Skip to main content

Test driven development


More than last 12 months I am a great sponsor of the test driven development.  But how i become a great devotee of TDD is very much interesting. I was given task to restructure the existing system. This is one of the most important features in our system. When i seen the existing code it was in a malicious situation. Lots of unwanted, complex complicated loops. So before starting the reconstructing the whole team sit together and decided we are going to start something new. It might slow down the process initially but will produce the quality work.  Before witting the method we identified the feature's specification and requirements and exception handling phases. Then test cases  are  written  based on the requirement.  Then started working on the methods based on the test cases. First the entire test will fail because the method is written afterward.

Test method example

public void MethodWeAretesting_DescriptionOfInput_ReturnValueAndExpectedBehavior()

{

       // Prepare test environment (i.e.: create test data)

        ...

        // Calling method that we are testing

        ...    

       // Assertions

}

/// [TEST SCRIPT =test name ]

Public return type MethodName()

{



}

Once we written the methods we clearly given the indication which test method need to execute after making the change by giving /// [TEST SCRIPT =test name ]

Comments

Popular posts from this blog

How to write secure mvc application using encrypting URL

There are lots ways available to write the secure Mvc application. In my experience I came across lots of secure application in public facing. I want to tell about some of the mechanism I followed. 1- encrypting the URL Parameters and preserving id's encrypted on the client side 1- I always make sure if I pass Id or any sensitive data into the view always make sure it's encrypted. By doing so make sure if we forced to use HTML.hidden or HTML.hidden for have the encrypted values, in action link if I pass any parameters from the client side (eg:- edit or create or navigating between different actions we can make sure that all the values are encrypted) During the design of the actions results if it's http get I usually encrypt the sensitive data [httpget] Public actionresult display() { TestModel testModel=new TestModel(); testModel.id= encrypt(id); Return View(testModel); } [httppost] Public ActionResult Display(string id) { Guid d_id= new Guid(decrypt(id));

Single page application (SPA) using ext.js

what is spa? Single page application are applications that fit in one page with rich and fluid user experiences like a desktop based applications. Why is SPA? All web based elements (html, CSS,javascript) are downloaded from the server on single page load and avoid the continuous page post back. i can explain what this mean. Suppose your web application is made of certain flow and it consists of 5 different pages. Each page need to get data from the user and save before moving to the next page. So when we navigate from one page to other it need to make a round trip to server to store the data in one page and get the data for the next page to display. but in spa we can avoid the continuous post backs. The whole page will not post back any time other than the first load. But it communicate to the server dynamically behind the scene and can achieve the same functionality. Spa using ext.js designing a SPA using ext.js is a challenging task if you are unaware about the ext.js

Sql Server Internals - Named Pipes

Named pipes enables clients applications to request a reliable and two way connection between the client application and Sql Server, across a network. A named pipe has a name which follows the UNC naming convention : \\Server\pipe\name The default names pipe for SQL server is :                 \\Server\pipe\sql\query A named instance would have a named pipe of                \\server\pipe\MSSQL$instancename\sql\query Early versions of SQL Server only provided Named Pipes. Named Pipes also allows for impersonation of a clients credentials. The feature is used by SQL server when using Linked Servers. The clients logon credentials are passed across to the Linked Server for authentication. Named Pipes can operate over TCP/IP, NETBEUI or IPX as it indirectly relies on the Common Internet Files Sytems