Spring Cloud Open Feign series [11] Feign codec Encoder and Decoder source code analysis
summary
In the real world, the concept of codec exists. Encoding is the process of transforming information from one form or format to another. Decoding is the inverse process of encoding. It is widely used in computer, television, remote control and communication.
In the program, this concept is also widely used, such as Base64 encoding ...
Added by gavinbsocom on Mon, 03 Jan 2022 22:45:47 +0200
Use of JWT in SDU-PTA projects
2021SC@SDUSC
One of the issues to consider in a web project is how to authenticate users.
User Authentication Method
Traditional session authentication
Internet services cannot be separated from user authentication. The general process is as follows.
1. Users send user names and passwords to the server.
2. After the server is ...
Added by mirana on Mon, 03 Jan 2022 19:41:20 +0200
Write high concurrency using concurrency
What is synergetic process
In short, a coroutine is an existence based on threads, but more lightweight than threads. For the system kernel, the co process has invisible characteristics. Therefore, this lightweight thread managed by programmers writing their own programs is called "user space thread".
Advantages of more threads
1. ...
Added by Nothsa on Mon, 03 Jan 2022 06:15:03 +0200
Detailed explanation of Servlet, HTTP and Request
Request response understanding diagram
Servlet
Concept (explained earlier) Steps (explained earlier) Execution principle (explained earlier) Life cycle (explained earlier) Servlet3.0 annotation configuration (explained earlier) Architecture of Servlet Servlet - Interface | GenericServlet – abstract class | HttpServlet - a ...
Added by donnierivera on Fri, 31 Dec 2021 22:49:22 +0200
nginx configuring https access
01,http&https
HTTP (HyperText Transfer Protocol) is an application layer protocol for distributed, collaborative and hypermedia information systems. In short, it is a method of publishing and receiving HTML pages, which is used to transfer information between Web browsers and Web servers.
HTTPS (Hypertext Transfer Protocol Secure) is a tr ...
Added by tomm098 on Mon, 27 Dec 2021 21:03:22 +0200
Problem of converting pit'+'to space in http request parameter
Problem of converting pit'+'to space in http request parameter
I encountered a problem in my work where the parameter carrying the'+'number was converted to a space when we requested the interface of another service through the RestTemplate method provided by SpringBoot
1. Prerequisites
The first thing we need to know is that the parameters ...
Added by Robert Elsdon on Sun, 26 Dec 2021 07:57:25 +0200
Java implementation of simple static dynamic http server
Write static dynamic http server
Use case diagram:
Implementation requirements: The purpose of implementing static dynamic server is to better understand the HTTP protocol and the underlying native principle of Servlet.
Implementation description:
The user submits an http request to the startup port of the specified server through th ...
Added by sametch on Sat, 25 Dec 2021 04:12:37 +0200
Reptile phased summary
requests module
resonse.content.headers:Response header
resonse.headers:Request header
Set-Cookie:That is Cookie value
response.cookies:object:cookieJar
# Get dictionary
dict_cookies = reequests.utils.dict_from_cookiejar(response.cookies)
# Dictionary to object
jar_cookie = request.utils.cookie_jar_from_dict(dict_cookies)
response.json():j ...
Added by Carline on Sat, 25 Dec 2021 01:27:46 +0200
Basic learning of HTTP Hypertext Transfer Protocol
HTTP Hypertext Transfer Protocol
Concept: Hyper Text Tranfer Protocol
Transmission protocol: it defines that the communication between client and server is the format of sending datacharacteristic:
Advanced protocol based on TCP/IPDefault port number: 80Based on request / response model: one request corresponds to one responseStateless ...
Added by zarathu on Thu, 23 Dec 2021 14:20:52 +0200
Signature scheme based on "request replay"
1: Background
Recently, we are doing service docking with a third party. The third party needs to call our service interface to query data. For the exposed interface, security is very important, so we must add a signature when doing interface verification, which can effectively protect our interface security
2: Encryption
It is impossible to ...
Added by werkkrew on Wed, 22 Dec 2021 01:18:49 +0200