From the course: Python: Advanced Design Patterns
Unlock the full course today
Join today to access over 24,100 courses taught by industry experts.
Intercepting validator example - Python Tutorial
From the course: Python: Advanced Design Patterns
Intercepting validator example
- [Narrator] Are you now more convinced of the importance and necessity of adopting an intercepting validator in your project? When you think about it the concept is very similar to that of a checkpoint. Learning more details about this pattern will boost your confidence even more. In that positive spirit, let's continue our discussion and go over the pattern's overall structure and behavior. As you can see in the class diagram an intercepting validator consists of secure base action, intercepting validator, and validator. The secure base action class is also a design pattern of its own right. It centralizes security operations that directly interact with and users, which include authentication, authorization, input validation, and logging. This pattern takes advantage of the command pattern to invoke the security methods. The intercepting validator class is responsible for creating specialized intervalidator objects such as parameter validators, or sequel, or SQL validators. When a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.