| Total Complexity | 55 | 
| Total Lines | 269 | 
| Duplicated Lines | 9.67 % | 
| Changes | 0 | ||
Duplicate code is one of the most pungent code smells. A rule that is often used is to re-structure code once it is duplicated in three or more places.
Common duplication problems, and corresponding solutions are:
Complex classes like core.aliyunsmsapi often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
| 1 | import falcon  | 
            ||
| 2 | import json  | 
            ||
| 3 | import mysql.connector  | 
            ||
| 4 | import config  | 
            ||
| 5 | from core.userlogger import user_logger  | 
            ||
| 6 | |||
| 7 | |||
| 8 | class AliyunSMSAPICollection:  | 
            ||
| 9 | @staticmethod  | 
            ||
| 10 | def __init__():  | 
            ||
| 11 | """Initializes AliyunSMSAPICollection"""  | 
            ||
| 12 | pass  | 
            ||
| 13 | |||
| 14 | @staticmethod  | 
            ||
| 15 | def on_options(req, resp):  | 
            ||
| 16 | resp.status = falcon.HTTP_200  | 
            ||
| 17 | |||
| 18 | @staticmethod  | 
            ||
| 19 | def on_get(req, resp):  | 
            ||
| 20 | cnx = mysql.connector.connect(**config.myems_fdd_db)  | 
            ||
| 21 | cursor = cnx.cursor()  | 
            ||
| 22 | |||
| 23 |         query = (" SELECT id, access_key_id, access_key_secret, endpoint, sign_name, template_code " | 
            ||
| 24 | " FROM tbl_aliyun_sms_api ")  | 
            ||
| 25 | cursor.execute(query)  | 
            ||
| 26 | rows = cursor.fetchall()  | 
            ||
| 27 | cursor.close()  | 
            ||
| 28 | cnx.disconnect()  | 
            ||
| 29 | |||
| 30 | result = list()  | 
            ||
| 31 | if rows is not None and len(rows) > 0:  | 
            ||
| 32 | for row in rows:  | 
            ||
| 33 |                 meta_result = {"id": row[0], | 
            ||
| 34 | "access_key_id": row[1],  | 
            ||
| 35 | "access_key_secret": row[2],  | 
            ||
| 36 | "endpoint": row[3],  | 
            ||
| 37 | "sign_name": row[4],  | 
            ||
| 38 | "template_code": row[5]}  | 
            ||
| 39 | result.append(meta_result)  | 
            ||
| 40 | |||
| 41 | resp.body = json.dumps(result)  | 
            ||
| 42 | |||
| 43 | @staticmethod  | 
            ||
| 44 | @user_logger  | 
            ||
| 45 | def on_post(req, resp):  | 
            ||
| 46 | """Handles POST requests"""  | 
            ||
| 47 | try:  | 
            ||
| 48 |             raw_json = req.stream.read().decode('utf-8') | 
            ||
| 49 | except Exception as ex:  | 
            ||
| 50 | raise falcon.HTTPError(falcon.HTTP_400, title='API.ERROR', description=ex)  | 
            ||
| 51 | |||
| 52 | new_values = json.loads(raw_json)  | 
            ||
| 53 | |||
| 54 | if 'access_key_id' not in new_values['data'].keys() or \  | 
            ||
| 55 | not isinstance(new_values['data']['access_key_id'], str) or \  | 
            ||
| 56 | len(str.strip(new_values['data']['access_key_id'])) == 0:  | 
            ||
| 57 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 58 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_ID')  | 
            ||
| 59 | access_key_id = str.strip(new_values['data']['access_key_id'])  | 
            ||
| 60 | |||
| 61 | if 'access_key_secret' not in new_values['data'].keys() or \  | 
            ||
| 62 | not isinstance(new_values['data']['access_key_secret'], str) or \  | 
            ||
| 63 | len(new_values['data']['access_key_secret']) == 0:  | 
            ||
| 64 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 65 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_SECRET')  | 
            ||
| 66 | access_key_secret = new_values['data']['access_key_secret']  | 
            ||
| 67 | |||
| 68 | if 'endpoint' not in new_values['data'].keys() or \  | 
            ||
| 69 | not isinstance(new_values['data']['endpoint'], str) or \  | 
            ||
| 70 | len(new_values['data']['endpoint']) == 0:  | 
            ||
| 71 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 72 | description='API.INVALID_ALIYUN_SMS_API_ENDPOINT')  | 
            ||
| 73 | endpoint = new_values['data']['endpoint']  | 
            ||
| 74 | |||
| 75 | if 'sign_name' not in new_values['data'].keys() or \  | 
            ||
| 76 | not isinstance(new_values['data']['sign_name'], str) or \  | 
            ||
| 77 | len(new_values['data']['sign_name']) == 0:  | 
            ||
| 78 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 79 | description='API.INVALID_ALIYUN_SMS_API_SIGN_NAME')  | 
            ||
| 80 | sign_name = new_values['data']['sign_name']  | 
            ||
| 81 | |||
| 82 | if 'template_code' not in new_values['data'].keys() or \  | 
            ||
| 83 | not isinstance(new_values['data']['template_code'], str) or \  | 
            ||
| 84 | len(new_values['data']['template_code']) == 0:  | 
            ||
| 85 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 86 | description='API.INVALID_ALIYUN_SMS_API_TEMPLATE_CODE')  | 
            ||
| 87 | template_code = new_values['data']['template_code']  | 
            ||
| 88 | |||
| 89 | cnx = mysql.connector.connect(**config.myems_fdd_db)  | 
            ||
| 90 | cursor = cnx.cursor()  | 
            ||
| 91 | |||
| 92 |         cursor.execute(" SELECT id " | 
            ||
| 93 | " FROM tbl_aliyun_sms_api "  | 
            ||
| 94 | " WHERE access_key_id = %s ", (access_key_id,))  | 
            ||
| 95 | if cursor.fetchone() is not None:  | 
            ||
| 96 | cursor.close()  | 
            ||
| 97 | cnx.disconnect()  | 
            ||
| 98 | raise falcon.HTTPError(falcon.HTTP_404, title='API.BAD_REQUEST',  | 
            ||
| 99 | description='API.ALIYUN_SMS_API_ACCESS_KEY_ID_IS_ALREADY_IN_USE')  | 
            ||
| 100 | |||
| 101 |         add_value = (" INSERT INTO tbl_aliyun_sms_api " | 
            ||
| 102 | " (access_key_id, access_key_secret, endpoint, sign_name, template_code) "  | 
            ||
| 103 | " VALUES (%s, %s, %s, %s, %s) ")  | 
            ||
| 104 | cursor.execute(add_value, (access_key_id,  | 
            ||
| 105 | access_key_secret,  | 
            ||
| 106 | endpoint,  | 
            ||
| 107 | sign_name,  | 
            ||
| 108 | template_code))  | 
            ||
| 109 | new_id = cursor.lastrowid  | 
            ||
| 110 | cnx.commit()  | 
            ||
| 111 | cursor.close()  | 
            ||
| 112 | cnx.disconnect()  | 
            ||
| 113 | |||
| 114 | resp.status = falcon.HTTP_201  | 
            ||
| 115 | resp.location = '/aliyunsmsapis/' + str(new_id)  | 
            ||
| 116 | |||
| 117 | |||
| 118 | class AliyunSMSAPIItem:  | 
            ||
| 119 | @staticmethod  | 
            ||
| 120 | def __init__():  | 
            ||
| 121 | """Initializes AliyunSMSAPIItem"""  | 
            ||
| 122 | pass  | 
            ||
| 123 | |||
| 124 | @staticmethod  | 
            ||
| 125 | def on_options(req, resp, id_):  | 
            ||
| 126 | resp.status = falcon.HTTP_200  | 
            ||
| 127 | |||
| 128 | @staticmethod  | 
            ||
| 129 | def on_get(req, resp, id_):  | 
            ||
| 130 | if not id_.isdigit() or int(id_) <= 0:  | 
            ||
| 131 | raise falcon.HTTPError(falcon.HTTP_400, '400 Bad Request')  | 
            ||
| 132 | |||
| 133 | cnx = mysql.connector.connect(**config.myems_fdd_db)  | 
            ||
| 134 | cursor = cnx.cursor()  | 
            ||
| 135 | |||
| 136 |         query = (" SELECT id, access_key_id, access_key_secret, endpoint, sign_name, template_code " | 
            ||
| 137 | " FROM tbl_aliyun_sms_api "  | 
            ||
| 138 | " WHERE id = %s ")  | 
            ||
| 139 | cursor.execute(query, (id_,))  | 
            ||
| 140 | row = cursor.fetchone()  | 
            ||
| 141 | cursor.close()  | 
            ||
| 142 | cnx.disconnect()  | 
            ||
| 143 | if row is None:  | 
            ||
| 144 | raise falcon.HTTPError(falcon.HTTP_404, 'API.NOT_FOUND')  | 
            ||
| 145 | |||
| 146 |         result = {"id": row[0], | 
            ||
| 147 | "access_key_id": row[1],  | 
            ||
| 148 | "access_key_secret": row[2],  | 
            ||
| 149 | "endpoint": row[3],  | 
            ||
| 150 | "sign_name": row[4],  | 
            ||
| 151 | "template_code": row[5]}  | 
            ||
| 152 | resp.body = json.dumps(result)  | 
            ||
| 153 | |||
| 154 | View Code Duplication | @staticmethod  | 
            |
| 
                                                                                                    
                        
                         | 
                |||
| 155 | @user_logger  | 
            ||
| 156 | def on_delete(req, resp, id_):  | 
            ||
| 157 | if not id_.isdigit() or int(id_) <= 0:  | 
            ||
| 158 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 159 | description='API.INVALID_ALIYUN_SMS_API_ID')  | 
            ||
| 160 | |||
| 161 | cnx = mysql.connector.connect(**config.myems_fdd_db)  | 
            ||
| 162 | cursor = cnx.cursor()  | 
            ||
| 163 | |||
| 164 |         cursor.execute(" SELECT access_key_id " | 
            ||
| 165 | " FROM tbl_aliyun_sms_api "  | 
            ||
| 166 | " WHERE id = %s ", (id_,))  | 
            ||
| 167 | if cursor.fetchone() is None:  | 
            ||
| 168 | cursor.close()  | 
            ||
| 169 | cnx.disconnect()  | 
            ||
| 170 | raise falcon.HTTPError(falcon.HTTP_404, title='API.NOT_FOUND',  | 
            ||
| 171 | description='API.ALIYUN_SMS_API_NOT_FOUND')  | 
            ||
| 172 | |||
| 173 |         cursor.execute(" DELETE FROM tbl_aliyun_sms_api WHERE id = %s ", (id_,)) | 
            ||
| 174 | cnx.commit()  | 
            ||
| 175 | |||
| 176 | cursor.close()  | 
            ||
| 177 | cnx.disconnect()  | 
            ||
| 178 | |||
| 179 | resp.status = falcon.HTTP_204  | 
            ||
| 180 | |||
| 181 | @staticmethod  | 
            ||
| 182 | @user_logger  | 
            ||
| 183 | def on_put(req, resp, id_):  | 
            ||
| 184 | """Handles PUT requests"""  | 
            ||
| 185 | try:  | 
            ||
| 186 |             raw_json = req.stream.read().decode('utf-8') | 
            ||
| 187 | except Exception as ex:  | 
            ||
| 188 | raise falcon.HTTPError(falcon.HTTP_400, title='API.EXCEPTION', description=ex)  | 
            ||
| 189 | |||
| 190 | if not id_.isdigit() or int(id_) <= 0:  | 
            ||
| 191 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 192 | description='API.INVALID_ALIYUN_SMS_API_ID')  | 
            ||
| 193 | |||
| 194 | new_values = json.loads(raw_json)  | 
            ||
| 195 | |||
| 196 | if 'access_key_id' not in new_values['data'].keys() or \  | 
            ||
| 197 | not isinstance(new_values['data']['access_key_id'], str) or \  | 
            ||
| 198 | len(str.strip(new_values['data']['access_key_id'])) == 0:  | 
            ||
| 199 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 200 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_ID')  | 
            ||
| 201 | access_key_id = str.strip(new_values['data']['access_key_id'])  | 
            ||
| 202 | |||
| 203 | if 'access_key_secret' not in new_values['data'].keys() or \  | 
            ||
| 204 | not isinstance(new_values['data']['access_key_secret'], str) or \  | 
            ||
| 205 | len(new_values['data']['access_key_secret']) == 0:  | 
            ||
| 206 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 207 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_SECRET')  | 
            ||
| 208 | access_key_secret = new_values['data']['access_key_secret']  | 
            ||
| 209 | |||
| 210 | if 'endpoint' not in new_values['data'].keys() or \  | 
            ||
| 211 | not isinstance(new_values['data']['endpoint'], str) or \  | 
            ||
| 212 | len(new_values['data']['endpoint']) == 0:  | 
            ||
| 213 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 214 | description='API.INVALID_ALIYUN_SMS_API_ENDPOINT')  | 
            ||
| 215 | endpoint = new_values['data']['endpoint']  | 
            ||
| 216 | |||
| 217 | if 'sign_name' not in new_values['data'].keys() or \  | 
            ||
| 218 | not isinstance(new_values['data']['sign_name'], str) or \  | 
            ||
| 219 | len(new_values['data']['sign_name']) == 0:  | 
            ||
| 220 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 221 | description='API.INVALID_ALIYUN_SMS_API_SIGN_NAME')  | 
            ||
| 222 | sign_name = new_values['data']['sign_name']  | 
            ||
| 223 | |||
| 224 | if 'template_code' not in new_values['data'].keys() or \  | 
            ||
| 225 | not isinstance(new_values['data']['template_code'], str) or \  | 
            ||
| 226 | len(new_values['data']['template_code']) == 0:  | 
            ||
| 227 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST',  | 
            ||
| 228 | description='API.INVALID_ALIYUN_SMS_API_TEMPLATE_CODE')  | 
            ||
| 229 | template_code = new_values['data']['template_code']  | 
            ||
| 230 | |||
| 231 | cnx = mysql.connector.connect(**config.myems_fdd_db)  | 
            ||
| 232 | cursor = cnx.cursor()  | 
            ||
| 233 | |||
| 234 |         cursor.execute(" SELECT access_key_id " | 
            ||
| 235 | " FROM tbl_aliyun_sms_api "  | 
            ||
| 236 | " WHERE id = %s ",  | 
            ||
| 237 | (id_,))  | 
            ||
| 238 | if cursor.fetchone() is None:  | 
            ||
| 239 | cursor.close()  | 
            ||
| 240 | cnx.disconnect()  | 
            ||
| 241 | raise falcon.HTTPError(falcon.HTTP_404, title='API.NOT_FOUND',  | 
            ||
| 242 | description='API.ALIYUN_SMS_API_NOT_FOUND')  | 
            ||
| 243 | |||
| 244 |         cursor.execute(" SELECT access_key_id " | 
            ||
| 245 | " FROM tbl_aliyun_sms_api "  | 
            ||
| 246 | " WHERE access_key_id = %s AND id != %s ", (access_key_id, id_))  | 
            ||
| 247 | if cursor.fetchone() is not None:  | 
            ||
| 248 | cursor.close()  | 
            ||
| 249 | cnx.disconnect()  | 
            ||
| 250 | raise falcon.HTTPError(falcon.HTTP_404, title='API.BAD_REQUEST',  | 
            ||
| 251 | description='API.ALIYUN_SMS_API_ACCESS_KEY_ID_IS_ALREADY_IN_USE')  | 
            ||
| 252 | |||
| 253 |         update_row = (" UPDATE tbl_aliyun_sms_api " | 
            ||
| 254 | " SET access_key_id = %s, access_key_secret = %s, endpoint = %s, sign_name = %s, "  | 
            ||
| 255 | " template_code = %s "  | 
            ||
| 256 | " WHERE id = %s ")  | 
            ||
| 257 | cursor.execute(update_row, (access_key_id,  | 
            ||
| 258 | access_key_secret,  | 
            ||
| 259 | endpoint,  | 
            ||
| 260 | sign_name,  | 
            ||
| 261 | template_code,  | 
            ||
| 262 | id_,))  | 
            ||
| 263 | cnx.commit()  | 
            ||
| 264 | |||
| 265 | cursor.close()  | 
            ||
| 266 | cnx.disconnect()  | 
            ||
| 267 | |||
| 268 | resp.status = falcon.HTTP_200  | 
            ||
| 269 |