From the course: Advanced Python: Build Hands-On Projects with Design Patterns (2023)
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Implementng the Intercepting Validator - Python Tutorial
From the course: Advanced Python: Build Hands-On Projects with Design Patterns (2023)
Implementng the Intercepting Validator
- [Instructor] Are you now more convinced of the importance and necessity of adopting an intercepting validator in your project? When I think about it, the concept is very similar to that of a checkpoint. Learning more details about this pattern will boost your confidence even more. In that positive spirit, let's continue our discussion and go over the pattern's overall structure and behavior. As you can see in the class diagram, an intercepting validator consists of SecureBaseAction, Intercepting Validator, and Validator. The SecureBaseAction class is also a design pattern of its own right. It centralizes security operations that directly interact with end users. These operations include authentication, authorization, input validation, and logging. The SecureBaseAction pattern takes advantage of the command pattern to invoke the security methods. The Intercepting Validator class is responsible for creating specialized…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.