|
|
This document describes how programmers can implement request-level interceptors in the BEA WebLogic Enterprise (WLE) system. Using request-level interceptors is an advanced programming feature of the WLE system.
This document is intended for programmers who want to create secure, scalable, transaction-based server applications. It assumes you are familiar with CORBA and the C++ and Java programming languages.
This document contains the following topics:
Client-side Exception Handling
Target-side Exception Handling
Using Multiple Request-Level Interceptors
Multiple Client-side Interceptors
Multiple Target-side Interceptors
Interceptors and Implementation Languages
Interceptors and Meta-operations
Step 1: Identify the Interfaces of Your WLE Applications
Step 2: Write the Interceptor Implementation Code
Starting the Implementation File
Initializing the Interceptor at Run Time
Obtaining the Interface Name from a Request
Identifying Operations in the Request
Implementing the Interceptor's Response Operation
Reading Parameters out of a Data Input Stream
Step3: Create the Interceptor Header File
Step 1: Identify the Interfaces of Your WLE Applications
Step 2: Write the Interceptor Implementation Code
Starting the Implementation File
Implementing the Interceptor's Constructor
Obtaining the Interface Name from a Request
Identifying Operations in the Request
Implementing the Interceptor's Response Operation
Reading Data Out of a Data Input Stream
Notes About Implementing Java Interceptors
Changing the Order in which Interceptors are Called
How the PersonQuery Sample Application Works
Client Application Command-line Interface
The OMG IDL for the PersonQuery Sample Application
Building and Running the PersonQuery Sample Application
Copying the Files for the PersonQuery Sample Application
Changing the Protection on PersonQuery Application Files
Setting the Environment Variables
Building the Client and Server Applications
Start the PersonQuery Client and Server Applications
Running the PersonQuery Sample Application
Stopping the PersonQuery Sample Application
Building and Running the Java RLI Sample Applications
Copying the Files for the Java PersonQuery Samples
Changing the Protection on PersonQuery Application Files
Setting the Environment Variables
Building the Server Application
Start the PersonQuery Client and Server Applications
Running the PersonQuery Sample Application
Stopping the PersonQuery Sample Application
How the PersonQuery Sample Interceptors Work
Registering and Running the PersonQuery Interceptors
Registering and Running the C++ Interceptors
Registering and Running the Java Interceptors
Examining the Output of the Interceptors
Unregistering the Interceptors
Unregistering the C++ Interceptors
Unregistering the Java Interceptors
How the PersonQuery Sample Interceptors Work
How the InterceptorSec Target-side Interceptor Works
Using the SecurityCurrent Object
Obtaining the SecurityCurrent Object
Creating the List of User Attributes
Registering and Running the PersonQuery Interceptors
Registering and Running the C++ Interceptors
Registering and Running the Java Interceptors
Examining the Interceptor Output
Unregistering the Interceptors
Unregistering the C++ Interceptors
Unregistering the Java Interceptors
InterceptorDataClient Interceptor
InterceptorDataTarget Interceptor
Implementing the InterceptorData Interceptors
Registering and Running the InterceptorData Interceptors
Registering and Running the C++ Interceptors
Registering and Running the Java Interceptors
Examining the Interceptor Output
Unregistering the Interceptors
Unregistering the C++ Interceptors
Unregistering the Java Interceptors
Interceptors::Interceptor Interface
RequestLevelInterceptor::
RequestInterceptor Interface
RequestLevelInterceptor::
ClientRequestInterceptor Interface
RequestLevelInterceptor::
TargetRequestInterceptor Interface
CORBA::DataInputStream Interface
|
Copyright © 1999 BEA Systems, Inc. All rights reserved.
|