-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shim layers #265
Comments
One thing I remember was being against the idea of having a Should that be something informing the use of this pattern, per #150, ie. we'll never have descendants shim higher values or vice versa? Or should descendants be used for some cases and ancestors for others, and there's a clear reasoning to that? I feel like that's one of the reasons I've been antsy about this: it makes sense one way, but not the other. Along those lines: how "standard" should shimming behavior be? Ie, should there be a "this follows the general shimming algorithm" (a la the JSON Merge RFC, ick), or should everything be ad-hoc "This means X if Y is not present overriding it in Z scenario", and we just adhere to a certain set of consistent principles? (My feeling is somewhere between the two: we'll generally follow the same pattern that'll emerge in different places for different stuff, but it won't be codified as a hard-and-fast algorithmic rule. Kind of like how Also note #169 should inform the decisions here (ie. things should be considered in light of "we do or do not want to make this kind of operation generally something you'd use an intermediate interpretation to handle"). |
Like, one thing I want to do with shims is having them defined so that only certain branches of an object representing a shim condition shim something else. For instance, Also, this covers one of the other things that bug me about shims: the notion of having two things that may have parallel and coincidental similarities, that should not share them. For example, say that, like, instead of having |
This is a pattern that's starting to emerge in proposals to annotate how various factors affect or control various aspects of a site's data/operation, like the user being logged in when resetting a password, internationalization (which may skip shims for legal terms), and unusual communication channels for password reset and/or login.
I'm not sure I'm against this mechanism, but I feel like I've unconsciously avoided it up to this point, so I'd like to explore what my thoughts are. It's possible that I've really just been avoiding profiling details that vary to accommodate this.
Some open questions:
The text was updated successfully, but these errors were encountered: