At the scene of a large-scale car accident, e-commerce is oversold. Who will carry this pot?

background Xiaoming works in an online shopping mall. Recently, he has a new demand. He needs to develop a commodity seckill module. The demand is urgent. The boss requires that it be online as soon as possible. programme Xiaoming did this at the beginning. He used the database lock directly to control, obtain and lock the quantity of seckill ...

Posted on Thu, 17 Oct 2019 01:53:24 -0400 by stevenszabo

[source code analysis] I don't know the details of automatic configuration, let alone you can spring boot.

Compared with spring, one of the most important characteristics of spring boot is automatic configuration, which makes the Convention larger than the configuration idea successfully implemented. XXX spring boot starter a series of bootstrappers can be used out of the box, or only need a few configurations (for beginners) because the default aut ...

Posted on Wed, 16 Oct 2019 21:48:54 -0400 by rotwyla98

Spring IoC - dependency injection

Preface In the previous article, we introduced the container initialization process of Spring IoC- IoC container initialization In this article, we continue to introduce the process and source code interpretation of Spring IoC dependency injection. As before, I'd like to sort out the procedures for you so that you can have a general context in ...

Posted on Wed, 16 Oct 2019 19:30:38 -0400 by EPCtech

Springboot development, day 2

SpringBoot learning, the next day Directory: 1. Springboot integrates Listener 2. Springboot accesses static resources 3. Exception handling 4. Hot deployment I. SpringBoot integrated Listener Two ways to register components 1. Complete component registration through annotation scanning FirstListener package com.lee.listener; import javax.serv ...

Posted on Wed, 16 Oct 2019 18:23:22 -0400 by mediamind

EurekaClient automatic assembly and startup process analysis

stay Last article In, we briefly introduced EurekaServer automatic assembly and startup process analysis. In this article, we will continue to study the relevant codes of EurekaClient. According to the old rules, first look at the spring.factories file, which introduces a configuration class EurekaDiscoveryClientConfigServiceBootstrapConfigur ...

Posted on Wed, 16 Oct 2019 16:31:18 -0400 by garg_vivek

Feign [file upload]

Don't say much, code... Project public dependency configuration: <parent> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-parent</artifactId> <version>2.0.3.RELEASE</version> <relativePath/> </parent> <properties> ...

Posted on Wed, 16 Oct 2019 13:08:47 -0400 by dross613

How to use JustAuth to verify state in third party login

Preface JustAuth's Portal. This paper is from the perspective of vegetable chicken. It's quite simple for developers Official use documents On the basis of this, enter the source code to check the specific implementation of the functions used in the document. At the same time, through the special case of QQ third-party login, the tool develope ...

Posted on Wed, 16 Oct 2019 10:03:43 -0400 by tullmejs

spring web mvc environment construction

I've been learning spring these two days. Alas, I can't help it. Chengdu is basically java. It's useless if I don't like it. Learn more, learn more. Life is not. Well, to get back to the point, I'll record the process of setting up spring mvc here. In fact, the process is not too difficult. It's mainly to start the xml configuration I used, and ...

Posted on Wed, 16 Oct 2019 05:41:06 -0400 by CaptainChainsaw

Docker uses Nexus to deploy maven private warehouse

docker creates a nexus private server 1. Get nexus3 image docker pull sonatype/nexus3 2. Create start nexus3 container docker run -dit -p 8081:8081 --name nexus -v /root/nexus-data:/var/nexus-data --restart=always sonatype/nexus3 Parameter description -dit: open a pseudo terminal in the container for interactive operation and run in the backg ...

Posted on Wed, 16 Oct 2019 05:19:05 -0400 by elfeste

Spring 5 source code deep parsing - transaction rollback and commit (100% understanding of transaction)

The previous article explained how to obtain transactions and set read-only and isolation level through the acquired connection. This article explained the rollback and commit of the remaining transactions. Rollback processing We have completed the transaction preparation before the running of the target method, and the biggest purpose of the ...

Posted on Tue, 15 Oct 2019 23:44:37 -0400 by SystemWisdom