Chapter 29: Swagger2 unit test Token authentication for spring security integration
Related knowledge
Through the previous article, we implemented the use of JWT for interface authentication. When requesting an interface, we need to pass Token in the Header header, so that the backend can identify the requester and judge whether the interface can be requested.
JWT interface authenti ...
Posted by Kieran Huggins on Tue, 10 Mar 2020 03:38:13 -0700
Basic steps for JPA to access database
Basic steps for JPA to access database:
1. Define the Table in the Entity class mapping database. The key is @ Entity, @ Table annotation Entity class, @ Entity annotation marks the Entity class of JPA, @ Table annotation indicates which Table in the database corresponds to the Entity class. @The Id a ...
Posted by maxrisc on Mon, 09 Mar 2020 02:59:29 -0700
[Spring Security + OAuth2 + JWT introduction to actual combat] 13. Third party QQ login and source code analysis
Source code analysis
Because spring security social is implemented based on social authentication filter, let's start with social authentication filter
When it comes to Filter, there must be a corresponding configuration class SocialAuthenticationFilter is no exception. Its corresponding configuration class is SpringSocialConfigurer. To make ...
Posted by raymie7 on Sun, 08 Mar 2020 05:20:00 -0700
Nacos enhances the internationalization of SpringBoot
1, Overview
Before reading this article, you should understand the internationalization implementation and principle of SpringBoot. Here is a brief introduction:
1. internationalization
Internationalization, also known as i18n (named because the word has 18 English letters from i to n). For some a ...
Posted by throx on Thu, 05 Mar 2020 19:32:04 -0800
[Spring Security + OAuth2 + JWT start to practice] 4. System configuration user-defined login page
brief introduction
Previously, the default authentication process of spring security was used to process user-defined data and password encryption, but in the actual development, it must be to use the page developed by itself, the business processing of login success and failure, etc.
The personalization configuration is completed in the brow ...
Posted by phbock on Mon, 02 Mar 2020 01:33:07 -0800
3 - [JVM - Dynamic bytecode technology]
1 byte code technology application scenario
AOP Technology
Lombok de duplication plug-in
Dynamically modify class files, etc
2-byte technology advantage
Java bytecode enhancement refers to modifying and enhancing the function of Java bytecode after it is generated, which is equivalent to modifyi ...
Posted by seanpaulcail on Sun, 01 Mar 2020 04:31:51 -0800
JDK9 New Feature Reactive Stream Responsive Stream
_This article focuses on the JDK9 feature Reactive Stream Responsive Stream, describes what the Reactive Stream is and what the backpressure is, and the interface and two use cases for Reactive Stream provided in JDK9, including how to use Processor.
_1.Reactive Stream concept
_Reactive Stream is a set of standards introduced by JDK9 and a set ...
Posted by simjay on Fri, 28 Feb 2020 18:03:33 -0800
JavaWeb Project Programming Specification
Coding specifications in the work, which need to be written in the future.
Before encoding, first write according to Alibaba's development specifications, if using idea, use its plug-ins.
In the case of springmvc, the following styles are best used to define the path:
@RequestMapping(value = "/upda ...
Posted by Clinger on Sun, 23 Feb 2020 19:25:16 -0800
Fourth article on concurrent programming
Fourth article on concurrent programming
4.11 More locks
4.12 Activeness
hunger
4.13 ReentrantLock
Sequence control of synchronization mode
Alternate Output
4.11 More locks
A large house has two functions: sleeping, learning and being irrelevant.Now Xiao Nan has to learn and the little girl has to sleep, but if she only uses one ro ...
Posted by greencoin on Fri, 14 Feb 2020 18:56:44 -0800
Spring-Security-Oauth2 learning notes: Custom token return format
1 Preface
In the previous chapter, we built the authorization authentication server and successfully returned the token. The default format of oauth2 is as follows:
{
"access_token": "86d17c41-4de9-470a-a637-0acb7237099d",
"token_type": "bearer",
"refresh_token": "fb255411-9535-47ad-9f7e-4 ...
Posted by mattcooper on Thu, 13 Feb 2020 01:04:10 -0800