jquery custom alert

Antecedent: since the domain name will pop up in mobile devices, especially in IOS devices, it is necessary to customize the pop-up box; But there is a problem: the custom confirm cannot be assigned in the callback function, and the self defined confirm does not return the Boolean parameter, so when modifying or deleting, click "OK" ...

Posted by frenchpl on Sun, 31 May 2020 06:55:35 -0700

react treading pit does not point completely North (2)

1.img introduces picture paths Local Picture Method 1: <img src={require('../img/icon1.png')} alt="" /> Method 2: import search from '../img/search.png' import user from '../img/user.png' <img src={search} alt="" /> <img src={user} alt="" /> Background Picture Reference Method const divStyle = { color: 'red', ...

Posted by everisk on Sat, 30 May 2020 09:35:26 -0700

Sorting out the use of some functional functions

Some commonly used functional functions About native JS File size unit conversion /** * @desc bytesToSize Byte unit conversion * @param bytes Incoming data in bit */ const bytesToSize = function (bytes) { const k = 1024; if (!bytes || bytes === 0) return '0 B'; if (typeof (bytes) == 'string') { return bytes } else { ...

Posted by gilijk on Sat, 30 May 2020 08:29:56 -0700

Configuration file of Spring Boot configuration (configuration file, loading order, configuration principle)

configuration file Spring Boot uses a global configuration file whose name is fixed application.properties application.yml Function of configuration file: modify the default value of Spring Boot auto configuration, that is, modify the value that Spring Boot has configured for us at the bottom YAML(YAML Ain't Markup Language) Markup Language: ...

Posted by ManInBlack on Sat, 30 May 2020 02:51:32 -0700

Learn from me about the design and implementation of spring boot development backend management system 8: matrxi web permission

The last article describes the idea of permission control implemented by matrix web as a whole. Let's review: First of all, the user needs to log in and fill in the user name and password. The backend receives the login request and verifies the user and password. After the verification is successful, the Token is generated according to the u ...

Posted by sparrrow on Thu, 28 May 2020 19:14:15 -0700

2 Enables you to quickly get response headers and senders

Today we're going to use two quick ways to get response headers and send headers. 1. Get Request Header To get the request header, you need to use the package capture tool, which is currently more common than fiddler.You can search and download in Baidu.First let's turn on fiddler   You'll find that on the left side there's an increa ...

Posted by d3vilr3d on Wed, 27 May 2020 18:09:37 -0700

Implementing API Gateway Service based on Ocelot for.NET Core Micro Services (continued)

Tip: This post has been added Index of.NET Core Microservice Basic Series Articles Load Balancing and Request Caching 1.1 Load Balancing To verify load balancing, we have configured two Consul Client nodes where ClientService is deployed within each node (192.168.80.70 and 192.168.80.71). To better show which node API Repsonse comes fro ...

Posted by avalonindigo on Wed, 27 May 2020 17:20:17 -0700

Mongodb backup restore common commands

Mongodb's export mongodump is used in combination with mongorestore import tool. Can be used for database backup and restore. mongodump is a utility for creating binary exports of database content. mongodump can export data from mongod or mongos instances; that is, it can export data from independent, replica set and shard cluster deployment.I ...

Posted by rmbarnes82 on Wed, 27 May 2020 06:10:35 -0700

From enterprise wechat robot to Xiaoai classmate, use Serverless to realize life intelligence!

Through timing trigger, an enterprise wechat robot can be customized simply and quickly. We can use it to realize small functions such as drinking water, eating reminder, etc., and also to push news, weather and even monitor alarm regularly. Use enterprise wechat robot In enterprise wechat, select Add robot: After that, we can customize the ba ...

Posted by EvilPrimate on Wed, 27 May 2020 05:58:34 -0700

@The RequestBody parameter has been read. Why?

I don't know if you check the user's allergy. If you don't check, the user belongs to some attack scripts, then our service will be forced! So we first need to read the user's data through the filter for safety verification, which involves an action, that is, we need to read the user's data in the filter for verification, and then release it af ...

Posted by wilorichie on Tue, 26 May 2020 19:27:13 -0700