Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Using an SHA is an anti-pattern for me. Because by using one, you kind of modeled "I am getting this fixed/static thing"; when in reality, it is very far from that. I got bitten by it twice that I learned that you either have a lock file or you don't.




Wait, can you explain how you _don't_ get a static thing from a SHA?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: