From the course: Advanced Python: Build Hands-On Projects with Design Patterns (2023)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Implementng the Intercepting Validator

Implementng the Intercepting Validator

- [Instructor] Are you now more convinced of the importance and necessity of adopting an intercepting validator in your project? When I think about it, the concept is very similar to that of a checkpoint. Learning more details about this pattern will boost your confidence even more. In that positive spirit, let's continue our discussion and go over the pattern's overall structure and behavior. As you can see in the class diagram, an intercepting validator consists of SecureBaseAction, Intercepting Validator, and Validator. The SecureBaseAction class is also a design pattern of its own right. It centralizes security operations that directly interact with end users. These operations include authentication, authorization, input validation, and logging. The SecureBaseAction pattern takes advantage of the command pattern to invoke the security methods. The Intercepting Validator class is responsible for creating specialized…

Contents