You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
However, I'm not seeing anything that would prevent jobs getting enqueued via ActiveJob or Sidekiq or whatever. Am I missing the hook or code that would prevent that from happening?
We currently enforce a sandbox for our prod console via some scripting, but there is nothing preventing someone from accidentally kicking off some model method that enqueues a job that ends up modifying data off in a different process. I know there are various hooks and things that we could use in ActiveJob or Sidekiq, but came here looking to see if there are some nice established patterns to use 😁 .
The text was updated successfully, but these errors were encountered:
Apologies @rsanheim but this gem currently only supports sandboxing for Postgres connections. #1 and #22 are tracking generalizing this but we don't have any immediate plans to work on these issues (but contributions are always welcome). I'll fix the README to accurately reflect this.
Heya cool project! Quick question - I see from the README:
However, I'm not seeing anything that would prevent jobs getting enqueued via ActiveJob or Sidekiq or whatever. Am I missing the hook or code that would prevent that from happening?
We currently enforce a sandbox for our prod console via some scripting, but there is nothing preventing someone from accidentally kicking off some model method that enqueues a job that ends up modifying data off in a different process. I know there are various hooks and things that we could use in ActiveJob or Sidekiq, but came here looking to see if there are some nice established patterns to use 😁 .
The text was updated successfully, but these errors were encountered: