Return to Five Lines of Code, Refactoring, Legacy code, Refactoring bibliography, TypeScript bibliography, TypeScript, TypeScript DevOps, Web development bibliography, Software engineering bibliography
2 Looking under the hood of refactoring
Part 1. Learn by refactoring a computer game
Part 2. Taking what you have learned into the real world
7 Collaborate with the compiler
8 Stay away from comments
10 Never be afraid to add code
11 Follow the structure in the code
12 Avoid optimizations and generality
14 Wrapping up
Appendix. Installing the tools for part 1
about the cover illustration
1.1 What is refactoring?
1.3 Culture: When to refactor?
Refactoring in a legacy system]]
When should you not refactor?
1.4 Tools: How to refactor (safely)
1.5 Tools you need to get started
Programming language: TypeScript
1.6 Overarching example: A 2D puzzle game
Practice makes perfect: A second codebase
1.7 A note on real-world software
2 Looking under the hood of refactoring
2.1 Improving readability and maintainability
Making code better
Maintaining code . . . without changing what it does
2.2 Gaining speed, flexibility, and stability
Favoring composition over inheritance
Changing code by addition rather than modification
2.3 Refactoring and your daily work
Refactoring as a method for learning
2.4 Defining the “domain” in a software context
Part 1. Learn by refactoring a computer game
3.1 Establishing our first rule: Why five lines?
3.2 Introducing a refactoring pattern to break up functions
Refactoring pattern: Extract method
3.3 Breaking up functions to balancing abstraction
3.4 Properties of a good function name
3.5 Breaking up functions that are doing too much
4.1 Refactoring a simple if statement
Refactoring pattern: Replace type code with classes
Refactoring pattern: Push code into classes
Refactoring pattern: Inline method
4.2 Refactoring a large if statement
Refactoring pattern: Specialize method
Eliminating the if
4.3 Addressing code duplication
Couldn’t we use an abstract class instead of the interface?
Rule: Only inherit from interfaces
What is up with all this code duplication?
4.4 Refactoring a pair of complex if statements
Refactoring pattern: Try delete then compile
Refactoring pattern: Unify similar classes
5.2 Unifying simple conditions
Refactoring pattern: Combine ifs
5.3 Unifying complex conditions
Using arithmetic rules for conditions
5.4 Unifying code across classes
Introducing UML class diagrams to depict class relations
Refactoring pattern: Introduce strategy pattern
Rule: No interface with only one implementation
Refactoring pattern: Extract interface from implementation
5.5 Unifying similar functions
6.1 Encapsulating without getters
Rule: Do not use getters or setters
Refactoring pattern: Eliminate getter or setter
Eliminating the final getter
6.2 Encapsulating simple data
Rule: Never have common affixes
Refactoring pattern: Encapsulate data
6.3 Encapsulating complex data
6.4 Eliminating a sequence invariant
Refactoring pattern: Enforce sequence
6.5 Eliminating enums another way
Enumeration through private constructors
Part 2. Taking what you have learned into the real world
7 Collaborate with the compiler
7.1 Getting to know the compiler
Weakness: The halting problem limits compile-[[time knowledge
Strength: Reachability ensures that methods return
Strength: Definite assignment prevents accessing un[[initialized variable]]s
Strength: Access control helps encapsulate data
Strength: Type checking proves properties
Weakness: Dereferencing null crashes our application
Weakness: Arithmetic errors cause overflows or crashes
Weakness: Out-of-bounds errors crash our application
Weakness: Infinite [[loops stall our application
Weakness: Deadlocks and race conditions cause unintended behavior
7.4 Trusting the compiler exclusively
8 Stay away from comments
8.1 Deleting outdated comments
8.2 Deleting commented-out code
8.4 Transforming comments into method names
8.5 Keeping invariant-documenting comments
9.1 Deleting code may be the next frontier
9.2 Deleting code to get rid of incidental complexity
Technical ignorance from inexperience
Technical waste from time pressure
Technical debt]] from circumstances
9.3 Categorizing code based on intimacy
9.4 Deleting code in a legacy system]]
Using the strangler fig pattern to get insight
Using the strangler fig pattern to improve the code
9.5 Deleting code from a frozen project
Making the desired outcome the default
Minimizing waste with spike and stabilize
9.6 Deleting branches in version control
Minimizing waste by enforcing a branch limit
9.7 Deleting code documentation
Algorithm to determine how to codify knowledge
Fixing or deleting flaky tests
Refactoring the code to get rid of complicated tests
Specializing tests to speed them up
9.9 Deleting configuration code
9.10 Deleting code to get rid of libraries
Limiting our reliance on external libraries
9.11 Deleting code from working features
10 Never be afraid to add code
10.1 Accepting uncertainty: Enter the danger
10.2 Using spikes to overcome the fear of building the wrong thing
10.3 Overcoming the fear of waste or risk with a fixed ratio
10.4 Overcoming the fear of imperfection by embracing gradual improvement
10.5 How copy and paste effects change velocity
10.6 Modification by addition through extensibility
10.7 Modification by addition enables backward compatibility]]
10.8 Modification by addition through feature toggles
10.9 Modification by addition through branch by abstraction
11 Follow the structure in the code
11.1 Categorizing structure based on scoped and origin
11.2 Three ways that code mirrors behavior
Expressing behavior in the control flow
Expressing behavior in the structure of the data
Expressing behavior in the data
11.3 Adding code to expose structure
11.4 Observing instead of predicting, and using empirical techniques
11.5 Gaining safety without understanding the code
Gaining safety through testing
Gaining safety through mastery
Gaining safety through tool assistance
Gaining safety through formal verification
Gaining safety through fault tolerance
11.6 Identifying unexploited structures
Exploiting]] whitespace with extraction and encapsulation
Exploiting]] duplication with unification
Exploiting]] common affixes with encapsulation
Exploiting]] the runtime type with dynamic dispatch
12 Avoid optimizations and generality
12.1 Striving for simplicity
12.2 When and how to generalize
Building minimally to avoid generality
Unifying things of similar stability
Eliminating unnecessary generality
12.3 When and how to optimize
Refactoring before optimizing
Optimizing according to the theory of constraints
Guiding optimization with metrics
Choosing good algorithms and data structures
13.1 Signaling process issues with bad code
13.2 Segregating into pristine and legacy code
13.3 Approaches to defining bad code
The rules in this book: Simple and concrete
Code smells: Complete and abstract
Cyclomatic complexity: Algorithmic (objective)
Cognitive complexity: Algorithmic (subjective)
13.4 Rules for safely vandalizing code
13.5 Methods for safely vandalizing code
Using enums
Using ints and strings as type codes
Putting magic numbers in the code
Putting whitespace in the code
Grouping things based on naming
Giving methods many parameters
Using getters and setters
14 Wrapping up
14.1 Reflecting]] on the journey of this book
14.1 Exploring the underlying philosophy
Searching for ever-smaller steps
Searching for the underlying structure
Using the rules for collaboration
Prioritizing the team over individuals
Prioritize simplicity over completeness
Using objects or higher-order functions
14.1 Where to go from here?
Appendix. Installing the tools for part 1
Refactoring: Refactoring - Improving the Design of Existing Code.
Refactoring, Code Smell, Testing, Continuous Integration, Design Pattern, DRY Principle, KISS Principle, YAGNI Principle, Legacy Code, Technical Debt, Code Duplication, Automated Testing, Unit Testing, Integration Testing, Test-Driven Development, Agile Methodology, Software Architecture, Clean Code, Object-Oriented Programming, Functional Programming, SOLID Principles, Coupling, Cohesion, Modularity, Encapsulation, Inheritance, Polymorphism, Abstraction, Composition, Interface, Method Overloading, Singleton Pattern, Factory Pattern, Builder Pattern, Prototype Pattern, Adapter Pattern, Decorator Pattern, Observer Pattern, Strategy Pattern, Template Method Pattern, Command Pattern, State Pattern, Proxy Pattern, Version Control, Git, Subversion, Mercurial, Continuous Deployment, DevOps, Performance Optimization, Scalability, Reliability, Maintainability, Usability, Accessibility, Security, Data Structures, Algorithms, Big O Notation, Recursion, Concurrency, Parallelism, Synchronization, Deadlock, Race Conditions, Memory Management, Garbage Collection, Heap, Stack, Database Design, SQL, NoSQL, ORM (Object-Relational Mapping), API Design, REST, GraphQL, Microservices, Monolithic Architecture, Cloud Computing, AWS, Azure, Google Cloud Platform, Docker, Kubernetes, CI/CD Pipelines, Logging, Monitoring, Debugging, Profiling, Code Review, Pair Programming, Refactoring Tools, IDE (Integrated Development Environment), Syntax Highlighting, Code Completion, Static Code Analysis, Dynamic Analysis, Code Metrics, Software Documentation, README Files, Commenting Code, Software Licensing, Open Source Software, Closed Source Software
Refactoring guidelines, Refactoring patterns, Refactoring data structures - Refactoring algorithms, Refactoring syntax, Refactoring OOP, Refactoring in IDEs, Refactoring tools, Refactoring DevOps - Refactoring SRE, Refactoring data science - Refactoring DataOps, Refactoring machine learning, Refactoring deep learning, Refactoring functional, Refactoring concurrency, Refactoring programming languages (C refactoring, C Plus Plus refactoring | C++ refactoring, C Sharp refactoring | refactoring, Golang refactoring, Java refactoring, JavaScript refactoring, Kotlin refactoring, Python refactoring, Ruby refactoring, Rust refactoring, Scala refactoring, SQL refactoring, Swift refactoring, TypeScript refactoring), Refactoring history, Refactoring bibliography, Refactoring glossary, Refactoring topics, Refactoring courses, Refactoring libraries, Refactoring packages, Refactoring frameworks, Refactoring research, Refactoring GitHub, Refactoring Awesome list. (navbar_refactoring)
Cloud Monk is Retired ( for now). Buddha with you. © 2025 and Beginningless Time - Present Moment - Three Times: The Buddhas or Fair Use. Disclaimers
SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.