source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(self, data, fill_value=None): not_alpha = [b for b in data.coords['bands'].values if b != 'A'] null_mask = data.sel(bands=not_alpha) if np.issubdtype(data.dtype, np.integer) and fill_value is not None: null_mask = null_mask != fill_value else: null_mask = null_mask.notnull() null_mask = null_mask.any(dim='bands') null_mask = null_mask.expand_dims('bands') null_mask['bands'] = ['A'] return null_mask
create_alpha
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data, fill_value=None):\n not_alpha = [b for b in data.coords['bands'].values if b != 'A']\n null_mask = data.sel(bands=not_alpha)\n if np.issubdtype(data.dtype, np.integer) and fill_value is not None:\n null_mask = null_mask != fill_value\n else:\n null_mask = null_mask.notnull()\n null_mask = null_mask.any(dim='bands')\n null_mask = null_mask.expand_dims('bands')\n null_mask['bands'] = ['A']\n return null_mask\n", "role": "user" }, { "content": "create_alpha", "role": "assistant" } ]
def x(self, data, alpha=None): null_mask = alpha if alpha is not None else self._create_alpha(data) if np.issubdtype(data.dtype, np.integer): null_mask = self._scale_to_dtype(null_mask, data.dtype).astype(data .dtype) data = xr.concat([data, null_mask], dim='bands') return data
add_alpha
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data, alpha=None):\n null_mask = alpha if alpha is not None else self._create_alpha(data)\n if np.issubdtype(data.dtype, np.integer):\n null_mask = self._scale_to_dtype(null_mask, data.dtype).astype(data\n .dtype)\n data = xr.concat([data, null_mask], dim='bands')\n return data\n", "role": "user" }, { "content": "add_alpha", "role": "assistant" } ]
def x(self, data, dtype): if np.issubdtype(dtype, np.integer): if np.issubdtype(data, np.integer): data = data.clip(np.iinfo(dtype).min, np.iinfo(dtype).max) else: dinfo = np.iinfo(dtype) data = data.clip(0, 1) * (dinfo.max - dinfo.min) + dinfo.min data = data.round() return data
scale_to_dtype
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data, dtype):\n if np.issubdtype(dtype, np.integer):\n if np.issubdtype(data, np.integer):\n data = data.clip(np.iinfo(dtype).min, np.iinfo(dtype).max)\n else:\n dinfo = np.iinfo(dtype)\n data = data.clip(0, 1) * (dinfo.max - dinfo.min) + dinfo.min\n data = data.round()\n return data\n", "role": "user" }, { "content": "scale_to_dtype", "role": "assistant" } ]
def x(self, modes): if not isinstance(modes, (tuple, list, set)): modes = [modes] if self.mode not in modes: raise ValueError( 'Image not in suitable mode, expected: %s, got: %s' % (modes, self.mode))
check_modes
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, modes):\n if not isinstance(modes, (tuple, list, set)):\n modes = [modes]\n if self.mode not in modes:\n raise ValueError(\n 'Image not in suitable mode, expected: %s, got: %s' % (modes,\n self.mode))\n", "role": "user" }, { "content": "check_modes", "role": "assistant" } ]
def x(self, mode): self._check_modes(('P', 'PA')) if not self.palette: raise RuntimeError("Can't convert palettized image, missing palette.") pal = np.array(self.palette) pal = da.from_array(pal, chunks=pal.shape) if pal.shape[1] == 4: mode = 'RGBA' alpha = None elif self.mode.endswith('A'): alpha = self.data.sel(bands='A').data[..., None] mode = mode + 'A' if not mode.endswith('A') else mode else: alpha = None flat_indexes = self.data.sel(bands='P').data.ravel().astype('int64') dim_sizes = ((key, val) for key, val in self.data.sizes.items() if key != 'bands') dims, new_shape = zip(*dim_sizes) dims = dims + ('bands',) new_shape = new_shape + (pal.shape[1],) new_data = pal[flat_indexes].reshape(new_shape) coords = dict(self.data.coords) coords['bands'] = list(mode) if alpha is not None: new_arr = da.concatenate((new_data, alpha), axis=-1) data = xr.DataArray(new_arr, coords=coords, attrs=self.data.attrs, dims=dims) else: data = xr.DataArray(new_data, coords=coords, attrs=self.data.attrs, dims=dims) return data
from_p
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, mode):\n self._check_modes(('P', 'PA'))\n if not self.palette:\n raise RuntimeError(\"Can't convert palettized image, missing palette.\")\n pal = np.array(self.palette)\n pal = da.from_array(pal, chunks=pal.shape)\n if pal.shape[1] == 4:\n mode = 'RGBA'\n alpha = None\n elif self.mode.endswith('A'):\n alpha = self.data.sel(bands='A').data[..., None]\n mode = mode + 'A' if not mode.endswith('A') else mode\n else:\n alpha = None\n flat_indexes = self.data.sel(bands='P').data.ravel().astype('int64')\n dim_sizes = ((key, val) for key, val in self.data.sizes.items() if key !=\n 'bands')\n dims, new_shape = zip(*dim_sizes)\n dims = dims + ('bands',)\n new_shape = new_shape + (pal.shape[1],)\n new_data = pal[flat_indexes].reshape(new_shape)\n coords = dict(self.data.coords)\n coords['bands'] = list(mode)\n if alpha is not None:\n new_arr = da.concatenate((new_data, alpha), axis=-1)\n data = xr.DataArray(new_arr, coords=coords, attrs=self.data.attrs,\n dims=dims)\n else:\n data = xr.DataArray(new_data, coords=coords, attrs=self.data.attrs,\n dims=dims)\n return data\n", "role": "user" }, { "content": "from_p", "role": "assistant" } ]
def x(self, mode): self._check_modes(('L', 'LA')) bands = ['L'] * 3 if mode[-1] == 'A': bands.append('A') data = self.data.sel(bands=bands) data['bands'] = list(mode) return data
l2rgb
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, mode):\n self._check_modes(('L', 'LA'))\n bands = ['L'] * 3\n if mode[-1] == 'A':\n bands.append('A')\n data = self.data.sel(bands=bands)\n data['bands'] = list(mode)\n return data\n", "role": "user" }, { "content": "l2rgb", "role": "assistant" } ]
def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None): import warnings warnings.warn("'_finalize' is deprecated, use 'finalize' instead.", DeprecationWarning) return self.finalize(fill_value, dtype, keep_palette, cmap)
finalize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None):\n import warnings\n warnings.warn(\"'_finalize' is deprecated, use 'finalize' instead.\",\n DeprecationWarning)\n return self.finalize(fill_value, dtype, keep_palette, cmap)\n", "role": "user" }, { "content": "finalize", "role": "assistant" } ]
def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None): if keep_palette and not self.mode.startswith('P'): keep_palette = False if not keep_palette: if self.mode == 'P': return self.convert('RGB').finalize(fill_value=fill_value, dtype=dtype, keep_palette=keep_palette, cmap=cmap) if self.mode == 'PA': return self.convert('RGBA').finalize(fill_value=fill_value, dtype=dtype, keep_palette=keep_palette, cmap=cmap) if np.issubdtype(dtype, np.floating) and fill_value is None: logger.warning( 'Image with floats cannot be transparent, so setting fill_value to 0' ) fill_value = 0 final_data = self.data ifill = final_data.attrs.get('_FillValue') if np.issubdtype(final_data, np.integer) else None if not keep_palette: if fill_value is None and not self.mode.endswith('A'): alpha = self._create_alpha(final_data, fill_value=ifill) final_data = self._scale_to_dtype(final_data, dtype).astype(dtype) final_data = self._add_alpha(final_data, alpha=alpha) else: final_data = self._scale_to_dtype(final_data, dtype) if ifill is not None and fill_value is not None: fill_value = dtype(fill_value) final_data = final_data.where(final_data != ifill, dtype( fill_value)) elif fill_value is not None: final_data = final_data.fillna(dtype(fill_value)) final_data = final_data.astype(dtype) final_data.attrs = self.data.attrs return final_data, ''.join(final_data['bands'].values)
finalize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, fill_value=None, dtype=np.uint8, keep_palette=False, cmap=None):\n if keep_palette and not self.mode.startswith('P'):\n keep_palette = False\n if not keep_palette:\n if self.mode == 'P':\n return self.convert('RGB').finalize(fill_value=fill_value,\n dtype=dtype, keep_palette=keep_palette, cmap=cmap)\n if self.mode == 'PA':\n return self.convert('RGBA').finalize(fill_value=fill_value,\n dtype=dtype, keep_palette=keep_palette, cmap=cmap)\n if np.issubdtype(dtype, np.floating) and fill_value is None:\n logger.warning(\n 'Image with floats cannot be transparent, so setting fill_value to 0'\n )\n fill_value = 0\n final_data = self.data\n ifill = final_data.attrs.get('_FillValue') if np.issubdtype(final_data,\n np.integer) else None\n if not keep_palette:\n if fill_value is None and not self.mode.endswith('A'):\n alpha = self._create_alpha(final_data, fill_value=ifill)\n final_data = self._scale_to_dtype(final_data, dtype).astype(dtype)\n final_data = self._add_alpha(final_data, alpha=alpha)\n else:\n final_data = self._scale_to_dtype(final_data, dtype)\n if ifill is not None and fill_value is not None:\n fill_value = dtype(fill_value)\n final_data = final_data.where(final_data != ifill, dtype(\n fill_value))\n elif fill_value is not None:\n final_data = final_data.fillna(dtype(fill_value))\n final_data = final_data.astype(dtype)\n final_data.attrs = self.data.attrs\n return final_data, ''.join(final_data['bands'].values)\n", "role": "user" }, { "content": "finalize", "role": "assistant" } ]
def x(self, fill_value=None, compute=True): channels, mode = self.finalize(fill_value) res = channels.transpose('y', 'x', 'bands') img = dask.delayed(PILImage.fromarray)(np.squeeze(res.data), mode) if compute: img = img.compute() return img
pil_image
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, fill_value=None, compute=True):\n channels, mode = self.finalize(fill_value)\n res = channels.transpose('y', 'x', 'bands')\n img = dask.delayed(PILImage.fromarray)(np.squeeze(res.data), mode)\n if compute:\n img = img.compute()\n return img\n", "role": "user" }, { "content": "pil_image", "role": "assistant" } ]
def x(self, tup): return xr.DataArray(tup, dims=['bands'], coords={'bands': self.data[ 'bands']})
xrify_tuples
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, tup):\n return xr.DataArray(tup, dims=['bands'], coords={'bands': self.data[\n 'bands']})\n", "role": "user" }, { "content": "xrify_tuples", "role": "assistant" } ]
def x(self, gamma=1.0): if isinstance(gamma, (list, tuple)): gamma = self.xrify_tuples(gamma) elif gamma == 1.0: return logger.debug('Applying gamma %s', str(gamma)) attrs = self.data.attrs self.data = self.data.clip(min=0) self.data **= 1.0 / gamma self.data.attrs = attrs
gamma
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, gamma=1.0):\n if isinstance(gamma, (list, tuple)):\n gamma = self.xrify_tuples(gamma)\n elif gamma == 1.0:\n return\n logger.debug('Applying gamma %s', str(gamma))\n attrs = self.data.attrs\n self.data = self.data.clip(min=0)\n self.data **= 1.0 / gamma\n self.data.attrs = attrs\n", "role": "user" }, { "content": "gamma", "role": "assistant" } ]
def x(self, stretch='crude', **kwargs): logger.debug('Applying stretch %s with parameters %s', stretch, str(kwargs) ) if isinstance(stretch, (tuple, list)): if len(stretch) == 2: self.stretch_linear(cutoffs=stretch) else: raise ValueError('Stretch tuple must have exactly two elements') elif stretch == 'linear': self.stretch_linear(**kwargs) elif stretch == 'histogram': self.stretch_hist_equalize(**kwargs) elif stretch in ['crude', 'crude-stretch']: self.crude_stretch(**kwargs) elif stretch in ['log', 'logarithmic']: self.stretch_logarithmic(**kwargs) elif stretch == 'no': return elif isinstance(stretch, str): raise ValueError('Stretching method %s not recognized.' % stretch) else: raise TypeError('Stretch parameter must be a string or a tuple.')
stretch
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, stretch='crude', **kwargs):\n logger.debug('Applying stretch %s with parameters %s', stretch, str(kwargs)\n )\n if isinstance(stretch, (tuple, list)):\n if len(stretch) == 2:\n self.stretch_linear(cutoffs=stretch)\n else:\n raise ValueError('Stretch tuple must have exactly two elements')\n elif stretch == 'linear':\n self.stretch_linear(**kwargs)\n elif stretch == 'histogram':\n self.stretch_hist_equalize(**kwargs)\n elif stretch in ['crude', 'crude-stretch']:\n self.crude_stretch(**kwargs)\n elif stretch in ['log', 'logarithmic']:\n self.stretch_logarithmic(**kwargs)\n elif stretch == 'no':\n return\n elif isinstance(stretch, str):\n raise ValueError('Stretching method %s not recognized.' % stretch)\n else:\n raise TypeError('Stretch parameter must be a string or a tuple.')\n", "role": "user" }, { "content": "stretch", "role": "assistant" } ]
def x(data, dims, cutoffs): data_arr = xr.DataArray(data, dims=dims) left, right = data_arr.quantile([cutoffs[0], 1.0 - cutoffs[1]], dim=[ 'x', 'y']) logger.debug('Interval: left=%s, right=%s', str(left), str(right)) return left.data, right.data
compute_quantile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(data, dims, cutoffs):\n data_arr = xr.DataArray(data, dims=dims)\n left, right = data_arr.quantile([cutoffs[0], 1.0 - cutoffs[1]], dim=[\n 'x', 'y'])\n logger.debug('Interval: left=%s, right=%s', str(left), str(right))\n return left.data, right.data\n", "role": "user" }, { "content": "compute_quantile", "role": "assistant" } ]
def x(self, cutoffs=(0.005, 0.005)): logger.debug('Perform a linear contrast stretch.') logger.debug('Calculate the histogram quantiles: ') logger.debug('Left and right quantiles: ' + str(cutoffs[0]) + ' ' + str (cutoffs[1])) cutoff_type = np.float64 if np.issubdtype(self.data.dtype, np.floating) and np.dtype(self.data.dtype ).itemsize > 8: cutoff_type = self.data.dtype left, right = dask.delayed(self._compute_quantile, nout=2)(self.data. data, self.data.dims, cutoffs) left_data = da.from_delayed(left, shape=(self.data.sizes['bands'],), dtype=cutoff_type) left = xr.DataArray(left_data, dims=('bands',), coords={'bands': self. data['bands']}) right_data = da.from_delayed(right, shape=(self.data.sizes['bands'],), dtype=cutoff_type) right = xr.DataArray(right_data, dims=('bands',), coords={'bands': self .data['bands']}) self.crude_stretch(left, right)
stretch_linear
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, cutoffs=(0.005, 0.005)):\n logger.debug('Perform a linear contrast stretch.')\n logger.debug('Calculate the histogram quantiles: ')\n logger.debug('Left and right quantiles: ' + str(cutoffs[0]) + ' ' + str\n (cutoffs[1]))\n cutoff_type = np.float64\n if np.issubdtype(self.data.dtype, np.floating) and np.dtype(self.data.dtype\n ).itemsize > 8:\n cutoff_type = self.data.dtype\n left, right = dask.delayed(self._compute_quantile, nout=2)(self.data.\n data, self.data.dims, cutoffs)\n left_data = da.from_delayed(left, shape=(self.data.sizes['bands'],),\n dtype=cutoff_type)\n left = xr.DataArray(left_data, dims=('bands',), coords={'bands': self.\n data['bands']})\n right_data = da.from_delayed(right, shape=(self.data.sizes['bands'],),\n dtype=cutoff_type)\n right = xr.DataArray(right_data, dims=('bands',), coords={'bands': self\n .data['bands']})\n self.crude_stretch(left, right)\n", "role": "user" }, { "content": "stretch_linear", "role": "assistant" } ]
def x(self, min_stretch=None, max_stretch=None): if min_stretch is None: non_band_dims = tuple(x for x in self.data.dims if x != 'bands') min_stretch = self.data.min(dim=non_band_dims) if max_stretch is None: non_band_dims = tuple(x for x in self.data.dims if x != 'bands') max_stretch = self.data.max(dim=non_band_dims) if isinstance(min_stretch, (list, tuple)): min_stretch = self.xrify_tuples(min_stretch) if isinstance(max_stretch, (list, tuple)): max_stretch = self.xrify_tuples(max_stretch) delta = max_stretch - min_stretch if isinstance(delta, xr.DataArray): scale_factor = (1.0 / delta).fillna(0) else: scale_factor = 1.0 / delta attrs = self.data.attrs self.data -= min_stretch self.data *= scale_factor self.data.attrs = attrs
crude_stretch
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, min_stretch=None, max_stretch=None):\n if min_stretch is None:\n non_band_dims = tuple(x for x in self.data.dims if x != 'bands')\n min_stretch = self.data.min(dim=non_band_dims)\n if max_stretch is None:\n non_band_dims = tuple(x for x in self.data.dims if x != 'bands')\n max_stretch = self.data.max(dim=non_band_dims)\n if isinstance(min_stretch, (list, tuple)):\n min_stretch = self.xrify_tuples(min_stretch)\n if isinstance(max_stretch, (list, tuple)):\n max_stretch = self.xrify_tuples(max_stretch)\n delta = max_stretch - min_stretch\n if isinstance(delta, xr.DataArray):\n scale_factor = (1.0 / delta).fillna(0)\n else:\n scale_factor = 1.0 / delta\n attrs = self.data.attrs\n self.data -= min_stretch\n self.data *= scale_factor\n self.data.attrs = attrs\n", "role": "user" }, { "content": "crude_stretch", "role": "assistant" } ]
def x(self, approximate=False): logger.info('Perform a histogram equalized contrast stretch.') nwidth = 2048.0 logger.debug('Make histogram bins having equal amount of data, ' + 'using numpy percentile function:') def x(band_data): cdf = da.arange(0.0, 1.0, 1.0 / nwidth, chunks=nwidth) if approximate: flat_data = band_data.ravel() bins = da.percentile(flat_data[da.notnull(flat_data)], cdf * 100.0) else: bins = dask.delayed(np.nanpercentile)(band_data, cdf * 100.0) bins = da.from_delayed(bins, shape=(nwidth,), dtype=cdf.dtype) res = dask.delayed(np.interp)(band_data, bins, cdf) res = da.from_delayed(res, shape=band_data.shape, dtype=band_data.dtype ) return res band_results = [] for band in self.data['bands'].values: if band == 'A': continue band_data = self.data.sel(bands=band) res = _band_hist(band_data.data) band_results.append(res) if 'A' in self.data.coords['bands'].values: band_results.append(self.data.sel(bands='A')) self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))
stretch_hist_equalize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, approximate=False):\n logger.info('Perform a histogram equalized contrast stretch.')\n nwidth = 2048.0\n logger.debug('Make histogram bins having equal amount of data, ' +\n 'using numpy percentile function:')\n\n def x(band_data):\n cdf = da.arange(0.0, 1.0, 1.0 / nwidth, chunks=nwidth)\n if approximate:\n flat_data = band_data.ravel()\n bins = da.percentile(flat_data[da.notnull(flat_data)], cdf * 100.0)\n else:\n bins = dask.delayed(np.nanpercentile)(band_data, cdf * 100.0)\n bins = da.from_delayed(bins, shape=(nwidth,), dtype=cdf.dtype)\n res = dask.delayed(np.interp)(band_data, bins, cdf)\n res = da.from_delayed(res, shape=band_data.shape, dtype=band_data.dtype\n )\n return res\n band_results = []\n for band in self.data['bands'].values:\n if band == 'A':\n continue\n band_data = self.data.sel(bands=band)\n res = _band_hist(band_data.data)\n band_results.append(res)\n if 'A' in self.data.coords['bands'].values:\n band_results.append(self.data.sel(bands='A'))\n self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))\n", "role": "user" }, { "content": "stretch_hist_equalize", "role": "assistant" } ]
def x(self, factor=100.0): logger.debug('Perform a logarithmic contrast stretch.') crange = 0.0, 1.0 b__ = float(crange[1] - crange[0]) / np.log(factor) c__ = float(crange[0]) def x(arr): slope = (factor - 1.0) / float(arr.max() - arr.min()) arr = 1.0 + (arr - arr.min()) * slope arr = c__ + b__ * da.log(arr) return arr band_results = [] for band in self.data['bands'].values: if band == 'A': continue band_data = self.data.sel(bands=band) res = _band_log(band_data.data) band_results.append(res) if 'A' in self.data.coords['bands'].values: band_results.append(self.data.sel(bands='A')) self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))
stretch_logarithmic
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, factor=100.0):\n logger.debug('Perform a logarithmic contrast stretch.')\n crange = 0.0, 1.0\n b__ = float(crange[1] - crange[0]) / np.log(factor)\n c__ = float(crange[0])\n\n def x(arr):\n slope = (factor - 1.0) / float(arr.max() - arr.min())\n arr = 1.0 + (arr - arr.min()) * slope\n arr = c__ + b__ * da.log(arr)\n return arr\n band_results = []\n for band in self.data['bands'].values:\n if band == 'A':\n continue\n band_data = self.data.sel(bands=band)\n res = _band_log(band_data.data)\n band_results.append(res)\n if 'A' in self.data.coords['bands'].values:\n band_results.append(self.data.sel(bands='A'))\n self.data.data = da.stack(band_results, axis=self.data.dims.index('bands'))\n", "role": "user" }, { "content": "stretch_logarithmic", "role": "assistant" } ]
def x(self, k, s0): attrs = self.data.attrs self.data = k * xu.log(self.data / s0) self.data.attrs = attrs
stretch_weber_fechner
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, k, s0):\n attrs = self.data.attrs\n self.data = k * xu.log(self.data / s0)\n self.data.attrs = attrs\n", "role": "user" }, { "content": "stretch_weber_fechner", "role": "assistant" } ]
def x(self, invert=True): logger.debug('Applying invert with parameters %s', str(invert)) if isinstance(invert, (tuple, list)): invert = self.xrify_tuples(invert) offset = invert.astype(int) scale = (-1) ** offset elif invert: offset = 1 scale = -1 attrs = self.data.attrs self.data = self.data * scale + offset self.data.attrs = attrs
invert
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, invert=True):\n logger.debug('Applying invert with parameters %s', str(invert))\n if isinstance(invert, (tuple, list)):\n invert = self.xrify_tuples(invert)\n offset = invert.astype(int)\n scale = (-1) ** offset\n elif invert:\n offset = 1\n scale = -1\n attrs = self.data.attrs\n self.data = self.data * scale + offset\n self.data.attrs = attrs\n", "role": "user" }, { "content": "invert", "role": "assistant" } ]
def x(self, img): raise NotImplementedError( 'This method has not be implemented for xarray support.') if self.is_empty(): raise ValueError('Cannot merge an empty image.') if self.mode != img.mode: raise ValueError('Cannot merge image of different modes.') selfmask = self.channels[0].mask for chn in self.channels[1:]: selfmask = np.ma.mask_or(selfmask, chn.mask) for i in range(len(self.channels)): self.channels[i] = np.ma.where(selfmask, img.channels[i], self. channels[i]) self.channels[i].mask = np.logical_and(selfmask, img.channels[i].mask)
merge
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, img):\n raise NotImplementedError(\n 'This method has not be implemented for xarray support.')\n if self.is_empty():\n raise ValueError('Cannot merge an empty image.')\n if self.mode != img.mode:\n raise ValueError('Cannot merge image of different modes.')\n selfmask = self.channels[0].mask\n for chn in self.channels[1:]:\n selfmask = np.ma.mask_or(selfmask, chn.mask)\n for i in range(len(self.channels)):\n self.channels[i] = np.ma.where(selfmask, img.channels[i], self.\n channels[i])\n self.channels[i].mask = np.logical_and(selfmask, img.channels[i].mask)\n", "role": "user" }, { "content": "merge", "role": "assistant" } ]
def x(self, colormap): if self.mode not in ('L', 'LA'): raise ValueError('Image should be grayscale to colorize') if self.mode == 'LA': alpha = self.data.sel(bands=['A']) else: alpha = None l_data = self.data.sel(bands=['L']) def x(l_data, colormap): channels = colormap.colorize(l_data) return np.concatenate(channels, axis=0) new_data = l_data.data.map_blocks(_colorize, colormap, chunks=(colormap .colors.shape[1],) + l_data.data.chunks[1:], dtype=np.float64) if colormap.colors.shape[1] == 4: mode = 'RGBA' elif alpha is not None: new_data = da.concatenate([new_data, alpha.data], axis=0) mode = 'RGBA' else: mode = 'RGB' coords = dict(self.data.coords) coords['bands'] = list(mode) attrs = self.data.attrs dims = self.data.dims self.data = xr.DataArray(new_data, coords=coords, attrs=attrs, dims=dims)
colorize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, colormap):\n if self.mode not in ('L', 'LA'):\n raise ValueError('Image should be grayscale to colorize')\n if self.mode == 'LA':\n alpha = self.data.sel(bands=['A'])\n else:\n alpha = None\n l_data = self.data.sel(bands=['L'])\n\n def x(l_data, colormap):\n channels = colormap.colorize(l_data)\n return np.concatenate(channels, axis=0)\n new_data = l_data.data.map_blocks(_colorize, colormap, chunks=(colormap\n .colors.shape[1],) + l_data.data.chunks[1:], dtype=np.float64)\n if colormap.colors.shape[1] == 4:\n mode = 'RGBA'\n elif alpha is not None:\n new_data = da.concatenate([new_data, alpha.data], axis=0)\n mode = 'RGBA'\n else:\n mode = 'RGB'\n coords = dict(self.data.coords)\n coords['bands'] = list(mode)\n attrs = self.data.attrs\n dims = self.data.dims\n self.data = xr.DataArray(new_data, coords=coords, attrs=attrs, dims=dims)\n", "role": "user" }, { "content": "colorize", "role": "assistant" } ]
def x(self, colormap): if self.mode not in ('L', 'LA'): raise ValueError('Image should be grayscale to colorize') l_data = self.data.sel(bands=['L']) def x(data): return colormap.palettize(data)[0] new_data = l_data.data.map_blocks(_palettize, dtype=l_data.dtype) self.palette = tuple(colormap.colors) if self.mode == 'L': mode = 'P' else: mode = 'PA' new_data = da.concatenate([new_data, self.data.sel(bands=['A'])], axis=0) self.data.data = new_data self.data.coords['bands'] = list(mode)
palettize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, colormap):\n if self.mode not in ('L', 'LA'):\n raise ValueError('Image should be grayscale to colorize')\n l_data = self.data.sel(bands=['L'])\n\n def x(data):\n return colormap.palettize(data)[0]\n new_data = l_data.data.map_blocks(_palettize, dtype=l_data.dtype)\n self.palette = tuple(colormap.colors)\n if self.mode == 'L':\n mode = 'P'\n else:\n mode = 'PA'\n new_data = da.concatenate([new_data, self.data.sel(bands=['A'])],\n axis=0)\n self.data.data = new_data\n self.data.coords['bands'] = list(mode)\n", "role": "user" }, { "content": "palettize", "role": "assistant" } ]
def x(self, other): raise NotImplementedError( 'This method has not be implemented for xarray support.') if self.mode != 'RGBA' or other.mode != 'RGBA': raise ValueError('Images must be in RGBA') src = other dst = self outa = src.channels[3] + dst.channels[3] * (1 - src.channels[3]) for i in range(3): dst.channels[i] = (src.channels[i] * src.channels[3] + dst.channels [i] * dst.channels[3] * (1 - src.channels[3])) / outa dst.channels[i][outa == 0] = 0 dst.channels[3] = outa
blend
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, other):\n raise NotImplementedError(\n 'This method has not be implemented for xarray support.')\n if self.mode != 'RGBA' or other.mode != 'RGBA':\n raise ValueError('Images must be in RGBA')\n src = other\n dst = self\n outa = src.channels[3] + dst.channels[3] * (1 - src.channels[3])\n for i in range(3):\n dst.channels[i] = (src.channels[i] * src.channels[3] + dst.channels\n [i] * dst.channels[3] * (1 - src.channels[3])) / outa\n dst.channels[i][outa == 0] = 0\n dst.channels[3] = outa\n", "role": "user" }, { "content": "blend", "role": "assistant" } ]
def x(variable: str, default: Path) ->Path: value = os.environ.get(variable) if value: return Path(value) return default
path_from_env
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(variable: str, default: Path) ->Path:\n value = os.environ.get(variable)\n if value:\n return Path(value)\n return default\n", "role": "user" }, { "content": "path_from_env", "role": "assistant" } ]
def x(variable: str, default: List[Path]) ->List[Path]: value = os.environ.get(variable) if value: return [Path(path) for path in value.split(':')] return default
paths_from_env
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(variable: str, default: List[Path]) ->List[Path]:\n value = os.environ.get(variable)\n if value:\n return [Path(path) for path in value.split(':')]\n return default\n", "role": "user" }, { "content": "paths_from_env", "role": "assistant" } ]
def x(self, user, password): if self.__contains__(user): raise UserExists self.new_users[user] = self._encrypt_password(password) + '\n'
add
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, user, password):\n if self.__contains__(user):\n raise UserExists\n self.new_users[user] = self._encrypt_password(password) + '\\n'\n", "role": "user" }, { "content": "add", "role": "assistant" } ]
def x(self, user): if not self.__contains__(user): raise UserNotExists self.new_users.pop(user)
pop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, user):\n if not self.__contains__(user):\n raise UserNotExists\n self.new_users.pop(user)\n", "role": "user" }, { "content": "pop", "role": "assistant" } ]
def x(self, user, password): if not self.__contains__(user): raise UserNotExists self.new_users[user] = self._encrypt_password(password) + '\n'
change_password
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, user, password):\n if not self.__contains__(user):\n raise UserNotExists\n self.new_users[user] = self._encrypt_password(password) + '\\n'\n", "role": "user" }, { "content": "change_password", "role": "assistant" } ]
def x(self, password): if self.encryption_mode.lower() == 'crypt': return self._crypt_password(password) elif self.encryption_mode.lower() == 'md5': return self._md5_password(password) elif self.encryption_mode.lower() == 'md5-base': return self._md5_base_password(password) else: raise UnknownEncryptionMode(self.encryption_mode)
encrypt_password
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, password):\n if self.encryption_mode.lower() == 'crypt':\n return self._crypt_password(password)\n elif self.encryption_mode.lower() == 'md5':\n return self._md5_password(password)\n elif self.encryption_mode.lower() == 'md5-base':\n return self._md5_base_password(password)\n else:\n raise UnknownEncryptionMode(self.encryption_mode)\n", "role": "user" }, { "content": "encrypt_password", "role": "assistant" } ]
def x(self, password): def x(): symbols = ascii_letters + digits return choice(symbols) + choice(symbols) return crypt(password, salt())
crypt_password
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, password):\n\n def x():\n symbols = ascii_letters + digits\n return choice(symbols) + choice(symbols)\n return crypt(password, salt())\n", "role": "user" }, { "content": "crypt_password", "role": "assistant" } ]
def x(self, user, group): if self.is_user_in(user, group): raise UserAlreadyInAGroup self.new_groups.add(group, user)
add_user
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, user, group):\n if self.is_user_in(user, group):\n raise UserAlreadyInAGroup\n self.new_groups.add(group, user)\n", "role": "user" }, { "content": "add_user", "role": "assistant" } ]
def x(self, user, group): if not self.__contains__(group): raise GroupNotExists if not self.is_user_in(user, group): raise UserNotInAGroup self.new_groups.popvalue(group, user)
delete_user
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, user, group):\n if not self.__contains__(group):\n raise GroupNotExists\n if not self.is_user_in(user, group):\n raise UserNotInAGroup\n self.new_groups.popvalue(group, user)\n", "role": "user" }, { "content": "delete_user", "role": "assistant" } ]
def x(global_conf, **local_conf): conf = global_conf.copy() conf.update(local_conf) def x(app): return Swauth(app, conf) return auth_filter
filter_factory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(global_conf, **local_conf):\n conf = global_conf.copy()\n conf.update(local_conf)\n\n def x(app):\n return Swauth(app, conf)\n return auth_filter\n", "role": "user" }, { "content": "filter_factory", "role": "assistant" } ]
def x(self, env, method=None, path=None, body=None, headers=None): if self.default_storage_policy: sp = self.default_storage_policy if headers: headers.update({'X-Storage-Policy': sp}) else: headers = {'X-Storage-Policy': sp} subreq = swift.common.wsgi.make_pre_authed_request(env, method=method, path=path, body=body, headers=headers, agent=self.agent) subreq.environ['swift.source'] = self.swift_source return subreq
make_pre_authed_request
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, env, method=None, path=None, body=None, headers=None):\n if self.default_storage_policy:\n sp = self.default_storage_policy\n if headers:\n headers.update({'X-Storage-Policy': sp})\n else:\n headers = {'X-Storage-Policy': sp}\n subreq = swift.common.wsgi.make_pre_authed_request(env, method=method,\n path=path, body=body, headers=headers, agent=self.agent)\n subreq.environ['swift.source'] = self.swift_source\n return subreq\n", "role": "user" }, { "content": "make_pre_authed_request", "role": "assistant" } ]
def x(self, token): enc_key = '%s:%s:%s' % (HASH_PATH_PREFIX, token, HASH_PATH_SUFFIX) return sha512(enc_key).hexdigest()
get_concealed_token
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, token):\n enc_key = '%s:%s:%s' % (HASH_PATH_PREFIX, token, HASH_PATH_SUFFIX)\n return sha512(enc_key).hexdigest()\n", "role": "user" }, { "content": "get_concealed_token", "role": "assistant" } ]
def x(self, env, token): groups = None memcache_client = cache_from_env(env) if memcache_client: memcache_key = '%s/auth/%s' % (self.reseller_prefix, token) cached_auth_data = memcache_client.get(memcache_key) if cached_auth_data: expires, groups = cached_auth_data if expires < time(): groups = None s3_auth_details = env.get('swift3.auth_details') if s3_auth_details: if not self.s3_support: self.logger.warning('S3 support is disabled in swauth.') return None if self.swauth_remote: self.logger.warning( 'S3-style authorization not supported yet with swauth_remote mode.' ) return None try: account, user = s3_auth_details['access_key'].split(':', 1) signature_from_user = s3_auth_details['signature'] msg = s3_auth_details['string_to_sign'] except Exception: self.logger.debug( 'Swauth cannot parse swift3.auth_details value %r' % ( s3_auth_details,)) return None path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user)) resp = self.make_pre_authed_request(env, 'GET', path).get_response(self .app) if resp.status_int // 100 != 2: return None if 'x-object-meta-account-id' in resp.headers: account_id = resp.headers['x-object-meta-account-id'] else: path = quote('/v1/%s/%s' % (self.auth_account, account)) resp2 = self.make_pre_authed_request(env, 'HEAD', path ).get_response(self.app) if resp2.status_int // 100 != 2: return None account_id = resp2.headers['x-container-meta-account-id'] path = env['PATH_INFO'] env['PATH_INFO'] = path.replace('%s:%s' % (account, user), account_id, 1) detail = json.loads(resp.body) if detail: creds = detail.get('auth') try: auth_encoder, creds_dict = swauth.authtypes.validate_creds( creds) except ValueError as e: self.logger.error('%s' % e.args[0]) return None password = creds_dict['hash'] if isinstance(password, six.text_type): password = password.encode('utf-8') if isinstance(msg, six.text_type): msg = msg.encode('utf-8') valid_signature = base64.encodestring(hmac.new(password, msg, sha1) .digest()).strip() if signature_from_user != valid_signature: return None groups = [g['name'] for g in detail['groups']] if '.admin' in groups: groups.remove('.admin') groups.append(account_id) groups = ','.join(groups) return groups if not groups: if self.swauth_remote: with Timeout(self.swauth_remote_timeout): conn = http_connect(self.swauth_remote_parsed.hostname, self.swauth_remote_parsed.port, 'GET', '%s/v2/.token/%s' % (self.swauth_remote_parsed.path, quote(token)), ssl=self.swauth_remote_parsed.scheme == 'https') resp = conn.getresponse() resp.read() conn.close() if resp.status // 100 != 2: return None expires_from_now = float(resp.getheader('x-auth-ttl')) groups = resp.getheader('x-auth-groups') if memcache_client: memcache_client.set(memcache_key, (time() + expires_from_now, groups), time=expires_from_now) else: object_name = self._get_concealed_token(token) path = quote('/v1/%s/.token_%s/%s' % (self.auth_account, object_name[-1], object_name)) resp = self.make_pre_authed_request(env, 'GET', path).get_response( self.app) if resp.status_int // 100 != 2: return None detail = json.loads(resp.body) if detail['expires'] < time(): self.make_pre_authed_request(env, 'DELETE', path).get_response( self.app) return None groups = [g['name'] for g in detail['groups']] if '.admin' in groups: groups.remove('.admin') groups.append(detail['account_id']) groups = ','.join(groups) if memcache_client: memcache_client.set(memcache_key, (detail['expires'], groups), time=float(detail['expires'] - time())) return groups
get_groups
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, env, token):\n groups = None\n memcache_client = cache_from_env(env)\n if memcache_client:\n memcache_key = '%s/auth/%s' % (self.reseller_prefix, token)\n cached_auth_data = memcache_client.get(memcache_key)\n if cached_auth_data:\n expires, groups = cached_auth_data\n if expires < time():\n groups = None\n s3_auth_details = env.get('swift3.auth_details')\n if s3_auth_details:\n if not self.s3_support:\n self.logger.warning('S3 support is disabled in swauth.')\n return None\n if self.swauth_remote:\n self.logger.warning(\n 'S3-style authorization not supported yet with swauth_remote mode.'\n )\n return None\n try:\n account, user = s3_auth_details['access_key'].split(':', 1)\n signature_from_user = s3_auth_details['signature']\n msg = s3_auth_details['string_to_sign']\n except Exception:\n self.logger.debug(\n 'Swauth cannot parse swift3.auth_details value %r' % (\n s3_auth_details,))\n return None\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(env, 'GET', path).get_response(self\n .app)\n if resp.status_int // 100 != 2:\n return None\n if 'x-object-meta-account-id' in resp.headers:\n account_id = resp.headers['x-object-meta-account-id']\n else:\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp2 = self.make_pre_authed_request(env, 'HEAD', path\n ).get_response(self.app)\n if resp2.status_int // 100 != 2:\n return None\n account_id = resp2.headers['x-container-meta-account-id']\n path = env['PATH_INFO']\n env['PATH_INFO'] = path.replace('%s:%s' % (account, user),\n account_id, 1)\n detail = json.loads(resp.body)\n if detail:\n creds = detail.get('auth')\n try:\n auth_encoder, creds_dict = swauth.authtypes.validate_creds(\n creds)\n except ValueError as e:\n self.logger.error('%s' % e.args[0])\n return None\n password = creds_dict['hash']\n if isinstance(password, six.text_type):\n password = password.encode('utf-8')\n if isinstance(msg, six.text_type):\n msg = msg.encode('utf-8')\n valid_signature = base64.encodestring(hmac.new(password, msg, sha1)\n .digest()).strip()\n if signature_from_user != valid_signature:\n return None\n groups = [g['name'] for g in detail['groups']]\n if '.admin' in groups:\n groups.remove('.admin')\n groups.append(account_id)\n groups = ','.join(groups)\n return groups\n if not groups:\n if self.swauth_remote:\n with Timeout(self.swauth_remote_timeout):\n conn = http_connect(self.swauth_remote_parsed.hostname,\n self.swauth_remote_parsed.port, 'GET', \n '%s/v2/.token/%s' % (self.swauth_remote_parsed.path,\n quote(token)), ssl=self.swauth_remote_parsed.scheme ==\n 'https')\n resp = conn.getresponse()\n resp.read()\n conn.close()\n if resp.status // 100 != 2:\n return None\n expires_from_now = float(resp.getheader('x-auth-ttl'))\n groups = resp.getheader('x-auth-groups')\n if memcache_client:\n memcache_client.set(memcache_key, (time() +\n expires_from_now, groups), time=expires_from_now)\n else:\n object_name = self._get_concealed_token(token)\n path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,\n object_name[-1], object_name))\n resp = self.make_pre_authed_request(env, 'GET', path).get_response(\n self.app)\n if resp.status_int // 100 != 2:\n return None\n detail = json.loads(resp.body)\n if detail['expires'] < time():\n self.make_pre_authed_request(env, 'DELETE', path).get_response(\n self.app)\n return None\n groups = [g['name'] for g in detail['groups']]\n if '.admin' in groups:\n groups.remove('.admin')\n groups.append(detail['account_id'])\n groups = ','.join(groups)\n if memcache_client:\n memcache_client.set(memcache_key, (detail['expires'],\n groups), time=float(detail['expires'] - time()))\n return groups\n", "role": "user" }, { "content": "get_groups", "role": "assistant" } ]
def x(self, req): try: version, account, container, obj = split_path(req.path, 1, 4, True) except ValueError: return HTTPNotFound(request=req) if not account or not account.startswith(self.reseller_prefix): return self.denied_response(req) user_groups = (req.remote_user or '').split(',') if ('.reseller_admin' in user_groups and account != self. reseller_prefix and account[len(self.reseller_prefix)] != '.'): req.environ['swift_owner'] = True return None if account in user_groups and (req.method not in ('DELETE', 'PUT') or container): req.environ['swift_owner'] = True return None if req.environ.get('swift_sync_key') and req.environ['swift_sync_key' ] == req.headers.get('x-container-sync-key', None ) and 'x-timestamp' in req.headers and (req.remote_addr in self. allowed_sync_hosts or get_remote_client(req) in self.allowed_sync_hosts ): return None referrers, groups = parse_acl(getattr(req, 'acl', None)) if referrer_allowed(req.referer, referrers): if obj or '.rlistings' in groups: return None return self.denied_response(req) if not req.remote_user: return self.denied_response(req) for user_group in user_groups: if user_group in groups: return None return self.denied_response(req)
authorize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n try:\n version, account, container, obj = split_path(req.path, 1, 4, True)\n except ValueError:\n return HTTPNotFound(request=req)\n if not account or not account.startswith(self.reseller_prefix):\n return self.denied_response(req)\n user_groups = (req.remote_user or '').split(',')\n if ('.reseller_admin' in user_groups and account != self.\n reseller_prefix and account[len(self.reseller_prefix)] != '.'):\n req.environ['swift_owner'] = True\n return None\n if account in user_groups and (req.method not in ('DELETE', 'PUT') or\n container):\n req.environ['swift_owner'] = True\n return None\n if req.environ.get('swift_sync_key') and req.environ['swift_sync_key'\n ] == req.headers.get('x-container-sync-key', None\n ) and 'x-timestamp' in req.headers and (req.remote_addr in self.\n allowed_sync_hosts or get_remote_client(req) in self.allowed_sync_hosts\n ):\n return None\n referrers, groups = parse_acl(getattr(req, 'acl', None))\n if referrer_allowed(req.referer, referrers):\n if obj or '.rlistings' in groups:\n return None\n return self.denied_response(req)\n if not req.remote_user:\n return self.denied_response(req)\n for user_group in user_groups:\n if user_group in groups:\n return None\n return self.denied_response(req)\n", "role": "user" }, { "content": "authorize", "role": "assistant" } ]
def x(self, req): if not hasattr(req, 'credentials_valid'): req.credentials_valid = None if req.remote_user or req.credentials_valid: return HTTPForbidden(request=req) else: return HTTPUnauthorized(request=req)
denied_response
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n if not hasattr(req, 'credentials_valid'):\n req.credentials_valid = None\n if req.remote_user or req.credentials_valid:\n return HTTPForbidden(request=req)\n else:\n return HTTPUnauthorized(request=req)\n", "role": "user" }, { "content": "denied_response", "role": "assistant" } ]
def x(self, env, start_response): try: req = Request(env) if self.auth_prefix: req.path_info_pop() req.bytes_transferred = '-' req.client_disconnect = False if ('x-storage-token' in req.headers and 'x-auth-token' not in req. headers): req.headers['x-auth-token'] = req.headers['x-storage-token'] if 'eventlet.posthooks' in env: env['eventlet.posthooks'].append((self.posthooklogger, (req,), {})) return self.handle_request(req)(env, start_response) else: response = self.handle_request(req)(env, start_response) self.posthooklogger(env, req) return response except (Exception, TimeoutError): print('EXCEPTION IN handle: %s: %s' % (format_exc(), env)) start_response('500 Server Error', [('Content-Type', 'text/plain')]) return ['Internal server error.\n']
handle
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, env, start_response):\n try:\n req = Request(env)\n if self.auth_prefix:\n req.path_info_pop()\n req.bytes_transferred = '-'\n req.client_disconnect = False\n if ('x-storage-token' in req.headers and 'x-auth-token' not in req.\n headers):\n req.headers['x-auth-token'] = req.headers['x-storage-token']\n if 'eventlet.posthooks' in env:\n env['eventlet.posthooks'].append((self.posthooklogger, (req,), {}))\n return self.handle_request(req)(env, start_response)\n else:\n response = self.handle_request(req)(env, start_response)\n self.posthooklogger(env, req)\n return response\n except (Exception, TimeoutError):\n print('EXCEPTION IN handle: %s: %s' % (format_exc(), env))\n start_response('500 Server Error', [('Content-Type', 'text/plain')])\n return ['Internal server error.\\n']\n", "role": "user" }, { "content": "handle", "role": "assistant" } ]
def x(self, req): req.start_time = time() handler = None try: version, account, user, _junk = split_path(req.path_info, minsegs=0, maxsegs=4, rest_with_last=True) except ValueError: return HTTPNotFound(request=req) if version in ('v1', 'v1.0', 'auth'): if req.method == 'GET': handler = self.handle_get_token elif version == 'v2': if not self.super_admin_key: return HTTPNotFound(request=req) req.path_info_pop() if req.method == 'GET': if not account and not user: handler = self.handle_get_reseller elif account: if not user: handler = self.handle_get_account elif account == '.token': req.path_info_pop() handler = self.handle_validate_token else: handler = self.handle_get_user elif req.method == 'PUT': if not user: handler = self.handle_put_account else: handler = self.handle_put_user elif req.method == 'DELETE': if not user: handler = self.handle_delete_account else: handler = self.handle_delete_user elif req.method == 'POST': if account == '.prep': handler = self.handle_prep elif user == '.services': handler = self.handle_set_services else: handler = self.handle_webadmin if not handler: req.response = HTTPBadRequest(request=req) else: req.response = handler(req) return req.response
handle_request
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n req.start_time = time()\n handler = None\n try:\n version, account, user, _junk = split_path(req.path_info, minsegs=0,\n maxsegs=4, rest_with_last=True)\n except ValueError:\n return HTTPNotFound(request=req)\n if version in ('v1', 'v1.0', 'auth'):\n if req.method == 'GET':\n handler = self.handle_get_token\n elif version == 'v2':\n if not self.super_admin_key:\n return HTTPNotFound(request=req)\n req.path_info_pop()\n if req.method == 'GET':\n if not account and not user:\n handler = self.handle_get_reseller\n elif account:\n if not user:\n handler = self.handle_get_account\n elif account == '.token':\n req.path_info_pop()\n handler = self.handle_validate_token\n else:\n handler = self.handle_get_user\n elif req.method == 'PUT':\n if not user:\n handler = self.handle_put_account\n else:\n handler = self.handle_put_user\n elif req.method == 'DELETE':\n if not user:\n handler = self.handle_delete_account\n else:\n handler = self.handle_delete_user\n elif req.method == 'POST':\n if account == '.prep':\n handler = self.handle_prep\n elif user == '.services':\n handler = self.handle_set_services\n else:\n handler = self.handle_webadmin\n if not handler:\n req.response = HTTPBadRequest(request=req)\n else:\n req.response = handler(req)\n return req.response\n", "role": "user" }, { "content": "handle_request", "role": "assistant" } ]
def x(self, req): if not self.is_super_admin(req): return self.denied_response(req) path = quote('/v1/%s' % self.auth_account) resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response( self.app) if resp.status_int // 100 != 2: raise Exception('Could not create the main auth account: %s %s' % ( path, resp.status)) path = quote('/v1/%s/.account_id' % self.auth_account) resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response( self.app) if resp.status_int // 100 != 2: raise Exception('Could not create container: %s %s' % (path, resp. status)) for container in xrange(16): path = quote('/v1/%s/.token_%x' % (self.auth_account, container)) resp = self.make_pre_authed_request(req.environ, 'PUT', path ).get_response(self.app) if resp.status_int // 100 != 2: raise Exception('Could not create container: %s %s' % (path, resp.status)) return HTTPNoContent(request=req)
handle_prep
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n if not self.is_super_admin(req):\n return self.denied_response(req)\n path = quote('/v1/%s' % self.auth_account)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response(\n self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create the main auth account: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/.account_id' % self.auth_account)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path).get_response(\n self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create container: %s %s' % (path, resp.\n status))\n for container in xrange(16):\n path = quote('/v1/%s/.token_%x' % (self.auth_account, container))\n resp = self.make_pre_authed_request(req.environ, 'PUT', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create container: %s %s' % (path,\n resp.status))\n return HTTPNoContent(request=req)\n", "role": "user" }, { "content": "handle_prep", "role": "assistant" } ]
def x(self, req): if not self.is_reseller_admin(req): return self.denied_response(req) listing = [] marker = '' while True: path = '/v1/%s?format=json&marker=%s' % (quote(self.auth_account), quote(marker)) resp = self.make_pre_authed_request(req.environ, 'GET', path ).get_response(self.app) if resp.status_int // 100 != 2: raise Exception('Could not list main auth account: %s %s' % ( path, resp.status)) sublisting = json.loads(resp.body) if not sublisting: break for container in sublisting: if container['name'][0] != '.': listing.append({'name': container['name']}) marker = sublisting[-1]['name'].encode('utf-8') return Response(body=json.dumps({'accounts': listing}), content_type= CONTENT_TYPE_JSON)
handle_get_reseller
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n listing = []\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote(self.auth_account),\n quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not list main auth account: %s %s' % (\n path, resp.status))\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for container in sublisting:\n if container['name'][0] != '.':\n listing.append({'name': container['name']})\n marker = sublisting[-1]['name'].encode('utf-8')\n return Response(body=json.dumps({'accounts': listing}), content_type=\n CONTENT_TYPE_JSON)\n", "role": "user" }, { "content": "handle_get_reseller", "role": "assistant" } ]
def x(self, req): account = req.path_info_pop() if req.path_info or not account or account[0] == '.': return HTTPBadRequest(request=req) if not self.is_account_admin(req, account): return self.denied_response(req) path = quote('/v1/%s/%s/.services' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response( self.app) if resp.status_int == 404: return HTTPNotFound(request=req) if resp.status_int // 100 != 2: raise Exception('Could not obtain the .services object: %s %s' % ( path, resp.status)) services = json.loads(resp.body) listing = [] marker = '' while True: path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self. auth_account, account)), quote(marker)) resp = self.make_pre_authed_request(req.environ, 'GET', path ).get_response(self.app) if resp.status_int == 404: return HTTPNotFound(request=req) if resp.status_int // 100 != 2: raise Exception('Could not list in main auth account: %s %s' % (path, resp.status)) account_id = resp.headers['X-Container-Meta-Account-Id'] sublisting = json.loads(resp.body) if not sublisting: break for obj in sublisting: if obj['name'][0] != '.': listing.append({'name': obj['name']}) marker = sublisting[-1]['name'].encode('utf-8') return Response(content_type=CONTENT_TYPE_JSON, body=json.dumps({ 'account_id': account_id, 'services': services, 'users': listing}))
handle_get_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n account = req.path_info_pop()\n if req.path_info or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n if not self.is_account_admin(req, account):\n return self.denied_response(req)\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not obtain the .services object: %s %s' % (\n path, resp.status))\n services = json.loads(resp.body)\n listing = []\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.\n auth_account, account)), quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not list in main auth account: %s %s' %\n (path, resp.status))\n account_id = resp.headers['X-Container-Meta-Account-Id']\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for obj in sublisting:\n if obj['name'][0] != '.':\n listing.append({'name': obj['name']})\n marker = sublisting[-1]['name'].encode('utf-8')\n return Response(content_type=CONTENT_TYPE_JSON, body=json.dumps({\n 'account_id': account_id, 'services': services, 'users': listing}))\n", "role": "user" }, { "content": "handle_get_account", "role": "assistant" } ]
def x(self, req): if not self.is_reseller_admin(req): return self.denied_response(req) account = req.path_info_pop() if req.path_info != '/.services' or not account or account[0] == '.': return HTTPBadRequest(request=req) try: new_services = json.loads(req.body) except ValueError as err: return HTTPBadRequest(body=str(err)) path = quote('/v1/%s/%s/.services' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response( self.app) if resp.status_int == 404: return HTTPNotFound(request=req) if resp.status_int // 100 != 2: raise Exception('Could not obtain services info: %s %s' % (path, resp.status)) services = json.loads(resp.body) for new_service, value in new_services.iteritems(): if new_service in services: services[new_service].update(value) else: services[new_service] = value services = json.dumps(services) resp = self.make_pre_authed_request(req.environ, 'PUT', path, services ).get_response(self.app) if resp.status_int // 100 != 2: raise Exception('Could not save .services object: %s %s' % (path, resp.status)) return Response(request=req, body=services, content_type=CONTENT_TYPE_JSON)
handle_set_services
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n account = req.path_info_pop()\n if req.path_info != '/.services' or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n try:\n new_services = json.loads(req.body)\n except ValueError as err:\n return HTTPBadRequest(body=str(err))\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not obtain services info: %s %s' % (path,\n resp.status))\n services = json.loads(resp.body)\n for new_service, value in new_services.iteritems():\n if new_service in services:\n services[new_service].update(value)\n else:\n services[new_service] = value\n services = json.dumps(services)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, services\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not save .services object: %s %s' % (path,\n resp.status))\n return Response(request=req, body=services, content_type=CONTENT_TYPE_JSON)\n", "role": "user" }, { "content": "handle_set_services", "role": "assistant" } ]
def x(self, req): if not self.is_reseller_admin(req): return self.denied_response(req) account = req.path_info_pop() if req.path_info or not account or account[0] == '.': return HTTPBadRequest(request=req) account_suffix = req.headers.get('x-account-suffix') if not account_suffix: account_suffix = str(uuid4()) path = quote('%s/%s%s' % (self.dsc_parsed2.path, self.reseller_prefix, account_suffix)) try: conn = self.get_conn() conn.request('PUT', path, headers={'X-Auth-Token': self.get_itoken( req.environ), 'Content-Length': '0'}) resp = conn.getresponse() resp.read() if resp.status // 100 != 2: raise Exception( 'Could not create account on the Swift cluster: %s %s %s' % (path, resp.status, resp.reason)) except (Exception, TimeoutError): self.logger.error(_( 'ERROR: Exception while trying to communicate with %(scheme)s://%(host)s:%(port)s/%(path)s' ), {'scheme': self.dsc_parsed2.scheme, 'host': self.dsc_parsed2 .hostname, 'port': self.dsc_parsed2.port, 'path': path}) raise path = quote('/v1/%s/%s' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'HEAD', path ).get_response(self.app) if resp.status_int == 404: resp = self.make_pre_authed_request(req.environ, 'PUT', path ).get_response(self.app) if resp.status_int // 100 != 2: raise Exception( 'Could not create account within main auth account: %s %s' % (path, resp.status)) elif resp.status_int // 100 == 2: if 'x-container-meta-account-id' in resp.headers: return HTTPAccepted(request=req) else: raise Exception( 'Could not verify account within main auth account: %s %s' % ( path, resp.status)) path = quote('/v1/%s/.account_id/%s%s' % (self.auth_account, self. reseller_prefix, account_suffix)) resp = self.make_pre_authed_request(req.environ, 'PUT', path, account ).get_response(self.app) if resp.status_int // 100 != 2: raise Exception('Could not create account id mapping: %s %s' % ( path, resp.status)) path = quote('/v1/%s/%s/.services' % (self.auth_account, account)) services = {'storage': {}} services['storage'][self.dsc_name] = '%s/%s%s' % (self.dsc_url, self. reseller_prefix, account_suffix) services['storage']['default'] = self.dsc_name resp = self.make_pre_authed_request(req.environ, 'PUT', path, json. dumps(services)).get_response(self.app) if resp.status_int // 100 != 2: raise Exception('Could not create .services object: %s %s' % (path, resp.status)) path = quote('/v1/%s/%s' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'POST', path, headers= {'X-Container-Meta-Account-Id': '%s%s' % (self.reseller_prefix, account_suffix)}).get_response(self.app) if resp.status_int // 100 != 2: raise Exception( 'Could not record the account id on the account: %s %s' % (path, resp.status)) return HTTPCreated(request=req)
handle_put_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n account = req.path_info_pop()\n if req.path_info or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n account_suffix = req.headers.get('x-account-suffix')\n if not account_suffix:\n account_suffix = str(uuid4())\n path = quote('%s/%s%s' % (self.dsc_parsed2.path, self.reseller_prefix,\n account_suffix))\n try:\n conn = self.get_conn()\n conn.request('PUT', path, headers={'X-Auth-Token': self.get_itoken(\n req.environ), 'Content-Length': '0'})\n resp = conn.getresponse()\n resp.read()\n if resp.status // 100 != 2:\n raise Exception(\n 'Could not create account on the Swift cluster: %s %s %s' %\n (path, resp.status, resp.reason))\n except (Exception, TimeoutError):\n self.logger.error(_(\n 'ERROR: Exception while trying to communicate with %(scheme)s://%(host)s:%(port)s/%(path)s'\n ), {'scheme': self.dsc_parsed2.scheme, 'host': self.dsc_parsed2\n .hostname, 'port': self.dsc_parsed2.port, 'path': path})\n raise\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'HEAD', path\n ).get_response(self.app)\n if resp.status_int == 404:\n resp = self.make_pre_authed_request(req.environ, 'PUT', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception(\n 'Could not create account within main auth account: %s %s' %\n (path, resp.status))\n elif resp.status_int // 100 == 2:\n if 'x-container-meta-account-id' in resp.headers:\n return HTTPAccepted(request=req)\n else:\n raise Exception(\n 'Could not verify account within main auth account: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/.account_id/%s%s' % (self.auth_account, self.\n reseller_prefix, account_suffix))\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, account\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create account id mapping: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n services = {'storage': {}}\n services['storage'][self.dsc_name] = '%s/%s%s' % (self.dsc_url, self.\n reseller_prefix, account_suffix)\n services['storage']['default'] = self.dsc_name\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, json.\n dumps(services)).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create .services object: %s %s' % (path,\n resp.status))\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'POST', path, headers=\n {'X-Container-Meta-Account-Id': '%s%s' % (self.reseller_prefix,\n account_suffix)}).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception(\n 'Could not record the account id on the account: %s %s' % (path,\n resp.status))\n return HTTPCreated(request=req)\n", "role": "user" }, { "content": "handle_put_account", "role": "assistant" } ]
def x(self, req): if not self.is_reseller_admin(req): return self.denied_response(req) account = req.path_info_pop() if req.path_info or not account or account[0] == '.': return HTTPBadRequest(request=req) marker = '' while True: path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self. auth_account, account)), quote(marker)) resp = self.make_pre_authed_request(req.environ, 'GET', path ).get_response(self.app) if resp.status_int == 404: return HTTPNotFound(request=req) if resp.status_int // 100 != 2: raise Exception('Could not list in main auth account: %s %s' % (path, resp.status)) account_id = resp.headers['x-container-meta-account-id'] sublisting = json.loads(resp.body) if not sublisting: break for obj in sublisting: if obj['name'][0] != '.': return HTTPConflict(request=req) marker = sublisting[-1]['name'].encode('utf-8') path = quote('/v1/%s/%s/.services' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response( self.app) if resp.status_int // 100 != 2 and resp.status_int != 404: raise Exception('Could not obtain .services object: %s %s' % (path, resp.status)) if resp.status_int // 100 == 2: services = json.loads(resp.body) deleted_any = False for name, url in services['storage'].iteritems(): if name != 'default': parsed = urlparse(url) conn = self.get_conn(parsed) conn.request('DELETE', parsed.path, headers={'X-Auth-Token': self.get_itoken(req.environ)}) resp = conn.getresponse() resp.read() if resp.status == 409: if deleted_any: raise Exception( 'Managed to delete one or more service end points, but failed with: %s %s %s' % (url, resp.status, resp.reason)) else: return HTTPConflict(request=req) if resp.status // 100 != 2 and resp.status != 404: raise Exception( 'Could not delete account on the Swift cluster: %s %s %s' % (url, resp.status, resp.reason)) deleted_any = True path = quote('/v1/%s/%s/.services' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'DELETE', path ).get_response(self.app) if resp.status_int // 100 != 2 and resp.status_int != 404: raise Exception('Could not delete .services object: %s %s' % ( path, resp.status)) path = quote('/v1/%s/.account_id/%s' % (self.auth_account, account_id)) resp = self.make_pre_authed_request(req.environ, 'DELETE', path ).get_response(self.app) if resp.status_int // 100 != 2 and resp.status_int != 404: raise Exception('Could not delete account id mapping: %s %s' % ( path, resp.status)) path = quote('/v1/%s/%s' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'DELETE', path ).get_response(self.app) if resp.status_int // 100 != 2 and resp.status_int != 404: raise Exception('Could not delete account marked: %s %s' % (path, resp.status)) return HTTPNoContent(request=req)
handle_delete_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n if not self.is_reseller_admin(req):\n return self.denied_response(req)\n account = req.path_info_pop()\n if req.path_info or not account or account[0] == '.':\n return HTTPBadRequest(request=req)\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.\n auth_account, account)), quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not list in main auth account: %s %s' %\n (path, resp.status))\n account_id = resp.headers['x-container-meta-account-id']\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for obj in sublisting:\n if obj['name'][0] != '.':\n return HTTPConflict(request=req)\n marker = sublisting[-1]['name'].encode('utf-8')\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not obtain .services object: %s %s' % (path,\n resp.status))\n if resp.status_int // 100 == 2:\n services = json.loads(resp.body)\n deleted_any = False\n for name, url in services['storage'].iteritems():\n if name != 'default':\n parsed = urlparse(url)\n conn = self.get_conn(parsed)\n conn.request('DELETE', parsed.path, headers={'X-Auth-Token':\n self.get_itoken(req.environ)})\n resp = conn.getresponse()\n resp.read()\n if resp.status == 409:\n if deleted_any:\n raise Exception(\n 'Managed to delete one or more service end points, but failed with: %s %s %s'\n % (url, resp.status, resp.reason))\n else:\n return HTTPConflict(request=req)\n if resp.status // 100 != 2 and resp.status != 404:\n raise Exception(\n 'Could not delete account on the Swift cluster: %s %s %s'\n % (url, resp.status, resp.reason))\n deleted_any = True\n path = quote('/v1/%s/%s/.services' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete .services object: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/.account_id/%s' % (self.auth_account, account_id))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete account id mapping: %s %s' % (\n path, resp.status))\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete account marked: %s %s' % (path,\n resp.status))\n return HTTPNoContent(request=req)\n", "role": "user" }, { "content": "handle_delete_account", "role": "assistant" } ]
def x(self, req): account = req.path_info_pop() user = req.path_info_pop() if req.path_info or not account or account[0] == '.' or not user or user[0 ] == '.' and user != '.groups': return HTTPBadRequest(request=req) if not self.is_account_admin(req, account): return self.denied_response(req) if user == '.groups': groups = set() marker = '' while True: path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self. auth_account, account)), quote(marker)) resp = self.make_pre_authed_request(req.environ, 'GET', path ).get_response(self.app) if resp.status_int == 404: return HTTPNotFound(request=req) if resp.status_int // 100 != 2: raise Exception( 'Could not list in main auth account: %s %s' % (path, resp.status)) sublisting = json.loads(resp.body) if not sublisting: break for obj in sublisting: if obj['name'][0] != '.': user_json = self.get_user_detail(req, account, obj['name']) if user_json is None: raise Exception( 'Could not retrieve user object: %s:%s %s' % ( account, user, 404)) groups.update(g['name'] for g in json.loads(user_json)[ 'groups']) marker = sublisting[-1]['name'].encode('utf-8') body = json.dumps({'groups': [{'name': g} for g in sorted(groups)]}) else: body = self.get_user_detail(req, account, user) if body is None: return HTTPNotFound(request=req) display_groups = [g['name'] for g in json.loads(body)['groups']] if '.admin' in display_groups and not self.is_reseller_admin(req ) or '.reseller_admin' in display_groups and not self.is_super_admin( req): return self.denied_response(req) return Response(body=body, content_type=CONTENT_TYPE_JSON)
handle_get_user
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n account = req.path_info_pop()\n user = req.path_info_pop()\n if req.path_info or not account or account[0] == '.' or not user or user[0\n ] == '.' and user != '.groups':\n return HTTPBadRequest(request=req)\n if not self.is_account_admin(req, account):\n return self.denied_response(req)\n if user == '.groups':\n groups = set()\n marker = ''\n while True:\n path = '/v1/%s?format=json&marker=%s' % (quote('%s/%s' % (self.\n auth_account, account)), quote(marker))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception(\n 'Could not list in main auth account: %s %s' % (path,\n resp.status))\n sublisting = json.loads(resp.body)\n if not sublisting:\n break\n for obj in sublisting:\n if obj['name'][0] != '.':\n user_json = self.get_user_detail(req, account, obj['name'])\n if user_json is None:\n raise Exception(\n 'Could not retrieve user object: %s:%s %s' % (\n account, user, 404))\n groups.update(g['name'] for g in json.loads(user_json)[\n 'groups'])\n marker = sublisting[-1]['name'].encode('utf-8')\n body = json.dumps({'groups': [{'name': g} for g in sorted(groups)]})\n else:\n body = self.get_user_detail(req, account, user)\n if body is None:\n return HTTPNotFound(request=req)\n display_groups = [g['name'] for g in json.loads(body)['groups']]\n if '.admin' in display_groups and not self.is_reseller_admin(req\n ) or '.reseller_admin' in display_groups and not self.is_super_admin(\n req):\n return self.denied_response(req)\n return Response(body=body, content_type=CONTENT_TYPE_JSON)\n", "role": "user" }, { "content": "handle_get_user", "role": "assistant" } ]
def x(self, req): account = req.path_info_pop() user = req.path_info_pop() key = unquote(req.headers.get('x-auth-user-key', '')) key_hash = unquote(req.headers.get('x-auth-user-key-hash', '')) admin = req.headers.get('x-auth-user-admin') == 'true' reseller_admin = req.headers.get('x-auth-user-reseller-admin') == 'true' if reseller_admin: admin = True if req.path_info or not account or account[0] == '.' or not user or user[0 ] == '.' or not key and not key_hash: return HTTPBadRequest(request=req) if key_hash: try: swauth.authtypes.validate_creds(key_hash) except ValueError: return HTTPBadRequest(request=req) user_arg = account + ':' + user if reseller_admin: if not self.is_super_admin(req) and not self.is_user_changing_own_key( req, user_arg): return self.denied_response(req) elif not self.is_account_admin(req, account ) and not self.is_user_changing_own_key(req, user_arg): return self.denied_response(req) path = quote('/v1/%s/%s' % (self.auth_account, account)) resp = self.make_pre_authed_request(req.environ, 'HEAD', path ).get_response(self.app) if resp.status_int // 100 != 2: raise Exception('Could not retrieve account id value: %s %s' % ( path, resp.status)) headers = {'X-Object-Meta-Account-Id': resp.headers[ 'x-container-meta-account-id']} path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user)) groups = ['%s:%s' % (account, user), account] if admin: groups.append('.admin') if reseller_admin: groups.append('.reseller_admin') auth_value = key_hash or self.auth_encoder().encode(key) resp = self.make_pre_authed_request(req.environ, 'PUT', path, json. dumps({'auth': auth_value, 'groups': [{'name': g} for g in groups]} ), headers=headers).get_response(self.app) if resp.status_int == 404: return HTTPNotFound(request=req) if resp.status_int // 100 != 2: raise Exception('Could not create user object: %s %s' % (path, resp .status)) return HTTPCreated(request=req)
handle_put_user
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n account = req.path_info_pop()\n user = req.path_info_pop()\n key = unquote(req.headers.get('x-auth-user-key', ''))\n key_hash = unquote(req.headers.get('x-auth-user-key-hash', ''))\n admin = req.headers.get('x-auth-user-admin') == 'true'\n reseller_admin = req.headers.get('x-auth-user-reseller-admin') == 'true'\n if reseller_admin:\n admin = True\n if req.path_info or not account or account[0] == '.' or not user or user[0\n ] == '.' or not key and not key_hash:\n return HTTPBadRequest(request=req)\n if key_hash:\n try:\n swauth.authtypes.validate_creds(key_hash)\n except ValueError:\n return HTTPBadRequest(request=req)\n user_arg = account + ':' + user\n if reseller_admin:\n if not self.is_super_admin(req) and not self.is_user_changing_own_key(\n req, user_arg):\n return self.denied_response(req)\n elif not self.is_account_admin(req, account\n ) and not self.is_user_changing_own_key(req, user_arg):\n return self.denied_response(req)\n path = quote('/v1/%s/%s' % (self.auth_account, account))\n resp = self.make_pre_authed_request(req.environ, 'HEAD', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n raise Exception('Could not retrieve account id value: %s %s' % (\n path, resp.status))\n headers = {'X-Object-Meta-Account-Id': resp.headers[\n 'x-container-meta-account-id']}\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n groups = ['%s:%s' % (account, user), account]\n if admin:\n groups.append('.admin')\n if reseller_admin:\n groups.append('.reseller_admin')\n auth_value = key_hash or self.auth_encoder().encode(key)\n resp = self.make_pre_authed_request(req.environ, 'PUT', path, json.\n dumps({'auth': auth_value, 'groups': [{'name': g} for g in groups]}\n ), headers=headers).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n if resp.status_int // 100 != 2:\n raise Exception('Could not create user object: %s %s' % (path, resp\n .status))\n return HTTPCreated(request=req)\n", "role": "user" }, { "content": "handle_put_user", "role": "assistant" } ]
def x(self, req): account = req.path_info_pop() user = req.path_info_pop() if req.path_info or not account or account[0] == '.' or not user or user[0 ] == '.': return HTTPBadRequest(request=req) is_reseller_admin = self.is_user_reseller_admin(req, account, user) if not is_reseller_admin and not req.credentials_valid: return HTTPNotFound(request=req) elif is_reseller_admin and not self.is_super_admin(req): return HTTPForbidden(request=req) if not self.is_account_admin(req, account): return self.denied_response(req) path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user)) resp = self.make_pre_authed_request(req.environ, 'HEAD', path ).get_response(self.app) if resp.status_int == 404: return HTTPNotFound(request=req) elif resp.status_int // 100 != 2: raise Exception('Could not obtain user details: %s %s' % (path, resp.status)) candidate_token = resp.headers.get('x-object-meta-auth-token') if candidate_token: object_name = self._get_concealed_token(candidate_token) path = quote('/v1/%s/.token_%s/%s' % (self.auth_account, object_name[-1], object_name)) resp = self.make_pre_authed_request(req.environ, 'DELETE', path ).get_response(self.app) if resp.status_int // 100 != 2 and resp.status_int != 404: raise Exception( 'Could not delete possibly existing token: %s %s' % (path, resp.status)) path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user)) resp = self.make_pre_authed_request(req.environ, 'DELETE', path ).get_response(self.app) if resp.status_int // 100 != 2 and resp.status_int != 404: raise Exception('Could not delete the user object: %s %s' % (path, resp.status)) return HTTPNoContent(request=req)
handle_delete_user
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n account = req.path_info_pop()\n user = req.path_info_pop()\n if req.path_info or not account or account[0] == '.' or not user or user[0\n ] == '.':\n return HTTPBadRequest(request=req)\n is_reseller_admin = self.is_user_reseller_admin(req, account, user)\n if not is_reseller_admin and not req.credentials_valid:\n return HTTPNotFound(request=req)\n elif is_reseller_admin and not self.is_super_admin(req):\n return HTTPForbidden(request=req)\n if not self.is_account_admin(req, account):\n return self.denied_response(req)\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(req.environ, 'HEAD', path\n ).get_response(self.app)\n if resp.status_int == 404:\n return HTTPNotFound(request=req)\n elif resp.status_int // 100 != 2:\n raise Exception('Could not obtain user details: %s %s' % (path,\n resp.status))\n candidate_token = resp.headers.get('x-object-meta-auth-token')\n if candidate_token:\n object_name = self._get_concealed_token(candidate_token)\n path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,\n object_name[-1], object_name))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception(\n 'Could not delete possibly existing token: %s %s' % (path,\n resp.status))\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2 and resp.status_int != 404:\n raise Exception('Could not delete the user object: %s %s' % (path,\n resp.status))\n return HTTPNoContent(request=req)\n", "role": "user" }, { "content": "handle_delete_user", "role": "assistant" } ]
def x(self, req, account, user): req.credentials_valid = True user_json = self.get_user_detail(req, account, user) if user_json is None: req.credentials_valid = False return False user_detail = json.loads(user_json) return '.reseller_admin' in (g['name'] for g in user_detail['groups'])
is_user_reseller_admin
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, account, user):\n req.credentials_valid = True\n user_json = self.get_user_detail(req, account, user)\n if user_json is None:\n req.credentials_valid = False\n return False\n user_detail = json.loads(user_json)\n return '.reseller_admin' in (g['name'] for g in user_detail['groups'])\n", "role": "user" }, { "content": "is_user_reseller_admin", "role": "assistant" } ]
def x(self, req): token = req.path_info_pop() if req.path_info or not token.startswith(self.reseller_prefix): return HTTPBadRequest(request=req) expires = groups = None memcache_client = cache_from_env(req.environ) if memcache_client: memcache_key = '%s/auth/%s' % (self.reseller_prefix, token) cached_auth_data = memcache_client.get(memcache_key) if cached_auth_data: expires, groups = cached_auth_data if expires < time(): groups = None if not groups: object_name = self._get_concealed_token(token) path = quote('/v1/%s/.token_%s/%s' % (self.auth_account, object_name[-1], object_name)) resp = self.make_pre_authed_request(req.environ, 'GET', path ).get_response(self.app) if resp.status_int // 100 != 2: return HTTPNotFound(request=req) detail = json.loads(resp.body) expires = detail['expires'] if expires < time(): self.make_pre_authed_request(req.environ, 'DELETE', path ).get_response(self.app) return HTTPNotFound(request=req) groups = [g['name'] for g in detail['groups']] if '.admin' in groups: groups.remove('.admin') groups.append(detail['account_id']) groups = ','.join(groups) return HTTPNoContent(headers={'X-Auth-TTL': expires - time(), 'X-Auth-Groups': groups})
handle_validate_token
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n token = req.path_info_pop()\n if req.path_info or not token.startswith(self.reseller_prefix):\n return HTTPBadRequest(request=req)\n expires = groups = None\n memcache_client = cache_from_env(req.environ)\n if memcache_client:\n memcache_key = '%s/auth/%s' % (self.reseller_prefix, token)\n cached_auth_data = memcache_client.get(memcache_key)\n if cached_auth_data:\n expires, groups = cached_auth_data\n if expires < time():\n groups = None\n if not groups:\n object_name = self._get_concealed_token(token)\n path = quote('/v1/%s/.token_%s/%s' % (self.auth_account,\n object_name[-1], object_name))\n resp = self.make_pre_authed_request(req.environ, 'GET', path\n ).get_response(self.app)\n if resp.status_int // 100 != 2:\n return HTTPNotFound(request=req)\n detail = json.loads(resp.body)\n expires = detail['expires']\n if expires < time():\n self.make_pre_authed_request(req.environ, 'DELETE', path\n ).get_response(self.app)\n return HTTPNotFound(request=req)\n groups = [g['name'] for g in detail['groups']]\n if '.admin' in groups:\n groups.remove('.admin')\n groups.append(detail['account_id'])\n groups = ','.join(groups)\n return HTTPNoContent(headers={'X-Auth-TTL': expires - time(),\n 'X-Auth-Groups': groups})\n", "role": "user" }, { "content": "handle_validate_token", "role": "assistant" } ]
def x(self, urlparsed=None): if not urlparsed: urlparsed = self.dsc_parsed2 if urlparsed.scheme == 'http': return HTTPConnection(urlparsed.netloc) else: return HTTPSConnection(urlparsed.netloc)
get_conn
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, urlparsed=None):\n if not urlparsed:\n urlparsed = self.dsc_parsed2\n if urlparsed.scheme == 'http':\n return HTTPConnection(urlparsed.netloc)\n else:\n return HTTPSConnection(urlparsed.netloc)\n", "role": "user" }, { "content": "get_conn", "role": "assistant" } ]
def x(self, env): if not self.itoken or self.itoken_expires < time() or env.get( 'HTTP_X_AUTH_NEW_TOKEN', 'false').lower() in TRUE_VALUES: self.itoken = '%sitk%s' % (self.reseller_prefix, uuid4().hex) memcache_key = '%s/auth/%s' % (self.reseller_prefix, self.itoken) self.itoken_expires = time() + self.token_life memcache_client = cache_from_env(env) if not memcache_client: raise Exception( 'No memcache set up; required for Swauth middleware') memcache_client.set(memcache_key, (self.itoken_expires, '.auth,.reseller_admin,%s.auth' % self.reseller_prefix), time= self.token_life) return self.itoken
get_itoken
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, env):\n if not self.itoken or self.itoken_expires < time() or env.get(\n 'HTTP_X_AUTH_NEW_TOKEN', 'false').lower() in TRUE_VALUES:\n self.itoken = '%sitk%s' % (self.reseller_prefix, uuid4().hex)\n memcache_key = '%s/auth/%s' % (self.reseller_prefix, self.itoken)\n self.itoken_expires = time() + self.token_life\n memcache_client = cache_from_env(env)\n if not memcache_client:\n raise Exception(\n 'No memcache set up; required for Swauth middleware')\n memcache_client.set(memcache_key, (self.itoken_expires, \n '.auth,.reseller_admin,%s.auth' % self.reseller_prefix), time=\n self.token_life)\n return self.itoken\n", "role": "user" }, { "content": "get_itoken", "role": "assistant" } ]
def x(self, req): if ':' not in req.headers.get('x-auth-admin-user', ''): return None admin_account, admin_user = req.headers.get('x-auth-admin-user').split(':', 1) user_json = self.get_user_detail(req, admin_account, admin_user) if user_json is None: return None admin_detail = json.loads(user_json) admin_detail['account'] = admin_account return admin_detail
get_admin_detail
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n if ':' not in req.headers.get('x-auth-admin-user', ''):\n return None\n admin_account, admin_user = req.headers.get('x-auth-admin-user').split(':',\n 1)\n user_json = self.get_user_detail(req, admin_account, admin_user)\n if user_json is None:\n return None\n admin_detail = json.loads(user_json)\n admin_detail['account'] = admin_account\n return admin_detail\n", "role": "user" }, { "content": "get_admin_detail", "role": "assistant" } ]
def x(self, req, account, user): path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user)) resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response( self.app) if resp.status_int == 404: return None if resp.status_int // 100 != 2: raise Exception('Could not get user object: %s %s' % (path, resp. status)) return resp.body
get_user_detail
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, account, user):\n path = quote('/v1/%s/%s/%s' % (self.auth_account, account, user))\n resp = self.make_pre_authed_request(req.environ, 'GET', path).get_response(\n self.app)\n if resp.status_int == 404:\n return None\n if resp.status_int // 100 != 2:\n raise Exception('Could not get user object: %s %s' % (path, resp.\n status))\n return resp.body\n", "role": "user" }, { "content": "get_user_detail", "role": "assistant" } ]
def x(self, user_detail, key): if user_detail: creds = user_detail.get('auth') try: auth_encoder, creds_dict = swauth.authtypes.validate_creds(creds) except ValueError as e: self.logger.error('%s' % e.args[0]) return False return user_detail and auth_encoder.match(key, creds, **creds_dict)
credentials_match
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, user_detail, key):\n if user_detail:\n creds = user_detail.get('auth')\n try:\n auth_encoder, creds_dict = swauth.authtypes.validate_creds(creds)\n except ValueError as e:\n self.logger.error('%s' % e.args[0])\n return False\n return user_detail and auth_encoder.match(key, creds, **creds_dict)\n", "role": "user" }, { "content": "credentials_match", "role": "assistant" } ]
def x(self, req, user): admin_detail = self.get_admin_detail(req) if not admin_detail: return False if '.admin' not in (g['name'] for g in admin_detail['groups']): if req.headers.get('x-auth-user-admin') == 'true' or req.headers.get( 'x-auth-user-reseller-admin') == 'true': return False if '.reseller_admin' not in (g['name'] for g in admin_detail['groups'] ) and req.headers.get('x-auth-user-reseller-admin') == 'true': return False return req.headers.get('x-auth-admin-user' ) == user and self.credentials_match(admin_detail, req.headers.get( 'x-auth-admin-key'))
is_user_changing_own_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, user):\n admin_detail = self.get_admin_detail(req)\n if not admin_detail:\n return False\n if '.admin' not in (g['name'] for g in admin_detail['groups']):\n if req.headers.get('x-auth-user-admin') == 'true' or req.headers.get(\n 'x-auth-user-reseller-admin') == 'true':\n return False\n if '.reseller_admin' not in (g['name'] for g in admin_detail['groups']\n ) and req.headers.get('x-auth-user-reseller-admin') == 'true':\n return False\n return req.headers.get('x-auth-admin-user'\n ) == user and self.credentials_match(admin_detail, req.headers.get(\n 'x-auth-admin-key'))\n", "role": "user" }, { "content": "is_user_changing_own_key", "role": "assistant" } ]
def x(self, req): return req.headers.get('x-auth-admin-user' ) == '.super_admin' and self.super_admin_key and req.headers.get( 'x-auth-admin-key') == self.super_admin_key
is_super_admin
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n return req.headers.get('x-auth-admin-user'\n ) == '.super_admin' and self.super_admin_key and req.headers.get(\n 'x-auth-admin-key') == self.super_admin_key\n", "role": "user" }, { "content": "is_super_admin", "role": "assistant" } ]
def x(self, req, admin_detail=None): req.credentials_valid = False if self.is_super_admin(req): return True if not admin_detail: admin_detail = self.get_admin_detail(req) if not self.credentials_match(admin_detail, req.headers.get( 'x-auth-admin-key')): return False req.credentials_valid = True return '.reseller_admin' in (g['name'] for g in admin_detail['groups'])
is_reseller_admin
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, admin_detail=None):\n req.credentials_valid = False\n if self.is_super_admin(req):\n return True\n if not admin_detail:\n admin_detail = self.get_admin_detail(req)\n if not self.credentials_match(admin_detail, req.headers.get(\n 'x-auth-admin-key')):\n return False\n req.credentials_valid = True\n return '.reseller_admin' in (g['name'] for g in admin_detail['groups'])\n", "role": "user" }, { "content": "is_reseller_admin", "role": "assistant" } ]
def x(creds): try: auth_type, auth_rest = creds.split(':', 1) except ValueError: raise ValueError("Missing ':' in %s" % creds) authtypes = sys.modules[__name__] auth_encoder = getattr(authtypes, auth_type.title(), None) if auth_encoder is None: raise ValueError('Invalid auth_type: %s' % auth_type) auth_encoder = auth_encoder() parsed_creds = dict(type=auth_type, salt=None, hash=None) parsed_creds.update(auth_encoder.validate(auth_rest)) return auth_encoder, parsed_creds
validate_creds
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(creds):\n try:\n auth_type, auth_rest = creds.split(':', 1)\n except ValueError:\n raise ValueError(\"Missing ':' in %s\" % creds)\n authtypes = sys.modules[__name__]\n auth_encoder = getattr(authtypes, auth_type.title(), None)\n if auth_encoder is None:\n raise ValueError('Invalid auth_type: %s' % auth_type)\n auth_encoder = auth_encoder()\n parsed_creds = dict(type=auth_type, salt=None, hash=None)\n parsed_creds.update(auth_encoder.validate(auth_rest))\n return auth_encoder, parsed_creds\n", "role": "user" }, { "content": "validate_creds", "role": "assistant" } ]
def x(self, salt, key): enc_key = '%s%s' % (salt, key) enc_val = hashlib.sha1(enc_key).hexdigest() return 'sha1:%s$%s' % (salt, enc_val)
encode_w_salt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, salt, key):\n enc_key = '%s%s' % (salt, key)\n enc_val = hashlib.sha1(enc_key).hexdigest()\n return 'sha1:%s$%s' % (salt, enc_val)\n", "role": "user" }, { "content": "encode_w_salt", "role": "assistant" } ]
def x(self, key): salt = self.salt or os.urandom(32).encode('base64').rstrip() return self.encode_w_salt(salt, key)
encode
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, key):\n salt = self.salt or os.urandom(32).encode('base64').rstrip()\n return self.encode_w_salt(salt, key)\n", "role": "user" }, { "content": "encode", "role": "assistant" } ]
def x(self, key, creds, salt, **kwargs): return self.encode_w_salt(salt, key) == creds
match
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, key, creds, salt, **kwargs):\n return self.encode_w_salt(salt, key) == creds\n", "role": "user" }, { "content": "match", "role": "assistant" } ]
def x(self, auth_rest): try: auth_salt, auth_hash = auth_rest.split('$') except ValueError: raise ValueError("Missing '$' in %s" % auth_rest) if len(auth_salt) == 0: raise ValueError('Salt must have non-zero length!') if len(auth_hash) != 40: raise ValueError('Hash must have 40 chars!') if not all(c in string.hexdigits for c in auth_hash): raise ValueError('Hash must be hexadecimal!') return dict(salt=auth_salt, hash=auth_hash)
validate
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, auth_rest):\n try:\n auth_salt, auth_hash = auth_rest.split('$')\n except ValueError:\n raise ValueError(\"Missing '$' in %s\" % auth_rest)\n if len(auth_salt) == 0:\n raise ValueError('Salt must have non-zero length!')\n if len(auth_hash) != 40:\n raise ValueError('Hash must have 40 chars!')\n if not all(c in string.hexdigits for c in auth_hash):\n raise ValueError('Hash must be hexadecimal!')\n return dict(salt=auth_salt, hash=auth_hash)\n", "role": "user" }, { "content": "validate", "role": "assistant" } ]
def x(self, dt_index, slp_types, holidays=None): file_path = os.path.join(self.datapath, 'selp_series.csv') selp_series = pd.read_csv(file_path) tmp_df = selp_series index = pd.date_range(pd.datetime(2007, 1, 1, 0), periods=2016, freq= '15Min') tmp_df.set_index(index, inplace=True) new_df = pd.DataFrame(index=dt_index, columns=slp_types).fillna(0) new_df = add_weekdays2df(new_df, holidays=holidays, holiday_is_sunday=True) new_df['hour'] = dt_index.hour + 1 new_df['minute'] = dt_index.minute time_df = new_df[['date', 'hour', 'minute', 'weekday']].copy() tmp_df[slp_types] = tmp_df[slp_types].astype(float) tmp_df['hour_of_day'] = tmp_df.index.hour + 1 tmp_df['minute_of_hour'] = tmp_df.index.minute left_cols = ['hour_of_day', 'minute_of_hour', 'weekday'] right_cols = ['hour', 'minute', 'weekday'] tmp_df = tmp_df.reset_index() tmp_df.pop('index') for p in self.seasons.keys(): a = pd.datetime(self.year, self.seasons[p][0], self.seasons[p][1], 0, 0 ) b = pd.datetime(self.year, self.seasons[p][2], self.seasons[p][3], 23, 59) new_df.update(pd.DataFrame.merge(tmp_df[tmp_df['period'] == p[:-1]], time_df[a:b], left_on=left_cols, right_on=right_cols, how= 'inner', left_index=True).sort_index().drop(['hour_of_day'], 1)) new_df.drop('date', axis=1, inplace=True) return new_df.div(new_df.sum(axis=0), axis=1)
create_bdew_load_profiles
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, dt_index, slp_types, holidays=None):\n file_path = os.path.join(self.datapath, 'selp_series.csv')\n selp_series = pd.read_csv(file_path)\n tmp_df = selp_series\n index = pd.date_range(pd.datetime(2007, 1, 1, 0), periods=2016, freq=\n '15Min')\n tmp_df.set_index(index, inplace=True)\n new_df = pd.DataFrame(index=dt_index, columns=slp_types).fillna(0)\n new_df = add_weekdays2df(new_df, holidays=holidays, holiday_is_sunday=True)\n new_df['hour'] = dt_index.hour + 1\n new_df['minute'] = dt_index.minute\n time_df = new_df[['date', 'hour', 'minute', 'weekday']].copy()\n tmp_df[slp_types] = tmp_df[slp_types].astype(float)\n tmp_df['hour_of_day'] = tmp_df.index.hour + 1\n tmp_df['minute_of_hour'] = tmp_df.index.minute\n left_cols = ['hour_of_day', 'minute_of_hour', 'weekday']\n right_cols = ['hour', 'minute', 'weekday']\n tmp_df = tmp_df.reset_index()\n tmp_df.pop('index')\n for p in self.seasons.keys():\n a = pd.datetime(self.year, self.seasons[p][0], self.seasons[p][1], 0, 0\n )\n b = pd.datetime(self.year, self.seasons[p][2], self.seasons[p][3], \n 23, 59)\n new_df.update(pd.DataFrame.merge(tmp_df[tmp_df['period'] == p[:-1]],\n time_df[a:b], left_on=left_cols, right_on=right_cols, how=\n 'inner', left_index=True).sort_index().drop(['hour_of_day'], 1))\n new_df.drop('date', axis=1, inplace=True)\n return new_df.div(new_df.sum(axis=0), axis=1)\n", "role": "user" }, { "content": "create_bdew_load_profiles", "role": "assistant" } ]
def x(self, ann_el_demand_per_sector): return self.slp_frame.multiply(pd.Series(ann_el_demand_per_sector), axis=1 ).dropna(how='all', axis=1) * 4
get_profile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, ann_el_demand_per_sector):\n return self.slp_frame.multiply(pd.Series(ann_el_demand_per_sector), axis=1\n ).dropna(how='all', axis=1) * 4\n", "role": "user" }, { "content": "get_profile", "role": "assistant" } ]
def x(self, how='geometric_series'): temperature = self.df['temperature'].resample('D').mean().reindex(self. df.index).fillna(method='ffill').fillna(method='bfill') if how == 'geometric_series': temperature_mean = (temperature + 0.5 * np.roll(temperature, 24) + 0.25 * np.roll(temperature, 48) + 0.125 * np.roll(temperature, 72) ) / 1.875 elif how == 'mean': temperature_mean = temperature else: temperature_mean = None return temperature_mean
weighted_temperature
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, how='geometric_series'):\n temperature = self.df['temperature'].resample('D').mean().reindex(self.\n df.index).fillna(method='ffill').fillna(method='bfill')\n if how == 'geometric_series':\n temperature_mean = (temperature + 0.5 * np.roll(temperature, 24) + \n 0.25 * np.roll(temperature, 48) + 0.125 * np.roll(temperature, 72)\n ) / 1.875\n elif how == 'mean':\n temperature_mean = temperature\n else:\n temperature_mean = None\n return temperature_mean\n", "role": "user" }, { "content": "weighted_temperature", "role": "assistant" } ]
def x(self): intervals = {(-20): 1, (-19): 1, (-18): 1, (-17): 1, (-16): 1, (-15): 1, (-14): 2, (-13): 2, (-12): 2, (-11): 2, (-10): 2, (-9): 3, (-8): 3, (-7): 3, (-6): 3, (-5): 3, (-4): 4, (-3): 4, (-2): 4, (-1): 4, (0): 4, (1): 5, (2): 5, (3): 5, (4): 5, (5): 5, (6): 6, (7): 6, (8): 6, (9): 6, (10): 6, (11): 7, (12): 7, (13): 7, (14): 7, (15): 7, (16): 8, (17): 8, (18): 8, (19): 8, (20): 8, (21): 9, (22): 9, (23): 9, ( 24): 9, (25): 9, (26): 10, (27): 10, (28): 10, (29): 10, (30): 10, (31): 10, (32): 10, (33): 10, (34): 10, (35): 10, (36): 10, (37): 10, (38): 10, (39): 10, (40): 10} temperature_rounded = [ceil(i) for i in self.df['temperature_geo']] temperature_interval = [intervals[i] for i in temperature_rounded] return np.transpose(np.array(temperature_interval))
get_temperature_interval
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n intervals = {(-20): 1, (-19): 1, (-18): 1, (-17): 1, (-16): 1, (-15): 1,\n (-14): 2, (-13): 2, (-12): 2, (-11): 2, (-10): 2, (-9): 3, (-8): 3,\n (-7): 3, (-6): 3, (-5): 3, (-4): 4, (-3): 4, (-2): 4, (-1): 4, (0):\n 4, (1): 5, (2): 5, (3): 5, (4): 5, (5): 5, (6): 6, (7): 6, (8): 6,\n (9): 6, (10): 6, (11): 7, (12): 7, (13): 7, (14): 7, (15): 7, (16):\n 8, (17): 8, (18): 8, (19): 8, (20): 8, (21): 9, (22): 9, (23): 9, (\n 24): 9, (25): 9, (26): 10, (27): 10, (28): 10, (29): 10, (30): 10,\n (31): 10, (32): 10, (33): 10, (34): 10, (35): 10, (36): 10, (37): \n 10, (38): 10, (39): 10, (40): 10}\n temperature_rounded = [ceil(i) for i in self.df['temperature_geo']]\n temperature_interval = [intervals[i] for i in temperature_rounded]\n return np.transpose(np.array(temperature_interval))\n", "role": "user" }, { "content": "get_temperature_interval", "role": "assistant" } ]
def x(self, filename='shlp_hour_factors.csv'): file = os.path.join(self.datapath, filename) hour_factors = pd.read_csv(file, index_col=0) hour_factors = hour_factors.query( 'building_class=={0} and shlp_type=="{1}"'.format(self. building_class, self.shlp_type)) residential = self.building_class > 0 left_cols = ['hour_of_day'] + (['weekday'] if not residential else []) right_cols = ['hour'] + (['weekday'] if not residential else []) sf_mat = pd.DataFrame.merge(hour_factors, self.df, left_on=left_cols, right_on=right_cols, how='outer', left_index=True).sort_index() drop_cols = ['hour_of_day', 'hour', 'building_class', 'shlp_type', 'date', 'temperature'] + (['weekday_x'] if residential else []) + ([ 'weekday_y'] if residential else []) + (['weekday'] if not residential else []) sf_mat = sf_mat.drop(drop_cols, 1) length = len(self.temperature) sf = np.array(sf_mat)[np.array(list(range(0, length)))[:], (self. get_temperature_interval() - 1)[:]] return np.array(list(map(float, sf[:])))
get_sf_values
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, filename='shlp_hour_factors.csv'):\n file = os.path.join(self.datapath, filename)\n hour_factors = pd.read_csv(file, index_col=0)\n hour_factors = hour_factors.query(\n 'building_class=={0} and shlp_type==\"{1}\"'.format(self.\n building_class, self.shlp_type))\n residential = self.building_class > 0\n left_cols = ['hour_of_day'] + (['weekday'] if not residential else [])\n right_cols = ['hour'] + (['weekday'] if not residential else [])\n sf_mat = pd.DataFrame.merge(hour_factors, self.df, left_on=left_cols,\n right_on=right_cols, how='outer', left_index=True).sort_index()\n drop_cols = ['hour_of_day', 'hour', 'building_class', 'shlp_type',\n 'date', 'temperature'] + (['weekday_x'] if residential else []) + ([\n 'weekday_y'] if residential else []) + (['weekday'] if not\n residential else [])\n sf_mat = sf_mat.drop(drop_cols, 1)\n length = len(self.temperature)\n sf = np.array(sf_mat)[np.array(list(range(0, length)))[:], (self.\n get_temperature_interval() - 1)[:]]\n return np.array(list(map(float, sf[:])))\n", "role": "user" }, { "content": "get_sf_values", "role": "assistant" } ]
def x(self, filename='shlp_sigmoid_factors.csv'): file = os.path.join(self.datapath, filename) sigmoid = pd.read_csv(file, index_col=0) sigmoid = sigmoid.query('building_class=={0} and '.format(self. building_class) + 'shlp_type=="{0}" and '.format(self.shlp_type) + 'wind_impact=={0}'.format(self.wind_class)) a = float(sigmoid['parameter_a']) b = float(sigmoid['parameter_b']) c = float(sigmoid['parameter_c']) if self.ww_incl: d = float(sigmoid['parameter_d']) else: d = 0 return a, b, c, d
get_sigmoid_parameters
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, filename='shlp_sigmoid_factors.csv'):\n file = os.path.join(self.datapath, filename)\n sigmoid = pd.read_csv(file, index_col=0)\n sigmoid = sigmoid.query('building_class=={0} and '.format(self.\n building_class) + 'shlp_type==\"{0}\" and '.format(self.shlp_type) +\n 'wind_impact=={0}'.format(self.wind_class))\n a = float(sigmoid['parameter_a'])\n b = float(sigmoid['parameter_b'])\n c = float(sigmoid['parameter_c'])\n if self.ww_incl:\n d = float(sigmoid['parameter_d'])\n else:\n d = 0\n return a, b, c, d\n", "role": "user" }, { "content": "get_sigmoid_parameters", "role": "assistant" } ]
def x(self, filename='shlp_weekday_factors.csv'): file = os.path.join(self.datapath, filename) f_df = pd.read_csv(file, index_col=0) tmp_df = f_df.query('shlp_type=="{0}"'.format(self.shlp_type)).drop( 'shlp_type', axis=1) tmp_df['weekdays'] = np.array(list(range(7))) + 1 return np.array(list(map(float, pd.DataFrame.merge(tmp_df, self.df, left_on='weekdays', right_on='weekday', how='inner', left_index= True).sort_index()['wochentagsfaktor'])))
get_weekday_parameters
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, filename='shlp_weekday_factors.csv'):\n file = os.path.join(self.datapath, filename)\n f_df = pd.read_csv(file, index_col=0)\n tmp_df = f_df.query('shlp_type==\"{0}\"'.format(self.shlp_type)).drop(\n 'shlp_type', axis=1)\n tmp_df['weekdays'] = np.array(list(range(7))) + 1\n return np.array(list(map(float, pd.DataFrame.merge(tmp_df, self.df,\n left_on='weekdays', right_on='weekday', how='inner', left_index=\n True).sort_index()['wochentagsfaktor'])))\n", "role": "user" }, { "content": "get_weekday_parameters", "role": "assistant" } ]
def x(self): self.df['temperature'] = self.temperature.values self.df['temperature_geo'] = self.weighted_temperature(how= 'geometric_series') sf = self.get_sf_values() [a, b, c, d] = self.get_sigmoid_parameters() f = self.get_weekday_parameters() h = a / (1 + (b / (self.df['temperature_geo'] - 40)) ** c) + d kw = 1.0 / (sum(h * f) / 24) heat_profile_normalized = kw * h * f * sf return heat_profile_normalized
get_normalized_bdew_profile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.df['temperature'] = self.temperature.values\n self.df['temperature_geo'] = self.weighted_temperature(how=\n 'geometric_series')\n sf = self.get_sf_values()\n [a, b, c, d] = self.get_sigmoid_parameters()\n f = self.get_weekday_parameters()\n h = a / (1 + (b / (self.df['temperature_geo'] - 40)) ** c) + d\n kw = 1.0 / (sum(h * f) / 24)\n heat_profile_normalized = kw * h * f * sf\n return heat_profile_normalized\n", "role": "user" }, { "content": "get_normalized_bdew_profile", "role": "assistant" } ]
def x(path, **kwargs): import os.path return os.path.isfile(path, **kwargs)
isfile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, **kwargs):\n import os.path\n return os.path.isfile(path, **kwargs)\n", "role": "user" }, { "content": "isfile", "role": "assistant" } ]
def x(path, **kwargs): import os.path return os.path.isdir(path, **kwargs)
isdir
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, **kwargs):\n import os.path\n return os.path.isdir(path, **kwargs)\n", "role": "user" }, { "content": "isdir", "role": "assistant" } ]
def x(oldPath, newPath, **kwargs): import os return os.rename(oldPath, newPath, **kwargs)
rename
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(oldPath, newPath, **kwargs):\n import os\n return os.rename(oldPath, newPath, **kwargs)\n", "role": "user" }, { "content": "rename", "role": "assistant" } ]
def x(path, user=None, group=None): import os import pwd import grp uid = pwd.getpwnam(user).pw_uid if user else -1 gid = grp.getgrnam(group).gr_gid if group else -1 return os.chown(path, uid, gid)
chown
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, user=None, group=None):\n import os\n import pwd\n import grp\n uid = pwd.getpwnam(user).pw_uid if user else -1\n gid = grp.getgrnam(group).gr_gid if group else -1\n return os.chown(path, uid, gid)\n", "role": "user" }, { "content": "chown", "role": "assistant" } ]
def x(path, mode): import os, stat st = os.stat(path) return os.chmod(path, mode)
chmod
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, mode):\n import os, stat\n st = os.stat(path)\n return os.chmod(path, mode)\n", "role": "user" }, { "content": "chmod", "role": "assistant" } ]
def x(path, **kwargs): import os.path return os.path.abspath(path, **kwargs)
abspath
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, **kwargs):\n import os.path\n return os.path.abspath(path, **kwargs)\n", "role": "user" }, { "content": "abspath", "role": "assistant" } ]
def x(path, **kwargs): import os.path return os.path.normpath(path, **kwargs)
normalize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, **kwargs):\n import os.path\n return os.path.normpath(path, **kwargs)\n", "role": "user" }, { "content": "normalize", "role": "assistant" } ]
def x(path, recursive=True, **kwargs): if recursive: import shutil return shutil.rmtree(path, **kwargs) else: import os return os.remdir(path, **kwargs)
rmdir
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, recursive=True, **kwargs):\n if recursive:\n import shutil\n return shutil.rmtree(path, **kwargs)\n else:\n import os\n return os.remdir(path, **kwargs)\n", "role": "user" }, { "content": "rmdir", "role": "assistant" } ]
def x(path, recursive=True, **kwargs): import os if recursive: os.makedirs(path, **kwargs) else: os.mkdir(path, **kwargs)
mkdir
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, recursive=True, **kwargs):\n import os\n if recursive:\n os.makedirs(path, **kwargs)\n else:\n os.mkdir(path, **kwargs)\n", "role": "user" }, { "content": "mkdir", "role": "assistant" } ]
def x(path): import os try: OPEN_FUNC(path, 'a+').close() except IOError: os.utime(path, None)
touch
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path):\n import os\n try:\n OPEN_FUNC(path, 'a+').close()\n except IOError:\n os.utime(path, None)\n", "role": "user" }, { "content": "touch", "role": "assistant" } ]
def x(path, **kwargs): import os.path return os.path.exists(path, **kwargs)
exists
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, **kwargs):\n import os.path\n return os.path.exists(path, **kwargs)\n", "role": "user" }, { "content": "exists", "role": "assistant" } ]
def x(path='.'): import os for f in os.listdir(path): if isfile(join(path, f)): yield join(path, f) if path != '.' else f
list
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path='.'):\n import os\n for f in os.listdir(path):\n if isfile(join(path, f)):\n yield join(path, f) if path != '.' else f\n", "role": "user" }, { "content": "list", "role": "assistant" } ]
def x(path='.'): import os for f in os.listdir(path): if isdir(join(path, f)): yield join(path, f) if path != '.' else f
listdirs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path='.'):\n import os\n for f in os.listdir(path):\n if isdir(join(path, f)):\n yield join(path, f) if path != '.' else f\n", "role": "user" }, { "content": "listdirs", "role": "assistant" } ]
def x(pattern, path='.', exclude=None, recursive=True): import fnmatch import os if recursive: for root, dirnames, filenames in os.walk(path): for pat in _to_list(pattern): for filename in fnmatch.filter(filenames, pat): filepath = join(abspath(root), filename) for excl in _to_list(exclude): if excl and fnmatch.fnmatch(filepath, excl): break else: yield filepath else: for pat in _to_list(pattern): for filename in fnmatch.filter(list(path), pat): filepath = join(abspath(path), filename) for excl in _to_list(exclude): if excl and fnmatch.fnmatch(filepath, excl): break else: yield filepath
find
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pattern, path='.', exclude=None, recursive=True):\n import fnmatch\n import os\n if recursive:\n for root, dirnames, filenames in os.walk(path):\n for pat in _to_list(pattern):\n for filename in fnmatch.filter(filenames, pat):\n filepath = join(abspath(root), filename)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(filepath, excl):\n break\n else:\n yield filepath\n else:\n for pat in _to_list(pattern):\n for filename in fnmatch.filter(list(path), pat):\n filepath = join(abspath(path), filename)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(filepath, excl):\n break\n else:\n yield filepath\n", "role": "user" }, { "content": "find", "role": "assistant" } ]
def x(pattern, path='.', exclude=None, recursive=True): import fnmatch import os if recursive: for root, dirnames, filenames in os.walk(path): for pat in _to_list(pattern): for dirname in fnmatch.filter(dirnames, pat): dirpath = join(abspath(root), dirname) for excl in _to_list(exclude): if excl and fnmatch.fnmatch(dirpath, excl): break else: yield dirpath else: for pat in _to_list(pattern): for dirname in fnmatch.filter(listdirs(path), pat): dirpath = join(abspath(path), dirname) for excl in _to_list(exclude): if excl and fnmatch.fnmatch(dirpath, excl): break else: yield dirpath
finddirs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pattern, path='.', exclude=None, recursive=True):\n import fnmatch\n import os\n if recursive:\n for root, dirnames, filenames in os.walk(path):\n for pat in _to_list(pattern):\n for dirname in fnmatch.filter(dirnames, pat):\n dirpath = join(abspath(root), dirname)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(dirpath, excl):\n break\n else:\n yield dirpath\n else:\n for pat in _to_list(pattern):\n for dirname in fnmatch.filter(listdirs(path), pat):\n dirpath = join(abspath(path), dirname)\n for excl in _to_list(exclude):\n if excl and fnmatch.fnmatch(dirpath, excl):\n break\n else:\n yield dirpath\n", "role": "user" }, { "content": "finddirs", "role": "assistant" } ]
def x(path, content, encoding='UTF-8', append=False, raw=False): mode = 'wb' if not append else 'ab' with OPEN_FUNC(path, mode) as _file: if raw: import shutil shutil.copyfileobj(content, _file) else: _file.write(content.encode(encoding))
write
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, content, encoding='UTF-8', append=False, raw=False):\n mode = 'wb' if not append else 'ab'\n with OPEN_FUNC(path, mode) as _file:\n if raw:\n import shutil\n shutil.copyfileobj(content, _file)\n else:\n _file.write(content.encode(encoding))\n", "role": "user" }, { "content": "write", "role": "assistant" } ]
def x(path, encoding='UTF-8'): with OPEN_FUNC(path, 'rb') as _file: cont = _file.read() return cont.decode(encoding)
read
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, encoding='UTF-8'):\n with OPEN_FUNC(path, 'rb') as _file:\n cont = _file.read()\n return cont.decode(encoding)\n", "role": "user" }, { "content": "read", "role": "assistant" } ]
def x(path): try: import cPickle as pickle except: import pickle with open(path, 'rb') as file: return pickle.load(file)
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path):\n try:\n import cPickle as pickle\n except:\n import pickle\n with open(path, 'rb') as file:\n return pickle.load(file)\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(path, obj): try: import cPickle as pickle except: import pickle with open(path, 'wb') as file: return pickle.dump(obj, file)
put
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, obj):\n try:\n import cPickle as pickle\n except:\n import pickle\n with open(path, 'wb') as file:\n return pickle.dump(obj, file)\n", "role": "user" }, { "content": "put", "role": "assistant" } ]
def x(*args, **kwargs): import os.path if _is_list(args[0]): return os.path.join(*args[0]) return os.path.join(*args, **kwargs)
join
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(*args, **kwargs):\n import os.path\n if _is_list(args[0]):\n return os.path.join(*args[0])\n return os.path.join(*args, **kwargs)\n", "role": "user" }, { "content": "join", "role": "assistant" } ]
def x(path, **kwargs): import os.path name, ext = os.path.splitext(path, **kwargs) return ext
extname
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, **kwargs):\n import os.path\n name, ext = os.path.splitext(path, **kwargs)\n return ext\n", "role": "user" }, { "content": "extname", "role": "assistant" } ]
def x(path, ext=''): import os.path if ext is False: return os.path.basename(path).replace(extname(path), '') else: return os.path.basename(path).replace(ext, '')
basename
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, ext=''):\n import os.path\n if ext is False:\n return os.path.basename(path).replace(extname(path), '')\n else:\n return os.path.basename(path).replace(ext, '')\n", "role": "user" }, { "content": "basename", "role": "assistant" } ]
def x(path, suffix=''): return join(dirname(path), basename(path, ext=False) + suffix + extname (path))
add_suffix
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path, suffix=''):\n return join(dirname(path), basename(path, ext=False) + suffix + extname\n (path))\n", "role": "user" }, { "content": "add_suffix", "role": "assistant" } ]
def x(path): import sys if not exists(path): raise ValueError('Path %s does not exist' % path) sys.path.insert(1, path)
addpath
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(path):\n import sys\n if not exists(path):\n raise ValueError('Path %s does not exist' % path)\n sys.path.insert(1, path)\n", "role": "user" }, { "content": "addpath", "role": "assistant" } ]
def x(time_df, holidays=None, holiday_is_sunday=False): time_df['weekday'] = time_df.index.weekday + 1 time_df['date'] = time_df.index.date if holidays is not None: if isinstance(holidays, dict): holidays = list(holidays.keys()) time_df['weekday'].mask(pd.to_datetime(time_df['date']).isin(pd. to_datetime(holidays)), 0, True) if holiday_is_sunday: time_df.weekday.mask(time_df.weekday == 0, 7, True) return time_df
add_weekdays2df
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(time_df, holidays=None, holiday_is_sunday=False):\n time_df['weekday'] = time_df.index.weekday + 1\n time_df['date'] = time_df.index.date\n if holidays is not None:\n if isinstance(holidays, dict):\n holidays = list(holidays.keys())\n time_df['weekday'].mask(pd.to_datetime(time_df['date']).isin(pd.\n to_datetime(holidays)), 0, True)\n if holiday_is_sunday:\n time_df.weekday.mask(time_df.weekday == 0, 7, True)\n return time_df\n", "role": "user" }, { "content": "add_weekdays2df", "role": "assistant" } ]
def x(self, annual_demand, **kwargs): am = kwargs.get('am', settime(7, 0, 0)) pm = kwargs.get('pm', settime(23, 30, 0)) week = kwargs.get('week', [1, 2, 3, 4, 5]) weekend = kwargs.get('weekend', [0, 6, 7]) default_factors = {'week': {'day': 0.8, 'night': 0.6}, 'weekend': { 'day': 0.9, 'night': 0.7}} profile_factors = kwargs.get('profile_factors', default_factors) self.dataframe['ind'] = 0 self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am, pm).isin(week), profile_factors['week']['day'], True) self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm, am).isin(week), profile_factors['week']['night'], True) self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am, pm).isin(weekend), profile_factors['weekend']['day'], True) self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm, am).isin(weekend), profile_factors['weekend']['night'], True) if self.dataframe['ind'].isnull().any(axis=0): logging.error('NAN value found in industrial load profile') time_interval = self.dataframe.index.freq.nanos / 3600000000000.0 return self.dataframe['ind'] / self.dataframe['ind'].sum( ) * annual_demand / time_interval
simple_profile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, annual_demand, **kwargs):\n am = kwargs.get('am', settime(7, 0, 0))\n pm = kwargs.get('pm', settime(23, 30, 0))\n week = kwargs.get('week', [1, 2, 3, 4, 5])\n weekend = kwargs.get('weekend', [0, 6, 7])\n default_factors = {'week': {'day': 0.8, 'night': 0.6}, 'weekend': {\n 'day': 0.9, 'night': 0.7}}\n profile_factors = kwargs.get('profile_factors', default_factors)\n self.dataframe['ind'] = 0\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am,\n pm).isin(week), profile_factors['week']['day'], True)\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm,\n am).isin(week), profile_factors['week']['night'], True)\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(am,\n pm).isin(weekend), profile_factors['weekend']['day'], True)\n self.dataframe['ind'].mask(self.dataframe['weekday'].between_time(pm,\n am).isin(weekend), profile_factors['weekend']['night'], True)\n if self.dataframe['ind'].isnull().any(axis=0):\n logging.error('NAN value found in industrial load profile')\n time_interval = self.dataframe.index.freq.nanos / 3600000000000.0\n return self.dataframe['ind'] / self.dataframe['ind'].sum(\n ) * annual_demand / time_interval\n", "role": "user" }, { "content": "simple_profile", "role": "assistant" } ]
def x(self): if getattr(self, '_script', None) is None: self._script = self._script__getter() return self._script
script
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if getattr(self, '_script', None) is None:\n self._script = self._script__getter()\n return self._script\n", "role": "user" }, { "content": "script", "role": "assistant" } ]
def x(n): if not n: return 0 e = 0 while n % 10 == 0 and e < 9: n = n // 10 e = e + 1 if e < 9: n, d = divmod(n, 10) return 1 + (n * 9 + d - 1) * 10 + e else: return 1 + (n - 1) * 10 + 9
compress_amount
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(n):\n if not n:\n return 0\n e = 0\n while n % 10 == 0 and e < 9:\n n = n // 10\n e = e + 1\n if e < 9:\n n, d = divmod(n, 10)\n return 1 + (n * 9 + d - 1) * 10 + e\n else:\n return 1 + (n - 1) * 10 + 9\n", "role": "user" }, { "content": "compress_amount", "role": "assistant" } ]