if (key == null) {
return NULL_KEY;
} else {
return key;
}
if (internal == null) {
return getRuntime().getNil();
} else {
return internal;
}
Clone fragments detected by clone detection tool
File path: /jruby-1.4.0/src/org/jruby/util/WeakIdentityHashMap.java
|
|
File path: /jruby-1.4.0/src/org/jruby/RubyStringIO.java
|
Method name: Object maskKey(Object)
|
|
Method name: IRubyObject string()
|
Number of AST nodes: 3
|
|
Number of AST nodes: 3
|
|
1 | if (key == null) {↵ | | 1 | if (internal == null) {↵
|
2 | return NULL_KEY;↵ | | 2 | return getRuntime().getNil();↵
|
3 | } else {↵ | | 3 | } else {↵
|
4 | return key;↵ | | 4 | return internal;↵
|
5 | } | | 5 | }
|
See real code fragment |
|
See real code fragment |
Summary
Number of common nesting structure subtrees | 1 |
Number of refactorable cases | 0 |
Number of non-refactorable cases | 1 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.2 |
Clones location | Clones are in different classes |
Number of node comparisons | 9 |
-
{Non-refactorable}
Mapping Summary
Number of mapped statements | 1 |
Number of unmapped statements in the first code fragment | 2 |
Number of unmapped statements in the second code fragment | 2 |
Time elapsed for statement mapping (ms) | 3.4 |
Clone type | Type 2 |
Mapped Statements
ID |
Statement |
|
ID |
Statement |
1 | if (key == null) | | 1 | if (internal == null) |
| | | 2 | return getRuntime().getNil(); |
2 | | | | |
| | | | |
| | | 3 | |
3 | | | | |
Precondition Violations (5)
Row |
Violation |
1 | Type java.lang.Object of variable key does not match with type org.jruby.RubyString of variable internal |
2 | Unmatched return getRuntime().getNil(); |
3 | Unmatched return NULL_KEY; |
4 | Unmatched return internal; |
5 | Unmatched return key; |