Spring Python takes the concepts of the Spring Framework and Spring Security, and brings them to the world of Python. It isn't a simple line-by-line port of the code. Instead, it takes some powerful ideas that were discovered in the realm of Java, and pragmatically applies them in the world of Python.
Spring (Java) provides many simple, easy-to-use functional parts to assemble applications instead of a monolithic framework to extend. Spring Python uses this same approach. This means we can use as little or as much Spring Python as we need to get the job done for each Python application.
In this article by Greg Lee Turnquist, Author of Spring Python 1.1, we will show you how to rapidly write pure SQL queries without dealing with mind-numbing boilerplate code. It also shows how Spring Python works nicely with ORM-based persistence.Read Easily Writing SQL Queries with Spring Python in full
This article by Peter Mularien is an excerpt from the book Spring Security 3.
In this article, we will:
- Examine different methods of configuring password encoding
- Understand the password salting technique of providing additional security to stored passwords
Spring Python offers a clean cut way to take simple applications and split them out between multiple machines using remoting techniques that can be seamlessly injected without causing code rewrite headaches. Spring Python makes it easy to utilize existing technologies, while also being prepared to support ones not yet designed.
In this article by Greg Lee Turnquist, author of Spring Python 1.1, we will learn how:
- Pyro provides a nice Python-to-Python remoting capability to easily create client-server applications
- Spring Python seamlessly integrates with Python so that your application doesn't have to learn the API
- You can convert a simple application into a distributed one, all on the same machine
- It takes little effort to rewire an application by splitting it up into parts, plugging in a round-robin queue manager, and running multiple copies of the server with no impact to our business logic
In this article by Peter Mularien, author of the book Spring Security 3, we will review information relating to common migration issues when moving from Spring Security 2 to Spring Security 3.Read Migration to Spring Security 3 in full
User authentication is an important part of many applications. Let's look at how we would utilize third-party authentication methods. oAuth is an open protocol for secure user authentication across APIs. It allows users to gain limited access to websites by using their Twitter credentials. It's a very sound method of user authentication, and doesn't take too much work to get going. Twitter oAuth is used by hundreds of third-party Twitter clients and mashups—just to give you an idea of how useful it can be.
In this article by Adam Griffiths, author of CodeIgniter 1.7 Professional Development, we will:
- Learn how Twitter oAuth works
- Create a library for authentication
- Utilize the library in order to create an application to demonstrate how it works