Xiaoming works in an online shopping mall. Recently, he has a new demand. He needs to develop a commodity seckill module. The demand is urgent. The boss requires that it be online as soon as possible.
Xiaoming did this at the beginning. He used the database lock directly to control, obtain and lock the quantity of seckill ...
Posted on Thu, 17 Oct 2019 01:53:24 -0400 by stevenszabo
Compared with spring, one of the most important characteristics of spring boot is automatic configuration, which makes the Convention larger than the configuration idea successfully implemented. XXX spring boot starter a series of bootstrappers can be used out of the box, or only need a few configurations (for beginners) because the default aut ...
Posted on Wed, 16 Oct 2019 21:48:54 -0400 by rotwyla98
In the previous article, we introduced the container initialization process of Spring IoC- IoC container initialization
In this article, we continue to introduce the process and source code interpretation of Spring IoC dependency injection.
As before, I'd like to sort out the procedures for you so that you can have a general context in ...
Posted on Wed, 16 Oct 2019 19:30:38 -0400 by EPCtech
SpringBoot learning, the next day
Directory: 1. Springboot integrates Listener 2. Springboot accesses static resources 3. Exception handling 4. Hot deployment
I. SpringBoot integrated Listener
Two ways to register components
1. Complete component registration through annotation scanning
import javax.serv ...
Posted on Wed, 16 Oct 2019 18:23:22 -0400 by mediamind
stay Last article In, we briefly introduced EurekaServer automatic assembly and startup process analysis. In this article, we will continue to study the relevant codes of EurekaClient.
According to the old rules, first look at the spring.factories file, which introduces a configuration class EurekaDiscoveryClientConfigServiceBootstrapConfigur ...
Posted on Wed, 16 Oct 2019 16:31:18 -0400 by garg_vivek
Don't say much, code...
Project public dependency configuration:
Posted on Wed, 16 Oct 2019 13:08:47 -0400 by dross613
This paper is from the perspective of vegetable chicken. It's quite simple for developers Official use documents On the basis of this, enter the source code to check the specific implementation of the functions used in the document. At the same time, through the special case of QQ third-party login, the tool develope ...
Posted on Wed, 16 Oct 2019 10:03:43 -0400 by tullmejs
I've been learning spring these two days. Alas, I can't help it. Chengdu is basically java. It's useless if I don't like it. Learn more, learn more. Life is not.
Well, to get back to the point, I'll record the process of setting up spring mvc here. In fact, the process is not too difficult. It's mainly to start the xml configuration I used, and ...
Posted on Wed, 16 Oct 2019 05:41:06 -0400 by CaptainChainsaw
docker creates a nexus private server
1. Get nexus3 image
docker pull sonatype/nexus3
2. Create start nexus3 container
docker run -dit -p 8081:8081 --name nexus -v /root/nexus-data:/var/nexus-data --restart=always sonatype/nexus3
-dit: open a pseudo terminal in the container for interactive operation and run in the backg ...
Posted on Wed, 16 Oct 2019 05:19:05 -0400 by elfeste
The previous article explained how to obtain transactions and set read-only and isolation level through the acquired connection. This article explained the rollback and commit of the remaining transactions.
We have completed the transaction preparation before the running of the target method, and the biggest purpose of the ...
Posted on Tue, 15 Oct 2019 23:44:37 -0400 by SystemWisdom