SlideShare uma empresa Scribd logo
1 de 79
Baixar para ler offline
Arnaud Bouchez | Synopse
Reduce our Technical Debt
20161108T154500 - 20161108T170000
Reduce our Technical Debt
• Notions
– Technical Debt
– Working Effectively with Legacy Code
• Dependency breaking
• Separation of concerns
• Seams
• Testing
Reduce our Technical Debt
• Technical Debt
• Working Effectively with Legacy Code
– Software Seams
– Dependency breaking techniques
– Testing is Everything
• mORMot to the rescue
Technical Debt
• BBM /Quick & dirty way
sets up with a technical debt
– Like a financial debt,
incurs interest payment
• Extra efforts in any future development
• Higher maintenance costs
Technical Debt
• BBM /Quick & dirty way
sets up with a technical debt
– Difficult to measure
• As software productivity is hard to estimate
• No immediate impact on client software
• Mythical man month from management side
Technical Debt
http://martinfowler.com/bliki/TechnicalDebtQuadrant.html
Technical Debt
• Debt does smell
– Long standing bugs
• Support and customers know workarounds
– Underestimated effort evaluation
• Simple tasks take a lot of time or resources
Technical Debt
• Debt does smell
– Unexpected regressions
• “Edit and pray” maintenance style
– Only the initial code writers dare touch it
• Difficult to find people willing to join
• Even the initial coders fail on the task
Technical Debt
• Hard to manage
– First step is to face and evaluate it
• Like any debt, could be eventually resolved
– Bankrupt is possible
• Need clear, prioritized and pragmatic approach
Technical Debt
• Hard to manage
– Could be integrated into backlog
• Handle debt as part of legacy system
– Full rewrite may not be the solution
• Netscape syndrome
• Technology change mirage
Working Effectively with Legacy Code
• Hard problem, but not unsolvable
Working Effectively
with Legacy Code
The book
Working Effectively with Legacy Code
“Legacy Code
offers far more possibilities
for the application of design skill
than new feature do”
Michael Feathers, p. 249
Working Effectively with Legacy Code
– Identify where code changes are needed
– Get legacy code into a test harness
– Write tests to protect against regressions
– Introduce proper OOP and SOLID patterns
– Interface between old and new code
– Progressive introduction of SOA
Working Effectively with Legacy Code
• Identify Software Seams
Working Effectively with Legacy Code
• Identify Software Seams
Working Effectively with Legacy Code
• Identify a Software Seam
– In Clothing
• The place where two parts are stitched together
• The piece on each side
only touches the other right at the seam
• You may be able to replace a piece with another
Working Effectively with Legacy Code
• Identify a Software Seam
– In Software
• A place where you can alter behavior in your
program without editing in that place
Working Effectively with Legacy Code
• Identify a Software Seam
– Identify the place
where there is a well defined interface
– Allow to replace implementation
without the rest of the software being able to tell
– Prepare Dependency Injection
or Dependency Inversion
e.g. about persistence or third-party feature
Working Effectively with Legacy Code
• Identify a Software Seam
– Allow to replace implementation
without the rest of the software being able to tell
– Use Dependency Injection
first implementation may be 1:1
but will reduce coupling for future evolution
Working Effectively with Legacy Code
• Identify a Software Seam
– In Real Life Legacy Software
• There is no such place
where there is a well defined interface
• “Let there be light”, thanks to iterative refactoring
• Follow dependency breaking techniques
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
– Adapt from existing
– Where you need to (instability, new features)
– Create a production implementation
– Create a fake implementation
– Write associated test cases
– Refine your interfaces
– Iterate
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities big picture
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
1. Know your subject
– In a perfect DDD-oriented world
• Reading the code as a book introduces you
into the reality the computer program is modeling
• Legacy code tends to obfuscate reality
in implementation details
due to BBM iteration
was code focused, not business focused
Working Effectively with Legacy Code
1. Know your subject
– First gather a high vision of the problem
• From non-tech experts
• Straight to the main points
• Asking for a 5 min presentation from tech experts
Working Effectively with Legacy Code
1. Know your subject
– Ask support for long-standing bugs
– Ask customers for their wishes
• Customers have workarounds for bugs,
not for unexpected behavior
– Ask managers for upcoming features
– Ask older coders
• For the positive aspects of the legacy software
• For what should have been done in another way
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
2. Identify responsibilities
– Probably no documentation
or deprecated documentation
– No code conventions
• Naming, style, design
• Procedural style:
– Spaghetti methods
– Stored procedures
– RAD
Working Effectively with Legacy Code
2. Identify responsibilities
– Start from a fresh eye
• Even if you work on this code since decades
• This is an expert’s work, not for rookies
• What should we have done?
• Don’t waste time
Working Effectively with Legacy Code
2. Identify responsibilities
– Heuristics to find light in the darkness
• Legacy implementation is valuable
– You will learn how the reality is modelized
• Code archeologists enjoy ancient times
– Software “exegesis”
over several layers
with long history
and a lot of material
– Nihil novi sub sole
Working Effectively with Legacy Code
2. Identify responsibilities
– Heuristics to find light in the darkness
• Read the code, as a fast book reader
• Keep in mind known bugs and new feature requests
Working Effectively with Legacy Code
2. Identify responsibilities
– Heuristics to find light in the darkness
• Read the code, as a fast book reader
• Keep in mind known bugs and new feature requests
• Group classes and methods
• Identify relationships
• Link to stored data structures
Working Effectively with Legacy Code
2. Identify responsibilities
– Heuristics to find light in the darkness
• Read the code, as a fast book reader
• Keep in mind known bugs and new feature requests
• Group classes and methods
• Identify relationships
• Link to stored data structures
• Note any change that would be needed
• Ignore the bugs
Working Effectively with Legacy Code
2. Identify relationships
– Between variables and methods
– Evaluate if existing coupling is worth it
– Guess abusive class re-use in several contexts
– Guess how it may be uncoupled in the future
– Don’t be fooled by implementation details
– Ignore the bugs
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
3. Study data structures
“Bad programmers worry about the code.
Good programmers worry about data structures
and their relationships.” Linus T.
Working Effectively with Legacy Code
3. Study data structures
– Legacy database is where logic remains
• Extract business knowledge from Relational Model
• Using tools, or existing (old) architecture diagrams
– Identify SQL patterns in code
• Copy & pasta blocks may be Seams
• Eventually refactored as Persistence Services
Working Effectively with Legacy Code
• Iterative Code Refactoring
4. Break out big classes
5. Break out huge functions
6. Encapsulate global references
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
• Iterative Code Refactoring
4. Break out big classes
• Too much methods are killing the methds
– Confusing to use
– Difficult to expand / adapt
– Breaks Single Responsibility Principle (SOLID)
Working Effectively with Legacy Code
• Iterative Code Refactoring
4. Break out big classes
• Refactor by writing new uncoupled classes
executed within the legacy main class
– Old class remains as a Seam
– Old class signature is the Seam interface
– Real implementation moved in new classes
Working Effectively with Legacy Code
• Iterative Code Refactoring
4. Break out big classes
• Iterative process, using unitary testing
• Favor composition over inheritance (SRP)
• Introduce interface for abstraction
• Add unit tests on uncoupled software units
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
• Iterative Code Refactoring
5. Break out huge functions
• Refactor a big function/method
into a new class / set of classes
• Preserve the function signature
as class constructors, or public properties
• Local variables as private members
Working Effectively with Legacy Code
• Iterative Code Refactoring
5. Break out huge functions
• Iterative process, using unitary testing
• First implement as a single class method
• Then cut it in smaller (private) methods
• Then several classes (SOLID)
• Favor composition over inheritance (SRP)
• Re-use classes when possible
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
• Iterative Code Refactoring
6. Encapsulate global references
Identify global variables in disguise
• Singleton or static variables/functions
• Huge main class (TMainForm TDataModule)
• Everything which prevents reentrance
Working Effectively with Legacy Code
• Iterative Code Refactoring
6. Encapsulate global references
Two steps cleaning process
• Identify “families” of global variables or functions
and group them as classes
• Move from a global instance of the class
into an injection mechanism
Working Effectively with Legacy Code
• Iterative Code Refactoring
6. Encapsulate global references
• Enable proper unit testing
thanks to Dependency Injection
• Allows server-side concurrent execution
and progressive switch to SOA
Working Effectively with Legacy Code
• Refactoring to isolate seams via interfaces
1. Know your subject
2. Identify responsibilities
3. Study data structures
4. Break out big classes
5. Break out huge functions iterative process
6. Encapsulate global references
7. Testing is everything
Working Effectively with Legacy Code
7. Testing is everything
– This is perhaps the hardest part
• Especially if unitary test is new for your teams
• Induce new test code to write and debug
– But also the most valuable
• Avoid regressions and refactoring fear
• If you can test, your code is likely to be uncoupled
Working Effectively with Legacy Code
7. Testing is everything
– Getting legacy code under test
• To avoid regressions
• To ensure as safe as possible refactoring
• Define reference datasets, for automated testing
– Brute replay of whole application (not yet unit testing)
– Using e.g. Virtual Machines snapshots
• Test “Bug to bug” behavior of the modified code
– Once bugs are fixed, update reference datasets
Working Effectively with Legacy Code
7. Testing is everything
– Value the existing
• Numerous applications and proven User Interface
• Integrate new technologies and patterns
• Continuous integration during build process
Working Effectively with Legacy Code
7. Testing is everything
– TDD over each Software Seam
• Write a failing test case
• Compile
• Make it pass
• Repeat
Working Effectively with Legacy Code
7. Testing is everything
– Seams specific tests
• Unit testing of the well bounded new interface
• Regression testing against the existing
• Prepare integration with the future Seams
Working Effectively with Legacy Code
7. Testing is everything
– Uncoupled seams as interfaces
• Could be stubbed/mocked
• Could be reused
• Could be hosted on a Server (SOA/SaaS)
mORMot ToolBox
mORMot ToolBox
• Cross-cutting features
• Killer features
• Shared features
mORMot ToolBox
• Cross-cutting features
– Unit Test
– Logging
– TDocVariant JSON
– SynDB SynMongoDB
– SynCrypto SynECC
– Services
– IoC, stubs and mocks
mORMot ToolBox
• Cross-cutting features
– Unit Test
• Light and cross-platform
• Convention over configuration
• Integrated with logging
• Integrated with interface Stubs and Mocks
• Sample 07
mORMot ToolBox
• Cross-cutting features
– Logging
• Low overhead, fast value serialization
• Local or remote
• Set of events, not levels
• Fast viewer tool with method and threads profiling
• Exception catch, stack trace
• Used by the whole framework
• Sample 11
mORMot ToolBox
• Cross-cutting features
– TDocVariant custom type
Stores any transient value as document:
• Object
• Array
• Any nested combination of the two
mORMot ToolBox
• Cross-cutting features
– TDocVariant custom type
Low memory overhead
• Data allocation per blocks of variants
• Copy by reference can be enabled
• Instance lifetime managed by the compiler
mORMot ToolBox
• Cross-cutting features
– TDocVariant custom type
Direct objects or arrays JSON support
Late-binding magic
Perfect dynamic values for seams
mORMot ToolBox
• Cross-cutting features
– TDocVariant custom type
var V: variant; // stored as any variant
...
TDocVariant.New(V); // or slightly slower V := TDocVariant.New;
V.name := 'John'; // property accessed via late-binding
V.year := 1972;
// now V contains {"name":"john","year":1972}
var V1,V2: variant;
...
V1 := _Obj(['name','John','year',1972]);
V2 := _Obj(['name','John','doc',_Obj(['one',1,'two',2.5])]);
V1 := _Json('{"name":"John","year":1982}');
V2 := _Json('{name:"John",doc:["one",1,"two",2.5]}');
mORMot ToolBox
• Cross-cutting features
– TDocVariant custom type
writeln('name=',V1.name,' year=',V1.year);
// will write 'name=John year=1972'
writeln('name=',V2.name,' doc.one=',V2.doc.one,' doc.two=',doc.two);
// will write 'name=John doc.one=1 doc.two=2.5
V1.name := 'Mark'; // overwrite a property value
writeln(V1.name); // will write 'Mark'
V1.age := 12; // add a property to the object
writeln(V1.age); // will write '12'
writeln(V1); // implicit conversion to string -> as JSON
// will write '{"name":"Mark","year":1972,"age":12}'
writeln(VariantSaveJSON(V1)); // serialize as JSON text
mORMot ToolBox
• Cross-cutting features
• SynDB Direct RDBMS access layer
– Not linked to DB.pas
– Multi providers
– UTF-8 JSON
– Interface based
– Knows SQL dialects (used e.g. by the ORM)
– SynDBExplorer tool
mORMot ToolBox
• Cross-cutting features
• SynDB Direct RDBMS access layer
– Less data types
– By-pass TDataSet
– Unicode even before Delphi 2009
– Array binding
– Native JSON support
– Remote access
mORMot ToolBox
• Cross-cutting features
• SynMongoDB NoSQL acces
– MongoDB native access
– BSON types - TBSONVariant
– TDocVariant support
– Extended JSON
– MongoDB 3.2 support (SCRAM-SHA1)
mORMot ToolBox
• Cross-cutting features
• SynCrypto SynECC
– Introduce safe and fast encryption
• AES, SHA, MD5, PBKDF2, PRNG
• Optimized pascal or asm AES-NI, SSE4
– Certificate-based public key cryptography
• Content signature using ECDSA-secp256r1
• Transmission or file encryption ECDH / ECIES
• JSON-based Public Key Infrastructure (PKI)
mORMot ToolBox
• Cross-cutting features
• Services
– Daemonization made easy
– Console, install or service mode
– Remote administration interface
– Windows integration
– Cross-platform
mORMot ToolBox
• Cross-cutting features
• Inversion Of Concerns (IoC)
– Leverage interface types for seams
– Runtime class instance resolution
TInjectableObject TInterfaceResolver
– Mocks and stubs
(a killer feature)
mORMot ToolBox
• Killer features
– SOA
– ORM / ODM
– Stubs and Mocks
– MVC web portals
– DDD CQRS helpers
– SyNode
mORMot ToolBox
• Killer features
… to be detailed tomorrow

mORMot ToolBox
• Shared features
– Convention Over Configuration
– Cross-Platform and Cross-Compiler
– Fully integrated and coherent
– Made for scaling and performance
– Modular: pickup what is needed,
integrate with existing
– Open Source with active community
mORMot ToolBox
• Don’t be afraid
– Huge feature set
– Exhaustive / endless documentation
– Unusual concepts
• Where to start
– Run the samples
– Use the forum
– Publish your test project on github!
mORMot ToolBox
• Resources
– http://synopse.info
– http://synopse.info/forum
– http://blog.synopse.info
– http://github.com/synopse/mORMot
Includes exhaustive documentation,
samples and regression tests.
Q & A
©2016 Synopse / A.Bouchez

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Threads in Operating System | Multithreading | Interprocess Communication
Threads in Operating System | Multithreading | Interprocess CommunicationThreads in Operating System | Multithreading | Interprocess Communication
Threads in Operating System | Multithreading | Interprocess Communication
 
Software testing
Software testing   Software testing
Software testing
 
Process management in operating system | process states | PCB | FORK() | Zomb...
Process management in operating system | process states | PCB | FORK() | Zomb...Process management in operating system | process states | PCB | FORK() | Zomb...
Process management in operating system | process states | PCB | FORK() | Zomb...
 
The DevOps Dance - Shift Left, Shift Right - Get It Right
The DevOps Dance - Shift Left, Shift Right - Get It RightThe DevOps Dance - Shift Left, Shift Right - Get It Right
The DevOps Dance - Shift Left, Shift Right - Get It Right
 
[Webinar] Qt Test-Driven Development Using Google Test and Google Mock
[Webinar] Qt Test-Driven Development Using Google Test and Google Mock[Webinar] Qt Test-Driven Development Using Google Test and Google Mock
[Webinar] Qt Test-Driven Development Using Google Test and Google Mock
 
Robot Framework Introduction
Robot Framework IntroductionRobot Framework Introduction
Robot Framework Introduction
 
Unit testing with NUnit
Unit testing with NUnitUnit testing with NUnit
Unit testing with NUnit
 
Real time Scheduling in Operating System for Msc CS
Real time Scheduling in Operating System for Msc CSReal time Scheduling in Operating System for Msc CS
Real time Scheduling in Operating System for Msc CS
 
Test data management
Test data managementTest data management
Test data management
 
Real time operating systems (rtos) concepts 3
Real time operating systems (rtos) concepts 3Real time operating systems (rtos) concepts 3
Real time operating systems (rtos) concepts 3
 
Operating system 33 swapping
Operating system 33 swappingOperating system 33 swapping
Operating system 33 swapping
 
Real Time Systems
Real Time SystemsReal Time Systems
Real Time Systems
 
Overview of Message Queues
Overview of Message QueuesOverview of Message Queues
Overview of Message Queues
 
Loom promises: be there!
Loom promises: be there!Loom promises: be there!
Loom promises: be there!
 
Software Testing 101
Software Testing 101Software Testing 101
Software Testing 101
 
Testing strategy for agile projects updated
Testing strategy for agile projects updatedTesting strategy for agile projects updated
Testing strategy for agile projects updated
 
Single instruction multiple data
Single instruction multiple dataSingle instruction multiple data
Single instruction multiple data
 
Testing With OutSystems
Testing With OutSystemsTesting With OutSystems
Testing With OutSystems
 
Selenium presentation
Selenium presentationSelenium presentation
Selenium presentation
 
Cs8493 unit 3
Cs8493 unit 3Cs8493 unit 3
Cs8493 unit 3
 

Semelhante a Ekon20 mORMot Legacy Code Technical Debt Delphi Conference

Clean code, Feb 2012
Clean code, Feb 2012Clean code, Feb 2012
Clean code, Feb 2012
cobyst
 
How I Learned to Stop Worrying and Love Legacy Code.....
How I Learned to Stop Worrying and Love Legacy Code.....How I Learned to Stop Worrying and Love Legacy Code.....
How I Learned to Stop Worrying and Love Legacy Code.....
Mike Harris
 

Semelhante a Ekon20 mORMot Legacy Code Technical Debt Delphi Conference (20)

Cleaning Code - Tools and Techniques for Large Legacy Projects
Cleaning Code - Tools and Techniques for Large Legacy ProjectsCleaning Code - Tools and Techniques for Large Legacy Projects
Cleaning Code - Tools and Techniques for Large Legacy Projects
 
Art of refactoring - Code Smells and Microservices Antipatterns
Art of refactoring - Code Smells and Microservices AntipatternsArt of refactoring - Code Smells and Microservices Antipatterns
Art of refactoring - Code Smells and Microservices Antipatterns
 
Clean code presentation
Clean code presentationClean code presentation
Clean code presentation
 
Eurosport's Kodakademi #2
Eurosport's Kodakademi #2Eurosport's Kodakademi #2
Eurosport's Kodakademi #2
 
Clean code
Clean codeClean code
Clean code
 
Clean code, Feb 2012
Clean code, Feb 2012Clean code, Feb 2012
Clean code, Feb 2012
 
Ursula Sarracini - When Old Meets New: Codebases
Ursula Sarracini - When Old Meets New: CodebasesUrsula Sarracini - When Old Meets New: Codebases
Ursula Sarracini - When Old Meets New: Codebases
 
Introducing systems analysis, design & development Concepts
Introducing systems analysis, design & development ConceptsIntroducing systems analysis, design & development Concepts
Introducing systems analysis, design & development Concepts
 
Code quality
Code quality Code quality
Code quality
 
Software Defects and SW Reliability Assessment
Software Defects and SW Reliability AssessmentSoftware Defects and SW Reliability Assessment
Software Defects and SW Reliability Assessment
 
TDD and the Legacy Code Black Hole
TDD and the Legacy Code Black HoleTDD and the Legacy Code Black Hole
TDD and the Legacy Code Black Hole
 
Rebuilding Legacy Apps with Domain-Driven Design - Lessons learned
Rebuilding Legacy Apps with Domain-Driven Design - Lessons learnedRebuilding Legacy Apps with Domain-Driven Design - Lessons learned
Rebuilding Legacy Apps with Domain-Driven Design - Lessons learned
 
Create Your Own Starter Files
Create Your Own Starter FilesCreate Your Own Starter Files
Create Your Own Starter Files
 
How I Learned to Stop Worrying and Love Legacy Code.....
How I Learned to Stop Worrying and Love Legacy Code.....How I Learned to Stop Worrying and Love Legacy Code.....
How I Learned to Stop Worrying and Love Legacy Code.....
 
Reading Notes : the practice of programming
Reading Notes : the practice of programmingReading Notes : the practice of programming
Reading Notes : the practice of programming
 
2009 training - tim m - object oriented programming
2009   training - tim m - object oriented programming2009   training - tim m - object oriented programming
2009 training - tim m - object oriented programming
 
Guide to Destroying Codebases The Demise of Clever Code
Guide to Destroying Codebases   The Demise of Clever CodeGuide to Destroying Codebases   The Demise of Clever Code
Guide to Destroying Codebases The Demise of Clever Code
 
Refactoring workshop
Refactoring workshop Refactoring workshop
Refactoring workshop
 
Principled And Clean Coding
Principled And Clean CodingPrincipled And Clean Coding
Principled And Clean Coding
 
Improving The Quality of Existing Software
Improving The Quality of Existing SoftwareImproving The Quality of Existing Software
Improving The Quality of Existing Software
 

Mais de Arnaud Bouchez

Mais de Arnaud Bouchez (19)

EKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdfEKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdf
 
EKON27-FrameworksExpressiveness.pdf
EKON27-FrameworksExpressiveness.pdfEKON27-FrameworksExpressiveness.pdf
EKON27-FrameworksExpressiveness.pdf
 
Ekon25 mORMot 2 Cryptography
Ekon25 mORMot 2 CryptographyEkon25 mORMot 2 Cryptography
Ekon25 mORMot 2 Cryptography
 
Ekon24 from Delphi to AVX2
Ekon24 from Delphi to AVX2Ekon24 from Delphi to AVX2
Ekon24 from Delphi to AVX2
 
Ekon24 mORMot 2
Ekon24 mORMot 2Ekon24 mORMot 2
Ekon24 mORMot 2
 
Ekon23 (2) Kingdom-Driven-Design applied to Social Media with mORMot
Ekon23 (2) Kingdom-Driven-Design applied to Social Media with mORMotEkon23 (2) Kingdom-Driven-Design applied to Social Media with mORMot
Ekon23 (2) Kingdom-Driven-Design applied to Social Media with mORMot
 
Ekon23 (1) Kingdom-Driven-Design
Ekon23 (1) Kingdom-Driven-DesignEkon23 (1) Kingdom-Driven-Design
Ekon23 (1) Kingdom-Driven-Design
 
Ekon21 Microservices - SOLID Meets SOA
Ekon21 Microservices - SOLID Meets SOAEkon21 Microservices - SOLID Meets SOA
Ekon21 Microservices - SOLID Meets SOA
 
Ekon21 Microservices - Event Driven Design
Ekon21 Microservices - Event Driven DesignEkon21 Microservices - Event Driven Design
Ekon21 Microservices - Event Driven Design
 
Ekon20 mORMot WorkShop Delphi
Ekon20 mORMot WorkShop DelphiEkon20 mORMot WorkShop Delphi
Ekon20 mORMot WorkShop Delphi
 
Ekon20 mORMot SOA Delphi Conference
Ekon20 mORMot SOA Delphi Conference Ekon20 mORMot SOA Delphi Conference
Ekon20 mORMot SOA Delphi Conference
 
2016 mORMot
2016 mORMot2016 mORMot
2016 mORMot
 
A1 from n tier to soa
A1 from n tier to soaA1 from n tier to soa
A1 from n tier to soa
 
D1 from interfaces to solid
D1 from interfaces to solidD1 from interfaces to solid
D1 from interfaces to solid
 
A3 from sql to orm
A3 from sql to ormA3 from sql to orm
A3 from sql to orm
 
A2 from soap to rest
A2 from soap to restA2 from soap to rest
A2 from soap to rest
 
D2 domain driven-design
D2 domain driven-designD2 domain driven-design
D2 domain driven-design
 
A4 from rad to mvc
A4 from rad to mvcA4 from rad to mvc
A4 from rad to mvc
 
Delphi ORM SOA MVC SQL NoSQL JSON REST mORMot
Delphi ORM SOA MVC SQL NoSQL JSON REST mORMotDelphi ORM SOA MVC SQL NoSQL JSON REST mORMot
Delphi ORM SOA MVC SQL NoSQL JSON REST mORMot
 

Último

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 

Último (20)

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 

Ekon20 mORMot Legacy Code Technical Debt Delphi Conference

  • 1. Arnaud Bouchez | Synopse Reduce our Technical Debt 20161108T154500 - 20161108T170000
  • 2. Reduce our Technical Debt • Notions – Technical Debt – Working Effectively with Legacy Code • Dependency breaking • Separation of concerns • Seams • Testing
  • 3. Reduce our Technical Debt • Technical Debt • Working Effectively with Legacy Code – Software Seams – Dependency breaking techniques – Testing is Everything • mORMot to the rescue
  • 4. Technical Debt • BBM /Quick & dirty way sets up with a technical debt – Like a financial debt, incurs interest payment • Extra efforts in any future development • Higher maintenance costs
  • 5. Technical Debt • BBM /Quick & dirty way sets up with a technical debt – Difficult to measure • As software productivity is hard to estimate • No immediate impact on client software • Mythical man month from management side
  • 7. Technical Debt • Debt does smell – Long standing bugs • Support and customers know workarounds – Underestimated effort evaluation • Simple tasks take a lot of time or resources
  • 8. Technical Debt • Debt does smell – Unexpected regressions • “Edit and pray” maintenance style – Only the initial code writers dare touch it • Difficult to find people willing to join • Even the initial coders fail on the task
  • 9. Technical Debt • Hard to manage – First step is to face and evaluate it • Like any debt, could be eventually resolved – Bankrupt is possible • Need clear, prioritized and pragmatic approach
  • 10. Technical Debt • Hard to manage – Could be integrated into backlog • Handle debt as part of legacy system – Full rewrite may not be the solution • Netscape syndrome • Technology change mirage
  • 11. Working Effectively with Legacy Code • Hard problem, but not unsolvable Working Effectively with Legacy Code The book
  • 12. Working Effectively with Legacy Code “Legacy Code offers far more possibilities for the application of design skill than new feature do” Michael Feathers, p. 249
  • 13. Working Effectively with Legacy Code – Identify where code changes are needed – Get legacy code into a test harness – Write tests to protect against regressions – Introduce proper OOP and SOLID patterns – Interface between old and new code – Progressive introduction of SOA
  • 14. Working Effectively with Legacy Code • Identify Software Seams
  • 15. Working Effectively with Legacy Code • Identify Software Seams
  • 16. Working Effectively with Legacy Code • Identify a Software Seam – In Clothing • The place where two parts are stitched together • The piece on each side only touches the other right at the seam • You may be able to replace a piece with another
  • 17. Working Effectively with Legacy Code • Identify a Software Seam – In Software • A place where you can alter behavior in your program without editing in that place
  • 18. Working Effectively with Legacy Code • Identify a Software Seam – Identify the place where there is a well defined interface – Allow to replace implementation without the rest of the software being able to tell – Prepare Dependency Injection or Dependency Inversion e.g. about persistence or third-party feature
  • 19. Working Effectively with Legacy Code • Identify a Software Seam – Allow to replace implementation without the rest of the software being able to tell – Use Dependency Injection first implementation may be 1:1 but will reduce coupling for future evolution
  • 20. Working Effectively with Legacy Code • Identify a Software Seam – In Real Life Legacy Software • There is no such place where there is a well defined interface • “Let there be light”, thanks to iterative refactoring • Follow dependency breaking techniques
  • 21. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces – Adapt from existing – Where you need to (instability, new features) – Create a production implementation – Create a fake implementation – Write associated test cases – Refine your interfaces – Iterate
  • 22. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 23. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities big picture 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 24. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 25. Working Effectively with Legacy Code 1. Know your subject – In a perfect DDD-oriented world • Reading the code as a book introduces you into the reality the computer program is modeling • Legacy code tends to obfuscate reality in implementation details due to BBM iteration was code focused, not business focused
  • 26. Working Effectively with Legacy Code 1. Know your subject – First gather a high vision of the problem • From non-tech experts • Straight to the main points • Asking for a 5 min presentation from tech experts
  • 27. Working Effectively with Legacy Code 1. Know your subject – Ask support for long-standing bugs – Ask customers for their wishes • Customers have workarounds for bugs, not for unexpected behavior – Ask managers for upcoming features – Ask older coders • For the positive aspects of the legacy software • For what should have been done in another way
  • 28. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 29. Working Effectively with Legacy Code 2. Identify responsibilities – Probably no documentation or deprecated documentation – No code conventions • Naming, style, design • Procedural style: – Spaghetti methods – Stored procedures – RAD
  • 30. Working Effectively with Legacy Code 2. Identify responsibilities – Start from a fresh eye • Even if you work on this code since decades • This is an expert’s work, not for rookies • What should we have done? • Don’t waste time
  • 31. Working Effectively with Legacy Code 2. Identify responsibilities – Heuristics to find light in the darkness • Legacy implementation is valuable – You will learn how the reality is modelized • Code archeologists enjoy ancient times – Software “exegesis” over several layers with long history and a lot of material – Nihil novi sub sole
  • 32. Working Effectively with Legacy Code 2. Identify responsibilities – Heuristics to find light in the darkness • Read the code, as a fast book reader • Keep in mind known bugs and new feature requests
  • 33. Working Effectively with Legacy Code 2. Identify responsibilities – Heuristics to find light in the darkness • Read the code, as a fast book reader • Keep in mind known bugs and new feature requests • Group classes and methods • Identify relationships • Link to stored data structures
  • 34. Working Effectively with Legacy Code 2. Identify responsibilities – Heuristics to find light in the darkness • Read the code, as a fast book reader • Keep in mind known bugs and new feature requests • Group classes and methods • Identify relationships • Link to stored data structures • Note any change that would be needed • Ignore the bugs
  • 35. Working Effectively with Legacy Code 2. Identify relationships – Between variables and methods – Evaluate if existing coupling is worth it – Guess abusive class re-use in several contexts – Guess how it may be uncoupled in the future – Don’t be fooled by implementation details – Ignore the bugs
  • 36. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 37. Working Effectively with Legacy Code 3. Study data structures “Bad programmers worry about the code. Good programmers worry about data structures and their relationships.” Linus T.
  • 38. Working Effectively with Legacy Code 3. Study data structures – Legacy database is where logic remains • Extract business knowledge from Relational Model • Using tools, or existing (old) architecture diagrams – Identify SQL patterns in code • Copy & pasta blocks may be Seams • Eventually refactored as Persistence Services
  • 39. Working Effectively with Legacy Code • Iterative Code Refactoring 4. Break out big classes 5. Break out huge functions 6. Encapsulate global references
  • 40. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 41. Working Effectively with Legacy Code • Iterative Code Refactoring 4. Break out big classes • Too much methods are killing the methds – Confusing to use – Difficult to expand / adapt – Breaks Single Responsibility Principle (SOLID)
  • 42. Working Effectively with Legacy Code • Iterative Code Refactoring 4. Break out big classes • Refactor by writing new uncoupled classes executed within the legacy main class – Old class remains as a Seam – Old class signature is the Seam interface – Real implementation moved in new classes
  • 43. Working Effectively with Legacy Code • Iterative Code Refactoring 4. Break out big classes • Iterative process, using unitary testing • Favor composition over inheritance (SRP) • Introduce interface for abstraction • Add unit tests on uncoupled software units
  • 44. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 45. Working Effectively with Legacy Code • Iterative Code Refactoring 5. Break out huge functions • Refactor a big function/method into a new class / set of classes • Preserve the function signature as class constructors, or public properties • Local variables as private members
  • 46. Working Effectively with Legacy Code • Iterative Code Refactoring 5. Break out huge functions • Iterative process, using unitary testing • First implement as a single class method • Then cut it in smaller (private) methods • Then several classes (SOLID) • Favor composition over inheritance (SRP) • Re-use classes when possible
  • 47. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 48. Working Effectively with Legacy Code • Iterative Code Refactoring 6. Encapsulate global references Identify global variables in disguise • Singleton or static variables/functions • Huge main class (TMainForm TDataModule) • Everything which prevents reentrance
  • 49. Working Effectively with Legacy Code • Iterative Code Refactoring 6. Encapsulate global references Two steps cleaning process • Identify “families” of global variables or functions and group them as classes • Move from a global instance of the class into an injection mechanism
  • 50. Working Effectively with Legacy Code • Iterative Code Refactoring 6. Encapsulate global references • Enable proper unit testing thanks to Dependency Injection • Allows server-side concurrent execution and progressive switch to SOA
  • 51. Working Effectively with Legacy Code • Refactoring to isolate seams via interfaces 1. Know your subject 2. Identify responsibilities 3. Study data structures 4. Break out big classes 5. Break out huge functions iterative process 6. Encapsulate global references 7. Testing is everything
  • 52. Working Effectively with Legacy Code 7. Testing is everything – This is perhaps the hardest part • Especially if unitary test is new for your teams • Induce new test code to write and debug – But also the most valuable • Avoid regressions and refactoring fear • If you can test, your code is likely to be uncoupled
  • 53. Working Effectively with Legacy Code 7. Testing is everything – Getting legacy code under test • To avoid regressions • To ensure as safe as possible refactoring • Define reference datasets, for automated testing – Brute replay of whole application (not yet unit testing) – Using e.g. Virtual Machines snapshots • Test “Bug to bug” behavior of the modified code – Once bugs are fixed, update reference datasets
  • 54. Working Effectively with Legacy Code 7. Testing is everything – Value the existing • Numerous applications and proven User Interface • Integrate new technologies and patterns • Continuous integration during build process
  • 55. Working Effectively with Legacy Code 7. Testing is everything – TDD over each Software Seam • Write a failing test case • Compile • Make it pass • Repeat
  • 56. Working Effectively with Legacy Code 7. Testing is everything – Seams specific tests • Unit testing of the well bounded new interface • Regression testing against the existing • Prepare integration with the future Seams
  • 57. Working Effectively with Legacy Code 7. Testing is everything – Uncoupled seams as interfaces • Could be stubbed/mocked • Could be reused • Could be hosted on a Server (SOA/SaaS)
  • 59. mORMot ToolBox • Cross-cutting features • Killer features • Shared features
  • 60. mORMot ToolBox • Cross-cutting features – Unit Test – Logging – TDocVariant JSON – SynDB SynMongoDB – SynCrypto SynECC – Services – IoC, stubs and mocks
  • 61. mORMot ToolBox • Cross-cutting features – Unit Test • Light and cross-platform • Convention over configuration • Integrated with logging • Integrated with interface Stubs and Mocks • Sample 07
  • 62. mORMot ToolBox • Cross-cutting features – Logging • Low overhead, fast value serialization • Local or remote • Set of events, not levels • Fast viewer tool with method and threads profiling • Exception catch, stack trace • Used by the whole framework • Sample 11
  • 63. mORMot ToolBox • Cross-cutting features – TDocVariant custom type Stores any transient value as document: • Object • Array • Any nested combination of the two
  • 64. mORMot ToolBox • Cross-cutting features – TDocVariant custom type Low memory overhead • Data allocation per blocks of variants • Copy by reference can be enabled • Instance lifetime managed by the compiler
  • 65. mORMot ToolBox • Cross-cutting features – TDocVariant custom type Direct objects or arrays JSON support Late-binding magic Perfect dynamic values for seams
  • 66. mORMot ToolBox • Cross-cutting features – TDocVariant custom type var V: variant; // stored as any variant ... TDocVariant.New(V); // or slightly slower V := TDocVariant.New; V.name := 'John'; // property accessed via late-binding V.year := 1972; // now V contains {"name":"john","year":1972} var V1,V2: variant; ... V1 := _Obj(['name','John','year',1972]); V2 := _Obj(['name','John','doc',_Obj(['one',1,'two',2.5])]); V1 := _Json('{"name":"John","year":1982}'); V2 := _Json('{name:"John",doc:["one",1,"two",2.5]}');
  • 67. mORMot ToolBox • Cross-cutting features – TDocVariant custom type writeln('name=',V1.name,' year=',V1.year); // will write 'name=John year=1972' writeln('name=',V2.name,' doc.one=',V2.doc.one,' doc.two=',doc.two); // will write 'name=John doc.one=1 doc.two=2.5 V1.name := 'Mark'; // overwrite a property value writeln(V1.name); // will write 'Mark' V1.age := 12; // add a property to the object writeln(V1.age); // will write '12' writeln(V1); // implicit conversion to string -> as JSON // will write '{"name":"Mark","year":1972,"age":12}' writeln(VariantSaveJSON(V1)); // serialize as JSON text
  • 68. mORMot ToolBox • Cross-cutting features • SynDB Direct RDBMS access layer – Not linked to DB.pas – Multi providers – UTF-8 JSON – Interface based – Knows SQL dialects (used e.g. by the ORM) – SynDBExplorer tool
  • 69. mORMot ToolBox • Cross-cutting features • SynDB Direct RDBMS access layer – Less data types – By-pass TDataSet – Unicode even before Delphi 2009 – Array binding – Native JSON support – Remote access
  • 70. mORMot ToolBox • Cross-cutting features • SynMongoDB NoSQL acces – MongoDB native access – BSON types - TBSONVariant – TDocVariant support – Extended JSON – MongoDB 3.2 support (SCRAM-SHA1)
  • 71. mORMot ToolBox • Cross-cutting features • SynCrypto SynECC – Introduce safe and fast encryption • AES, SHA, MD5, PBKDF2, PRNG • Optimized pascal or asm AES-NI, SSE4 – Certificate-based public key cryptography • Content signature using ECDSA-secp256r1 • Transmission or file encryption ECDH / ECIES • JSON-based Public Key Infrastructure (PKI)
  • 72. mORMot ToolBox • Cross-cutting features • Services – Daemonization made easy – Console, install or service mode – Remote administration interface – Windows integration – Cross-platform
  • 73. mORMot ToolBox • Cross-cutting features • Inversion Of Concerns (IoC) – Leverage interface types for seams – Runtime class instance resolution TInjectableObject TInterfaceResolver – Mocks and stubs (a killer feature)
  • 74. mORMot ToolBox • Killer features – SOA – ORM / ODM – Stubs and Mocks – MVC web portals – DDD CQRS helpers – SyNode
  • 75. mORMot ToolBox • Killer features … to be detailed tomorrow 
  • 76. mORMot ToolBox • Shared features – Convention Over Configuration – Cross-Platform and Cross-Compiler – Fully integrated and coherent – Made for scaling and performance – Modular: pickup what is needed, integrate with existing – Open Source with active community
  • 77. mORMot ToolBox • Don’t be afraid – Huge feature set – Exhaustive / endless documentation – Unusual concepts • Where to start – Run the samples – Use the forum – Publish your test project on github!
  • 78. mORMot ToolBox • Resources – http://synopse.info – http://synopse.info/forum – http://blog.synopse.info – http://github.com/synopse/mORMot Includes exhaustive documentation, samples and regression tests.
  • 79. Q & A ©2016 Synopse / A.Bouchez