Day code 300 lines learning notes Day 10
1. Integrated task I
Task content: Students' scores are stored in a matrix, where rows represent students and lists show subjects. For example, the 0 th line of Chinese and English indicates the student's score. Task requirements:
1. Random generation of student scores, with an interval of [50, 100].
2. Find the best and worst students. Howe ...
Added by robburne on Sat, 05 Mar 2022 14:13:55 +0200
Java code automatic plug-in of syntax tree
Code piling is a common means of testing and locating problems. We can print or collect the data we need by inserting the corresponding code ("pile") at the corresponding position of the code.
Automatic pile insertion is to automatically insert one or more lines of code we need at a specific position of the code. Usually, we will ins ...
Added by WhiteShade6 on Sat, 05 Mar 2022 13:57:53 +0200
SpringBoot integrates JWT to realize login verification
1 Definition
The full name of JWT is JSON Web Token, which is the most popular cross domain authentication solution at present. JWT is an open standard based on JSON, which is designed to transfer declarations between network application environments.
This information can be verified and trusted because it is digitally signed. JWT can sign wi ...
Added by SnakeFox on Sat, 05 Mar 2022 13:56:47 +0200
Roll it up and take you to write a distributed RPC framework that middle and senior programmers will know
I summary
What is RPC?
Remote service callOfficial: the idea of requesting services from remote computer programs through the network without understanding the underlying network technologyA little more popular: without knowing the details of the call, the client calls an object that exists on the remote computer, just like calling an objec ...
Added by Skipjackrick on Sat, 05 Mar 2022 13:47:51 +0200
Implement interface idempotent SDK components based on springboot starter
1, Overview
(1) Idempotent definition
1. Idempotent definition in Mathematics
In programming, the characteristic of an idempotent operation is that the impact of any multiple execution is the same as that of one execution. Idempotent functions, or idempotent methods, refer to functions that can be executed repeatedly with the same parameters ...
Added by FijiSmithy on Sat, 05 Mar 2022 10:27:49 +0200
k8s introduction and deployment
Kubernetes basic concepts
1.kubernetes has the following features:
Service discovery and load balancing Kubernetes can use DNS name or its own IP address to expose the container. If the traffic entering the container is large, kubernetes can load balance and distribute network traffic, so as to stabilize the deployment.Storage orchestration K ...
Added by JsF on Sat, 05 Mar 2022 10:10:18 +0200
The old question: how to customize the starter with one click in Spring Boot?
Spring Boot starter
We know that Spring Boot greatly simplifies the initial construction and development process of the project, which are completed through the starter provided by Spring Boot. Pinda general permission system is developed based on Spring Boot, and some basic modules are starters in essence, so we need to have a comprehensive a ...
Added by the apprentice webmaster on Sat, 05 Mar 2022 10:00:48 +0200
Microservice notes 02
01. Hystrix circuit breaker
1. General
Problems faced by distributed systems
Problems faced by distributed systems Applications in complex distributed architecture have dozens of dependencies, and each dependency will inevitably fail at some time.
Service avalanche
When calling between multiple microservices, suppose that microse ...
Added by BrandonE97 on Sat, 05 Mar 2022 09:21:08 +0200
Sentinel sentinel integrates Gateway to realize Gateway flow control console and rule configuration
1. Introduction
The gateway is the common entrance for all requests, so the current can be limited in the gateway, and there are many ways to limit the current. The current limit of the gateway is realized through sentinel component. Sentinel supports current limiting for spring cloud gateway, Zuul and other mainstream gateways. The curre ...
Added by sargenle on Sat, 05 Mar 2022 08:51:47 +0200
Day03 Shiro study notes
1. Introduction to Shiro
Apache Shiro is an open source security framework that provides authentication, authorization, cryptography, and session management. Shiro framework is intuitive and easy to use. At the same time, it can also provide robust security. Although its function is not as powerful as spring security, it is still enough in ord ...
Added by DimArchon84 on Sat, 05 Mar 2022 08:21:46 +0200