if (!Ruby.isSecurityRestricted()) {
try {
field.setAccessible(true);
} catch(SecurityException e) {}
}
if (!Ruby.isSecurityRestricted()) {
try {
method.setAccessible(true);
} catch(SecurityException e) {}
}
Clone fragments detected by clone detection tool
File path: /jruby-1.4.0/src/org/jruby/javasupport/JavaClass.java
|
|
File path: /jruby-1.4.0/src/org/jruby/javasupport/JavaClass.java
|
Method name: void install(RubyModule)
|
|
Method name: void addMethod(Method, Class>)
|
Number of AST nodes: 3
|
|
Number of AST nodes: 3
|
|
1 | if (!Ruby.isSecurityRestricted()) {↵ | | 1 | if (!Ruby.isSecurityRestricted()) {↵
|
2 | try {↵ | | 2 | try {↵
|
3 | field.setAccessible(true);↵ | | 3 | method.setAccessible(true);↵
|
4 | } catch(SecurityException e) {}↵ | | 4 | } catch(SecurityException e) {}↵
|
5 | } | | 5 | }
|
See real code fragment |
|
See real code fragment |
Summary
Number of common nesting structure subtrees | 1 |
Number of refactorable cases | 1 |
Number of non-refactorable cases | 0 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.2 |
Clones location | Clones are in the same java file |
Number of node comparisons | 5 |
-
{Refactorable}
Mapping Summary
Number of mapped statements | 3 |
Number of unmapped statements in the first code fragment | 0 |
Number of unmapped statements in the second code fragment | 0 |
Time elapsed for statement mapping (ms) | 0.6 |
Clone type | Type 2 |
Mapped Statements
ID |
Statement |
|
ID |
Statement |
2 | if (!Ruby.isSecurityRestricted()) | | 3 | if (!Ruby.isSecurityRestricted()) |
3 | | | 4 | |
4 | field.setAccessible(true); | | 5 | method.setAccessible(true); |
Precondition Violations (0)
Row |
Violation |