Skip to content

Instantly share code, notes, and snippets.

@jmbataller
Last active April 11, 2024 05:21
Show Gist options
  • Star 3 You must be signed in to star a gist
  • Fork 2 You must be signed in to fork a gist
  • Save jmbataller/65d99fe4b7eae055d614abcb15836175 to your computer and use it in GitHub Desktop.
Save jmbataller/65d99fe4b7eae055d614abcb15836175 to your computer and use it in GitHub Desktop.
Effective Java items
## Effective Java, 2nd Edition
by Joshua Bloch
*I, [Michael Parker](http://omgitsmgp.com/), own this book and took these notes to further my own learning. If you enjoy these notes, please [purchase the book](http://www.amazon.com/Effective-Java-Edition-Joshua-Bloch/dp/0321356683)!*
### Chapter 2: Creating and Destroying Objects
#### Item 1: Consider static factories instead of constructors
* An instance-controlled class is one that uses static factories to strictly control what instances exist at any time.
* By convention, static factory methods for an interface named `Type` are put in a non-instantiable class named `Types`.
* When naming static factory methods, `getInstance` may return the same instance, while `newInstance` should not.
#### Item 2: Consider a builder when faced with many constructor parameters
* The builder pattern simulates optional named parameters in Ada and Python.
* A builder whose parameters have been set makes a fine abstract factory, assuming some generic `Builder<T>` interface.
#### Item 3: Enforce the singleton property with a private constructor or an enum type
* Adding `implements Serializable` to a singleton class is not enough, you must declare all fields `transient` and provide a `readResolve` method.
* A single-element `enum` type provides the serialization for free and is the best way to implement a singleton.
#### Item 4: Enforce non-instantiability with a private constructor
* A private constructor not only supresses instantiation, but subclassing.
#### Item 5: Avoid creating unnecessary objects
* Often lazy initialization only complicates the implementation and yields no noticeable performance increase.
* Prefer primitives to boxed primitives, as unintentional autoboxing can lead to creating many new instances.
* Highly optimized garbage collectors can easily outperform object pools that do not contain heavyweight objects.
#### Item 6: Eliminate obsolete object references
* Whenever a class manages its own memory, like a stack or object pool, the programmer should be alert for memory leaks.
* Caches, listeners, and callbacks can all be sources of memory leaks, but weak references can help.
#### Item 7: Avoid finalizers
* Do not think of finalizers as Java's analogue of C++ destructors -- there's no guarantee finalizers will be called at all!
* If an uncaught exception is thrown in a finalizer, it is ignored, and the finalization abruptly terminates.
* There is a severe performance penalty for using finalizers -- object creation and deletion increases from nanoseconds to microseconds.
### Chapter 3: Methods Common to All Objects
#### Item 8: Obey the general contract when overriding `equals`
* Override `equals` when a class has a notion of logical equality that differs from mere object identity, and the superclass has not provided a suitable implementation.
* For classes that represent a value, such as `Integer` or `Date`, the `equals` method should always be overridden.
* There is no way to extend an instantiable class and add a value component (field) while preserving the `equals` contract.
* By using composition with views to internal components, you can add value components to instantiable classes without violating the `equals` contract.
* To compare `float` and `double` values, use the `Float.compare` and `Double.compare` methods to deal with `NaN` and `-0.0` values.
* For best performance, first compare fields that are more likely to differ, or less expensive to compare.
#### Item 9: Always override `hashCode` when you override `equals`
* To take the hash code of `float` and `double` values, use `Float.floatToIntBits` and `Double.doubleToLongBits`, respectively.
* Immutability offers the chance to cache hash codes if computing them is expensive.
* Try not to specify the behavior of your hash code method in Javadoc, as that limits your options for improving it later.
#### Item 10: Always override `toString`
* If you specify the format in Javadoc, provide a static factory method accepting a `String` parameter so a client can convert between the two forms.
* Provide programmatic information to all the information provided by `toString`, or clients may try to parse the string to retrieve it.
#### Item 12: Consider implementing `Comparable`
* Like the `equals` method, there is no way to extend and instantiable class with a new value component while preserving the `compareTo` contract.
* If `compareTo` is consistent with `equals`, note that sorted collections (e.g. `TreeSet`, `TreeMap`) use the equality test imposed by `compareTo` instead of `equals` and may break the interface (e.g. `Set`, `Map`) contract.
* Use methods `Double.compare` and `Float.compare` instead of relational operators, which don't obey the `compareTo` contract for floating point values.
### Chapter 4: Classes and Interfaces
#### Item 13: Minimize the accessibility of classes and members
* Private and package-private members can "leak" into the exported API if the class implements Serializable.
* Even a protected member is part of the class's exported API and must be supported forever.
* With the exception of `public static final` fields to immutable objects, public classes should have no public fields.
#### Item 14: In public classes, use accessor methods, not public fields
* If a class is package-private or a private nested class, there's nothing wrong with exposing its data.
* A public class with immutable public fields is okay because it can enforce their invariants upon construction.
#### Item 15: Minimize mutability
* For immutable classes, the Java memory model requires that all fields be `final` to ensure correct behavior when passing an instance between threads without synchronization.
* Defend against "leaking" references by making defensive copies in constructors, accessors, and `readResolve` methods when needed.
* Instances of an immutable class can share internal objects with one another for efficiency.
* If a client requires performing expensive multi-stage operations on your class, expose them as primitive methods, or provide a mutable companion class (like `StringBuilder` for `String`).
#### Item 16: Favor composition over inheritance
* Inheritance violates encapsulation because the subclass depends on the implementation details of the superclass for its proper function.
* Inheritance means you inherit the scope and flaws of an API, whereas composition allows you to design a better suited one.
* If an appropriate interface exists, using composition and forwarding allows you to instrument any implementation of the interface, instead of a single implementation through inheritance.
#### Item 17: Design and document for inheritance, or else prohibit it
* The class that allows subclassing must document its self-use of overridable methods.
* The only way to test if a class is suitably designed for inheritance (e.g. provides all the necessary implementation hooks through protected methods) is to actually write subclasses.
* Eliminating a class's self use of methods, typically through introducing private helper methods, can make a class safe to subclass.
#### Item 18: Prefer interfaces to abstract classes
* Use interfaces to allow construction of non-hierarchical type frameworks.
* Simulated multiple inheritance is where a class implementing an interface can forward invocations to an instance of a private inner class that extends the skeletal implementation of that interface and hence does the bulk of the work.
* A variant of a skeletal implementation is the simple implementation, which is a concrete class that defines the simplest possible implementation, such as `AbstractMap.SimpleEntry`.
#### Item 19: Use interfaces only to define types
* Don't use constant interfaces, or interfaces that define no methods but only constants, which classes implement to access the constants without fully qualifying their names.
* If the constants are static members of a class, and you really don't want to qualify their names, use the `static import` facility for brevity.
#### Item 21: Use function objects to represent strategies
* Classes that implement concrete strategies, or simulate function pointers, should be stateless and made into singletons.
* When defining a strategy as an anonymous class that is inline in a method invocation, consider extracting the object as a `private static final` field so a new instance is not created upon every call.
#### Item 22: Favor static member classes over nonstatic
* Nonstatic member classes are ideal for providing adapters, or views of an outer class as an instance of some unrelated class.
* An anonymous class have enclosing instances if and only if they occur in a non-static context.
### Chapter 5: Generics
#### Item 23: Don't use raw types in new code
* `List<E>` is read as "list of E", and `List<String>` is read as "list of string", where `String` is the actual type parameter and `E` is the formal type parameter.
* While an instance of the raw type `List` could be designated to hold only types of a single class but opts out of type-checking, `List<Object>` is typesafe because it explicitly states that it can contain objects of any type.
* The unbound wildcard type, such as in `List<?>`, represents a list of some unknown type and so forbids inserting any element other than `null`, unlike the raw type `List` which is not typesafe.
#### Item 24: Eliminate unchecked warnings
* Always use the `@SuppressWarnings` annotation on the smallest scope possible, to not mask other, critical warnings.
#### Item 25: Prefer lists to arrays
* Arrays are covariant, so `Sub[]` is a subtype of `Super[]`, and reified, so they retain their type-information at runtime and `Super[]` can throw an `ArrayStoreException` when given a different subclass; by contrast, `List<E>` is invariant and erased.
* Consequently, arrays provide runtime safety but not compile-time safety, while a generic type like `List<E>` provides compile-time safety but not runtime safety.
#### Item 27: Favor generic methods
* You can exploit the type inference provided by generic methods and write generic static factory methods that make instances easier to create.
* If you have an immutable, singleton instance of a generic class that could be shared across all types, make it private and of type `Object`, and then let a generic singleton factory method cast it to the caller's desired type.
* The type bound `<T extends Comparable<T>>` may be read as "for every type T that can be compared to itself" and is the definition of a mutually comparable type.
#### Item 28: Use bounded wildcards to improve API flexibility
* If a parameterized type represents a `T` producer, use `<? extends T>`; if a parameterized type represents a `T` consumer, use `<? super T>`.
* Do not use wildcard types as return types, or clients will be forced to use wildcard types in their code.
* Comparables and comparators are always consumers, so you should always use `Comparator<? super T>` in preference to `Comparator<T>`.
* If a type parameter appears only once in a method declaration, replace it with a wildcard, using a private helper method to capture the type if necessary.
#### Item 29: Consider typesafe heterogeneous containers
* A type token is a class literal is passed among methods to communicate both compile-time and runtime type information.
* The cast method of the `Class` type is the dynamic analog of Java's cast operator, throwing a `ClassCastException` if the operation fails.
* The "checked" collection wrappers in `java.util.Collections` use this method with type tokens to enforce, at runtime, that invalid types are not added to a collection through its raw type.
### Chapter 6: Enums and Annotations
#### Item 30: Use `enum` instead of `int` constants
* You can add or reorder constants in an `enum` type without recompiling its clients because the constant values are not compiled into the clients as they are with the int enum pattern.
* Enums are by their nature immutable, and so all their fields should be final.
* If you override the `toString` method of an `enum` type, consider writing a `fromString` method, similar to how the static `valueOf` method would perform if you had not overridden `toString`.
* To share a constant specific method implementations between `enum` values, move each implementation into a private nested `enum`, and pass an instance of this strategy enum to the constructor of the top-level `enum`.
#### Item 32: Use `EnumSet` instead of bit fields
* An `EnumSet` is represented by one or more `long` values, and so many of its operations are effiiciently performed with bitwise arithmetic.
#### Item 33: Use `EnumMap` instead of ordinal indexing
* When you access an array that is indexed by the ordinal value of an `enum`, it is your responsibility to use the correct `int` value, as no type safety is afforded.
* An `EnumMap` contains an array internally, offering the speed of an ordinal-indexed array with the type safety and richness of the `Map` interface.
* Instead of using an array of arrays to define a mapping from two enum values, use `EnumMap<..., EnumMap<...>>`, which is internally represented as an array of arrays.
#### Item 34: Emulate extensible enums with interfaces
* If two enums implement the same interface, both their classes adhere to the type `<T extends Enum<T> & InterfaceName>`.
* Since implementations cannot be inherited from one `enum` type to another, the functionality must be encapsulated in a helper class or a static helper method.
#### Item 35: Prefer annotations to naming patterns
* Annotations like `Retention` and `Target` for annotation type declarations are called meta-annotations.
* A marker annotation is one with no parameter and simply serves to mark some class, method, or field for interpretation by some other method or program.
#### Item 36: Consistently use the `Override` annotation
* There is no need to use the `@Override` annotation when a concrete class overrides an abstract method, i.e. implements it, because a differing signature will be caught by the compiler anyway.
* In an abstract class or interface, annotate all methods you believe to override superclass or superinterface methods, whether concrete or abstract, to ensure that you don't accidentally introduce any new methods.
#### Item 37: Use marker interfaces to define types
* Use a marker interface instead of an annotation if you want to write one or more methods that accept only objects that have this marking, or implement the interface.
* Use a marker interface instead of an annotation if you want to limit the use of the marker to elements of a particular interface, by having the marker interface extend that interface.
* A marker annotation, however, allows marking elements other than classes and interfaces, and allows adding more information while retaining backwards compatibility through type elements with defaults.
### Chapter 7: Methods
#### Item 38: Check parameters for validity
* Nonpublic methods should check their parameters using assertions, which are enabled with the `-enableassertions` command line flag, instead of explicitly throwing exceptions.
* Skip checking a method's parameters before performing the computation if the validity check would be expensive or impractical and the validity check is performed implicitly during the computation.
#### Item 39: Make defensive copies when needed
* When making defensive copies of constructor parameters, check the validity of the copies instead of the originals to guard against malicious changes to the parameters by another thread.
* Do not use the `clone` method to make a defensive copy of a constructor parameter whose type is subclassable by untrusted parties.
* The defensive copy can be replaced by documented transfer of ownership if copying the object would be costly and the class trusts its clients not to modify the components inappropriately.
#### Item 40: Design method signatures carefully
* If you go over four parameters, try to break up the method into orthogonal methods with fewer parameters, introduce helper classes that bundle related parameters together, or use a builder pattern.
* Prefer two-element `enum` types to boolean parameters.
#### Item 41: Use overloading judiciously
* Beware that selection among overloaded methods is static, while selection among overridden methods is dynamic.
* Avoid cases where the same set of parameters can be passed to different overloadings of a method by the addition of casts.
* If a method with a primitive parameter overloads a method with a generic parameter, the two can become conflated from autoboxing.
#### Item 42: Use varargs judiciously
* Don't blindly retrofit every method that has a final array parameter to use varargs; use varargs only when a call operates on a variable-length sequence of values.
#### Item 43: Return empty arrays or collections, not nulls
* Returning `null` from an array or collection-valued method complicates the caller logic, and usually the callee's.
* To eliminate the overhead from creating an empty collection or array, return the immutable empty collections in `java.util.Collections`, or create a static empty array which is necessarily immutable.
#### Item 44: Write doc comments for all exposed API elements
* To include a multiline code example in a doc comment, use a Javadoc `{@code}` tag wrapped inside an HTML `<pre>` tag.
* The `{@literal}` tag is like the `{@code}` tag in that it eliminates the need to escape HTML metacharacters, but doesn't render the contents in monospaced font.
* No two members or constructors should have the same summary description, which is the first (sometimes incomplete) sentence of a doc comment.
### Chapter 8: General Programming
#### Item 45: Minimize the scope of local variables
* Declare a variable at the latest point possible, typically right before it is first used, and strive to provide an initializer.
* If the bound for a loop variable is expensive to compute on every iteration, store it in a loop variable that will fall out of scope with the counter variable.
#### Item 46: Prefer for-each loops to traditional for loops
* If you are writing a type that represents a group of elements, have it implement the `Iterable` interface even if it does not implement `Collection`.
* The enhanced `for` loop cannot be used if you need to remove elements through an iterator, reassign elements through a list iterator, or iterate over collections in parallel.
#### Item 47: Know and use the libraries
* Every programmer should be familiar with the contents of `java.lang` and `java.util` (particularly the collections framework), and to a lesser extent `java.io` and `java.util.concurrent`.
#### Item 48: Avoid `float` and `double` if exact answers are required
* The `BigDecimal` can contain decimal values of arbitrary size and provides eight rounding modes, which is ideal for business calculations with legally mandated rounding behavior.
* If you choose to keep track of the decimal point yourself, `int` provides up to nine decimal digits, while `long` provides up to eighteen.
#### Item 49: Prefer primitive types to boxed primitives
* Never use `==` on two boxed primitives, because this always performs identity comparison, while the `<` and `>` operators compare the underlying primitive values.
* When you mix primitives and boxed primitives in a single operation, the boxed primitive is auto-unboxed, which can result in `NullPointerExceptions`.
* Beware of boxed primitives being implicitly unboxed and then re-boxed, which can cause performance problems.
#### Item 50: Avoid strings where other types are appropriate
* Instead of using a key to represent an aggregate type, write a private static member class -- even if it only has two fields.
#### Item 51: Beware the performance of string concatenation
* A consequence of strings being immutable is that the time to concatenate *n* strings is quadratic in *n*.
* An alternative to using a `StringBuilder` is to try processing the strings one at a time to avoid all concatenation.
#### Item 52: Refer to objects by their interfaces
* If you depend on any properties of an implementation not specified by its interface, such as its synchronization policy, use the class as a type and document the requirements.
#### Item 53: Prefer interfaces to reflection
* If a class is unavailable at compile time but there exists an appropriate interface, create instances reflectively and access them normally through their interface.
* If writing a package that runs against multiple versions of some other package, you can compile it against the minimal environment required to support it, and access any newer classes or methods reflectively.
#### Item 55: Optimize judiciously
* Strive for encapsulation so that a part of the system can be rewritten for performance without changing its other parts.
* You need to measure attempted optimization carefully on the Java platform, because the language does not have a strong performance model, or well-defined relative costs.
#### Item 56: Adhere to generally accepted naming conventions
* Components of a package name should be short, generally eight or fewer characters, where abbreviations are encouraged and acronyms are acceptable.
* Names of `static final` fields whose values are immutable should be in uppercase with words separated by underscores.
* Methods that convert a type have the format `toType`, while methods that return a view have the format `asType`, and methods that return a primitive representation have the format `typeValue`.
### Chapter 9: Exceptions
#### Item 57: Use exceptions for exceptional conditions
* Do not force clients to use exceptions for ordinary control flow, and instead offer methods to test whether an exception could be thrown, such as `hasNext` for class `Iterator`.
* Use a distinguished return value, like `null`, if the object is accessed by multiple threads or if the state-testing method duplicates the work of the state-dependent method.
#### Item 58: Use checked exceptions for recoverable conditions and runtime exceptions for programming errors
* Use runtime exceptions to indicate programming errors, typically precondition violations.
* Don't implement any new `Error` subclasses, and don't define a throwable that does not subclass `Exception` or `RuntimeException`.
#### Item 59: Avoid unnecessary use of checked exceptions
* When designing an API, only throw a checked exception if it can be prevented by a proper use of the API, and the programmer can take some useful action once thrown.
#### Item 60: Favor the use of standard exceptions
* Throw a `NullPointerException` instead of an `IllegalArgumentException` if a caller passes in a `null` parameter where prohibited.
* Throw an `IndexOutOfBoundsException` instead of an `IllegalArgumentException` if the caller passes in an invalid index for a sequence.
#### Item 61: Throw exceptions appropriate to the abstraction
* Use exception translation, where low-level exceptions are caught and exceptions appropriate to the higher-level abstraction are thrown.
* If an exception does not have a chaining-aware constructor, use the `initCause` method of `Throwable`.
* Try to avoid low-level exceptions by checking the higher-level method's parameters upfront.
#### Item 62: Document all exceptions thrown by each method
* Document the unchecked exceptions a method can throw, thereby documenting its preconditions.
* Do not use the `throws` keyword to include unchecked exceptions in a method declaration.
#### Item 63: Include failure-capture information in detail messages
* The `toString` method, or "detail message," should contain the values of all the parameters and fields contributing to the exception.
* To capture this information easily, make them parameters to the constructor, and internally generate the detail message from them.
#### Item 64: Strive for failure atomicity
* A failed method invocation should leave the object in the state it was prior to the invocation.
* Typically you can easily achieve failure atomicity by checking the parameters' validity before the operation.
### Chapter 10: Concurrency
#### Item 66: Synchronize access to shared mutable data
* Synchronization is not just for mutual exclusion, but ensuring that a value written by one thread is seen by another.
* Both read and write operations on mutable data must be `synchronized` or visibility is not guaranteed.
* Beware that the increment and decrement operators are not atomic on volatile integers.
#### Item 67: Avoid excessive synchronization
* Inside a `synchronized` region, do not invoke a method that is provided by the client as a function object, or can be overriden.
* Reentrant locks simplify the construction of multi-threaded object oriented programs, but can allow foreign methods to access an object in an inconsistent state.
* Only make a mutable class thread-safe if intended for concurrent use and you can achieve better concurrency with internal locking; otherwise, punt locking to the client.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment