source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
---|---|---|
def x(self) ->List[Tuple[str, int]]:
return sorted(self.enum.items(), key=lambda x: x[1])
|
sorted_enums
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self) ->List[Tuple[str, int]]:\n return sorted(self.enum.items(), key=lambda x: x[1])\n",
"role": "user"
},
{
"content": "sorted_enums",
"role": "assistant"
}
] |
def x(self, stmt: Statement, sctx: SchemaContext) ->None:
nextval = 0
for est in stmt.find_all('enum'):
if not sctx.schema_data.if_features(est, sctx.text_mid):
continue
label = est.argument
vst = est.find1('value')
if vst:
val = int(vst.argument)
self.enum[label] = val
if val > nextval:
nextval = val
else:
self.enum[label] = nextval
nextval += 1
|
handle_properties
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stmt: Statement, sctx: SchemaContext) ->None:\n nextval = 0\n for est in stmt.find_all('enum'):\n if not sctx.schema_data.if_features(est, sctx.text_mid):\n continue\n label = est.argument\n vst = est.find1('value')\n if vst:\n val = int(vst.argument)\n self.enum[label] = val\n if val > nextval:\n nextval = val\n else:\n self.enum[label] = nextval\n nextval += 1\n",
"role": "user"
},
{
"content": "handle_properties",
"role": "assistant"
}
] |
def x(self, text: str) ->Optional[QualName]:
try:
return self.sctx.schema_data.translate_pname(text, self.sctx.text_mid)
except (ModuleNotRegistered, UnknownPrefix):
raise InvalidArgument(text)
|
from_yang
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, text: str) ->Optional[QualName]:\n try:\n return self.sctx.schema_data.translate_pname(text, self.sctx.text_mid)\n except (ModuleNotRegistered, UnknownPrefix):\n raise InvalidArgument(text)\n",
"role": "user"
},
{
"content": "from_yang",
"role": "assistant"
}
] |
def x(self, text: str) ->Optional[int]:
if text.startswith('0'):
base = 16 if text.startswith('0x') else 8
else:
base = 10
try:
return int(text, base)
except (ValueError, TypeError):
raise InvalidArgument(text)
|
from_yang
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, text: str) ->Optional[int]:\n if text.startswith('0'):\n base = 16 if text.startswith('0x') else 8\n else:\n base = 10\n try:\n return int(text, base)\n except (ValueError, TypeError):\n raise InvalidArgument(text)\n",
"role": "user"
},
{
"content": "from_yang",
"role": "assistant"
}
] |
def x(self, folder):
if 'structure' in self.inputs:
self.inputs.structure.export(folder.get_abs_path(self.
_DEFAULT_COORDS_FILE_NAME), fileformat='xyz')
inp = Cp2kInput(self.inputs.parameters.get_dict())
inp.add_keyword('GLOBAL/PROJECT', self._DEFAULT_PROJECT_NAME)
if 'structure' in self.inputs:
for i, letter in enumerate('ABC'):
inp.add_keyword('FORCE_EVAL/SUBSYS/CELL/' + letter,
'{:<15} {:<15} {:<15}'.format(*self.inputs.structure.cell[i]))
topo = 'FORCE_EVAL/SUBSYS/TOPOLOGY'
inp.add_keyword(topo + '/COORD_FILE_NAME', self.
_DEFAULT_COORDS_FILE_NAME)
inp.add_keyword(topo + '/COORD_FILE_FORMAT', 'XYZ')
with io.open(folder.get_abs_path(self._DEFAULT_INPUT_FILE), mode='w',
encoding='utf-8') as fobj:
fobj.write(inp.render())
if 'settings' in self.inputs:
settings = self.inputs.settings.get_dict()
else:
settings = {}
codeinfo = CodeInfo()
codeinfo.cmdline_params = settings.pop('cmdline', []) + ['-i', self.
_DEFAULT_INPUT_FILE]
codeinfo.stdout_name = self._DEFAULT_OUTPUT_FILE
codeinfo.join_files = True
codeinfo.code_uuid = self.inputs.code.uuid
calcinfo = CalcInfo()
calcinfo.stdin_name = self._DEFAULT_INPUT_FILE
calcinfo.uuid = self.uuid
calcinfo.cmdline_params = codeinfo.cmdline_params
calcinfo.stdin_name = self._DEFAULT_INPUT_FILE
calcinfo.stdout_name = self._DEFAULT_OUTPUT_FILE
calcinfo.codes_info = [codeinfo]
calcinfo.remote_symlink_list = []
if 'file' in self.inputs:
calcinfo.local_copy_list = []
for fobj in self.inputs.file.values():
calcinfo.local_copy_list.append((fobj.uuid, fobj.filename, fobj
.filename))
calcinfo.remote_copy_list = []
calcinfo.retrieve_list = [self._DEFAULT_OUTPUT_FILE, self.
_DEFAULT_RESTART_FILE_NAME]
calcinfo.retrieve_list += settings.pop('additional_retrieve_list', [])
if 'parent_calc_folder' in self.inputs:
comp_uuid = self.inputs.parent_calc_folder.computer.uuid
remote_path = self.inputs.parent_calc_folder.get_remote_path()
symlink = comp_uuid, remote_path, self._DEFAULT_PARENT_CALC_FLDR_NAME
calcinfo.remote_symlink_list.append(symlink)
if settings:
raise InputValidationError('The following keys have been found ' +
'in the settings input node {}, '.format(self.pk) +
'but were not understood: ' + ','.join(settings.keys()))
return calcinfo
|
prepare_for_submission
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, folder):\n if 'structure' in self.inputs:\n self.inputs.structure.export(folder.get_abs_path(self.\n _DEFAULT_COORDS_FILE_NAME), fileformat='xyz')\n inp = Cp2kInput(self.inputs.parameters.get_dict())\n inp.add_keyword('GLOBAL/PROJECT', self._DEFAULT_PROJECT_NAME)\n if 'structure' in self.inputs:\n for i, letter in enumerate('ABC'):\n inp.add_keyword('FORCE_EVAL/SUBSYS/CELL/' + letter,\n '{:<15} {:<15} {:<15}'.format(*self.inputs.structure.cell[i]))\n topo = 'FORCE_EVAL/SUBSYS/TOPOLOGY'\n inp.add_keyword(topo + '/COORD_FILE_NAME', self.\n _DEFAULT_COORDS_FILE_NAME)\n inp.add_keyword(topo + '/COORD_FILE_FORMAT', 'XYZ')\n with io.open(folder.get_abs_path(self._DEFAULT_INPUT_FILE), mode='w',\n encoding='utf-8') as fobj:\n fobj.write(inp.render())\n if 'settings' in self.inputs:\n settings = self.inputs.settings.get_dict()\n else:\n settings = {}\n codeinfo = CodeInfo()\n codeinfo.cmdline_params = settings.pop('cmdline', []) + ['-i', self.\n _DEFAULT_INPUT_FILE]\n codeinfo.stdout_name = self._DEFAULT_OUTPUT_FILE\n codeinfo.join_files = True\n codeinfo.code_uuid = self.inputs.code.uuid\n calcinfo = CalcInfo()\n calcinfo.stdin_name = self._DEFAULT_INPUT_FILE\n calcinfo.uuid = self.uuid\n calcinfo.cmdline_params = codeinfo.cmdline_params\n calcinfo.stdin_name = self._DEFAULT_INPUT_FILE\n calcinfo.stdout_name = self._DEFAULT_OUTPUT_FILE\n calcinfo.codes_info = [codeinfo]\n calcinfo.remote_symlink_list = []\n if 'file' in self.inputs:\n calcinfo.local_copy_list = []\n for fobj in self.inputs.file.values():\n calcinfo.local_copy_list.append((fobj.uuid, fobj.filename, fobj\n .filename))\n calcinfo.remote_copy_list = []\n calcinfo.retrieve_list = [self._DEFAULT_OUTPUT_FILE, self.\n _DEFAULT_RESTART_FILE_NAME]\n calcinfo.retrieve_list += settings.pop('additional_retrieve_list', [])\n if 'parent_calc_folder' in self.inputs:\n comp_uuid = self.inputs.parent_calc_folder.computer.uuid\n remote_path = self.inputs.parent_calc_folder.get_remote_path()\n symlink = comp_uuid, remote_path, self._DEFAULT_PARENT_CALC_FLDR_NAME\n calcinfo.remote_symlink_list.append(symlink)\n if settings:\n raise InputValidationError('The following keys have been found ' +\n 'in the settings input node {}, '.format(self.pk) +\n 'but were not understood: ' + ','.join(settings.keys()))\n return calcinfo\n",
"role": "user"
},
{
"content": "prepare_for_submission",
"role": "assistant"
}
] |
def x(self, kwpath, value, params):
if len(kwpath) == 1:
params[kwpath[0]] = value
elif kwpath[0] not in params.keys():
new_subsection = {}
params[kwpath[0]] = new_subsection
self._add_keyword_low(kwpath[1:], value, new_subsection)
else:
self._add_keyword_low(kwpath[1:], value, params[kwpath[0]])
|
add_keyword_low
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, kwpath, value, params):\n if len(kwpath) == 1:\n params[kwpath[0]] = value\n elif kwpath[0] not in params.keys():\n new_subsection = {}\n params[kwpath[0]] = new_subsection\n self._add_keyword_low(kwpath[1:], value, new_subsection)\n else:\n self._add_keyword_low(kwpath[1:], value, params[kwpath[0]])\n",
"role": "user"
},
{
"content": "add_keyword_low",
"role": "assistant"
}
] |
def x(self, output, params, indent=0):
for key, val in sorted(params.items()):
if key.upper() != key:
raise InputValidationError("keyword '%s' not upper case" % key)
if key.startswith('@') or key.startswith('$'):
raise InputValidationError('CP2K preprocessor not supported')
if isinstance(val, dict):
output.append('%s&%s %s' % (' ' * indent, key, val.pop('_', '')))
self._render_section(output, val, indent + 3)
output.append('%s&END %s' % (' ' * indent, key))
elif isinstance(val, list):
for listitem in val:
self._render_section(output, {key: listitem}, indent)
elif isinstance(val, bool):
val_str = '.true.' if val else '.false.'
output.append('%s%s %s' % (' ' * indent, key, val_str))
else:
output.append('%s%s %s' % (' ' * indent, key, val))
|
render_section
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, output, params, indent=0):\n for key, val in sorted(params.items()):\n if key.upper() != key:\n raise InputValidationError(\"keyword '%s' not upper case\" % key)\n if key.startswith('@') or key.startswith('$'):\n raise InputValidationError('CP2K preprocessor not supported')\n if isinstance(val, dict):\n output.append('%s&%s %s' % (' ' * indent, key, val.pop('_', '')))\n self._render_section(output, val, indent + 3)\n output.append('%s&END %s' % (' ' * indent, key))\n elif isinstance(val, list):\n for listitem in val:\n self._render_section(output, {key: listitem}, indent)\n elif isinstance(val, bool):\n val_str = '.true.' if val else '.false.'\n output.append('%s%s %s' % (' ' * indent, key, val_str))\n else:\n output.append('%s%s %s' % (' ' * indent, key, val))\n",
"role": "user"
},
{
"content": "render_section",
"role": "assistant"
}
] |
def x(query, params, models, model_to_fields):
cursor = connections[router.db_for_read(models[0])].cursor()
cursor.execute(query, params)
rows = cursor.fetchall()
for row in rows:
row_iter = iter(row)
yield [model_class(**dict((a, next(row_iter)) for a in
model_to_fields[model_class])) for model_class in models]
|
multi_raw
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(query, params, models, model_to_fields):\n cursor = connections[router.db_for_read(models[0])].cursor()\n cursor.execute(query, params)\n rows = cursor.fetchall()\n for row in rows:\n row_iter = iter(row)\n yield [model_class(**dict((a, next(row_iter)) for a in\n model_to_fields[model_class])) for model_class in models]\n",
"role": "user"
},
{
"content": "multi_raw",
"role": "assistant"
}
] |
def x(self):
server_relative = '%s?s=%s' % (reverse('tidings.unsubscribe', args=[
self.pk]), self.secret)
return 'https://%s%s' % (Site.objects.get_current().domain, server_relative
)
|
unsubscribe_url
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n server_relative = '%s?s=%s' % (reverse('tidings.unsubscribe', args=[\n self.pk]), self.secret)\n return 'https://%s%s' % (Site.objects.get_current().domain, server_relative\n )\n",
"role": "user"
},
{
"content": "unsubscribe_url",
"role": "assistant"
}
] |
def x(user):
Watch.objects.filter(email=user.email).update(email=None, user=user)
|
claim_watches
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(user):\n Watch.objects.filter(email=user.email).update(email=None, user=user)\n",
"role": "user"
},
{
"content": "claim_watches",
"role": "assistant"
}
] |
def x(*iterables, **kwargs):
key = kwargs.pop('key', lambda a: a)
reverse = kwargs.pop('reverse', False)
min_or_max = max if reverse else min
rows = [iter(iterable) for iterable in iterables if iterable]
next_values = {}
by_key = []
def x(row, index):
try:
next_value = next(row)
except StopIteration:
pass
else:
next_values[index] = next_value
by_key.append((key(next_value), index))
for index, row in enumerate(rows):
gather_next_value(row, index)
while by_key:
key_value, index = min_or_max(by_key)
by_key.remove((key_value, index))
next_value = next_values.pop(index)
yield next_value
gather_next_value(rows[index], index)
|
collate
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*iterables, **kwargs):\n key = kwargs.pop('key', lambda a: a)\n reverse = kwargs.pop('reverse', False)\n min_or_max = max if reverse else min\n rows = [iter(iterable) for iterable in iterables if iterable]\n next_values = {}\n by_key = []\n\n def x(row, index):\n try:\n next_value = next(row)\n except StopIteration:\n pass\n else:\n next_values[index] = next_value\n by_key.append((key(next_value), index))\n for index, row in enumerate(rows):\n gather_next_value(row, index)\n while by_key:\n key_value, index = min_or_max(by_key)\n by_key.remove((key_value, index))\n next_value = next_values.pop(index)\n yield next_value\n gather_next_value(rows[index], index)\n",
"role": "user"
},
{
"content": "collate",
"role": "assistant"
}
] |
def x(data):
if isinstance(data, string_types):
return crc32(data.encode('utf-8')) & 4294967295
else:
return int(data)
|
hash_to_unsigned
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n if isinstance(data, string_types):\n return crc32(data.encode('utf-8')) & 4294967295\n else:\n return int(data)\n",
"role": "user"
},
{
"content": "hash_to_unsigned",
"role": "assistant"
}
] |
def x(subject, template_path, vars, users_and_watches, from_email=settings.
TIDINGS_FROM_ADDRESS, **extra_kwargs):
template = loader.get_template(template_path)
context = Context(vars)
for u, w in users_and_watches:
context['user'] = u
context['watch'] = w[0]
context['watches'] = w
yield EmailMessage(subject, template.render(context), from_email, [
u.email], **extra_kwargs)
|
emails_with_users_and_watches
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(subject, template_path, vars, users_and_watches, from_email=settings.\n TIDINGS_FROM_ADDRESS, **extra_kwargs):\n template = loader.get_template(template_path)\n context = Context(vars)\n for u, w in users_and_watches:\n context['user'] = u\n context['watch'] = w[0]\n context['watches'] = w\n yield EmailMessage(subject, template.render(context), from_email, [\n u.email], **extra_kwargs)\n",
"role": "user"
},
{
"content": "emails_with_users_and_watches",
"role": "assistant"
}
] |
def x(setting_name, fallback):
path = getattr(settings, setting_name, None)
if path:
try:
return import_string(path)
except ImportError:
raise ImproperlyConfigured('%s: No such path.' % path)
else:
return fallback
|
import_from_setting
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(setting_name, fallback):\n path = getattr(settings, setting_name, None)\n if path:\n try:\n return import_string(path)\n except ImportError:\n raise ImproperlyConfigured('%s: No such path.' % path)\n else:\n return fallback\n",
"role": "user"
},
{
"content": "import_from_setting",
"role": "assistant"
}
] |
def x(self, **kwargs):
from aiida.engine import ExitCode
from aiida.common import NotExistent
try:
out_folder = self.retrieved
except NotExistent:
return self.exit_codes.ERROR_NO_RETRIEVED_FOLDER
self._parse_stdout(out_folder)
try:
structure = self._parse_trajectory(out_folder)
self.out('output_structure', structure)
except Exception:
pass
return ExitCode(0)
|
parse
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n from aiida.engine import ExitCode\n from aiida.common import NotExistent\n try:\n out_folder = self.retrieved\n except NotExistent:\n return self.exit_codes.ERROR_NO_RETRIEVED_FOLDER\n self._parse_stdout(out_folder)\n try:\n structure = self._parse_trajectory(out_folder)\n self.out('output_structure', structure)\n except Exception:\n pass\n return ExitCode(0)\n",
"role": "user"
},
{
"content": "parse",
"role": "assistant"
}
] |
def x(self, out_folder):
fname = self.node.load_process_class()._DEFAULT_OUTPUT_FILE
if fname not in out_folder._repository.list_object_names():
raise OutputParsingError('Cp2k output file not retrieved')
result_dict = {'exceeded_walltime': False}
abs_fn = os.path.join(out_folder._repository._get_base_folder().abspath,
fname)
with io.open(abs_fn, mode='r', encoding='utf-8') as fobj:
lines = fobj.readlines()
for i_line, line in enumerate(lines):
if line.startswith(' ENERGY| '):
result_dict['energy'] = float(line.split()[8])
result_dict['energy_units'] = 'a.u.'
if 'The number of warnings for this run is' in line:
result_dict['nwarnings'] = int(line.split()[-1])
if 'exceeded requested execution time' in line:
result_dict['exceeded_walltime'] = True
if 'KPOINTS| Band Structure Calculation' in line:
from aiida.orm import BandsData
bnds = BandsData()
kpoints, labels, bands = self._parse_bands(lines, i_line)
bnds.set_kpoints(kpoints)
bnds.labels = labels
bnds.set_bands(bands, units='eV')
self.out('output_bands', bnds)
if 'nwarnings' not in result_dict:
raise OutputParsingError('CP2K did not finish properly.')
self.out('output_parameters', Dict(dict=result_dict))
|
parse_stdout
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, out_folder):\n fname = self.node.load_process_class()._DEFAULT_OUTPUT_FILE\n if fname not in out_folder._repository.list_object_names():\n raise OutputParsingError('Cp2k output file not retrieved')\n result_dict = {'exceeded_walltime': False}\n abs_fn = os.path.join(out_folder._repository._get_base_folder().abspath,\n fname)\n with io.open(abs_fn, mode='r', encoding='utf-8') as fobj:\n lines = fobj.readlines()\n for i_line, line in enumerate(lines):\n if line.startswith(' ENERGY| '):\n result_dict['energy'] = float(line.split()[8])\n result_dict['energy_units'] = 'a.u.'\n if 'The number of warnings for this run is' in line:\n result_dict['nwarnings'] = int(line.split()[-1])\n if 'exceeded requested execution time' in line:\n result_dict['exceeded_walltime'] = True\n if 'KPOINTS| Band Structure Calculation' in line:\n from aiida.orm import BandsData\n bnds = BandsData()\n kpoints, labels, bands = self._parse_bands(lines, i_line)\n bnds.set_kpoints(kpoints)\n bnds.labels = labels\n bnds.set_bands(bands, units='eV')\n self.out('output_bands', bnds)\n if 'nwarnings' not in result_dict:\n raise OutputParsingError('CP2K did not finish properly.')\n self.out('output_parameters', Dict(dict=result_dict))\n",
"role": "user"
},
{
"content": "parse_stdout",
"role": "assistant"
}
] |
def x(lines, n_start):
kpoints = []
labels = []
bands_s1 = []
bands_s2 = []
known_kpoints = {}
pattern = re.compile('.*?Nr.*?Spin.*?K-Point.*?', re.DOTALL)
selected_lines = lines[n_start:]
for current_line, line in enumerate(selected_lines):
splitted = line.split()
if 'KPOINTS| Special K-Point' in line:
kpoint = tuple(map(float, splitted[-3:]))
if ' '.join(splitted[-5:-3]) != 'not specified':
label = splitted[-4]
known_kpoints[kpoint] = label
elif pattern.match(line):
spin = int(splitted[3])
kpoint = tuple(map(float, splitted[-3:]))
kpoint_n_lines = int(math.ceil(int(selected_lines[current_line +
1]) / 4.0))
band = list(map(float, ' '.join(selected_lines[current_line + 2
:current_line + 2 + kpoint_n_lines]).split()))
if spin == 1:
if kpoint in known_kpoints:
labels.append((len(kpoints), known_kpoints[kpoint]))
kpoints.append(kpoint)
bands_s1.append(band)
elif spin == 2:
bands_s2.append(band)
if bands_s2:
bands = [bands_s1, bands_s2]
else:
bands = bands_s1
return np.array(kpoints), labels, np.array(bands)
|
parse_bands
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(lines, n_start):\n kpoints = []\n labels = []\n bands_s1 = []\n bands_s2 = []\n known_kpoints = {}\n pattern = re.compile('.*?Nr.*?Spin.*?K-Point.*?', re.DOTALL)\n selected_lines = lines[n_start:]\n for current_line, line in enumerate(selected_lines):\n splitted = line.split()\n if 'KPOINTS| Special K-Point' in line:\n kpoint = tuple(map(float, splitted[-3:]))\n if ' '.join(splitted[-5:-3]) != 'not specified':\n label = splitted[-4]\n known_kpoints[kpoint] = label\n elif pattern.match(line):\n spin = int(splitted[3])\n kpoint = tuple(map(float, splitted[-3:]))\n kpoint_n_lines = int(math.ceil(int(selected_lines[current_line +\n 1]) / 4.0))\n band = list(map(float, ' '.join(selected_lines[current_line + 2\n :current_line + 2 + kpoint_n_lines]).split()))\n if spin == 1:\n if kpoint in known_kpoints:\n labels.append((len(kpoints), known_kpoints[kpoint]))\n kpoints.append(kpoint)\n bands_s1.append(band)\n elif spin == 2:\n bands_s2.append(band)\n if bands_s2:\n bands = [bands_s1, bands_s2]\n else:\n bands = bands_s1\n return np.array(kpoints), labels, np.array(bands)\n",
"role": "user"
},
{
"content": "parse_bands",
"role": "assistant"
}
] |
def x(self, out_folder):
fname = self.node.load_process_class()._DEFAULT_RESTART_FILE_NAME
if fname not in out_folder._repository.list_object_names():
raise Exception
abs_fn = os.path.join(out_folder._repository._get_base_folder().abspath,
fname)
with io.open(abs_fn, mode='r', encoding='utf-8') as fobj:
content = fobj.read()
match = re.search('\\n\\s*&COORD\\n(.*?)\\n\\s*&END COORD\\n', content,
DOTALL)
coord_lines = [line.strip().split() for line in match.group(1).splitlines()
]
symbols = [line[0] for line in coord_lines]
positions_str = [line[1:] for line in coord_lines]
positions = np.array(positions_str, np.float64)
match = re.search('\\n\\s*&CELL\\n(.*?)\\n\\s*&END CELL\\n', content,
re.DOTALL)
cell_lines = [line.strip().split() for line in match.group(1).splitlines()]
cell_str = [line[1:] for line in cell_lines if line[0] in 'ABC']
cell = np.array(cell_str, np.float64)
atoms = ase.Atoms(symbols=symbols, positions=positions, cell=cell)
return StructureData(ase=atoms)
|
parse_trajectory
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, out_folder):\n fname = self.node.load_process_class()._DEFAULT_RESTART_FILE_NAME\n if fname not in out_folder._repository.list_object_names():\n raise Exception\n abs_fn = os.path.join(out_folder._repository._get_base_folder().abspath,\n fname)\n with io.open(abs_fn, mode='r', encoding='utf-8') as fobj:\n content = fobj.read()\n match = re.search('\\\\n\\\\s*&COORD\\\\n(.*?)\\\\n\\\\s*&END COORD\\\\n', content,\n DOTALL)\n coord_lines = [line.strip().split() for line in match.group(1).splitlines()\n ]\n symbols = [line[0] for line in coord_lines]\n positions_str = [line[1:] for line in coord_lines]\n positions = np.array(positions_str, np.float64)\n match = re.search('\\\\n\\\\s*&CELL\\\\n(.*?)\\\\n\\\\s*&END CELL\\\\n', content,\n re.DOTALL)\n cell_lines = [line.strip().split() for line in match.group(1).splitlines()]\n cell_str = [line[1:] for line in cell_lines if line[0] in 'ABC']\n cell = np.array(cell_str, np.float64)\n atoms = ase.Atoms(symbols=symbols, positions=positions, cell=cell)\n return StructureData(ase=atoms)\n",
"role": "user"
},
{
"content": "parse_trajectory",
"role": "assistant"
}
] |
def x(request, watch_id):
ext = getattr(settings, 'TIDINGS_TEMPLATE_EXTENSION', 'html')
try:
watch = Watch.objects.get(pk=watch_id)
secret = request.GET.get('s')
if secret != watch.secret:
raise Watch.DoesNotExist
except Watch.DoesNotExist:
return render(request, 'tidings/unsubscribe_error.' + ext)
if request.method == 'POST':
watch.delete()
return render(request, 'tidings/unsubscribe_success.' + ext)
return render(request, 'tidings/unsubscribe.' + ext)
|
unsubscribe
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request, watch_id):\n ext = getattr(settings, 'TIDINGS_TEMPLATE_EXTENSION', 'html')\n try:\n watch = Watch.objects.get(pk=watch_id)\n secret = request.GET.get('s')\n if secret != watch.secret:\n raise Watch.DoesNotExist\n except Watch.DoesNotExist:\n return render(request, 'tidings/unsubscribe_error.' + ext)\n if request.method == 'POST':\n watch.delete()\n return render(request, 'tidings/unsubscribe_success.' + ext)\n return render(request, 'tidings/unsubscribe.' + ext)\n",
"role": "user"
},
{
"content": "unsubscribe",
"role": "assistant"
}
] |
def x(users_and_watches):
def x(user, cluster_email):
if not getattr(user, 'email', ''):
user = EmailUser(cluster_email)
return user
cluster_email = ''
favorite_user = None
watches = []
for u, w in users_and_watches:
row_email = u.email or w[0].email
if cluster_email.lower() != row_email.lower():
if cluster_email != '':
yield ensure_user_has_email(favorite_user, cluster_email
), watches
favorite_user, watches = u, []
cluster_email = row_email
elif (not favorite_user.email or not u.is_authenticated
) and u.email and u.is_authenticated:
favorite_user = u
watches.extend(w)
if favorite_user is not None:
yield ensure_user_has_email(favorite_user, cluster_email), watches
|
unique_by_email
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(users_and_watches):\n\n def x(user, cluster_email):\n if not getattr(user, 'email', ''):\n user = EmailUser(cluster_email)\n return user\n cluster_email = ''\n favorite_user = None\n watches = []\n for u, w in users_and_watches:\n row_email = u.email or w[0].email\n if cluster_email.lower() != row_email.lower():\n if cluster_email != '':\n yield ensure_user_has_email(favorite_user, cluster_email\n ), watches\n favorite_user, watches = u, []\n cluster_email = row_email\n elif (not favorite_user.email or not u.is_authenticated\n ) and u.email and u.is_authenticated:\n favorite_user = u\n watches.extend(w)\n if favorite_user is not None:\n yield ensure_user_has_email(favorite_user, cluster_email), watches\n",
"role": "user"
},
{
"content": "unique_by_email",
"role": "assistant"
}
] |
def x(self, exclude=None, delay=True):
if delay:
self._fire_task.apply_async(args=(self,), kwargs={'exclude':
exclude}, serializer='pickle')
else:
self._fire_task(self, exclude=exclude)
|
fire
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, exclude=None, delay=True):\n if delay:\n self._fire_task.apply_async(args=(self,), kwargs={'exclude':\n exclude}, serializer='pickle')\n else:\n self._fire_task(self, exclude=exclude)\n",
"role": "user"
},
{
"content": "fire",
"role": "assistant"
}
] |
def x(self, exclude=None):
connection = mail.get_connection(fail_silently=True)
connection.open()
for m in self._mails(self._users_watching(exclude=exclude)):
connection.send_messages([m])
|
fire_task
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, exclude=None):\n connection = mail.get_connection(fail_silently=True)\n connection.open()\n for m in self._mails(self._users_watching(exclude=exclude)):\n connection.send_messages([m])\n",
"role": "user"
},
{
"content": "fire_task",
"role": "assistant"
}
] |
def x(cls, filters):
for k in iterkeys(filters):
if k not in cls.filters:
raise TypeError("%s got an unsupported filter type '%s'" % (cls
.__name__, k))
|
validate_filters
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, filters):\n for k in iterkeys(filters):\n if k not in cls.filters:\n raise TypeError(\"%s got an unsupported filter type '%s'\" % (cls\n .__name__, k))\n",
"role": "user"
},
{
"content": "validate_filters",
"role": "assistant"
}
] |
def x(self, object_id=None, exclude=None, **filters):
if exclude is None:
exclude = []
elif not isinstance(exclude, Sequence):
exclude = [exclude]
def x():
self._validate_filters(filters)
joins, wheres, join_params, where_params = [], [], [], []
for n, (k, v) in enumerate(iteritems(filters)):
joins.append(
'LEFT JOIN tidings_watchfilter f{n} ON f{n}.watch_id=w.id AND f{n}.name=%s'
.format(n=n))
join_params.append(k)
wheres.append('(f{n}.value=%s OR f{n}.value IS NULL)'.format(n=n))
where_params.append(hash_to_unsigned(v))
return joins, wheres, join_params + where_params
joins, wheres, params = filter_conditions()
wheres.append('w.event_type=%s')
params.append(self.event_type)
if self.content_type:
wheres.append('(w.content_type_id IS NULL OR w.content_type_id=%s)')
params.append(ContentType.objects.get_for_model(self.content_type).id)
if object_id:
wheres.append('(w.object_id IS NULL OR w.object_id=%s)')
params.append(object_id)
if exclude:
if not all(e.id for e in exclude):
raise ValueError("Can't exclude an unsaved User.")
wheres.append('(u.id IS NULL OR u.id NOT IN (%s))' % ', '.join('%s' for
e in exclude))
params.extend(e.id for e in exclude)
def x(model):
if hasattr(model._meta, '_fields'):
return model._meta._fields()
else:
return model._meta.fields
User = get_user_model()
model_to_fields = dict((m, [f.get_attname() for f in get_fields(m)]) for
m in [User, Watch])
query_fields = ['u.{0}'.format(field) for field in model_to_fields[User]]
query_fields.extend(['w.{0}'.format(field) for field in model_to_fields
[Watch]])
query = (
'SELECT {fields} FROM tidings_watch w LEFT JOIN {user_table} u ON u.id=w.user_id {joins} WHERE {wheres} AND (length(w.email)>0 OR length(u.email)>0) AND w.is_active ORDER BY u.email DESC, w.email DESC'
.format(fields=', '.join(query_fields), joins=' '.join(joins),
wheres=' AND '.join(wheres), user_table=User._meta.db_table))
return _unique_by_email((u, [w]) for u, w in multi_raw(query, params, [
User, Watch], model_to_fields))
|
users_watching_by_filter
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, object_id=None, exclude=None, **filters):\n if exclude is None:\n exclude = []\n elif not isinstance(exclude, Sequence):\n exclude = [exclude]\n\n def x():\n self._validate_filters(filters)\n joins, wheres, join_params, where_params = [], [], [], []\n for n, (k, v) in enumerate(iteritems(filters)):\n joins.append(\n 'LEFT JOIN tidings_watchfilter f{n} ON f{n}.watch_id=w.id AND f{n}.name=%s'\n .format(n=n))\n join_params.append(k)\n wheres.append('(f{n}.value=%s OR f{n}.value IS NULL)'.format(n=n))\n where_params.append(hash_to_unsigned(v))\n return joins, wheres, join_params + where_params\n joins, wheres, params = filter_conditions()\n wheres.append('w.event_type=%s')\n params.append(self.event_type)\n if self.content_type:\n wheres.append('(w.content_type_id IS NULL OR w.content_type_id=%s)')\n params.append(ContentType.objects.get_for_model(self.content_type).id)\n if object_id:\n wheres.append('(w.object_id IS NULL OR w.object_id=%s)')\n params.append(object_id)\n if exclude:\n if not all(e.id for e in exclude):\n raise ValueError(\"Can't exclude an unsaved User.\")\n wheres.append('(u.id IS NULL OR u.id NOT IN (%s))' % ', '.join('%s' for\n e in exclude))\n params.extend(e.id for e in exclude)\n\n def x(model):\n if hasattr(model._meta, '_fields'):\n return model._meta._fields()\n else:\n return model._meta.fields\n User = get_user_model()\n model_to_fields = dict((m, [f.get_attname() for f in get_fields(m)]) for\n m in [User, Watch])\n query_fields = ['u.{0}'.format(field) for field in model_to_fields[User]]\n query_fields.extend(['w.{0}'.format(field) for field in model_to_fields\n [Watch]])\n query = (\n 'SELECT {fields} FROM tidings_watch w LEFT JOIN {user_table} u ON u.id=w.user_id {joins} WHERE {wheres} AND (length(w.email)>0 OR length(u.email)>0) AND w.is_active ORDER BY u.email DESC, w.email DESC'\n .format(fields=', '.join(query_fields), joins=' '.join(joins),\n wheres=' AND '.join(wheres), user_table=User._meta.db_table))\n return _unique_by_email((u, [w]) for u, w in multi_raw(query, params, [\n User, Watch], model_to_fields))\n",
"role": "user"
},
{
"content": "users_watching_by_filter",
"role": "assistant"
}
] |
def x(cls, user_or_email, object_id=None, **filters):
cls._validate_filters(filters)
if isinstance(user_or_email, string_types):
user_condition = Q(email=user_or_email)
elif user_or_email.is_authenticated:
user_condition = Q(user=user_or_email)
else:
return Watch.objects.none()
watches = getattr(Watch, 'uncached', Watch.objects).filter(user_condition,
Q(content_type=ContentType.objects.get_for_model(cls.content_type)) if
cls.content_type else Q(), Q(object_id=object_id) if object_id else
Q(), event_type=cls.event_type).extra(where=[
'(SELECT count(*) FROM tidings_watchfilter WHERE tidings_watchfilter.watch_id=tidings_watch.id)=%s'
], params=[len(filters)])
for k, v in iteritems(filters):
watches = watches.filter(filters__name=k, filters__value=
hash_to_unsigned(v))
return watches
|
watches_belonging_to_user
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, object_id=None, **filters):\n cls._validate_filters(filters)\n if isinstance(user_or_email, string_types):\n user_condition = Q(email=user_or_email)\n elif user_or_email.is_authenticated:\n user_condition = Q(user=user_or_email)\n else:\n return Watch.objects.none()\n watches = getattr(Watch, 'uncached', Watch.objects).filter(user_condition,\n Q(content_type=ContentType.objects.get_for_model(cls.content_type)) if\n cls.content_type else Q(), Q(object_id=object_id) if object_id else\n Q(), event_type=cls.event_type).extra(where=[\n '(SELECT count(*) FROM tidings_watchfilter WHERE tidings_watchfilter.watch_id=tidings_watch.id)=%s'\n ], params=[len(filters)])\n for k, v in iteritems(filters):\n watches = watches.filter(filters__name=k, filters__value=\n hash_to_unsigned(v))\n return watches\n",
"role": "user"
},
{
"content": "watches_belonging_to_user",
"role": "assistant"
}
] |
def x(cls, user_or_email_, object_id=None, **filters):
return cls._watches_belonging_to_user(user_or_email_, object_id=
object_id, **filters).exists()
|
is_notifying
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email_, object_id=None, **filters):\n return cls._watches_belonging_to_user(user_or_email_, object_id=\n object_id, **filters).exists()\n",
"role": "user"
},
{
"content": "is_notifying",
"role": "assistant"
}
] |
def x(cls, user_or_email_, object_id=None, **filters):
try:
watch = cls._watches_belonging_to_user(user_or_email_, object_id=
object_id, **filters)[0:1].get()
except Watch.DoesNotExist:
create_kwargs = {}
if cls.content_type:
create_kwargs['content_type'] = ContentType.objects.get_for_model(
cls.content_type)
create_kwargs['email' if isinstance(user_or_email_, string_types) else
'user'] = user_or_email_
distinguishable_letters = (
'abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRTUVWXYZ')
secret = ''.join(random.choice(distinguishable_letters) for x in
range(10))
is_active = ('user' in create_kwargs or not settings.
TIDINGS_CONFIRM_ANONYMOUS_WATCHES)
if object_id:
create_kwargs['object_id'] = object_id
watch = Watch.objects.create(secret=secret, is_active=is_active,
event_type=cls.event_type, **create_kwargs)
for k, v in iteritems(filters):
WatchFilter.objects.create(watch=watch, name=k, value=
hash_to_unsigned(v))
if not watch.is_active:
email = watch.user.email if watch.user else watch.email
message = cls._activation_email(watch, email)
try:
message.send()
except SMTPException as e:
watch.delete()
raise ActivationRequestFailed(e.recipients)
return watch
|
notify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email_, object_id=None, **filters):\n try:\n watch = cls._watches_belonging_to_user(user_or_email_, object_id=\n object_id, **filters)[0:1].get()\n except Watch.DoesNotExist:\n create_kwargs = {}\n if cls.content_type:\n create_kwargs['content_type'] = ContentType.objects.get_for_model(\n cls.content_type)\n create_kwargs['email' if isinstance(user_or_email_, string_types) else\n 'user'] = user_or_email_\n distinguishable_letters = (\n 'abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRTUVWXYZ')\n secret = ''.join(random.choice(distinguishable_letters) for x in\n range(10))\n is_active = ('user' in create_kwargs or not settings.\n TIDINGS_CONFIRM_ANONYMOUS_WATCHES)\n if object_id:\n create_kwargs['object_id'] = object_id\n watch = Watch.objects.create(secret=secret, is_active=is_active,\n event_type=cls.event_type, **create_kwargs)\n for k, v in iteritems(filters):\n WatchFilter.objects.create(watch=watch, name=k, value=\n hash_to_unsigned(v))\n if not watch.is_active:\n email = watch.user.email if watch.user else watch.email\n message = cls._activation_email(watch, email)\n try:\n message.send()\n except SMTPException as e:\n watch.delete()\n raise ActivationRequestFailed(e.recipients)\n return watch\n",
"role": "user"
},
{
"content": "notify",
"role": "assistant"
}
] |
def x(cls, user_or_email, instance):
return super(InstanceEvent, cls).notify(user_or_email, object_id=
instance.pk)
|
notify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, instance):\n return super(InstanceEvent, cls).notify(user_or_email, object_id=\n instance.pk)\n",
"role": "user"
},
{
"content": "notify",
"role": "assistant"
}
] |
def x(cls, user_or_email, instance):
super(InstanceEvent, cls).stop_notifying(user_or_email, object_id=
instance.pk)
|
stop_notifying
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, instance):\n super(InstanceEvent, cls).stop_notifying(user_or_email, object_id=\n instance.pk)\n",
"role": "user"
},
{
"content": "stop_notifying",
"role": "assistant"
}
] |
def x(cls, user_or_email, instance):
return super(InstanceEvent, cls).is_notifying(user_or_email, object_id=
instance.pk)
|
is_notifying
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, instance):\n return super(InstanceEvent, cls).is_notifying(user_or_email, object_id=\n instance.pk)\n",
"role": "user"
},
{
"content": "is_notifying",
"role": "assistant"
}
] |
def x(self, **kwargs):
return self._users_watching_by_filter(object_id=self.instance.pk, **kwargs)
|
users_watching
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n return self._users_watching_by_filter(object_id=self.instance.pk, **kwargs)\n",
"role": "user"
},
{
"content": "users_watching",
"role": "assistant"
}
] |
def x(self):
if not self._crypter:
return b''
try:
plaintext = self._crypter.decrypt(self._ciphertext, **self.
_decrypt_params)
return plaintext
except Exception as e:
exc_info = sys.exc_info()
six.reraise(ValueError('Invalid ciphertext "%s", error: %s' % (self
._ciphertext, e)), None, exc_info[2])
|
decrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._crypter:\n return b''\n try:\n plaintext = self._crypter.decrypt(self._ciphertext, **self.\n _decrypt_params)\n return plaintext\n except Exception as e:\n exc_info = sys.exc_info()\n six.reraise(ValueError('Invalid ciphertext \"%s\", error: %s' % (self\n ._ciphertext, e)), None, exc_info[2])\n",
"role": "user"
},
{
"content": "decrypt",
"role": "assistant"
}
] |
def x(self, msg, iv='', auth_data=None):
if not iv:
raise ValueError('Missing Nonce')
return self.key.encrypt(iv, msg, auth_data)
|
encrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, iv='', auth_data=None):\n if not iv:\n raise ValueError('Missing Nonce')\n return self.key.encrypt(iv, msg, auth_data)\n",
"role": "user"
},
{
"content": "encrypt",
"role": "assistant"
}
] |
def x(self, cipher_text, iv='', auth_data=None, tag=b''):
if not iv:
raise ValueError('Missing Nonce')
return self.key.decrypt(iv, cipher_text + tag, auth_data)
|
decrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cipher_text, iv='', auth_data=None, tag=b''):\n if not iv:\n raise ValueError('Missing Nonce')\n return self.key.decrypt(iv, cipher_text + tag, auth_data)\n",
"role": "user"
},
{
"content": "decrypt",
"role": "assistant"
}
] |
def x(self, enc_alg, msg, auth_data=b'', key=None, iv=''):
iv = self._generate_iv(enc_alg, iv)
if enc_alg in ['A192GCM', 'A128GCM', 'A256GCM']:
aes = AES_GCMEncrypter(key=key)
ctx, tag = split_ctx_and_tag(aes.encrypt(msg, iv, auth_data))
elif enc_alg in ['A128CBC-HS256', 'A192CBC-HS384', 'A256CBC-HS512']:
aes = AES_CBCEncrypter(key=key)
ctx, tag = aes.encrypt(msg, iv, auth_data)
else:
raise NotSupportedAlgorithm(enc_alg)
return ctx, tag, aes.key
|
enc_setup
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, enc_alg, msg, auth_data=b'', key=None, iv=''):\n iv = self._generate_iv(enc_alg, iv)\n if enc_alg in ['A192GCM', 'A128GCM', 'A256GCM']:\n aes = AES_GCMEncrypter(key=key)\n ctx, tag = split_ctx_and_tag(aes.encrypt(msg, iv, auth_data))\n elif enc_alg in ['A128CBC-HS256', 'A192CBC-HS384', 'A256CBC-HS512']:\n aes = AES_CBCEncrypter(key=key)\n ctx, tag = aes.encrypt(msg, iv, auth_data)\n else:\n raise NotSupportedAlgorithm(enc_alg)\n return ctx, tag, aes.key\n",
"role": "user"
},
{
"content": "enc_setup",
"role": "assistant"
}
] |
def x(enc, key, ctxt, iv, tag, auth_data=b''):
if enc in ['A128GCM', 'A192GCM', 'A256GCM']:
aes = AES_GCMEncrypter(key=key)
elif enc in ['A128CBC-HS256', 'A192CBC-HS384', 'A256CBC-HS512']:
aes = AES_CBCEncrypter(key=key)
else:
raise Exception('Unsupported encryption algorithm %s' % enc)
try:
return aes.decrypt(ctxt, iv=iv, auth_data=auth_data, tag=tag)
except DecryptionFailed:
raise
|
decrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(enc, key, ctxt, iv, tag, auth_data=b''):\n if enc in ['A128GCM', 'A192GCM', 'A256GCM']:\n aes = AES_GCMEncrypter(key=key)\n elif enc in ['A128CBC-HS256', 'A192CBC-HS384', 'A256CBC-HS512']:\n aes = AES_CBCEncrypter(key=key)\n else:\n raise Exception('Unsupported encryption algorithm %s' % enc)\n try:\n return aes.decrypt(ctxt, iv=iv, auth_data=auth_data, tag=tag)\n except DecryptionFailed:\n raise\n",
"role": "user"
},
{
"content": "decrypt",
"role": "assistant"
}
] |
def x(self, msg, key):
hasher = hashes.Hash(self.hash_algorithm(), backend=default_backend())
hasher.update(msg)
digest = hasher.finalize()
sig = key.sign(digest, padding.PSS(mgf=padding.MGF1(self.hash_algorithm
()), salt_length=padding.PSS.MAX_LENGTH), utils.Prehashed(self.
hash_algorithm()))
return sig
|
sign
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n hasher = hashes.Hash(self.hash_algorithm(), backend=default_backend())\n hasher.update(msg)\n digest = hasher.finalize()\n sig = key.sign(digest, padding.PSS(mgf=padding.MGF1(self.hash_algorithm\n ()), salt_length=padding.PSS.MAX_LENGTH), utils.Prehashed(self.\n hash_algorithm()))\n return sig\n",
"role": "user"
},
{
"content": "sign",
"role": "assistant"
}
] |
def x(self, msg, signature, key):
try:
key.verify(signature, msg, padding.PSS(mgf=padding.MGF1(self.
hash_algorithm()), salt_length=padding.PSS.MAX_LENGTH), self.
hash_algorithm())
except InvalidSignature as err:
raise BadSignature(err)
else:
return True
|
verify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, signature, key):\n try:\n key.verify(signature, msg, padding.PSS(mgf=padding.MGF1(self.\n hash_algorithm()), salt_length=padding.PSS.MAX_LENGTH), self.\n hash_algorithm())\n except InvalidSignature as err:\n raise BadSignature(err)\n else:\n return True\n",
"role": "user"
},
{
"content": "verify",
"role": "assistant"
}
] |
def x(self, key, iv='', cek='', **kwargs):
_msg = as_bytes(self.msg)
_args = self._dict
try:
_args['kid'] = kwargs['kid']
except KeyError:
pass
jwe = JWEnc(**_args)
iv = self._generate_iv(self['enc'], iv)
cek = self._generate_key(self['enc'], cek)
if isinstance(key, SYMKey):
try:
kek = key.key.encode('utf8')
except AttributeError:
kek = key.key
elif isinstance(key, bytes):
kek = key
else:
kek = intarr2str(key)
jek = aes_key_wrap(kek, cek, default_backend())
_enc = self['enc']
_auth_data = jwe.b64_encode_header()
ctxt, tag, cek = self.enc_setup(_enc, _msg, auth_data=_auth_data, key=
cek, iv=iv)
return jwe.pack(parts=[jek, iv, ctxt, tag])
|
encrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n _args = self._dict\n try:\n _args['kid'] = kwargs['kid']\n except KeyError:\n pass\n jwe = JWEnc(**_args)\n iv = self._generate_iv(self['enc'], iv)\n cek = self._generate_key(self['enc'], cek)\n if isinstance(key, SYMKey):\n try:\n kek = key.key.encode('utf8')\n except AttributeError:\n kek = key.key\n elif isinstance(key, bytes):\n kek = key\n else:\n kek = intarr2str(key)\n jek = aes_key_wrap(kek, cek, default_backend())\n _enc = self['enc']\n _auth_data = jwe.b64_encode_header()\n ctxt, tag, cek = self.enc_setup(_enc, _msg, auth_data=_auth_data, key=\n cek, iv=iv)\n return jwe.pack(parts=[jek, iv, ctxt, tag])\n",
"role": "user"
},
{
"content": "encrypt",
"role": "assistant"
}
] |
def x(num):
ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[
as_unicode(num['crv'])]())
return ecpn.public_key(default_backend())
|
ec_construct_public
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(num):\n ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[\n as_unicode(num['crv'])]())\n return ecpn.public_key(default_backend())\n",
"role": "user"
},
{
"content": "ec_construct_public",
"role": "assistant"
}
] |
def x(num):
pub_ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[
as_unicode(num['crv'])]())
priv_ecpn = ec.EllipticCurvePrivateNumbers(num['d'], pub_ecpn)
return priv_ecpn.private_key(default_backend())
|
ec_construct_private
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(num):\n pub_ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[\n as_unicode(num['crv'])]())\n priv_ecpn = ec.EllipticCurvePrivateNumbers(num['d'], pub_ecpn)\n return priv_ecpn.private_key(default_backend())\n",
"role": "user"
},
{
"content": "ec_construct_private",
"role": "assistant"
}
] |
def x(filename, passphrase=None):
with open(filename, 'rb') as key_file:
private_key = serialization.load_pem_private_key(key_file.read(),
password=passphrase, backend=default_backend())
return private_key
|
import_private_key_from_file
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename, passphrase=None):\n with open(filename, 'rb') as key_file:\n private_key = serialization.load_pem_private_key(key_file.read(),\n password=passphrase, backend=default_backend())\n return private_key\n",
"role": "user"
},
{
"content": "import_private_key_from_file",
"role": "assistant"
}
] |
def x(self):
if isinstance(self.x, (str, bytes)):
_x = deser(self.x)
else:
raise ValueError('"x" MUST be a string')
if isinstance(self.y, (str, bytes)):
_y = deser(self.y)
else:
raise ValueError('"y" MUST be a string')
if self.d:
try:
if isinstance(self.d, (str, bytes)):
_d = deser(self.d)
self.priv_key = ec_construct_private({'x': _x, 'y': _y,
'crv': self.crv, 'd': _d})
self.pub_key = self.priv_key.public_key()
except ValueError as err:
raise DeSerializationNotPossible(str(err))
else:
self.pub_key = ec_construct_public({'x': _x, 'y': _y, 'crv': self.crv})
|
deserialize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if isinstance(self.x, (str, bytes)):\n _x = deser(self.x)\n else:\n raise ValueError('\"x\" MUST be a string')\n if isinstance(self.y, (str, bytes)):\n _y = deser(self.y)\n else:\n raise ValueError('\"y\" MUST be a string')\n if self.d:\n try:\n if isinstance(self.d, (str, bytes)):\n _d = deser(self.d)\n self.priv_key = ec_construct_private({'x': _x, 'y': _y,\n 'crv': self.crv, 'd': _d})\n self.pub_key = self.priv_key.public_key()\n except ValueError as err:\n raise DeSerializationNotPossible(str(err))\n else:\n self.pub_key = ec_construct_public({'x': _x, 'y': _y, 'crv': self.crv})\n",
"role": "user"
},
{
"content": "deserialize",
"role": "assistant"
}
] |
def x(self, private=False):
if self.priv_key:
self._serialize(self.priv_key)
else:
self._serialize(self.pub_key)
res = self.common()
res.update({'crv': self.crv, 'x': self.x, 'y': self.y})
if private and self.d:
res['d'] = self.d
return res
|
serialize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False):\n if self.priv_key:\n self._serialize(self.priv_key)\n else:\n self._serialize(self.pub_key)\n res = self.common()\n res.update({'crv': self.crv, 'x': self.x, 'y': self.y})\n if private and self.d:\n res['d'] = self.d\n return res\n",
"role": "user"
},
{
"content": "serialize",
"role": "assistant"
}
] |
def x(self, key):
self._serialize(key)
if isinstance(key, ec.EllipticCurvePrivateKey):
self.priv_key = key
self.pub_key = key.public_key()
else:
self.pub_key = key
return self
|
load_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key):\n self._serialize(key)\n if isinstance(key, ec.EllipticCurvePrivateKey):\n self.priv_key = key\n self.pub_key = key.public_key()\n else:\n self.pub_key = key\n return self\n",
"role": "user"
},
{
"content": "load_key",
"role": "assistant"
}
] |
def x(spec):
try:
size = spec['size']
except KeyError:
size = 2048
kb = KeyBundle(keytype='RSA')
if 'use' in spec:
for use in harmonize_usage(spec['use']):
_key = new_rsa_key(use=use, key_size=size)
kb.append(_key)
else:
_key = new_rsa_key(key_size=size)
kb.append(_key)
return kb
|
rsa_init
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(spec):\n try:\n size = spec['size']\n except KeyError:\n size = 2048\n kb = KeyBundle(keytype='RSA')\n if 'use' in spec:\n for use in harmonize_usage(spec['use']):\n _key = new_rsa_key(use=use, key_size=size)\n kb.append(_key)\n else:\n _key = new_rsa_key(key_size=size)\n kb.append(_key)\n return kb\n",
"role": "user"
},
{
"content": "rsa_init",
"role": "assistant"
}
] |
def x(spec):
kb = KeyBundle(keytype='EC')
if 'use' in spec:
for use in spec['use']:
eck = new_ec_key(crv=spec['crv'], use=use)
kb.append(eck)
else:
eck = new_ec_key(crv=spec['crv'])
kb.append(eck)
return kb
|
ec_init
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(spec):\n kb = KeyBundle(keytype='EC')\n if 'use' in spec:\n for use in spec['use']:\n eck = new_ec_key(crv=spec['crv'], use=use)\n kb.append(eck)\n else:\n eck = new_ec_key(crv=spec['crv'])\n kb.append(eck)\n return kb\n",
"role": "user"
},
{
"content": "ec_init",
"role": "assistant"
}
] |
def x(filename, typ, usage):
usage = harmonize_usage(usage)
if typ.lower() == 'jwks':
kb = KeyBundle(source=filename, fileformat='jwks', keyusage=usage)
elif typ.lower() == 'der':
kb = KeyBundle(source=filename, fileformat='der', keyusage=usage)
else:
raise UnknownKeyType('Unsupported key type')
return kb
|
keybundle_from_local_file
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename, typ, usage):\n usage = harmonize_usage(usage)\n if typ.lower() == 'jwks':\n kb = KeyBundle(source=filename, fileformat='jwks', keyusage=usage)\n elif typ.lower() == 'der':\n kb = KeyBundle(source=filename, fileformat='der', keyusage=usage)\n else:\n raise UnknownKeyType('Unsupported key type')\n return kb\n",
"role": "user"
},
{
"content": "keybundle_from_local_file",
"role": "assistant"
}
] |
def x(kbl, target, private=False):
keys = []
for kb in kbl:
keys.extend([k.serialize(private) for k in kb.keys() if k.kty !=
'oct' and not k.inactive_since])
res = {'keys': keys}
try:
f = open(target, 'w')
except IOError:
head, tail = os.path.split(target)
os.makedirs(head)
f = open(target, 'w')
_txt = json.dumps(res)
f.write(_txt)
f.close()
|
dump_jwks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kbl, target, private=False):\n keys = []\n for kb in kbl:\n keys.extend([k.serialize(private) for k in kb.keys() if k.kty !=\n 'oct' and not k.inactive_since])\n res = {'keys': keys}\n try:\n f = open(target, 'w')\n except IOError:\n head, tail = os.path.split(target)\n os.makedirs(head)\n f = open(target, 'w')\n _txt = json.dumps(res)\n f.write(_txt)\n f.close()\n",
"role": "user"
},
{
"content": "dump_jwks",
"role": "assistant"
}
] |
def x(key_conf, kid_template=''):
kid = 0
tot_kb = KeyBundle()
for spec in key_conf:
typ = spec['type'].upper()
if typ == 'RSA':
if 'key' in spec:
error_to_catch = OSError, IOError, DeSerializationNotPossible
try:
kb = KeyBundle(source='file://%s' % spec['key'],
fileformat='der', keytype=typ, keyusage=spec['use'])
except error_to_catch:
kb = rsa_init(spec)
except Exception:
raise
else:
kb = rsa_init(spec)
elif typ == 'EC':
kb = ec_init(spec)
else:
continue
if 'kid' in spec and len(kb) == 1:
ks = kb.keys()
ks[0].kid = spec['kid']
else:
for k in kb.keys():
if kid_template:
k.kid = kid_template % kid
kid += 1
else:
k.add_kid()
tot_kb.extend(kb.keys())
return tot_kb
|
build_key_bundle
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_conf, kid_template=''):\n kid = 0\n tot_kb = KeyBundle()\n for spec in key_conf:\n typ = spec['type'].upper()\n if typ == 'RSA':\n if 'key' in spec:\n error_to_catch = OSError, IOError, DeSerializationNotPossible\n try:\n kb = KeyBundle(source='file://%s' % spec['key'],\n fileformat='der', keytype=typ, keyusage=spec['use'])\n except error_to_catch:\n kb = rsa_init(spec)\n except Exception:\n raise\n else:\n kb = rsa_init(spec)\n elif typ == 'EC':\n kb = ec_init(spec)\n else:\n continue\n if 'kid' in spec and len(kb) == 1:\n ks = kb.keys()\n ks[0].kid = spec['kid']\n else:\n for k in kb.keys():\n if kid_template:\n k.kid = kid_template % kid\n kid += 1\n else:\n k.add_kid()\n tot_kb.extend(kb.keys())\n return tot_kb\n",
"role": "user"
},
{
"content": "build_key_bundle",
"role": "assistant"
}
] |
def x(kd1, kd2):
_l = _cmp(kd1['type'], kd2['type'])
if _l:
return _l
if kd1['type'] == 'EC':
_l = _cmp(kd1['crv'], kd2['crv'])
if _l:
return _l
_l = _cmp(kd1['type'], kd2['type'])
if _l:
return _l
_l = _cmp(kd1['use'][0], kd2['use'][0])
if _l:
return _l
try:
_kid1 = kd1['kid']
except KeyError:
_kid1 = None
try:
_kid2 = kd2['kid']
except KeyError:
_kid2 = None
if _kid1 and _kid2:
return _cmp(_kid1, _kid2)
elif _kid1:
return -1
elif _kid2:
return 1
return 0
|
sort_func
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kd1, kd2):\n _l = _cmp(kd1['type'], kd2['type'])\n if _l:\n return _l\n if kd1['type'] == 'EC':\n _l = _cmp(kd1['crv'], kd2['crv'])\n if _l:\n return _l\n _l = _cmp(kd1['type'], kd2['type'])\n if _l:\n return _l\n _l = _cmp(kd1['use'][0], kd2['use'][0])\n if _l:\n return _l\n try:\n _kid1 = kd1['kid']\n except KeyError:\n _kid1 = None\n try:\n _kid2 = kd2['kid']\n except KeyError:\n _kid2 = None\n if _kid1 and _kid2:\n return _cmp(_kid1, _kid2)\n elif _kid1:\n return -1\n elif _kid2:\n return 1\n return 0\n",
"role": "user"
},
{
"content": "sort_func",
"role": "assistant"
}
] |
def x(key_def):
_int = []
for kd in key_def:
if len(kd['use']) > 1:
for _use in kd['use']:
_kd = kd.copy()
_kd['use'] = _use
_int.append(_kd)
else:
_int.append(kd)
_int.sort(key=cmp_to_key(sort_func))
return _int
|
order_key_defs
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_def):\n _int = []\n for kd in key_def:\n if len(kd['use']) > 1:\n for _use in kd['use']:\n _kd = kd.copy()\n _kd['use'] = _use\n _int.append(_kd)\n else:\n _int.append(kd)\n _int.sort(key=cmp_to_key(sort_func))\n return _int\n",
"role": "user"
},
{
"content": "order_key_defs",
"role": "assistant"
}
] |
def x(key_bundle, key_defs):
keys = key_bundle.get()
diff = {}
key_defs = order_key_defs(key_defs)[:]
used = []
for key in keys:
match = False
for kd in key_defs:
if key.use not in kd['use']:
continue
if key.kty != kd['type']:
continue
if key.kty == 'EC':
if key.crv != kd['crv']:
continue
try:
_kid = kd['kid']
except KeyError:
pass
else:
if key.kid != _kid:
continue
match = True
used.append(kd)
key_defs.remove(kd)
break
if not match:
try:
diff['del'].append(key)
except KeyError:
diff['del'] = [key]
if key_defs:
_kb = build_key_bundle(key_defs)
diff['add'] = _kb.keys()
return diff
|
key_diff
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_bundle, key_defs):\n keys = key_bundle.get()\n diff = {}\n key_defs = order_key_defs(key_defs)[:]\n used = []\n for key in keys:\n match = False\n for kd in key_defs:\n if key.use not in kd['use']:\n continue\n if key.kty != kd['type']:\n continue\n if key.kty == 'EC':\n if key.crv != kd['crv']:\n continue\n try:\n _kid = kd['kid']\n except KeyError:\n pass\n else:\n if key.kid != _kid:\n continue\n match = True\n used.append(kd)\n key_defs.remove(kd)\n break\n if not match:\n try:\n diff['del'].append(key)\n except KeyError:\n diff['del'] = [key]\n if key_defs:\n _kb = build_key_bundle(key_defs)\n diff['add'] = _kb.keys()\n return diff\n",
"role": "user"
},
{
"content": "key_diff",
"role": "assistant"
}
] |
def x(key_bundle, diff):
try:
_add = diff['add']
except KeyError:
pass
else:
key_bundle.extend(_add)
try:
_del = diff['del']
except KeyError:
pass
else:
_now = time.time()
for k in _del:
k.inactive_since = _now
|
update_key_bundle
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_bundle, diff):\n try:\n _add = diff['add']\n except KeyError:\n pass\n else:\n key_bundle.extend(_add)\n try:\n _del = diff['del']\n except KeyError:\n pass\n else:\n _now = time.time()\n for k in _del:\n k.inactive_since = _now\n",
"role": "user"
},
{
"content": "update_key_bundle",
"role": "assistant"
}
] |
def x(kb):
key_spec = []
for key in kb.get():
_spec = {'type': key.kty, 'use': [key.use]}
if key.kty == 'EC':
_spec['crv'] = key.crv
key_spec.append(_spec)
diff = {'del': kb.get()}
_kb = build_key_bundle(key_spec)
diff['add'] = _kb.keys()
update_key_bundle(kb, diff)
return kb
|
key_rollover
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kb):\n key_spec = []\n for key in kb.get():\n _spec = {'type': key.kty, 'use': [key.use]}\n if key.kty == 'EC':\n _spec['crv'] = key.crv\n key_spec.append(_spec)\n diff = {'del': kb.get()}\n _kb = build_key_bundle(key_spec)\n diff['add'] = _kb.keys()\n update_key_bundle(kb, diff)\n return kb\n",
"role": "user"
},
{
"content": "key_rollover",
"role": "assistant"
}
] |
def x(self, keys):
for inst in keys:
typ = inst['kty']
try:
_usage = harmonize_usage(inst['use'])
except KeyError:
_usage = ['']
else:
del inst['use']
flag = 0
for _use in _usage:
for _typ in [typ, typ.lower(), typ.upper()]:
try:
_key = K2C[_typ](use=_use, **inst)
except KeyError:
continue
except JWKException as err:
logger.warning('While loading keys: {}'.format(err))
else:
if _key not in self._keys:
self._keys.append(_key)
flag = 1
break
if not flag:
logger.warning('While loading keys, UnknownKeyType: {}'.format(typ)
)
|
do_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys):\n for inst in keys:\n typ = inst['kty']\n try:\n _usage = harmonize_usage(inst['use'])\n except KeyError:\n _usage = ['']\n else:\n del inst['use']\n flag = 0\n for _use in _usage:\n for _typ in [typ, typ.lower(), typ.upper()]:\n try:\n _key = K2C[_typ](use=_use, **inst)\n except KeyError:\n continue\n except JWKException as err:\n logger.warning('While loading keys: {}'.format(err))\n else:\n if _key not in self._keys:\n self._keys.append(_key)\n flag = 1\n break\n if not flag:\n logger.warning('While loading keys, UnknownKeyType: {}'.format(typ)\n )\n",
"role": "user"
},
{
"content": "do_keys",
"role": "assistant"
}
] |
def x(self, filename):
_info = json.loads(open(filename).read())
if 'keys' in _info:
self.do_keys(_info['keys'])
else:
self.do_keys([_info])
self.last_updated = time.time()
|
do_local_jwk
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filename):\n _info = json.loads(open(filename).read())\n if 'keys' in _info:\n self.do_keys(_info['keys'])\n else:\n self.do_keys([_info])\n self.last_updated = time.time()\n",
"role": "user"
},
{
"content": "do_local_jwk",
"role": "assistant"
}
] |
def x(self, filename, keytype, keyusage=None, kid=''):
_bkey = import_private_rsa_key_from_file(filename)
if keytype.lower() != 'rsa':
raise NotImplemented('No support for DER decoding of that key type')
if not keyusage:
keyusage = ['enc', 'sig']
else:
keyusage = harmonize_usage(keyusage)
for use in keyusage:
_key = RSAKey().load_key(_bkey)
_key.use = use
if kid:
_key.kid = kid
self._keys.append(_key)
self.last_updated = time.time()
|
do_local_der
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filename, keytype, keyusage=None, kid=''):\n _bkey = import_private_rsa_key_from_file(filename)\n if keytype.lower() != 'rsa':\n raise NotImplemented('No support for DER decoding of that key type')\n if not keyusage:\n keyusage = ['enc', 'sig']\n else:\n keyusage = harmonize_usage(keyusage)\n for use in keyusage:\n _key = RSAKey().load_key(_bkey)\n _key.use = use\n if kid:\n _key.kid = kid\n self._keys.append(_key)\n self.last_updated = time.time()\n",
"role": "user"
},
{
"content": "do_local_der",
"role": "assistant"
}
] |
def x(self):
if self.verify_ssl:
args = {'verify': self.verify_ssl}
else:
args = {}
try:
logging.debug('KeyBundle fetch keys from: {}'.format(self.source))
r = self.httpc('GET', self.source, **args)
except Exception as err:
logger.error(err)
raise UpdateFailed(REMOTE_FAILED.format(self.source, str(err)))
if r.status_code == 200:
self.time_out = time.time() + self.cache_time
self.imp_jwks = self._parse_remote_response(r)
if not isinstance(self.imp_jwks, dict) or 'keys' not in self.imp_jwks:
raise UpdateFailed(MALFORMED.format(self.source))
logger.debug('Loaded JWKS: %s from %s' % (r.text, self.source))
try:
self.do_keys(self.imp_jwks['keys'])
except KeyError:
logger.error("No 'keys' keyword in JWKS")
raise UpdateFailed(MALFORMED.format(self.source))
else:
raise UpdateFailed(REMOTE_FAILED.format(self.source, r.status_code))
self.last_updated = time.time()
return True
|
do_remote
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.verify_ssl:\n args = {'verify': self.verify_ssl}\n else:\n args = {}\n try:\n logging.debug('KeyBundle fetch keys from: {}'.format(self.source))\n r = self.httpc('GET', self.source, **args)\n except Exception as err:\n logger.error(err)\n raise UpdateFailed(REMOTE_FAILED.format(self.source, str(err)))\n if r.status_code == 200:\n self.time_out = time.time() + self.cache_time\n self.imp_jwks = self._parse_remote_response(r)\n if not isinstance(self.imp_jwks, dict) or 'keys' not in self.imp_jwks:\n raise UpdateFailed(MALFORMED.format(self.source))\n logger.debug('Loaded JWKS: %s from %s' % (r.text, self.source))\n try:\n self.do_keys(self.imp_jwks['keys'])\n except KeyError:\n logger.error(\"No 'keys' keyword in JWKS\")\n raise UpdateFailed(MALFORMED.format(self.source))\n else:\n raise UpdateFailed(REMOTE_FAILED.format(self.source, r.status_code))\n self.last_updated = time.time()\n return True\n",
"role": "user"
},
{
"content": "do_remote",
"role": "assistant"
}
] |
def x(self, response):
try:
if response.headers['Content-Type'] != 'application/json':
logger.warning('Wrong Content_type ({})'.format(response.
headers['Content-Type']))
except KeyError:
pass
logger.debug('Loaded JWKS: %s from %s' % (response.text, self.source))
try:
return json.loads(response.text)
except ValueError:
return None
|
parse_remote_response
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n try:\n if response.headers['Content-Type'] != 'application/json':\n logger.warning('Wrong Content_type ({})'.format(response.\n headers['Content-Type']))\n except KeyError:\n pass\n logger.debug('Loaded JWKS: %s from %s' % (response.text, self.source))\n try:\n return json.loads(response.text)\n except ValueError:\n return None\n",
"role": "user"
},
{
"content": "parse_remote_response",
"role": "assistant"
}
] |
def x(self):
res = True
if self.source:
_keys = self._keys
self._keys = []
try:
if self.remote is False:
if self.fileformat in ['jwks', 'jwk']:
self.do_local_jwk(self.source)
elif self.fileformat == 'der':
self.do_local_der(self.source, self.keytype, self.keyusage)
else:
res = self.do_remote()
except Exception as err:
logger.error('Key bundle update failed: {}'.format(err))
self._keys = _keys
return False
now = time.time()
for _key in _keys:
if _key not in self._keys:
if not _key.inactive_since:
_key.inactive_since = now
self._keys.append(_key)
return res
|
update
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n res = True\n if self.source:\n _keys = self._keys\n self._keys = []\n try:\n if self.remote is False:\n if self.fileformat in ['jwks', 'jwk']:\n self.do_local_jwk(self.source)\n elif self.fileformat == 'der':\n self.do_local_der(self.source, self.keytype, self.keyusage)\n else:\n res = self.do_remote()\n except Exception as err:\n logger.error('Key bundle update failed: {}'.format(err))\n self._keys = _keys\n return False\n now = time.time()\n for _key in _keys:\n if _key not in self._keys:\n if not _key.inactive_since:\n _key.inactive_since = now\n self._keys.append(_key)\n return res\n",
"role": "user"
},
{
"content": "update",
"role": "assistant"
}
] |
def x(self, typ='', only_active=True):
self._uptodate()
_typs = [typ.lower(), typ.upper()]
if typ:
_keys = [k for k in self._keys if k.kty in _typs]
else:
_keys = self._keys
if only_active:
return [k for k in _keys if not k.inactive_since]
else:
return _keys
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, typ='', only_active=True):\n self._uptodate()\n _typs = [typ.lower(), typ.upper()]\n if typ:\n _keys = [k for k in self._keys if k.kty in _typs]\n else:\n _keys = self._keys\n if only_active:\n return [k for k in _keys if not k.inactive_since]\n else:\n return _keys\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, typ):
_typs = [typ.lower(), typ.upper()]
self._keys = [k for k in self._keys if not k.kty in _typs]
|
remove_keys_by_type
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, typ):\n _typs = [typ.lower(), typ.upper()]\n self._keys = [k for k in self._keys if not k.kty in _typs]\n",
"role": "user"
},
{
"content": "remove_keys_by_type",
"role": "assistant"
}
] |
def x(self, private=False):
self._uptodate()
keys = list()
for k in self._keys:
if private:
key = k.serialize(private)
else:
key = k.serialize()
for k, v in key.items():
key[k] = as_unicode(v)
keys.append(key)
return json.dumps({'keys': keys})
|
jwks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False):\n self._uptodate()\n keys = list()\n for k in self._keys:\n if private:\n key = k.serialize(private)\n else:\n key = k.serialize()\n for k, v in key.items():\n key[k] = as_unicode(v)\n keys.append(key)\n return json.dumps({'keys': keys})\n",
"role": "user"
},
{
"content": "jwks",
"role": "assistant"
}
] |
def x(self, kid):
for key in self._keys:
if key.kid == kid:
return key
self.update()
for key in self._keys:
if key.kid == kid:
return key
return None
|
get_key_with_kid
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, kid):\n for key in self._keys:\n if key.kid == kid:\n return key\n self.update()\n for key in self._keys:\n if key.kid == kid:\n return key\n return None\n",
"role": "user"
},
{
"content": "get_key_with_kid",
"role": "assistant"
}
] |
def x(self):
self._uptodate()
return [key.kid for key in self._keys if key.kid != '']
|
kids
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._uptodate()\n return [key.kid for key in self._keys if key.kid != '']\n",
"role": "user"
},
{
"content": "kids",
"role": "assistant"
}
] |
def x(self, kid):
k = self.get_key_with_kid(kid)
k.inactive_since = time.time()
|
mark_as_inactive
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, kid):\n k = self.get_key_with_kid(kid)\n k.inactive_since = time.time()\n",
"role": "user"
},
{
"content": "mark_as_inactive",
"role": "assistant"
}
] |
def x(self, after, when=0):
if when:
now = when
else:
now = time.time()
if not isinstance(after, float):
try:
after = float(after)
except TypeError:
raise
_kl = []
for k in self._keys:
if k.inactive_since and k.inactive_since + after < now:
continue
else:
_kl.append(k)
self._keys = _kl
|
remove_outdated
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, after, when=0):\n if when:\n now = when\n else:\n now = time.time()\n if not isinstance(after, float):\n try:\n after = float(after)\n except TypeError:\n raise\n _kl = []\n for k in self._keys:\n if k.inactive_since and k.inactive_since + after < now:\n continue\n else:\n _kl.append(k)\n self._keys = _kl\n",
"role": "user"
},
{
"content": "remove_outdated",
"role": "assistant"
}
] |
def x(self):
kb = KeyBundle()
kb._keys = self._keys[:]
kb.cache_time = self.cache_time
kb.verify_ssl = self.verify_ssl
if self.source:
kb.source = self.source
kb.fileformat = self.fileformat
kb.keytype = self.keytype
kb.keyusage = self.keyusage
kb.remote = self.remote
return kb
|
copy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n kb = KeyBundle()\n kb._keys = self._keys[:]\n kb.cache_time = self.cache_time\n kb.verify_ssl = self.verify_ssl\n if self.source:\n kb.source = self.source\n kb.fileformat = self.fileformat\n kb.keytype = self.keytype\n kb.keyusage = self.keyusage\n kb.remote = self.remote\n return kb\n",
"role": "user"
},
{
"content": "copy",
"role": "assistant"
}
] |
def x(self, token, **kwargs):
if isinstance(token, str):
try:
token = token.encode('utf-8')
except UnicodeDecodeError:
pass
part = split_token(token)
self.b64part = part
self.part = [b64d(p) for p in part]
self.headers = json.loads(as_unicode(self.part[0]))
for key, val in kwargs.items():
if not val and key in self.headers:
continue
try:
_ok = self.verify_header(key, val)
except KeyError:
raise
else:
if not _ok:
raise HeaderError('Expected "{}" to be "{}", was "{}"'.
format(key, val, self.headers[key]))
return self
|
unpack
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token, **kwargs):\n if isinstance(token, str):\n try:\n token = token.encode('utf-8')\n except UnicodeDecodeError:\n pass\n part = split_token(token)\n self.b64part = part\n self.part = [b64d(p) for p in part]\n self.headers = json.loads(as_unicode(self.part[0]))\n for key, val in kwargs.items():\n if not val and key in self.headers:\n continue\n try:\n _ok = self.verify_header(key, val)\n except KeyError:\n raise\n else:\n if not _ok:\n raise HeaderError('Expected \"{}\" to be \"{}\", was \"{}\"'.\n format(key, val, self.headers[key]))\n return self\n",
"role": "user"
},
{
"content": "unpack",
"role": "assistant"
}
] |
def x(self, parts=None, headers=None):
if not headers:
if self.headers:
headers = self.headers
else:
headers = {'alg': 'none'}
logging.debug('JWT header: {}'.format(headers))
if not parts:
return '.'.join([a.decode() for a in self.b64part])
self.part = [headers] + parts
_all = self.b64part = [b64encode_item(headers)]
_all.extend([b64encode_item(p) for p in parts])
return '.'.join([a.decode() for a in _all])
|
pack
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, parts=None, headers=None):\n if not headers:\n if self.headers:\n headers = self.headers\n else:\n headers = {'alg': 'none'}\n logging.debug('JWT header: {}'.format(headers))\n if not parts:\n return '.'.join([a.decode() for a in self.b64part])\n self.part = [headers] + parts\n _all = self.b64part = [b64encode_item(headers)]\n _all.extend([b64encode_item(p) for p in parts])\n return '.'.join([a.decode() for a in _all])\n",
"role": "user"
},
{
"content": "pack",
"role": "assistant"
}
] |
def x(self):
_msg = as_unicode(self.part[1])
if 'cty' in self.headers and self.headers['cty'].lower() != 'jwt':
pass
else:
try:
_msg = json.loads(_msg)
except ValueError:
pass
return _msg
|
payload
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n _msg = as_unicode(self.part[1])\n if 'cty' in self.headers and self.headers['cty'].lower() != 'jwt':\n pass\n else:\n try:\n _msg = json.loads(_msg)\n except ValueError:\n pass\n return _msg\n",
"role": "user"
},
{
"content": "payload",
"role": "assistant"
}
] |
def x(self, key, val):
if isinstance(val, list):
if self.headers[key] in val:
return True
else:
return False
elif self.headers[key] == val:
return True
else:
return False
|
verify_header
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, val):\n if isinstance(val, list):\n if self.headers[key] in val:\n return True\n else:\n return False\n elif self.headers[key] == val:\n return True\n else:\n return False\n",
"role": "user"
},
{
"content": "verify_header",
"role": "assistant"
}
] |
def x(self, check_presence=True, **kwargs):
for key, val in kwargs.items():
try:
_ok = self.verify_header(key, val)
except KeyError:
if check_presence:
return False
else:
pass
else:
if not _ok:
return False
return True
|
verify_headers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, check_presence=True, **kwargs):\n for key, val in kwargs.items():\n try:\n _ok = self.verify_header(key, val)\n except KeyError:\n if check_presence:\n return False\n else:\n pass\n else:\n if not _ok:\n return False\n return True\n",
"role": "user"
},
{
"content": "verify_headers",
"role": "assistant"
}
] |
def x(self, msg, key):
h = hmac.HMAC(key, self.algorithm(), default_backend())
h.update(msg)
return h.finalize()
|
sign
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n h = hmac.HMAC(key, self.algorithm(), default_backend())\n h.update(msg)\n return h.finalize()\n",
"role": "user"
},
{
"content": "sign",
"role": "assistant"
}
] |
def x(self, msg, sig, key):
try:
h = hmac.HMAC(key, self.algorithm(), default_backend())
h.update(msg)
h.verify(sig)
return True
except:
return False
|
verify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, sig, key):\n try:\n h = hmac.HMAC(key, self.algorithm(), default_backend())\n h.update(msg)\n h.verify(sig)\n return True\n except:\n return False\n",
"role": "user"
},
{
"content": "verify",
"role": "assistant"
}
] |
def x():
parser = argparse.ArgumentParser(description='JSON Web Key (JWK) Generator'
)
parser.add_argument('--kty', dest='kty', metavar='type', help=
'Key type', required=True)
parser.add_argument('--size', dest='keysize', type=int, metavar='size',
help='Key size')
parser.add_argument('--crv', dest='crv', metavar='curve', help=
'EC curve', choices=NIST2SEC.keys(), default=DEFAULT_EC_CURVE)
parser.add_argument('--exp', dest='rsa_exp', type=int, metavar=
'exponent', help=
f'RSA public key exponent (default {DEFAULT_RSA_EXP})', default=
DEFAULT_RSA_EXP)
parser.add_argument('--kid', dest='kid', metavar='id', help='Key ID')
args = parser.parse_args()
if args.kty.upper() == 'RSA':
if args.keysize is None:
args.keysize = DEFAULT_RSA_KEYSIZE
jwk = new_rsa_key(public_exponent=args.rsa_exp, key_size=args.
keysize, kid=args.kid)
elif args.kty.upper() == 'EC':
if args.crv not in NIST2SEC:
print('Unknown curve: {0}'.format(args.crv), file=sys.stderr)
exit(1)
jwk = new_ec_key(crv=args.crv, kid=args.kid)
elif args.kty.upper() == 'SYM':
if args.keysize is None:
args.keysize = DEFAULT_SYM_KEYSIZE
randomkey = os.urandom(args.keysize)
jwk = SYMKey(key=randomkey, kid=args.kid)
else:
print(f'Unknown key type: {args.kty}', file=sys.stderr)
exit(1)
jwk_dict = jwk.serialize(private=True)
print(json.dumps(jwk_dict, sort_keys=True, indent=4))
print('SHA-256: ' + jwk.thumbprint('SHA-256').decode(), file=sys.stderr)
|
main
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n parser = argparse.ArgumentParser(description='JSON Web Key (JWK) Generator'\n )\n parser.add_argument('--kty', dest='kty', metavar='type', help=\n 'Key type', required=True)\n parser.add_argument('--size', dest='keysize', type=int, metavar='size',\n help='Key size')\n parser.add_argument('--crv', dest='crv', metavar='curve', help=\n 'EC curve', choices=NIST2SEC.keys(), default=DEFAULT_EC_CURVE)\n parser.add_argument('--exp', dest='rsa_exp', type=int, metavar=\n 'exponent', help=\n f'RSA public key exponent (default {DEFAULT_RSA_EXP})', default=\n DEFAULT_RSA_EXP)\n parser.add_argument('--kid', dest='kid', metavar='id', help='Key ID')\n args = parser.parse_args()\n if args.kty.upper() == 'RSA':\n if args.keysize is None:\n args.keysize = DEFAULT_RSA_KEYSIZE\n jwk = new_rsa_key(public_exponent=args.rsa_exp, key_size=args.\n keysize, kid=args.kid)\n elif args.kty.upper() == 'EC':\n if args.crv not in NIST2SEC:\n print('Unknown curve: {0}'.format(args.crv), file=sys.stderr)\n exit(1)\n jwk = new_ec_key(crv=args.crv, kid=args.kid)\n elif args.kty.upper() == 'SYM':\n if args.keysize is None:\n args.keysize = DEFAULT_SYM_KEYSIZE\n randomkey = os.urandom(args.keysize)\n jwk = SYMKey(key=randomkey, kid=args.kid)\n else:\n print(f'Unknown key type: {args.kty}', file=sys.stderr)\n exit(1)\n jwk_dict = jwk.serialize(private=True)\n print(json.dumps(jwk_dict, sort_keys=True, indent=4))\n print('SHA-256: ' + jwk.thumbprint('SHA-256').decode(), file=sys.stderr)\n",
"role": "user"
},
{
"content": "main",
"role": "assistant"
}
] |
def x(jwk_dict, private):
provided = frozenset(jwk_dict.keys())
if private is not None and private:
required = EC_PUBLIC_REQUIRED | EC_PRIVATE_REQUIRED
else:
required = EC_PUBLIC_REQUIRED
return ensure_params('EC', provided, required)
|
ensure_ec_params
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwk_dict, private):\n provided = frozenset(jwk_dict.keys())\n if private is not None and private:\n required = EC_PUBLIC_REQUIRED | EC_PRIVATE_REQUIRED\n else:\n required = EC_PUBLIC_REQUIRED\n return ensure_params('EC', provided, required)\n",
"role": "user"
},
{
"content": "ensure_ec_params",
"role": "assistant"
}
] |
def x(jwk_dict, private):
provided = frozenset(jwk_dict.keys())
if private is not None and private:
required = RSA_PUBLIC_REQUIRED | RSA_PRIVATE_REQUIRED
else:
required = RSA_PUBLIC_REQUIRED
return ensure_params('RSA', provided, required)
|
ensure_rsa_params
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwk_dict, private):\n provided = frozenset(jwk_dict.keys())\n if private is not None and private:\n required = RSA_PUBLIC_REQUIRED | RSA_PRIVATE_REQUIRED\n else:\n required = RSA_PUBLIC_REQUIRED\n return ensure_params('RSA', provided, required)\n",
"role": "user"
},
{
"content": "ensure_rsa_params",
"role": "assistant"
}
] |
def x(kty, provided, required):
if not required <= provided:
missing = required - provided
raise MissingValue('Missing properties for kty={}, {}'.format(kty,
str(list(missing))))
|
ensure_params
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kty, provided, required):\n if not required <= provided:\n missing = required - provided\n raise MissingValue('Missing properties for kty={}, {}'.format(kty,\n str(list(missing))))\n",
"role": "user"
},
{
"content": "ensure_params",
"role": "assistant"
}
] |
def x(jwk_dict, private=None):
_jwk_dict = copy.copy(jwk_dict)
if 'kty' not in _jwk_dict:
raise MissingValue('kty missing')
if _jwk_dict['kty'] == 'EC':
ensure_ec_params(_jwk_dict, private)
if private is not None and not private:
for v in EC_PRIVATE:
_jwk_dict.pop(v, None)
if _jwk_dict['crv'] in NIST2SEC:
curve = NIST2SEC[_jwk_dict['crv']]()
else:
raise UnsupportedAlgorithm('Unknown curve: %s' % _jwk_dict['crv'])
if _jwk_dict.get('d', None) is not None:
_jwk_dict['priv_key'] = ec.derive_private_key(base64url_to_long
(_jwk_dict['d']), curve, backends.default_backend())
_jwk_dict['pub_key'] = _jwk_dict['priv_key'].public_key()
else:
ec_pub_numbers = ec.EllipticCurvePublicNumbers(base64url_to_long
(_jwk_dict['x']), base64url_to_long(_jwk_dict['y']), curve)
_jwk_dict['pub_key'] = ec_pub_numbers.public_key(backends.
default_backend())
return ECKey(**_jwk_dict)
elif _jwk_dict['kty'] == 'RSA':
ensure_rsa_params(_jwk_dict, private)
if private is not None and not private:
for v in RSA_PRIVATE:
_jwk_dict.pop(v, None)
rsa_pub_numbers = rsa.RSAPublicNumbers(base64url_to_long(_jwk_dict[
'e']), base64url_to_long(_jwk_dict['n']))
if _jwk_dict.get('p', None) is not None:
p_long = base64url_to_long(_jwk_dict['p'])
q_long = base64url_to_long(_jwk_dict['q'])
d_long = base64url_to_long(_jwk_dict['d'])
if 'dp' not in _jwk_dict:
dp_long = rsa_crt_dmp1(d_long, p_long)
else:
dp_long = base64url_to_long(_jwk_dict['dp'])
if 'dq' not in _jwk_dict:
dq_long = rsa_crt_dmq1(d_long, q_long)
else:
dq_long = base64url_to_long(_jwk_dict['dq'])
if 'qi' not in _jwk_dict:
qi_long = rsa_crt_iqmp(p_long, q_long)
else:
qi_long = base64url_to_long(_jwk_dict['qi'])
rsa_priv_numbers = rsa.RSAPrivateNumbers(p_long, q_long, d_long,
dp_long, dq_long, qi_long, rsa_pub_numbers)
_jwk_dict['priv_key'] = rsa_priv_numbers.private_key(backends.
default_backend())
_jwk_dict['pub_key'] = _jwk_dict['priv_key'].public_key()
else:
_jwk_dict['pub_key'] = rsa_pub_numbers.public_key(backends.
default_backend())
if _jwk_dict['kty'] != 'RSA':
raise WrongKeyType('"{}" should have been "RSA"'.format(
_jwk_dict['kty']))
return RSAKey(**_jwk_dict)
elif _jwk_dict['kty'] == 'oct':
if 'key' not in _jwk_dict and 'k' not in _jwk_dict:
raise MissingValue(
'There has to be one of "k" or "key" in a symmetric key')
return SYMKey(**_jwk_dict)
else:
raise UnknownKeyType
|
key_from_jwk_dict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwk_dict, private=None):\n _jwk_dict = copy.copy(jwk_dict)\n if 'kty' not in _jwk_dict:\n raise MissingValue('kty missing')\n if _jwk_dict['kty'] == 'EC':\n ensure_ec_params(_jwk_dict, private)\n if private is not None and not private:\n for v in EC_PRIVATE:\n _jwk_dict.pop(v, None)\n if _jwk_dict['crv'] in NIST2SEC:\n curve = NIST2SEC[_jwk_dict['crv']]()\n else:\n raise UnsupportedAlgorithm('Unknown curve: %s' % _jwk_dict['crv'])\n if _jwk_dict.get('d', None) is not None:\n _jwk_dict['priv_key'] = ec.derive_private_key(base64url_to_long\n (_jwk_dict['d']), curve, backends.default_backend())\n _jwk_dict['pub_key'] = _jwk_dict['priv_key'].public_key()\n else:\n ec_pub_numbers = ec.EllipticCurvePublicNumbers(base64url_to_long\n (_jwk_dict['x']), base64url_to_long(_jwk_dict['y']), curve)\n _jwk_dict['pub_key'] = ec_pub_numbers.public_key(backends.\n default_backend())\n return ECKey(**_jwk_dict)\n elif _jwk_dict['kty'] == 'RSA':\n ensure_rsa_params(_jwk_dict, private)\n if private is not None and not private:\n for v in RSA_PRIVATE:\n _jwk_dict.pop(v, None)\n rsa_pub_numbers = rsa.RSAPublicNumbers(base64url_to_long(_jwk_dict[\n 'e']), base64url_to_long(_jwk_dict['n']))\n if _jwk_dict.get('p', None) is not None:\n p_long = base64url_to_long(_jwk_dict['p'])\n q_long = base64url_to_long(_jwk_dict['q'])\n d_long = base64url_to_long(_jwk_dict['d'])\n if 'dp' not in _jwk_dict:\n dp_long = rsa_crt_dmp1(d_long, p_long)\n else:\n dp_long = base64url_to_long(_jwk_dict['dp'])\n if 'dq' not in _jwk_dict:\n dq_long = rsa_crt_dmq1(d_long, q_long)\n else:\n dq_long = base64url_to_long(_jwk_dict['dq'])\n if 'qi' not in _jwk_dict:\n qi_long = rsa_crt_iqmp(p_long, q_long)\n else:\n qi_long = base64url_to_long(_jwk_dict['qi'])\n rsa_priv_numbers = rsa.RSAPrivateNumbers(p_long, q_long, d_long,\n dp_long, dq_long, qi_long, rsa_pub_numbers)\n _jwk_dict['priv_key'] = rsa_priv_numbers.private_key(backends.\n default_backend())\n _jwk_dict['pub_key'] = _jwk_dict['priv_key'].public_key()\n else:\n _jwk_dict['pub_key'] = rsa_pub_numbers.public_key(backends.\n default_backend())\n if _jwk_dict['kty'] != 'RSA':\n raise WrongKeyType('\"{}\" should have been \"RSA\"'.format(\n _jwk_dict['kty']))\n return RSAKey(**_jwk_dict)\n elif _jwk_dict['kty'] == 'oct':\n if 'key' not in _jwk_dict and 'k' not in _jwk_dict:\n raise MissingValue(\n 'There has to be one of \"k\" or \"key\" in a symmetric key')\n return SYMKey(**_jwk_dict)\n else:\n raise UnknownKeyType\n",
"role": "user"
},
{
"content": "key_from_jwk_dict",
"role": "assistant"
}
] |
def x(key, use='', kid=''):
if isinstance(key, rsa.RSAPublicKey) or isinstance(key, rsa.RSAPrivateKey):
kspec = RSAKey(use=use, kid=kid).load_key(key)
elif isinstance(key, str):
kspec = SYMKey(key=key, use=use, kid=kid)
elif isinstance(key, ec.EllipticCurvePublicKey):
kspec = ECKey(use=use, kid=kid).load_key(key)
else:
raise Exception('Unknown key type:key=' + str(type(key)))
kspec.serialize()
return kspec
|
jwk_wrap
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, use='', kid=''):\n if isinstance(key, rsa.RSAPublicKey) or isinstance(key, rsa.RSAPrivateKey):\n kspec = RSAKey(use=use, kid=kid).load_key(key)\n elif isinstance(key, str):\n kspec = SYMKey(key=key, use=use, kid=kid)\n elif isinstance(key, ec.EllipticCurvePublicKey):\n kspec = ECKey(use=use, kid=kid).load_key(key)\n else:\n raise Exception('Unknown key type:key=' + str(type(key)))\n kspec.serialize()\n return kspec\n",
"role": "user"
},
{
"content": "jwk_wrap",
"role": "assistant"
}
] |
def x(key_conf, kid_template='', keyjar=None, owner=''):
if keyjar is None:
keyjar = KeyJar()
tot_kb = build_key_bundle(key_conf, kid_template)
keyjar.add_kb(owner, tot_kb)
return keyjar
|
build_keyjar
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_conf, kid_template='', keyjar=None, owner=''):\n if keyjar is None:\n keyjar = KeyJar()\n tot_kb = build_key_bundle(key_conf, kid_template)\n keyjar.add_kb(owner, tot_kb)\n return keyjar\n",
"role": "user"
},
{
"content": "build_keyjar",
"role": "assistant"
}
] |
def x(keyjar):
for iss, kbl in keyjar.items():
for kb in kbl:
kb.update()
|
update_keyjar
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keyjar):\n for iss, kbl in keyjar.items():\n for kb in kbl:\n kb.update()\n",
"role": "user"
},
{
"content": "update_keyjar",
"role": "assistant"
}
] |
def x(keyjar, issuer):
try:
kbl = keyjar[issuer]
except KeyError:
return ''
else:
key_list = []
for kb in kbl:
for key in kb.keys():
if key.inactive_since:
key_list.append('*{}:{}:{}'.format(key.kty, key.use,
key.kid))
else:
key_list.append('{}:{}:{}'.format(key.kty, key.use, key
.kid))
return ', '.join(key_list)
|
key_summary
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keyjar, issuer):\n try:\n kbl = keyjar[issuer]\n except KeyError:\n return ''\n else:\n key_list = []\n for kb in kbl:\n for key in kb.keys():\n if key.inactive_since:\n key_list.append('*{}:{}:{}'.format(key.kty, key.use,\n key.kid))\n else:\n key_list.append('{}:{}:{}'.format(key.kty, key.use, key\n .kid))\n return ', '.join(key_list)\n",
"role": "user"
},
{
"content": "key_summary",
"role": "assistant"
}
] |
def x(public_path='', private_path='', key_defs='', owner='', read_only=True):
if private_path:
if os.path.isfile(private_path):
_jwks = open(private_path, 'r').read()
_kj = KeyJar()
_kj.import_jwks(json.loads(_jwks), owner)
if key_defs:
_kb = _kj.issuer_keys[owner][0]
_diff = key_diff(_kb, key_defs)
if _diff:
if read_only:
logger.error('Not allowed to write to disc!')
else:
update_key_bundle(_kb, _diff)
_kj.issuer_keys[owner] = [_kb]
jwks = _kj.export_jwks(private=True, issuer=owner)
fp = open(private_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
else:
_kj = build_keyjar(key_defs, owner=owner)
if not read_only:
jwks = _kj.export_jwks(private=True, issuer=owner)
head, tail = os.path.split(private_path)
if head and not os.path.isdir(head):
os.makedirs(head)
fp = open(private_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
if public_path and not read_only:
jwks = _kj.export_jwks(issuer=owner)
head, tail = os.path.split(public_path)
if head and not os.path.isdir(head):
os.makedirs(head)
fp = open(public_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
elif public_path:
if os.path.isfile(public_path):
_jwks = open(public_path, 'r').read()
_kj = KeyJar()
_kj.import_jwks(json.loads(_jwks), owner)
if key_defs:
_kb = _kj.issuer_keys[owner][0]
_diff = key_diff(_kb, key_defs)
if _diff:
if read_only:
logger.error('Not allowed to write to disc!')
else:
update_key_bundle(_kb, _diff)
_kj.issuer_keys[owner] = [_kb]
jwks = _kj.export_jwks(issuer=owner)
fp = open(private_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
else:
_kj = build_keyjar(key_defs, owner=owner)
if not read_only:
_jwks = _kj.export_jwks(issuer=owner)
head, tail = os.path.split(public_path)
if head and not os.path.isdir(head):
os.makedirs(head)
fp = open(public_path, 'w')
fp.write(json.dumps(_jwks))
fp.close()
else:
_kj = build_keyjar(key_defs, owner=owner)
return _kj
|
init_key_jar
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(public_path='', private_path='', key_defs='', owner='', read_only=True):\n if private_path:\n if os.path.isfile(private_path):\n _jwks = open(private_path, 'r').read()\n _kj = KeyJar()\n _kj.import_jwks(json.loads(_jwks), owner)\n if key_defs:\n _kb = _kj.issuer_keys[owner][0]\n _diff = key_diff(_kb, key_defs)\n if _diff:\n if read_only:\n logger.error('Not allowed to write to disc!')\n else:\n update_key_bundle(_kb, _diff)\n _kj.issuer_keys[owner] = [_kb]\n jwks = _kj.export_jwks(private=True, issuer=owner)\n fp = open(private_path, 'w')\n fp.write(json.dumps(jwks))\n fp.close()\n else:\n _kj = build_keyjar(key_defs, owner=owner)\n if not read_only:\n jwks = _kj.export_jwks(private=True, issuer=owner)\n head, tail = os.path.split(private_path)\n if head and not os.path.isdir(head):\n os.makedirs(head)\n fp = open(private_path, 'w')\n fp.write(json.dumps(jwks))\n fp.close()\n if public_path and not read_only:\n jwks = _kj.export_jwks(issuer=owner)\n head, tail = os.path.split(public_path)\n if head and not os.path.isdir(head):\n os.makedirs(head)\n fp = open(public_path, 'w')\n fp.write(json.dumps(jwks))\n fp.close()\n elif public_path:\n if os.path.isfile(public_path):\n _jwks = open(public_path, 'r').read()\n _kj = KeyJar()\n _kj.import_jwks(json.loads(_jwks), owner)\n if key_defs:\n _kb = _kj.issuer_keys[owner][0]\n _diff = key_diff(_kb, key_defs)\n if _diff:\n if read_only:\n logger.error('Not allowed to write to disc!')\n else:\n update_key_bundle(_kb, _diff)\n _kj.issuer_keys[owner] = [_kb]\n jwks = _kj.export_jwks(issuer=owner)\n fp = open(private_path, 'w')\n fp.write(json.dumps(jwks))\n fp.close()\n else:\n _kj = build_keyjar(key_defs, owner=owner)\n if not read_only:\n _jwks = _kj.export_jwks(issuer=owner)\n head, tail = os.path.split(public_path)\n if head and not os.path.isdir(head):\n os.makedirs(head)\n fp = open(public_path, 'w')\n fp.write(json.dumps(_jwks))\n fp.close()\n else:\n _kj = build_keyjar(key_defs, owner=owner)\n return _kj\n",
"role": "user"
},
{
"content": "init_key_jar",
"role": "assistant"
}
] |
def x(self, issuer, url, **kwargs):
if not url:
raise KeyError('No url given')
if '/localhost:' in url or '/localhost/' in url:
kb = self.keybundle_cls(source=url, verify_ssl=False, httpc=self.
httpc, **kwargs)
else:
kb = self.keybundle_cls(source=url, verify_ssl=self.verify_ssl,
httpc=self.httpc, **kwargs)
kb.update()
self.add_kb(issuer, kb)
return kb
|
add_url
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, url, **kwargs):\n if not url:\n raise KeyError('No url given')\n if '/localhost:' in url or '/localhost/' in url:\n kb = self.keybundle_cls(source=url, verify_ssl=False, httpc=self.\n httpc, **kwargs)\n else:\n kb = self.keybundle_cls(source=url, verify_ssl=self.verify_ssl,\n httpc=self.httpc, **kwargs)\n kb.update()\n self.add_kb(issuer, kb)\n return kb\n",
"role": "user"
},
{
"content": "add_url",
"role": "assistant"
}
] |
def x(self, issuer, key, usage=None):
if issuer not in self.issuer_keys:
self.issuer_keys[issuer] = []
if usage is None:
self.issuer_keys[issuer].append(self.keybundle_cls([{'kty': 'oct',
'key': key}]))
else:
for use in usage:
self.issuer_keys[issuer].append(self.keybundle_cls([{'kty':
'oct', 'key': key, 'use': use}]))
|
add_symmetric
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, key, usage=None):\n if issuer not in self.issuer_keys:\n self.issuer_keys[issuer] = []\n if usage is None:\n self.issuer_keys[issuer].append(self.keybundle_cls([{'kty': 'oct',\n 'key': key}]))\n else:\n for use in usage:\n self.issuer_keys[issuer].append(self.keybundle_cls([{'kty':\n 'oct', 'key': key, 'use': use}]))\n",
"role": "user"
},
{
"content": "add_symmetric",
"role": "assistant"
}
] |
def x(self, issuer, kb):
try:
self.issuer_keys[issuer].append(kb)
except KeyError:
self.issuer_keys[issuer] = [kb]
|
add_kb
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, kb):\n try:\n self.issuer_keys[issuer].append(kb)\n except KeyError:\n self.issuer_keys[issuer] = [kb]\n",
"role": "user"
},
{
"content": "add_kb",
"role": "assistant"
}
] |
def x(self, key_use, key_type='', owner='', kid=None, **kwargs):
if key_use in ['dec', 'enc']:
use = 'enc'
else:
use = 'sig'
_kj = None
if owner != '':
try:
_kj = self.issuer_keys[owner]
except KeyError:
if owner.endswith('/'):
try:
_kj = self.issuer_keys[owner[:-1]]
except KeyError:
pass
else:
try:
_kj = self.issuer_keys[owner + '/']
except KeyError:
pass
else:
try:
_kj = self.issuer_keys[owner]
except KeyError:
pass
if _kj is None:
return []
lst = []
for bundle in _kj:
if key_type:
if key_use in ['ver', 'dec']:
_bkeys = bundle.get(key_type, only_active=False)
else:
_bkeys = bundle.get(key_type)
else:
_bkeys = bundle.keys()
for key in _bkeys:
if key.inactive_since and key_use != 'sig':
continue
if not key.use or use == key.use:
if kid:
if key.kid == kid:
lst.append(key)
break
else:
continue
else:
lst.append(key)
if key_type == 'EC' and 'alg' in kwargs:
name = 'P-{}'.format(kwargs['alg'][2:])
_lst = []
for key in lst:
if name != key.crv:
continue
_lst.append(key)
lst = _lst
if use == 'enc' and key_type == 'oct' and owner != '':
for kb in self.issuer_keys['']:
for key in kb.get(key_type):
if key.inactive_since:
continue
if not key.use or key.use == use:
lst.append(key)
return lst
|
get
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key_use, key_type='', owner='', kid=None, **kwargs):\n if key_use in ['dec', 'enc']:\n use = 'enc'\n else:\n use = 'sig'\n _kj = None\n if owner != '':\n try:\n _kj = self.issuer_keys[owner]\n except KeyError:\n if owner.endswith('/'):\n try:\n _kj = self.issuer_keys[owner[:-1]]\n except KeyError:\n pass\n else:\n try:\n _kj = self.issuer_keys[owner + '/']\n except KeyError:\n pass\n else:\n try:\n _kj = self.issuer_keys[owner]\n except KeyError:\n pass\n if _kj is None:\n return []\n lst = []\n for bundle in _kj:\n if key_type:\n if key_use in ['ver', 'dec']:\n _bkeys = bundle.get(key_type, only_active=False)\n else:\n _bkeys = bundle.get(key_type)\n else:\n _bkeys = bundle.keys()\n for key in _bkeys:\n if key.inactive_since and key_use != 'sig':\n continue\n if not key.use or use == key.use:\n if kid:\n if key.kid == kid:\n lst.append(key)\n break\n else:\n continue\n else:\n lst.append(key)\n if key_type == 'EC' and 'alg' in kwargs:\n name = 'P-{}'.format(kwargs['alg'][2:])\n _lst = []\n for key in lst:\n if name != key.crv:\n continue\n _lst.append(key)\n lst = _lst\n if use == 'enc' and key_type == 'oct' and owner != '':\n for kb in self.issuer_keys['']:\n for key in kb.get(key_type):\n if key.inactive_since:\n continue\n if not key.use or key.use == use:\n lst.append(key)\n return lst\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, key_type='', owner='', kid=None, **kwargs):
return self.get('sig', key_type, owner, kid, **kwargs)
|
get_signing_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key_type='', owner='', kid=None, **kwargs):\n return self.get('sig', key_type, owner, kid, **kwargs)\n",
"role": "user"
},
{
"content": "get_signing_key",
"role": "assistant"
}
] |
def x(self, issuer, alg, usage):
if usage in ['sig', 'ver']:
ktype = jws_alg2keytype(alg)
else:
ktype = jwe_alg2keytype(alg)
return self.get(usage, ktype, issuer)
|
keys_by_alg_and_usage
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, alg, usage):\n if usage in ['sig', 'ver']:\n ktype = jws_alg2keytype(alg)\n else:\n ktype = jwe_alg2keytype(alg)\n return self.get(usage, ktype, issuer)\n",
"role": "user"
},
{
"content": "keys_by_alg_and_usage",
"role": "assistant"
}
] |
def x(self, issuer):
res = []
for kbl in self.issuer_keys[issuer]:
res.extend(kbl.keys())
return res
|
get_issuer_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer):\n res = []\n for kbl in self.issuer_keys[issuer]:\n res.extend(kbl.keys())\n return res\n",
"role": "user"
},
{
"content": "get_issuer_keys",
"role": "assistant"
}
] |
def x(self, url):
for owner in self.issuer_keys.keys():
if owner.startswith(url):
return owner
raise KeyError("No keys for '{}' in this keyjar".format(url))
|
match_owner
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, url):\n for owner in self.issuer_keys.keys():\n if owner.startswith(url):\n return owner\n raise KeyError(\"No keys for '{}' in this keyjar\".format(url))\n",
"role": "user"
},
{
"content": "match_owner",
"role": "assistant"
}
] |
def x(self, issuer, jwks_uri='', jwks=None, replace=False):
logger.debug('Initiating key bundle for issuer: %s' % issuer)
if replace or issuer not in self.issuer_keys:
self.issuer_keys[issuer] = []
if jwks_uri:
self.add_url(issuer, jwks_uri)
elif jwks:
_keys = jwks['keys']
self.issuer_keys[issuer].append(self.keybundle_cls(_keys))
|
load_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, jwks_uri='', jwks=None, replace=False):\n logger.debug('Initiating key bundle for issuer: %s' % issuer)\n if replace or issuer not in self.issuer_keys:\n self.issuer_keys[issuer] = []\n if jwks_uri:\n self.add_url(issuer, jwks_uri)\n elif jwks:\n _keys = jwks['keys']\n self.issuer_keys[issuer].append(self.keybundle_cls(_keys))\n",
"role": "user"
},
{
"content": "load_keys",
"role": "assistant"
}
] |
def x(self, source, issuer):
try:
for kb in self.issuer_keys[issuer]:
if kb.source == source:
return kb
except KeyError:
return None
return None
|
find
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, source, issuer):\n try:\n for kb in self.issuer_keys[issuer]:\n if kb.source == source:\n return kb\n except KeyError:\n return None\n return None\n",
"role": "user"
},
{
"content": "find",
"role": "assistant"
}
] |
def x(self, private=False, issuer=''):
keys = []
for kb in self.issuer_keys[issuer]:
keys.extend([k.serialize(private) for k in kb.keys() if k.
inactive_since == 0])
return {'keys': keys}
|
export_jwks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False, issuer=''):\n keys = []\n for kb in self.issuer_keys[issuer]:\n keys.extend([k.serialize(private) for k in kb.keys() if k.\n inactive_since == 0])\n return {'keys': keys}\n",
"role": "user"
},
{
"content": "export_jwks",
"role": "assistant"
}
] |
def x(self, private=False, issuer=''):
return json.dumps(self.export_jwks(private, issuer))
|
export_jwks_as_json
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False, issuer=''):\n return json.dumps(self.export_jwks(private, issuer))\n",
"role": "user"
},
{
"content": "export_jwks_as_json",
"role": "assistant"
}
] |
def x(self, jwks, issuer):
try:
_keys = jwks['keys']
except KeyError:
raise ValueError('Not a proper JWKS')
else:
try:
self.issuer_keys[issuer].append(self.keybundle_cls(_keys,
verify_ssl=self.verify_ssl))
except KeyError:
self.issuer_keys[issuer] = [self.keybundle_cls(_keys,
verify_ssl=self.verify_ssl)]
|
import_jwks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwks, issuer):\n try:\n _keys = jwks['keys']\n except KeyError:\n raise ValueError('Not a proper JWKS')\n else:\n try:\n self.issuer_keys[issuer].append(self.keybundle_cls(_keys,\n verify_ssl=self.verify_ssl))\n except KeyError:\n self.issuer_keys[issuer] = [self.keybundle_cls(_keys,\n verify_ssl=self.verify_ssl)]\n",
"role": "user"
},
{
"content": "import_jwks",
"role": "assistant"
}
] |
def x(self, jwks, issuer):
return self.import_jwks(json.loads(jwks), issuer)
|
import_jwks_as_json
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwks, issuer):\n return self.import_jwks(json.loads(jwks), issuer)\n",
"role": "user"
},
{
"content": "import_jwks_as_json",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.