(More) safely evaluate Ruby DSLs with cleanroom
Ruby is an excellent programming language for creating and managing custom
DSLs, but how can you securely evaluate a DSL while explicitly controlling the
methods exposed to the user? Our good friends instance_eval and instance_exec
are great, but they expose all methods - public, protected, and private - to
the user. Even worse, they expose the ability to accidentally or intentionally
alter the behavior of the system! The cleanroom pattern is a safer, more
convenient, Ruby-like approach for limiting the information exposed by a DSL
while giving users the ability to write awesome code!
- RPM
- rubygem-chef-cleanroom-1.0.5-1.lbn42.noarch.rpm
- Summary
- (More) safely evaluate Ruby DSLs with cleanroom
- URL
- https://github.com/chef/cleanroom
- Group
- Development/Languages
- License
- Apache-2.0
- Source
-
rubygem-chef-cleanroom-1.0.5-1.lbn42.src.rpm
- Checksum
- 8b10603813fd8a5e279c10b40ea044754608207afc1dfcb958ab46a65b770791
- Build Date
- 2025/09/21 01:35:24
- Requires
-
/usr/bin/bash
- Provides
-
rubygem(chef-cleanroom) = 1.0.5
rubygem-chef-cleanroom = 1.0.5-1.lbn42