Re: bypass the FormComponent # validateRequired()

2016-11-14 Thread Francois Meillet
Hi Martin, Thanks, I did not see #onValidateModelObjects() which is perfect. François > Le 14 nov. 2016 à 21:01, Martin Grigorov a écrit : > > Hi François, > > > On Thu, Nov 10, 2016 at 6:34 PM, Francois Meillet < > francois.meil...@gmail.com> wrote: > >> Hi, >> >>

Re: Pluggable architecture for wicket application

2016-11-14 Thread Martijn Dashorst
I know a Dutch company (or two) that use OSGi, I'm certain that one uses Wicket + OSGi: educator.eu. The other, luminis.eu, does a lot of work with OSGi, but might not use it in combination with Wicket. I only have second hand knowledge about the combination, and it's probably outdated. Maybe

Re: bypass the FormComponent # validateRequired()

2016-11-14 Thread Martin Grigorov
Hi François, On Thu, Nov 10, 2016 at 6:34 PM, Francois Meillet < francois.meil...@gmail.com> wrote: > Hi, > > I have a main form which may contain one to multiple subforms. > Subform's models have validations constraints annotations and I can't > modify the models source code. (then I can’t

Re: Pluggable architecture for wicket application

2016-11-14 Thread Martin Grigorov
Hi, On Mon, Nov 14, 2016 at 3:58 AM, Илья Нарыжный wrote: > Hello, > > We really need advise from Apache Wicket experts. Please let me know if you > have any ideas how to realize the following: > > We are working on Orienteer (http://orienteer.org) - open source Business >

Re: CsrfPreventionRequestCycleListener Link 400

2016-11-14 Thread Francois Meillet
Thanks a lot you very detailed information. François > Le 14 nov. 2016 à 09:25, Emond Papegaaij a écrit > : > > Hi François, > > Since 8.0.0-M2 (and 7.5.0) the CsrfPreventionRequestCycleListener will block > requests without an Origin and Referer header. The

Re: CsrfPreventionRequestCycleListener Link 400

2016-11-14 Thread Emond Papegaaij
Hi François, Since 8.0.0-M2 (and 7.5.0) the CsrfPreventionRequestCycleListener will block requests without an Origin and Referer header. The reason for this is that is possible for an attacker to prevent a browser from sending a referer header (for example with rel="noreferrer"). When you open