File path: /columba-1.4-src/mail/src/main/java/org/columba/mail/imap/IMAPServer.java | File path: /columba-1.4-src/mail/src/main/java/org/columba/mail/gui/composer/util/AddressCollector.java | |||
Method name: void existsChanged(String, int)
|
Method name: void addAddress(String, IHeaderItem)
|
|||
Number of AST nodes: 4 | Number of AST nodes: 2 | |||
1 | if (updatesEnabled) {↵ | 1 | if (↵ | |
2 | if( existsChangedAction != null) {↵ | 2 | add != null) { ↵ | |
3 | existsChangedAction.actionPerformed(selectedFolder);↵ | 3 | ↵ | |
4 | }↵ | |||
5 | LOG.fine("Exists changed -> triggering update");↵ | 4 | _adds.put(add, item);↵ | |
5 | ↵ | |||
6 | } | 6 |
| |
See real code fragment | See real code fragment |
Number of common nesting structure subtrees | 1 |
Number of refactorable cases | 0 |
Number of non-refactorable cases | 1 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.1 |
Clones location | Clones are in different classes |
Number of node comparisons | 4 |
Number of mapped statements | 1 |
Number of unmapped statements in the first code fragment | 2 |
Number of unmapped statements in the second code fragment | 1 |
Time elapsed for statement mapping (ms) | 0.8 |
Clone type | Type 3 |
ID | Statement | ID | Statement | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
6 | if (existsChangedAction != null) |
| 1 | if (add != null) | ||||||||||||||
|
| 2 | _adds.put(add, item); | |||||||||||||||
7 | existsChangedAction.actionPerformed(selectedFolder); |
| | |||||||||||||||
8 | LOG.fine("Exists changed -> triggering update"); | |
Row | Violation |
---|---|
1 | Type org.columba.mail.imap.IExistsChangedAction of variable existsChangedAction does not match with type java.lang.String of variable add |
2 | Unmatched statement _adds.put(add,item); cannot be moved before the extracted code, because it has control dependencies from statements that will be extracted |
3 | Unmatched statement existsChangedAction.actionPerformed(selectedFolder); cannot be moved before the extracted code, because it has control dependencies from statements that will be extracted |
4 | The refactoring of the clones is infeasible, because the number of macthed statements is equal to zero |