Spring Cloud Open Feign series [11] Feign codec Encoder and Decoder source code analysis

summary In the real world, the concept of codec exists. Encoding is the process of transforming information from one form or format to another. Decoding is the inverse process of encoding. It is widely used in computer, television, remote control and communication. In the program, this concept is also widely used, such as Base64 encoding ...

Added by gavinbsocom on Mon, 03 Jan 2022 22:45:47 +0200

Use of JWT in SDU-PTA projects

2021SC@SDUSC One of the issues to consider in a web project is how to authenticate users. User Authentication Method Traditional session authentication Internet services cannot be separated from user authentication. The general process is as follows. 1. Users send user names and passwords to the server. 2. After the server is ...

Added by mirana on Mon, 03 Jan 2022 19:41:20 +0200

Write high concurrency using concurrency

What is synergetic process In short, a coroutine is an existence based on threads, but more lightweight than threads. For the system kernel, the co process has invisible characteristics. Therefore, this lightweight thread managed by programmers writing their own programs is called "user space thread". Advantages of more threads 1. ...

Added by Nothsa on Mon, 03 Jan 2022 06:15:03 +0200

Detailed explanation of Servlet, HTTP and Request

Request response understanding diagram Servlet Concept (explained earlier) Steps (explained earlier) Execution principle (explained earlier) Life cycle (explained earlier) Servlet3.0 annotation configuration (explained earlier) Architecture of Servlet Servlet - Interface | GenericServlet – abstract class | HttpServlet - a ...

Added by donnierivera on Fri, 31 Dec 2021 22:49:22 +0200

nginx configuring https access

01,http&https HTTP (HyperText Transfer Protocol) is an application layer protocol for distributed, collaborative and hypermedia information systems. In short, it is a method of publishing and receiving HTML pages, which is used to transfer information between Web browsers and Web servers. HTTPS (Hypertext Transfer Protocol Secure) is a tr ...

Added by tomm098 on Mon, 27 Dec 2021 21:03:22 +0200

Problem of converting pit'+'to space in http request parameter

Problem of converting pit'+'to space in http request parameter I encountered a problem in my work where the parameter carrying the'+'number was converted to a space when we requested the interface of another service through the RestTemplate method provided by SpringBoot 1. Prerequisites The first thing we need to know is that the parameters ...

Added by Robert Elsdon on Sun, 26 Dec 2021 07:57:25 +0200

Java implementation of simple static dynamic http server

Write static dynamic http server Use case diagram: Implementation requirements: The purpose of implementing static dynamic server is to better understand the HTTP protocol and the underlying native principle of Servlet. Implementation description: The user submits an http request to the startup port of the specified server through th ...

Added by sametch on Sat, 25 Dec 2021 04:12:37 +0200

Reptile phased summary

requests module resonse.content.headers:Response header resonse.headers:Request header Set-Cookie:That is Cookie value response.cookies:object:cookieJar # Get dictionary dict_cookies = reequests.utils.dict_from_cookiejar(response.cookies) # Dictionary to object jar_cookie = request.utils.cookie_jar_from_dict(dict_cookies) response.json():j ...

Added by Carline on Sat, 25 Dec 2021 01:27:46 +0200

Basic learning of HTTP Hypertext Transfer Protocol

HTTP Hypertext Transfer Protocol Concept: Hyper Text Tranfer Protocol Transmission protocol: it defines that the communication between client and server is the format of sending datacharacteristic: Advanced protocol based on TCP/IPDefault port number: 80Based on request / response model: one request corresponds to one responseStateless ...

Added by zarathu on Thu, 23 Dec 2021 14:20:52 +0200

Signature scheme based on "request replay"

1: Background Recently, we are doing service docking with a third party. The third party needs to call our service interface to query data. For the exposed interface, security is very important, so we must add a signature when doing interface verification, which can effectively protect our interface security 2: Encryption It is impossible to ...

Added by werkkrew on Wed, 22 Dec 2021 01:18:49 +0200