海勒姆法则(Hyrum‘s Law)

在对于共享代码库的足够大的用户群中,有人会依赖于你代码的任何可能特性——包括你的漏洞。

摘要

Hyrum’s Law,海勒姆法则,是软件开发中的一个原则,它的核心思想是:当一个接口被足够数量的用户使用时,不论你在接口合约中做了什么承诺,都会有相应数量的情况出现,你会发现自己对某些人的期望是错误的。

换句话说,Hyrum的法则强调了当越来越多的开发人员和系统依赖于特定接口(如API或库)时,它们可能依赖于接口所未明确保证的某些行为或假设。当对接口进行更改时,即使是看似微小或无关紧要的更改,也可能意外地破坏依赖于该接口的代码。

该法则强调了围绕广泛使用的接口形成的隐含合约和假设。当一个接口被广泛采用时,对其期望和依赖变得更加多样化和难以预测。它不仅仅关乎接口在文档中明确说明的内容,还涉及用户根据对接口行为的理解所做的意外副作用和假设。

海勒姆法则提醒软件开发人员要注意对公共接口进行更改可能产生的影响,因为用户可能依赖于未明确指定的行为。它强调了在更改这些接口时需要进行清晰的沟通、文档化和慎重考虑,以减少中断和意外后果。

Simply put

Hyrum’s Law is a principle in software development that states: “With a sufficient number of users of an interface, it doesn’t matter what you promised in the interface contract—you’re going to get a correspondingly sufficient number of instances where you’re wrong about what someone expects.”

In simpler terms, Hyrum’s Law highlights the idea that as more developers and systems start depending on a particular interface (such as an API or a library), they may rely on certain behaviors or assumptions that are not explicitly guaranteed by that interface. When changes are made to the interface, even seemingly small or insignificant ones, it can unintentionally break the code that relies on it.

The law emphasizes the implicit contracts and assumptions that develop around widely used interfaces. It suggests that when an interface is widely adopted, the expectations and dependencies around it become more diverse and difficult to predict. It’s not just about what is explicitly documented in the interface, but also about the unintentional side effects and assumptions users make based on their understanding of how the interface behaves.

Hyrum’s Law serves as a reminder to software developers to be mindful of the impact any changes to public interfaces can have, as users may rely on behaviors that were not explicitly specified. It emphasizes the need for clear communication, documentation, and careful consideration when making changes to these interfaces to minimize disruptions and unexpected consequences.

On the other hand

Once upon a time, there was a popular social media platform called “Socialville” that had millions of users worldwide. Socialville had an API that allowed developers to build applications and integrate with the platform.

A talented developer named Alice discovered this API and saw its potential for creating a unique photo-sharing application. She began working tirelessly, pouring her heart and soul into developing this app called “Snap n’ Share.” Alice carefully studied the API documentation, understanding its limitations and promised behaviors.

Snap n’ Share became a tremendous success, quickly gaining millions of users. People loved the app’s features and its seamless integration with Socialville. However, as time went on, more and more developers noticed this success and started using the same API to build their applications.

As the user base of the API grew exponentially, so did the expectations and assumptions around its behaviors. Developers began depending on certain undocumented quirks and behaviors that were not explicitly guaranteed by the API contract. They built their applications around these implicit expectations, adding their unique touch to the Socialville ecosystem.

Meanwhile, the development team at Socialville recognized the need for some API improvements. They decided to make a few updates to enhance the security and performance of the API. While these updates were necessary, the team failed to consider the unintended consequences that these changes might have on the applications relying on their API.

When the updates were rolled out, chaos ensued. Snap n’ Share, along with numerous other applications, started experiencing unexpected errors. Features that were once reliable suddenly broke, leaving users frustrated and disappointed. The developers scrambled to fix their applications, but they were caught completely off guard by the changes to the API.

Alice, the creator of Snap n’ Share, was devastated. She had spent countless hours crafting her app, only to have it crippled by the unforeseen consequences of API updates. She realized firsthand the truth of Hyrum’s Law – even if you promise certain behaviors in the interface contract, with a sufficient number of users, there will always be instances where you’re wrong about what someone expects.

After a period of recovery and reflection, Alice decided to rebuild Snap n’ Share, this time with a more resilient architecture. She carefully reevaluated her dependencies on the API and found ways to create fallback mechanisms and handle unexpected changes gracefully. This time, she was mindful of the implicit assumptions and limitations that come with relying on a widely used interface.

Alice’s rebuilt app became a hit once again, with users appreciating its stability and adaptability. She learned a valuable lesson from Hyrum’s Law – the importance of clear communication, documentation, and careful consideration when making changes to public interfaces.

And so, Alice’s story became an inspiration for many developers who understood the delicate balance between promised interface behaviors and the unforeseen expectations that arise from widespread usage. They embraced the principles of Hyrum’s Law, ensuring that their applications remained resilient, even in the face of evolving interfaces.

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/80762.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

Spring复杂对象的3中创建方法

复杂对象是相对于简单对象可以直接 new 出的对象。这种对象在 Spring 中不可以通过简单对象的创建方式来创建。下面我们将通过实现 FactoryBean 接口、实例工厂、静态工厂三种方法来创建。 FactoryBean 接口 Spring 提供 FactoryBean 接口并且提供了 getObject 方法是为了支持…

“熊猫杯” | 赛宁网安获网络安全优秀创新成果大赛优胜奖

9月11日,四川省2023年国家网络安全宣传周正式启动。由四川省委网信办指导,中国网络安全产业联盟(CCIA)主办,成都信息工程大学、四川省网络空间安全协会承办的“2023年网络安全优秀创新成果大赛—成都分站赛(暨四川省‘…

MYSQL 主从搭建详细步骤和测试

MySQL主备搭建 1.主库配置 以下所有操作均在主服务器上执行 1)创建用户并授权 create user slave identified with mysql_native_password by 123456 mysql>GRANT REPLICATION SLAVE ON *.* to slave% identified by 123456; //如果用户已存在,会改密…

使用差分进化算法进行关键帧提取:Python实践与详细指南

1. 差分进化算法简介 差分进化算法(Differential Evolution, DE)是一种为实数编码的全局优化问题设计的启发式搜索方法。DE的基本原理是通过对种群中的个体进行差分变异、交叉和选择操作来进化种群,使种群逐渐趋近于问题的全局最优解。 DE算法的基本步骤包括: 初始化:随…

Spring Boot - 用JUnit 5构建完美的Spring Boot测试套件

文章目录 PreJUnit 4 vs JUnit 5Junit5 常用注解栗子 Pre SpringBoot - 单元测试利器Mockito入门 SpringBoot - 应用程序测试方案 SpringBoot - SpringBootTest加速单元测试的小窍门 Spring Boot - Junit4 / Junit5 / Spring Boot / IDEA 关系梳理 package org.junit.jupit…

Excel VBA 变量,数据类型常量

几乎所有计算机程序中都使用变量,VBA 也不例外。 在过程开始时声明变量是一个好习惯。 这不是必需的,但有助于识别内容的性质(文本,​​数据,数字等) 在本教程中,您将学习- 一、VBA变量 变量是…

webpack:详解CopyWebpackPlugin,复制的同时修改文件内容

摘要 CopyWebpackPlugin 是一个强大的 Webpack 插件,用于将文件从源目录复制到构建目录。在本文中,我们将探讨 CopyWebpackPlugin 的一些常用 API,并提供示例代码。 在构建 Web 应用程序时,通常需要将一些静态文件(如…

数据治理-定义数据治理运营框架

开发数据治理的基本定义很容易,但是创建一个组织采用的运营框架可能很困难。在构建组织的运营框架时需要考虑以下几个方面: 数据对组织的价值。如果一个组织出售数据,显然数据治理具有巨大的业务影响力。将数据作为最有价值事物的组织将需要…

Unity中程序集dll

一:前言 一个程序集由一个或多个文件组成,通常为扩展名.exe和.dll的文件称为程序集,.exe是静态的程序集,可以在.net下直接运行加载,因为exe中有一个main函数(入口函数),.dll是动态链接库&#…

腾讯mini项目-【指标监控服务重构】2023-08-04

今日已办 关于 span-references 的调研 https://github.com/DataDog/dd-trace-js/issues/1761 https://github.com/open-telemetry/opentelemetry-specification/blob/874a451e7f6ac7fc54423ee3f03e5394197be35b/specification/compatibility/opentracing.md#span-references h…

基于springboot的OA人事办公管理系统

经典 oasys(OA自动化办公系统) 办公自动化(OA)是面向组织的日常运作和管理,员工及管理者使用频率最高的应用系统,极大提高公司的办公效率。 项目介绍 oasys是一个OA办公自动化系统,使用Maven进行项目管理。基于springboot框架开…

为什么要使用设计模式,以及使用设计模式的好处

在软件开发中,衡量软件质量只要包含如下指标: 正确性可维护性可读性可扩展性简洁性可测试性健壮性灵活性可复用性 然而,对于一些刚入行的新程序员来说,往往会注意不到上面这些问题,从而产生了一些让人头皮发麻的烂代…

【css】深入理解flex属性

参考文章: 深入理解Flex属性 flex弹性布局教程-05-项目属性flex-shrink flex:flex-grow flex-shrink flex-basis flex:0 1 0 如何计算flex布局,有flex-shrink和flex-grow的情况下,每个元素的大小 flex-grow生效公式如…

mongodb 安装

yum 安装 阿里镜像库 , 注意不要用阿里自带的系统 , 要用centos镜像 # 创建一个 .repo 文件 vi /etc/yum.repos.d/mongodb-org.repo# 添加内容[mongodb-org] name MongoDB Repository baseurl https://mirrors.aliyun.com/mongodb/yum/redhat/$releasever/mongodb-org/4.4/…

谷粒商城----rabbitmq

一、 为什么要用 MQ? 三大好处,削峰,解耦,异步。 削峰 比如秒杀,或者高铁抢票,请求在某些时间点实在是太多了,服务器处理不过来,可以把请求放到 MQ 里面缓冲一下,把一秒内收到的…

Unity中Shader抓取屏幕并实现扭曲效果

文章目录 前言一、屏幕抓取,在上一篇文章已经写了二、实现抓取后的屏幕扭曲实现思路:1、屏幕扭曲要借助传入 UV 贴图进行扭曲2、传入贴图后在顶点着色器的输入参数处,传入一个 float2 uv : TEXCOORD,用于之后对扭曲贴图进行采样3、…

写一篇nginx配置指南

nginx.conf配置 找到Nginx的安装目录下的nginx.conf文件,该文件负责Nginx的基础功能配置。 配置文件概述 Nginx的主配置文件(conf/nginx.conf)按以下结构组织: 配置块功能描述全局块与Nginx运行相关的全局设置events块与网络连接有关的设置http块代理…

计算机网络(二):TCP篇

文章目录 1. TCP头部包含哪些内容?2. 为什么需要 TCP 协议? TCP 工作在哪一层?3. 什么是 TCP ?4. 什么是 TCP 连接?5. 如何唯一确定一个 TCP 连接呢?6. UDP头部大小是多少?包含哪些内容&#xf…

burp+IE 微信小程序抓包教程

文章目录 一、BURP里新增监听端口二、BURP导出证书三、导入证书四、IE代理设置五、小程序抓包实际测试 一、BURP里新增监听端口 找一个没用的端口,使用以下方式新增 二、BURP导出证书 选择刚才新增的监听端口,点击证书导入导出 将其存出来即可&…

安卓机型系统美化 Color.xml文件必备常识 自定义颜色资源

color.xml文件是Android工程中用来进行颜色资源管理的文件.可以在color.xml文件中通过<color>标签来定义颜色资源.我们在布局文件中、代码中、style定义中或者其他资源文件中&#xff0c;都可以引用之前在color.xml文件中定义的颜色资源。 将color.xml文件拷到res/value…