User Authentication and Authorization of Micro Services

[TOC] AOP Implements Logon Status Check stay Chat about user authentication and authorization for micro services (Part 1) In this paper, several common authentication and authorization schemes under microservices are briefly introduced, and a minimalist demo is written using JWT to simulate Token issuance and verification.The purpose of this ...

Posted by siri on Sun, 08 Sep 2019 09:24:46 -0700

springmvc/springboot global exception handling and custom exception handling

Preface Exception handling has always been a big part of project development, but few people pay attention to exception handling. Often it's a simple try/catch all the exceptions, and then a simple print StackTrace, which uses logger at most to print down the log or re-throw the exceptions, and some have custom exceptions, but it's still in the ...

Posted by DasHaas on Sun, 08 Sep 2019 07:05:07 -0700

How do I configure the Maven environment in IDEA?

1. Agreements Classified storage The X:/applications directory holds development tools such as IDEA, Eclipse, Typora The X:/Environments directory holds the development environment, such as JDK, MinGW-w64, cmder X:/IdeaProjects directory for IDEA projects The X:/workspaces directory holds Eclipse's workspace X:/Repository directory used as re ...

Posted by saco721 on Sat, 07 Sep 2019 21:50:52 -0700

WeakHashMap, Source Code Interpretation

Summary WeakHashMap is also an implementation class of the Map interface. It is similar to HashMap and is also a hash table that stores key-value pairs and is non-thread-safe. However, WeakHashMap does not introduce a red-black tree to avoid the impact of hash conflicts. The internal implementation is just an array + a single linked list. In a ...

Posted by MytHunter on Sat, 07 Sep 2019 00:49:46 -0700

Implementation of MapReduce Programming in Windows

Statistics of the number of credit card defaulters in a bank csv download address Breach of contract rule: AY_1-PAY_6:PAY_1 is the repayment situation in September 2005; PAY_2 is the repayment situation in August 2005;... PAY_6 is the repayment in ...

Posted by Kevmaster on Fri, 06 Sep 2019 07:02:24 -0700

RocketMQ upgrades depend on the jar package version

Today, we found a new vulnerability in Aliyun's Cloud Security Center, which is called "fastjson < 1.2.60 Remote Denial of Service vulnerability". Generally speaking, if fastjson version is not updated, attackers may exploit the vulnerab ...

Posted by WebbieDave on Fri, 06 Sep 2019 02:34:14 -0700

gremlin_python encapsulation using add-delete and alter methods

Article Directory 1. Install Janusgraph 2. Connect gremlin 3. Encapsulation of methods for addition, deletion and alteration 4. Other methods of encapsulation 5. Acknowledgements 1. Install Janusgraph 1. Download the installation package Goin ...

Posted by tckephart on Thu, 05 Sep 2019 21:04:36 -0700

Structs2 structs. XML configuration

<struts> <package name="action" namespace="/action" extends="struts-default"> <action name="LoginAction" class="action.LoginAction" method="execute"> <result name="teacher">/teacher.jsp</result> <result name="student">/student.jsp</result> <resul ...

Posted by edwinlcy on Thu, 05 Sep 2019 01:21:41 -0700

Sharing-jdbc routing analysis

Routing engines fall into two main categories: Piecewise Routing (Direct Routing, Standard Routing, Cartesian Product Routing) Broadcast routing (full database table routing, full database routing, full instance routing, unicast routing, blocking routing) Specific Routing Type Meaning Reference to Official Network Routing Engine http ...

Posted by tpl41803 on Wed, 04 Sep 2019 21:28:58 -0700

Spark integrates Kafka and manually maintains offset

Spark Integrates Kafka's Two Patterns In development, we often use SparkStreaming to read and process data in kafka in real time. After version 1.3 of SparkStreaming, KafkaUtils provides two methods to create DStream: Receiver reception: KafkaUtils.c ...

Posted by zilem on Wed, 04 Sep 2019 20:35:09 -0700