DEV Community

Sadman Yasar Ridit
Sadman Yasar Ridit

Posted on • Edited on

Understanding the Chain of Responsibility Design Pattern in Backend Development

The Chain of Responsibility (CoR) design pattern is a powerful behavioral pattern that can significantly enhance backend development. This pattern allows you to pass requests through a chain of handlers, where each handler can either process the request or pass it along to the next handler. In this blog, we will explore the CoR pattern from a backend perspective, particularly focusing on its application in request validation and processing in a web service, using Java for our examples.

When to Use the Chain of Responsibility Pattern

The Chain of Responsibility pattern is particularly useful in backend systems where requests may require multiple validation and processing steps before they can be finalized. For instance, in a RESTful API, incoming requests might need to be validated for authentication, authorization, and data integrity before being processed by the main business logic. Each of these concerns can be handled by different handlers in the chain, allowing for clear separation of responsibilities and modular code. This pattern is also beneficial in middleware architectures, where different middleware components can handle requests, enabling flexible processing based on specific criteria.

Structure of the Chain of Responsibility Pattern

The CoR pattern consists of three key components: the Handler, Concrete Handlers, and the Client. The Handler defines the interface for handling requests and maintains a reference to the next handler in the chain. Each Concrete Handler implements the logic for a specific type of request processing, deciding whether to handle the request or pass it along to the next handler. The Client sends requests to the handler chain, remaining unaware of which handler will ultimately process the request. This decoupling promotes maintainability and flexibility in the backend system.

Example Implementation in Java

Step 1: Define the Handler Interface

First, we’ll define a RequestHandler interface that includes methods for setting the next handler and processing requests:

abstract class RequestHandler {
    protected RequestHandler nextHandler;

    public void setNext(RequestHandler nextHandler) {
        this.nextHandler = nextHandler;
    }

    public void handleRequest(Request request) {
        if (nextHandler != null) {
            nextHandler.handleRequest(request);
        }
    }
}
Enter fullscreen mode Exit fullscreen mode

Step 2: Create Concrete Handlers

Next, we’ll create concrete handler classes that extend the RequestHandler class, each responsible for a specific aspect of request processing:

class AuthenticationHandler extends RequestHandler {
    @Override
    public void handleRequest(Request request) {
        if (request.isAuthenticated()) {
            System.out.println("Authentication successful.");
            super.handleRequest(request);
        } else {
            System.out.println("Authentication failed.");
            request.setValid(false);
        }
    }
}

class AuthorizationHandler extends RequestHandler {
    @Override
    public void handleRequest(Request request) {
        if (request.isAuthorized()) {
            System.out.println("Authorization successful.");
            super.handleRequest(request);
        } else {
            System.out.println("Authorization failed.");
            request.setValid(false);
        }
    }
}

class DataValidationHandler extends RequestHandler {
    @Override
    public void handleRequest(Request request) {
        if (request.isDataValid()) {
            System.out.println("Data validation successful.");
            super.handleRequest(request);
        } else {
            System.out.println("Data validation failed.");
            request.setValid(false);
        }
    }
}

class BusinessLogicHandler extends RequestHandler {
    @Override
    public void handleRequest(Request request) {
        if (request.isValid()) {
            System.out.println("Processing business logic...");
            // Perform the main business logic here
            super.handleRequest(request);
        } else {
            System.out.println("Request is invalid. Cannot process business logic.");
        }
    }
}
Enter fullscreen mode Exit fullscreen mode

Step 3: Setting Up the Chain

Now, we will set up the chain of handlers based on their responsibilities:

public class RequestProcessor {
    private RequestHandler chain;

    public RequestProcessor() {
        // Create handlers
        RequestHandler authHandler = new AuthenticationHandler();
        RequestHandler authzHandler = new AuthorizationHandler();
        RequestHandler validationHandler = new DataValidationHandler();
        RequestHandler logicHandler = new BusinessLogicHandler();

        // Set up the chain
        authHandler.setNext(authzHandler);
        authzHandler.setNext(validationHandler);
        validationHandler.setNext(logicHandler);

        this.chain = authHandler; // Start of the chain
    }

    public void processRequest(Request request) {
        chain.handleRequest(request);
    }
}
Enter fullscreen mode Exit fullscreen mode

Step 4: Client Code

Here’s how the client code interacts with the request processing chain:

public class Main {
    public static void main(String[] args) {
        RequestProcessor processor = new RequestProcessor();

        // Simulating a valid request
        Request validRequest = new Request(true, true, true);
        processor.processRequest(validRequest);

        // Simulating an invalid request
        Request invalidRequest = new Request(true, false, true);
        processor.processRequest(invalidRequest);
    }
}
Enter fullscreen mode Exit fullscreen mode

Supporting Class

Here’s a simple Request class that will be used to encapsulate the request data:

class Request {
    private boolean authenticated;
    private boolean authorized;
    private boolean dataValid;
    private boolean valid = true;

    public Request(boolean authenticated, boolean authorized, boolean dataValid) {
        this.authenticated = authenticated;
        this.authorized = authorized;
        this.dataValid = dataValid;
    }

    public boolean isAuthenticated() {
        return authenticated;
    }

    public boolean isAuthorized() {
        return authorized;
    }

    public boolean isDataValid() {
        return dataValid;
    }

    public boolean isValid() {
        return valid;
    }

    public void setValid(boolean valid) {
        this.valid = valid;
    }
}
Enter fullscreen mode Exit fullscreen mode

Output Explanation

When you run the client code, you’ll observe the following output:

Authentication successful.
Authorization successful.
Data validation successful.
Processing business logic...
Authentication successful.
Authorization failed.
Request is invalid. Cannot process business logic.
Enter fullscreen mode Exit fullscreen mode
  • The first request is processed successfully through all handlers, demonstrating the entire chain working as intended.
  • The second request fails during the authorization step, stopping further processing and preventing invalid requests from reaching the business logic.

Benefits of the Chain of Responsibility Pattern

  1. Separation of Concerns: Each handler has a distinct responsibility, making the code easier to understand and maintain. This separation allows teams to focus on specific aspects of request processing without worrying about the entire workflow.

  2. Flexible Request Handling: Handlers can be added or removed without altering the existing logic, allowing for easy adaptation to new requirements or changes in business rules. This modularity supports agile development practices.

  3. Improved Maintainability: The decoupled nature of the handlers means that changes in one handler (such as updating validation logic) do not impact others, minimizing the risk of introducing bugs into the system.

  4. Easier Testing: Individual handlers can be tested in isolation, simplifying the testing process. This allows for targeted unit tests and more straightforward debugging of specific request processing steps.

Drawbacks

  1. Performance Overhead: A long chain of handlers may introduce latency, especially if many checks need to be performed sequentially. In performance-critical applications, this could become a concern.

  2. Complexity in Flow Control: While the pattern simplifies individual handler responsibilities, it can complicate the overall flow of request handling. Understanding how requests are processed through multiple handlers may require additional documentation and effort for new team members.

Conclusion

The Chain of Responsibility pattern is an effective design pattern in backend development that enhances request processing by promoting separation of concerns, flexibility, and maintainability. By implementing this pattern for request validation and processing, developers can create robust and scalable systems capable of handling various requirements efficiently. Whether in a RESTful API, middleware processing, or other backend applications, embracing the CoR pattern can lead to cleaner code and improved architectural design, ultimately resulting in more reliable and maintainable software solutions.

References for Further Study

  1. Chain of Responsibility - Refactoring Guru
  2. Chain of Responsibility Pattern - Baeldung
  3. Sarcar, V. (2020). Chain of Responsibility Pattern. In: Design Patterns in C#. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6062-3_22

Top comments (0)