jquery custom alert
Antecedent: since the domain name will pop up in mobile devices, especially in IOS devices, it is necessary to customize the pop-up box;
But there is a problem: the custom confirm cannot be assigned in the callback function, and the self defined confirm does not return the Boolean parameter, so when modifying or deleting, click "OK" ...
Posted by frenchpl on Sun, 31 May 2020 06:55:35 -0700
react treading pit does not point completely North (2)
1.img introduces picture paths
Local Picture
Method 1:
<img src={require('../img/icon1.png')} alt="" />
Method 2:
import search from '../img/search.png'
import user from '../img/user.png'
<img src={search} alt="" />
<img src={user} alt="" />
Background Picture Reference Method
const divStyle = {
color: 'red', ...
Posted by everisk on Sat, 30 May 2020 09:35:26 -0700
Sorting out the use of some functional functions
Some commonly used functional functions
About native JS
File size unit conversion
/**
* @desc bytesToSize Byte unit conversion
* @param bytes Incoming data in bit
*/
const bytesToSize = function (bytes) {
const k = 1024;
if (!bytes || bytes === 0) return '0 B';
if (typeof (bytes) == 'string') {
return bytes
} else {
...
Posted by gilijk on Sat, 30 May 2020 08:29:56 -0700
Configuration file of Spring Boot configuration (configuration file, loading order, configuration principle)
configuration file
Spring Boot uses a global configuration file whose name is fixed
application.properties
application.yml
Function of configuration file: modify the default value of Spring Boot auto configuration, that is, modify the value that Spring Boot has configured for us at the bottom
YAML(YAML Ain't Markup Language)
Markup Language:
...
Posted by ManInBlack on Sat, 30 May 2020 02:51:32 -0700
Learn from me about the design and implementation of spring boot development backend management system 8: matrxi web permission
The last article describes the idea of permission control implemented by matrix web as a whole. Let's review:
First of all, the user needs to log in and fill in the user name and password. The backend receives the login request and verifies the user and password. After the verification is successful, the Token is generated according to the u ...
Posted by sparrrow on Thu, 28 May 2020 19:14:15 -0700
2 Enables you to quickly get response headers and senders
Today we're going to use two quick ways to get response headers and send headers.
1. Get Request Header
To get the request header, you need to use the package capture tool, which is currently more common than fiddler.You can search and download in Baidu.First let's turn on fiddler
You'll find that on the left side there's an increa ...
Posted by d3vilr3d on Wed, 27 May 2020 18:09:37 -0700
Implementing API Gateway Service based on Ocelot for.NET Core Micro Services (continued)
Tip: This post has been added Index of.NET Core Microservice Basic Series Articles
Load Balancing and Request Caching
1.1 Load Balancing
To verify load balancing, we have configured two Consul Client nodes where ClientService is deployed within each node (192.168.80.70 and 192.168.80.71).
To better show which node API Repsonse comes fro ...
Posted by avalonindigo on Wed, 27 May 2020 17:20:17 -0700
Mongodb backup restore common commands
Mongodb's export mongodump is used in combination with mongorestore import tool. Can be used for database backup and restore.
mongodump is a utility for creating binary exports of database content. mongodump can export data from mongod or mongos instances; that is, it can export data from independent, replica set and shard cluster deployment.I ...
Posted by rmbarnes82 on Wed, 27 May 2020 06:10:35 -0700
From enterprise wechat robot to Xiaoai classmate, use Serverless to realize life intelligence!
Through timing trigger, an enterprise wechat robot can be customized simply and quickly. We can use it to realize small functions such as drinking water, eating reminder, etc., and also to push news, weather and even monitor alarm regularly.
Use enterprise wechat robot
In enterprise wechat, select Add robot:
After that, we can customize the ba ...
Posted by EvilPrimate on Wed, 27 May 2020 05:58:34 -0700
@The RequestBody parameter has been read. Why?
I don't know if you check the user's allergy. If you don't check, the user belongs to some attack scripts, then our service will be forced! So we first need to read the user's data through the filter for safety verification, which involves an action, that is, we need to read the user's data in the filter for verification, and then release it af ...
Posted by wilorichie on Tue, 26 May 2020 19:27:13 -0700