Source code analysis
Because spring security social is implemented based on social authentication filter, let's start with social authentication filter
When it comes to Filter, there must be a corresponding configuration class SocialAuthenticationFilter is no exception. Its corresponding configuration class is SpringSocialConfigurer. To make ...
Posted by raymie7 on Sun, 08 Mar 2020 05:20:00 -0700
Source code of the project: https://github.com/zhuquanwen/mybatis-learn/releases/tag/with-annotation
Based on the previous article, some processes are not described in detail. The previous source code has been attached. Please refer to the previous article: https://blog.csdn.net/u0 ...
Posted by davieboy on Sat, 07 Mar 2020 23:49:30 -0800
Want to get the most complete and detailed information of the whole network: (1022848328)
JWT generates token with error: secret key byte array cannot be null or empty
java.lang.IllegalArgumentException: secret key byte array cannot be null or empty.
at io.jsonwebtoken.lang.Assert.notEmpty(Asse ...
Posted by seddonym on Sat, 07 Mar 2020 06:09:19 -0800
Shiro provides a complete enterprise level session management function, independent of the underlying container (such as web container tomcat), which can be used in both Java Se and Java EE environments. It provides session management, session event monitoring, session storage / persistence, container independent clustering, ...
Posted by genics on Sat, 07 Mar 2020 00:46:52 -0800
2, thrift server
3, thrift client connection pool
Introducing pom dependency
Objects that need to be pooled
Configuration class of object pool
Spring configuration class
Because of the need of work, when using thr ...
Posted by vickyjackson on Thu, 05 Mar 2020 21:58:27 -0800
(1) Time stamp milliseconds to seconds
(2) Time stamp conversion to time type
(3) Convert common time types to timestamps
(4) Use third-party class library conversion
(5) String to Date
(6) Date to String
(7) Calendar to String
(8) String to Calendar
(9) Date to Calendar ...
Posted by misterph on Thu, 05 Mar 2020 18:10:51 -0800
Implement a handwritten WC program and package it to run on the cluster.
Create a Maven project and import pom
<?xml version="1.0" encoding="UTF-8"?>
Posted by RCS on Thu, 05 Mar 2020 04:17:04 -0800
When writing web crawlers, we often encounter the problem of frequent IP access being blocked. The commonly used solution is to proxy ip.To do this, I wrote a sample program that randomly generates an available proxy ip.
Posted by marseille on Wed, 04 Mar 2020 08:23:59 -0800
This paper mainly studies the AbstractPlatformTransactionManagerInstrumentation of skywalking
Posted by YodaOfCamarilla on Wed, 04 Mar 2020 06:42:11 -0800
Original address: http://www.yiidian.com/springmvc/file-upload.html
File upload is a common requirement in the presentation layer. In Spring MVC, the common file upload tool of Apache is used to complete file upload and encapsulate it, making it more convenient for developers to use. Let's see how to develop it?
1 import common file upload pack ...
Posted by enoyhs on Wed, 04 Mar 2020 05:04:44 -0800