query stringlengths 9 9.05k | document stringlengths 10 222k | negatives listlengths 19 20 | metadata dict |
|---|---|---|---|
Representation of a circuit as "Rotation list". On top of the structure (see Structured script representation), 1Q layers are compiled to the corresponding rotations. The 1Q layers are now represented with a rotation vector. rotations_1Q = [layer, qubit, rotation_vector] rotation_vector = [axis_of_rotation (3 numbers),... | def __init__(self, rotations_1Q, lines_2Q, n_qubits):
self.rotations_1Q = rotations_1Q
self.lines_2Q = lines_2Q
self.n_qubits = n_qubits
dim_depth, dim_qubits, dim_rot = self.rotations_1Q.shape
self.depth = 1+2*len(lines_2Q)
# 1Q rotations vector does not match the depth
... | [
"def two_qubit_rotation(self, bits, symbols):\n circuit = cirq.Circuit()\n circuit += cirq.Circuit(self.one_qubit_rotation(bits[0], symbols[0:3]))\n circuit += cirq.Circuit(self.one_qubit_rotation(bits[1], symbols[3:6]))\n circuit += [cirq.ZZ(*bits)**symbols[6]]\n circuit += [cirq... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Representation of a circuit as "XY list". On top of the Euler list (see Euler list representation), The euler angles are compiled into a single MW gate (rotation around axis in the azimutal plane) through virtual phase updates. The 1Q layers are now represented with an XY vector. rotations_1Q = [layer, qubit, XY_vector... | def __init__(self, XY_rotations, lines_2Q, n_qubits):
self.XY_rotations = XY_rotations
self.lines_2Q = lines_2Q
self.n_qubits = n_qubits
dim_depth, dim_qubits, dim_XY = self.XY_rotations.shape
self.depth = 1+2*len(lines_2Q)
# XY rotations vector does not match the depth
... | [
"def c(inputs, **kwargs):\n qml.templates.AngleEmbedding(inputs, wires=list(range(n_qubits)))\n qml.templates.StronglyEntanglingLayers(kwargs[\"w1\"], wires=list(range(n_qubits)))\n qml.RX(kwargs[\"w2\"][0], wires=0 % n_qubits)\n qml.RX(kwargs[\"w3\"], wires=1 % n_qubits)... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Checks that X is transposed to [Lat, Lon, Sample, Feature] order | def check_transposed(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):
assert list(X.dims).index(x_lat_dim) == 0, 'XCast requires a dataset to be transposed to LAT x LON x SAMPLE x FEATURE'
assert list(X.dims).index(x_lon_dim) == 1, 'XCast requires a dataset to be transposed to LAT x LON x SAMPLE x FEATURE'
ass... | [
"def check_transform(self, X):\n m = X.shape[1]\n\n if self.ncols != m:\n print(\"Number of Columns in input data of fit function and', \\\n 'transform function are different\")\n return False\n\n for i in range(m):\n ls = np.unique(X[:, i])\n... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Checks that X is 4D, with Dimension Names as specified by x_lat_dim, x_lon_dim, x_sample_dim, and x_feature_dim | def check_dimensions(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):
assert 4 <= len(X.dims) <= 5, 'XCast requires a dataset to be 4-Dimensional'
assert x_lat_dim in X.dims, 'XCast requires a dataset_lat_dim to be a dimension on X'
assert x_lon_dim in X.dims, 'XCast requires a dataset_lon_dim to be a dimensio... | [
"def check_coords(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):\n\tassert x_lat_dim in X.coords.keys(), 'XCast requires a dataset_lat_dim to be a coordinate on X'\n\tassert x_lon_dim in X.coords.keys(), 'XCast requires a dataset_lon_dim to be a coordinate on X'\n\tassert x_sample_dim in X.coords.keys(), 'X... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Checks that X has coordinates named as specified by x_lat_dim, x_lon_dim, x_sample_dim, and x_feature_dim | def check_coords(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):
assert x_lat_dim in X.coords.keys(), 'XCast requires a dataset_lat_dim to be a coordinate on X'
assert x_lon_dim in X.coords.keys(), 'XCast requires a dataset_lon_dim to be a coordinate on X'
assert x_sample_dim in X.coords.keys(), 'XCast requir... | [
"def check_dimensions(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):\n\tassert 4 <= len(X.dims) <= 5, 'XCast requires a dataset to be 4-Dimensional'\n\tassert x_lat_dim in X.dims, 'XCast requires a dataset_lat_dim to be a dimension on X'\n\tassert x_lon_dim in X.dims, 'XCast requires a dataset_lon_dim to be... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Checks that X's Coordinates are the same length as X's Dimensions | def check_consistent(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):
assert X.shape[list(X.dims).index(x_lat_dim)] == len(X.coords[x_lat_dim].values), "XCast requires a dataset's x_lat_dim coordinate to be the same length as its x_lat_dim dimension"
assert X.shape[list(X.dims).index(x_lon_dim)] == len(X.coords... | [
"def _check_shape(self, X):\n return all([X.shape[i] == self.train_shape[i] for i in range(2)])",
"def check_dimensions(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):\n\tassert 4 <= len(X.dims) <= 5, 'XCast requires a dataset to be 4-Dimensional'\n\tassert x_lat_dim in X.dims, 'XCast requires a dat... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Checks that X is an Xarray.DataArray | def check_type(X, x_lat_dim, x_lon_dim, x_sample_dim, x_feature_dim):
assert type(X) == xr.DataArray, 'XCast requires a dataset to be of type "Xarray.DataArray"' | [
"def __check_is_xarray(self, data):\n if type(data) is xr.core.dataarray.DataArray or \\\n type(data) is xr.core.dataarray.Dataset:\n\n return True\n else:\n msg = \"Variable {data} is not an xarray DataArray/Dataset\"\n raise Exception(msg)",
"def is_xarra... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Return a new ObjectChange representing a change made to this object. This will typically be called automatically by ChangeLoggingMiddleware. | def to_objectchange(self, action):
return ObjectChange(
changed_object=self,
object_repr=str(self),
action=action,
object_data=serialize_object(self),
) | [
"def log_change(self, request, obj, message):\n from .tasks import create_log\n from django.contrib.admin.models import CHANGE\n defer(create_log, \n user_id = request.user.id,\n user_name = unicode(request.user),\n content_type = obj._meta.verbose_name,\n... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Publisher unique service advertise identifier. Getter only | def advertise_id(self):
return self._advertise_id | [
"def advertisement_id(self):\n return uuid.uuid4()",
"def service_id(self) -> str:\n return pulumi.get(self, \"service_id\")",
"def advertised_id(self):\n namespace = '0x' + self.uuid[:8] + self.uuid[-12:]\n major, minor = map(int, (self.major, self.minor))\n temp_instance = s... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Publishing latch status. Getter only property | def latch(self):
return self._latch | [
"def get_labware_latch_status(self) -> HeaterShakerLabwareLatchStatus:",
"def power_status(self):\n raise NotImplementedError(\"ERROR: Unimplemented function.\")",
"def notify_status(self):\n return self._notify_status",
"def set_On(self):\n if not(self._locked):\n self.__dict_... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Getter only property. Returns publishing topic name. | def topic(self):
return self._topic_name | [
"def topic(self) -> str:\n return pulumi.get(self, \"topic\")",
"def pubsub_topic(self) -> pulumi.Output[str]:\n return pulumi.get(self, \"pubsub_topic\")",
"def topicName(self):\n\n return internals.blpapi_Message_topicName(self.__handle)",
"def topic(self):\n return self._topic",... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Transforms single row of pandas `original_tweets_with_lemmas.p` to graph. Suffixes in node names are needed due to intersection between hashtags and user names. | def _transform_single_row(self, hashtag_agg: Dict, row: pd.Series):
user_name = row["username"] + "_user"
tweet_id = str(row["id"]) + "_tweet"
tags = row["hashtags"]
self._users_labels.add(user_name)
self._tweet_labels.add(tweet_id)
if not self.graph.has_node(user_name)... | [
"def transformation(tweets):\r\n tableau = [[] for i in range(len(tweets))]\r\n for i,tweet in enumerate(tweets):\r\n tableau[i].append(tweet.id)\r\n tableau[i].append(tweet.user.screen_name)\r\n tableau[i].append(tweet.text)\r\n tableau[i].append(tweet.created_at)\r\n table... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Creates sparse matrix of preference vectors for each of N samples to recommend which are used to initialize random walk algorithm. If a query hashtag for a particular tweet is given, then it is used to create preference vector. The most similar hashtag is used otherwise. | def _get_preference_vectors(self, tweet_content_similarities: np.ndarray,
query_hashtags: Optional[Tuple[str]]) -> sps.csr_matrix:
def _get_using_similarities(similarity_vector):
query_hashtag_index = np.argmax(similarity_vector)
vec = np.zeros((len(self.... | [
"def tweet_term (tweets) : \n\n indptr = [0]\n indices = []\n data = []\n vocabulary = {}\n for value in tweets:\n for term in value :\n index = vocabulary.setdefault(term, len(vocabulary))\n indices.append(index)\n data.append(1)\n indptr.append(len(... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
activates mujoco with license at `file_path` this does not check the return code, per usage example at simulate.cpp and test.cpp. | def register_license(file_path):
result = mjlib.mj_activate(file_path)
return result | [
"def license_(value, overwrite):\n response = requests.get(\"https://api.github.com/repos/github/choosealicense.com/contents/_licenses?ref=gh-pages\")\n ensure_ok_response(response, \"Fetching license files failed.\")\n\n contents = response.json()\n\n if value == \"list\":\n licenses = []\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Return (qposadr, qveladr, dof) for the given joint name. If dof is 4 or 7, then the last 4 degrees of freedom in qpos represent a unit quaternion. | def joint_adr(self, joint_name):
jntadr = mjlib.mj_name2id(self.ptr, C.mjOBJ_JOINT, joint_name)
assert (jntadr >= 0)
dofmap = {C.mjJNT_FREE: 7,
C.mjJNT_BALL: 4,
C.mjJNT_SLIDE: 1,
C.mjJNT_HINGE: 1}
qposadr = self.jnt_qposadr[jntadr][0]... | [
"def quat_from_pose(pose):\n return pose[1]",
"def _get_joint_info(self):\n info = p.getJointStates(\n self.robot,\n jointIndices=self.robot_arm_joint_indices,\n physicsClientId=self.id)\n\n pos, vel, rf, t = [], [], [], []\n\n for joint_info in info:\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Reencode phylogeny_df to facilitate efficient analysis and transformation operations. The returned phylogeny dataframe will be topologically sorted (i.e., organisms appear after all ancestors), have contiguous ids (i.e., organisms' ids correspond to row number), contain an integer datatype `ancestor_id` column if the p... | def alifestd_to_working_format(
phylogeny_df: pd.DataFrame,
mutate: bool = False,
) -> pd.DataFrame:
if not mutate:
phylogeny_df = phylogeny_df.copy()
phylogeny_df = alifestd_try_add_ancestor_id_col(phylogeny_df, mutate=True)
if not alifestd_is_topologically_sorted(phylogeny_df):
... | [
"def alifestd_topological_sort(\n phylogeny_df: pd.DataFrame,\n mutate: bool = False,\n) -> pd.DataFrame:\n\n if not mutate:\n phylogeny_df = phylogeny_df.copy()\n\n phylogeny_df.set_index(\"id\", drop=False, inplace=True)\n\n unsorted_ids = set(phylogeny_df[\"id\"])\n internal_ids_refcount... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Provides list of github organization urls based on authenticated user. | def get_orgs():
url = "https://api.github.com/user/orgs"
org_urls = []
orgs = utils.get_json(url)
for org in orgs:
org_urls.append(org["url"])
return org_urls | [
"def urls(gh, user):\n return [repo.url for repo in getuserrepos(gh, user)]",
"def organizations():\n page = int(flask.request.args.get('page', 0))\n gh_api = flask.current_app.container.get(\n 'gh_api', token=flask.session['github_token']\n )\n\n gh_orgs = gh_api.get('/user/orgs', page=page... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Provides a list of Member urls per organizations. param orgs either a list of urls pointing to organizations or a single org name return list of member urls | def list_members(orgs):
members =[]
if isinstance(orgs, list):
#if list of orgs for each org get members list
for url in orgs:
#append /member to url - member_url is not valid canidate without a member list
url = url + "/members"
print("Checking " + url)
members_data = utils.ge... | [
"def get_orgs():\n \n url = \"https://api.github.com/user/orgs\"\n \n org_urls = []\n orgs = utils.get_json(url)\n \n for org in orgs:\n org_urls.append(org[\"url\"])\n \n return org_urls",
"def organizations(self):\n return self.get('{}/orgs'.format(ApiVersion.A1.value))",
"def _get_org_member... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Provides a list of Member urls that have [attribute] is null. param attribute to check for null value params memberUrls List of member urls to check return list of member urls with null [attribute] field | def check_for_null(attribute, memberUrls):
attributeNotFound =[]
for url in memberUrls:
member_data = utils.get_json(url)
if member_data[attribute] is None:
#TODO: TBD Could grab email here if speed was an issue
attributeNotFound.append(url)
return attributeNotFound | [
"def list_filter_field_null(list_data, target, source):\n result = []\n for i in list_data:\n if (i[target] and i[source] ) is not None:\n result.append(i)\n return result",
"def get_parliament_members_urls(self) -> list:\n directory = self.read_html(self.url)\n return [\n... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Get loan originations for a given lender, county combination. This ignores year for the moment. | def loan_originations(request_dict):
state_fips = request_dict.get('state_fips', '')
county_fips = request_dict.get('county_fips', '')
lender = request_dict.get('lender', '')
if state_fips and county_fips and lender:
records = HMDARecord.objects.filter(
countyfp=county_fips, lender... | [
"def get_land_conso_per_year(self, level, group_name=None):\n fields = Cerema.get_art_field(self.analyse_start_date, self.analyse_end_date)\n qs = self.get_cerema_cities(group_name=group_name)\n qs = qs.values(level)\n qs = qs.annotate(**{f\"20{field[3:5]}\": Sum(field) / 10000 for field... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Loads branch data from Derek. | def _load(self):
context = {
"username": self.username,
"reponame": self.reponame,
"name": self.name
}
LOG.debug("Loading %s" % self.branch_id)
doc = self._client.getjson(path="/users/%(username)s/repos/%(reponame)s"
... | [
"async def fetch_branch_data( self, results_holder_dct ):\n log.debug( 'fetch_branch_data' )\n original_directory = os.getcwd()\n git_dir = settings.BASE_DIR\n os.chdir( git_dir )\n output_obj: subprocess.CompletedProcess = await trio.run_process( ['git', 'branch'], capture_stdout... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Upload packages to branch. | def upload_packages(self, packages):
context = {
"username": self.username,
"reponame": self.reponame,
"name": self.name
}
filepaths = [os.path.join(os.path.dirname(path), pfile['filename'])
for path in packages
... | [
"def deploy():\n build()\n collect()\n commit()\n push()",
"def push(self, base_repo, branch=\"master\"):\n base_repo.push_to(self, branch)",
"def push(self, base_repo, branch: str = \"master\") -> None:\n raise NotImplementedError",
"def upload(self, connection):\n if not sel... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Look up package ID from list of package infos. | def get_pkg_id(pkgs, name, version):
for pinfo in pkgs:
if pinfo["name"] == name and pinfo["version"] == version:
return "%(name)s/%(version)s/%(id)s" % pinfo
raise DerekError("No package %s %s in the branch" % (name, version)) | [
"def _get_aptd_package_id(self, pk_id):\n name, version, arch, data = pk_id.split(\";\")\n id = name\n if arch != self.queue.worker.NATIVE_ARCH and arch != \"all\":\n id += \":%s\" % arch\n if version:\n id += \"=%s\" % version\n return id",
"def map_item_n... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert user template as anonymous raises access control error | def test_upsert_user_template_as_anonymous_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.upsert(
self.fixture.user1_template, request=mock_request
... | [
"def test_upsert_user_template_as_anonymous_with_access_right_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.upsert(\n self.fixture.user1_template,... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert user template as anonymous with access right raises access control error | def test_upsert_user_template_as_anonymous_with_access_right_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.upsert(
self.fixture.user1_template, request=mo... | [
"def test_upsert_user_template_as_anonymous_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.upsert(\n self.fixture.user1_template, request=mock_requ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert global template as anonymous raises access control error | def test_upsert_global_template_as_anonymous_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.upsert(
self.fixture.global_template, request=mock_request
... | [
"def test_upsert_global_template_as_anonymous_with_access_right_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.upsert(\n self.fixture.global_templa... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert global template as anonymous raises access control error | def test_upsert_global_template_as_anonymous_with_access_right_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.upsert(
self.fixture.global_template, request... | [
"def test_upsert_global_template_as_anonymous_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.upsert(\n self.fixture.global_template, request=mock_r... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert own template as user saves | def test_upsert_own_template_as_user_saves(self):
mock_request = create_mock_request(user=self.user1)
template_api.upsert(self.fixture.user1_template, request=mock_request) | [
"def test_upsert_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.user1_template, request=mock_request)",
"def test_upsert_own_template_as_staff_saves(self):\n mock_request = create_mock_request(user=self.staf... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert other users template as user raises access control error | def test_upsert_other_users_template_as_user_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.user1)
with self.assertRaises(AccessControlError):
template_api.upsert(
self.fixture.user2_template, request=mock_request
) | [
"def test_upsert_other_users_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.user2_template, request=mock_request)",
"def test_upsert_own_template_as_user_saves(self):\n mock_request = create_mock_request(user=se... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert global template as user raises access control error | def test_upsert_global_template_as_user_raises_access_control_error(self):
mock_request = create_mock_request(user=self.user1)
with self.assertRaises(AccessControlError):
template_api.upsert(
self.fixture.global_template, request=mock_request
) | [
"def test_upsert_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.global_template, request=mock_request)",
"def test_upsert_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=s... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert own template as staff saves | def test_upsert_own_template_as_staff_saves(self):
mock_request = create_mock_request(user=self.staff_user1)
template_api.upsert(self.fixture.user1_template, request=mock_request) | [
"def test_upsert_global_template_as_staff_saves(self):\n mock_request = create_mock_request(user=self.staff_user1)\n template_api.upsert(self.fixture.global_template, request=mock_request)",
"def test_upsert_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert other users template as staff raises access control error | def test_upsert_other_users_template_as_staff_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.staff_user1)
with self.assertRaises(AccessControlError):
template_api.upsert(
self.fixture.user2_template, request=mock_request
... | [
"def test_upsert_other_users_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.user2_template, request=mock_request)",
"def test_upsert_own_template_as_staff_saves(self):\n mock_request = create_mock_request(user=s... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert global template as staff saves | def test_upsert_global_template_as_staff_saves(self):
mock_request = create_mock_request(user=self.staff_user1)
template_api.upsert(self.fixture.global_template, request=mock_request) | [
"def test_upsert_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.global_template, request=mock_request)",
"def test_upsert_own_template_as_staff_saves(self):\n mock_request = create_mock_request(user=self.... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert own template as superuser saves | def test_upsert_own_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.upsert(self.fixture.user1_template, request=mock_request) | [
"def test_upsert_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.global_template, request=mock_request)",
"def test_upsert_other_users_template_as_superuser_saves(self):\n mock_request = create_mock_reques... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert other users template as superuser saves | def test_upsert_other_users_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.upsert(self.fixture.user2_template, request=mock_request) | [
"def test_upsert_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.user1_template, request=mock_request)",
"def test_upsert_own_template_as_user_saves(self):\n mock_request = create_mock_request(user=self.user1... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test upsert global template as superuser saves | def test_upsert_global_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.upsert(self.fixture.global_template, request=mock_request) | [
"def test_upsert_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.upsert(self.fixture.user1_template, request=mock_request)",
"def test_upsert_other_users_template_as_superuser_saves(self):\n mock_request = create_mock_request(us... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name user template as anonymous raises access control error | def test_set_display_name_user_template_as_anonymous_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.set_display_name(
self.fixture.user1_template, "new_nam... | [
"def test_set_display_name_user_template_as_anonymous_with_access_right_access_raises_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.set_display_name(\n self.fix... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name user template as anonymous with right access raises access control error | def test_set_display_name_user_template_as_anonymous_with_access_right_access_raises_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.set_display_name(
self.fixture.user1_... | [
"def test_set_display_name_global_template_as_user_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n with self.assertRaises(AccessControlError):\n template_api.set_display_name(\n self.fixture.global_template, \"new_na... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name global template as anonymous raises access control error | def test_set_display_name_global_template_as_anonymous_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.set_display_name(
self.fixture.global_template, "new_... | [
"def test_set_display_name_global_template_as_anonymous_with_access_right_access_raises_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.set_display_name(\n self.f... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name global template as anonymous with right access raises access control error | def test_set_display_name_global_template_as_anonymous_with_access_right_access_raises_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.set_display_name(
self.fixture.glob... | [
"def test_set_display_name_global_template_as_user_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n with self.assertRaises(AccessControlError):\n template_api.set_display_name(\n self.fixture.global_template, \"new_na... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name own template as user saves | def test_set_display_name_own_template_as_user_saves(self):
mock_request = create_mock_request(user=self.user1)
template_api.set_display_name(
self.fixture.user1_template, "new_name", request=mock_request
) | [
"def test_set_display_name_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.set_display_name(\n self.fixture.user1_template, \"new_name\", request=mock_request\n )",
"def test_set_display_name_global_template_as_superu... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name other users template as user raises access control error | def test_set_display_name_other_users_template_as_user_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.user1)
with self.assertRaises(AccessControlError):
template_api.set_display_name(
self.fixture.user2_template, "new_name", req... | [
"def test_set_display_name_global_template_as_user_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n with self.assertRaises(AccessControlError):\n template_api.set_display_name(\n self.fixture.global_template, \"new_na... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name global template as user raises access control error | def test_set_display_name_global_template_as_user_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.user1)
with self.assertRaises(AccessControlError):
template_api.set_display_name(
self.fixture.global_template, "new_name", request... | [
"def test_set_display_name_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.set_display_name(\n self.fixture.global_template, \"new_name\", request=mock_request\n )",
"def test_set_display_name_global_template_as_an... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name own template as staff saves | def test_set_display_name_own_template_as_staff_saves(self):
mock_request = create_mock_request(user=self.staff_user1)
template_api.set_display_name(
self.fixture.user1_template, "new_name", request=mock_request
) | [
"def test_set_display_name_global_template_as_staff_saves(self):\n mock_request = create_mock_request(user=self.staff_user1)\n template_api.set_display_name(\n self.fixture.global_template, \"new_name\", request=mock_request\n )",
"def test_set_display_name_own_template_as_superuse... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name other users template as staff raises access control error | def test_set_display_name_other_users_template_as_staff_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.staff_user1)
with self.assertRaises(AccessControlError):
template_api.set_display_name(
self.fixture.user2_template, "new_nam... | [
"def test_set_display_name_global_template_as_user_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n with self.assertRaises(AccessControlError):\n template_api.set_display_name(\n self.fixture.global_template, \"new_na... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name global template as staff saves | def test_set_display_name_global_template_as_staff_saves(self):
mock_request = create_mock_request(user=self.staff_user1)
template_api.set_display_name(
self.fixture.global_template, "new_name", request=mock_request
) | [
"def test_set_display_name_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.set_display_name(\n self.fixture.global_template, \"new_name\", request=mock_request\n )",
"def test_set_display_name_own_template_as_staff... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name own template as superuser saves | def test_set_display_name_own_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.set_display_name(
self.fixture.user1_template, "new_name", request=mock_request
) | [
"def test_set_display_name_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.set_display_name(\n self.fixture.global_template, \"new_name\", request=mock_request\n )",
"def test_set_display_name_other_users_template_... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name other users template as superuser saves | def test_set_display_name_other_users_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.set_display_name(
self.fixture.user2_template, "new_name", request=mock_request
) | [
"def test_set_display_name_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.set_display_name(\n self.fixture.user1_template, \"new_name\", request=mock_request\n )",
"def test_set_display_name_own_template_as_user_save... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test set display name global template as superuser saves | def test_set_display_name_global_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.set_display_name(
self.fixture.global_template, "new_name", request=mock_request
) | [
"def test_set_display_name_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.set_display_name(\n self.fixture.user1_template, \"new_name\", request=mock_request\n )",
"def test_set_display_name_global_template_as_staff_... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get user template as anonymous raises access control error | def test_get_user_template_as_anonymous_raises_access_control_error(self):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.get_by_id(
self.fixture.user1_template.id, request=mock_request
) | [
"def test_get_global_template_as_anonymous_with_access_right_returns_template(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n template = template_api.get_by_id(\n self.fixture.global_template.id, request=mock_request\n )\n self.assertEq... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get user template as anonymous with access right raises access control error | def test_get_user_template_as_anonymous_with_access_right_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.get_by_id(
self.fixture.user1_template.id, request... | [
"def test_get_user_template_as_anonymous_raises_access_control_error(self):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.get_by_id(\n self.fixture.user1_template.id, request=mock_request\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get global template as anonymous with access right returns template | def test_get_global_template_as_anonymous_with_access_right_returns_template(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
template = template_api.get_by_id(
self.fixture.global_template.id, request=mock_request
)
self.assertEqual(template... | [
"def test_get_implant_template(self):\n pass",
"def test_get_implant_template_by_name(self):\n pass",
"def test_template_used(self):\r\n template_name = 'test.jinja'\r\n\r\n def view(request, template_name):\r\n tmpl = Template(\"{{ test }}\")\r\n return HttpRes... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get own template as user returns template | def test_get_own_template_as_user_returns_template(self):
mock_request = create_mock_request(user=self.user1)
template = template_api.get_by_id(
self.fixture.user1_template.id, request=mock_request
)
self.assertEqual(template, self.fixture.user1_template) | [
"def test_get_implant_template(self):\n pass",
"def test_global_template_as_user_returns_template(self):\n mock_request = create_mock_request(user=self.user1)\n template = template_api.get_by_id(\n self.fixture.global_template.id, request=mock_request\n )\n self.asser... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test global template as user returns template | def test_global_template_as_user_returns_template(self):
mock_request = create_mock_request(user=self.user1)
template = template_api.get_by_id(
self.fixture.global_template.id, request=mock_request
)
self.assertEqual(template, self.fixture.global_template) | [
"def test_right_template_is_used(self):\n self.assertTemplateUsed(self.response, self.template)",
"def test_get_implant_template(self):\n pass",
"def test_register_template(self):\n pass",
"def test_correct_template(self):\n self.assertCorrectTemplateUsed('common/home.html')",
"d... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get other users template raises access control error | def test_get_other_users_template_raises_access_control_error(self):
mock_request = create_mock_request(user=self.user1)
with self.assertRaises(AccessControlError):
template_api.get_by_id(
self.fixture.user2_template.id, request=mock_request
) | [
"def test_get_other_users_template_as_staff_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.staff_user1)\n with self.assertRaises(AccessControlError):\n template_api.get_by_id(\n self.fixture.user2_template.id, request=mock_r... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get any template as superuser returns template | def test_get_any_template_as_superuser_returns_template(self):
mock_request = create_mock_request(user=self.superuser1)
template = template_api.get_by_id(
self.fixture.user1_template.id, request=mock_request
)
self.assertEqual(template, self.fixture.user1_template)
te... | [
"def test_get_own_template_as_user_returns_template(self):\n mock_request = create_mock_request(user=self.user1)\n template = template_api.get_by_id(\n self.fixture.user1_template.id, request=mock_request\n )\n self.assertEqual(template, self.fixture.user1_template)",
"def t... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get other users template as staff raises access control error | def test_get_other_users_template_as_staff_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.staff_user1)
with self.assertRaises(AccessControlError):
template_api.get_by_id(
self.fixture.user2_template.id, request=mock_request
... | [
"def test_get_all_as_staff_returns_accessible_templates(self):\n mock_request = create_mock_request(user=self.staff_user)\n templates = template_api.get_all(request=mock_request)\n self.assertEqual(templates.count(), 2)\n self.assertTrue(self.fixture.user2_template in list(templates))\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by id list as user returns accessible templates | def test_get_all_accessible_by_id_list_as_user_returns_accessible_templates(
self,
):
mock_request = create_mock_request(user=self.user1)
templates = template_api.get_all_accessible_by_id_list(
self.template_id_list, request=mock_request
)
self.assertTrue(self.fix... | [
"def test_get_all_accessible_by_id_list_as_superuser_returns_accessible_templates(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_id_list(\n self.template_id_list, request=mock_request\n )\n se... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by id list as staff returns accessible templates | def test_get_all_accessible_by_id_list_as_staff_returns_accessible_templates(
self,
):
mock_request = create_mock_request(user=self.staff_user1)
templates = template_api.get_all_accessible_by_id_list(
self.template_id_list, request=mock_request
)
self.assertTrue(s... | [
"def test_get_all_accessible_by_id_list_as_superuser_returns_accessible_templates(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_id_list(\n self.template_id_list, request=mock_request\n )\n se... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by id list as superuser returns accessible templates | def test_get_all_accessible_by_id_list_as_superuser_returns_accessible_templates(
self,
):
mock_request = create_mock_request(user=self.superuser1)
templates = template_api.get_all_accessible_by_id_list(
self.template_id_list, request=mock_request
)
self.assertTru... | [
"def test_get_all_accessible_by_id_list_as_user_returns_accessible_templates(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n templates = template_api.get_all_accessible_by_id_list(\n self.template_id_list, request=mock_request\n )\n self.assertT... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as anonymous with access right does not return user template | def test_get_all_accessible_by_hash_as_anonymous_with_access_right_does_not_return_user_template(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
templates = template_api.get_all_accessible_by_hash(
self.fixture.user1_template.hash, request=mock_request
... | [
"def test_get_all_accessible_by_hash_as_user_returns_user_template(self):\n mock_request = create_mock_request(user=self.user1)\n templates = template_api.get_all_accessible_by_hash(\n self.fixture.user1_template.hash, request=mock_request\n )\n self.assertTrue(self.fixture.us... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as anonymous with access right returns global | def test_get_all_accessible_by_hash_as_anonymous_with_access_right_returns_global(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
templates = template_api.get_all_accessible_by_hash(
self.fixture.global_template.hash, request=mock_request
)
... | [
"def test_get_all_accessible_by_hash_list_as_anonymous_with_access_right_returns_global(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.global_template.hash], request=mock_requ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as user returns user template | def test_get_all_accessible_by_hash_as_user_returns_user_template(self):
mock_request = create_mock_request(user=self.user1)
templates = template_api.get_all_accessible_by_hash(
self.fixture.user1_template.hash, request=mock_request
)
self.assertTrue(self.fixture.user1_templa... | [
"def test_get_all_accessible_by_hash_list_as_user_returns_user_template(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.user1_template.hash], request=mock_request\n )\n se... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as user returns global template | def test_get_all_accessible_by_hash_as_user_returns_global_template(self):
mock_request = create_mock_request(user=self.user1)
templates = template_api.get_all_accessible_by_hash(
self.fixture.global_template.hash, request=mock_request
)
self.assertTrue(self.fixture.user1_tem... | [
"def test_get_all_accessible_by_hash_as_superuser_returns_global_template(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_hash(\n self.fixture.global_template.hash, request=mock_request\n )\n s... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as staff returns user template | def test_get_all_accessible_by_hash_as_staff_returns_user_template(self):
mock_request = create_mock_request(user=self.staff_user1)
templates = template_api.get_all_accessible_by_hash(
self.fixture.user1_template.hash, request=mock_request
)
self.assertTrue(self.fixture.user1... | [
"def test_get_all_accessible_by_hash_list_as_staff_returns_user_template(\n self,\n ):\n mock_request = create_mock_request(user=self.staff_user1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.user1_template.hash], request=mock_request\n )\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as staff returns global template | def test_get_all_accessible_by_hash_as_staff_returns_global_template(self):
mock_request = create_mock_request(user=self.staff_user1)
templates = template_api.get_all_accessible_by_hash(
self.fixture.global_template.hash, request=mock_request
)
self.assertTrue(self.fixture.us... | [
"def test_get_all_accessible_by_hash_as_superuser_returns_global_template(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_hash(\n self.fixture.global_template.hash, request=mock_request\n )\n s... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as superuser returns user template | def test_get_all_accessible_by_hash_as_superuser_returns_user_template(
self,
):
mock_request = create_mock_request(user=self.superuser1)
templates = template_api.get_all_accessible_by_hash(
self.fixture.user1_template.hash, request=mock_request
)
self.assertTrue(... | [
"def test_get_all_accessible_by_hash_list_as_superuser_returns_user_template(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.user1_template.hash], request=mock_request\n )\n... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash as superuser returns global template | def test_get_all_accessible_by_hash_as_superuser_returns_global_template(
self,
):
mock_request = create_mock_request(user=self.superuser1)
templates = template_api.get_all_accessible_by_hash(
self.fixture.global_template.hash, request=mock_request
)
self.assertTr... | [
"def test_get_all_accessible_by_hash_list_as_superuser_returns_global_template(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.global_template.hash], request=mock_request\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as anonymous with access right does not return user template | def test_get_all_accessible_by_hash_list_as_anonymous_with_access_right_does_not_return_user_template(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.user1_template.hash], request=mock_... | [
"def test_get_all_accessible_by_hash_list_as_user_returns_user_template(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.user1_template.hash], request=mock_request\n )\n se... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as anonymous does not return global | def test_get_all_accessible_by_hash_list_as_anonymous_does_not_return_global(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.global_template.hash], request=mock_request
)
... | [
"def test_get_all_accessible_by_hash_list_as_anonymous_with_access_right_returns_global(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.global_template.hash], request=mock_requ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as anonymous with access right returns global | def test_get_all_accessible_by_hash_list_as_anonymous_with_access_right_returns_global(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.global_template.hash], request=mock_request
... | [
"def test_get_all_accessible_by_hash_as_anonymous_with_access_right_returns_global(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n templates = template_api.get_all_accessible_by_hash(\n self.fixture.global_template.hash, request=mock_request\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as user returns user template | def test_get_all_accessible_by_hash_list_as_user_returns_user_template(
self,
):
mock_request = create_mock_request(user=self.user1)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.user1_template.hash], request=mock_request
)
self.assertTru... | [
"def test_get_all_accessible_by_hash_list_as_superuser_returns_user_template(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.user1_template.hash], request=mock_request\n )\n... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as user returns global template | def test_get_all_accessible_by_hash_list_as_user_returns_global_template(
self,
):
mock_request = create_mock_request(user=self.user1)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.global_template.hash], request=mock_request
)
self.assert... | [
"def test_get_all_accessible_by_hash_list_as_superuser_returns_global_template(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.global_template.hash], request=mock_request\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as staff returns user template | def test_get_all_accessible_by_hash_list_as_staff_returns_user_template(
self,
):
mock_request = create_mock_request(user=self.staff_user1)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.user1_template.hash], request=mock_request
)
self.as... | [
"def test_get_all_accessible_by_hash_list_as_user_returns_user_template(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.user1_template.hash], request=mock_request\n )\n se... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as staff returns global template | def test_get_all_accessible_by_hash_list_as_staff_returns_global_template(
self,
):
mock_request = create_mock_request(user=self.staff_user1)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.global_template.hash], request=mock_request
)
self... | [
"def test_get_all_accessible_by_hash_list_as_superuser_returns_global_template(\n self,\n ):\n mock_request = create_mock_request(user=self.superuser1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.global_template.hash], request=mock_request\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as superuser returns user template | def test_get_all_accessible_by_hash_list_as_superuser_returns_user_template(
self,
):
mock_request = create_mock_request(user=self.superuser1)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.user1_template.hash], request=mock_request
)
self... | [
"def test_get_all_accessible_by_hash_list_as_user_returns_user_template(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.user1_template.hash], request=mock_request\n )\n se... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all accessible by hash list as superuser returns global template | def test_get_all_accessible_by_hash_list_as_superuser_returns_global_template(
self,
):
mock_request = create_mock_request(user=self.superuser1)
templates = template_api.get_all_accessible_by_hash_list(
[self.fixture.global_template.hash], request=mock_request
)
s... | [
"def test_get_all_accessible_by_hash_list_as_user_returns_global_template(\n self,\n ):\n mock_request = create_mock_request(user=self.user1)\n templates = template_api.get_all_accessible_by_hash_list(\n [self.fixture.global_template.hash], request=mock_request\n )\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all as anonymous with access right returns global templates | def test_get_all_as_anonymous_with_access_right_returns_global_templates(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
templates = template_api.get_all(request=mock_request)
self.assertEqual(templates.count(), 1)
self.assertTrue((template.user is None... | [
"def test_get_implant_templates(self):\n pass",
"def test_application_templates_get(self):\n pass",
"def test_get_implant_template(self):\n pass",
"def test_list_template_for_all_namespaces(self):\n pass",
"def test_get_all_as_user_returns_accessible_templates(self):\n moc... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all as user returns accessible templates | def test_get_all_as_user_returns_accessible_templates(self):
mock_request = create_mock_request(user=self.user)
templates = template_api.get_all(request=mock_request)
self.assertEqual(templates.count(), 2)
self.assertTrue(self.fixture.user1_template in list(templates))
self.asser... | [
"def test_get_all_as_superuser_returns_all_templates(self):\n mock_request = create_mock_request(user=self.superuser)\n templates = template_api.get_all(request=mock_request)\n self.assertEqual(templates.count(), 3)\n self.assertTrue(self.fixture.user1_template in list(templates))\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all as staff returns accessible templates | def test_get_all_as_staff_returns_accessible_templates(self):
mock_request = create_mock_request(user=self.staff_user)
templates = template_api.get_all(request=mock_request)
self.assertEqual(templates.count(), 2)
self.assertTrue(self.fixture.user2_template in list(templates))
sel... | [
"def test_get_all_as_user_returns_accessible_templates(self):\n mock_request = create_mock_request(user=self.user)\n templates = template_api.get_all(request=mock_request)\n self.assertEqual(templates.count(), 2)\n self.assertTrue(self.fixture.user1_template in list(templates))\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test get all as superuser returns all templates | def test_get_all_as_superuser_returns_all_templates(self):
mock_request = create_mock_request(user=self.superuser)
templates = template_api.get_all(request=mock_request)
self.assertEqual(templates.count(), 3)
self.assertTrue(self.fixture.user1_template in list(templates))
self.as... | [
"def test_get_all_as_user_returns_accessible_templates(self):\n mock_request = create_mock_request(user=self.user)\n templates = template_api.get_all(request=mock_request)\n self.assertEqual(templates.count(), 2)\n self.assertTrue(self.fixture.user1_template in list(templates))\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete user template as anonymous raises access control error | def test_delete_user_template_as_anonymous_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.delete(
self.fixture.user1_template, request=mock_request
... | [
"def test_delete_user_template_as_anonymous_with_access_right_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.delete(\n self.fixture.user1_template,... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete user template as anonymous with access right raises access control error | def test_delete_user_template_as_anonymous_with_access_right_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.delete(
self.fixture.user1_template, request=mo... | [
"def test_delete_user_template_as_anonymous_raises_access_control_error(\n self,\n ):\n mock_request = create_mock_request(user=self.anonymous_user)\n with self.assertRaises(AccessControlError):\n template_api.delete(\n self.fixture.user1_template, request=mock_requ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete global template as anonymous with access right raises access control error | def test_delete_global_template_as_anonymous_with_access_right_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.anonymous_user)
with self.assertRaises(AccessControlError):
template_api.delete(
self.fixture.global_template, request... | [
"def test_delete_implant_template(self):\n pass",
"def test_delete_namespaced_template(self):\n pass",
"def test_delete_global_template_as_user_raises_access_control_error(self):\n mock_request = create_mock_request(user=self.user1)\n with self.assertRaises(AccessControlError):\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete own template as user saves | def test_delete_own_template_as_user_saves(self):
mock_request = create_mock_request(user=self.user1)
template_api.delete(self.fixture.user1_template, request=mock_request) | [
"def test_delete_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.user1_template, request=mock_request)",
"def test_delete_implant_template(self):\n pass",
"def test_delete_own_template_as_staff_saves(self):... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete other users template as user raises access control error | def test_delete_other_users_template_as_user_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.user1)
with self.assertRaises(AccessControlError):
template_api.delete(
self.fixture.user2_template, request=mock_request
) | [
"def test_delete_other_users_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.user2_template, request=mock_request)",
"def test_delete_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(us... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete global template as user raises access control error | def test_delete_global_template_as_user_raises_access_control_error(self):
mock_request = create_mock_request(user=self.user1)
with self.assertRaises(AccessControlError):
template_api.delete(
self.fixture.global_template, request=mock_request
) | [
"def test_delete_implant_template(self):\n pass",
"def test_delete_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.global_template, request=mock_request)",
"def test_delete_namespaced_template(self):\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete own template as staff saves | def test_delete_own_template_as_staff_saves(self):
mock_request = create_mock_request(user=self.staff_user1)
template_api.delete(self.fixture.user1_template, request=mock_request) | [
"def test_delete_implant_template(self):\n pass",
"def test_delete_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.user1_template, request=mock_request)",
"def test_delete_own_template_as_user_saves(self):\... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete other users template as staff raises access control error | def test_delete_other_users_template_as_staff_raises_access_control_error(
self,
):
mock_request = create_mock_request(user=self.staff_user1)
with self.assertRaises(AccessControlError):
template_api.delete(
self.fixture.user2_template, request=mock_request
... | [
"def test_delete_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.user1_template, request=mock_request)",
"def test_delete_other_users_template_as_superuser_saves(self):\n mock_request = create_mock_request(us... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete global template as staff saves | def test_delete_global_template_as_staff_saves(self):
mock_request = create_mock_request(user=self.staff_user1)
template_api.delete(self.fixture.global_template, request=mock_request) | [
"def test_delete_implant_template(self):\n pass",
"def test_delete_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.global_template, request=mock_request)",
"def test_email_template_delete(self):\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete own template as superuser saves | def test_delete_own_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.delete(self.fixture.user1_template, request=mock_request) | [
"def test_delete_own_template_as_user_saves(self):\n mock_request = create_mock_request(user=self.user1)\n template_api.delete(self.fixture.user1_template, request=mock_request)",
"def test_delete_global_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superus... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete other users template as superuser saves | def test_delete_other_users_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.delete(self.fixture.user2_template, request=mock_request) | [
"def test_delete_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.user1_template, request=mock_request)",
"def test_delete_own_template_as_user_saves(self):\n mock_request = create_mock_request(user=self.user1... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
test delete global template as superuser saves | def test_delete_global_template_as_superuser_saves(self):
mock_request = create_mock_request(user=self.superuser1)
template_api.delete(self.fixture.global_template, request=mock_request) | [
"def test_delete_own_template_as_superuser_saves(self):\n mock_request = create_mock_request(user=self.superuser1)\n template_api.delete(self.fixture.user1_template, request=mock_request)",
"def test_delete_global_template_as_staff_saves(self):\n mock_request = create_mock_request(user=self.s... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Creates a breakpoint, which is a renamed deep copy of the QuantumCircuit, and creates and appends an AssertUniform instruction to its end. If the statistical test passes, the assertion passes; if the test fails, the assertion fails. | def get_breakpoint_uniform(self, qubit, cbit, pcrit=0.05):
clone = self.copy(Asserts._new_breakpoint_name())
assertion = AssertUniform(qubit, cbit, pcrit, False)
clone.append(assertion, [assertion._qubit], [assertion._cbit])
return clone | [
"def get_breakpoint_not_uniform(self, qubit, cbit, pcrit=0.05):\n clone = self.copy(Asserts._new_breakpoint_name())\n assertion = AssertUniform(qubit, cbit, pcrit, True)\n clone.append(assertion, [assertion._qubit], [assertion._cbit])\n return clone",
"def get_breakpoint_product(self, qubit0, cbit0, q... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Creates a breakpoint, which is a renamed deep copy of the QuantumCircuit, and creates and appends an AssertUniform instruction to its end. If the statistical test passes, the assertion fails; if the test fails, the assertion passes. | def get_breakpoint_not_uniform(self, qubit, cbit, pcrit=0.05):
clone = self.copy(Asserts._new_breakpoint_name())
assertion = AssertUniform(qubit, cbit, pcrit, True)
clone.append(assertion, [assertion._qubit], [assertion._cbit])
return clone | [
"def get_breakpoint_uniform(self, qubit, cbit, pcrit=0.05):\n clone = self.copy(Asserts._new_breakpoint_name())\n assertion = AssertUniform(qubit, cbit, pcrit, False)\n clone.append(assertion, [assertion._qubit], [assertion._cbit])\n return clone",
"def get_breakpoint_product(self, qubit0, cbit0, qubi... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Geotransform the original map and create an inverse geotransform for the raster. | def _get_inv_gt(self):
# Geotransform the original map
self.in_gt = self.in_ds.GetGeoTransform()
# Create an inverse geotransform for the raster.
# This converts real-world coordinates to pixel offsets.
self.inv_gt = gdal.InvGeoTransform(self.in_gt)
if gdal.VersionI... | [
"def geo_transform(self):\n pass",
"def makeGeoTransform(self):\n geotransform = (self.xMin, self.xRes, 0.0, self.yMax, 0.0, -self.yRes)\n return geotransform",
"def geotransform(self):\n return self._geotransform",
"def geotransform_to_affine(geot):\n c, a, b, f, d, e = list(ge... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
get clip location in array. | def _get_clip_loc_in_array(self):
# coordinates of upperleft and lowerright points of binding box
box_ulx, box_uly, box_lrx, box_lry = self.clip_box[0][0], self.clip_box[0][1], \
self.clip_box[1][0], self.clip_box[1][1]
# Get the offsets that ... | [
"def clip(self):\r\n\t\treturn self._clip",
"def get_marker_absolute_pos(marker_position, clip):\n marker_x = (marker_position[\"x\"] * clip.w) - marker_image.w / 2\n marker_y = (marker_position[\"y\"] * clip.h) - marker_image.h / 2\n return marker_x, marker_y",
"def location_of(self, index):\n ... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Calcul de la division de deux polynomes A / B Retourne [Q,R] le quotient et le reste de telle façon que A = BQ+R | def polydiv(A,B):
Q = [0] # quotient
R = A # reste
while (polydegre(R) >= polydegre(B)):
#print ("degre R = {}".format(polydegre(R)))
#print ("degre B = {}".format(polydegre(B)))
P = monome(R[polydegre(R)],polydegre(R)-polydegre(B))
#print ("P = {}".format(P))
R = p... | [
"def division(self, first_value, second_value):",
"def exquo(self, a, b):\n return a / b",
"def get_divide_ab(a, b): # IN= 2'int' / OUT= 1'foat'\n return float(a/b)",
"def division(self, a, b):\n if not check_arguments(a, b): # check if arguments are numbers\n self.last_r... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Unique class is stored as self.unique_class. Total number of classes is stored as self.total_classes_number. Total number of each class is stored in self.class_number_dict. Total number of unique words is stored as self.unique_word_number. Total number of a word in a class is stored in self.class_word_number_dict. otal... | def __init__(self):
self.unique_classes = []
self.total_classes_number = 0
self.class_number_dict = {}
self.unique_word_number = 0
self.class_word_number_dict = {}
self.class_total_words_dict = {} | [
"def classInfo(self):\n n = len(self.data.instances)\n sum = 0\n classDic = {}\n className = self.data.className\n # Count the occurances of all class values\n for entry in self.data.instances:\n if entry[className] not in classDic.keys():\n # Clas... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |
Updates a testing scenario. | def put(self, id):
data = request.json
update_scenario(id, data)
return None, 204 | [
"def test_update_scenario(self):\n pass",
"def update_test_case(self, project, test_case):\n location = {\"item\": test_case.get_parent_id(project)}\n fields = self.assemble_add_update_fields(test_case)\n\n # print(\"Current fields: \", json.dumps(self.jama_client.get_abstract_items(\n... | {
"objective": {
"paired": [],
"self": [],
"triplet": [
[
"query",
"document",
"negatives"
]
]
}
} |