Is there an alternative to eval() where I can evaluate a text input as part of the code? And also, why is it not a best practice to use the eval()?
Discussion posts and replies are publicly visible
In reverse order:
That answers your specific questions. Taking a step back - what is the actual problem you're trying to solve here?
I want to use it as such:
eval( "updatedictionary( fv!item, { "&ri!pkName&": null } )" )
where ri!pkName is a cdt field which i want to address in updatedictionary()
a!update should get you there.
eval() is evil! It allows an attacker to inject code into your application. Think of a SQL injection attack.
Oh thanks, that was helpful.