spring boot configuration file encryption, plaintext password encryption, properties and yml conversion
1. Introduce maven
<dependency>
<groupId>com.github.ulisesbocchio</groupId>
<artifactId>jasypt-spring-boot-starter</artifactId>
<version>3.0.3</version>
</dependency>
<dependency>
<groupId>org.jasypt</groupId>
<artifactId>jasypt</artifactId>
<version> ...
Posted by metin on Sat, 02 Oct 2021 15:27:21 -0700
Bi set up a sharp tool to teach you to build a standardized spring boot project from scratch [5] - user identity verification
Continued "Bi set up a sharp tool to teach you to build a standardized spring boot project from zero [4] - parameter verification"
The problem of user authentication is a cliche.
After a user logs in, many interfaces need to do user information verification. First, let the server know who the user is, and second, for data security r ...
Posted by gtibok on Sat, 02 Oct 2021 15:18:12 -0700
Spring Cloud integrates Spring Security OAuth2 (the strongest across the network)
Preface
This article combs and integrates SpringCloud and SpringSecurity OAuth2 building process! Long time no SpringSecurity OAuth2 series of codes, forget, close-up this article comb the thread! Get dry!!!
Maven Version
Microservice Version
<spring-boot.version>2.3.2.RELEASE</spring-boot.version>
<spring-cloud.version ...
Posted by mydownfall on Fri, 01 Oct 2021 09:16:09 -0700
ElasticSearch query framework - mybatis plus like call
ElasticSearch-helper
It has been a while since ElasticSearch was used as the data source for analysis and retrieval. It has experienced several large and small projects. From the first contact with this technology, I was amazed at its ingenious design and its disgusting access api; When I was a beginner, I often looked at the endless chain ...
Posted by brainstem on Thu, 30 Sep 2021 19:32:52 -0700
Implementation of Web system License authorization and authentication with springboot
When we make a system level framework, we must consider the copyright of the system to a certain extent. It can not be used by anyone in any environment. Therefore, we need to make an authorization and authentication mechanism for our system. It can be used normally only after uploading the lic file issued by us and passing the verification. Le ...
Posted by fotakis on Wed, 29 Sep 2021 20:33:58 -0700
Spring Boot must know
Spring Boot must know
1, What is it? What can you do?
Is a rapid development of scaffolding Role: quickly create independent, production level Spring based applications SpringBoot is a framework based on Spring to improve efficiency. It can make coding simpler, configuration management simpler and deployment more convenient. characteristic ...
Posted by joshmmo on Wed, 29 Sep 2021 14:53:11 -0700
Spring Boot apps are deployed through Docker Publishing
There are two ways to deploy a Spring Boot project to docker, manual deployment and plug-in deployment
Manual Deployment
1. idea creates a spring boot project
pom.xml file
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
...
Posted by lyonsperf on Wed, 29 Sep 2021 09:16:14 -0700
Spring boot integrates the plumelog logging system
1, Introduction to PlumeLog
The intrusion free distributed log system collects logs based on log4j, log4j2 and logback, and sets the link ID to facilitate the query of associated logsBased on elastic search as query engineHigh throughput and query efficiencyThe whole process does not occupy the local disk space of the appl ...
Posted by jaylearning on Tue, 28 Sep 2021 20:37:15 -0700
Kafka growth 1: study the source code principle of Kafka Producer from HelloWorld
The growth notes will not introduce too much basic knowledge of Kafka. If necessary, there will be a special "Xiaobai starting camp" later. The default of growth notes is that we are familiar with some concepts of Kafka, and the default will be the basic deployment of Kafka. Of course, in order to take care of some Xiaobai, I will b ...
Posted by activomate on Tue, 28 Sep 2021 18:32:32 -0700
The spring security permission annotation of SpringBoot performs permission authentication in multiple ways
preface #
Spring Security supports method level permission control. In this mechanism, we can add permission annotations to any method at any layer. The annotated methods will be automatically protected by Spring Security and only allow specific users to access, so as to achieve the purpose of permission control. Of course, if the existing per ...
Posted by xeq on Tue, 28 Sep 2021 14:35:07 -0700