Clover Coverage Report
Coverage timestamp: Sun Mar 23 2008 08:24:39 GMT
17   152   3   2.43
4   39   0.53   7
7     1.29  
1    
 
 
  EmbeddedException       Line # 89 17 3 25% 0.25
 
  (1)
 
1    /*
2    * Copyright (c) 2000-2005, University of Salford
3    * All rights reserved.
4    *
5    * Redistribution and use in source and binary forms, with or without
6    * modification, are permitted provided that the following conditions are met:
7    *
8    * Redistributions of source code must retain the above copyright notice, this
9    * list of conditions and the following disclaimer.
10    *
11    * Redistributions in binary form must reproduce the above copyright notice,
12    * this list of conditions and the following disclaimer in the documentation
13    * and/or other materials provided with the distribution.
14    *
15    * Neither the name of the University of Salford nor the names of its
16    * contributors may be used to endorse or promote products derived from this
17    * software without specific prior written permission.
18    *
19    * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
20    * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21    * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22    * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
23    * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24    * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25    * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26    * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27    * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28    * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29    * POSSIBILITY OF SUCH DAMAGE.
30    */
31    /*
32    * Copyright (c) 2006, University of Kent
33    * All rights reserved.
34    *
35    * Redistribution and use in source and binary forms, with or without
36    * modification, are permitted provided that the following conditions are met:
37    *
38    * Redistributions of source code must retain the above copyright notice, this
39    * list of conditions and the following disclaimer.
40    *
41    * Redistributions in binary form must reproduce the above copyright notice,
42    * this list of conditions and the following disclaimer in the documentation
43    * and/or other materials provided with the distribution.
44    *
45    * 1. Neither the name of the University of Kent nor the names of its
46    * contributors may be used to endorse or promote products derived from this
47    * software without specific prior written permission.
48    *
49    * 2. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
50    * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
51    * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
52    * PURPOSE ARE DISCLAIMED.
53    *
54    * 3. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
55    * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
56    * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
57    * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
58    * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
59    * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
60    * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
61    * POSSIBILITY OF SUCH DAMAGE.
62    *
63    * 4. YOU AGREE THAT THE EXCLUSIONS IN PARAGRAPHS 2 AND 3 ABOVE ARE REASONABLE
64    * IN THE CIRCUMSTANCES. IN PARTICULAR, YOU ACKNOWLEDGE (1) THAT THIS
65    * SOFTWARE HAS BEEN MADE AVAILABLE TO YOU FREE OF CHARGE, (2) THAT THIS
66    * SOFTWARE IS NOT "PRODUCT" QUALITY, BUT HAS BEEN PRODUCED BY A RESEARCH
67    * GROUP WHO DESIRE TO MAKE THIS SOFTWARE FREELY AVAILABLE TO PEOPLE WHO WISH
68    * TO USE IT, AND (3) THAT BECAUSE THIS SOFTWARE IS NOT OF "PRODUCT" QUALITY
69    * IT IS INEVITABLE THAT THERE WILL BE BUGS AND ERRORS, AND POSSIBLY MORE
70    * SERIOUS FAULTS, IN THIS SOFTWARE.
71    *
72    * 5. This license is governed, except to the extent that local laws
73    * necessarily apply, by the laws of England and Wales.
74    */
75   
76    package issrg.utils;
77   
78    /**
79    * This exception object is supposed for use with other exceptions that you do
80    * not want to pass to the caller, but still want your caller to get all the
81    * debug information possible. You then call getEmbedded() method to get the
82    * exception that was the real cause of an error and display all the details
83    * out of it.
84    *
85    * @author A Otenko
86    * @version 1.0
87    */
88   
 
89    public class EmbeddedException extends Exception {
90    private Throwable embedded = null;
91   
 
92  0 toggle public EmbeddedException() {
93    }
94   
 
95  105827 toggle public EmbeddedException(String msg){
96  105827 super(msg);
97    }
98   
99    /**
100    * This constructor lets you embed another exception or any other
101    * throwable in. Now if you catch all Throwables and embed them into this
102    * exception, you can guarantee the caller will get nothing but the
103    * EmbeddedException. Now the caller can just display your default message,
104    * but also can inspect if anything more serious has caused the problem.
105    *
106    * @see #getEmbedded()
107    */
 
108  212 toggle public EmbeddedException(String msg, Throwable embed){
109  212 super(msg);
110   
111  212 embedded = embed;
112    }
113   
114    /**
115    * This method returns the embedded object, if any. It can be null, if no
116    * exceptions were embedded, but if it is not null, you could figure out the
117    * cause of error more precisely.
118    *
119    * @returns the embedded Throwable, or null, if nothing has been embedded
120    */
 
121  10 toggle public Throwable getEmbedded(){
122  10 return embedded;
123    }
124   
 
125  0 toggle public void printStackTrace(){
126  0 printStackTrace(System.err);
127    }
128   
 
129  0 toggle public void printStackTrace(java.io.PrintWriter pw){
130  0 Throwable th = getEmbedded();
131  0 if (th!=null){
132  0 pw.print(getMessage()+"\nEmbedded: ");
133  0 th.printStackTrace(pw);
134    }else{
135  0 super.printStackTrace(pw);
136    }
137   
138  0 pw.flush();
139    }
140   
 
141  0 toggle public void printStackTrace(java.io.PrintStream ps){
142  0 Throwable th = getEmbedded();
143  0 if (th!=null){
144  0 ps.print(getMessage()+"\nEmbedded: ");
145  0 th.printStackTrace(ps);
146    }else{
147  0 super.printStackTrace(ps);
148    }
149   
150  0 ps.flush();
151    }
152    }