spring security inherits spring boot I

1. spring security is for permission authentication. 2. Database based authentication is used in all projects. First, we create a permission related table. General authority controls include    user → role → data_privilege    user →data_privilege  Users control through role. Data permission is ...

Posted by sunilj20 on Fri, 07 Feb 2020 09:48:06 -0800

File System (01): Manage Excel and PDF file types based on the SpringBoot framework

Source code for this article: GitHub. Click here || GitEE. Click here 1. Introduction to Document Types 1. Excel Documents Excel is a spreadsheet software.Intuitive interfaces, excellent computing functions and chart tools are often used in system development to transfer data to Excel files or to import Excel data into the system, which involve ...

Posted by Round on Thu, 06 Feb 2020 18:54:39 -0800

Alibaba Java Development Manual Codes Effective Details-An Analysis of the Grinding Null Pointer Problem

1 Leader Say nothing but read the manual guidelines first The manual has helped us summarize common problem scenarios, but we still need to dig into the null pointer problem in order to get it right. 2 What is the null pointer in the world? 2.1 Official Resolution A null is passed in when the app ...

Posted by leatherback on Wed, 05 Feb 2020 16:45:04 -0800

Build your own Fabric network

Build your own Fabric network Article directory Build your own Fabric network 1, Generate organization structure and identity certificate 1.1. crypto-config.yaml configuration file 1.2 generate organization structure and identity certificate 2, Generate additional profiles 2.1. configtx.yaml fi ...

Posted by Vorotaev on Wed, 05 Feb 2020 05:29:12 -0800

The usage exception of spring boot plus background management system

Article directory Record the special exceptions in the process of using the scaffold of the development platform of background management system based on spring boot 2 Exception 1: ` ` java.lang.IncompatibleClassChangeError: Found interface org.objectweb.asm.MethodVisitor, but class was expected`` ...

Posted by IMP_TWI on Tue, 04 Feb 2020 08:23:24 -0800

TensorRT/parsers/caffe/caffeParser/opParsers/opParsers.h source code study

TensorRT/parsers/caffe/caffeParser/opParsers/opParsers.h source code study TensorRT/parsers/caffe/caffeParser/opParsers/opParsers.h function pointer function pointer as template argument std::unordered_map Reference link TensorRT/parsers/caffe/caffeParser/opParsers/opParsers.h /* * Copyright (c) ...

Posted by mrjiggyhill on Tue, 04 Feb 2020 07:59:00 -0800

Talk about network healthcheck of artemis

order This paper focuses on the network health check of artemis NetworkHealthCheck activemq-artemis-2.11.0/artemis-commons/src/main/java/org/apache/activemq/artemis/core/server/NetworkHealthCheck.java public class NetworkHealthCheck extends ActiveMQScheduledComponent { private static final Logger logger = Logger.getLogger(NetworkHealthCheck ...

Posted by jasonc310771 on Tue, 04 Feb 2020 06:34:14 -0800

Mybatis learning notes - annotation configuration development

Overview: 1. Preparation Create a database and user table, account table (using mysql) Entity class User Entity class Account dao.UserDao dao.AccountDao 2. XML configuration file Mybatis-config.xml.xml (under resources directory) 3. Operation test UserDaoTest AccountDaoTest 4. note: Project ...

Posted by rake on Tue, 04 Feb 2020 01:28:48 -0800

Use Spring Security for security control in Spring Boot learning

Security configurations are often used in development, and users who do not have access need to go to the login form page.There are many ways to achieve access control, including through Aop, interceptors, and frameworks (such as Apache Shiro, Spring Security). We describe how Spring Security is used fo ...

Posted by Nickosssss on Mon, 03 Feb 2020 18:07:37 -0800

RocketMQ practice -- high concurrency seckill scenario

1. Preface Seckill is essentially a short-term, sudden and high concurrent access problem. Its business features are as follows: Triggered by timing, the flow suddenly increases in an instant Only some of the requests for seckill are successful Seckill products are often limited in quantity, not over ...

Posted by fatepower on Sun, 02 Feb 2020 22:06:54 -0800