype, keep_palette=keep_palette, cmap=cmap)
if np.issubdtype(dtype, np.floating) and fill_value is None:
logger.warning(
'Image with floats cannot be transparent, so setting fill_value to 0'
)
fill_value = 0
final_data = self.data
ifill = final_data.attrs.get('_FillValue') if np.issubdtype(final_data,
np.integer) else None
if not keep_palette:
if fill_value is None and not self.mode.endswith('A'):
alpha = self._create_alpha(final_data, fill_value=ifill)
final_data = self._scale_to_dtype(final_data, dtype).astype(dtype)
final_data = self._add_alpha(final_data, alpha=alpha)
else:
final_data = self._scale_to_dtype(final_data, dtype)
if ifill is not None and fill_value is not None:
fill_value = dtype(fill_value)
final_data = final_data.where(final_data != ifill, dtype(
fill_value))
elif fill_value is not None:
final_data = final_data.fillna(dtype(fill_value))
final_data = final_data.astype(dtype)
final_data.attrs = self.data.attrs
return final_data, ''.join(final_data['bands'].values)
|
finalize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None):\n if keep_palette and not self.mode.startswith('P'):\n keep_palette = False\n if not keep_palette:\n if self.mode == 'P':\n return self.convert('RGB').finalize(fill_value=fill_value,\n dtype=dtype, keep_palette=keep_palette, cmap=cmap)\n if self.mode == 'PA':\n return self.convert('RGBA').finalize(fill_value=fill_value,\n dtype=dtype, keep_palette=keep_palette, cmap=cmap)\n if np.issubdtype(dtype, np.floating) and fill_value is None:\n logger.warning(\n 'Image with floats cannot be transparent, so setting fill_value to 0'\n )\n fill_value = 0\n final_data = self.data\n ifill = final_data.attrs.get('_FillValue') if np.issubdtype(final_data,\n np.integer) else None\n if not keep_palette:\n if fill_value is None and not self.mode.endswith('A'):\n alpha = self._create_alpha(final_data, fill_value=ifill)\n final_data = self._scale_to_dtype(final_data, dtype).astype(dtype)\n final_data = self._add_alpha(final_data, alpha=alpha)\n else:\n final_data = self._scale_to_dtype(final_data, dtype)\n if ifill is not None and fill_value is not None:\n fill_value = dtype(fill_value)\n final_data = final_data.where(final_data != ifill, dtype(\n fill_value))\n elif fill_value is not None:\n final_data = final_data.fillna(dtype(fill_value))\n final_data = final_data.astype(dtype)\n final_data.attrs = self.data.attrs\n return final_data, ''.join(final_data['bands'].values)\n",
"role": "user"
},
{
"content": "finalize",
"role": "assistant"
}
] |
def x(self, fill_value=None, compute=True):
channels, mode = self.finalize(fill_value)
res = channels.transpose('y', 'x', 'bands')
img = dask.delayed(PILImage.fromarray)(np.squeeze(res.data), mode)
if compute:
img = img.compute()
return img
|
pil_image
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, fill_value=None, compute=True):\n channels, mode = self.finalize(fill_value)\n res = channels.transpose('y', 'x', 'bands')\n img = dask.delayed(PILImage.fromarray)(np.squeeze(res.data), mode)\n if compute:\n img = img.compute()\n return img\n",
"role": "user"
},
{
"content": "pil_image",
"role": "assistant"
}
] |
def x(self, tup):
return xr.DataArray(tup, dims=['bands'], coords={'bands': self.data[
'bands']})
|
xrify_tuples
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, tup):\n return xr.DataArray(tup, dims=['bands'], coords={'bands': self.data[\n 'bands']})\n",
"role": "user"
},
{
"content": "xrify_tuples",
"role": "assistant"
}
] |
def x(self, gamma=1.0):
if isinstance(gamma, (list, tuple)):
gamma = self.xrify_tuples(gamma)
elif gamma == 1.0:
return
logger.debug('Applying gamma %s', str(gamma))
attrs = self.data.attrs
self.data = self.data.clip(min=0)
self.data **= 1.0 / gamma
self.data.attrs = attrs
|
gamma
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, gamma=1.0):\n if isinstance(gamma, (list, tuple)):\n gamma = self.xrify_tuples(gamma)\n elif gamma == 1.0:\n return\n logger.debug('Applying gamma %s', str(gamma))\n attrs = self.data.attrs\n self.data = self.data.clip(min=0)\n self.data **= 1.0 / gamma\n self.data.attrs = attrs\n",
"role": "user"
},
{
"content": "gamma",
"role": "assistant"
}
] |
def x(self, stretch='crude', **kwargs):
logger.debug('Applying stretch %s with parameters %s', stretch, str(kwargs)
)
if isinstance(stretch, (tuple, list)):
if len(stretch) == 2:
self.stretch_linear(cutoffs=stretch)
else:
raise ValueError('Stretch tuple must have exactly two elements')
elif stretch == 'linear':
self.stretch_linear(**kwargs)
elif stretch == 'histogram':
self.stretch_hist_equalize(**kwargs)
elif stretch in ['crude', 'crude-stretch']:
self.crude_stretch(**kwargs)
elif stretch in ['log', 'logarithmic']:
self.stretch_logarithmic(**kwargs)
elif stretch == 'no':
return
elif isinstance(stretch, str):
raise ValueError('Stretching method %s not recognized.' % stretch)
else:
raise TypeError('Stretch parameter must be a string or a tuple.')
|
stretch
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stretch='crude', **kwargs):\n logger.debug('Applying stretch %s with parameters %s', stretch, str(kwargs)\n )\n if isinstance(stretch, (tuple, list)):\n if len(stretch) == 2:\n self.stretch_linear(cutoffs=stretch)\n else:\n raise ValueError('Stretch tuple must have exactly two elements')\n elif stretch == 'linear':\n self.stretch_linear(**kwargs)\n elif stretch == 'histogram':\n self.stretch_hist_equalize(**kwargs)\n elif stretch in ['crude', 'crude-stretch']:\n self.crude_stretch(**kwargs)\n elif stretch in ['log', 'logarithmic']:\n self.stretch_logarithmic(**kwargs)\n elif stretch == 'no':\n return\n elif isinstance(stretch, str):\n raise ValueError('Stretching method %s not recognized.' % stretch)\n else:\n raise TypeError('Stretch parameter must be a string or a tuple.')\n",
"role": "user"
},
{
"content": "stretch",
"role": "assistant"
}
] |
def x(data, dims, cutoffs):
data_arr = xr.DataArray(data, dims=dims)
left, right = data_arr.quantile([cutoffs[0], 1.0 - cutoffs[1]], dim=[
'x', 'y'])
logger.debug('Interval: left=%s, right=%s', str(left), str(right))
return left.data, right.data
|
compute_quantile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data, dims, cutoffs):\n data_arr = xr.DataArray(data, dims=dims)\n left, right = data_arr.quantile([cutoffs[0], 1.0 - cutoffs[1]], dim=[\n 'x', 'y'])\n logger.debug('Interval: left=%s, right=%s', str(left), str(right))\n return left.data, right.data\n",
"role": "user"
},
{
"content": "compute_quantile",
"role": "assistant"
}
] |
def x(self, cutoffs=(0.005, 0.005)):
logger.debug('Perform a linear contrast stretch.')
logger.debug('Calculate the histogram quantiles: ')
logger.debug('Left and right quantiles: ' + str(cutoffs[0]) + ' ' + str
(cutoffs[1]))
cutoff_type = np.float64
if np.issubdtype(self.data.dtype, np.floating) and np.dtype(self.data.dtype
).itemsize > 8:
cutoff_type = self.data.dtype
left, right = dask.delayed(self._compute_quantile, nout=2)(self.data.
data, self.data.dims, cutoffs)
left_data = da.from_delayed(left, shape=(self.data.sizes['bands'],),
dtype=cutoff_type)
left = xr.DataArray(left_data, dims=('bands',), coords={'bands': self.
data['bands']})
right_data = da.from_delayed(right, shape=(self.data.sizes['bands'],),
dtype=cutoff_type)
right = xr.DataArray(right_data, dims=('bands',), coords={'bands': self
.data['bands']})
self.crude_stretch(left, right)
|
stretch_linear
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cutoffs=(0.005, 0.005)):\n logger.debug('Perform a linear contrast stretch.')\n logger.debug('Calculate the histogram quantiles: ')\n logger.debug('Left and right quantiles: ' + str(cutoffs[0]) + ' ' + str\n (cutoffs[1]))\n cutoff_type = np.float64\n if np.issubdtype(self.data.dtype, np.floating) and np.dtype(self.data.dtype\n ).itemsize > 8:\n cutoff_type = self.data.dtype\n left, right = dask.delayed(self._compute_quantile, nout=2)(self.data.\n data, self.data.dims, cutoffs)\n left_data = da.from_delayed(left, shape=(self.data.sizes['bands'],),\n dtype=cutoff_type)\n left = xr.DataArray(left_data, dims=('bands',), coords={'bands': self.\n data['bands']})\n right_data = da.from_delayed(right, shape=(self.data.sizes['bands'],),\n dtype=cutoff_type)\n right = xr.DataArray(right_data, dims=('bands',), coords={'bands': self\n .data['bands']})\n self.crude_stretch(left, right)\n",
"role": "user"
},
{
"content": "stretch_linear",
"role": "assistant"
}
] |
def x(self, min_stretch=None, max_stretch=None):
if min_stretch is None:
non_band_dims = tuple(x for x in self.data.dims if x != 'bands')
min_stretch = self.data.min(dim=non_band_dims)
if max_stretch is None:
non_band_dims = tuple(x for x in self.data.dims if x != 'bands')
max_stretch = self.data.max(dim=non_band_dims)
if isinstance(min_stretch, (list, tuple)):
min_stretch = self.xrify_tuples(min_stretch)
if isinstance(max_stretch, (list, tuple)):
max_stretch = self.xrify_tuples(max_stretch)
delta = max_stretch - min_stretch
if isinstance(delta, xr.DataArray):
scale_factor = (1.0 / delta).fillna(0)
else:
scale_factor = 1.0 / delta
attrs = self.data.attrs
self.data -= min_stretch
self.data *= scale_factor
self.data.attrs = attrs
|
crude_stretch
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, min_stretch=None, max_stretch=None):\n if min_stretch is None:\n non_band_dims = tuple(x for x in self.data.dims if x != 'bands')\n min_stretch = self.data.min(dim=non_band_dims)\n if max_stretch is None:\n non_band_dims = tuple(x for x in self.data.dims if x != 'bands')\n max_stretch = self.data.max(dim=non_band_dims)\n if isinstance(min_stretch, (list, tuple)):\n min_stretch = self.xrify_tuples(min_stretch)\n if isinstance(max_stretch, (list, tuple)):\n max_stretch = self.xrify_tuples(max_stretch)\n delta = max_stretch - min_stretch\n if isinstance(delta, xr.DataArray):\n scale_factor = (1.0 / delta).fillna(0)\n else:\n scale_factor = 1.0 / delta\n attrs = self.data.attrs\n self.data -= min_stretch\n self.data *= scale_factor\n self.data.attrs = attrs\n",
"role": "user"
},
{
"content": "crude_stretch",
"role": "assistant"
}
] |
def x(self, approximate=False):
logger.info('Perform a histogram equalized contrast stretch.')
nwidth = 2048.0
logger.debug('Make histogram bins having equal amount of data, ' +
'using numpy percentile function:')
def x(band_data):
cdf = da.arange(0.0, 1.0, 1.0 / nwidth, chunks=nwidth)
if approximate:
flat_data = band_data.ravel()
bins = da.percentile(flat_data[da.notnull(flat_data)], cdf * 100.0)
else:
bins = dask.delayed(np.nanpercentile)(band_data, cdf * 100.0)
bins = da.from_delayed(bins, shape=(nwidth,), dtype=cdf.dtype)
res = dask.delayed(np.interp)(band_data, bins, cdf)
res = da.from_delayed(res, shape=band_data.shape, dtype=band_data.dtype
)
return res
band_results = []
for band in self.data['bands'].values:
if band == 'A':
continue
band_data = self.data.sel(bands=band)
res = _band_hist(band_data.data)
band_results.append(res)
if 'A' in self.data.coords['bands'].values:
band_results.append(self.data.sel(bands='A'))
self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))
|
stretch_hist_equalize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, approximate=False):\n logger.info('Perform a histogram equalized contrast stretch.')\n nwidth = 2048.0\n logger.debug('Make histogram bins having equal amount of data, ' +\n 'using numpy percentile function:')\n\n def x(band_data):\n cdf = da.arange(0.0, 1.0, 1.0 / nwidth, chunks=nwidth)\n if approximate:\n flat_data = band_data.ravel()\n bins = da.percentile(flat_data[da.notnull(flat_data)], cdf * 100.0)\n else:\n bins = dask.delayed(np.nanpercentile)(band_data, cdf * 100.0)\n bins = da.from_delayed(bins, shape=(nwidth,), dtype=cdf.dtype)\n res = dask.delayed(np.interp)(band_data, bins, cdf)\n res = da.from_delayed(res, shape=band_data.shape, dtype=band_data.dtype\n )\n return res\n band_results = []\n for band in self.data['bands'].values:\n if band == 'A':\n continue\n band_data = self.data.sel(bands=band)\n res = _band_hist(band_data.data)\n band_results.append(res)\n if 'A' in self.data.coords['bands'].values:\n band_results.append(self.data.sel(bands='A'))\n self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))\n",
"role": "user"
},
{
"content": "stretch_hist_equalize",
"role": "assistant"
}
] |
def x(self, factor=100.0):
logger.debug('Perform a logarithmic contrast stretch.')
crange = 0.0, 1.0
b__ = float(crange[1] - crange[0]) / np.log(factor)
c__ = float(crange[0])
def x(arr):
slope = (factor - 1.0) / float(arr.max() - arr.min())
arr = 1.0 + (arr - arr.min()) * slope
arr = c__ + b__ * da.log(arr)
return arr
band_results = []
for band in self.data['bands'].values:
if band == 'A':
continue
band_data = self.data.sel(bands=band)
res = _band_log(band_data.data)
band_results.append(res)
if 'A' in self.data.coords['bands'].values:
band_results.append(self.data.sel(bands='A'))
self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))
|
stretch_logarithmic
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, factor=100.0):\n logger.debug('Perform a logarithmic contrast stretch.')\n crange = 0.0, 1.0\n b__ = float(crange[1] - crange[0]) / np.log(factor)\n c__ = float(crange[0])\n\n def x(arr):\n slope = (factor - 1.0) / float(arr.max() - arr.min())\n arr = 1.0 + (arr - arr.min()) * slope\n arr = c__ + b__ * da.log(arr)\n return arr\n band_results = []\n for band in self.data['bands'].values:\n if band == 'A':\n continue\n band_data = self.data.sel(bands=band)\n res = _band_log(band_data.data)\n band_results.append(res)\n if 'A' in self.data.coords['bands'].values:\n band_results.append(self.data.sel(bands='A'))\n self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))\n",
"role": "user"
},
{
"content": "stretch_logarithmic",
"role": "assistant"
}
] |
def x(self, k, s0):
attrs = self.data.attrs
self.data = k * xu.log(self.data / s0)
self.data.attrs = attrs
|
stretch_weber_fechner
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, k, s0):\n attrs = self.data.attrs\n self.data = k * xu.log(self.data / s0)\n self.data.attrs = attrs\n",
"role": "user"
},
{
"content": "stretch_weber_fechner",
"role": "assistant"
}
] |
def x(self, invert=True):
logger.debug('Applying invert with parameters %s', str(invert))
if isinstance(invert, (tuple, list)):
invert = self.xrify_tuples(invert)
offset = invert.astype(int)
scale = (-1) ** offset
elif invert:
offset = 1
scale = -1
attrs = self.data.attrs
self.data = self.data * scale + offset
self.data.attrs = attrs
|
invert
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, invert=True):\n logger.debug('Applying invert with parameters %s', str(invert))\n if isinstance(invert, (tuple, list)):\n invert = self.xrify_tuples(invert)\n offset = invert.astype(int)\n scale = (-1) ** offset\n elif invert:\n offset = 1\n scale = -1\n attrs = self.data.attrs\n self.data = self.data * scale + offset\n self.data.attrs = attrs\n",
"role": "user"
},
{
"content": "invert",
"role": "assistant"
}
] |
def x(self, img):
raise NotImplementedError(
'This method has not be implemented for xarray support.')
if self.is_empty():
raise ValueError('Cannot merge an empty image.')
if self.mode != img.mode:
raise ValueError('Cannot merge image of different modes.')
selfmask = self.channels[0].mask
for chn in self.channels[1:]:
selfmask = np.ma.mask_or(selfmask, chn.mask)
for i in range(len(self.channels)):
self.channels[i] = np.ma.where(selfmask, img.channels[i], self.
channels[i])
self.channels[i].mask = np.logical_and(selfmask, img.channels[i].mask)
|
merge
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, img):\n raise NotImplementedError(\n 'This method has not be implemented for xarray support.')\n if self.is_empty():\n raise ValueError('Cannot merge an empty image.')\n if self.mode != img.mode:\n raise ValueError('Cannot merge image of different modes.')\n selfmask = self.channels[0].mask\n for chn in self.channels[1:]:\n selfmask = np.ma.mask_or(selfmask, chn.mask)\n for i in range(len(self.channels)):\n self.channels[i] = np.ma.where(selfmask, img.channels[i], self.\n channels[i])\n self.channels[i].mask = np.logical_and(selfmask, img.channels[i].mask)\n",
"role": "user"
},
{
"content": "merge",
"role": "assistant"
}
] |
def x(self, colormap):
if self.mode not in ('L', 'LA'):
raise ValueError('Image should be grayscale to colorize')
if self.mode == 'LA':
alpha = self.data.sel(bands=['A'])
else:
alpha = None
l_data = self.data.sel(bands=['L'])
def x(l_data, colormap):
channels = colormap.colorize(l_data)
return np.concatenate(channels, axis=0)
new_data = l_data.data.map_blocks(_colorize, colormap, chunks=(colormap
.colors.shape[1],) + l_data.data.chunks[1:], dtype=np.float64)
if colormap.colors.shape[1] == 4:
mode = 'RGBA'
elif alpha is not None:
new_data = da.concatenate([new_data, alpha.data], axis=0)
mode = 'RGBA'
else:
mode = 'RGB'
coords = dict(self.data.coords)
coords['bands'] = list(mode)
attrs = self.data.attrs
dims = self.data.dims
self.data = xr.DataArray(new_data, coords=coords, attrs=attrs, dims=dims)
|
colorize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, colormap):\n if self.mode not in ('L', 'LA'):\n raise ValueError('Image should be grayscale to colorize')\n if self.mode == 'LA':\n alpha = self.data.sel(bands=['A'])\n else:\n alpha = None\n l_data = self.data.sel(bands=['L'])\n\n def x(l_data, colormap):\n channels = colormap.colorize(l_data)\n return np.concatenate(channels, axis=0)\n new_data = l_data.data.map_blocks(_colorize, colormap, chunks=(colormap\n .colors.shape[1],) + l_data.data.chunks[1:], dtype=np.float64)\n if colormap.colors.shape[1] == 4:\n mode = 'RGBA'\n elif alpha is not None:\n new_data = da.concatenate([new_data, alpha.data], axis=0)\n mode = 'RGBA'\n else:\n mode = 'RGB'\n coords = dict(self.data.coords)\n coords['bands'] = list(mode)\n attrs = self.data.attrs\n dims = self.data.dims\n self.data = xr.DataArray(new_data, coords=coords, attrs=attrs, dims=dims)\n",
"role": "user"
},
{
"content": "colorize",
"role": "assistant"
}
] |
def x(self, colormap):
if self.mode not in ('L', 'LA'):
raise ValueError('Image should be grayscale to colorize')
l_data = self.data.sel(bands=['L'])
def x(data):
return colormap.palettize(data)[0]
new_data = l_data.data.map_blocks(_palettize, dtype=l_data.dtype)
self.palette = tuple(colormap.colors)
if self.mode == 'L':
mode = 'P'
else:
mode = 'PA'
new_data = da.concatenate([new_data, self.data.sel(bands=['A'])],
axis=0)
self.data.data = new_data
self.data.coords['bands'] = list(mode)
|
palettize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, colormap):\n if self.mode not in ('L', 'LA'):\n raise ValueError('Image should be grayscale to colorize')\n l_data = self.data.sel(bands=['L'])\n\n def x(data):\n return colormap.palettize(data)[0]\n new_data = l_data.data.map_blocks(_palettize, dtype=l_data.dtype)\n self.palette = tuple(colormap.colors)\n if self.mode == 'L':\n mode = 'P'\n else:\n mode = 'PA'\n new_data = da.concatenate([new_data, self.data.sel(bands=['A'])],\n axis=0)\n self.data.data = new_data\n self.data.coords['bands'] = list(mode)\n",
"role": "user"
},
{
"content": "palettize",
"role": "assistant"
}
] |
def x(self, other):
raise NotImplementedError(
'This method has not be implemented for xarray support.')
if self.mode != 'RGBA' or other.mode != 'RGBA':
raise ValueError('Images must be in RGBA')
src = other
dst = self
outa = src.channels[3] + dst.channels[3] * (1 - src.channels[3])
for i in range(3):
dst.channels[i] = (src.channels[i] * src.channels[3] + dst.channels
[i] * dst.channels[3] * (1 - src.channels[3])) / outa
dst.channels[i][outa == 0] = 0
dst.channels[3] = outa
|
blend
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, other):\n raise NotImplementedError(\n 'This method has not be implemented for xarray support.')\n if self.mode != 'RGBA' or other.mode != 'RGBA':\n raise ValueError('Images must be in RGBA')\n src = other\n dst = self\n outa = src.channels[3] + dst.channels[3] * (1 - src.channels[3])\n for i in range(3):\n dst.channels[i] = (src.channels[i] * src.channels[3] + dst.channels\n [i] * dst.channels[3] * (1 - src.channels[3])) / outa\n dst.channels[i][outa == 0] = 0\n dst.channels[3] = outa\n",
"role": "user"
},
{
"content": "blend",
"role": "assistant"
}
] |
def x(variable: str, default: Path) ->Path:
value = os.environ.get(variable)
if value:
return Path(value)
return default
|
path_from_env
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(variable: str, default: Path) ->Path:\n value = os.environ.get(variable)\n if value:\n return Path(value)\n return default\n",
"role": "user"
},
{
"content": "path_from_env",
"role": "assistant"
}
] |
def x(variable: str, default: List[Path]) ->List[Path]:
value = os.environ.get(variable)
if value:
return [Path(path) for path in value.split(':')]
return default
|
paths_from_env
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(variable: str, default: List[Path]) ->List[Path]:\n value = os.environ.get(variable)\n if value:\n return [Path(path) for path in value.split(':')]\n return default\n",
"role": "user"
},
{
"content": "paths_from_env",
"role": "assistant"
}
] |
def x(self, user, password):
if self.__contains__(user):
raise UserExists
self.new_users[user] = self._encrypt_password(password) + '\n'
|
add
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user, password):\n if self.__contains__(user):\n raise UserExists\n self.new_users[user] = self._encrypt_password(password) + '\\n'\n",
"role": "user"
},
{
"content": "add",
"role": "assistant"
}
] |
def x(self, user):
if not self.__contains__(user):
raise UserNotExists
self.new_users.pop(user)
|
pop
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user):\n if not self.__contains__(user):\n raise UserNotExists\n self.new_users.pop(user)\n",
"role": "user"
},
{
"content": "pop",
"role": "assistant"
}
] |
def x(self, user, password):
if not self.__contains__(user):
raise UserNotExists
self.new_users[user] = self._encrypt_password(password) + '\n'
|
change_password
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user, password):\n if not self.__contains__(user):\n raise UserNotExists\n self.new_users[user] = self._encrypt_password(password) + '\\n'\n",
"role": "user"
},
{
"content": "change_password",
"role": "assistant"
}
] |
def x(self, password):
if self.encryption_mode.lower() == 'crypt':
return self._crypt_password(password)
elif self.encryption_mode.lower() == 'md5':
return self._md5_password(password)
elif self.encryption_mode.lower() == 'md5-base':
return self._md5_base_password(password)
else:
raise UnknownEncryptionMode(self.encryption_mode)
|
encrypt_password
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, password):\n if self.encryption_mode.lower() == 'crypt':\n return self._crypt_password(password)\n elif self.encryption_mode.lower() == 'md5':\n return self._md5_password(password)\n elif self.encryption_mode.lower() == 'md5-base':\n return self._md5_base_password(password)\n else:\n raise UnknownEncryptionMode(self.encryption_mode)\n",
"role": "user"
},
{
"content": "encrypt_password",
"role": "assistant"
}
] |
def x(self, password):
def x():
symbols = ascii_letters + digits
return choice(symbols) + choice(symbols)
return crypt(password, salt())
|
crypt_password
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, password):\n\n def x():\n symbols = ascii_letters + digits\n return choice(symbols) + choice(symbols)\n return crypt(password, salt())\n",
"role": "user"
},
{
"content": "crypt_password",
"role": "assistant"
}
] |
def x(self, user, group):
if self.is_user_in(user, group):
raise UserAlreadyInAGroup
self.new_groups.add(group, user)
|
add_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user, group):\n if self.is_user_in(user, group):\n raise UserAlreadyInAGroup\n self.new_groups.add(group, user)\n",
"role": "user"
},
{
"content": "add_user",
"role": "assistant"
}
] |
def x(self, user, group):
if not self.__contains__(group):
raise GroupNotExists
if not self.is_user_in(user, group):
raise UserNotInAGroup
self.new_groups.popvalue(group, user)
|
delete_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user, group):\n if not self.__contains__(group):\n raise GroupNotExists\n if not self.is_user_in(user, group):\n raise UserNotInAGroup\n self.new_groups.popvalue(group, user)\n",
"role": "user"
},
{
"content": "delete_user",
"role": "assistant"
}
] |
def x(global_conf, **local_conf):
conf = global_conf.copy()
conf.update(local_conf)
def x(app):
return Swauth(app, conf)
return auth_filter
|
filter_factory
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(global_conf, **local_conf):\n conf = global_conf.copy()\n conf.update(local_conf)\n\n def x(app):\n return Swauth(app, conf)\n return auth_filter\n",
"role": "user"
},
{
"content": "filter_factory",
"role": "assistant"
}
] |
def x(self, env, method=None, path=None, body=None, headers=None):
if self.default_storage_policy:
sp = self.default_storage_policy
if headers:
headers.update({'X-Storage-Policy': sp})
else:
headers = {'X-Storage-Policy': sp}
subreq = swift.common.wsgi.make_pre_authed_request(env, method=method,
path=path, body=body, headers=headers, agent=self.agent)
subreq.environ['swift.source'] = self.swift_source
return subreq
|
make_pre_authed_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, env, method=None, path=None, body=None, headers=None):\n if self.default_storage_policy:\n sp = self.default_storage_policy\n if headers:\n headers.update({'X-Storage-Policy': sp})\n else:\n headers = {'X-Storage-Policy': sp}\n subreq = swift.common.wsgi.make_pre_authed_request(env, method=method,\n path=path, body=body, headers=headers, agent=self.agent)\n subreq.environ['swift.source'] = self.swift_source\n return subreq\n",
"role": "user"
},
{
"content": "make_pre_authed_request",
"role": "assistant"
}
] |
def x(self, token):
enc_key = '%s:%s:%s' % (HASH_PATH_PREFIX, token, HASH_PATH_SUFFIX)
return sha512(enc_key).hexdigest()
|
get_concealed_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token):\n enc_key = '%s:%s:%s' % (HASH_PATH_PREFIX, token, HASH_PATH_SUFFIX)\n return sha512(enc_key).hexdigest()\n",
"role": "user"
},
{
"content": "get_concealed_token",
"role": "assistant"
}
] |
def x(self, env, token):
groups = None
memcache_client = cache_from_env(env)
if memcache_client:
memcache_key = '%s/auth/%s' % (self.reseller_prefix, token)
cached_auth_data = memcache_client.get(memcache_key)
if cached_auth_data:
expires, groups = cached_auth_data
if expires < time():
groups = None
s3_auth_details = env.get('swift3.auth_details')
if s3_auth_details:
if not self.s3_support:
self.logger.warning('S3 support is disabled in swauth.')
return None
if self.swauth_remote:
self.logger.warning(
'S3-style authorization not supported yet with swauth_remote mode.'
)
return None
try:
account, user = s3_auth_details['access_key'].split(':', 1)
signature_from_user = s3_auth_details['signature']
msg = s3_auth_details['string_to_sign']
except Exception:
self.logger.debug(
'Swauth cannot parse swift3.auth_details value %r' % (
s3_auth_details,))
return None
path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))
resp = self.make_pre_authed_request(env, 'GET', path).get_response(self
.app)
if resp.status_int // 100 != 2:
return None
if 'x-object-meta-account-id' in resp.headers:
account_id = resp.headers['x-object-meta-account-id']
else:
path = quote('/v1/%s/%s' % (self.auth_account, account))
resp2 = self.make_pre_authed_request(env, 'HEAD', path
).get_response(self.app)
if resp2.status_int // 100 != 2:
return None
account_id = resp2.headers['x-container-meta-account-id']
path = env['PATH_INFO']
env['PATH_INFO'] = path.replace('%s:%s' % (account, user),
account_id, 1)
detail = json.loads(resp.body)
if detail:
creds = detail.get('auth')
try:
auth_encoder, creds_dict = swauth.authtypes.validate_creds(
creds)
except ValueError as e:
self.logger.error('%s' % e.args[0])
return None
password = creds_dict['hash']
if isinstance(password, six.text_type):
password = password.encode('utf-8')
if isinstance(msg, six.text_type):
msg = msg.encode('utf-8')
valid_signature = base64.encodestring(hmac.new(password, msg, sha1)
.digest()).strip()
if signature_from_user != valid_signature:
return None
groups = [g['name'] for g in detail['groups']]
if '.admin' in groups:
groups.remove('.admin')
groups.append(account_id)
groups = ','.join(groups)
return groups
if not groups:
if self.swauth_remote:
with Timeout(self.swauth_remote_timeout):
conn = http_connect(self.swauth_remote_parsed.hostname,
self.swauth_remote_parsed.port, 'GET',
'%s/v2/.token/%s' % (self.swauth_remote_parsed.path,
quote(token)), ssl=self.swauth_remote_parsed.scheme ==
'https')
resp = conn.getresponse()
resp.read()
conn.close()
if resp.status // 100 != 2:
return None
expires_from_now = float(resp.getheader('x-auth-ttl'))
groups = resp.getheader('x-auth-groups')
if memcache_client:
memcache_client.set(memcache_key, (time() +
expires_from_now, groups), time=expires_from_now)
else:
object_name = self._get_concealed_token(token)
path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,
object_name[-1], object_name))
resp = self.make_pre_authed_request(env, 'GET', path).get_response(
self.app)
if resp.status_int // 100 != 2:
return None
detail = json.loads(resp.body)
if detail['expires'] < time():
self.make_pre_authed_request(env, 'DELETE', path).get_response(
self.app)
return None
groups = [g['name'] for g in detail['groups']]
if '.admin' in groups:
groups.remove('.admin')
groups.append(detail['account_id'])
groups = ','.join(groups)
if memcache_client:
memcache_client.set(memcache_key, (detail['expires'],
groups), time=float(detail['expires'] - time()))
return groups
|
get_groups
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, env, token):\n groups = None\n memcache_client = cache_from_env(env)\n if memcache_client:\n memcache_key = '%s/auth/%s' % (self.reseller_prefix, token)\n cached_auth_data = memcache_client.get(memcache_key)\n if cached_auth_data:\n expires, groups = cached_auth_data\n if expires < time():\n groups = None\n s3_auth_details = env.get('swift3.auth_details')\n if s3_auth_details:\n if not self.s3_support:\n self.logger.warning('S3 support is disabled in swauth.')\n return None\n if self.swauth_remote:\n self.logger.warning(\n 'S3-style authorization not supported yet with swauth_remote mode.'\n )\n return None\n try:\n account, user = s3_auth_details['access_key'].split(':', 1)\n signature_from_user = s3_auth_details['signature']\n msg = s3_auth_details['string_to_sign']\n except Exception:\n self.logger.debug(\n 'Swauth cannot parse swift3.auth_details value %r' % (\n s3_auth_details,))\n return None\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(env, 'GET', path).get_response(self\n .app)\n if resp.status_int // 100 != 2:\n return None\n if 'x-object-meta-account-id' in resp.headers:\n account_id = resp.headers['x-object-meta-account-id']\n else:\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp2 = self.make_pre_authed_request(env, 'HEAD', path\n ).get_response(self.app)\n if resp2.status_int // 100 != 2:\n return None\n account_id = resp2.headers['x-container-meta-account-id']\n path = env['PATH_INFO']\n env['PATH_INFO'] = path.replace('%s:%s' % (account, user),\n account_id, 1)\n detail = json.loads(resp.body)\n if detail:\n creds = detail.get('auth')\n try:\n auth_encoder, creds_dict = swauth.authtypes.validate_creds(\n creds)\n except ValueError as e:\n self.logger.error('%s' % e.args[0])\n return None\n password = creds_dict['hash']\n if isinstance(password, six.text_type):\n password = password.encode('utf-8')\n if isinstance(msg, six.text_type):\n msg = msg.encode('utf-8')\n valid_signature = base64.encodestring(hmac.new(password, msg, sha1)\n .digest()).strip()\n if signature_from_user != valid_signature:\n return None\n groups = [g['name'] for g in detail['groups']]\n if '.admin' in groups:\n groups.remove('.admin')\n groups.append(account_id)\n groups = ','.join(groups)\n return groups\n if not groups:\n if self.swauth_remote:\n with Timeout(self.swauth_remote_timeout):\n conn = http_connect(self.swauth_remote_parsed.hostname,\n self.swauth_remote_parsed.port, 'GET', \n '%s/v2/.token/%s' % (self.swauth_remote_parsed.path,\n quote(token)), ssl=self.swauth_remote_parsed.scheme ==\n 'https')\n resp = conn.getresponse()\n resp.read()\n conn.close()\n if resp.status // 100 != 2:\n return None\n expires_from_now = float(resp.getheader('x-auth-ttl'))\n groups = resp.getheader('x-auth-groups')\n if memcache_client:\n memcache_client.set(memcache_key, (time() +\n expires_from_now, groups), time=expires_from_now)\n else:\n object_name = self._get_concealed_token(token)\n path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,\n object_name[-1], object_name))\n resp = self.make_pre_authed_request(env, 'GET', path).get_response(\n self.app)\n if resp.status_int // 100 != 2:\n return None\n detail = json.loads(resp.body)\n if detail['expires'] < time():\n self.make_pre_authed_request(env, 'DELETE', path).get_response(\n self.app)\n return None\n groups = [g['name'] for g in detail['groups']]\n if '.admin' in groups:\n groups.remove('.admin')\n groups.append(detail['account_id'])\n groups = ','.join(groups)\n if memcache_client:\n memcache_client.set(memcache_key, (detail['expires'],\n groups), time=float(detail['expires'] - time()))\n return groups\n",
"role": "user"
},
{
"content": "get_groups",
"role": "assistant"
}
] |
def x(self, req):
try:
version, account, container, obj = split_path(req.path, 1, 4, True)
except ValueError:
return HTTPNotFound(request=req)
if not account or not account.startswith(self.reseller_prefix):
return self.denied_response(req)
user_groups = (req.remote_user or '').split(',')
if ('.reseller_admin' in user_groups and account != self.
reseller_prefix and account[len(self.reseller_prefix)] != '.'):
req.environ['swift_owner'] = True
return None
if account in user_groups and (req.method not in ('DELETE', 'PUT') or
container):
req.environ['swift_owner'] = True
return None
if req.environ.get('swift_sync_key') and req.environ['swift_sync_key'
] == req.headers.get('x-container-sync-key', None
) and 'x-timestamp' in req.headers and (req.remote_addr in self.
allowed_sync_hosts or get_remote_client(req) in self.allowed_sync_hosts
):
return None
referrers, groups = parse_acl(getattr(req, 'acl', None))
if referrer_allowed(req.referer, referrers):
if obj or '.rlistings' in groups:
return None
return self.denied_response(req)
if not req.remote_user:
return self.denied_response(req)
for user_group in user_groups:
if user_group in groups:
return None
return self.denied_response(req)
|
authorize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n try:\n version, account, container, obj = split_path(req.path, 1, 4, True)\n except ValueError:\n return HTTPNotFound(request=req)\n if not account or not account.startswith(self.reseller_prefix):\n return self.denied_response(req)\n user_groups = (req.remote_user or '').split(',')\n if ('.reseller_admin' in user_groups and account != self.\n reseller_prefix and account[len(self.reseller_prefix)] != '.'):\n req.environ['swift_owner'] = True\n return None\n if account in user_groups and (req.method not in ('DELETE', 'PUT') or\n container):\n req.environ['swift_owner'] = True\n return None\n if req.environ.get('swift_sync_key') and req.environ['swift_sync_key'\n ] == req.headers.get('x-container-sync-key', None\n ) and 'x-timestamp' in req.headers and (req.remote_addr in self.\n allowed_sync_hosts or get_remote_client(req) in self.allowed_sync_hosts\n ):\n return None\n referrers, groups = parse_acl(getattr(req, 'acl', None))\n if referrer_allowed(req.referer, referrers):\n if obj or '.rlistings' in groups:\n return None\n return self.denied_response(req)\n if not req.remote_user:\n return self.denied_response(req)\n for user_group in user_groups:\n if user_group in groups:\n return None\n return self.denied_response(req)\n",
"role": "user"
},
{
"content": "authorize",
"role": "assistant"
}
] |
def x(self, req):
if not hasattr(req, 'credentials_valid'):
req.credentials_valid = None
if req.remote_user or req.credentials_valid:
return HTTPForbidden(request=req)
else:
return HTTPUnauthorized(request=req)
|
denied_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n if not hasattr(req, 'credentials_valid'):\n req.credentials_valid = None\n if req.remote_user or req.credentials_valid:\n return HTTPForbidden(request=req)\n else:\n return HTTPUnauthorized(request=req)\n",
"role": "user"
},
{
"content": "denied_response",
"role": "assistant"
}
] |
def x(self, env, start_response):
try:
req = Request(env)
if self.auth_prefix:
req.path_info_pop()
req.bytes_transferred = '-'
req.client_disconnect = False
if ('x-storage-token' in req.headers and 'x-auth-token' not in req.
headers):
req.headers['x-auth-token'] = req.headers['x-storage-token']
if 'eventlet.posthooks' in env:
env['eventlet.posthooks'].append((self.posthooklogger, (req,), {}))
return self.handle_request(req)(env, start_response)
else:
response = self.handle_request(req)(env, start_response)
self.posthooklogger(env, req)
return response
except (Exception, TimeoutError):
print('EXCEPTION IN handle: %s: %s' % (format_exc(), env))
start_response('500 Server Error', [('Content-Type', 'text/plain')])
return ['Internal server error.\n']
|
handle
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, env, start_response):\n try:\n req = Request(env)\n if self.auth_prefix:\n req.path_info_pop()\n req.bytes_transferred = '-'\n req.client_disconnect = False\n if ('x-storage-token' in req.headers and 'x-auth-token' not in req.\n headers):\n req.headers['x-auth-token'] = req.headers['x-storage-token']\n if 'eventlet.posthooks' in env:\n env['eventlet.posthooks'].append((self.posthooklogger, (req,), {}))\n return self.handle_request(req)(env, start_response)\n else:\n response = self.handle_request(req)(env, start_response)\n self.posthooklogger(env, req)\n return response\n except (Exception, TimeoutError):\n print('EXCEPTION IN handle: %s: %s' % (format_exc(), env))\n start_response('500 Server Error', [('Content-Type', 'text/plain')])\n return ['Internal server error.\\n']\n",
"role": "user"
},
{
"content": "handle",
"role": "assistant"
}
] |
def x(self, req):
req.start_time = time()
handler = None
try:
version, account, user, _junk = split_path(req.path_info, minsegs=0,
maxsegs=4, rest_with_last=True)
except ValueError:
return HTTPNotFound(request=req)
if version in ('v1', 'v1.0', 'auth'):
if req.method == 'GET':
handler = self.handle_get_token
elif version == 'v2':
if not self.super_admin_key:
return HTTPNotFound(request=req)
req.path_info_pop()
if req.method == 'GET':
if not account and not user:
handler = self.handle_get_reseller
elif account:
if not user:
handler = self.handle_get_account
elif account == '.token':
req.path_info_pop()
handler = self.handle_validate_token
else:
handler = self.handle_get_user
elif req.method == 'PUT':
if not user:
handler = self.handle_put_account
else:
handler = self.handle_put_user
elif req.method == 'DELETE':
if not user:
handler = self.handle_delete_account
else:
handler = self.handle_delete_user
elif req.method == 'POST':
if account == '.prep':
handler = self.handle_prep
elif user == '.services':
handler = self.handle_set_services
else:
handler = self.handle_webadmin
if not handler:
req.response = HTTPBadRequest(request=req)
else:
req.response = handler(req)
return req.response
|
handle_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n req.start_time = time()\n handler = None\n try:\n version, account, user, _junk = split_path(req.path_info, minsegs=0,\n maxsegs=4, rest_with_last=True)\n except ValueError:\n return HTTPNotFound(request=req)\n if version in ('v1', 'v1.0', 'auth'):\n if req.method == 'GET':\n handler = self.handle_get_token\n elif version == 'v2':\n if not self.super_admin_key:\n return HTTPNotFound(request=req)\n req.path_info_pop()\n if req.method == 'GET':\n if not account and not user:\n handler = self.handle_get_reseller\n elif account:\n if not user:\n handler = self.handle_get_account\n elif account == '.token':\n req.path_info_pop()\n handler = self.handle_validate_token\n else:\n handler = self.handle_get_user\n elif req.method == 'PUT':\n if not user:\n handler = self.handle_put_account\n else:\n handler = self.handle_put_user\n elif req.method == 'DELETE':\n if not user:\n handler = self.handle_delete_account\n else:\n handler = self.handle_delete_user\n elif req.method == 'POST':\n if account == '.prep':\n handler = self.handle_prep\n elif user == '.services':\n handler = self.handle_set_services\n else:\n handler = self.handle_webadmin\n if not handler:\n req.response = HTTPBadRequest(request=req)\n else:\n req.response = handler(req)\n return req.response\n",
"role": "user"
},
{
"content": "handle_request",
"role": "assistant"
}
] |
def x(self, req):
if not self.is_super_admin(req):
return self.denied_response(req)
path = quote('/v1/%s' % self.auth_account)
resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response(
self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not create the main auth account: %s %s' % (
path, resp.status))
path = quote('/v1/%s/.account_id' % self.auth_account)
resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response(
self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not create container: %s %s' % (path, resp.
status))
for container in xrange(16):
path = quote('/v1/%s/.token_%x' % (self.auth_account, container))
resp = self.make_pre_authed_request(req.environ, 'PUT', path
).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not create container: %s %s' % (path,
resp.status))
return HTTPNoContent(request=req)
|
handle_prep
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n if not self.is_super_admin(req):\n return self.denied_response(req)\n path = quote('/v1/%s' % self.auth_account)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response(\n self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create the main auth account: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/.account_id' % self.auth_account)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response(\n self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create container: %s %s' % (path, resp.\n status))\n for container in xrange(16):\n path = quote('/v1/%s/.token_%x' % (self.auth_account, container))\n resp = self.make_pre_authed_request(req.environ, 'PUT', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create container: %s %s' % (path,\n resp.status))\n return HTTPNoContent(request=req)\n",
"role": "user"
},
{
"content": "handle_prep",
"role": "assistant"
}
] |
def x(self, req):
if not self.is_reseller_admin(req):
return self.denied_response(req)
listing = []
marker = ''
while True:
path = '/v1/%s?format=json&marker=%s' % (quote(self.auth_account),
quote(marker))
resp = self.make_pre_authed_request(req.environ, 'GET', path
).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not list main auth account: %s %s' % (
path, resp.status))
sublisting = json.loads(resp.body)
if not sublisting:
break
for container in sublisting:
if container['name'][0] != '.':
listing.append({'name': container['name']})
marker = sublisting[-1]['name'].encode('utf-8')
return Response(body=json.dumps({'accounts': listing}), content_type=
CONTENT_TYPE_JSON)
|
handle_get_reseller
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n listing = []\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote(self.auth_account),\n quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not list main auth account: %s %s' % (\n path, resp.status))\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for container in sublisting:\n if container['name'][0] != '.':\n listing.append({'name': container['name']})\n marker = sublisting[-1]['name'].encode('utf-8')\n return Response(body=json.dumps({'accounts': listing}), content_type=\n CONTENT_TYPE_JSON)\n",
"role": "user"
},
{
"content": "handle_get_reseller",
"role": "assistant"
}
] |
def x(self, req):
account = req.path_info_pop()
if req.path_info or not account or account[0] == '.':
return HTTPBadRequest(request=req)
if not self.is_account_admin(req, account):
return self.denied_response(req)
path = quote('/v1/%s/%s/.services' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(
self.app)
if resp.status_int == 404:
return HTTPNotFound(request=req)
if resp.status_int // 100 != 2:
raise Exception('Could not obtain the .services object: %s %s' % (
path, resp.status))
services = json.loads(resp.body)
listing = []
marker = ''
while True:
path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.
auth_account, account)), quote(marker))
resp = self.make_pre_authed_request(req.environ, 'GET', path
).get_response(self.app)
if resp.status_int == 404:
return HTTPNotFound(request=req)
if resp.status_int // 100 != 2:
raise Exception('Could not list in main auth account: %s %s' %
(path, resp.status))
account_id = resp.headers['X-Container-Meta-Account-Id']
sublisting = json.loads(resp.body)
if not sublisting:
break
for obj in sublisting:
if obj['name'][0] != '.':
listing.append({'name': obj['name']})
marker = sublisting[-1]['name'].encode('utf-8')
return Response(content_type=CONTENT_TYPE_JSON, body=json.dumps({
'account_id': account_id, 'services': services, 'users': listing}))
|
handle_get_account
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n account = req.path_info_pop()\n if req.path_info or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n if not self.is_account_admin(req, account):\n return self.denied_response(req)\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not obtain the .services object: %s %s' % (\n path, resp.status))\n services = json.loads(resp.body)\n listing = []\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.\n auth_account, account)), quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not list in main auth account: %s %s' %\n (path, resp.status))\n account_id = resp.headers['X-Container-Meta-Account-Id']\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for obj in sublisting:\n if obj['name'][0] != '.':\n listing.append({'name': obj['name']})\n marker = sublisting[-1]['name'].encode('utf-8')\n return Response(content_type=CONTENT_TYPE_JSON, body=json.dumps({\n 'account_id': account_id, 'services': services, 'users': listing}))\n",
"role": "user"
},
{
"content": "handle_get_account",
"role": "assistant"
}
] |
def x(self, req):
if not self.is_reseller_admin(req):
return self.denied_response(req)
account = req.path_info_pop()
if req.path_info != '/.services' or not account or account[0] == '.':
return HTTPBadRequest(request=req)
try:
new_services = json.loads(req.body)
except ValueError as err:
return HTTPBadRequest(body=str(err))
path = quote('/v1/%s/%s/.services' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(
self.app)
if resp.status_int == 404:
return HTTPNotFound(request=req)
if resp.status_int // 100 != 2:
raise Exception('Could not obtain services info: %s %s' % (path,
resp.status))
services = json.loads(resp.body)
for new_service, value in new_services.iteritems():
if new_service in services:
services[new_service].update(value)
else:
services[new_service] = value
services = json.dumps(services)
resp = self.make_pre_authed_request(req.environ, 'PUT', path, services
).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not save .services object: %s %s' % (path,
resp.status))
return Response(request=req, body=services, content_type=CONTENT_TYPE_JSON)
|
handle_set_services
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n account = req.path_info_pop()\n if req.path_info != '/.services' or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n try:\n new_services = json.loads(req.body)\n except ValueError as err:\n return HTTPBadRequest(body=str(err))\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not obtain services info: %s %s' % (path,\n resp.status))\n services = json.loads(resp.body)\n for new_service, value in new_services.iteritems():\n if new_service in services:\n services[new_service].update(value)\n else:\n services[new_service] = value\n services = json.dumps(services)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, services\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not save .services object: %s %s' % (path,\n resp.status))\n return Response(request=req, body=services, content_type=CONTENT_TYPE_JSON)\n",
"role": "user"
},
{
"content": "handle_set_services",
"role": "assistant"
}
] |
def x(self, req):
if not self.is_reseller_admin(req):
return self.denied_response(req)
account = req.path_info_pop()
if req.path_info or not account or account[0] == '.':
return HTTPBadRequest(request=req)
account_suffix = req.headers.get('x-account-suffix')
if not account_suffix:
account_suffix = str(uuid4())
path = quote('%s/%s%s' % (self.dsc_parsed2.path, self.reseller_prefix,
account_suffix))
try:
conn = self.get_conn()
conn.request('PUT', path, headers={'X-Auth-Token': self.get_itoken(
req.environ), 'Content-Length': '0'})
resp = conn.getresponse()
resp.read()
if resp.status // 100 != 2:
raise Exception(
'Could not create account on the Swift cluster: %s %s %s' %
(path, resp.status, resp.reason))
except (Exception, TimeoutError):
self.logger.error(_(
'ERROR: Exception while trying to communicate with %(scheme)s://%(host)s:%(port)s/%(path)s'
), {'scheme': self.dsc_parsed2.scheme, 'host': self.dsc_parsed2
.hostname, 'port': self.dsc_parsed2.port, 'path': path})
raise
path = quote('/v1/%s/%s' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'HEAD', path
).get_response(self.app)
if resp.status_int == 404:
resp = self.make_pre_authed_request(req.environ, 'PUT', path
).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception(
'Could not create account within main auth account: %s %s' %
(path, resp.status))
elif resp.status_int // 100 == 2:
if 'x-container-meta-account-id' in resp.headers:
return HTTPAccepted(request=req)
else:
raise Exception(
'Could not verify account within main auth account: %s %s' % (
path, resp.status))
path = quote('/v1/%s/.account_id/%s%s' % (self.auth_account, self.
reseller_prefix, account_suffix))
resp = self.make_pre_authed_request(req.environ, 'PUT', path, account
).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not create account id mapping: %s %s' % (
path, resp.status))
path = quote('/v1/%s/%s/.services' % (self.auth_account, account))
services = {'storage': {}}
services['storage'][self.dsc_name] = '%s/%s%s' % (self.dsc_url, self.
reseller_prefix, account_suffix)
services['storage']['default'] = self.dsc_name
resp = self.make_pre_authed_request(req.environ, 'PUT', path, json.
dumps(services)).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not create .services object: %s %s' % (path,
resp.status))
path = quote('/v1/%s/%s' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'POST', path, headers=
{'X-Container-Meta-Account-Id': '%s%s' % (self.reseller_prefix,
account_suffix)}).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception(
'Could not record the account id on the account: %s %s' % (path,
resp.status))
return HTTPCreated(request=req)
|
handle_put_account
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n account = req.path_info_pop()\n if req.path_info or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n account_suffix = req.headers.get('x-account-suffix')\n if not account_suffix:\n account_suffix = str(uuid4())\n path = quote('%s/%s%s' % (self.dsc_parsed2.path, self.reseller_prefix,\n account_suffix))\n try:\n conn = self.get_conn()\n conn.request('PUT', path, headers={'X-Auth-Token': self.get_itoken(\n req.environ), 'Content-Length': '0'})\n resp = conn.getresponse()\n resp.read()\n if resp.status // 100 != 2:\n raise Exception(\n 'Could not create account on the Swift cluster: %s %s %s' %\n (path, resp.status, resp.reason))\n except (Exception, TimeoutError):\n self.logger.error(_(\n 'ERROR: Exception while trying to communicate with %(scheme)s://%(host)s:%(port)s/%(path)s'\n ), {'scheme': self.dsc_parsed2.scheme, 'host': self.dsc_parsed2\n .hostname, 'port': self.dsc_parsed2.port, 'path': path})\n raise\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'HEAD', path\n ).get_response(self.app)\n if resp.status_int == 404:\n resp = self.make_pre_authed_request(req.environ, 'PUT', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception(\n 'Could not create account within main auth account: %s %s' %\n (path, resp.status))\n elif resp.status_int // 100 == 2:\n if 'x-container-meta-account-id' in resp.headers:\n return HTTPAccepted(request=req)\n else:\n raise Exception(\n 'Could not verify account within main auth account: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/.account_id/%s%s' % (self.auth_account, self.\n reseller_prefix, account_suffix))\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, account\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create account id mapping: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n services = {'storage': {}}\n services['storage'][self.dsc_name] = '%s/%s%s' % (self.dsc_url, self.\n reseller_prefix, account_suffix)\n services['storage']['default'] = self.dsc_name\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, json.\n dumps(services)).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create .services object: %s %s' % (path,\n resp.status))\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'POST', path, headers=\n {'X-Container-Meta-Account-Id': '%s%s' % (self.reseller_prefix,\n account_suffix)}).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception(\n 'Could not record the account id on the account: %s %s' % (path,\n resp.status))\n return HTTPCreated(request=req)\n",
"role": "user"
},
{
"content": "handle_put_account",
"role": "assistant"
}
] |
def x(self, req):
if not self.is_reseller_admin(req):
return self.denied_response(req)
account = req.path_info_pop()
if req.path_info or not account or account[0] == '.':
return HTTPBadRequest(request=req)
marker = ''
while True:
path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.
auth_account, account)), quote(marker))
resp = self.make_pre_authed_request(req.environ, 'GET', path
).get_response(self.app)
if resp.status_int == 404:
return HTTPNotFound(request=req)
if resp.status_int // 100 != 2:
raise Exception('Could not list in main auth account: %s %s' %
(path, resp.status))
account_id = resp.headers['x-container-meta-account-id']
sublisting = json.loads(resp.body)
if not sublisting:
break
for obj in sublisting:
if obj['name'][0] != '.':
return HTTPConflict(request=req)
marker = sublisting[-1]['name'].encode('utf-8')
path = quote('/v1/%s/%s/.services' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(
self.app)
if resp.status_int // 100 != 2 and resp.status_int != 404:
raise Exception('Could not obtain .services object: %s %s' % (path,
resp.status))
if resp.status_int // 100 == 2:
services = json.loads(resp.body)
deleted_any = False
for name, url in services['storage'].iteritems():
if name != 'default':
parsed = urlparse(url)
conn = self.get_conn(parsed)
conn.request('DELETE', parsed.path, headers={'X-Auth-Token':
self.get_itoken(req.environ)})
resp = conn.getresponse()
resp.read()
if resp.status == 409:
if deleted_any:
raise Exception(
'Managed to delete one or more service end points, but failed with: %s %s %s'
% (url, resp.status, resp.reason))
else:
return HTTPConflict(request=req)
if resp.status // 100 != 2 and resp.status != 404:
raise Exception(
'Could not delete account on the Swift cluster: %s %s %s'
% (url, resp.status, resp.reason))
deleted_any = True
path = quote('/v1/%s/%s/.services' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'DELETE', path
).get_response(self.app)
if resp.status_int // 100 != 2 and resp.status_int != 404:
raise Exception('Could not delete .services object: %s %s' % (
path, resp.status))
path = quote('/v1/%s/.account_id/%s' % (self.auth_account, account_id))
resp = self.make_pre_authed_request(req.environ, 'DELETE', path
).get_response(self.app)
if resp.status_int // 100 != 2 and resp.status_int != 404:
raise Exception('Could not delete account id mapping: %s %s' % (
path, resp.status))
path = quote('/v1/%s/%s' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'DELETE', path
).get_response(self.app)
if resp.status_int // 100 != 2 and resp.status_int != 404:
raise Exception('Could not delete account marked: %s %s' % (path,
resp.status))
return HTTPNoContent(request=req)
|
handle_delete_account
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n account = req.path_info_pop()\n if req.path_info or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.\n auth_account, account)), quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not list in main auth account: %s %s' %\n (path, resp.status))\n account_id = resp.headers['x-container-meta-account-id']\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for obj in sublisting:\n if obj['name'][0] != '.':\n return HTTPConflict(request=req)\n marker = sublisting[-1]['name'].encode('utf-8')\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not obtain .services object: %s %s' % (path,\n resp.status))\n if resp.status_int // 100 == 2:\n services = json.loads(resp.body)\n deleted_any = False\n for name, url in services['storage'].iteritems():\n if name != 'default':\n parsed = urlparse(url)\n conn = self.get_conn(parsed)\n conn.request('DELETE', parsed.path, headers={'X-Auth-Token':\n self.get_itoken(req.environ)})\n resp = conn.getresponse()\n resp.read()\n if resp.status == 409:\n if deleted_any:\n raise Exception(\n 'Managed to delete one or more service end points, but failed with: %s %s %s'\n % (url, resp.status, resp.reason))\n else:\n return HTTPConflict(request=req)\n if resp.status // 100 != 2 and resp.status != 404:\n raise Exception(\n 'Could not delete account on the Swift cluster: %s %s %s'\n % (url, resp.status, resp.reason))\n deleted_any = True\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete .services object: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/.account_id/%s' % (self.auth_account, account_id))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete account id mapping: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete account marked: %s %s' % (path,\n resp.status))\n return HTTPNoContent(request=req)\n",
"role": "user"
},
{
"content": "handle_delete_account",
"role": "assistant"
}
] |
def x(self, req):
account = req.path_info_pop()
user = req.path_info_pop()
if req.path_info or not account or account[0] == '.' or not user or user[0
] == '.' and user != '.groups':
return HTTPBadRequest(request=req)
if not self.is_account_admin(req, account):
return self.denied_response(req)
if user == '.groups':
groups = set()
marker = ''
while True:
path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.
auth_account, account)), quote(marker))
resp = self.make_pre_authed_request(req.environ, 'GET', path
).get_response(self.app)
if resp.status_int == 404:
return HTTPNotFound(request=req)
if resp.status_int // 100 != 2:
raise Exception(
'Could not list in main auth account: %s %s' % (path,
resp.status))
sublisting = json.loads(resp.body)
if not sublisting:
break
for obj in sublisting:
if obj['name'][0] != '.':
user_json = self.get_user_detail(req, account, obj['name'])
if user_json is None:
raise Exception(
'Could not retrieve user object: %s:%s %s' % (
account, user, 404))
groups.update(g['name'] for g in json.loads(user_json)[
'groups'])
marker = sublisting[-1]['name'].encode('utf-8')
body = json.dumps({'groups': [{'name': g} for g in sorted(groups)]})
else:
body = self.get_user_detail(req, account, user)
if body is None:
return HTTPNotFound(request=req)
display_groups = [g['name'] for g in json.loads(body)['groups']]
if '.admin' in display_groups and not self.is_reseller_admin(req
) or '.reseller_admin' in display_groups and not self.is_super_admin(
req):
return self.denied_response(req)
return Response(body=body, content_type=CONTENT_TYPE_JSON)
|
handle_get_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n account = req.path_info_pop()\n user = req.path_info_pop()\n if req.path_info or not account or account[0] == '.' or not user or user[0\n ] == '.' and user != '.groups':\n return HTTPBadRequest(request=req)\n if not self.is_account_admin(req, account):\n return self.denied_response(req)\n if user == '.groups':\n groups = set()\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.\n auth_account, account)), quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception(\n 'Could not list in main auth account: %s %s' % (path,\n resp.status))\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for obj in sublisting:\n if obj['name'][0] != '.':\n user_json = self.get_user_detail(req, account, obj['name'])\n if user_json is None:\n raise Exception(\n 'Could not retrieve user object: %s:%s %s' % (\n account, user, 404))\n groups.update(g['name'] for g in json.loads(user_json)[\n 'groups'])\n marker = sublisting[-1]['name'].encode('utf-8')\n body = json.dumps({'groups': [{'name': g} for g in sorted(groups)]})\n else:\n body = self.get_user_detail(req, account, user)\n if body is None:\n return HTTPNotFound(request=req)\n display_groups = [g['name'] for g in json.loads(body)['groups']]\n if '.admin' in display_groups and not self.is_reseller_admin(req\n ) or '.reseller_admin' in display_groups and not self.is_super_admin(\n req):\n return self.denied_response(req)\n return Response(body=body, content_type=CONTENT_TYPE_JSON)\n",
"role": "user"
},
{
"content": "handle_get_user",
"role": "assistant"
}
] |
def x(self, req):
account = req.path_info_pop()
user = req.path_info_pop()
key = unquote(req.headers.get('x-auth-user-key', ''))
key_hash = unquote(req.headers.get('x-auth-user-key-hash', ''))
admin = req.headers.get('x-auth-user-admin') == 'true'
reseller_admin = req.headers.get('x-auth-user-reseller-admin') == 'true'
if reseller_admin:
admin = True
if req.path_info or not account or account[0] == '.' or not user or user[0
] == '.' or not key and not key_hash:
return HTTPBadRequest(request=req)
if key_hash:
try:
swauth.authtypes.validate_creds(key_hash)
except ValueError:
return HTTPBadRequest(request=req)
user_arg = account + ':' + user
if reseller_admin:
if not self.is_super_admin(req) and not self.is_user_changing_own_key(
req, user_arg):
return self.denied_response(req)
elif not self.is_account_admin(req, account
) and not self.is_user_changing_own_key(req, user_arg):
return self.denied_response(req)
path = quote('/v1/%s/%s' % (self.auth_account, account))
resp = self.make_pre_authed_request(req.environ, 'HEAD', path
).get_response(self.app)
if resp.status_int // 100 != 2:
raise Exception('Could not retrieve account id value: %s %s' % (
path, resp.status))
headers = {'X-Object-Meta-Account-Id': resp.headers[
'x-container-meta-account-id']}
path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))
groups = ['%s:%s' % (account, user), account]
if admin:
groups.append('.admin')
if reseller_admin:
groups.append('.reseller_admin')
auth_value = key_hash or self.auth_encoder().encode(key)
resp = self.make_pre_authed_request(req.environ, 'PUT', path, json.
dumps({'auth': auth_value, 'groups': [{'name': g} for g in groups]}
), headers=headers).get_response(self.app)
if resp.status_int == 404:
return HTTPNotFound(request=req)
if resp.status_int // 100 != 2:
raise Exception('Could not create user object: %s %s' % (path, resp
.status))
return HTTPCreated(request=req)
|
handle_put_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n account = req.path_info_pop()\n user = req.path_info_pop()\n key = unquote(req.headers.get('x-auth-user-key', ''))\n key_hash = unquote(req.headers.get('x-auth-user-key-hash', ''))\n admin = req.headers.get('x-auth-user-admin') == 'true'\n reseller_admin = req.headers.get('x-auth-user-reseller-admin') == 'true'\n if reseller_admin:\n admin = True\n if req.path_info or not account or account[0] == '.' or not user or user[0\n ] == '.' or not key and not key_hash:\n return HTTPBadRequest(request=req)\n if key_hash:\n try:\n swauth.authtypes.validate_creds(key_hash)\n except ValueError:\n return HTTPBadRequest(request=req)\n user_arg = account + ':' + user\n if reseller_admin:\n if not self.is_super_admin(req) and not self.is_user_changing_own_key(\n req, user_arg):\n return self.denied_response(req)\n elif not self.is_account_admin(req, account\n ) and not self.is_user_changing_own_key(req, user_arg):\n return self.denied_response(req)\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'HEAD', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not retrieve account id value: %s %s' % (\n path, resp.status))\n headers = {'X-Object-Meta-Account-Id': resp.headers[\n 'x-container-meta-account-id']}\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n groups = ['%s:%s' % (account, user), account]\n if admin:\n groups.append('.admin')\n if reseller_admin:\n groups.append('.reseller_admin')\n auth_value = key_hash or self.auth_encoder().encode(key)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, json.\n dumps({'auth': auth_value, 'groups': [{'name': g} for g in groups]}\n ), headers=headers).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create user object: %s %s' % (path, resp\n .status))\n return HTTPCreated(request=req)\n",
"role": "user"
},
{
"content": "handle_put_user",
"role": "assistant"
}
] |
def x(self, req):
account = req.path_info_pop()
user = req.path_info_pop()
if req.path_info or not account or account[0] == '.' or not user or user[0
] == '.':
return HTTPBadRequest(request=req)
is_reseller_admin = self.is_user_reseller_admin(req, account, user)
if not is_reseller_admin and not req.credentials_valid:
return HTTPNotFound(request=req)
elif is_reseller_admin and not self.is_super_admin(req):
return HTTPForbidden(request=req)
if not self.is_account_admin(req, account):
return self.denied_response(req)
path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))
resp = self.make_pre_authed_request(req.environ, 'HEAD', path
).get_response(self.app)
if resp.status_int == 404:
return HTTPNotFound(request=req)
elif resp.status_int // 100 != 2:
raise Exception('Could not obtain user details: %s %s' % (path,
resp.status))
candidate_token = resp.headers.get('x-object-meta-auth-token')
if candidate_token:
object_name = self._get_concealed_token(candidate_token)
path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,
object_name[-1], object_name))
resp = self.make_pre_authed_request(req.environ, 'DELETE', path
).get_response(self.app)
if resp.status_int // 100 != 2 and resp.status_int != 404:
raise Exception(
'Could not delete possibly existing token: %s %s' % (path,
resp.status))
path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))
resp = self.make_pre_authed_request(req.environ, 'DELETE', path
).get_response(self.app)
if resp.status_int // 100 != 2 and resp.status_int != 404:
raise Exception('Could not delete the user object: %s %s' % (path,
resp.status))
return HTTPNoContent(request=req)
|
handle_delete_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n account = req.path_info_pop()\n user = req.path_info_pop()\n if req.path_info or not account or account[0] == '.' or not user or user[0\n ] == '.':\n return HTTPBadRequest(request=req)\n is_reseller_admin = self.is_user_reseller_admin(req, account, user)\n if not is_reseller_admin and not req.credentials_valid:\n return HTTPNotFound(request=req)\n elif is_reseller_admin and not self.is_super_admin(req):\n return HTTPForbidden(request=req)\n if not self.is_account_admin(req, account):\n return self.denied_response(req)\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(req.environ, 'HEAD', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n elif resp.status_int // 100 != 2:\n raise Exception('Could not obtain user details: %s %s' % (path,\n resp.status))\n candidate_token = resp.headers.get('x-object-meta-auth-token')\n if candidate_token:\n object_name = self._get_concealed_token(candidate_token)\n path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,\n object_name[-1], object_name))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception(\n 'Could not delete possibly existing token: %s %s' % (path,\n resp.status))\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete the user object: %s %s' % (path,\n resp.status))\n return HTTPNoContent(request=req)\n",
"role": "user"
},
{
"content": "handle_delete_user",
"role": "assistant"
}
] |
def x(self, req, account, user):
req.credentials_valid = True
user_json = self.get_user_detail(req, account, user)
if user_json is None:
req.credentials_valid = False
return False
user_detail = json.loads(user_json)
return '.reseller_admin' in (g['name'] for g in user_detail['groups'])
|
is_user_reseller_admin
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, account, user):\n req.credentials_valid = True\n user_json = self.get_user_detail(req, account, user)\n if user_json is None:\n req.credentials_valid = False\n return False\n user_detail = json.loads(user_json)\n return '.reseller_admin' in (g['name'] for g in user_detail['groups'])\n",
"role": "user"
},
{
"content": "is_user_reseller_admin",
"role": "assistant"
}
] |
def x(self, req):
token = req.path_info_pop()
if req.path_info or not token.startswith(self.reseller_prefix):
return HTTPBadRequest(request=req)
expires = groups = None
memcache_client = cache_from_env(req.environ)
if memcache_client:
memcache_key = '%s/auth/%s' % (self.reseller_prefix, token)
cached_auth_data = memcache_client.get(memcache_key)
if cached_auth_data:
expires, groups = cached_auth_data
if expires < time():
groups = None
if not groups:
object_name = self._get_concealed_token(token)
path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,
object_name[-1], object_name))
resp = self.make_pre_authed_request(req.environ, 'GET', path
).get_response(self.app)
if resp.status_int // 100 != 2:
return HTTPNotFound(request=req)
detail = json.loads(resp.body)
expires = detail['expires']
if expires < time():
self.make_pre_authed_request(req.environ, 'DELETE', path
).get_response(self.app)
return HTTPNotFound(request=req)
groups = [g['name'] for g in detail['groups']]
if '.admin' in groups:
groups.remove('.admin')
groups.append(detail['account_id'])
groups = ','.join(groups)
return HTTPNoContent(headers={'X-Auth-TTL': expires - time(),
'X-Auth-Groups': groups})
|
handle_validate_token
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n token = req.path_info_pop()\n if req.path_info or not token.startswith(self.reseller_prefix):\n return HTTPBadRequest(request=req)\n expires = groups = None\n memcache_client = cache_from_env(req.environ)\n if memcache_client:\n memcache_key = '%s/auth/%s' % (self.reseller_prefix, token)\n cached_auth_data = memcache_client.get(memcache_key)\n if cached_auth_data:\n expires, groups = cached_auth_data\n if expires < time():\n groups = None\n if not groups:\n object_name = self._get_concealed_token(token)\n path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,\n object_name[-1], object_name))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n return HTTPNotFound(request=req)\n detail = json.loads(resp.body)\n expires = detail['expires']\n if expires < time():\n self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n return HTTPNotFound(request=req)\n groups = [g['name'] for g in detail['groups']]\n if '.admin' in groups:\n groups.remove('.admin')\n groups.append(detail['account_id'])\n groups = ','.join(groups)\n return HTTPNoContent(headers={'X-Auth-TTL': expires - time(),\n 'X-Auth-Groups': groups})\n",
"role": "user"
},
{
"content": "handle_validate_token",
"role": "assistant"
}
] |
def x(self, urlparsed=None):
if not urlparsed:
urlparsed = self.dsc_parsed2
if urlparsed.scheme == 'http':
return HTTPConnection(urlparsed.netloc)
else:
return HTTPSConnection(urlparsed.netloc)
|
get_conn
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, urlparsed=None):\n if not urlparsed:\n urlparsed = self.dsc_parsed2\n if urlparsed.scheme == 'http':\n return HTTPConnection(urlparsed.netloc)\n else:\n return HTTPSConnection(urlparsed.netloc)\n",
"role": "user"
},
{
"content": "get_conn",
"role": "assistant"
}
] |
def x(self, env):
if not self.itoken or self.itoken_expires < time() or env.get(
'HTTP_X_AUTH_NEW_TOKEN', 'false').lower() in TRUE_VALUES:
self.itoken = '%sitk%s' % (self.reseller_prefix, uuid4().hex)
memcache_key = '%s/auth/%s' % (self.reseller_prefix, self.itoken)
self.itoken_expires = time() + self.token_life
memcache_client = cache_from_env(env)
if not memcache_client:
raise Exception(
'No memcache set up; required for Swauth middleware')
memcache_client.set(memcache_key, (self.itoken_expires,
'.auth,.reseller_admin,%s.auth' % self.reseller_prefix), time=
self.token_life)
return self.itoken
|
get_itoken
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, env):\n if not self.itoken or self.itoken_expires < time() or env.get(\n 'HTTP_X_AUTH_NEW_TOKEN', 'false').lower() in TRUE_VALUES:\n self.itoken = '%sitk%s' % (self.reseller_prefix, uuid4().hex)\n memcache_key = '%s/auth/%s' % (self.reseller_prefix, self.itoken)\n self.itoken_expires = time() + self.token_life\n memcache_client = cache_from_env(env)\n if not memcache_client:\n raise Exception(\n 'No memcache set up; required for Swauth middleware')\n memcache_client.set(memcache_key, (self.itoken_expires, \n '.auth,.reseller_admin,%s.auth' % self.reseller_prefix), time=\n self.token_life)\n return self.itoken\n",
"role": "user"
},
{
"content": "get_itoken",
"role": "assistant"
}
] |
def x(self, req):
if ':' not in req.headers.get('x-auth-admin-user', ''):
return None
admin_account, admin_user = req.headers.get('x-auth-admin-user').split(':',
1)
user_json = self.get_user_detail(req, admin_account, admin_user)
if user_json is None:
return None
admin_detail = json.loads(user_json)
admin_detail['account'] = admin_account
return admin_detail
|
get_admin_detail
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n if ':' not in req.headers.get('x-auth-admin-user', ''):\n return None\n admin_account, admin_user = req.headers.get('x-auth-admin-user').split(':',\n 1)\n user_json = self.get_user_detail(req, admin_account, admin_user)\n if user_json is None:\n return None\n admin_detail = json.loads(user_json)\n admin_detail['account'] = admin_account\n return admin_detail\n",
"role": "user"
},
{
"content": "get_admin_detail",
"role": "assistant"
}
] |
def x(self, req, account, user):
path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))
resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(
self.app)
if resp.status_int == 404:
return None
if resp.status_int // 100 != 2:
raise Exception('Could not get user object: %s %s' % (path, resp.
status))
return resp.body
|
get_user_detail
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, account, user):\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int == 404:\n return None\n if resp.status_int // 100 != 2:\n raise Exception('Could not get user object: %s %s' % (path, resp.\n status))\n return resp.body\n",
"role": "user"
},
{
"content": "get_user_detail",
"role": "assistant"
}
] |
def x(self, user_detail, key):
if user_detail:
creds = user_detail.get('auth')
try:
auth_encoder, creds_dict = swauth.authtypes.validate_creds(creds)
except ValueError as e:
self.logger.error('%s' % e.args[0])
return False
return user_detail and auth_encoder.match(key, creds, **creds_dict)
|
credentials_match
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, user_detail, key):\n if user_detail:\n creds = user_detail.get('auth')\n try:\n auth_encoder, creds_dict = swauth.authtypes.validate_creds(creds)\n except ValueError as e:\n self.logger.error('%s' % e.args[0])\n return False\n return user_detail and auth_encoder.match(key, creds, **creds_dict)\n",
"role": "user"
},
{
"content": "credentials_match",
"role": "assistant"
}
] |
def x(self, req, user):
admin_detail = self.get_admin_detail(req)
if not admin_detail:
return False
if '.admin' not in (g['name'] for g in admin_detail['groups']):
if req.headers.get('x-auth-user-admin') == 'true' or req.headers.get(
'x-auth-user-reseller-admin') == 'true':
return False
if '.reseller_admin' not in (g['name'] for g in admin_detail['groups']
) and req.headers.get('x-auth-user-reseller-admin') == 'true':
return False
return req.headers.get('x-auth-admin-user'
) == user and self.credentials_match(admin_detail, req.headers.get(
'x-auth-admin-key'))
|
is_user_changing_own_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, user):\n admin_detail = self.get_admin_detail(req)\n if not admin_detail:\n return False\n if '.admin' not in (g['name'] for g in admin_detail['groups']):\n if req.headers.get('x-auth-user-admin') == 'true' or req.headers.get(\n 'x-auth-user-reseller-admin') == 'true':\n return False\n if '.reseller_admin' not in (g['name'] for g in admin_detail['groups']\n ) and req.headers.get('x-auth-user-reseller-admin') == 'true':\n return False\n return req.headers.get('x-auth-admin-user'\n ) == user and self.credentials_match(admin_detail, req.headers.get(\n 'x-auth-admin-key'))\n",
"role": "user"
},
{
"content": "is_user_changing_own_key",
"role": "assistant"
}
] |
def x(self, req):
return req.headers.get('x-auth-admin-user'
) == '.super_admin' and self.super_admin_key and req.headers.get(
'x-auth-admin-key') == self.super_admin_key
|
is_super_admin
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n return req.headers.get('x-auth-admin-user'\n ) == '.super_admin' and self.super_admin_key and req.headers.get(\n 'x-auth-admin-key') == self.super_admin_key\n",
"role": "user"
},
{
"content": "is_super_admin",
"role": "assistant"
}
] |
def x(self, req, admin_detail=None):
req.credentials_valid = False
if self.is_super_admin(req):
return True
if not admin_detail:
admin_detail = self.get_admin_detail(req)
if not self.credentials_match(admin_detail, req.headers.get(
'x-auth-admin-key')):
return False
req.credentials_valid = True
return '.reseller_admin' in (g['name'] for g in admin_detail['groups'])
|
is_reseller_admin
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, admin_detail=None):\n req.credentials_valid = False\n if self.is_super_admin(req):\n return True\n if not admin_detail:\n admin_detail = self.get_admin_detail(req)\n if not self.credentials_match(admin_detail, req.headers.get(\n 'x-auth-admin-key')):\n return False\n req.credentials_valid = True\n return '.reseller_admin' in (g['name'] for g in admin_detail['groups'])\n",
"role": "user"
},
{
"content": "is_reseller_admin",
"role": "assistant"
}
] |
def x(creds):
try:
auth_type, auth_rest = creds.split(':', 1)
except ValueError:
raise ValueError("Missing ':' in %s" % creds)
authtypes = sys.modules[__name__]
auth_encoder = getattr(authtypes, auth_type.title(), None)
if auth_encoder is None:
raise ValueError('Invalid auth_type: %s' % auth_type)
auth_encoder = auth_encoder()
parsed_creds = dict(type=auth_type, salt=None, hash=None)
parsed_creds.update(auth_encoder.validate(auth_rest))
return auth_encoder, parsed_creds
|
validate_creds
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(creds):\n try:\n auth_type, auth_rest = creds.split(':', 1)\n except ValueError:\n raise ValueError(\"Missing ':' in %s\" % creds)\n authtypes = sys.modules[__name__]\n auth_encoder = getattr(authtypes, auth_type.title(), None)\n if auth_encoder is None:\n raise ValueError('Invalid auth_type: %s' % auth_type)\n auth_encoder = auth_encoder()\n parsed_creds = dict(type=auth_type, salt=None, hash=None)\n parsed_creds.update(auth_encoder.validate(auth_rest))\n return auth_encoder, parsed_creds\n",
"role": "user"
},
{
"content": "validate_creds",
"role": "assistant"
}
] |
def x(self, salt, key):
enc_key = '%s%s' % (salt, key)
enc_val = hashlib.sha1(enc_key).hexdigest()
return 'sha1:%s$%s' % (salt, enc_val)
|
encode_w_salt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, salt, key):\n enc_key = '%s%s' % (salt, key)\n enc_val = hashlib.sha1(enc_key).hexdigest()\n return 'sha1:%s$%s' % (salt, enc_val)\n",
"role": "user"
},
{
"content": "encode_w_salt",
"role": "assistant"
}
] |
def x(self, key):
salt = self.salt or os.urandom(32).encode('base64').rstrip()
return self.encode_w_salt(salt, key)
|
encode
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key):\n salt = self.salt or os.urandom(32).encode('base64').rstrip()\n return self.encode_w_salt(salt, key)\n",
"role": "user"
},
{
"content": "encode",
"role": "assistant"
}
] |
def x(self, key, creds, salt, **kwargs):
return self.encode_w_salt(salt, key) == creds
|
match
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, creds, salt, **kwargs):\n return self.encode_w_salt(salt, key) == creds\n",
"role": "user"
},
{
"content": "match",
"role": "assistant"
}
] |
def x(self, auth_rest):
try:
auth_salt, auth_hash = auth_rest.split('$')
except ValueError:
raise ValueError("Missing '$' in %s" % auth_rest)
if len(auth_salt) == 0:
raise ValueError('Salt must have non-zero length!')
if len(auth_hash) != 40:
raise ValueError('Hash must have 40 chars!')
if not all(c in string.hexdigits for c in auth_hash):
raise ValueError('Hash must be hexadecimal!')
return dict(salt=auth_salt, hash=auth_hash)
|
validate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, auth_rest):\n try:\n auth_salt, auth_hash = auth_rest.split('$')\n except ValueError:\n raise ValueError(\"Missing '$' in %s\" % auth_rest)\n if len(auth_salt) == 0:\n raise ValueError('Salt must have non-zero length!')\n if len(auth_hash) != 40:\n raise ValueError('Hash must have 40 chars!')\n if not all(c in string.hexdigits for c in auth_hash):\n raise ValueError('Hash must be hexadecimal!')\n return dict(salt=auth_salt, hash=auth_hash)\n",
"role": "user"
},
{
"content": "validate",
"role": "assistant"
}
] |
def x(self, dt_index, slp_types, holidays=None):
file_path = os.path.join(self.datapath, 'selp_series.csv')
selp_series = pd.read_csv(file_path)
tmp_df = selp_series
index = pd.date_range(pd.datetime(2007, 1, 1, 0), periods=2016, freq=
'15Min')
tmp_df.set_index(index, inplace=True)
new_df = pd.DataFrame(index=dt_index, columns=slp_types).fillna(0)
new_df = add_weekdays2df(new_df, holidays=holidays, holiday_is_sunday=True)
new_df['hour'] = dt_index.hour + 1
new_df['minute'] = dt_index.minute
time_df = new_df[['date', 'hour', 'minute', 'weekday']].copy()
tmp_df[slp_types] = tmp_df[slp_types].astype(float)
tmp_df['hour_of_day'] = tmp_df.index.hour + 1
tmp_df['minute_of_hour'] = tmp_df.index.minute
left_cols = ['hour_of_day', 'minute_of_hour', 'weekday']
right_cols = ['hour', 'minute', 'weekday']
tmp_df = tmp_df.reset_index()
tmp_df.pop('index')
for p in self.seasons.keys():
a = pd.datetime(self.year, self.seasons[p][0], self.seasons[p][1], 0, 0
)
b = pd.datetime(self.year, self.seasons[p][2], self.seasons[p][3],
23, 59)
new_df.update(pd.DataFrame.merge(tmp_df[tmp_df['period'] == p[:-1]],
time_df[a:b], left_on=left_cols, right_on=right_cols, how=
'inner', left_index=True).sort_index().drop(['hour_of_day'], 1))
new_df.drop('date', axis=1, inplace=True)
return new_df.div(new_df.sum(axis=0), axis=1)
|
create_bdew_load_profiles
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dt_index, slp_types, holidays=None):\n file_path = os.path.join(self.datapath, 'selp_series.csv')\n selp_series = pd.read_csv(file_path)\n tmp_df = selp_series\n index = pd.date_range(pd.datetime(2007, 1, 1, 0), periods=2016, freq=\n '15Min')\n tmp_df.set_index(index, inplace=True)\n new_df = pd.DataFrame(index=dt_index, columns=slp_types).fillna(0)\n new_df = add_weekdays2df(new_df, holidays=holidays, holiday_is_sunday=True)\n new_df['hour'] = dt_index.hour + 1\n new_df['minute'] = dt_index.minute\n time_df = new_df[['date', 'hour', 'minute', 'weekday']].copy()\n tmp_df[slp_types] = tmp_df[slp_types].astype(float)\n tmp_df['hour_of_day'] = tmp_df.index.hour + 1\n tmp_df['minute_of_hour'] = tmp_df.index.minute\n left_cols = ['hour_of_day', 'minute_of_hour', 'weekday']\n right_cols = ['hour', 'minute', 'weekday']\n tmp_df = tmp_df.reset_index()\n tmp_df.pop('index')\n for p in self.seasons.keys():\n a = pd.datetime(self.year, self.seasons[p][0], self.seasons[p][1], 0, 0\n )\n b = pd.datetime(self.year, self.seasons[p][2], self.seasons[p][3], \n 23, 59)\n new_df.update(pd.DataFrame.merge(tmp_df[tmp_df['period'] == p[:-1]],\n time_df[a:b], left_on=left_cols, right_on=right_cols, how=\n 'inner', left_index=True).sort_index().drop(['hour_of_day'], 1))\n new_df.drop('date', axis=1, inplace=True)\n return new_df.div(new_df.sum(axis=0), axis=1)\n",
"role": "user"
},
{
"content": "create_bdew_load_profiles",
"role": "assistant"
}
] |
def x(self, ann_el_demand_per_sector):
return self.slp_frame.multiply(pd.Series(ann_el_demand_per_sector), axis=1
).dropna(how='all', axis=1) * 4
|
get_profile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ann_el_demand_per_sector):\n return self.slp_frame.multiply(pd.Series(ann_el_demand_per_sector), axis=1\n ).dropna(how='all', axis=1) * 4\n",
"role": "user"
},
{
"content": "get_profile",
"role": "assistant"
}
] |
def x(self, how='geometric_series'):
temperature = self.df['temperature'].resample('D').mean().reindex(self.
df.index).fillna(method='ffill').fillna(method='bfill')
if how == 'geometric_series':
temperature_mean = (temperature + 0.5 * np.roll(temperature, 24) +
0.25 * np.roll(temperature, 48) + 0.125 * np.roll(temperature, 72)
) / 1.875
elif how == 'mean':
temperature_mean = temperature
else:
temperature_mean = None
return temperature_mean
|
weighted_temperature
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, how='geometric_series'):\n temperature = self.df['temperature'].resample('D').mean().reindex(self.\n df.index).fillna(method='ffill').fillna(method='bfill')\n if how == 'geometric_series':\n temperature_mean = (temperature + 0.5 * np.roll(temperature, 24) + \n 0.25 * np.roll(temperature, 48) + 0.125 * np.roll(temperature, 72)\n ) / 1.875\n elif how == 'mean':\n temperature_mean = temperature\n else:\n temperature_mean = None\n return temperature_mean\n",
"role": "user"
},
{
"content": "weighted_temperature",
"role": "assistant"
}
] |
def x(self):
intervals = {(-20): 1, (-19): 1, (-18): 1, (-17): 1, (-16): 1, (-15): 1,
(-14): 2, (-13): 2, (-12): 2, (-11): 2, (-10): 2, (-9): 3, (-8): 3,
(-7): 3, (-6): 3, (-5): 3, (-4): 4, (-3): 4, (-2): 4, (-1): 4, (0):
4, (1): 5, (2): 5, (3): 5, (4): 5, (5): 5, (6): 6, (7): 6, (8): 6,
(9): 6, (10): 6, (11): 7, (12): 7, (13): 7, (14): 7, (15): 7, (16):
8, (17): 8, (18): 8, (19): 8, (20): 8, (21): 9, (22): 9, (23): 9, (
24): 9, (25): 9, (26): 10, (27): 10, (28): 10, (29): 10, (30): 10,
(31): 10, (32): 10, (33): 10, (34): 10, (35): 10, (36): 10, (37):
10, (38): 10, (39): 10, (40): 10}
temperature_rounded = [ceil(i) for i in self.df['temperature_geo']]
temperature_interval = [intervals[i] for i in temperature_rounded]
return np.transpose(np.array(temperature_interval))
|
get_temperature_interval
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n intervals = {(-20): 1, (-19): 1, (-18): 1, (-17): 1, (-16): 1, (-15): 1,\n (-14): 2, (-13): 2, (-12): 2, (-11): 2, (-10): 2, (-9): 3, (-8): 3,\n (-7): 3, (-6): 3, (-5): 3, (-4): 4, (-3): 4, (-2): 4, (-1): 4, (0):\n 4, (1): 5, (2): 5, (3): 5, (4): 5, (5): 5, (6): 6, (7): 6, (8): 6,\n (9): 6, (10): 6, (11): 7, (12): 7, (13): 7, (14): 7, (15): 7, (16):\n 8, (17): 8, (18): 8, (19): 8, (20): 8, (21): 9, (22): 9, (23): 9, (\n 24): 9, (25): 9, (26): 10, (27): 10, (28): 10, (29): 10, (30): 10,\n (31): 10, (32): 10, (33): 10, (34): 10, (35): 10, (36): 10, (37): \n 10, (38): 10, (39): 10, (40): 10}\n temperature_rounded = [ceil(i) for i in self.df['temperature_geo']]\n temperature_interval = [intervals[i] for i in temperature_rounded]\n return np.transpose(np.array(temperature_interval))\n",
"role": "user"
},
{
"content": "get_temperature_interval",
"role": "assistant"
}
] |
def x(self, filename='shlp_hour_factors.csv'):
file = os.path.join(self.datapath, filename)
hour_factors = pd.read_csv(file, index_col=0)
hour_factors = hour_factors.query(
'building_class=={0} and shlp_type=="{1}"'.format(self.
building_class, self.shlp_type))
residential = self.building_class > 0
left_cols = ['hour_of_day'] + (['weekday'] if not residential else [])
right_cols = ['hour'] + (['weekday'] if not residential else [])
sf_mat = pd.DataFrame.merge(hour_factors, self.df, left_on=left_cols,
right_on=right_cols, how='outer', left_index=True).sort_index()
drop_cols = ['hour_of_day', 'hour', 'building_class', 'shlp_type',
'date', 'temperature'] + (['weekday_x'] if residential else []) + ([
'weekday_y'] if residential else []) + (['weekday'] if not
residential else [])
sf_mat = sf_mat.drop(drop_cols, 1)
length = len(self.temperature)
sf = np.array(sf_mat)[np.array(list(range(0, length)))[:], (self.
get_temperature_interval() - 1)[:]]
return np.array(list(map(float, sf[:])))
|
get_sf_values
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filename='shlp_hour_factors.csv'):\n file = os.path.join(self.datapath, filename)\n hour_factors = pd.read_csv(file, index_col=0)\n hour_factors = hour_factors.query(\n 'building_class=={0} and shlp_type==\"{1}\"'.format(self.\n building_class, self.shlp_type))\n residential = self.building_class > 0\n left_cols = ['hour_of_day'] + (['weekday'] if not residential else [])\n right_cols = ['hour'] + (['weekday'] if not residential else [])\n sf_mat = pd.DataFrame.merge(hour_factors, self.df, left_on=left_cols,\n right_on=right_cols, how='outer', left_index=True).sort_index()\n drop_cols = ['hour_of_day', 'hour', 'building_class', 'shlp_type',\n 'date', 'temperature'] + (['weekday_x'] if residential else []) + ([\n 'weekday_y'] if residential else []) + (['weekday'] if not\n residential else [])\n sf_mat = sf_mat.drop(drop_cols, 1)\n length = len(self.temperature)\n sf = np.array(sf_mat)[np.array(list(range(0, length)))[:], (self.\n get_temperature_interval() - 1)[:]]\n return np.array(list(map(float, sf[:])))\n",
"role": "user"
},
{
"content": "get_sf_values",
"role": "assistant"
}
] |
def x(self, filename='shlp_sigmoid_factors.csv'):
file = os.path.join(self.datapath, filename)
sigmoid = pd.read_csv(file, index_col=0)
sigmoid = sigmoid.query('building_class=={0} and '.format(self.
building_class) + 'shlp_type=="{0}" and '.format(self.shlp_type) +
'wind_impact=={0}'.format(self.wind_class))
a = float(sigmoid['parameter_a'])
b = float(sigmoid['parameter_b'])
c = float(sigmoid['parameter_c'])
if self.ww_incl:
d = float(sigmoid['parameter_d'])
else:
d = 0
return a, b, c, d
|
get_sigmoid_parameters
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filename='shlp_sigmoid_factors.csv'):\n file = os.path.join(self.datapath, filename)\n sigmoid = pd.read_csv(file, index_col=0)\n sigmoid = sigmoid.query('building_class=={0} and '.format(self.\n building_class) + 'shlp_type==\"{0}\" and '.format(self.shlp_type) +\n 'wind_impact=={0}'.format(self.wind_class))\n a = float(sigmoid['parameter_a'])\n b = float(sigmoid['parameter_b'])\n c = float(sigmoid['parameter_c'])\n if self.ww_incl:\n d = float(sigmoid['parameter_d'])\n else:\n d = 0\n return a, b, c, d\n",
"role": "user"
},
{
"content": "get_sigmoid_parameters",
"role": "assistant"
}
] |
def x(self, filename='shlp_weekday_factors.csv'):
file = os.path.join(self.datapath, filename)
f_df = pd.read_csv(file, index_col=0)
tmp_df = f_df.query('shlp_type=="{0}"'.format(self.shlp_type)).drop(
'shlp_type', axis=1)
tmp_df['weekdays'] = np.array(list(range(7))) + 1
return np.array(list(map(float, pd.DataFrame.merge(tmp_df, self.df,
left_on='weekdays', right_on='weekday', how='inner', left_index=
True).sort_index()['wochentagsfaktor'])))
|
get_weekday_parameters
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filename='shlp_weekday_factors.csv'):\n file = os.path.join(self.datapath, filename)\n f_df = pd.read_csv(file, index_col=0)\n tmp_df = f_df.query('shlp_type==\"{0}\"'.format(self.shlp_type)).drop(\n 'shlp_type', axis=1)\n tmp_df['weekdays'] = np.array(list(range(7))) + 1\n return np.array(list(map(float, pd.DataFrame.merge(tmp_df, self.df,\n left_on='weekdays', right_on='weekday', how='inner', left_index=\n True).sort_index()['wochentagsfaktor'])))\n",
"role": "user"
},
{
"content": "get_weekday_parameters",
"role": "assistant"
}
] |
def x(self):
self.df['temperature'] = self.temperature.values
self.df['temperature_geo'] = self.weighted_temperature(how=
'geometric_series')
sf = self.get_sf_values()
[a, b, c, d] = self.get_sigmoid_parameters()
f = self.get_weekday_parameters()
h = a / (1 + (b / (self.df['temperature_geo'] - 40)) ** c) + d
kw = 1.0 / (sum(h * f) / 24)
heat_profile_normalized = kw * h * f * sf
return heat_profile_normalized
|
get_normalized_bdew_profile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.df['temperature'] = self.temperature.values\n self.df['temperature_geo'] = self.weighted_temperature(how=\n 'geometric_series')\n sf = self.get_sf_values()\n [a, b, c, d] = self.get_sigmoid_parameters()\n f = self.get_weekday_parameters()\n h = a / (1 + (b / (self.df['temperature_geo'] - 40)) ** c) + d\n kw = 1.0 / (sum(h * f) / 24)\n heat_profile_normalized = kw * h * f * sf\n return heat_profile_normalized\n",
"role": "user"
},
{
"content": "get_normalized_bdew_profile",
"role": "assistant"
}
] |
def x(path, **kwargs):
import os.path
return os.path.isfile(path, **kwargs)
|
isfile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, **kwargs):\n import os.path\n return os.path.isfile(path, **kwargs)\n",
"role": "user"
},
{
"content": "isfile",
"role": "assistant"
}
] |
def x(path, **kwargs):
import os.path
return os.path.isdir(path, **kwargs)
|
isdir
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, **kwargs):\n import os.path\n return os.path.isdir(path, **kwargs)\n",
"role": "user"
},
{
"content": "isdir",
"role": "assistant"
}
] |
def x(oldPath, newPath, **kwargs):
import os
return os.rename(oldPath, newPath, **kwargs)
|
rename
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(oldPath, newPath, **kwargs):\n import os\n return os.rename(oldPath, newPath, **kwargs)\n",
"role": "user"
},
{
"content": "rename",
"role": "assistant"
}
] |
def x(path, user=None, group=None):
import os
import pwd
import grp
uid = pwd.getpwnam(user).pw_uid if user else -1
gid = grp.getgrnam(group).gr_gid if group else -1
return os.chown(path, uid, gid)
|
chown
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, user=None, group=None):\n import os\n import pwd\n import grp\n uid = pwd.getpwnam(user).pw_uid if user else -1\n gid = grp.getgrnam(group).gr_gid if group else -1\n return os.chown(path, uid, gid)\n",
"role": "user"
},
{
"content": "chown",
"role": "assistant"
}
] |
def x(path, mode):
import os, stat
st = os.stat(path)
return os.chmod(path, mode)
|
chmod
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, mode):\n import os, stat\n st = os.stat(path)\n return os.chmod(path, mode)\n",
"role": "user"
},
{
"content": "chmod",
"role": "assistant"
}
] |
def x(path, **kwargs):
import os.path
return os.path.abspath(path, **kwargs)
|
abspath
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, **kwargs):\n import os.path\n return os.path.abspath(path, **kwargs)\n",
"role": "user"
},
{
"content": "abspath",
"role": "assistant"
}
] |
def x(path, **kwargs):
import os.path
return os.path.normpath(path, **kwargs)
|
normalize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, **kwargs):\n import os.path\n return os.path.normpath(path, **kwargs)\n",
"role": "user"
},
{
"content": "normalize",
"role": "assistant"
}
] |
def x(path, recursive=True, **kwargs):
if recursive:
import shutil
return shutil.rmtree(path, **kwargs)
else:
import os
return os.remdir(path, **kwargs)
|
rmdir
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, recursive=True, **kwargs):\n if recursive:\n import shutil\n return shutil.rmtree(path, **kwargs)\n else:\n import os\n return os.remdir(path, **kwargs)\n",
"role": "user"
},
{
"content": "rmdir",
"role": "assistant"
}
] |
def x(path, recursive=True, **kwargs):
import os
if recursive:
os.makedirs(path, **kwargs)
else:
os.mkdir(path, **kwargs)
|
mkdir
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, recursive=True, **kwargs):\n import os\n if recursive:\n os.makedirs(path, **kwargs)\n else:\n os.mkdir(path, **kwargs)\n",
"role": "user"
},
{
"content": "mkdir",
"role": "assistant"
}
] |
def x(path):
import os
try:
OPEN_FUNC(path, 'a+').close()
except IOError:
os.utime(path, None)
|
touch
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path):\n import os\n try:\n OPEN_FUNC(path, 'a+').close()\n except IOError:\n os.utime(path, None)\n",
"role": "user"
},
{
"content": "touch",
"role": "assistant"
}
] |
def x(path, **kwargs):
import os.path
return os.path.exists(path, **kwargs)
|
exists
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, **kwargs):\n import os.path\n return os.path.exists(path, **kwargs)\n",
"role": "user"
},
{
"content": "exists",
"role": "assistant"
}
] |
def x(path='.'):
import os
for f in os.listdir(path):
if isfile(join(path, f)):
yield join(path, f) if path != '.' else f
|
list
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path='.'):\n import os\n for f in os.listdir(path):\n if isfile(join(path, f)):\n yield join(path, f) if path != '.' else f\n",
"role": "user"
},
{
"content": "list",
"role": "assistant"
}
] |
def x(path='.'):
import os
for f in os.listdir(path):
if isdir(join(path, f)):
yield join(path, f) if path != '.' else f
|
listdirs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path='.'):\n import os\n for f in os.listdir(path):\n if isdir(join(path, f)):\n yield join(path, f) if path != '.' else f\n",
"role": "user"
},
{
"content": "listdirs",
"role": "assistant"
}
] |
def x(pattern, path='.', exclude=None, recursive=True):
import fnmatch
import os
if recursive:
for root, dirnames, filenames in os.walk(path):
for pat in _to_list(pattern):
for filename in fnmatch.filter(filenames, pat):
filepath = join(abspath(root), filename)
for excl in _to_list(exclude):
if excl and fnmatch.fnmatch(filepath, excl):
break
else:
yield filepath
else:
for pat in _to_list(pattern):
for filename in fnmatch.filter(list(path), pat):
filepath = join(abspath(path), filename)
for excl in _to_list(exclude):
if excl and fnmatch.fnmatch(filepath, excl):
break
else:
yield filepath
|
find
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pattern, path='.', exclude=None, recursive=True):\n import fnmatch\n import os\n if recursive:\n for root, dirnames, filenames in os.walk(path):\n for pat in _to_list(pattern):\n for filename in fnmatch.filter(filenames, pat):\n filepath = join(abspath(root), filename)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(filepath, excl):\n break\n else:\n yield filepath\n else:\n for pat in _to_list(pattern):\n for filename in fnmatch.filter(list(path), pat):\n filepath = join(abspath(path), filename)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(filepath, excl):\n break\n else:\n yield filepath\n",
"role": "user"
},
{
"content": "find",
"role": "assistant"
}
] |
def x(pattern, path='.', exclude=None, recursive=True):
import fnmatch
import os
if recursive:
for root, dirnames, filenames in os.walk(path):
for pat in _to_list(pattern):
for dirname in fnmatch.filter(dirnames, pat):
dirpath = join(abspath(root), dirname)
for excl in _to_list(exclude):
if excl and fnmatch.fnmatch(dirpath, excl):
break
else:
yield dirpath
else:
for pat in _to_list(pattern):
for dirname in fnmatch.filter(listdirs(path), pat):
dirpath = join(abspath(path), dirname)
for excl in _to_list(exclude):
if excl and fnmatch.fnmatch(dirpath, excl):
break
else:
yield dirpath
|
finddirs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pattern, path='.', exclude=None, recursive=True):\n import fnmatch\n import os\n if recursive:\n for root, dirnames, filenames in os.walk(path):\n for pat in _to_list(pattern):\n for dirname in fnmatch.filter(dirnames, pat):\n dirpath = join(abspath(root), dirname)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(dirpath, excl):\n break\n else:\n yield dirpath\n else:\n for pat in _to_list(pattern):\n for dirname in fnmatch.filter(listdirs(path), pat):\n dirpath = join(abspath(path), dirname)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(dirpath, excl):\n break\n else:\n yield dirpath\n",
"role": "user"
},
{
"content": "finddirs",
"role": "assistant"
}
] |
def x(path, content, encoding='UTF-8', append=False, raw=False):
mode = 'wb' if not append else 'ab'
with OPEN_FUNC(path, mode) as _file:
if raw:
import shutil
shutil.copyfileobj(content, _file)
else:
_file.write(content.encode(encoding))
|
write
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, content, encoding='UTF-8', append=False, raw=False):\n mode = 'wb' if not append else 'ab'\n with OPEN_FUNC(path, mode) as _file:\n if raw:\n import shutil\n shutil.copyfileobj(content, _file)\n else:\n _file.write(content.encode(encoding))\n",
"role": "user"
},
{
"content": "write",
"role": "assistant"
}
] |
def x(path, encoding='UTF-8'):
with OPEN_FUNC(path, 'rb') as _file:
cont = _file.read()
return cont.decode(encoding)
|
read
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, encoding='UTF-8'):\n with OPEN_FUNC(path, 'rb') as _file:\n cont = _file.read()\n return cont.decode(encoding)\n",
"role": "user"
},
{
"content": "read",
"role": "assistant"
}
] |
def x(path):
try:
import cPickle as pickle
except:
import pickle
with open(path, 'rb') as file:
return pickle.load(file)
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path):\n try:\n import cPickle as pickle\n except:\n import pickle\n with open(path, 'rb') as file:\n return pickle.load(file)\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(path, obj):
try:
import cPickle as pickle
except:
import pickle
with open(path, 'wb') as file:
return pickle.dump(obj, file)
|
put
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, obj):\n try:\n import cPickle as pickle\n except:\n import pickle\n with open(path, 'wb') as file:\n return pickle.dump(obj, file)\n",
"role": "user"
},
{
"content": "put",
"role": "assistant"
}
] |
def x(*args, **kwargs):
import os.path
if _is_list(args[0]):
return os.path.join(*args[0])
return os.path.join(*args, **kwargs)
|
join
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*args, **kwargs):\n import os.path\n if _is_list(args[0]):\n return os.path.join(*args[0])\n return os.path.join(*args, **kwargs)\n",
"role": "user"
},
{
"content": "join",
"role": "assistant"
}
] |
def x(path, **kwargs):
import os.path
name, ext = os.path.splitext(path, **kwargs)
return ext
|
extname
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, **kwargs):\n import os.path\n name, ext = os.path.splitext(path, **kwargs)\n return ext\n",
"role": "user"
},
{
"content": "extname",
"role": "assistant"
}
] |
def x(path, ext=''):
import os.path
if ext is False:
return os.path.basename(path).replace(extname(path), '')
else:
return os.path.basename(path).replace(ext, '')
|
basename
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, ext=''):\n import os.path\n if ext is False:\n return os.path.basename(path).replace(extname(path), '')\n else:\n return os.path.basename(path).replace(ext, '')\n",
"role": "user"
},
{
"content": "basename",
"role": "assistant"
}
] |
def x(path, suffix=''):
return join(dirname(path), basename(path, ext=False) + suffix + extname
(path))
|
add_suffix
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path, suffix=''):\n return join(dirname(path), basename(path, ext=False) + suffix + extname\n (path))\n",
"role": "user"
},
{
"content": "add_suffix",
"role": "assistant"
}
] |
def x(path):
import sys
if not exists(path):
raise ValueError('Path %s does not exist' % path)
sys.path.insert(1, path)
|
addpath
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(path):\n import sys\n if not exists(path):\n raise ValueError('Path %s does not exist' % path)\n sys.path.insert(1, path)\n",
"role": "user"
},
{
"content": "addpath",
"role": "assistant"
}
] |
def x(time_df, holidays=None, holiday_is_sunday=False):
time_df['weekday'] = time_df.index.weekday + 1
time_df['date'] = time_df.index.date
if holidays is not None:
if isinstance(holidays, dict):
holidays = list(holidays.keys())
time_df['weekday'].mask(pd.to_datetime(time_df['date']).isin(pd.
to_datetime(holidays)), 0, True)
if holiday_is_sunday:
time_df.weekday.mask(time_df.weekday == 0, 7, True)
return time_df
|
add_weekdays2df
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(time_df, holidays=None, holiday_is_sunday=False):\n time_df['weekday'] = time_df.index.weekday + 1\n time_df['date'] = time_df.index.date\n if holidays is not None:\n if isinstance(holidays, dict):\n holidays = list(holidays.keys())\n time_df['weekday'].mask(pd.to_datetime(time_df['date']).isin(pd.\n to_datetime(holidays)), 0, True)\n if holiday_is_sunday:\n time_df.weekday.mask(time_df.weekday == 0, 7, True)\n return time_df\n",
"role": "user"
},
{
"content": "add_weekdays2df",
"role": "assistant"
}
] |
def x(self, annual_demand, **kwargs):
am = kwargs.get('am', settime(7, 0, 0))
pm = kwargs.get('pm', settime(23, 30, 0))
week = kwargs.get('week', [1, 2, 3, 4, 5])
weekend = kwargs.get('weekend', [0, 6, 7])
default_factors = {'week': {'day': 0.8, 'night': 0.6}, 'weekend': {
'day': 0.9, 'night': 0.7}}
profile_factors = kwargs.get('profile_factors', default_factors)
self.dataframe['ind'] = 0
self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am,
pm).isin(week), profile_factors['week']['day'], True)
self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm,
am).isin(week), profile_factors['week']['night'], True)
self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am,
pm).isin(weekend), profile_factors['weekend']['day'], True)
self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm,
am).isin(weekend), profile_factors['weekend']['night'], True)
if self.dataframe['ind'].isnull().any(axis=0):
logging.error('NAN value found in industrial load profile')
time_interval = self.dataframe.index.freq.nanos / 3600000000000.0
return self.dataframe['ind'] / self.dataframe['ind'].sum(
) * annual_demand / time_interval
|
simple_profile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, annual_demand, **kwargs):\n am = kwargs.get('am', settime(7, 0, 0))\n pm = kwargs.get('pm', settime(23, 30, 0))\n week = kwargs.get('week', [1, 2, 3, 4, 5])\n weekend = kwargs.get('weekend', [0, 6, 7])\n default_factors = {'week': {'day': 0.8, 'night': 0.6}, 'weekend': {\n 'day': 0.9, 'night': 0.7}}\n profile_factors = kwargs.get('profile_factors', default_factors)\n self.dataframe['ind'] = 0\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am,\n pm).isin(week), profile_factors['week']['day'], True)\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm,\n am).isin(week), profile_factors['week']['night'], True)\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am,\n pm).isin(weekend), profile_factors['weekend']['day'], True)\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm,\n am).isin(weekend), profile_factors['weekend']['night'], True)\n if self.dataframe['ind'].isnull().any(axis=0):\n logging.error('NAN value found in industrial load profile')\n time_interval = self.dataframe.index.freq.nanos / 3600000000000.0\n return self.dataframe['ind'] / self.dataframe['ind'].sum(\n ) * annual_demand / time_interval\n",
"role": "user"
},
{
"content": "simple_profile",
"role": "assistant"
}
] |
def x(self):
if getattr(self, '_script', None) is None:
self._script = self._script__getter()
return self._script
|
script
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if getattr(self, '_script', None) is None:\n self._script = self._script__getter()\n return self._script\n",
"role": "user"
},
{
"content": "script",
"role": "assistant"
}
] |
def x(n):
if not n:
return 0
e = 0
while n % 10 == 0 and e < 9:
n = n // 10
e = e + 1
if e < 9:
n, d = divmod(n, 10)
return 1 + (n * 9 + d - 1) * 10 + e
else:
return 1 + (n - 1) * 10 + 9
|
compress_amount
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(n):\n if not n:\n return 0\n e = 0\n while n % 10 == 0 and e < 9:\n n = n // 10\n e = e + 1\n if e < 9:\n n, d = divmod(n, 10)\n return 1 + (n * 9 + d - 1) * 10 + e\n else:\n return 1 + (n - 1) * 10 + 9\n",
"role": "user"
},
{
"content": "compress_amount",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.