try {
runnable.run();
} catch (Exception e) {
throw new InvocationTargetException(e);
}
if (!Ruby.isSecurityRestricted()) {
try {
method.setAccessible(true);
} catch(SecurityException e) {}
}
Clone fragments detected by clone detection tool
File path: /jruby-1.4.0/src/org/jruby/JRubyApplet.java
|
|
File path: /jruby-1.4.0/src/org/jruby/javasupport/JavaClass.java
|
Method name: void safeInvokeAndWait(Runnable)
|
|
Method name: void addMethod(Method, Class>)
|
Number of AST nodes: 2
|
|
Number of AST nodes: 3
|
|
1 | try {↵ | | 1 | if (!Ruby.isSecurityRestricted()) {↵
|
2 | runnable.run();↵ | | 2 | ↵
|
3 | } catch (Exception e) {↵ | | |
|
4 | throw new InvocationTarget↵ | | 3 | try {↵
|
| | | 4 | method.setAccessible(true);↵
|
5 | Exception(e);↵ | | 5 | } catch(SecurityException e) {}↵
|
6 | } | | 6 | }
|
See real code fragment |
|
See real code fragment |
Summary
Number of common nesting structure subtrees | 0 |
Number of refactorable cases | 0 |
Number of non-refactorable cases | 0 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.1 |
Clones location | Clones are in different classes |
Number of node comparisons | 1 |