vue interceptor implements unified token and is compatible with IE9 verification

In the project, vue is used to build the front-end page, and axios requests the back-end api interface to complete the data interaction. If the password token is written in each interface, it is not only a small physical work, but also inflexible. Here we share the use of vue's own interceptor to add token to the header of each request, and it ...

Added by Seamless on Mon, 30 Mar 2020 18:25:36 +0300

The use of listener in spring boot

In business development, listeners are often used. For example, when events of the same type are triggered in multiple scenarios, it is more suitable to use listeners. There are several forms of using listeners in spring boot, which are slightly different Customize the start of SpringApplication SpringApplication springApplication = new S ...

Added by Hamlets666 on Sun, 29 Mar 2020 17:03:03 +0300

System Analysis and Design Job 5(lesson 7)

Domain Modeling Read the Asg_RH documentation and build a domain model by use case. Database Modeling (ER Model) ER Model Diagram Export MySQL database script Simple Description of Differences and Differences between Database Logical Model and Domain Model Domain Modeling Read the Asg_RH documentation and ...

Added by pfdesigns on Sat, 28 Mar 2020 18:55:20 +0200

go micro practice 01: fast build service

background Go micro provides us with a very convenient way to quickly build microservices, and we do not need to know about micro in advance. Here is a simple example to quickly implement a service. Create a Proto file Because we want to do microservices, there must be a server and a client. The format of content transmission between these two ...

Added by BMorganVA on Fri, 27 Mar 2020 12:21:40 +0200

Python learning - using Python to crawl popular comments on Eason Chan's new song "we"

It has been several days since "later we" was released. I haven't been to see it. There was a ticket refund incident a few days ago. The theme song of the movie was sung by Eason Chan. I specially looked for the MV of the theme song "we" and watched it. It's still that feeling. That day, I saw an official account of the Pyth ...

Added by harinath on Thu, 26 Mar 2020 20:07:24 +0200

Hexo Best Practice Recommendations

This practice is actually a directory operation specification that, ultimately for ease of use, requires personalized and frequently changing directories or files to be isolated, initialized with a simple Shell script, and upgraded with the NexT theme. Note: Summary from personal use may not be suitable for everyone, for reference only. <! ...

Added by jacksonpt on Wed, 25 Mar 2020 06:01:39 +0200

Serialization Protocol In Action

This article introduces simple practices for several common serialization protocols ProtoBuf ProtoBuf is open source with Google and can be compiled across languages.It can be called an IDL, Interface description language. Download the compiler, protoc protoc-3.11.4-osx-x86_64.zip; download versions of different operating systems. https://gi ...

Added by neal.pressley on Wed, 25 Mar 2020 05:03:03 +0200

node.js 17 file operation

This article refers to the original- http://bjbsair.com/2020-03-22/tech-info/2819/ After talking about the module concept, let's take a look at the file operations in node.js in this article. The API of file operation is in fs module, fs is called "File System". Most programming languages provide file manipulation, and node.js is no ...

Added by Zallus on Tue, 24 Mar 2020 17:58:08 +0200

Reading process of nginx request header data

In the previous article, we explained how nginx reads the request line data and parses the request line. In this paper, we mainly explain how nginx reads the data of the request header sent by the client and analyzes the data. In essence, the data reading process of request line and request header is basically the same, because they are faced w ...

Added by moallam on Tue, 24 Mar 2020 05:06:03 +0200

SpringBoot+Redis solves the problem of thousands of submissions in an instant

In a real development project, an exposed interface is often faced with a large number of repeated requests submitted in an instant. If you want to filter out the repeated requests and cause damage to the business, you need to implement idempotent! Let's explain the concept of idempotent: Any number of executions has the same impact as a ...

Added by azylka on Tue, 24 Mar 2020 03:56:42 +0200