Jump to content

Proxy pattern: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
A4bot (talk | contribs)
Line 146: Line 146:
==External links==
==External links==
*[http://wiki.java.net/bin/view/Javapedia/ProxyPattern Proxy Pattern in Java]
*[http://wiki.java.net/bin/view/Javapedia/ProxyPattern Proxy Pattern in Java]
*[http://home.earthlink.net/~huston2/dp/proxy.html Description] by [[Vince Huston]]
*[http://www.vincehuston.org/dp/proxy.html Proxy pattern discussion] with 1-page examples by [[Vince Huston]]
*[http://www.javaworld.com/javaworld/jw-02-2002/jw-0222-designpatterns.html Take control with the Proxy design pattern] by [[David Geary, JavaWorld.com]]
*[http://www.javaworld.com/javaworld/jw-02-2002/jw-0222-designpatterns.html Take control with the Proxy design pattern] by [[David Geary, JavaWorld.com]]







Revision as of 03:29, 6 October 2007

In computer programming, the proxy pattern is a software design pattern.

A proxy, in its most general form, is a class functioning as an interface to another thing. The other thing could be anything: a network connection, a large object in memory, a file, or some other resource that is expensive or impossible to duplicate.

A well-known example of the proxy pattern is a reference counting pointer object.

In situations where multiple copies of a complex object must exist the proxy pattern can be adapted to incorporate the Flyweight Pattern in order to reduce the application's memory footprint. Typically one instance of the complex object is created, and multiple proxy objects are created, all of which contain a reference to the single original complex object. Any operations performed on the proxies are forwarded to the original object. Once all instances of the proxy are out of scope, the complex object's memory may be deallocated.

Types of proxy pattern include:

  • Remote proxy: Provides a reference to an object located in a different address space on the same or different machine.
  • Virtual proxy: Allows the creation of a memory intensive object on demand. The object will not be created until it is really needed. (See also Lazy evaluation.)
  • Copy-on-write proxy: Defers copying (cloning) a target object until required by client actions. This is really a special case of the "virtual proxy" pattern.
  • Protection (access) proxy: Provides different clients with different levels of access to a target object.
  • Cache proxy: Provides temporary storage of the results of expensive target operations so that multiple clients can share the results. (See also Memoization.)
  • Firewall proxy: Protects targets from bad clients (or vice versa).
  • Synchronization proxy: Provides concurrency control over an unsynchronized target object.
  • Smart reference proxy: Provides additional actions whenever a target object is referenced, such as counting the number of references to the object.

Diagram

Examples

Virtual proxy (in Java)

The following Java example illustrates the "virtual proxy" pattern. The program's output is:

Loading    HiRes_10MB_Photo1
Displaying HiRes_10MB_Photo1
Loading    HiRes_10MB_Photo2
Displaying HiRes_10MB_Photo2
Displaying HiRes_10MB_Photo1

The ProxyImage class is used to delay the expensive operation of loading a file from disk until the result of that operation is actually needed. If the file is never needed, then the expensive load has been totally eliminated.

import java.util.*;
 
interface Image {
    public void displayImage();
}
 
class RealImage implements Image {
    private String filename;
    public RealImage(String filename) { 
        this.filename = filename;        
        System.out.println("Loading   "+filename);
    }
    public void displayImage() { System.out.println("Displaying "+filename); }
}
 
class ProxyImage implements Image {
    private String filename;
    private Image image;
 
    public ProxyImage(String filename) { this.filename = filename; }
    public void displayImage() {
        if (image == null) {
            image = new RealImage(filename); // load only on demand
        }
        image.displayImage();
    }
}
 
class ProxyExample {
    public static void main(String[] args) {
        List<Image> images = new ArrayList<Image>();
        images.add( new ProxyImage("HiRes_10MB_Photo1") );
        images.add( new ProxyImage("HiRes_10MB_Photo2") );
        images.add( new ProxyImage("HiRes_10MB_Photo3") );
 
        images.get(0).displayImage(); // loading necessary
        images.get(1).displayImage(); // loading necessary
        images.get(0).displayImage(); // no loading necessary; already done
        // the third image will never be loaded - time saved!
    }
}

Protection proxy (in C#)

In this C# example, the RealClient stores an account number. Only users who know a valid password can access this account number. The RealClient is protected by a ProtectionProxy which knows the password. If a user wants to get an account number, first the proxy asks the user to authenticate; only if the user entered a correct password does the proxy invoke the RealClient to get an account number for the user.

In this example, thePassword is the correct password.

using System;

namespace ConsoleApplicationTest.FundamentalPatterns.ProtectionProxyPattern
{
    public interface IClient {
        string GetAccountNo();
    }
 
    public class RealClient : IClient {
        private string accountNo = "12345";
        public RealClient() {
            Console.WriteLine("RealClient: Initialized");
        }
        public string GetAccountNo() {
            Console.WriteLine("RealClient's AccountNo: " + accountNo);
            return accountNo;
        }
    }
 
 
    public class ProtectionProxy : IClient
    {
        private string password;  //password to get secret
        RealClient client;
 
        public ProtectionProxy(string pwd) {
            Console.WriteLine("ProtectionProxy: Initialized");
            password = pwd;
            client = new RealClient();
        }
 
        // Authenticate the user and return the Account Number
        public String GetAccountNo() {
            Console.Write("Password: ");
            string tmpPwd = Console.ReadLine();
 
            if (tmpPwd == password) {
                return client.GetAccountNo();
            } else {
                Console.WriteLine("ProtectionProxy: Illegal password!");
                return "";
            }
        }
    }
     
    class ProtectionProxyExample
    {
        [STAThread]
        public static void Main(string[] args) {
            IClient client = new ProtectionProxy("thePassword");
            Console.WriteLine();
            Console.WriteLine("main received: " + client.GetAccountNo());
            Console.WriteLine("\nPress any key to continue . . .");
            Console.Read();
        }
    }
}

See also