Simple factory pattern and abstract factory pattern
No BB, come to demand design directly
A pizza shop now needs to produce a variety of color pizza for customers to use. In order to meet the needs of producing a variety of color pizza, the first idea in our mind is to use the factory model to create ...
Posted on Thu, 16 Jan 2020 05:39:01 -0500 by supermerc
1, Business scenario
The data collected by hardware is transferred to EMQX platform (using MQTT protocol), and java connects to MQTT server through code to receive, analyze, process, store and display the collected data.
MQTT is based on publish / subscribe mode for communication and data exchange. ...
Posted on Mon, 13 Jan 2020 11:48:59 -0500 by millsy007
In the project, the page needs to dynamically add timed tasks and delete tasks.
The practice of others is used for reference. Now the design method is recorded as follows:
1. Spring boot project directly depends on
Posted on Mon, 13 Jan 2020 10:55:34 -0500 by csplrj
This paper introduces the basic knowledge of Spring Boot integrating Spring Scheduler and Quartz Scheduler, uses ShedLock to solve the multi instance running conflict of Spring Scheduler, introduces Quartz ScheduleBuilder and Calendar, and introduces the method of dynamically creating Quartz Job.
GitHub source code
Spring Fram ...
Posted on Mon, 06 Jan 2020 23:04:03 -0500 by davidsakh
JavaLib is starting to support the messaging engine. Here we demonstrate the choice of payment method.
Less gossiping, directly into today's theme.
1. You need to build a project with Spring Boot
2. Introducing JavaLib
Posted on Thu, 02 Jan 2020 22:46:10 -0500 by dcgamers
JSON Web Token (JWT) is a popular cross-domain authentication solution at present.Official website: https://jwt.io/In this paper, spring boot 2 integrates JWT to implement api interface validation.
1. Data structure of JWT
JWT is a string composed of header, payload and signature connected by'.'.The calculation logic of JWT is as follows:(1)s ...
Posted on Sun, 22 Dec 2019 13:45:19 -0500 by jv2222
When Shiro is used, the default verification strategy atleast one successful strategy is adopted. If there are multiple realm verifications, the original exception will be overwritten if the realm throws an exception, and some exceptions will display non original error exception information;
But because there are other scenarios, it can't be d ...
Posted on Wed, 18 Dec 2019 10:01:11 -0500 by themightydude
Shiro is a powerful and easy-to-use Java security framework that focuses on authentication, authorization, encryption, and session management.I read some articles on the Internet and the next two articles are well written.Springboot 2.0 Integrated shiro Rights Management Spring Boot: Integrating Shiro Rights Framework
I typed the code myself, ...
Posted on Tue, 17 Dec 2019 16:42:56 -0500 by barryman9000
We often encounter some redundant operations in the project, which leads to a small function written as a large project. Then we need to consider whether we should upgrade our technology? Embrace lombok, it will help us solve some problems that make us very upset. The following is the application combined with the network data succ ...
Posted on Sat, 14 Dec 2019 14:53:21 -0500 by iMiles
1.1. Understanding the status of microservices
Each service in a micro-service cluster provides Rest-style interfaces to the outside world, and one of the most important specifications of Rest-style is the stateless nature of services.
What is stateless?
1. The server does not store any client requester information
2. Each request from a ...
Posted on Fri, 13 Dec 2019 22:55:08 -0500 by ilikephp