WeChat public number development (1) WeChat access certification as developer
WeChat public number development (2) message processing
This article will implement
Get access_token according to AppID and AppSecret
Custom menu (create menu, query menu, delete menu)
Some tips in wechat documents:
access_token must be stored with at ...
Posted by big_c147 on Fri, 17 Jan 2020 05:22:26 -0800
For the principle of cluster, please refer to Redis design and Implementation - working principle of cluster , I won't go into details here. I introduced how to use redis trib toolset to install cluster a long time ago How to build and use Redis cluster In the past two days, I read the official documents and found a new way of installa ...
Posted by Dillinger on Fri, 17 Jan 2020 03:15:30 -0800
Recently, when spring data jpa is used to maintain many to many relationships between tables, a strange problem arises. When a new object is put into the entity class to maintain many to many relationship set, and then saved with jpa, the following exception will appear.
org.springframework.dao.InvalidDataAccessApiUsageException: detached enti ...
Posted by Shadow Wolf on Fri, 17 Jan 2020 00:58:31 -0800
In Java engineering projects, we often use the Mybatis framework to add, delete, query and modify the data in the database. Its principle is to encapsulate JDBC and optimize the connection of data sources.
Let's review the process of JDBC operating database.
JDBC operation database
When JDBC operates the database, you need to specify the co ...
Posted by The End on Thu, 16 Jan 2020 23:08:18 -0800
In computer programming, unit testing is a software testing method, which is used to test a single unit of source code, a collection of one or more computer program modules, and related control data, use process and operation process to determine whether they are suitable for use. In short, when we are doing unit tests, we only test one code un ...
Posted by anthonydamasco on Thu, 16 Jan 2020 07:37:32 -0800
Change from: https://www.jianshu.com/p/fc2d2dbd510b
kerberos is mainly used for identity authentication in network communication, and its main feature is "complexity". So it's best to familiarize yourself with the principles of kerberos before entering the pit. Her ...
Posted by teguh123 on Thu, 16 Jan 2020 06:33:13 -0800
What is RocketMQ
Alibaba message queuing version RocketMQ not only provides asynchronous decoupling and peak clipping and valley filling capabilities for distributed application systems, but also has the features of massive message accumulation, high throughput, reliable retry and other features required by Internet applications, as well as cha ...
Posted by blackwinged on Thu, 16 Jan 2020 04:37:27 -0800
Destructor GitHub address
Introduction: disruptor is an open source and efficient concurrent framework
Event factory: eventFactory
The concrete implementation of event handling: eventHandler
In order to use disruptor, let's consider a simple example, which is to say = pass a long t ...
Posted by Sanoz0r on Thu, 16 Jan 2020 00:39:44 -0800
What is flow operation
The Java 8 API adds a new abstraction called streaming Stream, which allows you to process data in a declarative way.
Stream provides a high-level abstraction of Java set operations and expressions in an intuitive way similar to querying data from a database using SQL statements.
Stream API can greatly improve ...
Posted by mathewvp on Thu, 16 Jan 2020 00:24:28 -0800
Before starting this article, the blogger defaults that you already know Spring Boot, Spring Security, Vue and JWT. The above concepts will not be repeated here. Let's talk about the train of thought.
1. The backend needs to write JWT generation processing and JWT parsing authentication processing.
2. The front ...
Posted by NTM on Wed, 15 Jan 2020 21:50:45 -0800