User Authentication and Authorization of Micro Services
[TOC]
AOP Implements Logon Status Check
stay Chat about user authentication and authorization for micro services (Part 1) In this paper, several common authentication and authorization schemes under microservices are briefly introduced, and a minimalist demo is written using JWT to simulate Token issuance and verification.The purpose of this ...
Posted by siri on Sun, 08 Sep 2019 09:24:46 -0700
springmvc/springboot global exception handling and custom exception handling
Preface
Exception handling has always been a big part of project development, but few people pay attention to exception handling. Often it's a simple try/catch all the exceptions, and then a simple print StackTrace, which uses logger at most to print down the log or re-throw the exceptions, and some have custom exceptions, but it's still in the ...
Posted by DasHaas on Sun, 08 Sep 2019 07:05:07 -0700
How do I configure the Maven environment in IDEA?
1. Agreements
Classified storage
The X:/applications directory holds development tools such as IDEA, Eclipse, Typora
The X:/Environments directory holds the development environment, such as JDK, MinGW-w64, cmder
X:/IdeaProjects directory for IDEA projects
The X:/workspaces directory holds Eclipse's workspace
X:/Repository directory used as re ...
Posted by saco721 on Sat, 07 Sep 2019 21:50:52 -0700
WeakHashMap, Source Code Interpretation
Summary
WeakHashMap is also an implementation class of the Map interface. It is similar to HashMap and is also a hash table that stores key-value pairs and is non-thread-safe. However, WeakHashMap does not introduce a red-black tree to avoid the impact of hash conflicts. The internal implementation is just an array + a single linked list. In a ...
Posted by MytHunter on Sat, 07 Sep 2019 00:49:46 -0700
Implementation of MapReduce Programming in Windows
Statistics of the number of credit card defaulters in a bank
csv download address
Breach of contract rule: AY_1-PAY_6:PAY_1 is the repayment situation in September 2005; PAY_2 is the repayment situation in August 2005;... PAY_6 is the repayment in ...
Posted by Kevmaster on Fri, 06 Sep 2019 07:02:24 -0700
RocketMQ upgrades depend on the jar package version
Today, we found a new vulnerability in Aliyun's Cloud Security Center, which is called "fastjson < 1.2.60 Remote Denial of Service vulnerability".
Generally speaking, if fastjson version is not updated, attackers may exploit the vulnerab ...
Posted by WebbieDave on Fri, 06 Sep 2019 02:34:14 -0700
gremlin_python encapsulation using add-delete and alter methods
Article Directory
1. Install Janusgraph
2. Connect gremlin
3. Encapsulation of methods for addition, deletion and alteration
4. Other methods of encapsulation
5. Acknowledgements
1. Install Janusgraph
1. Download the installation package
Goin ...
Posted by tckephart on Thu, 05 Sep 2019 21:04:36 -0700
Structs2 structs. XML configuration
<struts>
<package name="action" namespace="/action" extends="struts-default">
<action name="LoginAction" class="action.LoginAction" method="execute">
<result name="teacher">/teacher.jsp</result>
<result name="student">/student.jsp</result>
<resul ...
Posted by edwinlcy on Thu, 05 Sep 2019 01:21:41 -0700
Sharing-jdbc routing analysis
Routing engines fall into two main categories:
Piecewise Routing (Direct Routing, Standard Routing, Cartesian Product Routing)
Broadcast routing (full database table routing, full database routing, full instance routing, unicast routing, blocking routing)
Specific Routing Type Meaning Reference to Official Network Routing Engine
http ...
Posted by tpl41803 on Wed, 04 Sep 2019 21:28:58 -0700
Spark integrates Kafka and manually maintains offset
Spark Integrates Kafka's Two Patterns
In development, we often use SparkStreaming to read and process data in kafka in real time. After version 1.3 of SparkStreaming, KafkaUtils provides two methods to create DStream:
Receiver reception: KafkaUtils.c ...
Posted by zilem on Wed, 04 Sep 2019 20:35:09 -0700