
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
"Oh, Behave!"
Website / Report Issue / Source Code / Mailing List
Be is a fully versitle, light-weight and BRASS compliant assertions framework for Ruby. It utilizes an assertor design (matchers in RSpec terminology) which meshes well with BDD nomenclatures.
Be's usage is very simple. It consits of using #should
with a target object,
and passing it the reuslt of calling #be
or #have
with expectation critera.
Here is an example:
require 'be'
object = "string"
object.should be.instance_of?(String)
object.should have(6).size
The only difference betwee #be
and #have
is the default expectation method
that is used if none is provided. In the base of #be
it is #==
, for #have
it is #include?
.
"abc".should be("abc")
[:a,:b,:c].should have(:b)
Be works on the principle of assertors, a type of functor, or higher-order
function. In RSpec these are know as matchers. Be provides the method #should
for all Objects which accepts any object that converts to an assertor via a
#to_assertor
method. The #be
and #have
method returns just that, a Be::Delegator
which orgnaizes all calls made against it to use as expectations in the Be::Assertor
.
Copyright (c) 2012 Rubyworks
Be is distributable in accordance with the FreeBSD license.
See License.txt for details.
FAQs
Unknown package
We found that be demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.