Mikes Notes
A recent issue of Architecture Notes had a reference to a blog article about the different types of UUID.
"Nicole dives into the world of UUIDs, explaining the eight different versions and their specific use cases. Here's a quick guide to help you choose the right UUID version for your needs. They also touch on the deprecated and specialized versions, highlighting that v7 should be used over v1 and v6 when possible, and v2 is reserved for specific, often secretive, security uses." - Architecture Notes
Resources
- https://architecturenotes.co/p/arc-notes-weekly-78-forests
- https://ntietz.com/blog/til-uses-for-the-different-uuid-versions/
- https://datatracker.ietf.org/doc/html/rfc9562
- https://en.wikipedia.org/wiki/Distributed_Computing_Environment
TIL: 8 versions of UUID and when to use them
What are the different versions?
- UUID Version 1 (v1) is generated from timestamp, monotonic counter, and a MAC address.
- UUID Version 2 (v2) is reserved for security IDs with no known details [2].
- UUID Version 3 (v3) is generated from MD5 hashes of some data you provide. The RFC suggests DNS and URLs among the candidates for data.
- UUID Version 4 (v4) is generated from entirely random data. This is probably what most people think of and run into with UUIDs.
- UUID Version 5 (v5) is generated from SHA1 hahes of some data you proivde. As with v3, the RFC suggests DNS or URLs as candidates.
- UUID Version 6 (v6) is generated from timestamp, monotonic counter, and a MAC address. These are the same data as Version 1, but they change the order so that sorting them will sort by creation time.
- UUID Version 7 (v7) is generated from a timestamp and random data.
- UUID Version 8 (v8) is entirely custom (besides the required version/variant fields that all versions contain).
When should you use them?
With eight different versions, which should you use? There are a few common use cases that dictate which you should use, and some have been replaced by others.
You'll usually be picking between two of them: v4 or v7. There are also some occasions to pick v5 or v8.
- Use v4 when you just want a random ID. This is a good default choice.
- Use v7 if you're using the ID in a context where you want to be able to sort. For example, consider using v7 if you are using UUIDs as database keys.
- v5 or v8 are used if you have your own data you want in the UUID, but generally, you will know if you need it.
What about the other ones?
Per the RFC, v7 improves on v1 and v6 and should be used over those if possible. So you usually won't want v1 or v6. If you do want one of those, you can use v6.
- v2 is reserved for unspecified security things. If you are using these, you probably can't tell me or anyone else about it, and you're probably not reading this post to figure out more about them.
- v3 is superceded by v5, which uses a stronger hash. This one is one where you probably know if you need it.
References
- Despite the title of "today I learned," I did learn this over a month ago. In between, that month contained a lot of sickness and low energy, and I'm finally getting back into a cadence of having energy for some extra writing or extra coding.
- These were used in a project that either failed or is extremely secretive. I can't find much information about it and the official page's copyright notice was last updated in 2020.
No comments:
Post a Comment