if (!Ruby.isSecurityRestricted()) {
try {
Method.setAccessible(methods, true);
} catch(SecurityException e) {}
}
try {
holder.readline.beep();
} catch (IOException ioe) {
// ignore
}
Clone fragments detected by clone detection tool
File path: /jruby-1.4.0/src/org/jruby/java/invokers/MethodInvoker.java
|
|
File path: /jruby-1.4.0/src/org/jruby/ext/Readline.java
|
Method name: void trySetAccessible(Method[])
|
|
Method name: void actionPerformed(ActionEvent)
|
Number of AST nodes: 3
|
|
Number of AST nodes: 2
|
|
1 | if (!Ruby.isSecurityRestricted()) {↵ | | 1 | try {↵
|
2 | try {↵ | | 2 | ↵
|
3 | Method.setAccessible(methods, true);↵ | | 3 | ↵
|
| | | 4 | holder.readline.beep();↵
|
4 | } catch(SecurityException e) {}↵ | | 5 | } catch (IOException ioe) {↵
|
| | | 6 | // ignore↵
|
5 | } | | 7 | }
|
See real code fragment |
|
See real code fragment |
Summary
Number of common nesting structure subtrees | 1 |
Number of refactorable cases | 0 |
Number of non-refactorable cases | 1 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.1 |
Clones location | Clones are in different classes |
Number of node comparisons | 4 |
-
{Non-refactorable}
Mapping Summary
Number of mapped statements | 1 |
Number of unmapped statements in the first code fragment | 1 |
Number of unmapped statements in the second code fragment | 1 |
Time elapsed for statement mapping (ms) | 0.5 |
Clone type | Type 2 |
Mapped Statements
ID |
Statement |
|
ID |
Statement |
2 | try | | 1 | try |
| | | 2 | |
3 | Method.setAccessible(methods, true); | | | |
Precondition Violations (2)
Row |
Violation |
1 | Unmatched statement holder.readline.beep(); cannot be moved before or after the extracted code, because it throws exception(s) that should be caught by a try block that will be extracted |
2 | Unmatched statement Method.setAccessible(methods,true); cannot be moved before or after the extracted code, because it throws exception(s) that should be caught by a try block that will be extracted |