Many articles mentioned that Swagger should be turned off in the production environment to prevent system resource leakage. Today, with my own experience in the development process, I share a method that can be implemented in just a few lines of code to allow Apache Shiro to take over Swagger authentication and authorization. If there is a bett ...
Posted on Fri, 22 May 2020 03:11:03 -0400 by K3nnnn
Recently, many communication tools have been used, such as corporate WeChat robots, pins, WeChat public number interfaces (unauthenticated subscription public numbers), which are too weak for mail.There are no richer versions, for example.Of course, it doesn't mean that the better the presentation, the better the appointment, which depends on ...
Posted on Thu, 21 May 2020 14:25:40 -0400 by rh-penguin
Security authentication methods for interfaces
Traditional Interface Security Authentication Methods
Internet services cannot be separated from user authentication.The general process is as follows.
Users send user names and passwords to the server.
After validating the server, relevant data, such as user roles, logon times, and so on, ar ...
Posted on Thu, 21 May 2020 14:08:47 -0400 by JimiLives
Find the starting point of learning mybatis source code
To learn the source code of mybatis, the first step must be to find a starting point for learning. First, we start with a simple Demo, re experience the way of using mybatis, and then we can start from it to learn the source code of mybatis.
First of all, we will build a new He ...
Posted on Thu, 21 May 2020 02:36:29 -0400 by gleemonex
SpEL Grammar Literacy and Query Manual
Spring expression language is short for SpEL, an Ognl-like object map navigation language (for those unfamiliar with ognl, you can refer to: Ognl Series Blog)
SeEL provides Spring with plenty of imagination and support, in addition to some basic expression manipulations
Access bean Objects
Call methods ...
Posted on Wed, 20 May 2020 22:28:33 -0400 by awared
Java's database uses jdbc natively, and there are many middleware, such as hibernate, mybatis, and jdbi, which are the most commonly used middleware.
How to choose
In general, if only one kind of database is always used, jdbc is the best choice. In this way, you can directly use the lowest leve ...
Posted on Wed, 20 May 2020 11:50:50 -0400 by sactown
Starting at: Getting started with java | branch structure
java entry series, from scratch!!!
Although the program of sequential structure can solve the problems of calculation and output, it can't be judged and selected again.
The branch structure should be used for the problem of judgment before selection.
Posted on Wed, 20 May 2020 10:12:37 -0400 by bal bal
Thread safety, key and value cannot be null
The underlying data structure is: data + linked list + red black tree CAS+Synchronized to ensure the security of concurrent updates
Several important variables
table: null by default. Initialization occurs in the first insert operation. The array with the default size of 16 is u ...
Posted on Wed, 20 May 2020 07:08:03 -0400 by fellow21
As mentioned earlier, before version 3.2 of Redis, ziplist was used to store under 512 small integers and short strings of under 64 bytes, while linkedlist was used to store other data.
However, due to the relatively high additional space of the linked list, prev and next pointers take up 16 bytes (the 64 bit system pointer is 8 b ...
Posted on Wed, 20 May 2020 06:41:39 -0400 by hafez
To avoid disrespect, just write technology, and the business here is replaced by the analogy of "counting the total number of all kinds of animals in the zoo".
I want to write an interface and spit out "the sum of all kinds of animals in the zoo". It is known that there are 15 kinds of animals. Now th ...
Posted on Wed, 20 May 2020 05:32:43 -0400 by ScoTi