input stringlengths 205 73.3k | output stringlengths 64 73.2k | instruction stringclasses 1
value |
|---|---|---|
#vulnerable code
@Test
public void whenDesiredStateIsAdmin_serverStartupCreatesJavaOptionsEnvironment() {
configureServer("ms1").withDesiredState(ADMIN_STATE);
addWlsServer("ms1");
invokeStep();
assertThat(
getServerStartupInfo("ms1").getEnvironment(),
... | #fixed code
@Test
public void whenDesiredStateIsAdmin_serverStartupCreatesJavaOptionsEnvironment() {
configureServer("wls1").withDesiredState(ADMIN_STATE);
addWlsServer("wls1");
invokeStep();
assertThat(
getServerStartupInfo("wls1").getEnvironment(),
has... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testTwoDomainsManagedByTwoOperators() throws Exception {
Assume.assumeFalse(QUICKTEST);
String testMethodName = new Object() {}.getClass().getEnclosingMethod().getName();
logTestBegin(testMethodName);
logger.info("Creating Domain domain... | #fixed code
@Test
public void testTwoDomainsManagedByTwoOperators() throws Exception {
Assume.assumeFalse(QUICKTEST);
String testMethodName = new Object() {}.getClass().getEnclosingMethod().getName();
logTestBegin(testMethodName);
logger.info("Creating Domain domain4 & ve... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void whenWlsServerNotInCluster_serverStartupInfoHasNoClusterConfig() {
configureServer("ms1");
addWlsServer("ms1");
invokeStep();
assertThat(getServerStartupInfo("ms1").getClusterName(), nullValue());
}
#loca... | #fixed code
@Test
public void whenWlsServerNotInCluster_serverStartupInfoHasNoClusterConfig() {
configureServer("wls1");
addWlsServer("wls1");
invokeStep();
assertThat(getServerStartupInfo("wls1").getClusterName(), nullValue());
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testNamespaceWatch() {
Assume.assumeTrue(System.getProperty("os.name").toLowerCase().contains("nix"));
ClientHolder client = ClientHelper.getInstance().take();
try {
Watch<V1Namespace> watch = Watch.createWatch(
client.get... | #fixed code
@Test
public void testNamespaceWatch() throws Exception {
Assume.assumeTrue(TestUtils.isKubernetesAvailable());
ClientHolder client = ClientHelper.getInstance().take();
Watch<V1Namespace> watch = Watch.createWatch(
client.getApiClient(),
cl... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void stop() throws IOException {
final List<Channel> channels;
synchronized (managedChannelSet) {
channels = new ArrayList<Channel>(managedChannelSet);
managedChannelSet.clear();
}
for (Channel channel : cha... | #fixed code
public void stop() throws IOException {
final List<Channel> channels;
synchronized (managedChannelSet) {
channels = new ArrayList<Channel>(managedChannelSet);
managedChannelSet.clear();
}
for (Channel channel : channels)... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public MulticastMessageChannel createUdpServer(final InetSocketAddress bindAddress, final ReadChannelThread readThread, final WriteChannelThread writeThread, final ChannelListener<? super MulticastMessageChannel> bindListener, final OptionMap optionMap) throws IOExcepti... | #fixed code
public MulticastMessageChannel createUdpServer(final InetSocketAddress bindAddress, final ReadChannelThread readThread, final WriteChannelThread writeThread, final ChannelListener<? super MulticastMessageChannel> bindListener, final OptionMap optionMap) throws IOException {
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void start() throws IOException {
if (selectorThreadFactory == null) {
selectorThreadFactory = Executors.defaultThreadFactory();
}
if (executor == null) {
executor = executorService = Executors.newCachedThreadPool()... | #fixed code
public void start() throws IOException {
if (selectorThreadFactory == null) {
selectorThreadFactory = Executors.defaultThreadFactory();
}
if (executor == null) {
executor = IoUtils.directExecutor();
}
for (int i ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public MulticastMessageChannel createUdpServer(final InetSocketAddress bindAddress, final ReadChannelThread readThread, final WriteChannelThread writeThread, final ChannelListener<? super MulticastMessageChannel> bindListener, final OptionMap optionMap) throws IOExcepti... | #fixed code
public MulticastMessageChannel createUdpServer(final InetSocketAddress bindAddress, final ReadChannelThread readThread, final WriteChannelThread writeThread, final ChannelListener<? super MulticastMessageChannel> bindListener, final OptionMap optionMap) throws IOException {
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public NioSocketStreamConnection accept() throws IOException {
final WorkerThread current = WorkerThread.getCurrent();
final NioTcpServerHandle handle = handles[current.getNumber()];
if (! handle.getConnection()) {
return null;
... | #fixed code
public NioSocketStreamConnection accept() throws IOException {
final WorkerThread current = WorkerThread.getCurrent();
if (current == null) {
return null;
}
final NioTcpServerHandle handle = handles[current.getNumber()];
if ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public NioSocketStreamConnection accept() throws IOException {
final WorkerThread current = WorkerThread.getCurrent();
final NioTcpServerHandle handle = handles[current.getNumber()];
if (! handle.getConnection()) {
return null;
... | #fixed code
public NioSocketStreamConnection accept() throws IOException {
final WorkerThread current = WorkerThread.getCurrent();
if (current == null) {
return null;
}
final NioTcpServerHandle handle = handles[current.getNumber()];
if ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void stop() throws IOException {
final List<Channel> channels;
synchronized (managedChannelSet) {
channels = new ArrayList<Channel>(managedChannelSet);
managedChannelSet.clear();
}
for (Channel channel : cha... | #fixed code
public void stop() throws IOException {
final List<Channel> channels;
synchronized (managedChannelSet) {
channels = new ArrayList<Channel>(managedChannelSet);
managedChannelSet.clear();
}
for (Channel channel : channels)... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public Schema encodeSchema(SparkMLEncoder encoder){
T model = getTransformer();
Label label = null;
if(model instanceof HasLabelCol){
HasLabelCol hasLabelCol = (HasLabelCol)model;
String labelCol = hasLabelCol.getLabelCol();
Feature feature = encoder.get... | #fixed code
public Schema encodeSchema(SparkMLEncoder encoder){
T model = getTransformer();
Label label = null;
if(model instanceof HasLabelCol){
HasLabelCol hasLabelCol = (HasLabelCol)model;
String labelCol = hasLabelCol.getLabelCol();
Feature feature = encoder.getOnlyFe... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
static
private MapValues createMapValues(FieldName name, String identifier, List<Feature> features, List<Double> coefficients){
DocumentBuilder documentBuilder = DOMUtil.createDocumentBuilder();
InlineTable inlineTable = new InlineTable();
List<String> columns = A... | #fixed code
static
private MapValues createMapValues(FieldName name, String identifier, List<Feature> features, List<Double> coefficients){
ListIterator<Feature> featureIt = features.listIterator();
ListIterator<Double> coefficientIt = coefficients.listIterator();
PMMLEncoder encode... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
static
private MapValues createMapValues(FieldName name, Object identifier, List<Feature> features, List<Double> coefficients){
ListIterator<Feature> featureIt = features.listIterator();
ListIterator<Double> coefficientIt = coefficients.listIterator();
PMMLEncoder ... | #fixed code
static
private MapValues createMapValues(FieldName name, Object identifier, List<Feature> features, List<Double> coefficients){
ListIterator<Feature> featureIt = features.listIterator();
ListIterator<Double> coefficientIt = coefficients.listIterator();
PMMLEncoder encode... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public Schema encodeSchema(SparkMLEncoder encoder){
T model = getTransformer();
Label label = null;
if(model instanceof HasLabelCol){
HasLabelCol hasLabelCol = (HasLabelCol)model;
String labelCol = hasLabelCol.getLabelCol();
Feature feature = encoder.get... | #fixed code
public Schema encodeSchema(SparkMLEncoder encoder){
T model = getTransformer();
Label label = null;
if(model instanceof HasLabelCol){
HasLabelCol hasLabelCol = (HasLabelCol)model;
String labelCol = hasLabelCol.getLabelCol();
Feature feature = encoder.getOnlyFe... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
SortedMap<Long, Long> getOffsets(MovieFragmentBox moof, long trackId) {
isoBufferWrapper = moof.getIsoFile().getOriginalIso();
SortedMap<Long, Long> offsets2Sizes = new TreeMap<Long, Long>();
List<TrackFragmentBox> traf = moof.getBoxes(TrackFragm... | #fixed code
SortedMap<Long, Long> getOffsets(MovieFragmentBox moof, long trackId) {
isoBufferWrapper = moof.getIsoFile().getOriginalIso();
SortedMap<Long, Long> offsets2Sizes = new TreeMap<Long, Long>();
List<TrackFragmentBox> traf = moof.getBoxes(TrackFragmentBox... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void testRoundTrip_1(String resource) throws Exception {
File originalFile = File.createTempFile("pdcf", "original");
FileOutputStream fos = new FileOutputStream(originalFile);
byte[] content = read(getClass().getResourceAsStream(resource... | #fixed code
public void testRoundTrip_1(String resource) throws Exception {
File originalFile = File.createTempFile("pdcf", "original");
FileOutputStream fos = new FileOutputStream(originalFile);
byte[] content = read(getClass().getResourceAsStream(resource));
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void parseMdat(MediaDataBox<TrackBox> mdat) {
mdat.getTrackMap().clear();
TreeMap<Long, Track<TrackBox>> trackIdsToTracksWithChunks = new TreeMap<Long, Track<TrackBox>>();
long[] trackNumbers = getTrackNumbers();
Map<Long, Long> ... | #fixed code
public void parseMdat(MediaDataBox<TrackBox> mdat) {
mdat.getTrackMap().clear();
TreeMap<Long, Track<TrackBox>> trackIdsToTracksWithChunks = new TreeMap<Long, Track<TrackBox>>();
long[] trackNumbers = getTrackNumbers();
Map<Long, Long> trackT... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static boolean setDependencyVersion( final ModifiedPomXMLEventReader pom, final String groupId,
final String artifactId, final String oldVersion,
final String newVersi... | #fixed code
public static boolean setDependencyVersion( final ModifiedPomXMLEventReader pom, final String groupId,
final String artifactId, final String oldVersion,
final String newVersion )
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void useLatestReleases( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException
{
Iterator i = dependencies.iterator();
while ( i.hasNext() )
{
Dependency dep = (... | #fixed code
private void useLatestReleases( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException
{
Iterator i = dependencies.iterator();
while ( i.hasNext() )
{
Dependency dep = (Depend... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void useReleases( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException
{
Iterator i = dependencies.iterator();
while ( i.hasNext() )
{
Dependency dep = (Depend... | #fixed code
private void useReleases( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException
{
Iterator i = dependencies.iterator();
while ( i.hasNext() )
{
Dependency dep = (Dependency) ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void execute()
throws MojoExecutionException, MojoFailureException
{
Set childModules = getAllChildModules( getProject() );
removeMissingChildModules( getProject(), childModules );
Iterator i = childModules.iterator();
... | #fixed code
public void execute()
throws MojoExecutionException, MojoFailureException
{
Set childModules = PomHelper.getAllChildModules( getProject(), getLog() );
PomHelper.removeMissingChildModules( getLog(), getProject(), childModules );
Iterator ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public boolean isDependencyUpdateAvailable()
{
for ( Iterator i = dependencyVersions.values().iterator(); i.hasNext(); )
{
ArtifactVersions versions = (ArtifactVersions) i.next();
if ( versions.getAllUpdates( UpdateScope.ANY, ... | #fixed code
public boolean isDependencyUpdateAvailable()
{
for ( Iterator i = dependencyVersions.values().iterator(); i.hasNext(); )
{
ArtifactVersions versions = (ArtifactVersions) i.next();
ArtifactVersion[] dependencyUpdates = versions.getAl... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void useNextReleases( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException
{
Iterator i = dependencies.iterator();
while ( i.hasNext() )
{
Dependency dep = (De... | #fixed code
private void useNextReleases( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException
{
Iterator i = dependencies.iterator();
while ( i.hasNext() )
{
Dependency dep = (Dependen... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void useNextSnapshots( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException, ArtifactMetadataRetrievalException
{
int segment = determineUnchangedSegment(allowMajorUpdates, allowMinorUpdat... | #fixed code
private void useNextSnapshots( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException, ArtifactMetadataRetrievalException
{
int segment = determineUnchangedSegment(allowMajorUpdates, allowMinorUpdates,
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static boolean setProjectVersion( final ModifiedPomXMLEventReader pom, final String value )
throws XMLStreamException
{
Stack<String> stack = new Stack<String>();
String path = "";
final Pattern matchScopeRegex;
boolean... | #fixed code
public static boolean setProjectVersion( final ModifiedPomXMLEventReader pom, final String value )
throws XMLStreamException
{
return setProjectValue( pom, "/project/version", value );
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected void renderDependencySummaryTableRow( Dependency dependency, ArtifactVersions details,
boolean includeScope, boolean includeClassifier,
boolean includeType ... | #fixed code
protected void renderDependencySummaryTableRow( Dependency dependency, ArtifactVersions details,
boolean includeScope, boolean includeClassifier,
boolean includeType )
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void useLatestSnapshots( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException, ArtifactMetadataRetrievalException
{
int segment = determineUnchangedSegment(allowMajorUpdates, allowMinorUpd... | #fixed code
private void useLatestSnapshots( ModifiedPomXMLEventReader pom, Collection dependencies )
throws XMLStreamException, MojoExecutionException, ArtifactMetadataRetrievalException
{
int segment = determineUnchangedSegment(allowMajorUpdates, allowMinorUpdates,
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected final void writeFile( File outFile, StringBuffer input )
throws IOException
{
OutputStream out = new BufferedOutputStream( new FileOutputStream( outFile ) );
out.write( input.toString().getBytes( PomHelper.POM_ENCODING ) );
... | #fixed code
protected final void writeFile( File outFile, StringBuffer input )
throws IOException
{
Writer writer = WriterFactory.newXmlWriter( outFile );
try
{
IOUtil.copy( input.toString(), writer );
}
finally
{
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected void renderDependencyDetailTable( Dependency dependency, ArtifactVersions details, boolean includeScope,
boolean includeClassifier, boolean includeType )
{
final String cellWidth = "80%";
fina... | #fixed code
protected void renderDependencyDetailTable( Dependency dependency, ArtifactVersions details, boolean includeScope,
boolean includeClassifier, boolean includeType )
{
final String cellWidth = "80%";
final Stri... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected void update( ModifiedPomXMLEventReader pom )
throws MojoExecutionException, MojoFailureException, XMLStreamException
{
getLog().debug( "Updating parent to " + getProject().getVersion() );
Stack stack = new Stack();
String p... | #fixed code
protected void update( ModifiedPomXMLEventReader pom )
throws MojoExecutionException, MojoFailureException, XMLStreamException
{
getLog().debug( "Updating parent to " + getProject().getVersion() );
if ( PomHelper.setProjectParentVersion( pom, getP... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void writeObjectData(ObjectOutputStream out) throws IOException {
try (ObjectOutputStream outputStream = new ObjectOutputStream(out)) {
if (this.principal instanceof Serializable) {
outputStream.writeBoolean(true);
... | #fixed code
public void writeObjectData(ObjectOutputStream out) throws IOException {
try (ObjectOutputStream outputStream = new ObjectOutputStream(out)) {
outputStream.writeObject(this);
outputStream.flush();
}
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void runExperiment(MultilabelClassifier h, String options[]) throws Exception {
// Help
if(Utils.getOptionPos('h',options) >= 0) {
System.out.println("\nHelp requested");
Evaluation.printOptions(h.listOptions());
return;
}
h.setOptions(opti... | #fixed code
public static void runExperiment(MultilabelClassifier h, String options[]) throws Exception {
// Help
if(Utils.getOptionPos('h',options) >= 0) {
System.out.println("\nHelp requested");
Evaluation.printOptions(h.listOptions());
return;
}
h.setOptions(options);
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected boolean save(int index) {
boolean result;
int retVal;
Result res;
File file;
BufferedWriter writer;
retVal = m_FileChooser.showSaveDialog(this);
if (retVal != JFileChooser.APPROVE_OPTION)
return false;
file = m_FileChooser.getSelectedFile... | #fixed code
protected boolean save(int index) {
boolean result;
int retVal;
Result res;
File file;
retVal = m_FileChooser.showSaveDialog(this);
if (retVal != JFileChooser.APPROVE_OPTION)
return false;
file = m_FileChooser.getSelectedFile();
res = getResultAt(index)... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public JsonParser createParser(File f) throws IOException {
return _createParser(new FileInputStream(f), _createContext(f, true));
}
#location 3
#vulnerability type RESOURCE_LEAK | #fixed code
@Override
public JsonParser createParser(File f) throws IOException {
IOContext ctxt = _createContext(f, true);
return _createParser(_decorate(new FileInputStream(f), ctxt), ctxt);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void compile(String projectPath) throws IOException {
Runtime runtime = Runtime.getRuntime();
Process exec = runtime.exec("mvn clean package -f " + projectPath);
try {
exec.waitFor();
} catch (InterruptedException e) {
e.printStac... | #fixed code
public static void compile(String projectPath) throws IOException, TimeoutException, InterruptedException {
Runtime runtime = Runtime.getRuntime();
Process exec = runtime.exec("mvn clean package -f " + projectPath);
Worker worker = new Worker(exec);
worker.star... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void run() {
CodegenConfigurator configurator = new CodegenConfigurator();
CodeGenerator codegenerator = GeneratorFactory.getGenerator(CodeGenerator.class, "default");
// add additional property
Optional.ofNullable(properties).ifPrese... | #fixed code
@Override
public void run() {
CodeGenerator codegenerator = GeneratorFactory.getGenerator(CodeGenerator.class, "default");
if (codegenerator == null) {
LOGGER.warn("Not CodeGenerator found");
return;
}
CodegenConfigurator configurator = new Code... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public final void doHandle(HttpServletRequest baseRequest,
HttpServletRequest request, HttpServletResponse response,
InputStream is) throws IOException, S3Exception {
String method = request.getMethod();
String uri = request.getRe... | #fixed code
public final void doHandle(HttpServletRequest baseRequest,
HttpServletRequest request, HttpServletResponse response,
InputStream is) throws IOException, S3Exception {
String method = request.getMethod();
String uri = request.getRequestU... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public final void doHandle(HttpServletRequest baseRequest,
HttpServletRequest request, HttpServletResponse response,
InputStream is) throws IOException, S3Exception {
String method = request.getMethod();
String uri = request.getRe... | #fixed code
public final void doHandle(HttpServletRequest baseRequest,
HttpServletRequest request, HttpServletResponse response,
InputStream is) throws IOException, S3Exception {
String method = request.getMethod();
String uri = request.getRequestU... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private ModelAttr getAndPutModelAttr(Map<String, Map<String, Object>> swaggerMap, Map<String, ModelAttr> resMap, String modeName) {
if (resMap.get(modeName) != null) {
return resMap.get("#/definitions/" + modeName);
}
Map<String, Obje... | #fixed code
private ModelAttr getAndPutModelAttr(Map<String, Map<String, Object>> swaggerMap, Map<String, ModelAttr> resMap, String modeName) {
ModelAttr modeAttr;
if ((modeAttr = resMap.get("#/definitions/" + modeName)) == null) {
modeAttr = new ModelAttr();
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public SynonymMap reloadSynonymMap() {
try {
Reader rulesReader = getReader();
SynonymMap.Builder parser = null;
if ("wordnet".equalsIgnoreCase(format)) {
parser = new WordnetSynonymParser(true, expand, analyzer);
((WordnetSynonymParser) pars... | #fixed code
@Override
public SynonymMap reloadSynonymMap() {
try {
logger.info("start reload remote synonym from {}.", location);
Reader rulesReader = getReader();
SynonymMap.Builder parser = null;
if ("wordnet".equalsIgnoreCase(format)) {
parser = new WordnetSynonymPars... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public SynonymMap reloadSynonymMap() {
try {
Reader rulesReader = getReader();
SynonymMap.Builder parser = null;
if ("wordnet".equalsIgnoreCase(format)) {
parser = new WordnetSynonymParser(true, expand, analyzer);
((WordnetSynonymParser) pars... | #fixed code
@Override
public SynonymMap reloadSynonymMap() {
try {
logger.info("start reload remote synonym from {}.", location);
Reader rulesReader = getReader();
SynonymMap.Builder parser = null;
if ("wordnet".equalsIgnoreCase(format)) {
parser = new WordnetSynonymPars... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
protected Rectangle computeBoundingBox(Collection<? extends Shape> shapes, SpatialContext ctx) {
if (shapes.isEmpty())
return ctx.makeRectangle(Double.NaN, Double.NaN, Double.NaN, Double.NaN);
Range xRange = null;
double minY = Double.POSITIVE_INFINITY;
... | #fixed code
protected Rectangle computeBoundingBox(Collection<? extends Shape> shapes, SpatialContext ctx) {
if (shapes.isEmpty())
return ctx.makeRectangle(Double.NaN, Double.NaN, Double.NaN, Double.NaN);
BBoxCalculator bboxCalc = new BBoxCalculator(ctx);
for (Shape geom ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
DataSource dataSource = CodeGenHelpler.getDatasource();
List<TableMeta> tableMetaList = new MetaBuilder(dataSource).build();
CodeGenHelpler.excludeTa... | #fixed code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
List<TableMeta> tableMetaList = CodeGenHelpler.createMetaBuilder().build();
CodeGenHelpler.excludeTables(tableMetaList, excludeTables);
new JbootServiceIn... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void set(String key, String value) {
Jboot.getJbootCache().put(cache_name, key, value);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public void set(String key, String value) {
Jboot.getCache().put(cache_name, key, value);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
// Aop.get(obj.getClass()) 可以用 Aop.inject(obj),所以注掉下一行代码
// targetClass = (Class<T>)getUsefulClass(targetClass);
targetClass = (Clas... | #fixed code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
return doGet(targetClass);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public M getCache(Object key) {
return Jboot.getJbootCache().get(tableName(), key);
}
#location 2
#vulnerability type NULL_DEREFERENCE | #fixed code
public M getCache(Object key) {
return Jboot.getCache().get(tableName(), key);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public List<M> getListCache(Object key, IDataLoader dataloader) {
return Jboot.getJbootCache().get(tableName(), key, dataloader);
}
#location 2
#vulnerability type NULL_DEREFERENCE | #fixed code
public List<M> getListCache(Object key, IDataLoader dataloader) {
return Jboot.getCache().get(tableName(), key, dataloader);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void copyConnStreamToResponse(HttpURLConnection conn, HttpServletResponse resp) throws IOException {
InputStream inStream = null;
InputStreamReader reader = null;
try {
if (!resp.isCommitted()) {
PrintWriter wr... | #fixed code
private void copyConnStreamToResponse(HttpURLConnection conn, HttpServletResponse resp) throws IOException {
if (resp.isCommitted()) {
return;
}
InputStream inStream = null;
OutputStream outStream = null;
try {
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void removeCache(Object key) {
if (key == null) return;
Jboot.getJbootCache().remove(tableName(), key);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
public void removeCache(Object key) {
if (key == null) return;
Jboot.getCache().remove(tableName(), key);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public String get(String key) {
return Jboot.getJbootCache().get(cache_name, key);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public String get(String key) {
return Jboot.getCache().get(cache_name, key);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void handle(String target, HttpServletRequest request, HttpServletResponse response, boolean[] isHandled) {
if (target.indexOf('.') != -1 || JbootWebsocketManager.me().containsEndPoint(target)) {
return;
}
/**
... | #fixed code
@Override
public void handle(String target, HttpServletRequest request, HttpServletResponse response, boolean[] isHandled) {
if (target.indexOf('.') != -1 || JbootWebsocketManager.me().isWebsokcetEndPoint(target)) {
return;
}
/**
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
static void putDataToCache(int liveSeconds, String cacheName, String cacheKey, Object data) {
liveSeconds = liveSeconds > 0
? liveSeconds
: CONFIG.getAopCacheLiveSeconds();
if (liveSeconds > 0) {
getAopCache()... | #fixed code
static void putDataToCache(int liveSeconds, String cacheName, String cacheKey, Object data) {
liveSeconds = liveSeconds > 0
? liveSeconds
: CONFIG.getAopCacheLiveSeconds();
if (liveSeconds > 0) {
AopCache.put(cacheN... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void run() {
Long result = null;
for (int i = 0; i < 6; i++) {
result = redis.setnx(key, "locked");
//error
if (result == null) {
quietSleep();
}
//setnx... | #fixed code
@Override
public void run() {
if (redis == null) {
return;
}
Long result = null;
for (int i = 0; i < 5; i++) {
Long setTimeMillis = System.currentTimeMillis();
result = redis.setnx(key, setTimeMillis)... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
// Aop.get(obj.getClass()) 可以用 Aop.inject(obj),所以注掉下一行代码
// targetClass = (Class<T>)getUsefulClass(targetClass);
targetClass = (Clas... | #fixed code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
return doGet(targetClass);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void intercept(FixedInvocation inv) {
if (!config.isConfigOK()) {
inv.invoke();
return;
}
SsoShiroBridge ssoShiroBridge = JbootShiroManager.me().getSsoShiroBridge();
if (ssoShiroBridge != null... | #fixed code
@Override
public void intercept(FixedInvocation inv) {
if (!config.isConfigOK()) {
inv.invoke();
return;
}
SsoShiroBridge ssoShiroBridge = JbootShiroManager.me().getSsoShiroBridge();
if (ssoShiroBridge != null && ss... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private static void copyStreamToResponse(HttpURLConnection connection, HttpServletResponse response) throws IOException {
InputStream inStream = null;
try {
if (!response.isCommitted()) {
PrintWriter writer = response.getWrite... | #fixed code
private static void copyStreamToResponse(HttpURLConnection connection, HttpServletResponse response) throws IOException {
InputStream inStream = null;
InputStreamReader reader = null;
try {
if (!response.isCommitted()) {
Pri... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public M getCache(Object key, IDataLoader dataloader) {
return Jboot.getJbootCache().get(tableName(), key, dataloader);
}
#location 2
#vulnerability type NULL_DEREFERENCE | #fixed code
public M getCache(Object key, IDataLoader dataloader) {
return Jboot.getCache().get(tableName(), key, dataloader);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
// Aop.get(obj.getClass()) 可以用 Aop.inject(obj),所以注掉下一行代码
// targetClass = (Class<T>)getUsefulClass(targetClass);
targetClass = (Clas... | #fixed code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
return doGet(targetClass);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void removeAttribute(String name) {
Jboot.getJbootCache().remove(SESSION_CACHE_NAME, buildKey(name));
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public void removeAttribute(String name) {
Jboot.getCache().remove(SESSION_CACHE_NAME, buildKey(name));
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public byte[] serialize(Object obj) throws IOException {
return Jboot.me().getSerializer().serialize(obj);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public byte[] serialize(Object obj) throws IOException {
return SerializerManager.me().getSerializer(config.getSerializer()).serialize(obj);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testHttp() {
JbootHttpResponse response = Jboot.me().getHttp().handle(JbootHttpRequest.create("https://www.baidu.com"));
System.out.println(response.getContentType());
System.out.println(response.getHeaders());
}
... | #fixed code
@Test
public void testHttp() {
// JbootHttpResponse response = Jboot.me().getHttp().handle(JbootHttpRequest.create("https://www.baidu.com"));
//
// System.out.println(response.getContentType());
// System.out.println(response.getHeaders());
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void remove(String key) {
Jboot.getJbootCache().remove(cache_name, key);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public void remove(String key) {
Jboot.getCache().remove(cache_name, key);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public int getErrorCode() {
return (int) get("errorCode");
}
#location 2
#vulnerability type NULL_DEREFERENCE | #fixed code
public int getErrorCode() {
return errorCode;
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void doProcess(JbootHttpRequest request, JbootHttpResponse response) {
HttpURLConnection connection = null;
InputStream stream = null;
try {
connection = getConnection(request);
configConnection(connection, reques... | #fixed code
private void doProcess(JbootHttpRequest request, JbootHttpResponse response) {
HttpURLConnection connection = null;
InputStream stream = null;
try {
connection = getConnection(request);
configConnection(connection, request);
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
DataSource dataSource = CodeGenHelpler.getDatasource();
List<TableMeta> tableMetaList = new MetaBuilder(dataSource).build();
CodeGenHelpler.excludeTa... | #fixed code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
List<TableMeta> tableMetaList = CodeGenHelpler.createMetaBuilder().build();
CodeGenHelpler.excludeTables(tableMetaList, excludeTables);
generate(tableMeta... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private static void copyStreamToResponse(HttpURLConnection connection, HttpServletResponse response) throws IOException {
InputStream inStream = null;
try {
if (!response.isCommitted()) {
PrintWriter writer = response.getWrite... | #fixed code
private static void copyStreamToResponse(HttpURLConnection connection, HttpServletResponse response) throws IOException {
InputStream inStream = null;
InputStreamReader reader = null;
try {
if (!response.isCommitted()) {
Pri... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static void unzip(String zipFilePath, String targetPath) throws IOException {
ZipFile zipFile = new ZipFile(zipFilePath);
try{
Enumeration<?> entryEnum = zipFile.entries();
if (null != entryEnum) {
while (entryEnum.hasMoreElements()) {
OutputStrea... | #fixed code
public static void unzip(String zipFilePath, String targetPath) throws IOException {
unzip(zipFilePath, targetPath, true);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
DatasourceConfig datasourceConfig = JbootProperties.get("jboot.datasource", DatasourceConfig.class);
HikariConfig config = new HikariConfig();
confi... | #fixed code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
DataSource dataSource = CodeGenHelpler.getDatasource();
List<TableMeta> tableMetaList = new MetaBuilder(dataSource).build();
CodeGenHelpler.excludeTables(t... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public Object getValue(String name) {
return Jboot.getJbootCache().get(SESSION_CACHE_NAME, buildKey(name));
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public Object getValue(String name) {
return Jboot.getCache().get(SESSION_CACHE_NAME, buildKey(name));
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void put(String cacheName, Object key, Object value) {
try {
ehcache.put(cacheName, key, value);
redisCache.put(cacheName, key, value);
} finally {
Jboot.me().getMq().publish(new JbootEhredisMessag... | #fixed code
@Override
public void put(String cacheName, Object key, Object value) {
try {
ehcache.put(cacheName, key, value);
redisCache.put(cacheName, key, value);
} finally {
publishMessage(JbootEhredisMessage.ACTION_PUT, cacheNam... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public boolean isConfigOk() {
if (configOk != null) {
return configOk;
}
synchronized (this) {
if (configOk == null) {
configOk = StrUtil.isNotBlank(uri);
if (configOk) {
... | #fixed code
public boolean isConfigOk() {
if (configOk != null) {
return configOk;
}
synchronized (this) {
if (configOk == null) {
configOk = uri != null && uri.length > 0;
if (configOk) {
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void init() {
getJbootrpc().onInitBefore();
if (config.isAutoExportEnable()) {
autoExportRPCBean();
}
getJbootrpc().onInited();
}
#location 3
#vulnerabili... | #fixed code
public void init() {
if (!defaultConfig.isConfigOk()) {
return;
}
Jbootrpc jbootrpc = getJbootrpc();
jbootrpc.onInitBefore();
if (defaultConfig.isAutoExportEnable()) {
exportRPCBean(jbootrpc);
}
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void doGenerate(String excludeTables) {
String modelPackage = basePackage;
String baseModelPackage = basePackage + ".base";
String modelDir = PathKit.getWebRootPath() + "/src/main/java/" + modelPackage.replace(".", "/");
String b... | #fixed code
public void doGenerate(String excludeTables) {
String modelPackage = basePackage;
String baseModelPackage = basePackage + ".base";
String modelDir = PathKit.getWebRootPath() + "/src/main/java/" + modelPackage.replace(".", "/");
String baseMod... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheNam... | #fixed code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheName = An... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void index() {
List<Record> records = Db.find("select * from `user`");
System.out.println("index .... ");
LogKit.error("xxxxxxx");
Jboot.getCache().put("test","test","valueeeeeeeeee");
String value = Jboot.getCache().... | #fixed code
public void index() {
renderText("hello " + serviceTest.getName("aaa"));
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void remove(String cacheName, Object key) {
try {
ehcache.remove(cacheName, key);
redisCache.remove(cacheName, key);
} finally {
Jboot.me().getMq().publish(new JbootEhredisMessage(clientId, JbootEh... | #fixed code
@Override
public void remove(String cacheName, Object key) {
try {
ehcache.remove(cacheName, key);
redisCache.remove(cacheName, key);
} finally {
publishMessage(JbootEhredisMessage.ACTION_REMOVE, cacheName, key);
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void inject(Class<?> targetClass, Object targetObject, int injectDepth) throws ReflectiveOperationException {
if ((injectDepth--) <= 0) {
return;
}
targetClass = getUsefulClass(targetClass);
Field[] field... | #fixed code
@Override
public void inject(Class<?> targetClass, Object targetObject, int injectDepth) throws ReflectiveOperationException {
if ((injectDepth--) <= 0) {
return;
}
targetClass = getUsefulClass(targetClass);
Field[] fields = ta... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheNam... | #fixed code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheName = An... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private static void findClassPathsAndJarsByClassPath(Set<String> jarPaths, Set<String> classPaths) {
String[] classPathArray = System.getProperty("java.class.path").split(File.pathSeparator);
for (String path : classPathArray) {
path = path.t... | #fixed code
private static void findClassPathsAndJarsByClassPath(Set<String> jarPaths, Set<String> classPaths) {
String classPath = System.getProperty("java.class.path");
if (classPath == null || classPath.trim().length() == 0) {
return;
}
Stri... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
DatasourceConfig datasourceConfig = JbootProperties.get("jboot.datasource", DatasourceConfig.class);
HikariConfig config = new HikariConfig();
confi... | #fixed code
public void doGenerate(String excludeTables) {
System.out.println("start generate...");
DataSource dataSource = CodeGenHelpler.getDatasource();
List<TableMeta> tableMetaList = new MetaBuilder(dataSource).build();
CodeGenHelpler.excludeTables(t... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void putValue(String name, Object value) {
Jboot.getJbootCache().put(SESSION_CACHE_NAME, buildKey(name), value);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public void putValue(String name, Object value) {
Jboot.getCache().put(SESSION_CACHE_NAME, buildKey(name), value);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void removeAll(String cacheName) {
try {
ehcache.removeAll(cacheName);
redisCache.removeAll(cacheName);
} finally {
Jboot.me().getMq().publish(new JbootEhredisMessage(clientId, JbootEhredisMessage.... | #fixed code
@Override
public void removeAll(String cacheName) {
try {
ehcache.removeAll(cacheName);
redisCache.removeAll(cacheName);
} finally {
publishMessage(JbootEhredisMessage.ACTION_REMOVE_ALL, cacheName, null);
}
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheNam... | #fixed code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheName = An... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public boolean acquire() {
long timeout = timeoutMsecs;
do {
long expires = System.currentTimeMillis() + expireMsecs + 1;
Long result = Jboot.me().getRedis().setnx(lockName, expires);
if (result != null && result == ... | #fixed code
public boolean acquire() {
long timeout = timeoutMsecs;
do {
long expires = System.currentTimeMillis() + expireMsecs + 1;
Long result = redis.setnx(lockName, expires);
if (result != null && result == 1) {
/... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
private void publishMessage(int action, String cacheName, Object key) {
Jboot.me().getMq().publish(new JbootEhredisMessage(clientId, action, cacheName, key), channel);
}
#location 2
#vulnerability typ... | #fixed code
private void publishMessage(int action, String cacheName, Object key) {
JbootEhredisMessage message = new JbootEhredisMessage(clientId, action, cacheName, key);
redis.publish(serializer.serialize(channel), serializer.serialize(message));
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public Object getAttribute(String name) {
return Jboot.getJbootCache().get(SESSION_CACHE_NAME, buildKey(name));
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public Object getAttribute(String name) {
return Jboot.getCache().get(SESSION_CACHE_NAME, buildKey(name));
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public static <T> T service(Class<T> clazz, String group, String version) {
return me().getRpc().serviceObtain(clazz, group, version);
}
#location 2
#vulnerability type NULL_DEREFERENCE | #fixed code
public static <T> T service(Class<T> clazz, String group, String version) {
return jboot.getRpc().serviceObtain(clazz, group, version);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void doGenerate(String excludeTables) {
String modelPackage = basePackage ;
String baseModelPackage = basePackage + ".base";
String modelDir = PathKit.getWebRootPath() + "/src/main/java/" + modelPackage.replace(".", "/");
String ... | #fixed code
public void doGenerate(String excludeTables) {
String modelPackage = basePackage;
String baseModelPackage = basePackage + ".base";
String modelDir = PathKit.getWebRootPath() + "/src/main/java/" + modelPackage.replace(".", "/");
String baseMod... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void setAttribute(String name, Object value) {
Jboot.getJbootCache().put(SESSION_CACHE_NAME, buildKey(name), value);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public void setAttribute(String name, Object value) {
Jboot.getCache().put(SESSION_CACHE_NAME, buildKey(name), value);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public <T> T get(Class<T> clazz, String prefix, String file) {
/**
* 开发模式下,热加载会导致由于Config是不同的 ClassLoader,
* 如果走缓存会Class转化异常
*/
if (JbootApplication.isDevMode()) {
return createConfigObject(clazz, prefix, file);
... | #fixed code
public <T> T get(Class<T> clazz, String prefix, String file) {
/**
* 开发模式下,热加载会导致由于Config是不同的 ClassLoader,
* 如果走缓存会Class转化异常
*/
if (isDevMode()) {
return createConfigObject(clazz, prefix, file);
}
Object... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public <T> T get(Class<T> clazz, String prefix, String file) {
/**
* 开发模式下,热加载会导致由于Config是不同的 ClassLoader,
* 如果走缓存会Class转化异常
*/
if (isDevMode()) {
return createConfigObject(clazz, prefix, file);
}
... | #fixed code
public <T> T get(Class<T> clazz, String prefix, String file) {
/**
* 开发模式下,热加载会导致由于 Config 是不同的 ClassLoader 而导致异常,
* 如果走缓存会Class转化异常
*/
if (isDevMode()) {
return createConfigObject(clazz, prefix, file);
}
... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
protected void doInject(Class<?> targetClass, Object targetObject, int injectDepth) throws ReflectiveOperationException {
if ((injectDepth--) <= 0) {
return;
}
targetClass = getUsefulClass(targetClass);
Field[] ... | #fixed code
@Override
protected void doInject(Class<?> targetClass, Object targetObject, int injectDepth) throws ReflectiveOperationException {
if ((injectDepth--) <= 0) {
return;
}
targetClass = getUsefulClass(targetClass);
Field[] fields... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheNam... | #fixed code
static void doCacheEvict(Object[] arguments, Class targetClass, Method method, CacheEvict evict) {
String unless = AnnotationUtil.get(evict.unless());
if (Utils.isUnless(unless, method, arguments)) {
return;
}
String cacheName = An... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
// Aop.get(obj.getClass()) 可以用 Aop.inject(obj),所以注掉下一行代码
// targetClass = (Class<T>)getUsefulClass(targetClass);
targetClass = (Clas... | #fixed code
@Override
protected <T> T doGet(Class<T> targetClass, int injectDepth) throws ReflectiveOperationException {
return doGet(targetClass);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testRedis() {
Jboot.setBootArg("jboot.redis.host", "127.0.0.1");
// Jboot.setBootArg("jboot.redis.password", "123456");
JbootRedis redis = Jboot.me().getRedis();
redis.set("mykey", "myvalue");
redis.lpush("... | #fixed code
@Test
public void testRedis() {
// Jboot.setBootArg("jboot.redis.host", "127.0.0.1");
//// Jboot.setBootArg("jboot.redis.password", "123456");
//
// JbootRedis redis = Jboot.me().getRedis();
// redis.set("mykey", "myvalue");
//
// redis... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public void inject(Class<?> targetClass, Object targetObject, int injectDepth) throws ReflectiveOperationException {
if ((injectDepth--) <= 0) {
return;
}
targetClass = getUsefulClass(targetClass);
Field[] field... | #fixed code
@Override
public void inject(Class<?> targetClass, Object targetObject, int injectDepth) throws ReflectiveOperationException {
if ((injectDepth--) <= 0) {
return;
}
targetClass = getUsefulClass(targetClass);
Field[] fields = ta... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Override
public <T> T deserialize(byte[] bytes, Class<T> clz) throws IOException {
return (T) Jboot.me().getSerializer().deserialize(bytes);
}
#location 3
#vulnerability type NULL_DEREFERENCE | #fixed code
@Override
public <T> T deserialize(byte[] bytes, Class<T> clz) throws IOException {
return (T) SerializerManager.me().getSerializer(config.getSerializer()).deserialize(bytes);
} | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
@Test
public void testHttpDownload() {
String url = "http://www.xxx.com/abc.zip";
File downloadToFile = new File("/xxx/abc.zip");
JbootHttpRequest request = JbootHttpRequest.create(url, null, JbootHttpRequest.METHOD_GET);
request.... | #fixed code
@Test
public void testHttpDownload() {
// String url = "http://www.xxx.com/abc.zip";
//
// File downloadToFile = new File("/xxx/abc.zip");
//
//
// JbootHttpRequest request = JbootHttpRequest.create(url, null, JbootHttpRequest.METHOD_GET);
// ... | Below is the vulnerable code, please generate the patch based on the following information. |
#vulnerable code
public void putCache(Object key, Object value) {
Jboot.getJbootCache().put(tableName(), key, value);
}
#location 2
#vulnerability type NULL_DEREFERENCE | #fixed code
public void putCache(Object key, Object value) {
Jboot.getCache().put(tableName(), key, value);
} | Below is the vulnerable code, please generate the patch based on the following information. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.