Chapter 29: Swagger2 unit test Token authentication for spring security integration

Related knowledge Through the previous article, we implemented the use of JWT for interface authentication. When requesting an interface, we need to pass Token in the Header header, so that the backend can identify the requester and judge whether the interface can be requested. JWT interface authenti ...

Posted by Kieran Huggins on Tue, 10 Mar 2020 03:38:13 -0700

Basic steps for JPA to access database

Basic steps for JPA to access database: 1. Define the Table in the Entity class mapping database. The key is @ Entity, @ Table annotation Entity class, @ Entity annotation marks the Entity class of JPA, @ Table annotation indicates which Table in the database corresponds to the Entity class. @The Id a ...

Posted by maxrisc on Mon, 09 Mar 2020 02:59:29 -0700

[Spring Security + OAuth2 + JWT introduction to actual combat] 13. Third party QQ login and source code analysis

Source code analysis Because spring security social is implemented based on social authentication filter, let's start with social authentication filter When it comes to Filter, there must be a corresponding configuration class SocialAuthenticationFilter is no exception. Its corresponding configuration class is SpringSocialConfigurer. To make ...

Posted by raymie7 on Sun, 08 Mar 2020 05:20:00 -0700

Nacos enhances the internationalization of SpringBoot

1, Overview Before reading this article, you should understand the internationalization implementation and principle of SpringBoot. Here is a brief introduction: 1. internationalization Internationalization, also known as i18n (named because the word has 18 English letters from i to n). For some a ...

Posted by throx on Thu, 05 Mar 2020 19:32:04 -0800

[Spring Security + OAuth2 + JWT start to practice] 4. System configuration user-defined login page

brief introduction Previously, the default authentication process of spring security was used to process user-defined data and password encryption, but in the actual development, it must be to use the page developed by itself, the business processing of login success and failure, etc. The personalization configuration is completed in the brow ...

Posted by phbock on Mon, 02 Mar 2020 01:33:07 -0800

3 - [JVM - Dynamic bytecode technology]

1 byte code technology application scenario AOP Technology Lombok de duplication plug-in Dynamically modify class files, etc 2-byte technology advantage Java bytecode enhancement refers to modifying and enhancing the function of Java bytecode after it is generated, which is equivalent to modifyi ...

Posted by seanpaulcail on Sun, 01 Mar 2020 04:31:51 -0800

JDK9 New Feature Reactive Stream Responsive Stream

_This article focuses on the JDK9 feature Reactive Stream Responsive Stream, describes what the Reactive Stream is and what the backpressure is, and the interface and two use cases for Reactive Stream provided in JDK9, including how to use Processor. _1.Reactive Stream concept _Reactive Stream is a set of standards introduced by JDK9 and a set ...

Posted by simjay on Fri, 28 Feb 2020 18:03:33 -0800

JavaWeb Project Programming Specification

Coding specifications in the work, which need to be written in the future. Before encoding, first write according to Alibaba's development specifications, if using idea, use its plug-ins. In the case of springmvc, the following styles are best used to define the path: @RequestMapping(value = "/upda ...

Posted by Clinger on Sun, 23 Feb 2020 19:25:16 -0800

Fourth article on concurrent programming

Fourth article on concurrent programming 4.11 More locks 4.12 Activeness hunger 4.13 ReentrantLock Sequence control of synchronization mode Alternate Output   4.11 More locks A large house has two functions: sleeping, learning and being irrelevant.Now Xiao Nan has to learn and the little girl has to sleep, but if she only uses one ro ...

Posted by greencoin on Fri, 14 Feb 2020 18:56:44 -0800

Spring-Security-Oauth2 learning notes: Custom token return format

1 Preface In the previous chapter, we built the authorization authentication server and successfully returned the token. The default format of oauth2 is as follows: { "access_token": "86d17c41-4de9-470a-a637-0acb7237099d", "token_type": "bearer", "refresh_token": "fb255411-9535-47ad-9f7e-4 ...

Posted by mattcooper on Thu, 13 Feb 2020 01:04:10 -0800