Dependency Injection in C++Actions Saving Sending Business logic verifying Rules65 Bloomberg Refactoring for DI God-Like Class Pricing Sizing Actions Saving Rules Business logic verifying Sending ✓ Encapsulated God-Like Class Pricing Sizing Actions Saving Sending Distribution Logic Gather Information Rules Business logic verifying Business Logic Glue Logic Glue Logic ✓ Unit testing ✓ Refactor ✓ Functionality splintered and spread throughout the codebase ❑ Fragmented throughout the inheritance chain ❑ Duplicated throughout the codebase ❑ Blended into general utility classes70 Bloomberg Refactoring0 码力 | 106 页 | 1.76 MB | 6 月前3
Delivering safe C++scale • Requires judicious programming techniques • Supported by libraries • Enforced by language rules and static analysis • The basic model for achieving that can be found in A brief introduction to C++'s the dawn of time • The rules are more deduced than invented Stroustrup - C++ safety -CppCon - October 2023 8 Enforcement rules are mutually dependent. Don’t judge individual rules in isolationConstraints “Trusted” code segments to work with unsafe code segments • Libraries • Code written under les stringent rules (e.g., old code) • Code written in other languages • Often the ``escape clause’’ is C++ • So, C++0 码力 | 74 页 | 2.72 MB | 6 月前3
Conan 2.5 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software hello are discarded by Conan. This can be used to minimize the surface area for a potential supply chain attack. Now you can list and install packages from this new repository: $ conan list "*" -r=mylocalrepo allowing versions like 1.2.3.a.8 if necessary. Conan versions non-digit identifiers follow the same rules as package names, they can only contain lowercase letters. This is to avoid 1.2.3-Beta to be a different0 码力 | 769 页 | 4.70 MB | 1 年前3
Conan 2.4 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software hello are discarded by Conan. This can be used to minimize the surface area for a potential supply chain attack. Now you can list and install packages from this new repository: $ conan list "*" -r=mylocalrepo allowing versions like 1.2.3.a.8 if necessary. Conan versions non-digit identifiers follow the same rules as package names, they can only contain lowercase letters. This is to avoid 1.2.3-Beta to be a different0 码力 | 769 页 | 4.69 MB | 1 年前3
Conan 2.0 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software form: VERSION-prerelease+build. Conan will also order pre-releases and builds according to the same rules, and each one of them can also contain an arbitrary number of items, like 1.2.3-pre.1.2.1+build.45 missing error”. Because previously engine/1.0 binaries were built against matrix/1.0. If the package_id rules and configuration define that engine should be rebuilt when minor versions of the dependencies change0 码力 | 652 页 | 4.00 MB | 1 年前3
Conan 2.3 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software hello are discarded by Conan. This can be used to minimize the surface area for a potential supply chain attack. Now you can list and install packages from this new repository: $ conan list "*" -r=mylocalrepo allowing versions like 1.2.3.a.8 if necessary. Conan versions non-digit identifiers follow the same rules as package names, they can only contain lowercase letters. This is to avoid 1.2.3-Beta to be a different0 码力 | 748 页 | 4.65 MB | 1 年前3
Conan 2.2 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software hello are discarded by Conan. This can be used to minimize the surface area for a potential supply chain attack. Now you can list and install packages from this new repository: $ conan list "*" -r=mylocalrepo allowing versions like 1.2.3.a.8 if necessary. Conan versions non-digit identifiers follow the same rules as package names, they can only contain lowercase letters. This is to avoid 1.2.3-Beta to be a different0 码力 | 718 页 | 4.46 MB | 1 年前3
Conan 2.10 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software hello are discarded by Conan. This can be used to minimize the surface area for a potential supply chain attack. Now you can list and install packages from this new repository: $ conan list "*" -r=mylocalrepo allowing versions like 1.2.3.a.8 if necessary. Conan versions non-digit identifiers follow the same rules as package names, they can only contain lowercase letters. This is to avoid 1.2.3-Beta to be a different0 码力 | 803 页 | 5.02 MB | 11 月前3
Conan 2.9 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software hello are discarded by Conan. This can be used to minimize the surface area for a potential supply chain attack. Now you can list and install packages from this new repository: $ conan list "*" -r=mylocalrepo allowing versions like 1.2.3.a.8 if necessary. Conan versions non-digit identifiers follow the same rules as package names, they can only contain lowercase letters. This is to avoid 1.2.3-Beta to be a different0 码力 | 795 页 | 4.99 MB | 11 月前3
Conan 2.6 Documentationimplement signing and verifying of packages. As the awareness about the importance of software supply chain security grows, it is becoming more important the capability of being able to sign and verify software hello are discarded by Conan. This can be used to minimize the surface area for a potential supply chain attack. Now you can list and install packages from this new repository: $ conan list "*" -r=mylocalrepo allowing versions like 1.2.3.a.8 if necessary. Conan versions non-digit identifiers follow the same rules as package names, they can only contain lowercase letters. This is to avoid 1.2.3-Beta to be a different0 码力 | 777 页 | 4.91 MB | 11 月前3
共 166 条
- 1
- 2
- 3
- 4
- 5
- 6
- 17













