RequestProcessor for source code analysis of zookeeper
Catalog
1, RequestProcessor
2, PrepRequestProcessor
3, SyncRequestProcessor
4, FinalRequestProcessor
1, RequestProcessor
The request processors are linked together to process transactions. Requests are always processed in order. Independent servers and master-slave servers link together slight ...
Posted by lucianbeauty on Mon, 13 Jan 2020 19:21:45 -0800
Use Binlog logs to restore mistakenly deleted MySQL data
Preface
"Delete library and run" is a topic that programmers often talk about. Today, I will teach you how to delete!Library!Run!Road!
Just kidding, the topic of this article today is how to use Mysql's built-in Binlog log to recover mistakenly deleted data. After reading this article, you ...
Posted by m2babaey on Mon, 13 Jan 2020 16:54:40 -0800
Basic knowledge and understanding of jsp
Introduction:
JSP is the full name of JavaServer Pages. Like servlet Technology, JSP is a technology defined by SUN company for developing dynamic web resources.
The biggest feature of JSP technology is that writing JSP is like writing html, but:
Compared with html, html can only provide static da ...
Posted by gregolson on Sat, 11 Jan 2020 21:56:51 -0800
Proficient in office365 Exchange online articles
Proficient in Office 365 Cloud Computing Management Exchange Online Chapter 1 Beginning with Office 365 1.1 Domain Name Management Registering Century Interconnected Office 365 will result in an initial Office 365 domain name: XXX.partner.onmschina.cn Administrator login office 365 portal: left "navigation bar" -- "installation& ...
Posted by jburbage on Sat, 11 Jan 2020 15:17:32 -0800
Some security settings of PHP
Happy new year to you guys. I haven't updated my blog for another half month. Update is also more casual, think of what to write something, convenient and everyone work with learning summary.
Recently, I talked about PHP security related issues with my colleagues and recorded some experience.
Due to many reasons of script language and early ver ...
Posted by sledgeweb on Sat, 11 Jan 2020 05:43:44 -0800
Java web filter login permission verification details
Catalog
Three components of JavaWeb Filter
1. Workflow
2. Use scenario
3. Implementation process of filter method
4. Login permission verification case
Three components of JavaWeb Filter
1. Workflow
The client sends the http request to enter the filter first and execute the relevant busines ...
Posted by Immyphp on Fri, 10 Jan 2020 22:33:23 -0800
23 design modes: factory method mode
According to the different levels of abstraction, factory pattern can be divided into three types: simple factory pattern (also known as static factory pattern), factory method pattern described in this paper, and abstract factory pattern.
Advantages of factory mode:
It can make the code structure cle ...
Posted by mojodojo on Fri, 10 Jan 2020 21:31:45 -0800
[Mybatis Source Exploration]--- Interpretation of the Core Source of Mybatis Query Procedure--- mapper Call Method
Article Directory
1 Source Entry
Interpretation of core source code of 2 sqlSession.getMapper(...) method
2.1 What should be analyzed without looking at the source code
2.2 [Source Code Analysis] Get the MapperProxyFactory object corresponding to TUserMapper
2.3 [Source Code Analysis] Use dynamic pr ...
Posted by cpetercarter on Fri, 10 Jan 2020 17:37:17 -0800
Implementation of MyBatis Association query: many to many
Two entities: order and commodity. An order can contain multiple commodities, and a commodity can belong to multiple orders, that is, many to many.
Goods table
Order form TB:
no is the order number, and the user "id is associated with the id of the user table.
You need to create a new intermediate table, order item TB, and intr ...
Posted by skatermike21988 on Wed, 08 Jan 2020 10:23:53 -0800
JWT realizes authorization authentication
Catalog
1, What is JWT
2, JWT Standard Specification
3, Analysis of core code
4, Login authorization example
5, JWT usage
6, JWT considerations
1, What is JWT
JSON Web Token (JWT) is the most popular cross domain authentication solution. In short, OAuth is a kind of authoriz ...
Posted by w4designs on Wed, 08 Jan 2020 08:10:31 -0800