Day code 300 lines learning notes Day 10

1. Integrated task I Task content: Students' scores are stored in a matrix, where rows represent students and lists show subjects. For example, the 0 th line of Chinese and English indicates the student's score. Task requirements: 1. Random generation of student scores, with an interval of [50, 100]. 2. Find the best and worst students. Howe ...

Added by robburne on Sat, 05 Mar 2022 14:13:55 +0200

Java code automatic plug-in of syntax tree

Code piling is a common means of testing and locating problems. We can print or collect the data we need by inserting the corresponding code ("pile") at the corresponding position of the code. Automatic pile insertion is to automatically insert one or more lines of code we need at a specific position of the code. Usually, we will ins ...

Added by WhiteShade6 on Sat, 05 Mar 2022 13:57:53 +0200

SpringBoot integrates JWT to realize login verification

1 Definition The full name of JWT is JSON Web Token, which is the most popular cross domain authentication solution at present. JWT is an open standard based on JSON, which is designed to transfer declarations between network application environments. This information can be verified and trusted because it is digitally signed. JWT can sign wi ...

Added by SnakeFox on Sat, 05 Mar 2022 13:56:47 +0200

Roll it up and take you to write a distributed RPC framework that middle and senior programmers will know

I summary What is RPC? Remote service callOfficial: the idea of requesting services from remote computer programs through the network without understanding the underlying network technologyA little more popular: without knowing the details of the call, the client calls an object that exists on the remote computer, just like calling an objec ...

Added by Skipjackrick on Sat, 05 Mar 2022 13:47:51 +0200

Implement interface idempotent SDK components based on springboot starter

1, Overview (1) Idempotent definition 1. Idempotent definition in Mathematics In programming, the characteristic of an idempotent operation is that the impact of any multiple execution is the same as that of one execution. Idempotent functions, or idempotent methods, refer to functions that can be executed repeatedly with the same parameters ...

Added by FijiSmithy on Sat, 05 Mar 2022 10:27:49 +0200

k8s introduction and deployment

Kubernetes basic concepts 1.kubernetes has the following features: Service discovery and load balancing Kubernetes can use DNS name or its own IP address to expose the container. If the traffic entering the container is large, kubernetes can load balance and distribute network traffic, so as to stabilize the deployment.Storage orchestration K ...

Added by JsF on Sat, 05 Mar 2022 10:10:18 +0200

The old question: how to customize the starter with one click in Spring Boot?

Spring Boot starter We know that Spring Boot greatly simplifies the initial construction and development process of the project, which are completed through the starter provided by Spring Boot. Pinda general permission system is developed based on Spring Boot, and some basic modules are starters in essence, so we need to have a comprehensive a ...

Added by the apprentice webmaster on Sat, 05 Mar 2022 10:00:48 +0200

Microservice notes 02

01. Hystrix circuit breaker 1. General Problems faced by distributed systems Problems faced by distributed systems Applications in complex distributed architecture have dozens of dependencies, and each dependency will inevitably fail at some time. Service avalanche When calling between multiple microservices, suppose that microse ...

Added by BrandonE97 on Sat, 05 Mar 2022 09:21:08 +0200

Sentinel sentinel integrates Gateway to realize Gateway flow control console and rule configuration

1. Introduction The gateway is the common entrance for all requests, so the current can be limited in the gateway, and there are many ways to limit the current. The current limit of the gateway is realized through sentinel component. Sentinel supports current limiting for spring cloud gateway, Zuul and other mainstream gateways. The curre ...

Added by sargenle on Sat, 05 Mar 2022 08:51:47 +0200

Day03 Shiro study notes

1. Introduction to Shiro Apache Shiro is an open source security framework that provides authentication, authorization, cryptography, and session management. Shiro framework is intuitive and easy to use. At the same time, it can also provide robust security. Although its function is not as powerful as spring security, it is still enough in ord ...

Added by DimArchon84 on Sat, 05 Mar 2022 08:21:46 +0200