Skip to content

Commit c3f0518

Browse files
committed
footnote wording clarification
1 parent f94b2a6 commit c3f0518

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

blog/2022/aws-lambda-safe-global-variables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ async function warnAboutInventoryCount(bucket, context) {
103103

104104
For those familiar with React.js, this feels a lot like the [prop drilling](https://kentcdodds.com/blog/prop-drilling)[^2] problem. Potentially many functions in the middle of a chain of function calls need to support context as input and pass it on to functions called later, without ever using it or adding to it, all because something at the end of the chain might need it. This gets tedious and feels _bad_ and _wrong_, even if you can't articulate why.
105105

106-
[^2]: The irony is not lost on me: I'm advocating for usage of global variables (_in a well-defined scenario!_) and linking to an article that says that prop drilling is a useful solution for using global variables. I agree that globals are bad in a React application for all of the reasons Kent explains.
106+
[^2]: The irony is not lost on me: I'm advocating for usage of global variables (_in a well-defined scenario!_) and linking to an article that says that prop drilling is a useful solution for the problem of using global variables. I agree that globals are bad in a React application for all of the reasons Kent explains; but I contend that this different situation deserves separate consideration.
107107

108108
## Global Variables to the Rescue
109109

0 commit comments

Comments
 (0)