Total Complexity | 55 |
Total Lines | 269 |
Duplicated Lines | 9.67 % |
Changes | 0 |
Duplicate code is one of the most pungent code smells. A rule that is often used is to re-structure code once it is duplicated in three or more places.
Common duplication problems, and corresponding solutions are:
Complex classes like core.aliyunsmsapi often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
1 | import falcon |
||
2 | import json |
||
3 | import mysql.connector |
||
4 | import config |
||
5 | from core.userlogger import user_logger |
||
6 | |||
7 | |||
8 | class AliyunSMSAPICollection: |
||
9 | @staticmethod |
||
10 | def __init__(): |
||
11 | """Initializes AliyunSMSAPICollection""" |
||
12 | pass |
||
13 | |||
14 | @staticmethod |
||
15 | def on_options(req, resp): |
||
16 | resp.status = falcon.HTTP_200 |
||
17 | |||
18 | @staticmethod |
||
19 | def on_get(req, resp): |
||
20 | cnx = mysql.connector.connect(**config.myems_fdd_db) |
||
21 | cursor = cnx.cursor() |
||
22 | |||
23 | query = (" SELECT id, access_key_id, access_key_secret, endpoint, sign_name, template_code " |
||
24 | " FROM tbl_aliyun_sms_api ") |
||
25 | cursor.execute(query) |
||
26 | rows = cursor.fetchall() |
||
27 | cursor.close() |
||
28 | cnx.disconnect() |
||
29 | |||
30 | result = list() |
||
31 | if rows is not None and len(rows) > 0: |
||
32 | for row in rows: |
||
33 | meta_result = {"id": row[0], |
||
34 | "access_key_id": row[1], |
||
35 | "access_key_secret": row[2], |
||
36 | "endpoint": row[3], |
||
37 | "sign_name": row[4], |
||
38 | "template_code": row[5]} |
||
39 | result.append(meta_result) |
||
40 | |||
41 | resp.body = json.dumps(result) |
||
42 | |||
43 | @staticmethod |
||
44 | @user_logger |
||
45 | def on_post(req, resp): |
||
46 | """Handles POST requests""" |
||
47 | try: |
||
48 | raw_json = req.stream.read().decode('utf-8') |
||
49 | except Exception as ex: |
||
50 | raise falcon.HTTPError(falcon.HTTP_400, title='API.ERROR', description=ex) |
||
51 | |||
52 | new_values = json.loads(raw_json) |
||
53 | |||
54 | if 'access_key_id' not in new_values['data'].keys() or \ |
||
55 | not isinstance(new_values['data']['access_key_id'], str) or \ |
||
56 | len(str.strip(new_values['data']['access_key_id'])) == 0: |
||
57 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
58 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_ID') |
||
59 | access_key_id = str.strip(new_values['data']['access_key_id']) |
||
60 | |||
61 | if 'access_key_secret' not in new_values['data'].keys() or \ |
||
62 | not isinstance(new_values['data']['access_key_secret'], str) or \ |
||
63 | len(new_values['data']['access_key_secret']) == 0: |
||
64 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
65 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_SECRET') |
||
66 | access_key_secret = new_values['data']['access_key_secret'] |
||
67 | |||
68 | if 'endpoint' not in new_values['data'].keys() or \ |
||
69 | not isinstance(new_values['data']['endpoint'], str) or \ |
||
70 | len(new_values['data']['endpoint']) == 0: |
||
71 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
72 | description='API.INVALID_ALIYUN_SMS_API_ENDPOINT') |
||
73 | endpoint = new_values['data']['endpoint'] |
||
74 | |||
75 | if 'sign_name' not in new_values['data'].keys() or \ |
||
76 | not isinstance(new_values['data']['sign_name'], str) or \ |
||
77 | len(new_values['data']['sign_name']) == 0: |
||
78 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
79 | description='API.INVALID_ALIYUN_SMS_API_SIGN_NAME') |
||
80 | sign_name = new_values['data']['sign_name'] |
||
81 | |||
82 | if 'template_code' not in new_values['data'].keys() or \ |
||
83 | not isinstance(new_values['data']['template_code'], str) or \ |
||
84 | len(new_values['data']['template_code']) == 0: |
||
85 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
86 | description='API.INVALID_ALIYUN_SMS_API_TEMPLATE_CODE') |
||
87 | template_code = new_values['data']['template_code'] |
||
88 | |||
89 | cnx = mysql.connector.connect(**config.myems_fdd_db) |
||
90 | cursor = cnx.cursor() |
||
91 | |||
92 | cursor.execute(" SELECT id " |
||
93 | " FROM tbl_aliyun_sms_api " |
||
94 | " WHERE access_key_id = %s ", (access_key_id,)) |
||
95 | if cursor.fetchone() is not None: |
||
96 | cursor.close() |
||
97 | cnx.disconnect() |
||
98 | raise falcon.HTTPError(falcon.HTTP_404, title='API.BAD_REQUEST', |
||
99 | description='API.ALIYUN_SMS_API_ACCESS_KEY_ID_IS_ALREADY_IN_USE') |
||
100 | |||
101 | add_value = (" INSERT INTO tbl_aliyun_sms_api " |
||
102 | " (access_key_id, access_key_secret, endpoint, sign_name, template_code) " |
||
103 | " VALUES (%s, %s, %s, %s, %s) ") |
||
104 | cursor.execute(add_value, (access_key_id, |
||
105 | access_key_secret, |
||
106 | endpoint, |
||
107 | sign_name, |
||
108 | template_code)) |
||
109 | new_id = cursor.lastrowid |
||
110 | cnx.commit() |
||
111 | cursor.close() |
||
112 | cnx.disconnect() |
||
113 | |||
114 | resp.status = falcon.HTTP_201 |
||
115 | resp.location = '/aliyunsmsapis/' + str(new_id) |
||
116 | |||
117 | |||
118 | class AliyunSMSAPIItem: |
||
119 | @staticmethod |
||
120 | def __init__(): |
||
121 | """Initializes AliyunSMSAPIItem""" |
||
122 | pass |
||
123 | |||
124 | @staticmethod |
||
125 | def on_options(req, resp, id_): |
||
126 | resp.status = falcon.HTTP_200 |
||
127 | |||
128 | @staticmethod |
||
129 | def on_get(req, resp, id_): |
||
130 | if not id_.isdigit() or int(id_) <= 0: |
||
131 | raise falcon.HTTPError(falcon.HTTP_400, '400 Bad Request') |
||
132 | |||
133 | cnx = mysql.connector.connect(**config.myems_fdd_db) |
||
134 | cursor = cnx.cursor() |
||
135 | |||
136 | query = (" SELECT id, access_key_id, access_key_secret, endpoint, sign_name, template_code " |
||
137 | " FROM tbl_aliyun_sms_api " |
||
138 | " WHERE id = %s ") |
||
139 | cursor.execute(query, (id_,)) |
||
140 | row = cursor.fetchone() |
||
141 | cursor.close() |
||
142 | cnx.disconnect() |
||
143 | if row is None: |
||
144 | raise falcon.HTTPError(falcon.HTTP_404, 'API.NOT_FOUND') |
||
145 | |||
146 | result = {"id": row[0], |
||
147 | "access_key_id": row[1], |
||
148 | "access_key_secret": row[2], |
||
149 | "endpoint": row[3], |
||
150 | "sign_name": row[4], |
||
151 | "template_code": row[5]} |
||
152 | resp.body = json.dumps(result) |
||
153 | |||
154 | View Code Duplication | @staticmethod |
|
|
|||
155 | @user_logger |
||
156 | def on_delete(req, resp, id_): |
||
157 | if not id_.isdigit() or int(id_) <= 0: |
||
158 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
159 | description='API.INVALID_ALIYUN_SMS_API_ID') |
||
160 | |||
161 | cnx = mysql.connector.connect(**config.myems_fdd_db) |
||
162 | cursor = cnx.cursor() |
||
163 | |||
164 | cursor.execute(" SELECT access_key_id " |
||
165 | " FROM tbl_aliyun_sms_api " |
||
166 | " WHERE id = %s ", (id_,)) |
||
167 | if cursor.fetchone() is None: |
||
168 | cursor.close() |
||
169 | cnx.disconnect() |
||
170 | raise falcon.HTTPError(falcon.HTTP_404, title='API.NOT_FOUND', |
||
171 | description='API.ALIYUN_SMS_API_NOT_FOUND') |
||
172 | |||
173 | cursor.execute(" DELETE FROM tbl_aliyun_sms_api WHERE id = %s ", (id_,)) |
||
174 | cnx.commit() |
||
175 | |||
176 | cursor.close() |
||
177 | cnx.disconnect() |
||
178 | |||
179 | resp.status = falcon.HTTP_204 |
||
180 | |||
181 | @staticmethod |
||
182 | @user_logger |
||
183 | def on_put(req, resp, id_): |
||
184 | """Handles PUT requests""" |
||
185 | try: |
||
186 | raw_json = req.stream.read().decode('utf-8') |
||
187 | except Exception as ex: |
||
188 | raise falcon.HTTPError(falcon.HTTP_400, title='API.EXCEPTION', description=ex) |
||
189 | |||
190 | if not id_.isdigit() or int(id_) <= 0: |
||
191 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
192 | description='API.INVALID_ALIYUN_SMS_API_ID') |
||
193 | |||
194 | new_values = json.loads(raw_json) |
||
195 | |||
196 | if 'access_key_id' not in new_values['data'].keys() or \ |
||
197 | not isinstance(new_values['data']['access_key_id'], str) or \ |
||
198 | len(str.strip(new_values['data']['access_key_id'])) == 0: |
||
199 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
200 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_ID') |
||
201 | access_key_id = str.strip(new_values['data']['access_key_id']) |
||
202 | |||
203 | if 'access_key_secret' not in new_values['data'].keys() or \ |
||
204 | not isinstance(new_values['data']['access_key_secret'], str) or \ |
||
205 | len(new_values['data']['access_key_secret']) == 0: |
||
206 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
207 | description='API.INVALID_ALIYUN_SMS_API_ACCESS_KEY_SECRET') |
||
208 | access_key_secret = new_values['data']['access_key_secret'] |
||
209 | |||
210 | if 'endpoint' not in new_values['data'].keys() or \ |
||
211 | not isinstance(new_values['data']['endpoint'], str) or \ |
||
212 | len(new_values['data']['endpoint']) == 0: |
||
213 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
214 | description='API.INVALID_ALIYUN_SMS_API_ENDPOINT') |
||
215 | endpoint = new_values['data']['endpoint'] |
||
216 | |||
217 | if 'sign_name' not in new_values['data'].keys() or \ |
||
218 | not isinstance(new_values['data']['sign_name'], str) or \ |
||
219 | len(new_values['data']['sign_name']) == 0: |
||
220 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
221 | description='API.INVALID_ALIYUN_SMS_API_SIGN_NAME') |
||
222 | sign_name = new_values['data']['sign_name'] |
||
223 | |||
224 | if 'template_code' not in new_values['data'].keys() or \ |
||
225 | not isinstance(new_values['data']['template_code'], str) or \ |
||
226 | len(new_values['data']['template_code']) == 0: |
||
227 | raise falcon.HTTPError(falcon.HTTP_400, title='API.BAD_REQUEST', |
||
228 | description='API.INVALID_ALIYUN_SMS_API_TEMPLATE_CODE') |
||
229 | template_code = new_values['data']['template_code'] |
||
230 | |||
231 | cnx = mysql.connector.connect(**config.myems_fdd_db) |
||
232 | cursor = cnx.cursor() |
||
233 | |||
234 | cursor.execute(" SELECT access_key_id " |
||
235 | " FROM tbl_aliyun_sms_api " |
||
236 | " WHERE id = %s ", |
||
237 | (id_,)) |
||
238 | if cursor.fetchone() is None: |
||
239 | cursor.close() |
||
240 | cnx.disconnect() |
||
241 | raise falcon.HTTPError(falcon.HTTP_404, title='API.NOT_FOUND', |
||
242 | description='API.ALIYUN_SMS_API_NOT_FOUND') |
||
243 | |||
244 | cursor.execute(" SELECT access_key_id " |
||
245 | " FROM tbl_aliyun_sms_api " |
||
246 | " WHERE access_key_id = %s AND id != %s ", (access_key_id, id_)) |
||
247 | if cursor.fetchone() is not None: |
||
248 | cursor.close() |
||
249 | cnx.disconnect() |
||
250 | raise falcon.HTTPError(falcon.HTTP_404, title='API.BAD_REQUEST', |
||
251 | description='API.ALIYUN_SMS_API_ACCESS_KEY_ID_IS_ALREADY_IN_USE') |
||
252 | |||
253 | update_row = (" UPDATE tbl_aliyun_sms_api " |
||
254 | " SET access_key_id = %s, access_key_secret = %s, endpoint = %s, sign_name = %s, " |
||
255 | " template_code = %s " |
||
256 | " WHERE id = %s ") |
||
257 | cursor.execute(update_row, (access_key_id, |
||
258 | access_key_secret, |
||
259 | endpoint, |
||
260 | sign_name, |
||
261 | template_code, |
||
262 | id_,)) |
||
263 | cnx.commit() |
||
264 | |||
265 | cursor.close() |
||
266 | cnx.disconnect() |
||
267 | |||
268 | resp.status = falcon.HTTP_200 |
||
269 |