|
|
Using CORBA Request-Level Interceptors
This document describes how programmers can implement request-level interceptors in the CORBA environment of the BEA Tuxedo product. Using CORBA request-level interceptors is an advanced programming feature of the BEA Tuxedo system.
Introduction to CORBA Request-Level Interceptors
Client-side Exception Handling
Target-side Exception Handling
Using Multiple Request-Level Interceptors
Multiple Client-side Interceptors
Multiple Target-side Interceptors
Interceptors and Meta-Operations
Developing CORBA Request-Level Interceptors
Step 1: Identify the Interfaces of Your CORBA Application
Step 2: Write the Interceptor Implementation Code
Starting the Implementation File
Initializing the Interceptor at Run Time
Obtaining the Interface Name from a Request
Identifying Operations in the Request
Implementing the Interceptor's Response Operation
Reading Parameters Out of a Data Input Stream
Step 3: Create the Interceptor Header File
Deploying CORBA Request-Level Interceptors
Changing the Order in Which Interceptors Are Called
PersonQuery Sample Application
How the PersonQuery Sample Application Works
Client Application Command-line Interface
The OMG IDL for the PersonQuery Sample Application
Building and Running the PersonQuery Sample Application
Copying the Files for the PersonQuery Sample Application
Changing the Protection on PersonQuery Application Files
Setting the Environment Variables
Building the CORBA Client and Server Applications
Start the PersonQuery Client and Server Applications
Running the PersonQuery Sample Application
Stopping the PersonQuery Sample Application
InterceptorSimp Sample Interceptors
How the PersonQuery Sample Interceptors Work
Registering and Running the PersonQuery Interceptors
Examining the Output of the Interceptors
Unregistering the Interceptors
Unregistering the Interceptors
InterceptorSec Sample Interceptors
How the PersonQuery Sample Interceptors Work
How the InterceptorSec Target-side Interceptor Works
Using the SecurityCurrent Object
Obtaining the SecurityCurrent Object
Creating the List of User Attributes
Registering and Running the PersonQuery Interceptors
Examining the Interceptor Output
Unregistering the Interceptors
InterceptorData Sample Interceptors
InterceptorDataClient Interceptor
InterceptorDataTarget Interceptor
Implementing the InterceptorData Interceptors
Registering and Running the InterceptorData Interceptors
Examining the Interceptor Output
Unregistering the Interceptors
Interceptors::Interceptor Interface
RequestLevelInterceptor::
RequestInterceptor Interface
RequestLevelInterceptor::
ClientRequestInterceptor Interface
RequestLevelInterceptor::
TargetRequestInterceptor Interface
CORBA::DataInputStream Interface
Starter Request-Level Interceptor Files
|
Copyright © 2001 BEA Systems, Inc. All rights reserved.
|