
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
Devloop is an automated Rspec runner for Rails apps inspired by TLDR and Rust (full story). The purpose of this tool is to provide continuous and instant feedback when working on the Rails app. It runs only specs from lines modified in the recent git commits. Even if you have a large spec/user_spec.rb
file, you'll receive specs feedback in ~second on each file save.
Optionally, you can edit first line of any spec file (i.e. add #
) to run all the tests from it.
In your Gemfile
:
gem "devloop", group: :development
Now you can run:
bundle exec devloop
You can also use it without adding to the Gemfile
:
gem install devloop
devloop
Remember to run the devloop
command from the root of your Rails application.
While devloop
process is running it will automatically execute tests related to the recently modified lines of code from spec/
folder.
Devloop will automatically detect if Spring is enabled for your Rails app. I've observed it reduces time needed to run specs by ~4x.
If currently there are no modified spec files, devloop will run tests based on changes in the most recent git commit.
This is in a very early stage of development so feedback is welcome.
FAQs
Unknown package
We found that devloop demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.