source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(self) ->List[Tuple[str, int]]:
return sorted(self.enum.items(), key=lambda x: x[1])
| sorted_enums | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self) ->List[Tuple[str, int]]:\n return sorted(self.enum.items(), key=lambda x: x[1])\n",
"role": "user"
},
{
"content": "sorted_enums",
"ro... |
def x(self, stmt: Statement, sctx: SchemaContext) ->None:
nextval = 0
for est in stmt.find_all('enum'):
if not sctx.schema_data.if_features(est, sctx.text_mid):
continue
label = est.argument
vst = est.find1('value')
if vst:
val = int(vst.argument)
self.enum[label] = val
if val > nextval:
nextval = val
else:
self.enum[label] = nextval
nextval += 1
| handle_properties | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, stmt: Statement, sctx: SchemaContext) ->None:\n nextval = 0\n for est in stmt.find_all('enum'):\n if not sctx.schema_data.if_features(est, s... |
def x(self, text: str) ->Optional[QualName]:
try:
return self.sctx.schema_data.translate_pname(text, self.sctx.text_mid)
except (ModuleNotRegistered, UnknownPrefix):
raise InvalidArgument(text)
| from_yang | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, text: str) ->Optional[QualName]:\n try:\n return self.sctx.schema_data.translate_pname(text, self.sctx.text_mid)\n except (ModuleNotRegister... |
def x(self, text: str) ->Optional[int]:
if text.startswith('0'):
base = 16 if text.startswith('0x') else 8
else:
base = 10
try:
return int(text, base)
except (ValueError, TypeError):
raise InvalidArgument(text)
| from_yang | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, text: str) ->Optional[int]:\n if text.startswith('0'):\n base = 16 if text.startswith('0x') else 8\n else:\n base = 10\n try:\n ... |
def x(self, folder):
if 'structure' in self.inputs:
self.inputs.structure.export(folder.get_abs_path(self.
_DEFAULT_COORDS_FILE_NAME), fileformat='xyz')
inp = Cp2kInput(self.inputs.parameters.get_dict())
inp.add_keyword('GLOBAL/PROJECT', self._DEFAULT_PROJECT_NAME)
if 'structure' in self.inputs:
for i, letter in enumerate('ABC'):
inp.add_keyword('FORCE_EVAL/SUBSYS/CELL/' + letter,
'{:<15} {:<15} {:<15}'.format(*self.inputs.structure.cell[i]))
topo = 'FORCE_EVAL/SUBSYS/TOPOLOGY'
inp.add_keyword(topo + '/COORD_FILE_NAME', self.
_DEFAULT_COORDS_FILE_NAME)
inp.add_keyword(topo + '/COORD_FILE_FORMAT', 'XYZ')
with io.open(folder.get_abs_path(self._DEFAULT_INPUT_FILE), mode='w',
encoding='utf-8') as fobj:
fobj.write(inp.render())
if 'settings' in self.inputs:
settings = self.inputs.settings.get_dict()
else:
settings = {}
codeinfo = CodeInfo()
codeinfo.cmdline_params = settings.pop('cmdline', []) + ['-i', self.
_DEFAULT_INPUT_FILE]
codeinfo.stdout_name = self._DEFAULT_OUTPUT_FILE
codeinfo.join_files = True
codeinfo.code_uuid = self.inputs.code.uuid
calcinfo = CalcInfo()
calcinfo.stdin_name = self._DEFAULT_INPUT_FILE
calcinfo.uuid = self.uuid
calcinfo.cmdline_params = codeinfo.cmdline_params
calcinfo.stdin_name = self._DEFAULT_INPUT_FILE
calcinfo.stdout_name = self._DEFAULT_OUTPUT_FILE
calcinfo.codes_info = [codeinfo]
calcinfo.remote_symlink_list = []
if 'file' in self.inputs:
calcinfo.local_copy_list = []
for fobj in self.inputs.file.values():
calcinfo.local_copy_list.append((fobj.uuid, fobj.filename, fobj
.filename))
calcinfo.remote_copy_list = []
calcinfo.retrieve_list = [self._DEFAULT_OUTPUT_FILE, self.
_DEFAULT_RESTART_FILE_NAME]
calcinfo.retrieve_list += settings.pop('additional_retrieve_list', [])
if 'parent_calc_folder' in self.inputs:
comp_uuid = self.inputs.parent_calc_folder.computer.uuid
remote_path = self.inputs.parent_calc_folder.get_remote_path()
symlink = comp_uuid, remote_path, self._DEFAULT_PARENT_CALC_FLDR_NAME
calcinfo.remote_symlink_list.append(symlink)
if settings:
raise InputValidationError('The following keys have been found ' +
'in the settings input node {}, '.format(self.pk) +
'but were not understood: ' + ','.join(settings.keys()))
return calcinfo
| prepare_for_submission | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, folder):\n if 'structure' in self.inputs:\n self.inputs.structure.export(folder.get_abs_path(self.\n _DEFAULT_COORDS_FILE_NAME), fil... |
def x(self, kwpath, value, params):
if len(kwpath) == 1:
params[kwpath[0]] = value
elif kwpath[0] not in params.keys():
new_subsection = {}
params[kwpath[0]] = new_subsection
self._add_keyword_low(kwpath[1:], value, new_subsection)
else:
self._add_keyword_low(kwpath[1:], value, params[kwpath[0]])
| add_keyword_low | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, kwpath, value, params):\n if len(kwpath) == 1:\n params[kwpath[0]] = value\n elif kwpath[0] not in params.keys():\n new_subsection = ... |
def x(self, output, params, indent=0):
for key, val in sorted(params.items()):
if key.upper() != key:
raise InputValidationError("keyword '%s' not upper case" % key)
if key.startswith('@') or key.startswith('$'):
raise InputValidationError('CP2K preprocessor not supported')
if isinstance(val, dict):
output.append('%s&%s %s' % (' ' * indent, key, val.pop('_', '')))
self._render_section(output, val, indent + 3)
output.append('%s&END %s' % (' ' * indent, key))
elif isinstance(val, list):
for listitem in val:
self._render_section(output, {key: listitem}, indent)
elif isinstance(val, bool):
val_str = '.true.' if val else '.false.'
output.append('%s%s %s' % (' ' * indent, key, val_str))
else:
output.append('%s%s %s' % (' ' * indent, key, val))
| render_section | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, output, params, indent=0):\n for key, val in sorted(params.items()):\n if key.upper() != key:\n raise InputValidationError(\"keyword... |
def x(query, params, models, model_to_fields):
cursor = connections[router.db_for_read(models[0])].cursor()
cursor.execute(query, params)
rows = cursor.fetchall()
for row in rows:
row_iter = iter(row)
yield [model_class(**dict((a, next(row_iter)) for a in
model_to_fields[model_class])) for model_class in models]
| multi_raw | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(query, params, models, model_to_fields):\n cursor = connections[router.db_for_read(models[0])].cursor()\n cursor.execute(query, params)\n rows = curso... |
def x(self):
server_relative = '%s?s=%s' % (reverse('tidings.unsubscribe', args=[
self.pk]), self.secret)
return 'https://%s%s' % (Site.objects.get_current().domain, server_relative
)
| unsubscribe_url | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n server_relative = '%s?s=%s' % (reverse('tidings.unsubscribe', args=[\n self.pk]), self.secret)\n return 'https://%s%s' % (Site.objects.ge... |
def x(user):
Watch.objects.filter(email=user.email).update(email=None, user=user)
| claim_watches | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(user):\n Watch.objects.filter(email=user.email).update(email=None, user=user)\n",
"role": "user"
},
{
"content": "claim_watches",
"role": "a... |
def x(*iterables, **kwargs):
key = kwargs.pop('key', lambda a: a)
reverse = kwargs.pop('reverse', False)
min_or_max = max if reverse else min
rows = [iter(iterable) for iterable in iterables if iterable]
next_values = {}
by_key = []
def x(row, index):
try:
next_value = next(row)
except StopIteration:
pass
else:
next_values[index] = next_value
by_key.append((key(next_value), index))
for index, row in enumerate(rows):
gather_next_value(row, index)
while by_key:
key_value, index = min_or_max(by_key)
by_key.remove((key_value, index))
next_value = next_values.pop(index)
yield next_value
gather_next_value(rows[index], index)
| collate | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(*iterables, **kwargs):\n key = kwargs.pop('key', lambda a: a)\n reverse = kwargs.pop('reverse', False)\n min_or_max = max if reverse else min\n row... |
def x(data):
if isinstance(data, string_types):
return crc32(data.encode('utf-8')) & 4294967295
else:
return int(data)
| hash_to_unsigned | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n if isinstance(data, string_types):\n return crc32(data.encode('utf-8')) & 4294967295\n else:\n return int(data)\n",
"role": "u... |
def x(subject, template_path, vars, users_and_watches, from_email=settings.
TIDINGS_FROM_ADDRESS, **extra_kwargs):
template = loader.get_template(template_path)
context = Context(vars)
for u, w in users_and_watches:
context['user'] = u
context['watch'] = w[0]
context['watches'] = w
yield EmailMessage(subject, template.render(context), from_email, [
u.email], **extra_kwargs)
| emails_with_users_and_watches | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(subject, template_path, vars, users_and_watches, from_email=settings.\n TIDINGS_FROM_ADDRESS, **extra_kwargs):\n template = loader.get_template(template_... |
def x(setting_name, fallback):
path = getattr(settings, setting_name, None)
if path:
try:
return import_string(path)
except ImportError:
raise ImproperlyConfigured('%s: No such path.' % path)
else:
return fallback
| import_from_setting | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(setting_name, fallback):\n path = getattr(settings, setting_name, None)\n if path:\n try:\n return import_string(path)\n except ... |
def x(self, **kwargs):
from aiida.engine import ExitCode
from aiida.common import NotExistent
try:
out_folder = self.retrieved
except NotExistent:
return self.exit_codes.ERROR_NO_RETRIEVED_FOLDER
self._parse_stdout(out_folder)
try:
structure = self._parse_trajectory(out_folder)
self.out('output_structure', structure)
except Exception:
pass
return ExitCode(0)
| parse | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n from aiida.engine import ExitCode\n from aiida.common import NotExistent\n try:\n out_folder = self.retrieved\n except No... |
def x(self, out_folder):
fname = self.node.load_process_class()._DEFAULT_OUTPUT_FILE
if fname not in out_folder._repository.list_object_names():
raise OutputParsingError('Cp2k output file not retrieved')
result_dict = {'exceeded_walltime': False}
abs_fn = os.path.join(out_folder._repository._get_base_folder().abspath,
fname)
with io.open(abs_fn, mode='r', encoding='utf-8') as fobj:
lines = fobj.readlines()
for i_line, line in enumerate(lines):
if line.startswith(' ENERGY| '):
result_dict['energy'] = float(line.split()[8])
result_dict['energy_units'] = 'a.u.'
if 'The number of warnings for this run is' in line:
result_dict['nwarnings'] = int(line.split()[-1])
if 'exceeded requested execution time' in line:
result_dict['exceeded_walltime'] = True
if 'KPOINTS| Band Structure Calculation' in line:
from aiida.orm import BandsData
bnds = BandsData()
kpoints, labels, bands = self._parse_bands(lines, i_line)
bnds.set_kpoints(kpoints)
bnds.labels = labels
bnds.set_bands(bands, units='eV')
self.out('output_bands', bnds)
if 'nwarnings' not in result_dict:
raise OutputParsingError('CP2K did not finish properly.')
self.out('output_parameters', Dict(dict=result_dict))
| parse_stdout | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, out_folder):\n fname = self.node.load_process_class()._DEFAULT_OUTPUT_FILE\n if fname not in out_folder._repository.list_object_names():\n r... |
def x(lines, n_start):
kpoints = []
labels = []
bands_s1 = []
bands_s2 = []
known_kpoints = {}
pattern = re.compile('.*?Nr.*?Spin.*?K-Point.*?', re.DOTALL)
selected_lines = lines[n_start:]
for current_line, line in enumerate(selected_lines):
splitted = line.split()
if 'KPOINTS| Special K-Point' in line:
kpoint = tuple(map(float, splitted[-3:]))
if ' '.join(splitted[-5:-3]) != 'not specified':
label = splitted[-4]
known_kpoints[kpoint] = label
elif pattern.match(line):
spin = int(splitted[3])
kpoint = tuple(map(float, splitted[-3:]))
kpoint_n_lines = int(math.ceil(int(selected_lines[current_line +
1]) / 4.0))
band = list(map(float, ' '.join(selected_lines[current_line + 2
:current_line + 2 + kpoint_n_lines]).split()))
if spin == 1:
if kpoint in known_kpoints:
labels.append((len(kpoints), known_kpoints[kpoint]))
kpoints.append(kpoint)
bands_s1.append(band)
elif spin == 2:
bands_s2.append(band)
if bands_s2:
bands = [bands_s1, bands_s2]
else:
bands = bands_s1
return np.array(kpoints), labels, np.array(bands)
| parse_bands | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(lines, n_start):\n kpoints = []\n labels = []\n bands_s1 = []\n bands_s2 = []\n known_kpoints = {}\n pattern = re.compile('.*?Nr.*?Spin.*?K-P... |
def x(self, out_folder):
fname = self.node.load_process_class()._DEFAULT_RESTART_FILE_NAME
if fname not in out_folder._repository.list_object_names():
raise Exception
abs_fn = os.path.join(out_folder._repository._get_base_folder().abspath,
fname)
with io.open(abs_fn, mode='r', encoding='utf-8') as fobj:
content = fobj.read()
match = re.search('\\n\\s*&COORD\\n(.*?)\\n\\s*&END COORD\\n', content,
DOTALL)
coord_lines = [line.strip().split() for line in match.group(1).splitlines()
]
symbols = [line[0] for line in coord_lines]
positions_str = [line[1:] for line in coord_lines]
positions = np.array(positions_str, np.float64)
match = re.search('\\n\\s*&CELL\\n(.*?)\\n\\s*&END CELL\\n', content,
re.DOTALL)
cell_lines = [line.strip().split() for line in match.group(1).splitlines()]
cell_str = [line[1:] for line in cell_lines if line[0] in 'ABC']
cell = np.array(cell_str, np.float64)
atoms = ase.Atoms(symbols=symbols, positions=positions, cell=cell)
return StructureData(ase=atoms)
| parse_trajectory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, out_folder):\n fname = self.node.load_process_class()._DEFAULT_RESTART_FILE_NAME\n if fname not in out_folder._repository.list_object_names():\n ... |
def x(request, watch_id):
ext = getattr(settings, 'TIDINGS_TEMPLATE_EXTENSION', 'html')
try:
watch = Watch.objects.get(pk=watch_id)
secret = request.GET.get('s')
if secret != watch.secret:
raise Watch.DoesNotExist
except Watch.DoesNotExist:
return render(request, 'tidings/unsubscribe_error.' + ext)
if request.method == 'POST':
watch.delete()
return render(request, 'tidings/unsubscribe_success.' + ext)
return render(request, 'tidings/unsubscribe.' + ext)
| unsubscribe | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(request, watch_id):\n ext = getattr(settings, 'TIDINGS_TEMPLATE_EXTENSION', 'html')\n try:\n watch = Watch.objects.get(pk=watch_id)\n secre... |
def x(users_and_watches):
def x(user, cluster_email):
if not getattr(user, 'email', ''):
user = EmailUser(cluster_email)
return user
cluster_email = ''
favorite_user = None
watches = []
for u, w in users_and_watches:
row_email = u.email or w[0].email
if cluster_email.lower() != row_email.lower():
if cluster_email != '':
yield ensure_user_has_email(favorite_user, cluster_email
), watches
favorite_user, watches = u, []
cluster_email = row_email
elif (not favorite_user.email or not u.is_authenticated
) and u.email and u.is_authenticated:
favorite_user = u
watches.extend(w)
if favorite_user is not None:
yield ensure_user_has_email(favorite_user, cluster_email), watches
| unique_by_email | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(users_and_watches):\n\n def x(user, cluster_email):\n if not getattr(user, 'email', ''):\n user = EmailUser(cluster_email)\n return... |
def x(self, exclude=None, delay=True):
if delay:
self._fire_task.apply_async(args=(self,), kwargs={'exclude':
exclude}, serializer='pickle')
else:
self._fire_task(self, exclude=exclude)
| fire | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, exclude=None, delay=True):\n if delay:\n self._fire_task.apply_async(args=(self,), kwargs={'exclude':\n exclude}, serializer='pickle... |
def x(self, exclude=None):
connection = mail.get_connection(fail_silently=True)
connection.open()
for m in self._mails(self._users_watching(exclude=exclude)):
connection.send_messages([m])
| fire_task | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, exclude=None):\n connection = mail.get_connection(fail_silently=True)\n connection.open()\n for m in self._mails(self._users_watching(exclude=ex... |
def x(cls, filters):
for k in iterkeys(filters):
if k not in cls.filters:
raise TypeError("%s got an unsupported filter type '%s'" % (cls
.__name__, k))
| validate_filters | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, filters):\n for k in iterkeys(filters):\n if k not in cls.filters:\n raise TypeError(\"%s got an unsupported filter type '%s'\" % (cl... |
def x(self, object_id=None, exclude=None, **filters):
if exclude is None:
exclude = []
elif not isinstance(exclude, Sequence):
exclude = [exclude]
def x():
self._validate_filters(filters)
joins, wheres, join_params, where_params = [], [], [], []
for n, (k, v) in enumerate(iteritems(filters)):
joins.append(
'LEFT JOIN tidings_watchfilter f{n} ON f{n}.watch_id=w.id AND f{n}.name=%s'
.format(n=n))
join_params.append(k)
wheres.append('(f{n}.value=%s OR f{n}.value IS NULL)'.format(n=n))
where_params.append(hash_to_unsigned(v))
return joins, wheres, join_params + where_params
joins, wheres, params = filter_conditions()
wheres.append('w.event_type=%s')
params.append(self.event_type)
if self.content_type:
wheres.append('(w.content_type_id IS NULL OR w.content_type_id=%s)')
params.append(ContentType.objects.get_for_model(self.content_type).id)
if object_id:
wheres.append('(w.object_id IS NULL OR w.object_id=%s)')
params.append(object_id)
if exclude:
if not all(e.id for e in exclude):
raise ValueError("Can't exclude an unsaved User.")
wheres.append('(u.id IS NULL OR u.id NOT IN (%s))' % ', '.join('%s' for
e in exclude))
params.extend(e.id for e in exclude)
def x(model):
if hasattr(model._meta, '_fields'):
return model._meta._fields()
else:
return model._meta.fields
User = get_user_model()
model_to_fields = dict((m, [f.get_attname() for f in get_fields(m)]) for
m in [User, Watch])
query_fields = ['u.{0}'.format(field) for field in model_to_fields[User]]
query_fields.extend(['w.{0}'.format(field) for field in model_to_fields
[Watch]])
query = (
'SELECT {fields} FROM tidings_watch w LEFT JOIN {user_table} u ON u.id=w.user_id {joins} WHERE {wheres} AND (length(w.email)>0 OR length(u.email)>0) AND w.is_active ORDER BY u.email DESC, w.email DESC'
.format(fields=', '.join(query_fields), joins=' '.join(joins),
wheres=' AND '.join(wheres), user_table=User._meta.db_table))
return _unique_by_email((u, [w]) for u, w in multi_raw(query, params, [
User, Watch], model_to_fields))
| users_watching_by_filter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, object_id=None, exclude=None, **filters):\n if exclude is None:\n exclude = []\n elif not isinstance(exclude, Sequence):\n exclude = ... |
def x(cls, user_or_email, object_id=None, **filters):
cls._validate_filters(filters)
if isinstance(user_or_email, string_types):
user_condition = Q(email=user_or_email)
elif user_or_email.is_authenticated:
user_condition = Q(user=user_or_email)
else:
return Watch.objects.none()
watches = getattr(Watch, 'uncached', Watch.objects).filter(user_condition,
Q(content_type=ContentType.objects.get_for_model(cls.content_type)) if
cls.content_type else Q(), Q(object_id=object_id) if object_id else
Q(), event_type=cls.event_type).extra(where=[
'(SELECT count(*) FROM tidings_watchfilter WHERE tidings_watchfilter.watch_id=tidings_watch.id)=%s'
], params=[len(filters)])
for k, v in iteritems(filters):
watches = watches.filter(filters__name=k, filters__value=
hash_to_unsigned(v))
return watches
| watches_belonging_to_user | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, object_id=None, **filters):\n cls._validate_filters(filters)\n if isinstance(user_or_email, string_types):\n user_condition = ... |
def x(cls, user_or_email_, object_id=None, **filters):
return cls._watches_belonging_to_user(user_or_email_, object_id=
object_id, **filters).exists()
| is_notifying | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email_, object_id=None, **filters):\n return cls._watches_belonging_to_user(user_or_email_, object_id=\n object_id, **filters).exists()\... |
def x(cls, user_or_email_, object_id=None, **filters):
try:
watch = cls._watches_belonging_to_user(user_or_email_, object_id=
object_id, **filters)[0:1].get()
except Watch.DoesNotExist:
create_kwargs = {}
if cls.content_type:
create_kwargs['content_type'] = ContentType.objects.get_for_model(
cls.content_type)
create_kwargs['email' if isinstance(user_or_email_, string_types) else
'user'] = user_or_email_
distinguishable_letters = (
'abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRTUVWXYZ')
secret = ''.join(random.choice(distinguishable_letters) for x in
range(10))
is_active = ('user' in create_kwargs or not settings.
TIDINGS_CONFIRM_ANONYMOUS_WATCHES)
if object_id:
create_kwargs['object_id'] = object_id
watch = Watch.objects.create(secret=secret, is_active=is_active,
event_type=cls.event_type, **create_kwargs)
for k, v in iteritems(filters):
WatchFilter.objects.create(watch=watch, name=k, value=
hash_to_unsigned(v))
if not watch.is_active:
email = watch.user.email if watch.user else watch.email
message = cls._activation_email(watch, email)
try:
message.send()
except SMTPException as e:
watch.delete()
raise ActivationRequestFailed(e.recipients)
return watch
| notify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email_, object_id=None, **filters):\n try:\n watch = cls._watches_belonging_to_user(user_or_email_, object_id=\n object_id, *... |
def x(cls, user_or_email, instance):
return super(InstanceEvent, cls).notify(user_or_email, object_id=
instance.pk)
| notify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, instance):\n return super(InstanceEvent, cls).notify(user_or_email, object_id=\n instance.pk)\n",
"role": "user"
},
{
... |
def x(cls, user_or_email, instance):
super(InstanceEvent, cls).stop_notifying(user_or_email, object_id=
instance.pk)
| stop_notifying | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, instance):\n super(InstanceEvent, cls).stop_notifying(user_or_email, object_id=\n instance.pk)\n",
"role": "user"
},
{
... |
def x(cls, user_or_email, instance):
return super(InstanceEvent, cls).is_notifying(user_or_email, object_id=
instance.pk)
| is_notifying | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, user_or_email, instance):\n return super(InstanceEvent, cls).is_notifying(user_or_email, object_id=\n instance.pk)\n",
"role": "user"
},
... |
def x(self, **kwargs):
return self._users_watching_by_filter(object_id=self.instance.pk, **kwargs)
| users_watching | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, **kwargs):\n return self._users_watching_by_filter(object_id=self.instance.pk, **kwargs)\n",
"role": "user"
},
{
"content": "users_watchin... |
def x(self):
if not self._crypter:
return b''
try:
plaintext = self._crypter.decrypt(self._ciphertext, **self.
_decrypt_params)
return plaintext
except Exception as e:
exc_info = sys.exc_info()
six.reraise(ValueError('Invalid ciphertext "%s", error: %s' % (self
._ciphertext, e)), None, exc_info[2])
| decrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._crypter:\n return b''\n try:\n plaintext = self._crypter.decrypt(self._ciphertext, **self.\n _decrypt_para... |
def x(self, msg, iv='', auth_data=None):
if not iv:
raise ValueError('Missing Nonce')
return self.key.encrypt(iv, msg, auth_data)
| encrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, iv='', auth_data=None):\n if not iv:\n raise ValueError('Missing Nonce')\n return self.key.encrypt(iv, msg, auth_data)\n",
"role": ... |
def x(self, cipher_text, iv='', auth_data=None, tag=b''):
if not iv:
raise ValueError('Missing Nonce')
return self.key.decrypt(iv, cipher_text + tag, auth_data)
| decrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, cipher_text, iv='', auth_data=None, tag=b''):\n if not iv:\n raise ValueError('Missing Nonce')\n return self.key.decrypt(iv, cipher_text + t... |
def x(self, enc_alg, msg, auth_data=b'', key=None, iv=''):
iv = self._generate_iv(enc_alg, iv)
if enc_alg in ['A192GCM', 'A128GCM', 'A256GCM']:
aes = AES_GCMEncrypter(key=key)
ctx, tag = split_ctx_and_tag(aes.encrypt(msg, iv, auth_data))
elif enc_alg in ['A128CBC-HS256', 'A192CBC-HS384', 'A256CBC-HS512']:
aes = AES_CBCEncrypter(key=key)
ctx, tag = aes.encrypt(msg, iv, auth_data)
else:
raise NotSupportedAlgorithm(enc_alg)
return ctx, tag, aes.key
| enc_setup | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, enc_alg, msg, auth_data=b'', key=None, iv=''):\n iv = self._generate_iv(enc_alg, iv)\n if enc_alg in ['A192GCM', 'A128GCM', 'A256GCM']:\n ae... |
def x(enc, key, ctxt, iv, tag, auth_data=b''):
if enc in ['A128GCM', 'A192GCM', 'A256GCM']:
aes = AES_GCMEncrypter(key=key)
elif enc in ['A128CBC-HS256', 'A192CBC-HS384', 'A256CBC-HS512']:
aes = AES_CBCEncrypter(key=key)
else:
raise Exception('Unsupported encryption algorithm %s' % enc)
try:
return aes.decrypt(ctxt, iv=iv, auth_data=auth_data, tag=tag)
except DecryptionFailed:
raise
| decrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(enc, key, ctxt, iv, tag, auth_data=b''):\n if enc in ['A128GCM', 'A192GCM', 'A256GCM']:\n aes = AES_GCMEncrypter(key=key)\n elif enc in ['A128CBC-... |
def x(self, msg, key):
hasher = hashes.Hash(self.hash_algorithm(), backend=default_backend())
hasher.update(msg)
digest = hasher.finalize()
sig = key.sign(digest, padding.PSS(mgf=padding.MGF1(self.hash_algorithm
()), salt_length=padding.PSS.MAX_LENGTH), utils.Prehashed(self.
hash_algorithm()))
return sig
| sign | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n hasher = hashes.Hash(self.hash_algorithm(), backend=default_backend())\n hasher.update(msg)\n digest = hasher.finalize()\n sig =... |
def x(self, msg, signature, key):
try:
key.verify(signature, msg, padding.PSS(mgf=padding.MGF1(self.
hash_algorithm()), salt_length=padding.PSS.MAX_LENGTH), self.
hash_algorithm())
except InvalidSignature as err:
raise BadSignature(err)
else:
return True
| verify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, signature, key):\n try:\n key.verify(signature, msg, padding.PSS(mgf=padding.MGF1(self.\n hash_algorithm()), salt_length=paddin... |
def x(self, key, iv='', cek='', **kwargs):
_msg = as_bytes(self.msg)
_args = self._dict
try:
_args['kid'] = kwargs['kid']
except KeyError:
pass
jwe = JWEnc(**_args)
iv = self._generate_iv(self['enc'], iv)
cek = self._generate_key(self['enc'], cek)
if isinstance(key, SYMKey):
try:
kek = key.key.encode('utf8')
except AttributeError:
kek = key.key
elif isinstance(key, bytes):
kek = key
else:
kek = intarr2str(key)
jek = aes_key_wrap(kek, cek, default_backend())
_enc = self['enc']
_auth_data = jwe.b64_encode_header()
ctxt, tag, cek = self.enc_setup(_enc, _msg, auth_data=_auth_data, key=
cek, iv=iv)
return jwe.pack(parts=[jek, iv, ctxt, tag])
| encrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n _args = self._dict\n try:\n _args['kid'] = kwargs['kid']\n except KeyErro... |
def x(num):
ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[
as_unicode(num['crv'])]())
return ecpn.public_key(default_backend())
| ec_construct_public | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(num):\n ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[\n as_unicode(num['crv'])]())\n return ecpn.public_key(default_backend()... |
def x(num):
pub_ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[
as_unicode(num['crv'])]())
priv_ecpn = ec.EllipticCurvePrivateNumbers(num['d'], pub_ecpn)
return priv_ecpn.private_key(default_backend())
| ec_construct_private | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(num):\n pub_ecpn = ec.EllipticCurvePublicNumbers(num['x'], num['y'], NIST2SEC[\n as_unicode(num['crv'])]())\n priv_ecpn = ec.EllipticCurvePrivateN... |
def x(filename, passphrase=None):
with open(filename, 'rb') as key_file:
private_key = serialization.load_pem_private_key(key_file.read(),
password=passphrase, backend=default_backend())
return private_key
| import_private_key_from_file | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename, passphrase=None):\n with open(filename, 'rb') as key_file:\n private_key = serialization.load_pem_private_key(key_file.read(),\n ... |
def x(self):
if isinstance(self.x, (str, bytes)):
_x = deser(self.x)
else:
raise ValueError('"x" MUST be a string')
if isinstance(self.y, (str, bytes)):
_y = deser(self.y)
else:
raise ValueError('"y" MUST be a string')
if self.d:
try:
if isinstance(self.d, (str, bytes)):
_d = deser(self.d)
self.priv_key = ec_construct_private({'x': _x, 'y': _y,
'crv': self.crv, 'd': _d})
self.pub_key = self.priv_key.public_key()
except ValueError as err:
raise DeSerializationNotPossible(str(err))
else:
self.pub_key = ec_construct_public({'x': _x, 'y': _y, 'crv': self.crv})
| deserialize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if isinstance(self.x, (str, bytes)):\n _x = deser(self.x)\n else:\n raise ValueError('\"x\" MUST be a string')\n if isinstance(... |
def x(self, private=False):
if self.priv_key:
self._serialize(self.priv_key)
else:
self._serialize(self.pub_key)
res = self.common()
res.update({'crv': self.crv, 'x': self.x, 'y': self.y})
if private and self.d:
res['d'] = self.d
return res
| serialize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False):\n if self.priv_key:\n self._serialize(self.priv_key)\n else:\n self._serialize(self.pub_key)\n res = self.common()... |
def x(self, key):
self._serialize(key)
if isinstance(key, ec.EllipticCurvePrivateKey):
self.priv_key = key
self.pub_key = key.public_key()
else:
self.pub_key = key
return self
| load_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key):\n self._serialize(key)\n if isinstance(key, ec.EllipticCurvePrivateKey):\n self.priv_key = key\n self.pub_key = key.public_key(... |
def x(spec):
try:
size = spec['size']
except KeyError:
size = 2048
kb = KeyBundle(keytype='RSA')
if 'use' in spec:
for use in harmonize_usage(spec['use']):
_key = new_rsa_key(use=use, key_size=size)
kb.append(_key)
else:
_key = new_rsa_key(key_size=size)
kb.append(_key)
return kb
| rsa_init | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(spec):\n try:\n size = spec['size']\n except KeyError:\n size = 2048\n kb = KeyBundle(keytype='RSA')\n if 'use' in spec:\n for... |
def x(spec):
kb = KeyBundle(keytype='EC')
if 'use' in spec:
for use in spec['use']:
eck = new_ec_key(crv=spec['crv'], use=use)
kb.append(eck)
else:
eck = new_ec_key(crv=spec['crv'])
kb.append(eck)
return kb
| ec_init | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(spec):\n kb = KeyBundle(keytype='EC')\n if 'use' in spec:\n for use in spec['use']:\n eck = new_ec_key(crv=spec['crv'], use=use)\n ... |
def x(filename, typ, usage):
usage = harmonize_usage(usage)
if typ.lower() == 'jwks':
kb = KeyBundle(source=filename, fileformat='jwks', keyusage=usage)
elif typ.lower() == 'der':
kb = KeyBundle(source=filename, fileformat='der', keyusage=usage)
else:
raise UnknownKeyType('Unsupported key type')
return kb
| keybundle_from_local_file | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename, typ, usage):\n usage = harmonize_usage(usage)\n if typ.lower() == 'jwks':\n kb = KeyBundle(source=filename, fileformat='jwks', keyusage=... |
def x(kbl, target, private=False):
keys = []
for kb in kbl:
keys.extend([k.serialize(private) for k in kb.keys() if k.kty !=
'oct' and not k.inactive_since])
res = {'keys': keys}
try:
f = open(target, 'w')
except IOError:
head, tail = os.path.split(target)
os.makedirs(head)
f = open(target, 'w')
_txt = json.dumps(res)
f.write(_txt)
f.close()
| dump_jwks | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kbl, target, private=False):\n keys = []\n for kb in kbl:\n keys.extend([k.serialize(private) for k in kb.keys() if k.kty !=\n 'oct' an... |
def x(key_conf, kid_template=''):
kid = 0
tot_kb = KeyBundle()
for spec in key_conf:
typ = spec['type'].upper()
if typ == 'RSA':
if 'key' in spec:
error_to_catch = OSError, IOError, DeSerializationNotPossible
try:
kb = KeyBundle(source='file://%s' % spec['key'],
fileformat='der', keytype=typ, keyusage=spec['use'])
except error_to_catch:
kb = rsa_init(spec)
except Exception:
raise
else:
kb = rsa_init(spec)
elif typ == 'EC':
kb = ec_init(spec)
else:
continue
if 'kid' in spec and len(kb) == 1:
ks = kb.keys()
ks[0].kid = spec['kid']
else:
for k in kb.keys():
if kid_template:
k.kid = kid_template % kid
kid += 1
else:
k.add_kid()
tot_kb.extend(kb.keys())
return tot_kb
| build_key_bundle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_conf, kid_template=''):\n kid = 0\n tot_kb = KeyBundle()\n for spec in key_conf:\n typ = spec['type'].upper()\n if typ == 'RSA':\n ... |
def x(kd1, kd2):
_l = _cmp(kd1['type'], kd2['type'])
if _l:
return _l
if kd1['type'] == 'EC':
_l = _cmp(kd1['crv'], kd2['crv'])
if _l:
return _l
_l = _cmp(kd1['type'], kd2['type'])
if _l:
return _l
_l = _cmp(kd1['use'][0], kd2['use'][0])
if _l:
return _l
try:
_kid1 = kd1['kid']
except KeyError:
_kid1 = None
try:
_kid2 = kd2['kid']
except KeyError:
_kid2 = None
if _kid1 and _kid2:
return _cmp(_kid1, _kid2)
elif _kid1:
return -1
elif _kid2:
return 1
return 0
| sort_func | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kd1, kd2):\n _l = _cmp(kd1['type'], kd2['type'])\n if _l:\n return _l\n if kd1['type'] == 'EC':\n _l = _cmp(kd1['crv'], kd2['crv'])\n ... |
def x(key_def):
_int = []
for kd in key_def:
if len(kd['use']) > 1:
for _use in kd['use']:
_kd = kd.copy()
_kd['use'] = _use
_int.append(_kd)
else:
_int.append(kd)
_int.sort(key=cmp_to_key(sort_func))
return _int
| order_key_defs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_def):\n _int = []\n for kd in key_def:\n if len(kd['use']) > 1:\n for _use in kd['use']:\n _kd = kd.copy()\n ... |
def x(key_bundle, key_defs):
keys = key_bundle.get()
diff = {}
key_defs = order_key_defs(key_defs)[:]
used = []
for key in keys:
match = False
for kd in key_defs:
if key.use not in kd['use']:
continue
if key.kty != kd['type']:
continue
if key.kty == 'EC':
if key.crv != kd['crv']:
continue
try:
_kid = kd['kid']
except KeyError:
pass
else:
if key.kid != _kid:
continue
match = True
used.append(kd)
key_defs.remove(kd)
break
if not match:
try:
diff['del'].append(key)
except KeyError:
diff['del'] = [key]
if key_defs:
_kb = build_key_bundle(key_defs)
diff['add'] = _kb.keys()
return diff
| key_diff | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_bundle, key_defs):\n keys = key_bundle.get()\n diff = {}\n key_defs = order_key_defs(key_defs)[:]\n used = []\n for key in keys:\n ma... |
def x(key_bundle, diff):
try:
_add = diff['add']
except KeyError:
pass
else:
key_bundle.extend(_add)
try:
_del = diff['del']
except KeyError:
pass
else:
_now = time.time()
for k in _del:
k.inactive_since = _now
| update_key_bundle | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_bundle, diff):\n try:\n _add = diff['add']\n except KeyError:\n pass\n else:\n key_bundle.extend(_add)\n try:\n _de... |
def x(kb):
key_spec = []
for key in kb.get():
_spec = {'type': key.kty, 'use': [key.use]}
if key.kty == 'EC':
_spec['crv'] = key.crv
key_spec.append(_spec)
diff = {'del': kb.get()}
_kb = build_key_bundle(key_spec)
diff['add'] = _kb.keys()
update_key_bundle(kb, diff)
return kb
| key_rollover | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kb):\n key_spec = []\n for key in kb.get():\n _spec = {'type': key.kty, 'use': [key.use]}\n if key.kty == 'EC':\n _spec['crv'] =... |
def x(self, keys):
for inst in keys:
typ = inst['kty']
try:
_usage = harmonize_usage(inst['use'])
except KeyError:
_usage = ['']
else:
del inst['use']
flag = 0
for _use in _usage:
for _typ in [typ, typ.lower(), typ.upper()]:
try:
_key = K2C[_typ](use=_use, **inst)
except KeyError:
continue
except JWKException as err:
logger.warning('While loading keys: {}'.format(err))
else:
if _key not in self._keys:
self._keys.append(_key)
flag = 1
break
if not flag:
logger.warning('While loading keys, UnknownKeyType: {}'.format(typ)
)
| do_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys):\n for inst in keys:\n typ = inst['kty']\n try:\n _usage = harmonize_usage(inst['use'])\n except KeyError:\n ... |
def x(self, filename):
_info = json.loads(open(filename).read())
if 'keys' in _info:
self.do_keys(_info['keys'])
else:
self.do_keys([_info])
self.last_updated = time.time()
| do_local_jwk | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filename):\n _info = json.loads(open(filename).read())\n if 'keys' in _info:\n self.do_keys(_info['keys'])\n else:\n self.do_keys(... |
def x(self, filename, keytype, keyusage=None, kid=''):
_bkey = import_private_rsa_key_from_file(filename)
if keytype.lower() != 'rsa':
raise NotImplemented('No support for DER decoding of that key type')
if not keyusage:
keyusage = ['enc', 'sig']
else:
keyusage = harmonize_usage(keyusage)
for use in keyusage:
_key = RSAKey().load_key(_bkey)
_key.use = use
if kid:
_key.kid = kid
self._keys.append(_key)
self.last_updated = time.time()
| do_local_der | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filename, keytype, keyusage=None, kid=''):\n _bkey = import_private_rsa_key_from_file(filename)\n if keytype.lower() != 'rsa':\n raise NotIm... |
def x(self):
if self.verify_ssl:
args = {'verify': self.verify_ssl}
else:
args = {}
try:
logging.debug('KeyBundle fetch keys from: {}'.format(self.source))
r = self.httpc('GET', self.source, **args)
except Exception as err:
logger.error(err)
raise UpdateFailed(REMOTE_FAILED.format(self.source, str(err)))
if r.status_code == 200:
self.time_out = time.time() + self.cache_time
self.imp_jwks = self._parse_remote_response(r)
if not isinstance(self.imp_jwks, dict) or 'keys' not in self.imp_jwks:
raise UpdateFailed(MALFORMED.format(self.source))
logger.debug('Loaded JWKS: %s from %s' % (r.text, self.source))
try:
self.do_keys(self.imp_jwks['keys'])
except KeyError:
logger.error("No 'keys' keyword in JWKS")
raise UpdateFailed(MALFORMED.format(self.source))
else:
raise UpdateFailed(REMOTE_FAILED.format(self.source, r.status_code))
self.last_updated = time.time()
return True
| do_remote | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.verify_ssl:\n args = {'verify': self.verify_ssl}\n else:\n args = {}\n try:\n logging.debug('KeyBundle fetch key... |
def x(self, response):
try:
if response.headers['Content-Type'] != 'application/json':
logger.warning('Wrong Content_type ({})'.format(response.
headers['Content-Type']))
except KeyError:
pass
logger.debug('Loaded JWKS: %s from %s' % (response.text, self.source))
try:
return json.loads(response.text)
except ValueError:
return None
| parse_remote_response | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, response):\n try:\n if response.headers['Content-Type'] != 'application/json':\n logger.warning('Wrong Content_type ({})'.format(res... |
def x(self):
res = True
if self.source:
_keys = self._keys
self._keys = []
try:
if self.remote is False:
if self.fileformat in ['jwks', 'jwk']:
self.do_local_jwk(self.source)
elif self.fileformat == 'der':
self.do_local_der(self.source, self.keytype, self.keyusage)
else:
res = self.do_remote()
except Exception as err:
logger.error('Key bundle update failed: {}'.format(err))
self._keys = _keys
return False
now = time.time()
for _key in _keys:
if _key not in self._keys:
if not _key.inactive_since:
_key.inactive_since = now
self._keys.append(_key)
return res
| update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n res = True\n if self.source:\n _keys = self._keys\n self._keys = []\n try:\n if self.remote is False:\n ... |
def x(self, typ='', only_active=True):
self._uptodate()
_typs = [typ.lower(), typ.upper()]
if typ:
_keys = [k for k in self._keys if k.kty in _typs]
else:
_keys = self._keys
if only_active:
return [k for k in _keys if not k.inactive_since]
else:
return _keys
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, typ='', only_active=True):\n self._uptodate()\n _typs = [typ.lower(), typ.upper()]\n if typ:\n _keys = [k for k in self._keys if k.kty in... |
def x(self, typ):
_typs = [typ.lower(), typ.upper()]
self._keys = [k for k in self._keys if not k.kty in _typs]
| remove_keys_by_type | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, typ):\n _typs = [typ.lower(), typ.upper()]\n self._keys = [k for k in self._keys if not k.kty in _typs]\n",
"role": "user"
},
{
"conten... |
def x(self, private=False):
self._uptodate()
keys = list()
for k in self._keys:
if private:
key = k.serialize(private)
else:
key = k.serialize()
for k, v in key.items():
key[k] = as_unicode(v)
keys.append(key)
return json.dumps({'keys': keys})
| jwks | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False):\n self._uptodate()\n keys = list()\n for k in self._keys:\n if private:\n key = k.serialize(private)\n ... |
def x(self, kid):
for key in self._keys:
if key.kid == kid:
return key
self.update()
for key in self._keys:
if key.kid == kid:
return key
return None
| get_key_with_kid | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, kid):\n for key in self._keys:\n if key.kid == kid:\n return key\n self.update()\n for key in self._keys:\n if key.kid ... |
def x(self):
self._uptodate()
return [key.kid for key in self._keys if key.kid != '']
| kids | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._uptodate()\n return [key.kid for key in self._keys if key.kid != '']\n",
"role": "user"
},
{
"content": "kids",
"role": "a... |
def x(self, kid):
k = self.get_key_with_kid(kid)
k.inactive_since = time.time()
| mark_as_inactive | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, kid):\n k = self.get_key_with_kid(kid)\n k.inactive_since = time.time()\n",
"role": "user"
},
{
"content": "mark_as_inactive",
"rol... |
def x(self, after, when=0):
if when:
now = when
else:
now = time.time()
if not isinstance(after, float):
try:
after = float(after)
except TypeError:
raise
_kl = []
for k in self._keys:
if k.inactive_since and k.inactive_since + after < now:
continue
else:
_kl.append(k)
self._keys = _kl
| remove_outdated | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, after, when=0):\n if when:\n now = when\n else:\n now = time.time()\n if not isinstance(after, float):\n try:\n ... |
def x(self):
kb = KeyBundle()
kb._keys = self._keys[:]
kb.cache_time = self.cache_time
kb.verify_ssl = self.verify_ssl
if self.source:
kb.source = self.source
kb.fileformat = self.fileformat
kb.keytype = self.keytype
kb.keyusage = self.keyusage
kb.remote = self.remote
return kb
| copy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n kb = KeyBundle()\n kb._keys = self._keys[:]\n kb.cache_time = self.cache_time\n kb.verify_ssl = self.verify_ssl\n if self.source:\n ... |
def x(self, token, **kwargs):
if isinstance(token, str):
try:
token = token.encode('utf-8')
except UnicodeDecodeError:
pass
part = split_token(token)
self.b64part = part
self.part = [b64d(p) for p in part]
self.headers = json.loads(as_unicode(self.part[0]))
for key, val in kwargs.items():
if not val and key in self.headers:
continue
try:
_ok = self.verify_header(key, val)
except KeyError:
raise
else:
if not _ok:
raise HeaderError('Expected "{}" to be "{}", was "{}"'.
format(key, val, self.headers[key]))
return self
| unpack | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token, **kwargs):\n if isinstance(token, str):\n try:\n token = token.encode('utf-8')\n except UnicodeDecodeError:\n ... |
def x(self, parts=None, headers=None):
if not headers:
if self.headers:
headers = self.headers
else:
headers = {'alg': 'none'}
logging.debug('JWT header: {}'.format(headers))
if not parts:
return '.'.join([a.decode() for a in self.b64part])
self.part = [headers] + parts
_all = self.b64part = [b64encode_item(headers)]
_all.extend([b64encode_item(p) for p in parts])
return '.'.join([a.decode() for a in _all])
| pack | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, parts=None, headers=None):\n if not headers:\n if self.headers:\n headers = self.headers\n else:\n headers = {'alg... |
def x(self):
_msg = as_unicode(self.part[1])
if 'cty' in self.headers and self.headers['cty'].lower() != 'jwt':
pass
else:
try:
_msg = json.loads(_msg)
except ValueError:
pass
return _msg
| payload | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n _msg = as_unicode(self.part[1])\n if 'cty' in self.headers and self.headers['cty'].lower() != 'jwt':\n pass\n else:\n try:\n ... |
def x(self, key, val):
if isinstance(val, list):
if self.headers[key] in val:
return True
else:
return False
elif self.headers[key] == val:
return True
else:
return False
| verify_header | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, val):\n if isinstance(val, list):\n if self.headers[key] in val:\n return True\n else:\n return False\n el... |
def x(self, check_presence=True, **kwargs):
for key, val in kwargs.items():
try:
_ok = self.verify_header(key, val)
except KeyError:
if check_presence:
return False
else:
pass
else:
if not _ok:
return False
return True
| verify_headers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, check_presence=True, **kwargs):\n for key, val in kwargs.items():\n try:\n _ok = self.verify_header(key, val)\n except KeyErr... |
def x(self, msg, key):
h = hmac.HMAC(key, self.algorithm(), default_backend())
h.update(msg)
return h.finalize()
| sign | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n h = hmac.HMAC(key, self.algorithm(), default_backend())\n h.update(msg)\n return h.finalize()\n",
"role": "user"
},
{
"... |
def x(self, msg, sig, key):
try:
h = hmac.HMAC(key, self.algorithm(), default_backend())
h.update(msg)
h.verify(sig)
return True
except:
return False
| verify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, sig, key):\n try:\n h = hmac.HMAC(key, self.algorithm(), default_backend())\n h.update(msg)\n h.verify(sig)\n return ... |
def x():
parser = argparse.ArgumentParser(description='JSON Web Key (JWK) Generator'
)
parser.add_argument('--kty', dest='kty', metavar='type', help=
'Key type', required=True)
parser.add_argument('--size', dest='keysize', type=int, metavar='size',
help='Key size')
parser.add_argument('--crv', dest='crv', metavar='curve', help=
'EC curve', choices=NIST2SEC.keys(), default=DEFAULT_EC_CURVE)
parser.add_argument('--exp', dest='rsa_exp', type=int, metavar=
'exponent', help=
f'RSA public key exponent (default {DEFAULT_RSA_EXP})', default=
DEFAULT_RSA_EXP)
parser.add_argument('--kid', dest='kid', metavar='id', help='Key ID')
args = parser.parse_args()
if args.kty.upper() == 'RSA':
if args.keysize is None:
args.keysize = DEFAULT_RSA_KEYSIZE
jwk = new_rsa_key(public_exponent=args.rsa_exp, key_size=args.
keysize, kid=args.kid)
elif args.kty.upper() == 'EC':
if args.crv not in NIST2SEC:
print('Unknown curve: {0}'.format(args.crv), file=sys.stderr)
exit(1)
jwk = new_ec_key(crv=args.crv, kid=args.kid)
elif args.kty.upper() == 'SYM':
if args.keysize is None:
args.keysize = DEFAULT_SYM_KEYSIZE
randomkey = os.urandom(args.keysize)
jwk = SYMKey(key=randomkey, kid=args.kid)
else:
print(f'Unknown key type: {args.kty}', file=sys.stderr)
exit(1)
jwk_dict = jwk.serialize(private=True)
print(json.dumps(jwk_dict, sort_keys=True, indent=4))
print('SHA-256: ' + jwk.thumbprint('SHA-256').decode(), file=sys.stderr)
| main | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n parser = argparse.ArgumentParser(description='JSON Web Key (JWK) Generator'\n )\n parser.add_argument('--kty', dest='kty', metavar='type', he... |
def x(jwk_dict, private):
provided = frozenset(jwk_dict.keys())
if private is not None and private:
required = EC_PUBLIC_REQUIRED | EC_PRIVATE_REQUIRED
else:
required = EC_PUBLIC_REQUIRED
return ensure_params('EC', provided, required)
| ensure_ec_params | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwk_dict, private):\n provided = frozenset(jwk_dict.keys())\n if private is not None and private:\n required = EC_PUBLIC_REQUIRED | EC_PRIVATE_REQ... |
def x(jwk_dict, private):
provided = frozenset(jwk_dict.keys())
if private is not None and private:
required = RSA_PUBLIC_REQUIRED | RSA_PRIVATE_REQUIRED
else:
required = RSA_PUBLIC_REQUIRED
return ensure_params('RSA', provided, required)
| ensure_rsa_params | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwk_dict, private):\n provided = frozenset(jwk_dict.keys())\n if private is not None and private:\n required = RSA_PUBLIC_REQUIRED | RSA_PRIVATE_R... |
def x(kty, provided, required):
if not required <= provided:
missing = required - provided
raise MissingValue('Missing properties for kty={}, {}'.format(kty,
str(list(missing))))
| ensure_params | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(kty, provided, required):\n if not required <= provided:\n missing = required - provided\n raise MissingValue('Missing properties for kty={}, ... |
def x(jwk_dict, private=None):
_jwk_dict = copy.copy(jwk_dict)
if 'kty' not in _jwk_dict:
raise MissingValue('kty missing')
if _jwk_dict['kty'] == 'EC':
ensure_ec_params(_jwk_dict, private)
if private is not None and not private:
for v in EC_PRIVATE:
_jwk_dict.pop(v, None)
if _jwk_dict['crv'] in NIST2SEC:
curve = NIST2SEC[_jwk_dict['crv']]()
else:
raise UnsupportedAlgorithm('Unknown curve: %s' % _jwk_dict['crv'])
if _jwk_dict.get('d', None) is not None:
_jwk_dict['priv_key'] = ec.derive_private_key(base64url_to_long
(_jwk_dict['d']), curve, backends.default_backend())
_jwk_dict['pub_key'] = _jwk_dict['priv_key'].public_key()
else:
ec_pub_numbers = ec.EllipticCurvePublicNumbers(base64url_to_long
(_jwk_dict['x']), base64url_to_long(_jwk_dict['y']), curve)
_jwk_dict['pub_key'] = ec_pub_numbers.public_key(backends.
default_backend())
return ECKey(**_jwk_dict)
elif _jwk_dict['kty'] == 'RSA':
ensure_rsa_params(_jwk_dict, private)
if private is not None and not private:
for v in RSA_PRIVATE:
_jwk_dict.pop(v, None)
rsa_pub_numbers = rsa.RSAPublicNumbers(base64url_to_long(_jwk_dict[
'e']), base64url_to_long(_jwk_dict['n']))
if _jwk_dict.get('p', None) is not None:
p_long = base64url_to_long(_jwk_dict['p'])
q_long = base64url_to_long(_jwk_dict['q'])
d_long = base64url_to_long(_jwk_dict['d'])
if 'dp' not in _jwk_dict:
dp_long = rsa_crt_dmp1(d_long, p_long)
else:
dp_long = base64url_to_long(_jwk_dict['dp'])
if 'dq' not in _jwk_dict:
dq_long = rsa_crt_dmq1(d_long, q_long)
else:
dq_long = base64url_to_long(_jwk_dict['dq'])
if 'qi' not in _jwk_dict:
qi_long = rsa_crt_iqmp(p_long, q_long)
else:
qi_long = base64url_to_long(_jwk_dict['qi'])
rsa_priv_numbers = rsa.RSAPrivateNumbers(p_long, q_long, d_long,
dp_long, dq_long, qi_long, rsa_pub_numbers)
_jwk_dict['priv_key'] = rsa_priv_numbers.private_key(backends.
default_backend())
_jwk_dict['pub_key'] = _jwk_dict['priv_key'].public_key()
else:
_jwk_dict['pub_key'] = rsa_pub_numbers.public_key(backends.
default_backend())
if _jwk_dict['kty'] != 'RSA':
raise WrongKeyType('"{}" should have been "RSA"'.format(
_jwk_dict['kty']))
return RSAKey(**_jwk_dict)
elif _jwk_dict['kty'] == 'oct':
if 'key' not in _jwk_dict and 'k' not in _jwk_dict:
raise MissingValue(
'There has to be one of "k" or "key" in a symmetric key')
return SYMKey(**_jwk_dict)
else:
raise UnknownKeyType
| key_from_jwk_dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(jwk_dict, private=None):\n _jwk_dict = copy.copy(jwk_dict)\n if 'kty' not in _jwk_dict:\n raise MissingValue('kty missing')\n if _jwk_dict['kty... |
def x(key, use='', kid=''):
if isinstance(key, rsa.RSAPublicKey) or isinstance(key, rsa.RSAPrivateKey):
kspec = RSAKey(use=use, kid=kid).load_key(key)
elif isinstance(key, str):
kspec = SYMKey(key=key, use=use, kid=kid)
elif isinstance(key, ec.EllipticCurvePublicKey):
kspec = ECKey(use=use, kid=kid).load_key(key)
else:
raise Exception('Unknown key type:key=' + str(type(key)))
kspec.serialize()
return kspec
| jwk_wrap | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, use='', kid=''):\n if isinstance(key, rsa.RSAPublicKey) or isinstance(key, rsa.RSAPrivateKey):\n kspec = RSAKey(use=use, kid=kid).load_key(key)\... |
def x(key_conf, kid_template='', keyjar=None, owner=''):
if keyjar is None:
keyjar = KeyJar()
tot_kb = build_key_bundle(key_conf, kid_template)
keyjar.add_kb(owner, tot_kb)
return keyjar
| build_keyjar | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_conf, kid_template='', keyjar=None, owner=''):\n if keyjar is None:\n keyjar = KeyJar()\n tot_kb = build_key_bundle(key_conf, kid_template)\n ... |
def x(keyjar):
for iss, kbl in keyjar.items():
for kb in kbl:
kb.update()
| update_keyjar | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keyjar):\n for iss, kbl in keyjar.items():\n for kb in kbl:\n kb.update()\n",
"role": "user"
},
{
"content": "update_keyjar",
... |
def x(keyjar, issuer):
try:
kbl = keyjar[issuer]
except KeyError:
return ''
else:
key_list = []
for kb in kbl:
for key in kb.keys():
if key.inactive_since:
key_list.append('*{}:{}:{}'.format(key.kty, key.use,
key.kid))
else:
key_list.append('{}:{}:{}'.format(key.kty, key.use, key
.kid))
return ', '.join(key_list)
| key_summary | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keyjar, issuer):\n try:\n kbl = keyjar[issuer]\n except KeyError:\n return ''\n else:\n key_list = []\n for kb in kbl:\n ... |
def x(public_path='', private_path='', key_defs='', owner='', read_only=True):
if private_path:
if os.path.isfile(private_path):
_jwks = open(private_path, 'r').read()
_kj = KeyJar()
_kj.import_jwks(json.loads(_jwks), owner)
if key_defs:
_kb = _kj.issuer_keys[owner][0]
_diff = key_diff(_kb, key_defs)
if _diff:
if read_only:
logger.error('Not allowed to write to disc!')
else:
update_key_bundle(_kb, _diff)
_kj.issuer_keys[owner] = [_kb]
jwks = _kj.export_jwks(private=True, issuer=owner)
fp = open(private_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
else:
_kj = build_keyjar(key_defs, owner=owner)
if not read_only:
jwks = _kj.export_jwks(private=True, issuer=owner)
head, tail = os.path.split(private_path)
if head and not os.path.isdir(head):
os.makedirs(head)
fp = open(private_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
if public_path and not read_only:
jwks = _kj.export_jwks(issuer=owner)
head, tail = os.path.split(public_path)
if head and not os.path.isdir(head):
os.makedirs(head)
fp = open(public_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
elif public_path:
if os.path.isfile(public_path):
_jwks = open(public_path, 'r').read()
_kj = KeyJar()
_kj.import_jwks(json.loads(_jwks), owner)
if key_defs:
_kb = _kj.issuer_keys[owner][0]
_diff = key_diff(_kb, key_defs)
if _diff:
if read_only:
logger.error('Not allowed to write to disc!')
else:
update_key_bundle(_kb, _diff)
_kj.issuer_keys[owner] = [_kb]
jwks = _kj.export_jwks(issuer=owner)
fp = open(private_path, 'w')
fp.write(json.dumps(jwks))
fp.close()
else:
_kj = build_keyjar(key_defs, owner=owner)
if not read_only:
_jwks = _kj.export_jwks(issuer=owner)
head, tail = os.path.split(public_path)
if head and not os.path.isdir(head):
os.makedirs(head)
fp = open(public_path, 'w')
fp.write(json.dumps(_jwks))
fp.close()
else:
_kj = build_keyjar(key_defs, owner=owner)
return _kj
| init_key_jar | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(public_path='', private_path='', key_defs='', owner='', read_only=True):\n if private_path:\n if os.path.isfile(private_path):\n _jwks = o... |
def x(self, issuer, url, **kwargs):
if not url:
raise KeyError('No url given')
if '/localhost:' in url or '/localhost/' in url:
kb = self.keybundle_cls(source=url, verify_ssl=False, httpc=self.
httpc, **kwargs)
else:
kb = self.keybundle_cls(source=url, verify_ssl=self.verify_ssl,
httpc=self.httpc, **kwargs)
kb.update()
self.add_kb(issuer, kb)
return kb
| add_url | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, url, **kwargs):\n if not url:\n raise KeyError('No url given')\n if '/localhost:' in url or '/localhost/' in url:\n kb = self... |
def x(self, issuer, key, usage=None):
if issuer not in self.issuer_keys:
self.issuer_keys[issuer] = []
if usage is None:
self.issuer_keys[issuer].append(self.keybundle_cls([{'kty': 'oct',
'key': key}]))
else:
for use in usage:
self.issuer_keys[issuer].append(self.keybundle_cls([{'kty':
'oct', 'key': key, 'use': use}]))
| add_symmetric | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, key, usage=None):\n if issuer not in self.issuer_keys:\n self.issuer_keys[issuer] = []\n if usage is None:\n self.issuer_keys... |
def x(self, issuer, kb):
try:
self.issuer_keys[issuer].append(kb)
except KeyError:
self.issuer_keys[issuer] = [kb]
| add_kb | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, kb):\n try:\n self.issuer_keys[issuer].append(kb)\n except KeyError:\n self.issuer_keys[issuer] = [kb]\n",
"role": "user"... |
def x(self, key_use, key_type='', owner='', kid=None, **kwargs):
if key_use in ['dec', 'enc']:
use = 'enc'
else:
use = 'sig'
_kj = None
if owner != '':
try:
_kj = self.issuer_keys[owner]
except KeyError:
if owner.endswith('/'):
try:
_kj = self.issuer_keys[owner[:-1]]
except KeyError:
pass
else:
try:
_kj = self.issuer_keys[owner + '/']
except KeyError:
pass
else:
try:
_kj = self.issuer_keys[owner]
except KeyError:
pass
if _kj is None:
return []
lst = []
for bundle in _kj:
if key_type:
if key_use in ['ver', 'dec']:
_bkeys = bundle.get(key_type, only_active=False)
else:
_bkeys = bundle.get(key_type)
else:
_bkeys = bundle.keys()
for key in _bkeys:
if key.inactive_since and key_use != 'sig':
continue
if not key.use or use == key.use:
if kid:
if key.kid == kid:
lst.append(key)
break
else:
continue
else:
lst.append(key)
if key_type == 'EC' and 'alg' in kwargs:
name = 'P-{}'.format(kwargs['alg'][2:])
_lst = []
for key in lst:
if name != key.crv:
continue
_lst.append(key)
lst = _lst
if use == 'enc' and key_type == 'oct' and owner != '':
for kb in self.issuer_keys['']:
for key in kb.get(key_type):
if key.inactive_since:
continue
if not key.use or key.use == use:
lst.append(key)
return lst
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key_use, key_type='', owner='', kid=None, **kwargs):\n if key_use in ['dec', 'enc']:\n use = 'enc'\n else:\n use = 'sig'\n _kj = N... |
def x(self, key_type='', owner='', kid=None, **kwargs):
return self.get('sig', key_type, owner, kid, **kwargs)
| get_signing_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key_type='', owner='', kid=None, **kwargs):\n return self.get('sig', key_type, owner, kid, **kwargs)\n",
"role": "user"
},
{
"content": "g... |
def x(self, issuer, alg, usage):
if usage in ['sig', 'ver']:
ktype = jws_alg2keytype(alg)
else:
ktype = jwe_alg2keytype(alg)
return self.get(usage, ktype, issuer)
| keys_by_alg_and_usage | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, alg, usage):\n if usage in ['sig', 'ver']:\n ktype = jws_alg2keytype(alg)\n else:\n ktype = jwe_alg2keytype(alg)\n return ... |
def x(self, issuer):
res = []
for kbl in self.issuer_keys[issuer]:
res.extend(kbl.keys())
return res
| get_issuer_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer):\n res = []\n for kbl in self.issuer_keys[issuer]:\n res.extend(kbl.keys())\n return res\n",
"role": "user"
},
{
"con... |
def x(self, url):
for owner in self.issuer_keys.keys():
if owner.startswith(url):
return owner
raise KeyError("No keys for '{}' in this keyjar".format(url))
| match_owner | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, url):\n for owner in self.issuer_keys.keys():\n if owner.startswith(url):\n return owner\n raise KeyError(\"No keys for '{}' in t... |
def x(self, issuer, jwks_uri='', jwks=None, replace=False):
logger.debug('Initiating key bundle for issuer: %s' % issuer)
if replace or issuer not in self.issuer_keys:
self.issuer_keys[issuer] = []
if jwks_uri:
self.add_url(issuer, jwks_uri)
elif jwks:
_keys = jwks['keys']
self.issuer_keys[issuer].append(self.keybundle_cls(_keys))
| load_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, issuer, jwks_uri='', jwks=None, replace=False):\n logger.debug('Initiating key bundle for issuer: %s' % issuer)\n if replace or issuer not in self.... |
def x(self, source, issuer):
try:
for kb in self.issuer_keys[issuer]:
if kb.source == source:
return kb
except KeyError:
return None
return None
| find | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, source, issuer):\n try:\n for kb in self.issuer_keys[issuer]:\n if kb.source == source:\n return kb\n except KeyEr... |
def x(self, private=False, issuer=''):
keys = []
for kb in self.issuer_keys[issuer]:
keys.extend([k.serialize(private) for k in kb.keys() if k.
inactive_since == 0])
return {'keys': keys}
| export_jwks | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False, issuer=''):\n keys = []\n for kb in self.issuer_keys[issuer]:\n keys.extend([k.serialize(private) for k in kb.keys() if k.\n ... |
def x(self, private=False, issuer=''):
return json.dumps(self.export_jwks(private, issuer))
| export_jwks_as_json | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False, issuer=''):\n return json.dumps(self.export_jwks(private, issuer))\n",
"role": "user"
},
{
"content": "export_jwks_as_json"... |
def x(self, jwks, issuer):
try:
_keys = jwks['keys']
except KeyError:
raise ValueError('Not a proper JWKS')
else:
try:
self.issuer_keys[issuer].append(self.keybundle_cls(_keys,
verify_ssl=self.verify_ssl))
except KeyError:
self.issuer_keys[issuer] = [self.keybundle_cls(_keys,
verify_ssl=self.verify_ssl)]
| import_jwks | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwks, issuer):\n try:\n _keys = jwks['keys']\n except KeyError:\n raise ValueError('Not a proper JWKS')\n else:\n try:\n ... |
def x(self, jwks, issuer):
return self.import_jwks(json.loads(jwks), issuer)
| import_jwks_as_json | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwks, issuer):\n return self.import_jwks(json.loads(jwks), issuer)\n",
"role": "user"
},
{
"content": "import_jwks_as_json",
"role": "... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.