


Discovery of Hexagonal Architecture: for robust and scalable code
In software development, we often seek to solve problems of scalability, maintainability and testability of code. This is where Hexagonal Architecture, also called "Ports and Adapters", comes into play.
The idea of this approach developed by Alistair Cockburn is that the business domain (the heart of your application) is isolated from the rest of the system and can be used independently of external technologies (framework, database, UI, external APIs ).
Come on, let's dive into the fundamental concepts of Hexagonal Architecture and see together how it can transform the way you design your code! ?
What exactly is Hexagonal Architecture?
Hexagonal Architecture is a way of structuring an application so that it is independent of external details. It emphasizes the separation of concerns by dividing the application into several distinct layers.
The goal is to make the application independent of specific technologies, by organizing the interactions between the heart of the application (business logic) and the outside world (database, user interfaces, API, frameworks, etc. ), all this via Ports and Adapters.
The basic concept
Imagine your application as a hexagon with the domain (business logic) in the center. This core business should not be directly linked to implementation details (like Symfony, Doctrine, a third-party API, etc.). To achieve this, it will be necessary to create interfaces called Ports, and these interfaces will be implemented by Adapters, which take care of communication with external services.
? Ports: in other words, the interfaces through which the outside world can interact with the business core. Ports are the entry or exit points of the application (API, HTTP requests, CLI commands, etc.).
? Adapters: adapters are the concrete implementations of these interfaces. They translate external requests or responses into actions understandable by business logic. This includes interactions with databases, frameworks, APIs, etc.
Structure of a hexagonal application
To understand better, we will use a simple example in Symfony. Let's imagine that your application must allow users to place orders, and that it must interact with a database to store these orders.
Well, look at how you could structure your application according to the hexagonal architecture. ?
1. The Business Heart
This is the core of your application, the part that has no external dependencies. This is where the business logic lies, like creating an order, validating its data, etc.
Here, the Order class represents the basic model of an order. You will notice that this class knows nothing about how it will be stored, or where the data comes from.
2. Ports (Interfaces)
Ports define the interfaces that the adapters will have to implement so that the business logic can work. They can be entry points into the system (like HTTP requests) or exit points (like calls to the database).
The OrderRepositoryInterface interface will serve as the output port. It just defines the methods that the business logic needs to interact with the database. The domain does not know how this data will be saved.
3. Adapters (Implementations)
The Adapter is quite simply the concrete implementation of a Port. The Adapter will allow you to translate:
- all external interactions towards business logic
- business logic towards concrete actions (like saving in a database).
Adapt here translates the call to OrderRepositoryInterface into an interaction with Doctrine (database management library) but your business logic has no idea that Doctrine is used.
4. An example of a controller in Symfony
The controller will act as a entry point for our application. It is he who interacts with the user via HTTP requests, then delegates tasks to the domain via Ports and Adapters.
Here you can see that the controller only knows the OrderRepositoryInterface interface and not the concrete implementation. This makes the code testable, extensible, and independent of external frameworks and technologies (Symfony, Doctrine, etc.).
Why use Hexagonal Architecture?
By separating your business logic from external implementations (database, HTTP, external APIs), you make your code more flexible. Changing database or framework becomes simpler and less risky.
As the business logic is not tied to external elements, you can easily mock or replace the adapters in your tests.
With this clear separation, it is easier to add new features, modify behaviors or reuse certain components without affecting the business logic.
You can reuse the same core business with different types of adapters. For example, the same business logic can be used for a web application, a REST API or even a command line interface.
But be careful!
Even though the hexagonal architecture is powerful, structuring your application this way can be a bit overkill, especially for small projects. For small applications, the hexagonal architecture can add unnecessary complexity, because decoupling everything is not always necessary.
The above is the detailed content of Discovery of Hexagonal Architecture: for robust and scalable code. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The enumeration function in PHP8.1 enhances the clarity and type safety of the code by defining named constants. 1) Enumerations can be integers, strings or objects, improving code readability and type safety. 2) Enumeration is based on class and supports object-oriented features such as traversal and reflection. 3) Enumeration can be used for comparison and assignment to ensure type safety. 4) Enumeration supports adding methods to implement complex logic. 5) Strict type checking and error handling can avoid common errors. 6) Enumeration reduces magic value and improves maintainability, but pay attention to performance optimization.

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

RESTAPI design principles include resource definition, URI design, HTTP method usage, status code usage, version control, and HATEOAS. 1. Resources should be represented by nouns and maintained at a hierarchy. 2. HTTP methods should conform to their semantics, such as GET is used to obtain resources. 3. The status code should be used correctly, such as 404 means that the resource does not exist. 4. Version control can be implemented through URI or header. 5. HATEOAS boots client operations through links in response.

In PHP, exception handling is achieved through the try, catch, finally, and throw keywords. 1) The try block surrounds the code that may throw exceptions; 2) The catch block handles exceptions; 3) Finally block ensures that the code is always executed; 4) throw is used to manually throw exceptions. These mechanisms help improve the robustness and maintainability of your code.

The main function of anonymous classes in PHP is to create one-time objects. 1. Anonymous classes allow classes without names to be directly defined in the code, which is suitable for temporary requirements. 2. They can inherit classes or implement interfaces to increase flexibility. 3. Pay attention to performance and code readability when using it, and avoid repeatedly defining the same anonymous classes.
