Pull the thread pool upside down
This section shares the Java thread pool. Next, let's dig up the thread pool step by step.
Introduction: old three withdraw money
There is a programmer whose name is Lao San.
The third man had no money in his pocket and hurried to do banking business.
This day got up early in the morning and the bank sister said good morning.
As soon a ...
Posted by phpshift on Sun, 28 Nov 2021 19:46:32 -0800
[Spring Boot quick start] 20. Spring Boot implements logging based on AOP annotations
preface
in many background management systems, there are clear permissions and role control, and of course, there is no lack of operation log records. This article will develop a logging function based on the AOP feature of Spring. Let's record the whole development project
Quick start
using the AOP feature of Spring, fir ...
Posted by alsal on Sat, 27 Nov 2021 22:28:09 -0800
RedisTemplate switches Jedis implementations and common Jedis API s
catalogue
RedisTemplate switch Jedis implementation
Switch the underlying Jedis API operation Redis
RedisTemplate switch Jedis implementation
1. Spring Boot is Lettuce and Jedis The client library provides basic automatic configuration. By default, it is used Lettuce As a client, if you want to switch the Jedis client, there are two steps: ...
Posted by eldee on Sat, 27 Nov 2021 19:42:55 -0800
SSL self signed certificate
1, Concept
1.1,TLS
Transport Layer Security protocol As the successor of SSL protocol, it has become the next generation network security and data integrity security protocol
1.2,SSL
Secure Socket Layer The network transport layer, located in TCP/IP, is a security protocol that provides security and data integrity for network communication ...
Posted by Incessant-Logic on Fri, 26 Nov 2021 06:19:00 -0800
Three frameworks of SSM
1, Basic structure of three frames
1. Why is a framework needed
Note: if the projects in the production environment are developed from scratch (from the bottom), it is too difficult and the development efficiency is extremely low. Therefore, in order to quickly deploy the project online, some specific functions are encapsulated in advanced. ...
Posted by danlindley on Thu, 25 Nov 2021 13:07:30 -0800
RabbitMQ message queue
1, Introduction
Message queue functions: decoupling, asynchronous and peak clipping
Why use message queuing? What are the benefits of messages for columns- Laughing Terry - blog Gardenhttps://www.cnblogs.com/terry-love/p/11492397.html
2, RabbitMQ introduction
Several popular MQ models in the market:
ActiveMQ,RocketMQ,Kafka,RabbitMQ ...
Posted by semtex on Wed, 24 Nov 2021 14:06:30 -0800
SpringBoot integrates the full and detailed version of Mybatis
Reprinted from: https://blog.csdn.net/iku5200/article/details/82856621
IDE: idea,DB: mysql
Create a new Spring Initializr project
Create the file structure of the project and the version of the jdk
Select the dependencies required by the project
Modify the project name and finish
Take a look at the pom.xml after it is built
...
Posted by blueman378 on Wed, 24 Nov 2021 13:04:39 -0800
Detailed explanation of the past and present life of Spring Boot and its relationship with Spring Cloud
To understand the development background of Spring Boot, we have to start with the release of Spring Framework version 1.0 in 2004. However, we all use the spring framework from the beginning of learning Java, so we don't expand too much.With more and more enterprises and individuals using the Spring Framework for development, Spring has slowly ...
Posted by POGRAN on Wed, 24 Nov 2021 10:25:12 -0800
Create the first Spring application
Development tool preparation
Development tool: idea2017 up Dependency management: Maven 3 or above JDK: above 1.8
Creating a Spring project using Maven
Select MavenCheck Create from archetypeSelect Maven archetype QuickStart
Created successfully
Creating a Spring project using Java Enterprise
Default Version generally selects Java ...
Posted by stonelord on Tue, 23 Nov 2021 16:33:03 -0800
Getting started with SpringBoot version of SpringSecurity
SpringSecurity
Safety should be considered at the beginningFunction permissions, access permissions and menu permissions all require certain rules to configure security rules
Remember several classes:
WebSecurityConfigurerAdapter: custom Security policyAuthenticationManagerBuilder: custom authentication policy@Enable WebSecurity: enable WebS ...
Posted by TWD on Tue, 23 Nov 2021 16:04:11 -0800