Skip to main content

Flyweight Pattern

Flyweight Pattern 


Gamma Categorization: Structural Design Pattern
Summary:Use sharing to support large numbers of fine-grained objects efficiently.

Sample Code

Problem: We want to store in memory only one object per unique filter definition.

Code

public class Filter
{
    public Guid ID { getset; }
    public List<stringFilterProperties { getset; } = new List<string>();

    public bool Equals(Filter filter)
    {
        if(this.FilterProperties.Count != filter.FilterProperties.Count)
            return false;

        this.FilterProperties.Sort();
        filter.FilterProperties.Sort();

        if (!this.FilterProperties.SequenceEqual(filter.FilterProperties))
            return false;

        return true;
    }
}

public class PhotoEditor
{
    private List<FilterfilterCache = new List<Filter>();
    private Dictionary<string,Guidfilters = new Dictionary<stringGuid>();

    public void ApplyFilter(string filterName)
    {
        if(!filters.ContainsKey(filterName))
            return;

        var filterGuid = filters[filterName];
        var filter = filterCache.FirstOrDefault(f => f.ID == filterGuid);

        System.Console.WriteLine($"\nFilter Name: {filterName}");
        System.Console.WriteLine($"Internal Filter ID: {filterGuid}");

        filter.FilterProperties.ForEach(p => System.Console.WriteLine($"\tApplying {p}"));
    }

    public void AddFilter(string filterNameList<stringfilterProperties)
    {
        var newFilter = new Filter { ID = Guid.NewGuid(), FilterProperties = filterProperties };

        Guid existingFilterGuid = Guid.Empty;
        foreach (var filter in filterCache)
        {
            if(filter.Equals(newFilter))
            {
                existingFilterGuid = filter.ID;
                break;
            }
        }

        if(existingFilterGuid != Guid.Empty)
            filters.Add(filterNameexistingFilterGuid);
        else
        {
            filterCache.Add(newFilter);
            filters.Add(filterNamenewFilter.ID);
        }
    }
}

Usage

photoEditor.AddFilter("Preset1"new List<string> { "Contrast" });
photoEditor.AddFilter("Preset2"new List<string> { "Contrast""Sharpen""Saturation""White balance"});
photoEditor.AddFilter("Preset3"new List<string> { "Contrast""Sharpen""Saturation""White balance"});
photoEditor.AddFilter("Preset4"new List<string> { "Saturation" });
photoEditor.AddFilter("Preset5"new List<string> { "Contrast" });

photoEditor.ApplyFilter("Preset1");
photoEditor.ApplyFilter("Preset2");
photoEditor.ApplyFilter("Preset3");
photoEditor.ApplyFilter("Preset4");
photoEditor.ApplyFilter("Preset5");

Output

Filter Name: Preset1
Internal Filter ID: 8d056cb7-9f78-498f-a692-57dfa0674d16
        Applying Contrast

Filter Name: Preset2
Internal Filter ID: eb0b6b2d-b4ed-43d1-b46b-b1a8ad06cd53
        Applying Contrast
        Applying Saturation
        Applying Sharpen
        Applying White balance

Filter Name: Preset3
Internal Filter ID: eb0b6b2d-b4ed-43d1-b46b-b1a8ad06cd53
        Applying Contrast
        Applying Saturation
        Applying Sharpen
        Applying White balance

Filter Name: Preset4
Internal Filter ID: 11ed980b-902a-4e0d-8d9b-05e6908ea2d3
        Applying Saturation

Filter Name: Preset5
Internal Filter ID: 8d056cb7-9f78-498f-a692-57dfa0674d16
        Applying Contrast

Comments

Popular posts from this blog

API Security

API Security source:  https://www.apisecuniversity.com/ Tools Kali Linux https://www.kali.org/ $ sudo apt update -y $ sudo apt upgrade -y $ sudo apt dist-upgrade -y $ sudo apt autoremove -y Passive API Reconnaissance Google Dorking Finds all publicly available WordPress API user directories. inurl:"/wp-json/wp/v2/users" Finds publicly available API key files. intitle:"index.of" intext:"api.txt" Finds potentially interesting API directories. inurl:"/api/v1" intext:"index of /" Finds all sites with a XenAPI SQL injection vulnerability. (This query was posted in 2016; four years later, there are currently 141,000 results.) ext:php inurl:"api.php?action=" This is one of my favorite queries. It lists potentially exposed API keys. intitle:"index of" api_key OR "api key" OR apiKey -pool GitDorking filename:swagger.json extension: .json TruffleHog $ sudo docker run -it -v "$PWD:/pwd" trufflesecurity/truf

XML Webservice (ASMX) - SOAP Request and Response Invocation logging

You are an integration developer. Eventualy you came into the state where there is nothing else you can debug, and you have to check which SOAP request it is built on the request, and which SOAP response you are getting from the server. C# XML Webservice (ASMX) - SOAP Request and Response Invocation logging In the legaccy .NET framework System.Web.Services , this means using soapExtensions to help you intersept the interaction with the webservice. This is done like so:  public class TraceExtension : SoapExtension     {         Stream oldStream;         Stream newStream;         string filename;         // Save the Stream representing the SOAP request or SOAP response into          // a local memory buffer.          public override Stream ChainStream(Stream stream)         {             oldStream = stream;             newStream = new MemoryStream();             return newStream;         }         // When the SOAP extension is accessed for the first time, the XML Web

Agile Leadership

Agile LeaderShip Reference: IPMA Reference Guide ICB4 in an Agile World https://www.ipma.world/news/ipma-reference-guide-icb4-agile-world/ 1. Perspective 1.1 Strategy Description: Change Blurred vision Agile strategy Emergent Create and adapt Giving meaning to work Key Competence Indicators Align agile teams with the organisational mission and vision Identify and exploit opportunities to influence organisational strategy Develop and ensure the ongoing validity of the business/organisational justification Determine, assess, and review critical success factors Determine, assess, and review key performance indicators Examples of Measures Reflects the mission and vision of the organisation Identifies new opportunities and threats which could alter the strategy Uses the CSFs for managing stakeholders Uses information systems for strategic performance 1.2 Governance, structures, and processes Description: Challenges Lean organisation Customer value Agile working Different structures Key Comp