Interceptors do the same kind of work in TC 3.x as Valves do in TC 4.x, but
they are structurally very different. Also, I haven't worked with TC 3.2.x
in a very long time (since TC 3.3.x no longer has the RequestInterceptor
interface).
One suggestion is to extend BaseInterceptor inste
Hai ,
I need some details on the Interceptors in Tomcat 3.x servers.
Whether the Interceptors in 3.x is same as Valves in 4.x .
Is it possible to configure our own interceptors to find the processing
time for a request.I tried writing a Interceptor class by implementing
the RequestInterceptor
r.xml. It kind of
> satisfies my current needs.
>
> I would also require to modify the requests or
> create
> responses based on the requests before they are
> processed by the webapp.
>
> How should I go about this ? Interceptors ? If so,
> can
> someone please direct
Thanks a lot Adam.
I hadn't noticed that in the server.xml. It kind of
satisfies my current needs.
I would also require to modify the requests or create
responses based on the requests before they are
processed by the webapp.
How should I go about this ? Interceptors ? If so, can
someone p
Wesley,
Wesley Gamble wrote:
>
> Where is the best info. on using Tomcat interceptors with 3.2.x?
> I've looked for quite a while, and can't find much documentation at
> all on them. Should I just print whatever source I can find and try
> and puzzle it together fro
All,
Where is the best info. on using Tomcat interceptors with 3.2.x? I've
looked for quite a while, and can't find much documentation at all on them.
Should I just print whatever source I can find and try and puzzle it
together from that?
I need to be able to modify the value o
Creighton Kirkendall wrote:
> I am working implementing a database driven access control interceptor.
> This is similar to JDBCRealm however it stores the information about
> security constrains in the database so they are dynamic. I was wondering if
> I implement this, how can I have JDBCRealm
I am working implementing a database driven access control interceptor.
This is similar to JDBCRealm however it stores the information about
security constrains in the database so they are dynamic. I was wondering if
I implement this, how can I have JDBCRealm work for some of my applications
and