Hi,
I am trying secure some pages of my application as shown in this
tutorial. http://tapestryjava.blogspot.co.uk/search/label/security
But I am having following error message when I start the application.
Since the RequiresLoginFilte class implements the ComponentRequestFilter
interface, I am
Looking forward to this.
More books will be good for Tapestry, especially when they start covering
more advanced topics such as in-depth Tapestry IOC. I will buy a copy.
Some topics I'd be interested in:
- Application security, authentication and authorization- best practices
with several popular
On Tue, 06 Aug 2013 07:52:50 -0300, Onno Scheffers o...@piraya.nl wrote:
Looking forward to this.
More books will be good for Tapestry, especially when they start covering
more advanced topics such as in-depth Tapestry IOC. I will buy a copy.
Nice! :)
Some topics I'd be interested in:
-
On Tue, 06 Aug 2013 05:10:37 -0300, Will N. llcool_wil...@yahoo.fr wrote:
Hi,
Hi!
I am trying secure some pages of my application as shown in this
tutorial. http://tapestryjava.blogspot.co.uk/search/label/security
But I am having following error message when I start the application.
Since
Am 06.08.2013 13:25, schrieb Thiago H de Paula Figueiredo:
On Tue, 06 Aug 2013 05:10:37 -0300, Will N. llcool_wil...@yahoo.fr
wrote:
Hi,
Hi!
I am trying secure some pages of my application as shown in this
tutorial. http://tapestryjava.blogspot.co.uk/search/label/security
But I am having
I'm sorry, I should have asked for your ComponentRequestFilter
implementation source too. ;)
On Tue, 06 Aug 2013 08:31:15 -0300, Will N. llcool_wil...@yahoo.fr wrote:
Am 06.08.2013 13:25, schrieb Thiago H de Paula Figueiredo:
On Tue, 06 Aug 2013 05:10:37 -0300, Will N. llcool_wil...@yahoo.fr
Am 06.08.2013 14:13, schrieb Thiago H de Paula Figueiredo:
I'm sorry, I should have asked for your ComponentRequestFilter
implementation source too. ;)
On Tue, 06 Aug 2013 08:31:15 -0300, Will N. llcool_wil...@yahoo.fr
wrote:
Am 06.08.2013 13:25, schrieb Thiago H de Paula Figueiredo:
On
Are you defining your own ComponentRequestFilter interface? As you have
included the code for that I am assuming you have.
You have to implement Tapestry's ComponentRequestFilter, not your own as you
can't contribute to the RequestHandler any other implementation.
regards
Taha
On 06-Aug-2013,
Wy don't you use the wonderful tynamo tapestry-security library.
It works great out of the box and easy to integrate.
On Aug 6, 2013, at 3:10 AM, Will N. llcool_wil...@yahoo.fr wrote:
Hi,
I am trying secure some pages of my application as shown in this tutorial.
Some topics I'd be interested in:
- Application security, authentication and authorization- best practices
with several popular frameworks
Several popular frameworks? Which ones?
I'd say the most popular ones are Shiro and Spring Security. So far I have
only rolled my own based on the
It would be good to have a nice book about Tapestry-IOC. And your
explanations about the container could use a lot of Tapestry (web
framework) code. This could be a good strategy to a deep understanding
about IOC and Core at the same time.
Integration is a subject in my mind too. It would
On Tue, 06 Aug 2013 16:50:53 -0300, Matheus Eduardo Machado Moreira
matheus@gmail.com wrote:
It would be good to have a nice book about Tapestry-IOC. And your
explanations about the container could use a lot of Tapestry (web
framework) code. This could be a good strategy to a deep
On Aug 6, 2013, at 7:22 AM, Thiago H de Paula Figueiredo thiag...@gmail.com
wrote:
Some topics I'd be interested in:
- Application security, authentication and authorization- best practices
with several popular frameworks
Several popular frameworks? Which ones?
Doesn't this fall a
Hello,
If imitation is the sincerest form of flattery then T5-IoC has been paid a
huge compliment...
...there's an IoC in the language Fantom that bears a striking resemblance
to T5-IoC!
afIoc - http://repo.status302.com/doc/afIoc/#overview
I've been an avid fan of Tapestry since v3, and with
Well, I hope you had a chance to address some of the things that are not
perfect in T5 IoC!
On Tue, Aug 6, 2013 at 4:23 PM, Steve Eynon
steve.ey...@alienfactory.co.ukwrote:
Hello,
If imitation is the sincerest form of flattery then T5-IoC has been paid a
huge compliment...
...there's an
No distributed configuration?
On Tue, Aug 6, 2013 at 5:04 PM, Howard Lewis Ship hls...@gmail.com wrote:
Well, I hope you had a chance to address some of the things that are not
perfect in T5 IoC!
On Tue, Aug 6, 2013 at 4:23 PM, Steve Eynon
steve.ey...@alienfactory.co.uk wrote:
Hello,
I was going to write a message, but most of what I wanted to say was already
said.
I am not sure that there is enough of an audience for two books.
Perhaps you can cooperate with Igor to get your content into his book?
There would be a lot of marketing synergy there at least.
On Aug 5, 2013, at
17 matches
Mail list logo