Use Cases

automated testing, building fake servers for development, making memorization proxies, establishing a logging layer, controlling client-side validation and handling access rights

We'll cover the following...

When studying Proxy.revocable, we concluded that we could centralize control of data access via revocable proxies. All we need to do is pass the revocable proxy object to other consumer objects, and revoke their access once we want to make data inaccessible.

In Exercise 1, we will build a proxy that counts the number of times a method was called. Proxies can be used in automated ...