From the course: Python: Advanced Design Patterns

Unlock the full course today

Join today to access over 24,100 courses taught by industry experts.

Intercepting validator example

Intercepting validator example - Python Tutorial

From the course: Python: Advanced Design Patterns

Intercepting validator example

- [Narrator] Are you now more convinced of the importance and necessity of adopting an intercepting validator in your project? When you think about it the concept is very similar to that of a checkpoint. Learning more details about this pattern will boost your confidence even more. In that positive spirit, let's continue our discussion and go over the pattern's overall structure and behavior. As you can see in the class diagram an intercepting validator consists of secure base action, intercepting validator, and validator. The secure base action class is also a design pattern of its own right. It centralizes security operations that directly interact with and users, which include authentication, authorization, input validation, and logging. This pattern takes advantage of the command pattern to invoke the security methods. The intercepting validator class is responsible for creating specialized intervalidator objects such as parameter validators, or sequel, or SQL validators. When a…

Contents