code
stringlengths
12
2.05k
label_name
stringclasses
5 values
label
int64
0
4
it "fails when user is suspended" do user.update!( suspended_till: 2.days.from_now, suspended_at: Time.zone.now ) get "/session/email-login/#{email_token.token}" expect(response.status).to eq(200) expect(CGI.unescapeHTML(response.body)).to include(I18...
Class
2
it "adds the server to the list" do cluster.sync_server server cluster.servers.should include server end
Class
2
def test_attr_wrapper assert_equal("<p strange=*attrs*></p>\n", render("%p{ :strange => 'attrs'}", :attr_wrapper => '*')) assert_equal("<p escaped='quo\"te'></p>\n", render("%p{ :escaped => 'quo\"te'}", :attr_wrapper => '"')) assert_equal("<p escaped=\"quo'te\"></p>\n", render("%p{ :escaped => 'quo\\'te'}...
Base
1
it "returns the query" do query.limit(5).should eql query end
Class
2
it "returns the document" do session.simple_query(query).should eq(a: 1) end
Class
2
it "doesn't log in the user when not approved" do SiteSetting.must_approve_users = true get "/session/email-login/#{email_token.token}" expect(response.status).to eq(200) expect(CGI.unescapeHTML(response.body)).to include( I18n.t("login.not_approved") ) e...
Class
2
def authorized?(request) origin_host = request.get_header("HTTP_HOST")&.slice(VALID_ORIGIN_HOST, 1) || "" forwarded_host = request.x_forwarded_host&.slice(VALID_FORWARDED_HOST, 1) || "" @permissions.allows?(origin_host) && (forwarded_host.blank? || @permissions.allows?(forwarded_host)) ...
Base
1
def create Log.add_info(request, params.inspect) parent_id = params[:selectedFolderId] if params[:thetisBoxEdit].nil? or params[:thetisBoxEdit].empty? @mail_folder = nil else @mail_folder = MailFolder.new @mail_folder.name = params[:thetisBoxEdit] @mail_folder.parent_id = par...
Base
1
def find(uuid, options = {}) if uuid.nil? || uuid.to_s.empty? raise NotFound, "can't find a record with nil identifier" end uri = uuid =~ /^http/ ? uuid : member_path(uuid) begin from_response API.get(uri, {}, options) rescue API::NotFound => e ...
Base
1
it "changes the $orderby" do query.sort(a: 1) query.sort(a: 2) query.operation.selector.should eq( "$query" => selector, "$orderby" => { a: 2 } ) end
Class
2
it "recognizes and generates #index" do { :get => "/users" }.should route_to(:controller => "users", :action => "index") end
Class
2
def self.get_my_folder(user_id) SqlHelper.validate_token([user_id]) return Folder.where("(owner_id=#{user_id}) and (xtype='#{Folder::XTYPE_USER}')").first end
Base
1
def update @campaign.update(campaign_params) end
Base
1
def self.get_childs(folder_id, conditions, recursive, admin, ret_obj) SqlHelper.validate_token([folder_id]) arr = [] if recursive folder_tree = Folder.get_tree(Hash.new, conditions, folder_id, admin) return [] if folder_tree.nil? folder_tree.each do |parent_id, childs| if ret...
Base
1
it "removes the first matching document" do session.should_receive(:with, :consistency => :strong). and_yield(session) session.should_receive(:execute).with do |delete| delete.flags.should eq [:remove_first] delete.selector.should eq query.operation.selector end que...
Class
2
def merge(server) previous = servers.find { |other| other == server } primary = server.primary? secondary = server.secondary? if previous previous.merge(server) else servers << server end end
Class
2
it 'supports group' do topic = Fabricate(:topic, created_at: 3.months.ago) post = Fabricate(:post, raw: 'hi this is a test 123 123', topic: topic) group = Group.create!(name: "Like_a_Boss") GroupUser.create!(user_id: post.user_id, group_id: group.id) expect(Search.execute('group:like...
Class
2
def schedule_all Log.add_info(request, params.inspect) date_s = params[:date] if date_s.nil? or date_s.empty? @date = Date.today else @date = Date.parse(date_s) end if @login_user.nil? or params[:display].nil? or params[:display] == 'all' params[:display] = 'all' con ...
Base
1
def stub_dummy_jwks stub_request(:get, 'https://example.org/.well-known/jwks.json') .to_return( headers: { 'Content-Type' => 'application/json' }, body: rsa_token_jwks, status: 200 ) end
Base
1
def self.get_group_value(group_id, category, key) SqlHelper.validate_token([group_id, category, key]) con = [] con << "(group_id=#{group_id})" con << "(category='#{category}')" con << "(xkey='#{key}')" setting = Setting.where(con.join(' and ')).first return setting.xvalue unless settin...
Base
1
def reset_password @admin_user = Motor::AdminUser.find(params[:admin_user_id]) authorize!(:manage, @admin_user) Devise::Mailer.default_url_options = { host: request.host, protocol: request.protocol, port: request.port } @admin_user.send_reset_password_instructions head :ok end
Class
2
def apply(operations) operations.inject(self) do |builder, (name, argument)| if argument == true || argument == nil builder.send(name) elsif argument.is_a?(Array) builder.send(name, *argument) elsif argument.is_a?(Hash) builder.send(name, **argument) ...
Base
1
def package_index valid_http_methods :get required_parameters :project, :repository, :arch, :package # read access permission check if params[:package] == "_repository" prj = DbProject.get_by_name params[:project], use_source=false else pkg = DbPackage.get_by_project_and_name params[:...
Class
2
def self.get_tree(folder_tree, conditions, parent, admin) if parent.instance_of?(Folder) tree_id = parent.id.to_s else tree_id = parent.to_s parent = nil if tree_id != '0' begin parent = Folder.find(tree_id) rescue end return folder_tree if pa...
Base
1
def html_postprocess(_field, html) html end
Base
1
def get_local_node_id() if ISRHEL6 out, errout, retval = run_cmd( PCSAuth.getSuperuserSession, COROSYNC_CMAPCTL, "cluster.cman" ) if retval != 0 return "" end match = /cluster\.nodename=(.*)/.match(out.join("\n")) if not match return "" end local_node_name = match[1] ...
Compound
4
def get_wizard(params, request, session) if not allowed_for_local_cluster(session, Permissions::READ) return 403, 'Permission denied' end wizard = PCSDWizard.getWizard(params["wizard"]) if wizard != nil return erb wizard.collection_page else return "Error finding Wizard - #{params["wizard"]}" en...
Compound
4
def add_acl_remote(params, request, session) if not allowed_for_local_cluster(session, Permissions::GRANT) return 403, 'Permission denied' end if params["item"] == "permission" retval = add_acl_permission( session, params["role_id"], params["type"], params["xpath_id"], params["query_id"] )...
Compound
4
def test_update_invalid Subnet.any_instance.stubs(:valid?).returns(false) put :update, {:id => Subnet.first, :subnet => {:network => nil}}, set_session_user assert_template 'edit' end
Class
2
it "yields a session" do session.with(new_options) do |new_session| new_session.should be_a Moped::Session end end
Class
2
it "returns all other known hosts" do cluster.sync_server(server).should =~ ["localhost:61085", "localhost:61086", "localhost:61084"] end
Class
2
def media_type_mismatch? ! supplied_file_media_types.include?(calculated_media_type) end
Base
1
def accepts?(env) session = session env token = session[:csrf] ||= session['_csrf_token'] || random_string safe?(env) || env['HTTP_X_CSRF_TOKEN'] == token || Request.new(env).params[options[:authenticity_param]] == token end
Base
1
def update_groups_order Log.add_info(request, params.inspect) order_ary = params[:groups_order] Research.set_statistics_groups order_ary render(:text => '') end
Base
1
it "should raise an error if the image fails to be processed when downloaded" do stub_request(:get, "www.example.com/test.jpg").to_return(body: File.read(file_path("test.jpg"))) expect(running { @instance.remote_image_url = "http://www.example.com/test.jpg" }).to raise_error(CarrierWave::...
Base
1
def resource_clone(params, request, session) if not allowed_for_local_cluster(session, Permissions::WRITE) return 403, 'Permission denied' end unless params[:resource_id] return [400, 'resource_id has to be specified.'] end _, stderr, retval = run_cmd( session, PCS, 'resource', 'clone', params...
Compound
4
def attachments_without_content return [] if self.id.nil? sql = 'select id, title, memo, name, size, content_type, comment_id, xorder, location from attachments' sql << ' where comment_id=' + self.id.to_s sql << ' order by xorder ASC' begin attachments = Attachment.find_by_sql(sql) res...
Base
1
def self.destroy_by_user(user_id, add_con=nil) SqlHelper.validate_token([user_id]) con = "user_id=#{user_id}" con << " and (#{add_con})" unless add_con.nil? or add_con.empty? emails = Email.where(con).to_a emails.each do |email| email.destroy end end
Base
1
def resource_change_group(params, request, session) if not allowed_for_local_cluster(session, Permissions::WRITE) return 403, 'Permission denied' end if params[:resource_id].nil? or params[:group_id].nil? return [400, 'resource_id and group_id have to be specified.'] end if params[:group_id].empty? ...
Compound
4
it "does not re-sync the cluster" do cluster.should_receive(:sync).never cluster.socket_for :write end
Class
2
def mime_magic_content_type(new_file) content_type = nil File.open(new_file.path) do |fd| content_type = Marcel::MimeType.for(fd) end content_type end
Base
1
def generate(time, inc = 0) pid = Process.pid % 0xFFFF [ time >> 24 & 0xFF, # 4 bytes time (network order) time >> 16 & 0xFF, time >> 8 & 0xFF, time & 0xFF, @machine_id[0], # 3 bytes machine @machine_id[1], ...
Class
2
def remove_constraint(session, constraint_id) stdout, stderror, retval = run_cmd( session, PCS, "constraint", "remove", constraint_id ) $logger.info stdout return retval end
Compound
4
def restrict_user_fields?(user) user.trust_level == TrustLevel[0] && anonymous? end
Class
2
def ajax_delete_mails Log.add_info(request, params.inspect) folder_id = params[:id] mail_account_id = params[:mail_account_id] unless params[:check_mail].blank? mail_folder = MailFolder.find(folder_id) trash_folder = MailFolder.get_for(@login_user, mail_account_id, MailFolder::XTYPE_TRAS...
Base
1
it "executes a count command" do database.should_receive(:command).with( count: collection.name, query: selector ).and_return("n" => 4) query.count end
Class
2
def make_hs256_token(payload = nil) payload = { sub: 'abc123' } if payload.nil? JWT.encode payload, client_secret, 'HS256' end
Base
1
def email user_info['email'] || id_info['email'] end
Base
1
def test_put uri = URI('http://localhost:6470/makeme') req = Net::HTTP::Put.new(uri) # Set the headers the way we want them. req['Accept-Encoding'] = '*' req['Accept'] = 'application/json' req['User-Agent'] = 'Ruby' req.body = 'hello' res = Net::HTTP.start(uri.hostname, uri.port) ...
Base
1
def original_filename filename = filename_from_header || filename_from_uri mime_type = MiniMime.lookup_by_content_type(file.content_type) unless File.extname(filename).present? || mime_type.blank? filename = "#{filename}.#{mime_type.extension}" end filename ...
Base
1
def test_nest get :nest, {:id => Hostgroup.first.id}, set_session_user assert_template 'new' end
Class
2
def self.get_from_name(user_name) SqlHelper.validate_token([user_name]) begin user = User.where("name='#{user_name}'").first rescue => evar Log.add_error(nil, evar) end return user end
Base
1
def test_extract_symlink_parent skip 'symlink not supported' if Gem.win_platform? package = Gem::Package.new @gem tgz_io = util_tar_gz do |tar| tar.mkdir 'lib', 0755 tar.add_symlink 'lib/link', '../..', 0644 tar.add_file 'lib/link/outside.txt', 0644 do |io| io.write 'h...
Base
1
def self.get_using_size(mail_account_id, add_con=nil) SqlHelper.validate_token([mail_account_id]) con = [] con << "(mail_account_id=#{mail_account_id})" con << "(#{add_con})" unless add_con.nil? or add_con.empty? return (Email.count_by_sql("select SUM(size) from emails where #{con.join(' and ')...
Base
1
it "has an empty list of dynamic seeds" do cluster.dynamic_seeds.should be_empty end
Class
2
def self.get_next_revision(user_id, source_id) copied_items = Item.where("user_id=#{user_id} and source_id=#{source_id}").order('created_at DESC').to_a rev = 0 copied_items.each do |item| rev_ary = item.title.scan(/[#](\d\d\d)$/) next if rev_ary.nil? rev = rev_ary.first.to_a.first.to_i...
Base
1
def fence_device_form(params, request, session) if not allowed_for_local_cluster(session, Permissions::READ) return 403, 'Permission denied' end @cur_resource = get_resource_by_id(params[:resource], get_cib_dom(session)) if @cur_resource.instance_of?(ClusterEntity::Primitive) and @cur_resource.stonith ...
Compound
4
def resource_ungroup(params, request, session) if not allowed_for_local_cluster(session, Permissions::WRITE) return 403, 'Permission denied' end unless params[:group_id] return [400, 'group_id has to be specified.'] end _, stderr, retval = run_cmd( session, PCS, 'resource', 'ungroup', params[:...
Compound
4
it 'should escape the content of removed `plaintext` elements' do Sanitize.fragment('<plaintext>hello! <script>alert(0)</script>') .must_equal 'hello! &lt;script&gt;alert(0)&lt;/script&gt;' end
Base
1
it 'should return the right response' do email_token.update!(created_at: 999.years.ago) get "/session/email-login/#{email_token.token}" expect(response.status).to eq(200) expect(CGI.unescapeHTML(response.body)).to match( I18n.t('email_login.invalid_token') ...
Class
2
def self.get_value(user_id, category, key) SqlHelper.validate_token([user_id, category, key]) con = [] con << "(user_id=#{user_id})" con << "(category='#{category}')" con << "(xkey='#{key}')" setting = Setting.where(con.join(' and ')).first return setting.xvalue unless setting.nil? ...
Base
1
def actions if params[:media_action] != 'crop_url' authorize! :manage, :media end params[:folder] = params[:folder].gsub("//", "/") if params[:folder].present? case params[:media_action] when "new_folder" params[:folder] = slugify_folder(params[:folder]) render partial: "re...
Base
1
def login_success if params[:ref].blank? redirect_to default_logged_in_path elsif params[:ref] =~ /^\// redirect_to params[:ref] else render "sns/login/redirect" end end
Base
1
def update_config Log.add_info(request, params.inspect) @yaml = ApplicationHelper.get_config_yaml unless params[:desktop].nil? or params[:desktop].empty? @yaml[:desktop] = Hash.new if @yaml[:desktop].nil? params[:desktop].each do |key, val| @yaml[:desktop][key] = val end ...
Base
1
it "raises a QueryFailure exception" do expect { session.query(query) }.to raise_exception(Moped::Errors::QueryFailure) end
Class
2
def rs256_decode_key(kid) jwks_x5c = jwks_key(:x5c, kid) if jwks_x5c.nil? raise OmniAuth::Auth0::TokenValidationError.new("Could not find a public key for Key ID (kid) '#{kid}''") end jwks_public_cert(jwks_x5c.first) end
Base
1
def login(database, username, password) auth[database.to_s] = [username, password] end
Class
2
it 'should escape the content of removed `xmp` elements' do Sanitize.fragment('<xmp>hello! <script>alert(0)</script></xmp>') .must_equal 'hello! &lt;script&gt;alert(0)&lt;/script&gt;' end
Base
1
it "has an empty list of primaries" do cluster.primaries.should be_empty end
Class
2
it "drops the collection" do database.should_receive(:command).with(drop: :users) collection.drop end
Class
2
def timeline unless params[:type].empty? model = params[:type].camelize.constantize item = model.find(params[:id]) item.update_attribute(:state, params[:state]) else comments, emails = params[:id].split("+") Comment.update_all("state = '#{params[:state]}'", "id IN (#{comments})")...
Base
1
it "does not change the original session's options" do original_options = options.dup session.with(new_options) do |new_session| session.options.should eql original_options end end
Class
2
def set_node_utilization(params, reqest, session) unless allowed_for_local_cluster(session, Permissions::WRITE) return 403, 'Permission denied' end unless params[:node] and params[:name] return 400, 'node and name are required' end node = params[:node] name = params[:name] value = params[:value]...
Compound
4
def update_auth Log.add_info(request, params.inspect) return unless request.post? auth = nil if params[:check_auth_all] == '1' auth = User::AUTH_ALL else auth_selected = params[:auth_selected] unless auth_selected.nil? or auth_selected.empty? auth = '|' + auth_sele...
Base
1
def test_attr_wrapper assert_equal("<p strange=*attrs*></p>\n", render("%p{ :strange => 'attrs'}", :attr_wrapper => '*')) assert_equal("<p escaped='quo\"te'></p>\n", render("%p{ :escaped => 'quo\"te'}", :attr_wrapper => '"')) assert_equal("<p escaped=\"quo'te\"></p>\n", render("%p{ :escaped => 'quo\\'te'}...
Base
1
def test_update_valid Subnet.any_instance.stubs(:valid?).returns(true) put :update, {:id => Subnet.first, :subnet => {:network => '192.168.100.10'}}, set_session_user assert_equal '192.168.100.10', Subnet.first.network assert_redirected_to subnets_url end
Class
2
def _extend_marshalling(options) @marshalling = !(options[:marshalling] === false) # HACK - TODO delegate to Factory extend Marshalling if @marshalling end
Base
1
it "stores the options provided" do session.options.should eq(options) end
Class
2
def __bson_dump__(io, key) io << Types::OBJECT_ID io << key io << NULL_BYTE io << data.pack('C12') end
Class
2
def set_workflow Log.add_info(request, params.inspect) @item = Item.find(params[:id]) orders_hash = params.dup orders_hash.reject! { |key, value| key.index(/order-/) != 0 } orders_hash.sort_by { |key, value| key.split('-').last.to_i } orders = [] orders_hash.each do ...
Base
1
def edit Log.add_info(request, params.inspect) @group_id = params[:group_id] official_title_id = params[:id] unless official_title_id.nil? or official_title_id.empty? @official_title = OfficialTitle.find(official_title_id) end render(:partial => 'ajax_official_title_form', :layout => ...
Base
1
it "returns a session" do session.with(new_options).should be_a Moped::Session end
Class
2
def create Log.add_info(request, params.inspect) if params[:thetisBoxEdit].nil? or params[:thetisBoxEdit].empty? @group = nil else @group = Group.new @group.name = params[:thetisBoxEdit] @group.parent_id = params[:selectedGroupId] @group.save! @group.create_group_fol...
Base
1
def check_member return if params[:id].nil? or params[:id].empty? or @login_user.nil? if Item.find(params[:id]).user_id != @login_user.id Log.add_check(request, '[check_member]'+request.to_s) flash[:notice] = t('team.need_to_be_member') redirect_to(:controller => 'desktop', :action => 'sh...
Base
1
it "returns a hex string representation of the id" do Moped::BSON::ObjectId.new(bytes).to_s.should eq "4e4d66343b39b68407000001" end
Class
2
it "with dofollowify enabled, links should be nofollowed" do @blog.dofollowify = true @blog.save expect(nofollowify_links('<a href="http://myblog.net">my blog</a>')). to eq('<a href="http://myblog.net">my blog</a>') end
Base
1
def send_password Log.add_info(request, params.inspect) mail_addr = params[:thetisBoxEdit] SqlHelper.validate_token([mail_addr], ['@-']) begin users = User.where("email='#{mail_addr}'").to_a rescue => evar end if users.nil? or users.empty? Log.add_error(request, evar) f...
Base
1
def self.find_term(user_id, start_date, end_date) con = "(user_id=#{user_id}) and (date >= '#{start_date}') and (date <= '#{end_date}')" ary = Timecard.where(con).order('date ASC').to_a timecards_h = Hash.new unless ary.nil? ary.each do |timecard| timecards_h[timecard.date.strftime(Sched...
Base
1
def logout(database) auth.delete(database.to_s) end
Class
2
it "unmemoizes the current database" do db = session.current_database session.with(new_options) do |new_session| new_session.current_database.should_not eql db end end
Class
2
def __bson_dump__(io, key) io << Types::OBJECT_ID io << key io << NULL_BYTE io << data.pack('C12') end
Class
2
def get_users if params[:action] == 'get_users' Log.add_info(request, params.inspect) end @group_id = params[:id] =begin # @users = Group.get_users(params[:id]) =end # FEATURE_PAGING_IN_TREE >>> con = ['User.id > 0'] unless @group_id.nil? if @group_id == '0' con << "((gr...
Base
1
def get_group_equipment Log.add_info(request, params.inspect) @group_id = nil if !params[:thetisBoxSelKeeper].nil? @group_id = params[:thetisBoxSelKeeper].split(':').last elsif !params[:group_id].nil? and !params[:group_id].empty? @group_id = params[:group_id] end submit_url = ur...
Base
1
it "returns the socket" do cluster.stub(:sync) { cluster.servers << server } cluster.socket_for(:write).should eq socket end
Class
2
def self.get_for(user_id, category=nil) SqlHelper.validate_token([user_id, category]) con = [] con << "(user_id=#{user_id})" con << "(category='#{category}')" unless category.nil? settings = Setting.where(con.join(' and ')).to_a return nil if settings.nil? or settings.empty? hash = Ha...
Base
1
it "returns false" do indexes.drop(other: 1).should be_false end
Class
2
it "renders email addresses in the body" do comment = build_stubbed(:comment, body: "foo@example.com") expect(comment.generate_html(:body)).to match(/mailto:/) end
Base
1
def read_lines(filename, selector) if selector IO.foreach(filename).select.with_index(1, &selector) else URI.open(filename, &:read) end end
Base
1
def test_update_valid SmartProxy.any_instance.stubs(:valid?).returns(true) put :update, {:id => SmartProxy.first,:smart_proxy => {:url => "http://elsewhere.com:8443"}}, set_session_user assert_equal "http://elsewhere.com:8443", SmartProxy.first.url assert_redirected_to smart_proxies_url end
Class
2
def node_restart(params, request, session) if params[:name] code, response = send_request_with_token( session, params[:name], 'node_restart', true ) else if not allowed_for_local_cluster(session, Permissions::WRITE) return 403, 'Permission denied' end $logger.info "Restarting Node" ...
Compound
4