input stringlengths 205 73.3k | output stringlengths 64 73.2k | instruction stringclasses 1
value |
|---|---|---|
#vulnerable code
private static List<String> getWorldGuardRegionNames(User user) {
Location location = user.getPlayer().getLocation();
if (location != null) {
List<String> regionNames = WorldGuardHook.getRegionNames(location);
if (regionNames !=... | #fixed code
private static List<String> getWorldGuardRegionNames(User user) {
if (user == null || user.getPlayer() == null) {
return Collections.emptyList();
}
Location location = user.getPlayer().getLocation();
if (location != null) {
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
if (args.length < 1) {
sender.sendMessage(messages.generalNoTagGiven);
return;
} else if (args.len... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
if (args.length < 1) {
sender.sendMessage(messages.generalNoTagGiven);
return;
} else if (args.length < ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void remove(User user) {
this.users.remove(user.getRank());
synchronized (users) {
Collections.sort(this.users);
}
}
#location 2
#vulnerability type THREAD_SAFETY_V... | #fixed code
public void remove(User user) {
this.users.remove(user.getRank());
Collections.sort(this.users);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig m = Messages.getInstance();
Player p = (Player) sender;
User u = User.get(p);
if (!u.hasGuild()) {
p.sendMessage(m.kickHasNotGuild);
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
if (!user.hasGuild()) {
player.sendMessage(me... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig m = Messages.getInstance();
User user = User.get((Player) sender);
if (user.isSpy()) {
user.setSpy(false);
sender.sendMessage(m.admin... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
User user = User.get((Player) sender);
if (user.isSpy()) {
user.setSpy(false);
sender.sendMessage(messag... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static List<String> getRegionNames(Location location) {
if (!isInRegion(location)) {
return null;
}
List<String> regionNames = new ArrayList<>();
getRegionSet(location).getRegions().forEach(r -> regionNames.add... | #fixed code
public static List<String> getRegionNames(Location location) {
ApplicableRegionSet regionSet = getRegionSet(location);
return regionSet != null ? regionSet.getRegions().stream().map(ProtectedRegion::getId)
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void remove(Guild guild) {
this.guilds.remove(guild.getRank());
synchronized (guilds) {
Collections.sort(this.guilds);
}
}
#location 2
#vulnerability type THREAD_S... | #fixed code
public void remove(Guild guild) {
this.guilds.remove(guild.getRank());
Collections.sort(this.guilds);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@EventHandler
public void onDamage(EntityDamageByEntityEvent event) {
Entity entity = event.getEntity();
Entity damager = event.getDamager();
if (! (entity instanceof Player)) {
return;
}
Player attacker = null;
... | #fixed code
@EventHandler
public void onDamage(EntityDamageByEntityEvent event) {
EntityUtils.getAttacker(event.getDamager()).peek(attacker -> {
PluginConfiguration config = FunnyGuilds.getInstance().getPluginConfiguration();
User attackerUser = User.g... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig pc = Settings.getConfig();
MessagesConfig m = Messages.getInstance();
Player p = (Player) sender;
User user = User.get(p);
Guild guild = user.ge... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig config = Settings.getConfig();
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
Guild ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig c = Settings.getConfig();
MessagesConfig m = Messages.getInstance();
Player p = (Player) sender;
User user = User.get(p);
if (!c.baseEnable) {
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig config = Settings.getConfig();
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
if (!... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
if (args.length < 1) {
player.sendMessage(messages.generalNoTagGiven);
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
if (args.length < 1) {
player.sendMessage(messages.generalNoTagGiven);
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void update(Guild guild) {
if (!this.guilds.contains(guild.getRank())) {
this.guilds.add(guild.getRank());
} else {
synchronized (guilds) {
Collections.sort(guilds);
}
for (int i = 0... | #fixed code
public void update(Guild guild) {
if (! this.guilds.contains(guild.getRank())) {
this.guilds.add(guild.getRank());
}
Collections.sort(guilds);
for (int i = 0; i < guilds.size(); i++) {
Rank rank = guilds.get(i);
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
if (args.length < 1) {
player.sendMessage(messages.generalNoTagGiven);
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
PluginConfig config = Settings.getConfig();
Player player = (Player) sender;
if (args.length < 1) {
player.s... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public boolean checkPlayer(Player player, SecurityType type, Object... values) {
if (!Settings.getConfig().regionsEnabled) {
return false;
}
if (isBanned(User.get(player))) {
return true;
}
... | #fixed code
public boolean checkPlayer(Player player, SecurityType type, Object... values) {
if (!Settings.getConfig().regionsEnabled) {
return false;
}
if (isBanned(User.get(player))) {
return true;
}
swit... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void remove(Player player) {
if (has(player)) {
sendPacket(player, bars.get(player).getDestroyPacket());
bars.remove(player);
}
}
#location 3
#vulnerabili... | #fixed code
public static void remove(Player player) {
if (has(player)) {
sendPacket(player, DRAGONBAR_CACHE.get(player).getDestroyPacket());
DRAGONBAR_CACHE.remove(player);
}
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig config = Settings.getConfig();
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig config = Settings.getConfig();
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
if (!... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig m = Messages.getInstance();
Player p = (Player) sender;
User u = User.get(p);
if (!u.hasGuild()) {
p.sendMessage(m.kickHasNotGuild);
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
if (!user.hasGuild()) {
player.sendMessage(me... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig c = Settings.getConfig();
MessagesConfig m = Messages.getInstance();
Player p = (Player) sender;
User user = User.get(p);
if (!c.baseEnable) {
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig config = Settings.getConfig();
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
if (!... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static int getPing(Player player) {
int ping = 0;
if (player == null) {
return ping;
}
try {
Class<?> craftPlayer = Reflections.getCraftBukkitClass("entity.CraftPlayer");
Object cp = craftPlaye... | #fixed code
public static int getPing(Player player) {
int ping = 0;
if (player == null) {
return ping;
}
try {
Object cp = craftPlayerClass.cast(player);
Object handle = getHandleMethod.invoke(cp);
ping = ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public boolean isInNonPointsRegion(Location location) {
if (! isInRegion(location)) {
return false;
}
for (ProtectedRegion region : getRegionSet(location)) {
if (region.getFlag(noPointsFlag) == StateFlag.Sta... | #fixed code
@Override
public boolean isInNonPointsRegion(Location location) {
ApplicableRegionSet regionSet = getRegionSet(location);
if (regionSet == null) {
return false;
}
for (ProtectedRegion region : regionSet) {
if (regi... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public synchronized Scoreboard getScoreboard() {
if (this.scoreboard == null) {
this.scoreboard = Bukkit.getScoreboardManager().getNewScoreboard();
}
return this.scoreboard;
}
#location 3
... | #fixed code
public synchronized Scoreboard getScoreboard() {
return this.scoreboard;
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static String parseRank(User source, String var) {
if (! var.contains("TOP-")) {
return null;
}
int i = getIndex(var);
if (i <= 0) {
FunnyGuilds.getInstance().getPluginLogger().error("Index in TOP- must be... | #fixed code
public static String parseRank(User source, String var) {
if (! var.contains("TOP-")) {
return null;
}
int i = getIndex(var);
if (i <= 0) {
FunnyGuilds.getInstance().getPluginLogger().error("Index in TOP- must be great... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void patch() {
PluginConfiguration config = FunnyGuilds.getInstance().getPluginConfiguration();
for (Player player : this.getServer().getOnlinePlayers()) {
this.getServer().getScheduler().runTask(this, () -> PacketExtension.registerP... | #fixed code
private void patch() {
for (Player player : this.getServer().getOnlinePlayers()) {
this.getServer().getScheduler().runTask(this, () -> PacketExtension.registerPlayer(player));
User user = User.get(player);
if (user.getCache().getSc... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void broadcast(String message) {
for (User user : this.getOnlineMembers()) {
user.getPlayer().sendMessage(message);
}
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
public void broadcast(String message) {
for (User user : this.getOnlineMembers()) {
if (user.getPlayer() == null) {
continue;
}
user.getPlayer().sendMessage(message);
}
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void load() {
Database db = Database.getInstance();
PluginConfig config = Settings.getConfig();
usersTable(db);
regionsTable(db);
guildsTable(db);
Database.getInstance().executeQuery("SELECT * FROM `" + config.mys... | #fixed code
public void load() {
Database db = Database.getInstance();
PluginConfig config = Settings.getConfig();
usersTable(db);
regionsTable(db);
guildsTable(db);
Database.getInstance().executeQuery("SELECT * FROM `" + config.mysql.use... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig config = Settings.getConfig();
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
PluginConfig config = Settings.getConfig();
MessagesConfig messages = Messages.getInstance();
Player player = (Player) sender;
User user = User.get(player);
if (!... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
if (args.length < 1) {
sender.sendMessage(messages.generalNoTagGiven);
return;
}
... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
if (args.length < 1) {
sender.sendMessage(messages.generalNoTagGiven);
return;
}
Guild ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static IndependentThread getInstance() {
if (instance == null) {
new IndependentThread().start();
}
return instance;
}
#location 5
#vulnerability type THREAD_SAFETY_... | #fixed code
public static IndependentThread getInstance() {
if (instance == null) {
new IndependentThread().start();
}
return instance;
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig m = Messages.getInstance();
User user = User.get((Player) sender);
if (user.isSpy()) {
user.setSpy(false);
sender.sendMessage(m.admin... | #fixed code
@Override
public void execute(CommandSender sender, String[] args) {
MessagesConfig messages = Messages.getInstance();
User user = User.get((Player) sender);
if (user.isSpy()) {
user.setSpy(false);
sender.sendMessage(messag... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public boolean checkPlayer(Player player, SecurityType type, Object... values) {
if (!Settings.getConfig().regionsEnabled) {
return false;
}
if (isBanned(User.get(player))) {
return true;
}
... | #fixed code
public boolean checkPlayer(Player player, SecurityType type, Object... values) {
if (!Settings.getConfig().regionsEnabled) {
return false;
}
if (isBanned(User.get(player))) {
return true;
}
swit... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected final boolean sendStopToPostgresqlInstance() {
final boolean result = shutdownPostgres(getConfig());
if (runtimeConfig.getArtifactStore() instanceof PostgresArtifactStore) {
final IDirectory tempDir = ((PostgresArtifactStore) runtim... | #fixed code
protected final boolean sendStopToPostgresqlInstance() {
final boolean result = shutdownPostgres(getConfig());
if (runtimeConfig.getArtifactStore() instanceof PostgresArtifactStore) {
final IDirectory tempDir = ((PostgresArtifactStore) runtimeConfi... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private double testModel() {
try {
double runningLoss = 0;
double runningWeightOfValidationSet = 0;
boolean gotNextCycle = false;
int cycle = 0;
while (dataCycler.hasMore() || gotNextCycle) {
... | #fixed code
private double testModel() {
double runningLoss = 0;
double runningWeightOfValidationSet = 0;
boolean gotNextCycle= false;
while (dataCycler.hasMore() || gotNextCycle){
List<T> validationSet = dataCycler.getValidationSet();
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void simpleBmiTestSplit() throws Exception {
final List<Instance> instances = TreeBuilderTestUtils.getIntegerInstances(1000);
final TreeBuilder tb = new TreeBuilder(new SplitDiffScorer());
final RandomForestBuilder rfb = new Rand... | #fixed code
@Test
public void simpleBmiTestSplit() throws Exception {
final List<Instance> instances = TreeBuilderTestUtils.getIntegerInstances(1000);
final TreeBuilder tb = new TreeBuilder(new SplitDiffScorer());
final RandomForestBuilder rfb = new RandomFore... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private double testModel() {
try {
double runningLoss = 0;
double runningWeightOfValidationSet = 0;
boolean gotNextCycle = false;
int cycle = 0;
while (dataCycler.hasMore() || gotNextCycle) {
... | #fixed code
private double testModel() {
double runningLoss = 0;
double runningWeightOfValidationSet = 0;
boolean gotNextCycle= false;
while (dataCycler.hasMore() || gotNextCycle){
List<T> validationSet = dataCycler.getValidationSet();
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static String exportToHtml(Option option, String folderPath, String fileName) {
if (fileName == null || fileName.length() == 0) {
return exportToHtml(option, folderPath);
}
String optionStr = GsonUtil.format(option);
F... | #fixed code
public static String exportToHtml(Option option, String folderPath, String fileName) {
if (fileName == null || fileName.length() == 0) {
return exportToHtml(option, folderPath);
}
FileWriter writer = null;
List<String> lines = readL... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private static List<String> readLines(Option option) {
String optionStr = GsonUtil.format(option);
InputStream is = null;
InputStreamReader iReader = null;
BufferedReader bufferedReader = null;
List<String> lines = new ArrayList<S... | #fixed code
private static List<String> readLines(Option option) {
String optionStr = GsonUtil.format(option);
InputStream is = null;
InputStreamReader iReader = null;
BufferedReader bufferedReader = null;
List<String> lines = new ArrayList<String>... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static Geometry loadGeometryFromWKTFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String s = null;
try {
FileInputStream stream = new FileInputStream(file_name);
Reader reader = new BufferedReader(new I... | #fixed code
public static Geometry loadGeometryFromWKTFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String s = null;
Reader reader = null;
try {
FileInputStream stream = new FileInputStream(file_name);
reader = new BufferedR... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static MapGeometry loadGeometryFromJSONFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String jsonString = null;
try {
FileInputStream stream = new FileInputStream(file_name);
Reader reader = new Buffere... | #fixed code
public static MapGeometry loadGeometryFromJSONFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String jsonString = null;
Reader reader = null;
try {
FileInputStream stream = new FileInputStream(file_name);
reader = ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static Geometry loadGeometryFromWKTFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String s = null;
try {
FileInputStream stream = new FileInputStream(file_name);
Reader reader = new BufferedReader(new I... | #fixed code
public static Geometry loadGeometryFromWKTFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String s = null;
Reader reader = null;
try {
FileInputStream stream = new FileInputStream(file_name);
reader = new BufferedR... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static MapGeometry loadGeometryFromJSONFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String jsonString = null;
try {
FileInputStream stream = new FileInputStream(file_name);
Reader reader = new Buffere... | #fixed code
public static MapGeometry loadGeometryFromJSONFileDbg(String file_name) {
if (file_name == null) {
throw new IllegalArgumentException();
}
String jsonString = null;
Reader reader = null;
try {
FileInputStream stream = new FileInputStream(file_name);
reader = ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testGetSingleFileGzip() throws Exception
{
final DefaultHttpClient client = new DefaultHttpClient();
client.addResponseInterceptor(new HttpResponseInterceptor()
{
public void process(final HttpResponse r, final HttpContext context) throws HttpE... | #fixed code
@Test
public void testGetSingleFileGzip() throws Exception
{
final HttpClientBuilder client = HttpClientBuilder.create();
client.addInterceptorFirst(new HttpResponseInterceptor()
{
public void process(final HttpResponse r, final HttpContext context) throws HttpExcepti... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testGetRange() throws Exception
{
final DefaultHttpClient client = new DefaultHttpClient();
client.addResponseInterceptor(new HttpResponseInterceptor()
{
public void process(final HttpResponse r, final HttpContext context) throws HttpException,... | #fixed code
@Test
public void testGetRange() throws Exception
{
final HttpClientBuilder client = HttpClientBuilder.create();
client.addInterceptorFirst(new HttpResponseInterceptor()
{
public void process(final HttpResponse r, final HttpContext context) throws HttpException, IOExc... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testBasicPreemptiveAuth() throws Exception
{
final DefaultHttpClient client = new DefaultHttpClient();
final CountDownLatch count = new CountDownLatch(1);
client.setCredentialsProvider(new BasicCredentialsProvider()
{
@Override
public Cred... | #fixed code
@Test
public void testBasicPreemptiveAuth() throws Exception
{
final HttpClientBuilder client = HttpClientBuilder.create();
final CountDownLatch count = new CountDownLatch(1);
client.setDefaultCredentialsProvider(new BasicCredentialsProvider()
{
@Override
public ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testPutRange() throws Exception
{
final DefaultHttpClient client = new DefaultHttpClient();
Sardine sardine = new SardineImpl(client);
// mod_dav supports Range headers for PUT
final String url = "http://sudo.ch/dav/anon/sardine/" + UUID.randomU... | #fixed code
@Test
public void testPutRange() throws Exception
{
final HttpClientBuilder client = HttpClientBuilder.create();
client.addInterceptorFirst(new HttpResponseInterceptor()
{
public void process(final HttpResponse r, final HttpContext context) throws HttpException, IOExc... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testBasicPreemptiveAuthHeader() throws Exception
{
final DefaultHttpClient client = new DefaultHttpClient();
client.addRequestInterceptor(new HttpRequestInterceptor()
{
public void process(final HttpRequest r, final HttpContext context) throws ... | #fixed code
@Test
public void testBasicPreemptiveAuthHeader() throws Exception
{
final HttpClientBuilder client = HttpClientBuilder.create();
client.addInterceptorFirst(new HttpRequestInterceptor()
{
public void process(final HttpRequest r, final HttpContext context) throws HttpE... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void TestEmptyDefaultsConfig(){
String expectedConfigDirectory = ".";
ServerPaths serverPaths = mock(ServerPaths.class);
when(serverPaths.getConfigDir()).thenReturn(expectedConfigDirectory);
SlackNotificationMainSettings... | #fixed code
@Test
public void TestEmptyDefaultsConfig(){
String expectedConfigDirectory = ".";
ServerPaths serverPaths = mock(ServerPaths.class);
when(serverPaths.getConfigDir()).thenReturn(expectedConfigDirectory);
SlackNotificationMainSettings whms ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public SlackNotification createMockNotification(String teamName, String defaultChannel, String botName,
String token, String iconUrl, Integer maxCommitsToDisplay,
Boo... | #fixed code
public SlackNotification createMockNotification(String teamName, String defaultChannel, String botName,
String token, String iconUrl, Integer maxCommitsToDisplay,
Boolean s... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void doPost(SlackNotification notification){
try {
if (notification.isEnabled()){
notification.post();
if (notification.getResponse() != null && !notification.getResponse().getOk()) {
Loggers... | #fixed code
public void doPost(SlackNotification notification){
try {
if (notification.isEnabled() && (
notification.getFilterBranchName().equalsIgnoreCase(notification.getBranchDisplayName()) ||
notification.getFilterBranchName... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void TestFullConfig(){
String expectedConfigDirectory = ".";
ServerPaths serverPaths = mock(ServerPaths.class);
when(serverPaths.getConfigDir()).thenReturn(expectedConfigDirectory);
SlackNotificationMainSettings whms = new SlackN... | #fixed code
@Test
public void TestFullConfig(){
String expectedConfigDirectory = ".";
ServerPaths serverPaths = mock(ServerPaths.class);
when(serverPaths.getConfigDir()).thenReturn(expectedConfigDirectory);
SlackNotificationMainSettings whms = new SlackNotific... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
RleWeightedInput[] prepareRleWeights(List<Map<String, Object>> data, long degreeCutoff, Double skipValue) {
RleWeightedInput[] inputs = new RleWeightedInput[data.size()];
int idx = 0;
for (Map<String, Object> row : data) {
List<Numbe... | #fixed code
Long getDegreeCutoff(ProcedureConfiguration configuration) {
return configuration.get("degreeCutoff", 0L);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void onRunEnd() {
try {
final long duration = (System.currentTimeMillis() - this.startTime) / 1000;
final StringTemplateGroup group = new StringTemplateGroup("mutation_test");
final StringTemplate st = group
.getInstanceOf("templates/mu... | #fixed code
public void onRunEnd() {
try {
final long duration = (System.currentTimeMillis() - this.startTime) / 1000;
final StringTemplateGroup group = new StringTemplateGroup("mutation_test");
final StringTemplate st = group
.getInstanceOf("templates/muta... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void run() {
ServerSocket socket = null;
try {
socket = new ServerSocket(this.port);
final Socket clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.getInputStream()... | #fixed code
@Override
public void run() {
ServerSocket socket = null;
Socket clientSocket = null;
try {
socket = new ServerSocket(this.port);
clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.get... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void run() {
ServerSocket socket = null;
try {
socket = new ServerSocket(this.port);
final Socket clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.getInputStream()... | #fixed code
@Override
public void run() {
ServerSocket socket = null;
Socket clientSocket = null;
try {
socket = new ServerSocket(this.port);
clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.get... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private String findPathToJarFileFromClasspath() {
final String[] classPath = System.getProperty("java.class.path").split(
File.pathSeparator);
for (final String root : classPath) {
if (JAR_REGEX.matcher(root).matches()) {
return root;
... | #fixed code
private String findPathToJarFileFromClasspath() {
final String[] classPath = getClassPath().split(File.pathSeparator);
for (final String root : classPath) {
if (JAR_REGEX.matcher(root).matches()) {
return root;
}
}
return null;
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void processMetaData(final MutationMetaData value) {
try {
this.mutatorScores.registerResults(value.getMutations());
final String css = FileUtil.readToString(IsolationUtils
.getContextClassLoader().getResourceAsStream(
"te... | #fixed code
private void processMetaData(final MutationMetaData value) {
try {
this.mutatorScores.registerResults(value.getMutations());
final String css = FileUtil.readToString(IsolationUtils
.getContextClassLoader().getResourceAsStream(
"template... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void run() {
ServerSocket socket = null;
try {
socket = new ServerSocket(this.port);
final Socket clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.getInputStream()... | #fixed code
@Override
public void run() {
ServerSocket socket = null;
Socket clientSocket = null;
try {
socket = new ServerSocket(this.port);
clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.get... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void run(final Class<?> clazz, final Class<?> test,
final MethodMutatorFactory... mutators) {
final ReportOptions data = new ReportOptions();
final Set<Predicate<String>> tests = Collections.singleton(Prelude
.isEqualTo(test.getName()));
... | #fixed code
private void run(final Class<?> clazz, final Class<?> test,
final MethodMutatorFactory... mutators) {
final ReportOptions data = new ReportOptions();
final Set<Predicate<String>> tests = Collections.singleton(Prelude
.isEqualTo(test.getName()));
data... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void runTestInSeperateProcessForMutationRange(
final MutationStatusMap mutations, final Collection<ClassName> tests)
throws IOException {
Collection<MutationDetails> remainingMutations = mutations
.getUnrunMutations();
final MutationTe... | #fixed code
private void runTestInSeperateProcessForMutationRange(
final MutationStatusMap mutations, final Collection<ClassName> tests)
throws IOException, InterruptedException {
Collection<MutationDetails> remainingMutations = mutations
.getUnrunMutations();
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void main(final String[] args) {
ExitCode exitCode = ExitCode.OK;
Socket s = null;
CoveragePipe invokeQueue = null;
try {
final int port = Integer.valueOf(args[0]);
s = new Socket("localhost", port);
final SafeDataInputSt... | #fixed code
public static void main(final String[] args) {
ExitCode exitCode = ExitCode.OK;
Socket s = null;
CoveragePipe invokeQueue = null;
try {
final int port = Integer.valueOf(args[0]);
s = new Socket("localhost", port);
final SafeDataInputStream d... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void testDetectsMixOfKilledSurvivingAndUncoveredMutants()
throws Exception {
executeTarget("mutationCoverage");
FileInputStream fis = new FileInputStream(findOutput());
String actual = FileUtil.readToString(fis);
assertXpathExists("//mutation[... | #fixed code
public void testDetectsMixOfKilledSurvivingAndUncoveredMutants()
throws Exception {
// executeTarget("mutationCoverage");
// FileInputStream fis = new FileInputStream(findOutput());
// String actual = FileUtil.readToString(fis);
// assertXpathExists("//mutatio... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void main(final String[] args) {
ExitCode exitCode = ExitCode.OK;
Socket s = null;
try {
final File input = new File(args[0]);
LOG.fine("Input file is " + input);
final BufferedReader br = new BufferedReader(new InputStreamRe... | #fixed code
public static void main(final String[] args) {
ExitCode exitCode = ExitCode.OK;
Socket s = null;
try {
final int port = Integer.valueOf(args[0]);
s = new Socket("localhost", port);
final SafeDataInputStream dis = new SafeDataInputStream(
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void main(final String[] args) {
ExitCode exitCode = ExitCode.OK;
Socket s = null;
CoveragePipe invokeQueue = null;
try {
final int port = Integer.valueOf(args[0]);
s = new Socket("localhost", port);
final SafeDataInputSt... | #fixed code
public static void main(final String[] args) {
ExitCode exitCode = ExitCode.OK;
Socket s = null;
CoveragePipe invokeQueue = null;
try {
final int port = Integer.valueOf(args[0]);
s = new Socket("localhost", port);
final SafeDataInputStream d... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void runTestInSeperateProcessForMutationRange(
final MutationStatusMap mutations, final Collection<ClassName> tests)
throws IOException {
Collection<MutationDetails> remainingMutations = mutations
.getUnrunMutations();
final MutationTe... | #fixed code
private void runTestInSeperateProcessForMutationRange(
final MutationStatusMap mutations, final Collection<ClassName> tests)
throws IOException, InterruptedException {
Collection<MutationDetails> remainingMutations = mutations
.getUnrunMutations();
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static byte[] classAsBytes(final String className)
throws ClassNotFoundException {
try {
final URL resource = ClassUtils.class.getClassLoader().getResource(
convertClassNameToFileName(className));
final BufferedInputStream stream = n... | #fixed code
public static byte[] classAsBytes(final String className)
throws ClassNotFoundException {
try {
final URL resource = ClassUtils.class.getClassLoader().getResource(
convertClassNameToFileName(className));
final BufferedInputStream stream = new Buf... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void run() {
ServerSocket socket = null;
try {
socket = new ServerSocket(this.port);
final Socket clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.getInputStream()... | #fixed code
@Override
public void run() {
ServerSocket socket = null;
Socket clientSocket = null;
try {
socket = new ServerSocket(this.port);
clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.get... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private String getGeneratedManifestAttribute(final String key)
throws IOException, FileNotFoundException {
final Option<String> actual = this.testee.getJarLocation();
final File f = new File(actual.value());
final JarInputStream jis = new JarInputStream(... | #fixed code
private String getGeneratedManifestAttribute(final String key)
throws IOException, FileNotFoundException {
final Option<String> actual = this.testee.getJarLocation();
final File f = new File(actual.value());
final JarInputStream jis = new JarInputStream(new Fi... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void shouldPrintScoresFourToALine() {
final ByteArrayOutputStream s = new ByteArrayOutputStream();
final PrintStream out = new PrintStream(s);
this.testee.report(out);
final String actual = new String(s.toByteArray());
final String[] ss ... | #fixed code
@Test
public void shouldPrintScoresFourToALine() {
final String[] ss = generateReportLines();
assertEquals("> KILLED 0 SURVIVED 0 TIMED_OUT 0 NON_VIABLE 0 ", ss[2]);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void main(final String[] args) {
addMemoryWatchDog();
Writer w = null;
try {
final File input = new File(args[0]);
LOG.fine("Input file is " + input);
final BufferedReader br = new BufferedReader(new InputStreamReader(
... | #fixed code
public static void main(final String[] args) {
addMemoryWatchDog();
Writer w = null;
Socket s = null;
try {
final int port = Integer.valueOf(args[0]);
s = new Socket("localhost", port);
final SafeDataInputStream dis = new SafeDataInputStream... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void main(final String[] args) {
enablePowerMockSupport();
Socket s = null;
Reporter r = null;
try {
final int port = Integer.valueOf(args[0]);
s = new Socket("localhost", port);
final SafeDataInputStream dis = new SafeD... | #fixed code
public static void main(final String[] args) {
enablePowerMockSupport();
final int port = Integer.valueOf(args[0]);
Socket s = null;
try {
s = new Socket("localhost", port);
final SafeDataInputStream dis = new SafeDataInputStream(
s.getI... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void run() {
ServerSocket socket = null;
try {
socket = new ServerSocket(this.port);
final Socket clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.getInputStream()... | #fixed code
@Override
public void run() {
ServerSocket socket = null;
Socket clientSocket = null;
try {
socket = new ServerSocket(this.port);
clientSocket = socket.accept();
final BufferedInputStream bif = new BufferedInputStream(
clientSocket.get... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void capitalizeTest()
{
assertEquals(capitalize("hola mundo abc"), "Hola mundo abc");
assertEquals(capitalize("HOLA mundO AbC"), "Hola mundo abc");
assertEquals(capitalize("Hola Mundo abC"), "Hola mundo abc");
assert... | #fixed code
@Test
public void capitalizeTest()
{
assertEquals(capitalize("hola mundo abc"), "Hola mundo abc");
assertEquals(capitalize("HOLA mundO AbC"), "Hola mundo abc");
assertEquals(capitalize("Hola Mundo abC"), "Hola mundo abc");
assertEquals... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void addProductImage(ProductImage productImage, ImageContentFile contentImage)
throws ServiceException {
try {
/** copy to input stream **/
ByteArrayOutputStream baos = new ByteArrayOutputStream();
// Fake code simulating the copy
... | #fixed code
public void addProductImage(ProductImage productImage, ImageContentFile contentImage)
throws ServiceException {
try {
/** copy to input stream **/
ByteArrayOutputStream baos = new ByteArrayOutputStream();
// Fake code simulating the copy
// ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public ReadableProduct populate(Product source,
ReadableProduct target, MerchantStore store, Language language)
throws ConversionException {
Validate.notNull(pricingService, "Requires to set PricingService");
Validate.notNull(imageUtils, "Requires to s... | #fixed code
@Override
public ReadableProduct populate(Product source,
ReadableProduct target, MerchantStore store, Language language)
throws ConversionException {
Validate.notNull(pricingService, "Requires to set PricingService");
Validate.notNull(imageUtils, "Requires to set ima... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public JSONObject actionReadFile(HttpServletRequest request, HttpServletResponse response) throws Exception {
String path = getPath(request, "path");
File file = new File(docRoot.getPath() + path);
if (!file.exists()) {
return getE... | #fixed code
public JSONObject actionReadFile(HttpServletRequest request, HttpServletResponse response) throws Exception {
String path = getPath(request, "path");
File file = new File(docRoot.getPath() + path);
if (!file.exists()) {
return getErrorRe... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private Customer convertPersistableCustomerToCustomer(PersistableCustomer customer, MerchantStore store) {
Customer cust = new Customer();
CustomerPopulator populator = new CustomerPopulator();
populator.setCountryService(countryService);
populator.setCu... | #fixed code
private Customer convertPersistableCustomerToCustomer(PersistableCustomer customer, MerchantStore store) {
Customer cust = new Customer();
CustomerPopulator populator = new CustomerPopulator();
populator.setCountryService(countryService);
populator.setCustomer... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@SuppressWarnings({"rawtypes", "unchecked"})
@Override
public GenericEntityList listByCriteria(MerchantStoreCriteria criteria) throws ServiceException {
try {
StringBuilder req = new StringBuilder();
req.append(
"select distinct m from Mercha... | #fixed code
@SuppressWarnings({"rawtypes", "unchecked"})
@Override
public GenericEntityList listByCriteria(MerchantStoreCriteria criteria) throws ServiceException {
try {
StringBuilder req = new StringBuilder();
req.append(
"select distinct m from MerchantStor... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public ReadableContentPage getContentPage(String code, MerchantStore store, Language language) {
Validate.notNull(code, "Content code cannot be null");
Validate.notNull(store, "MerchantStore cannot be null");
try {
Content content = null;
if(la... | #fixed code
@Override
public ReadableContentPage getContentPage(String code, MerchantStore store, Language language) {
Validate.notNull(code, "Content code cannot be null");
Validate.notNull(store, "MerchantStore cannot be null");
try {
Content content = null;
if(language... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void prePostProcessShippingQuotes(
ShippingQuote quote,
List<PackageDetails> packages,
BigDecimal orderTotal,
Delivery delivery,
ShippingOrigin origin,
MerchantStore store,
IntegrationConfiguration globalShippingConfiguration,
I... | #fixed code
@Override
public void prePostProcessShippingQuotes(
ShippingQuote quote,
List<PackageDetails> packages,
BigDecimal orderTotal,
Delivery delivery,
ShippingOrigin origin,
MerchantStore store,
IntegrationConfiguration globalShippingConfiguration,
Integra... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@SuppressWarnings("unchecked")
public JSONObject actionSaveFile(HttpServletRequest request) throws Exception {
String path = getPath(request, "path");
String content = request.getParameter("content");
File file = getFile(path);
if (!fil... | #fixed code
@SuppressWarnings("unchecked")
public JSONObject actionSaveFile(HttpServletRequest request) throws Exception {
String path = getPath(request, "path");
String content = request.getParameter("content");
File file = getFile(path);
if (!file.exis... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public Response index(LindenIndexRequest request) throws IOException {
if (request.getType().equals(IndexRequestType.SWAP_INDEX)) {
Response response;
try {
response = swapIndex(request.getIndexName());
} catch (Exception e) {
... | #fixed code
@Override
public Response index(LindenIndexRequest request) throws IOException {
if (request.getType().equals(IndexRequestType.SWAP_INDEX)) {
Response response;
try {
response = swapIndex(request.getIndexName());
} catch (Exception e) {
L... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void standard_syntax() throws Exception {
IfStatementTree tree = parse("if ($a) {} else {}", PHPLexicalGrammar.IF_STATEMENT);
assertThat(tree.is(Kind.IF_STATEMENT)).isTrue();
assertThat(tree.ifToken().text()).isEqualTo("if");
assertThat(tre... | #fixed code
@Test
public void standard_syntax() throws Exception {
IfStatementTree tree = parse("if ($a) {}", PHPLexicalGrammar.IF_STATEMENT);
assertThat(tree.ifToken().text()).isEqualTo("if");
assertThat(expressionToString(tree.condition())).isEqualTo("($a)");
assertTha... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void test_global_scope(Scope scope) {
assertThat(globalSymbolA.usages()).hasSize(4);
assertThat(globalSymbolB.usages()).hasSize(1);
Symbol arraySymbol = scope.getSymbol("$array");
assertThat(arraySymbol.usages()).hasSize(1);
assertThat(scope.... | #fixed code
private void test_global_scope(Scope scope) {
assertThat(globalSymbolA.usages()).hasSize(4);
assertThat(globalSymbolB.usages()).hasSize(1);
Symbol arraySymbol = scope.getSymbol("$array");
assertThat(arraySymbol.usages()).hasSize(1);
assertThat(scope.getSym... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void execute() {
try {
// Gets the tool command line
List<String> commandLine = getCommandLine();
ProcessBuilder builder = new ProcessBuilder(commandLine);
LOG.info("Executing " + getExecutedTool() + " with command '{}'", prettyPrint(com... | #fixed code
public void execute() {
List<String> commandLine = getCommandLine();
LOG.info("Executing " + getExecutedTool() + " with command '{}'", prettyPrint(commandLine));
Iterator<String> commandLineIterator = commandLine.iterator();
Command command = Command.create(com... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private static boolean isArgumentOfSafeFunctionCall(Tree tree) {
Tree parent = tree.getParent();
if (parent.is(Tree.Kind.FUNCTION_CALL)) {
FunctionCallTree functionCall = (FunctionCallTree) parent;
ExpressionTree callee = functionCall.callee();
i... | #fixed code
private static boolean isArgumentOfSafeFunctionCall(Tree tree) {
if (!tree.getParent().is(Tree.Kind.CALL_ARGUMENT) || !tree.getParent().getParent().is(Tree.Kind.FUNCTION_CALL)) {
return false;
}
FunctionCallTree functionCall = (FunctionCallTree) tree.getParen... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void visitClassDeclaration(ClassDeclarationTree tree) {
stringLiterals.clear();
super.visitClassDeclaration(tree);
if (tree.is(Tree.Kind.CLASS_DECLARATION)) {
Scope classScope = context().symbolTable().getScopeFor(tree);
for (Sy... | #fixed code
@Override
public void visitClassDeclaration(ClassDeclarationTree tree) {
stringLiterals.clear();
super.visitClassDeclaration(tree);
if (tree.is(Tree.Kind.CLASS_DECLARATION)) {
checkClass(tree);
}
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static Map<ClassSymbolData, ClassSymbol> createSymbols(Set<ClassSymbolData> fileDeclarations, ProjectSymbolData projectSymbolData) {
Map<ClassSymbolData, ClassSymbolImpl> symbolsByData = new HashMap<>();
Map<ClassSymbolData, ClassSymbol> result = new HashMa... | #fixed code
public static Map<ClassSymbolData, ClassSymbol> createSymbols(Set<ClassSymbolData> fileDeclarations, ProjectSymbolData projectSymbolData) {
Map<ClassSymbolData, ClassSymbolImpl> symbolsByData = new HashMap<>();
Map<ClassSymbolData, ClassSymbol> result = new HashMap<>();... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void checkCfg(ControlFlowGraph cfg) {
for (CfgBlock cfgBlock : cfg.blocks()) {
if (cfgBlock.successors().size() == 1 && cfgBlock.successors().contains(cfgBlock.syntacticSuccessor())) {
Tree lastElement = cfgBlock.elements().get(cfgBlock.elements(... | #fixed code
private void checkCfg(ControlFlowGraph cfg) {
for (CfgBlock cfgBlock : cfg.blocks()) {
if (cfgBlock.successors().size() == 1 && cfgBlock.successors().contains(cfgBlock.syntacticSuccessor())) {
Tree lastElement = Iterables.getLast(cfgBlock.elements());
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void test() throws Exception {
IssueLocation issueLocation = new IssueLocation(TOKEN1, "Test message");
assertThat(issueLocation.message()).isEqualTo("Test message");
assertThat(issueLocation.startLine()).isEqualTo(5);
assertThat(issueLocat... | #fixed code
@Test
public void test() throws Exception {
IssueLocation issueLocation = new IssueLocation(TOKEN1, "Test message");
assertThat(issueLocation.message()).isEqualTo("Test message");
assertThat(issueLocation.startLine()).isEqualTo(5);
assertThat(issueLocation.st... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void visitAssignmentExpression(AssignmentExpressionTree assignment) {
SyntaxToken lastToken = ((PHPTree) assignment.variable()).getLastToken();
String variableName = lastToken.text();
checkVariable(lastToken, variableName, assignment.value()... | #fixed code
@Override
public void visitAssignmentExpression(AssignmentExpressionTree assignment) {
checkVariable(((PHPTree) assignment.variable()).getLastToken(), assignment.value());
super.visitAssignmentExpression(assignment);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static Map<ClassSymbolData, ClassSymbol> createSymbols(Set<ClassSymbolData> fileDeclarations, ProjectSymbolData projectSymbolData) {
Map<ClassSymbolData, ClassSymbolImpl> symbolsByData = new HashMap<>();
Map<ClassSymbolData, ClassSymbol> result = new HashMa... | #fixed code
public static Map<ClassSymbolData, ClassSymbol> createSymbols(Set<ClassSymbolData> fileDeclarations, ProjectSymbolData projectSymbolData) {
Map<ClassSymbolData, ClassSymbolImpl> symbolsByData = new HashMap<>();
Map<ClassSymbolData, ClassSymbol> result = new HashMap<>();... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void execute() {
try {
// Gets the tool command line
List<String> commandLine = getCommandLine();
ProcessBuilder builder = new ProcessBuilder(commandLine);
LOG.info("Executing " + getExecutedTool() + " with command '{}'", prettyPrint(com... | #fixed code
public void execute() {
List<String> commandLine = getCommandLine();
LOG.info("Executing " + getExecutedTool() + " with command '{}'", prettyPrint(commandLine));
Iterator<String> commandLineIterator = commandLine.iterator();
Command command = Command.create(com... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void createTemplateParameters(File outputDir, Template template, File templatesDir) throws MojoExecutionException {
JsonNodeFactory nodeFactory = JsonNodeFactory.instance;
ObjectNode values = nodeFactory.objectNode();
List<io.fabric8.open... | #fixed code
private void createTemplateParameters(File outputDir, Template template, File templatesDir) throws MojoExecutionException {
JsonNodeFactory nodeFactory = JsonNodeFactory.instance;
ObjectNode values = nodeFactory.objectNode();
List<io.fabric8.openshift.... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private KubernetesList convertToOpenShiftResources(KubernetesList resources) throws MojoExecutionException {
KubernetesListBuilder builder = new KubernetesListBuilder();
builder.withMetadata(resources.getMetadata());
List<HasMetadata> items = res... | #fixed code
private KubernetesList convertToOpenShiftResources(KubernetesList resources) throws MojoExecutionException {
KubernetesListBuilder builder = new KubernetesListBuilder();
builder.withMetadata(resources.getMetadata());
List<HasMetadata> items = resources... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void addProfiledResourcesFromSubirectories(KubernetesListBuilder builder, File resourceDir, EnricherManager enricherManager) throws IOException, MojoExecutionException {
File[] profileDirs = resourceDir.listFiles(new FileFilter() {
@Override
... | #fixed code
private void addProfiledResourcesFromSubirectories(KubernetesListBuilder builder, File resourceDir, EnricherManager enricherManager) throws IOException, MojoExecutionException {
File[] profileDirs = resourceDir.listFiles(new FileFilter() {
@Override
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void portForward(Controller controller, String podName) throws MojoExecutionException {
File file = getKubeCtlExecutable(controller);
String command = file.getName();
log.info("Port forwarding to port " + remoteDebugPort + " on pod " + po... | #fixed code
private void portForward(Controller controller, String podName) throws MojoExecutionException {
File command = getKubeCtlExecutable(controller);
log.info("Port forwarding to port " + remoteDebugPort + " on pod " + podName + " using command " + command);
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void execute() throws MojoExecutionException, MojoFailureException {
File manifest = kubernetesManifest;
if (!Files.isFile(manifest)) {
if (failOnNoKubernetesJson) {
throw new MojoFailureException("No such... | #fixed code
@Override
public void execute() throws MojoExecutionException, MojoFailureException {
KubernetesClient kubernetes = createKubernetesClient();
File manifest;
String clusterKind = "Kubernetes";
if (KubernetesHelper.isOpenShift(kubernetes)) {
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private KubernetesList convertToOpenShiftResources(KubernetesList resources) throws MojoExecutionException {
KubernetesListBuilder builder = new KubernetesListBuilder();
builder.withMetadata(resources.getMetadata());
List<HasMetadata> items = res... | #fixed code
private KubernetesList convertToOpenShiftResources(KubernetesList resources) throws MojoExecutionException {
KubernetesListBuilder builder = new KubernetesListBuilder();
builder.withMetadata(resources.getMetadata());
List<HasMetadata> items = resources... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected void downloadGoFabric8(File destFile) throws MojoExecutionException {
File file = null;
try {
file = File.createTempFile("fabric8", ".bin");
} catch (IOException e) {
throw new MojoExecutionException("Failed to c... | #fixed code
protected void downloadGoFabric8(File destFile) throws MojoExecutionException {
// Download to a temporary file
File tempFile = downloadToTempFile();
// Move into it's destination place in ~/.fabric8/bin
moveGofabric8InPlace(tempFile, destFil... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public Probe getProbe(ProbeConfig probeConfig) {
if (probeConfig == null) {
return null;
}
Probe probe = new Probe();
Integer initialDelaySeconds = probeConfig.getInitialDelaySeconds();
if (initialDelaySeconds != nul... | #fixed code
public Probe getProbe(ProbeConfig probeConfig) {
if (probeConfig == null) {
return null;
}
Probe probe = new Probe();
Integer initialDelaySeconds = probeConfig.getInitialDelaySeconds();
if (initialDelaySeconds != null) {
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void portForward(Controller controller, String podName) throws MojoExecutionException {
try {
getFabric8ServiceHub().getPortForwardService()
.forwardPort(controller, createExternalProcessLogger("[[B]]port-forward[[B]] "), ... | #fixed code
private void portForward(Controller controller, String podName) throws MojoExecutionException {
try {
getFabric8ServiceHub(controller).getPortForwardService()
.forwardPort(createExternalProcessLogger("[[B]]port-forward[[B]] "), podName,... | Below is the vulnerable code, please generate the patch based on the following information. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.