Skip to main content

Power of wrapers in Softwares

In order to get the complete control of undergoing process in any software application, wrappers plays a vital role.Most of the big framework like Spring, Hibernate and Jdbc have this kind of wrappers.In general you can say wrappers are the outer layer of the main object.In Spring security(Formly known as acegi security) we have request wrappers through this request wrapper acegi security decides that each incomming request has authenticate header or not?
How Spring security framework does this ? this is a very simple process. Each and every HttpRequest has to pass some filters configured on some external xml files. These filters inject some information in Httprequest headers, and instead of using the main Request facade spring security uses the wrappers of the request and application will not operate untill and unless request contains the authentication tokens, In this way wrappers are providing security through out the Lifecycle of Request.
A part of the web application there are some wrappers are also available for Jdbc, Log4Jdbc is a project which is hosted in google,which provides the  complete log of queries executed by the native Jdbc driver. The idea behind this is also same, Yes you guessed right it is Wrapers .
The main funda is instead of modifing the functionality of main  component make wrapper of the it, leave the extension points for plugging the wrappers object. Let it be seprate and independent.

Comments

Popular posts from this blog

The Bourne Betrayal | Book Review

Novel by Eric Van Lustbader and Robert Ludlum I like all Robert Ludlum’s novels including those which are written by Evan Lastbadder. To me his novels have taken fiction to the next level. During my way back to Hyderabad from my last summer trip to hometown I bought paperback version of “The Bourne Betryal”. This novel was full of Lastbadder’s style of writing than Robert Ludlum’s one.  I took almost 6 months to complete it. This novel has something different to offer actually. Plot is exciting but the story is not very accelerating. Jason bourn and Martin Lindros, When martin Lindros decided to come back in the field operations with the aim to destroy Fadi and When Martin is out the track , Jason is the only help possible in the situation. Story takes you through various struggle of Jason to bring Martin back home. There are few things where author has not even paid any attention for example how does an ordinary Pakistani Waiter will have that much of information   Towa...

Mobile Message Organizer

Got a basic requirement that i think every mobile should have, all the mail clients have this facility and i dont see any big difficulties on this other than the storage problem which is not a problem at all as we got GB of spaces in our memory cards. Well i am talking about the organizing the messages in Inbox , categorization of messages. Suppose i want to store all the messages from one of my friend say A in a folder called Personal, my existing mobile device Nokai E71 doesn't have this feature inbuilt (Ofcourse if you want you can make a folder and move the messages manually but here i am talking about the idea of automating this procedure). Only thing we need to do is , we have to store the rules in separate location , rules will be defined by the user and then device will follow these rules.There are no or very less software available which satisfy this requirement for mobile device.this is so simple but basic requirement as per the end user. I am going to make this one ...

Time to keep secure your Account

Now a days every one is crazy about social networking and visiting orkut and facebook is becoming an important part of our daily life.This has become as important as food for life, even for some folks social networking tops the chart in priority list.Not everything is wrong with this, infact some of the things that social networking sites brings are really nice like they help us to staying in touch with family and friends. But if you are sharing your personal information and photographs then eventually security concerns comes in the fore front of social networking world. With my limited understanding, I have come up with following points that you have to keep in your mind before creating the social networking account 1. Don't expose all your information in social networking site if not in the web.     Any one can use these information against you, for example your     date of birth ,college name,place of birth or any thing     will be more than s...