input
stringlengths
205
73.3k
output
stringlengths
64
73.2k
instruction
stringclasses
1 value
#vulnerable code protected void checkProviderInfo(ProviderGroup providerGroup) { List<ProviderInfo> providerInfos = providerGroup == null ? null : providerGroup.getProviderInfos(); if (CommonUtils.isEmpty(providerInfos)) { return; } Iterator<P...
#fixed code protected void checkProviderInfo(ProviderGroup providerGroup) { List<ProviderInfo> providerInfos = providerGroup == null ? null : providerGroup.getProviderInfos(); if (CommonUtils.isEmpty(providerInfos)) { return; } Iterator<Provide...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testAll() throws Exception { int timeoutPerSub = 1000; ServerConfig serverConfig = new ServerConfig() .setProtocol("bolt") .setHost("0.0.0.0") .setPort(12200); ProviderConfig<?> provide...
#fixed code @Test public void testAll() throws Exception { int timeoutPerSub = 1000; ServerConfig serverConfig = new ServerConfig() .setProtocol("bolt") .setHost("0.0.0.0") .setPort(12200); ProviderConfig<?> provider = ne...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void destroy() { stop(); } #location 3 #vulnerability type THREAD_SAFETY_VIOLATION
#fixed code @Override public void destroy() { stop(); httpServer = null; }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected Object getFallback() { events.add(SofaAsyncHystrixEvent.FALLBACK_EMIT); if (lock.getCount() > 0) { // > 0 说明 run 方法没有执行,或是执行时立刻失败了 this.sofaResponse = buildEmptyResponse(request); lock.countDown...
#fixed code @Override protected Object getFallback() { events.add(SofaAsyncHystrixEvent.FALLBACK_EMIT); if (lock.getCount() > 0) { // > 0 说明 run 方法没有执行,或是执行时立刻失败了 this.sofaResponse = buildEmptyResponse(request); lock.countDown(); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void stop() { if (!started) { return; } try { // 关闭端口,不关闭线程池 if (LOGGER.isInfoEnabled()) { LOGGER.info("Stop the http rest server at port {}", serverConfig.getPort()); ...
#fixed code @Override public void stop() { if (!started) { return; } try { // 关闭端口,不关闭线程池 if (LOGGER.isInfoEnabled()) { LOGGER.info("Stop the http rest server at port {}", serverConfig.getPort()); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public List<ProviderGroup> subscribe(final ConsumerConfig config) { String appName = config.getAppName(); if (!registryConfig.isSubscribe()) { // 注册中心不订阅 if (LOGGER.isInfoEnabled(appName)) { LOGGER.in...
#fixed code @Override public List<ProviderGroup> subscribe(final ConsumerConfig config) { String appName = config.getAppName(); if (!registryConfig.isSubscribe()) { // 注册中心不订阅 if (LOGGER.isInfoEnabled(appName)) { LOGGER.infoWith...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void updateProviders(ProviderGroup providerGroup) { checkProviderInfo(providerGroup); ProviderGroup oldProviderGroup = addressHolder.getProviderGroup(providerGroup.getName()); if (ProviderHelper.isEmpty(providerGroup)) { ...
#fixed code @Override public void updateProviders(ProviderGroup providerGroup) { checkProviderInfo(providerGroup); ProviderGroup oldProviderGroup = addressHolder.getProviderGroup(providerGroup.getName()); if (ProviderHelper.isEmpty(providerGroup)) { ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static QueryRuntime parse(Query query, ExecutionPlanContext executionPlanContext, Map<String, AbstractDefinition> streamDefinitionMap, Map<String, AbstractDefinition> tableDefinitionMap, ...
#fixed code public static QueryRuntime parse(Query query, ExecutionPlanContext executionPlanContext, Map<String, AbstractDefinition> streamDefinitionMap, Map<String, AbstractDefinition> tableDefinitionMap, ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testCreatingHttpSubscriptionXmlMapping() { Subscription subscription = Subscription.Subscribe( Transport.transport("http"). option("context", "/test"). option("transport", "htt...
#fixed code @Test public void testCreatingHttpSubscriptionXmlMapping() { Subscription subscription = Subscription.Subscribe( Transport.transport("http"). option("context", "/test"). option("transport", "http,http...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void add(StreamEvent streamEvent){ StreamEvent firstConvertedEvent =null; StreamEvent lastConvertedEvent = null; while (streamEvent!=null){ StreamEvent borrowedEvent = eventManager.borrowEvent(); eventManager.conver...
#fixed code public void add(StreamEvent streamEvent){ StreamEvent borrowedEvent = eventManager.borrowEvent(); eventManager.convertStreamEvent(streamEvent, borrowedEvent); if(lastReturned!=null){ StreamEvent lastEvent = lastReturned; StreamE...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static OutputCallback constructOutputCallback(OutputStream outStream, StreamDefinition outputStreamDefinition, ExecutionPlanContext executionPlanContext) { String id = outStream.getId(); //...
#fixed code public static OutputCallback constructOutputCallback(OutputStream outStream, StreamDefinition outputStreamDefinition, ExecutionPlanContext executionPlanContext) { String id = outStream.getId(); //Constr...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(StreamEvent event) { StreamEvent head = event; //head of in events StreamEvent expiredEventTail; StreamEvent expiredEventHead; while (event != null) { processEvent(event); ...
#fixed code @Override public void process(StreamEvent event) { StreamEvent head = event; //head of in events StreamEvent expiredEventTail; StreamEvent expiredEventHead; while (event != null) { processEvent(event); even...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void restoreState(Object[] state) { eventChunk = (ComplexEventChunk<ComplexEvent>) state[0]; endOfChunk = (Boolean) state[1]; } #location 4 #vulnerability type THREAD_SAFE...
#fixed code @Override public void restoreState(Object[] state) { eventChunk = (ComplexEventChunk<ComplexEvent>) state[0]; //endOfChunk = (Boolean) state[1]; }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private void populateMarkovMatrix(String markovMatrixStorageLocation) { File file = new File(markovMatrixStorageLocation); FileInputStream fileInputStream = null; BufferedInputStream bufferedInputStream = null; BufferedReader bufferedRea...
#fixed code private void populateMarkovMatrix(String markovMatrixStorageLocation) { File file = new File(markovMatrixStorageLocation); FileInputStream fileInputStream = null; BufferedInputStream bufferedInputStream = null; BufferedReader bufferedReader = ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void add(StreamEvent streamEvent){ StreamEvent firstConvertedEvent =null; StreamEvent lastConvertedEvent = null; while (streamEvent!=null){ StreamEvent borrowedEvent = eventManager.borrowEvent(); eventManager.conver...
#fixed code public void add(StreamEvent streamEvent){ StreamEvent borrowedEvent = eventManager.borrowEvent(); eventManager.convertStreamEvent(streamEvent, borrowedEvent); if(lastReturned!=null){ StreamEvent lastEvent = lastReturned; StreamE...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testCreatingHttpSubscriptionJsonMapping() { Subscription subscription = Subscription.Subscribe( Transport.transport("jms"). option("topic", "foo")); subscription.map( Mapper.m...
#fixed code @Test public void testCreatingHttpSubscriptionJsonMapping() { Subscription subscription = Subscription.Subscribe( Transport.transport("jms"). option("topic", "foo")); subscription.map( Mapping.format...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public Object[] currentState() { return new Object[]{eventChunk, endOfChunk}; } #location 3 #vulnerability type THREAD_SAFETY_VIOLATION
#fixed code @Override public Object[] currentState() { return new Object[]{eventChunk}; }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void send(Event event, int streamIndex) { try { long sequenceNo = ringBuffer.next(); try { IndexedEventFactory.IndexedEvent existingEvent = ringBuffer.get(sequenceNo); existingEvent.set...
#fixed code @Override public void send(Event event, int streamIndex) { inputProcessor.send(event, streamIndex); // try { // long sequenceNo = ringBuffer.next(); // try { // IndexedEventFactory.IndexedEvent existingEvent = ringBuffer...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testCreatingJmsSubscriptionTextMapping() { Subscription subscription = Subscription.Subscribe( Transport.transport("jms"). option("topic", "foo")); subscription.map(Mapper.mapper("text"). ...
#fixed code @Test public void testCreatingJmsSubscriptionTextMapping() { Subscription subscription = Subscription.Subscribe( Transport.transport("jms"). option("topic", "foo")); subscription.map(Mapping.format("text"). ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { while (streamEventChunk.hasNext()) { ComplexEvent compl...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { while (streamEventChunk.hasNext()) { ComplexEvent complexEven...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void add(List<Object[]> records) { String insertQuery = this.resolveTableName(this.queryConfigurationEntry.getRecordInsertQuery()); StringBuilder params = new StringBuilder(); int fieldsLeft = this.attributes.size(); ...
#fixed code @Override protected void add(List<Object[]> records) { String sql = this.composeInsertQuery(); try { this.batchExecuteQueriesWithRecords(sql, records, false); } catch (SQLException e) { throw new RDBMSTableException("Error i...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected void processAndClear(int processIndex, StreamEvent streamEvent) { ComplexEventChunk<StateEvent> retEventChunk = new ComplexEventChunk<StateEvent>(false); ComplexEventChunk<StreamEvent> currentStreamEventChunk = new ComplexEventChunk<StreamEven...
#fixed code protected void processAndClear(int processIndex, StreamEvent streamEvent) { ComplexEventChunk<StateEvent> retEventChunk = new ComplexEventChunk<StateEvent>(false); ComplexEventChunk<StreamEvent> currentStreamEventChunk = new ComplexEventChunk<StreamEvent>(str...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected ComplexEvent createSendEvent(ComplexEvent originalEvent, Map<Integer, Object> aggregateAttributeValueMap) { ComplexEvent copiedEvent = null; if (originalEvent instanceof StreamEvent) { copiedEvent = streamEventCloner.copyStreamEvent...
#fixed code protected ComplexEvent createSendEvent(ComplexEvent originalEvent, Map<Integer, Object> aggregateAttributeValueMap) { ComplexEvent copiedEvent = cloneComplexEvent(originalEvent); for (Integer position : aggregateAttributePositionList) { copiedEven...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { List<ComplexEventChunk<ComplexEvent>> outputEventChunks = new ArrayList<ComplexEventChunk<ComplexEvent>>(); complexEventChunk.reset(); synchronized (this) { comp...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { List<ComplexEventChunk<ComplexEvent>> outputEventChunks = new ArrayList<ComplexEventChunk<ComplexEvent>>(); complexEventChunk.reset(); synchronized (this) { complexEve...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void run() { while (!inactive) { while (!paused) { // The time, in milliseconds, spent waiting in poll if data is not available. If 0, returns // immediately with any records that are available now...
#fixed code @Override public void run() { final Lock consumerLock = this.consumerLock; while (!inactive) { while (!paused) { // The time, in milliseconds, spent waiting in poll if data is not available. If 0, returns // imme...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner) { while (streamEventChunk.hasNext()) { StreamEvent streamEvent = streamEventChunk.next(); ...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner) { while (streamEventChunk.hasNext()) { StreamEvent streamEvent = streamEventChunk.next(); Stream...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected ComplexEvent createSendEvent(ComplexEvent originalEvent, Map<Integer, Object> aggregateAttributeValueMap) { ComplexEvent copiedEvent = null; if (originalEvent instanceof StreamEvent) { copiedEvent = streamEventCloner.copyStreamEvent...
#fixed code protected ComplexEvent createSendEvent(ComplexEvent originalEvent, Map<Integer, Object> aggregateAttributeValueMap) { ComplexEvent copiedEvent = cloneComplexEvent(originalEvent); for (Integer position : aggregateAttributePositionList) { copiedEven...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(StreamEvent event) { StreamEvent head = event; //head of in events StreamEvent expiredEventTail; StreamEvent expiredEventHead; while (event != null) { processEvent(event); ...
#fixed code @Override public void process(StreamEvent event) { StreamEvent head = event; //head of in events StreamEvent expiredEventTail; StreamEvent expiredEventHead; while (event != null) { processEvent(event); even...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEv...
#fixed code @Override protected void process(ComplexEventChunk<StreamEvent> streamEventChunk, Processor nextProcessor, StreamEventCloner streamEventCloner, ComplexEventPopulater complexEventPopulater) { ComplexEventChunk<StreamEvent> complexEventChu...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); ...
#fixed code @Override public void process(ComplexEventChunk complexEventChunk) { if (trigger) { ComplexEventChunk<StateEvent> returnEventChunk = new ComplexEventChunk<StateEvent>(true); StateEvent joinStateEvent = new StateEvent(2, 0); Stre...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException { LOGGER.info("CSP-Reporting-Servlet"); try { BufferedReader reader = new BufferedReader(new InputStreamReader(request.getInputStream()))...
#fixed code protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException { LOGGER.info("CSP-Reporting-Servlet"); try (BufferedReader reader = new BufferedReader(new InputStreamReader(request.getInputStream()))) { Str...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected void registerWithLongPollingServer(AsyncBrowserSession bs) { JUnitSession.getInstance().getDependency(AsyncServerSession.class).registerBrowserSession(bs); } #location 2 #vulnerability type NULL_DEREFER...
#fixed code protected void registerWithLongPollingServer(AsyncBrowserSession bs) { JUnitSession.getInstance().getDependency(HttpLongPollingServer.class).registerBrowserSession(bs); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private void addCallToSuper(ClassScope classScope, GenerationContext context, Collection<Expression> args) { PreConditions.checkNotNull(classScope); if (classScope.getClazz().getSuperclass().isDefined() && !classScope.getClazz().getSuperclass().getOrThrow().getClaz...
#fixed code private void addCallToSuper(ClassScope classScope, GenerationContext context, Collection<Expression> args) { PreConditions.checkNotNull(classScope); Option<ClassWrapper> superClass = classScope.getClazz().getSuperclass(); if (superClass.isDefined()) { if (ClassUtils.i...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected void registerWithLongPollingServer(AsyncBrowserSession bs) { JUnitSession.getInstance().getDependency(AsyncServerSession.class).registerBrowserSession(bs); } #location 2 #vulnerability type NULL_DEREFER...
#fixed code protected void registerWithLongPollingServer(AsyncBrowserSession bs) { JUnitSession.getInstance().getDependency(HttpLongPollingServer.class).registerBrowserSession(bs); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void visit(ClassOrInterfaceDeclaration n, GenerationContext context) { printComments(n, context); ClassScope scope = (ClassScope) scope(n); if (resolvedType(n) == null) { // for anonymous object creation the type is set already resolvedTyp...
#fixed code @Override public void visit(ClassOrInterfaceDeclaration n, GenerationContext context) { printComments(n, context); ClassScope scope = (ClassScope) scope(n); if (resolvedType(n) == null) { // for anonymous object creation the type is set already resolvedType(n, s...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private void fnStatement() { move(true); checkVariableName(); checkFunctionName(); getCodeGeneratorWithTimes().onConstant(this.lookhead); move(true); if (!expectChar('(')) { reportSyntaxError("expect '(' after function name"); } lamb...
#fixed code private void fnStatement() { move(true); checkVariableName(this.lookhead); checkFunctionName(this.lookhead, true); getCodeGeneratorWithTimes().onConstant(this.lookhead); move(true); if (!expectChar('(')) { reportSyntaxError("expect '(' after funct...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static final boolean isTracedEval(Map<String, Object> env) { return (boolean) getInstance(env).getOption(Options.TRACE_EVAL); } #location 2 #vulnerability type NULL_DEREFERENCE
#fixed code public static final boolean isTracedEval(Map<String, Object> env) { return getInstance(env).getOption(Options.TRACE_EVAL) == Boolean.TRUE; }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public CodeGenerator newCodeGenerator(AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, traceOutputStream, (Boolean) getO...
#fixed code public CodeGenerator newCodeGenerator(AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, traceOutputStream, getOptionValue(Optio...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public AviatorObject match(AviatorObject other, Map<String, Object> env) { switch (other.getAviatorType()) { case String: AviatorString aviatorString = (AviatorString) other; Matcher m = this.pattern.matcher(aviatorString.lexeme); ...
#fixed code @Override public AviatorObject match(AviatorObject other, Map<String, Object> env) { switch (other.getAviatorType()) { case String: AviatorString aviatorString = (AviatorString) other; Matcher m = this.pattern.matcher(aviatorString.lexeme); i...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public CodeGenerator newCodeGenerator(final AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, this.traceOutputStream, get...
#fixed code public CodeGenerator newCodeGenerator(final AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, this.traceOutputStream); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private int getOptimizeLevel() { return getOption(Options.OPTIMIZE_LEVEL); } #location 2 #vulnerability type NULL_DEREFERENCE
#fixed code private int getOptimizeLevel() { return getOptionValue(Options.OPTIMIZE_LEVEL).level; }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public CodeGenerator newCodeGenerator(final AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, this.traceOutputStream, get...
#fixed code public CodeGenerator newCodeGenerator(final AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, this.traceOutputStream); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void onMethodName(Token<?> lookhead) { String outtterMethodName = "lambda"; if (lookhead.getType() != TokenType.Delegate) { outtterMethodName = lookhead.getLexeme(); String innerMethodName = this.innerMethodMap.get(outtterMethodName)...
#fixed code @Override public void onMethodName(Token<?> lookhead) { String outtterMethodName = "lambda"; if (lookhead.getType() != TokenType.Delegate) { outtterMethodName = lookhead.getLexeme(); String innerMethodName = this.innerMethodMap.get(outtterMethodName); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public AviatorObject match(AviatorObject other, Map<String, Object> env) { switch (other.getAviatorType()) { case String: AviatorString aviatorString = (AviatorString) other; Matcher m = this.pattern.matcher(aviatorString.lexeme); ...
#fixed code @Override public AviatorObject match(AviatorObject other, Map<String, Object> env) { switch (other.getAviatorType()) { case String: AviatorString aviatorString = (AviatorString) other; Matcher m = this.pattern.matcher(aviatorString.lexeme); i...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public CodeGenerator newCodeGenerator(AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, traceOutputStream, (Boolean) getO...
#fixed code public CodeGenerator newCodeGenerator(AviatorClassLoader classLoader) { switch (getOptimizeLevel()) { case AviatorEvaluator.COMPILE: ASMCodeGenerator asmCodeGenerator = new ASMCodeGenerator(this, classLoader, traceOutputStream, getOptionValue(Optio...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public Object getValue(Map<String, Object> env) { if (env != null) { if (this.name.contains(".") && RuntimeUtils.getInstance(env) .<Boolean>getOption(Options.ENABLE_PROPERTY_SYNTAX_SUGAR)) { return getProperty(env); } r...
#fixed code @Override public Object getValue(Map<String, Object> env) { if (env != null) { if (this.name.contains(".") && RuntimeUtils.getInstance(env) .getOptionValue(Options.ENABLE_PROPERTY_SYNTAX_SUGAR).bool) { return getProperty(env); } return...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected Env genTopEnv(Map<String, Object> map) { Env env = newEnv(map, (boolean) this.instance.getOption(Options.USE_USER_ENV_AS_TOP_ENV_DIRECTLY)); if (this.compileEnv != null && !this.compileEnv.isEmpty()) { env.putAll(this.compileEnv); } ...
#fixed code protected Env genTopEnv(Map<String, Object> map) { Env env = newEnv(map, this.instance.getOption(Options.USE_USER_ENV_AS_TOP_ENV_DIRECTLY) == Boolean.TRUE); if (this.compileEnv != null && !this.compileEnv.isEmpty()) { env.putAll(this.compileEnv); } ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private File copyToMergedCodebase(String filename, File destFile) { FileSystem fs = Injector.INSTANCE.fileSystem(); File mergedFile = mergedCodebase.getFile(filename); try { fs.makeDirsForFile(mergedFile); fs.copyFile(destFile, mergedFile); r...
#fixed code private File copyToMergedCodebase(String filename, File destFile) { File mergedFile = mergedCodebase.getFile(filename); try { filesystem.makeDirsForFile(mergedFile); filesystem.copyFile(destFile, mergedFile); return mergedFile; } catch (IOException...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void generateMergedFile(String filename) { FileSystem fs = Injector.INSTANCE.fileSystem(); File origFile = originalCodebase.getFile(filename); boolean origExists = fs.exists(origFile); File destFile = destinationCodebase.getFile(filename); boo...
#fixed code public void generateMergedFile(String filename) { File origFile = originalCodebase.getFile(filename); boolean origExists = filesystem.exists(origFile); File destFile = destinationCodebase.getFile(filename); boolean destExists = filesystem.exists(destFile); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testUpdate() { redisSessionDAO.doCreate(session1); doChangeSessionName(session1, name1); redisSessionDAO.update(session1); FakeSession actualSession = (FakeSession)redisSessionDAO.doReadSession(session1.getId()); ...
#fixed code @Test public void testUpdate() { redisSessionDAO.doCreate(session1); redisSessionDAO.doReadSession(session1.getId()); doChangeSessionName(session1, name1); redisSessionDAO.update(session1); FakeSession actualSession = (FakeSession)r...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testRemove() { redisCache.remove(null); FakeSession actualValue = redisCache.remove(testKey); assertThat(actualValue.getId(), is(3)); assertThat(actualValue.getName(), is("jack")); } ...
#fixed code @Test public void testRemove() throws SerializationException { FakeAuth nullValue = redisCache.remove(null); assertThat(nullValue, is(nullValue())); String testKey = "billy"; byte[] testKeyBytes = keySerializer.serialize(testPrefix + testK...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testDoReadSession() { Session actualSession = redisSessionDAO.doReadSession(testKey); assertThat(actualSession.getId().toString(), is("3")); redisSessionDAO.doReadSession(null); } #location 4...
#fixed code @Test public void testDoReadSession() throws NoSuchFieldException, IllegalAccessException { Session nullSession = redisSessionDAO.doReadSession(null); assertThat(nullSession, is(nullValue())); RedisSessionDAO redisSessionDAO2 = new RedisSessionDAO...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void writeFileTxt(String fileName, String[] totalFile){ FileWriter file = null; PrintWriter pw = null; try { file = new FileWriter(System.getProperty("user.dir")+"/"+fileName); pw = new PrintWriter(file); for (int...
#fixed code public static void writeFileTxt(String fileName, String[] totalFile){ FileWriter file = null; PrintWriter pw = null; try { file = new FileWriter(System.getProperty("user.dir")+"/"+fileName); pw = new PrintWriter(file); for (int i = 0...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void writeFileTxt(String fileName, String[] totalFile){ FileWriter file = null; PrintWriter pw = null; try { file = new FileWriter(System.getProperty("user.dir")+"/"+fileName); pw = new PrintWriter(file); for (int...
#fixed code public static void writeFileTxt(String fileName, String[] totalFile){ FileWriter file = null; PrintWriter pw = null; try { file = new FileWriter(System.getProperty("user.dir")+"/"+fileName); pw = new PrintWriter(file); for (int i = 0...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public long start(String jobName, Properties params) throws JobStartException, JobSecurityException { final JsrXmlApplicationContext batchContext = new JsrXmlApplicationContext(params); batchContext.setValidating(false); Resource batchXml = new ClassPathR...
#fixed code @Override public long start(String jobName, Properties params) throws JobStartException, JobSecurityException { final JsrXmlApplicationContext batchContext = new JsrXmlApplicationContext(params); batchContext.setValidating(false); Resource batchXml = new ClassPathResourc...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private void recoveryFromLog() { MasterLogReader reader; synchronized (mDatasets) { File file = new File(Config.MASTER_CHECKPOINT_FILE); if (!file.exists()) { LOG.info("Master Checkpoint file " + Config.MASTER_CHECKPOINT_FILE + " does not exist...
#fixed code private void recoveryFromLog() { synchronized (mDatasets) { recoveryFromFile(Config.MASTER_CHECKPOINT_FILE, "Master Checkpoint file "); recoveryFromFile(Config.MASTER_LOG_FILE, "Master Log file "); } }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private void evaluateStatement(Object target, TemporaryFolder temporaryFolder, Statement base) throws Throwable { container = null; setAndCheckIfWritable(temporaryFolder); try { LOGGER.info("Setting up {} in {}", getName(), temporaryF...
#fixed code private void evaluateStatement(Object target, TemporaryFolder temporaryFolder, Statement base) throws Throwable { container = null; FileUtil.setPermission(temporaryFolder.getRoot(), FsPermission.getDirDefault()); try { LOGGER.info("Setting ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public String serialize(String data) { try { AbiBin abiBin = new AbiBin(); JSONObject res = abiBin.request(RequestParams.of(netParams, () -> data)); return res.getString("binargs"); } catch (JSONException...
#fixed code @Override public String serialize(String data) { try { AbiBin abiBin = new AbiBin(); JSONObject res = abiBin.request(RequestParams.of(netParams, () -> data)); return res.getString("binargs"); } catch (JSONException ex) {...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public JSONObject getInfo() throws EvtSdkException { Info info = new Info(); return info.get(netParams, null); } #location 3 #vulnerability type NULL_DEREFERENCE
#fixed code public JSONObject getInfo() throws EvtSdkException { Info info = new Info(); return info.get(RequestParams.of(netParams)); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public JSONObject getHeadBlockHeaderState() throws EvtSdkException { HeadBlockHeaderState headBlockHeaderState = new HeadBlockHeaderState(); return headBlockHeaderState.get(netParams, null); } #location 3 ...
#fixed code public JSONObject getHeadBlockHeaderState() throws EvtSdkException { HeadBlockHeaderState headBlockHeaderState = new HeadBlockHeaderState(); return headBlockHeaderState.get(RequestParams.of(netParams)); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static float[] getMedianErrorRates(LangDescriptor language, int maxNumFiles, int trials) throws Exception { SubsetValidator validator = new SubsetValidator(language.corpusDir, language); List<InputDocument> documents = load(validator.allFiles, language); float...
#fixed code public static float[] getMedianErrorRates(LangDescriptor language, int maxNumFiles, int trials) throws Exception { SubsetValidator validator = new SubsetValidator(language.corpusDir, language); List<InputDocument> documents = load(validator.allFiles, language); float[] med...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws Exception { LangDescriptor[] languages = new LangDescriptor[] { JAVA_DESCR, // JAVA8_DESCR, ANTLR4_DESCR, // SQLITE_NOISY_DESCR, // SQLITE_CLEAN_DESCR, // TSQL_NOISY_DESCR, // TSQL_CLEAN_DESCR, }; Map<Stri...
#fixed code public static void main(String[] args) throws Exception { LangDescriptor[] languages = new LangDescriptor[] { JAVA_DESCR, // JAVA8_DESCR, ANTLR4_DESCR, // SQLITE_NOISY_DESCR, // SQLITE_CLEAN_DESCR, // TSQL_NOISY_DESCR, // TSQL_CLEAN_DESCR, }; testFeatures(l...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void trainOnSampleDocs() throws Exception { documentsPerExemplar = new ArrayList<>(); featureVectors = new ArrayList<>(); injectWhitespace = new ArrayList<>(); hpos = new ArrayList<>(); for (InputDocument doc : documents) { if ( showFileNames ) System....
#fixed code public void trainOnSampleDocs() throws Exception { documentsPerExemplar = new ArrayList<>(); featureVectors = new ArrayList<>(); injectWhitespace = new ArrayList<>(); hpos = new ArrayList<>(); for (InputDocument doc : documents) { if ( showFileNames ) System.out.pr...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public PageResult<TokenVo> listTokens(Map<String, Object> params, String clientId) { Integer page = MapUtils.getInteger(params, "page"); Integer limit = MapUtils.getInteger(params, "limit"); int[] startEnds = PageUtil.transToStartEn...
#fixed code @Override public PageResult<TokenVo> listTokens(Map<String, Object> params, String clientId) { Integer page = MapUtils.getInteger(params, "page"); Integer limit = MapUtils.getInteger(params, "limit"); int[] startEnds = PageUtil.transToStartEnd(page...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private ObjectNode getDataNode(Object object, Map<String, ObjectNode> includedContainer, SerializationSettings settings) throws IllegalAccessException { ObjectNode dataNode = objectMapper.createObjectNode(); // Perform initial conversion ObjectNode attrib...
#fixed code private ObjectNode getDataNode(Object object, Map<String, ObjectNode> includedContainer, SerializationSettings settings) throws IllegalAccessException { ObjectNode dataNode = objectMapper.createObjectNode(); // Perform initial conversion ObjectNode attributesNo...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected void assertSuccessfulAuthentication(String providerId) { this.driver.navigate().to("http://localhost:8081/test-app/"); assertTrue(this.driver.getCurrentUrl().startsWith("http://localhost:8081/auth/realms/realm-with-broker/protocol/openid-conne...
#fixed code protected void assertSuccessfulAuthentication(String providerId) { this.driver.navigate().to("http://localhost:8081/test-app/"); assertTrue(this.driver.getCurrentUrl().startsWith("http://localhost:8081/auth/realms/realm-with-broker/protocol/openid-connect/log...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public AuthenticationMechanismOutcome authenticate(HttpServerExchange exchange, SecurityContext securityContext) { BearerTokenAuthenticator bearer = createBearerTokenAuthenticator(); AuthenticationMechanismOutcome outcome = bearer.authentic...
#fixed code @Override public AuthenticationMechanismOutcome authenticate(HttpServerExchange exchange, SecurityContext securityContext) { BearerTokenAuthenticator bearer = createBearerTokenAuthenticator(); AuthenticationMechanismOutcome outcome = bearer.authenticate(ex...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Path("{username}/session-stats") @GET @NoCache @Produces(MediaType.APPLICATION_JSON) public Map<String, UserStats> getSessionStats(final @PathParam("username") String username) { logger.info("session-stats"); auth.requireView(); ...
#fixed code @Path("{username}/session-stats") @GET @NoCache @Produces(MediaType.APPLICATION_JSON) public Map<String, UserStats> getSessionStats(final @PathParam("username") String username) { logger.info("session-stats"); auth.requireView(); UserMo...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws Throwable { KeycloakServerConfig config = new KeycloakServerConfig(); for (int i = 0; i < args.length; i++) { if (args[i].equals("-b")) { config.setHost(args[++i]); } ...
#fixed code public static void main(String[] args) throws Throwable { KeycloakServerConfig config = new KeycloakServerConfig(); for (int i = 0; i < args.length; i++) { if (args[i].equals("-b")) { config.setHost(args[++i]); } ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void verifyAccess(AccessToken token, RealmModel realm, ClientModel client, UserModel user) throws OAuthErrorException { ApplicationModel clientApp = (client instanceof ApplicationModel) ? (ApplicationModel)client : null; if (token.getRealmAccess...
#fixed code public void verifyAccess(AccessToken token, RealmModel realm, ClientModel client, UserModel user) throws OAuthErrorException { ApplicationModel clientApp = (client instanceof ApplicationModel) ? (ApplicationModel)client : null; if (token.getRealmAccess() != ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public AuthenticationMechanismOutcome authenticate(HttpServerExchange exchange, SecurityContext securityContext) { BearerTokenAuthenticator bearer = createBearerTokenAuthenticator(); AuthenticationMechanismOutcome outcome = bearer.authentic...
#fixed code @Override public AuthenticationMechanismOutcome authenticate(HttpServerExchange exchange, SecurityContext securityContext) { BearerTokenAuthenticator bearer = createBearerTokenAuthenticator(); AuthenticationMechanismOutcome outcome = bearer.authenticate(ex...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected void start() { if (started) { throw new IllegalStateException("Filter already started. Make sure to specify just keycloakConfigResolver or keycloakConfigFile but not both"); } if (keycloakConfigResolverClass != null) { ...
#fixed code protected void start() { if (started) { throw new IllegalStateException("Filter already started. Make sure to specify just keycloakConfigResolver or keycloakConfigFile but not both"); } if (keycloakConfigResolverClass != null) { ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @JsonIgnore public void setPublicKey(PublicKey publicKey) { this.publicKey = publicKey; StringWriter writer = new StringWriter(); PEMWriter pemWriter = new PEMWriter(writer); try { pemWriter.writeObject(publicKey); ...
#fixed code @JsonIgnore public void setPublicKey(PublicKey publicKey) { this.publicKey = publicKey; StringWriter writer = new StringWriter(); PEMWriter pemWriter = new PEMWriter(writer); try { pemWriter.writeObject(publicKey); p...
Below is the vulnerable code, please generate the patch based on the following information.