Minimalist and practical ASP. Add Shop Module to NetCore Framework

SummaryI have explained the background of this framework before. Not clear to view this link 1. Minimalist and practical Asp.NetCore Modular Framework decides to open source for free2. Minimalist and practical ASP. New CMS module for NetCore modular frameworkIt has been a long time since I updated my blog. During this time I have been traveling ...

Added by OilSheikh on Thu, 09 Dec 2021 20:50:39 +0200

Teach you to write an RPC framework hand in hand

One is written in front Recently, the development in the company adopts the development mode of distributed microservices. Different microservices use RPC framework for communication and data call. Usually, when developing an interface, you need to call the interfaces of other micro services to obtain the desired data. Because with the RPC fra ...

Added by jasonX on Thu, 09 Dec 2021 16:52:40 +0200

[JAVA] Spring Security OAuth2 Integrated SMS authentication code login and user-defined login are used in microservices

Hey girl pieced together the original article. If there is any ambiguity, you can leave a message. If you need to reprint, you need to indicate the source. hey said: the login authentication process has been introduced in detail in the previous article. It is suggested that brothers who are confused can take a sight first. Looking down. auth2 ...

Added by McManCSU on Tue, 07 Dec 2021 10:42:45 +0200

cloud Alibaba e-commerce project series: architecture evolution, understanding domain driven design, and writing of project common modules

cloud Alibaba project Architecture evolution Monomer architecture The database and cache are shared in one program, and the deployment is simpleThe disadvantages are obvious, and the code coupling seriously affects the whole body Vertical Architecture Advantages: service, independent deployment, easy horizontal expansionDisadvantages: co ...

Added by tony.j.jackson@o2.co.uk on Fri, 03 Dec 2021 00:25:22 +0200

HZERO Micro Service Platform 11: Data Permissions for Code Analysis, sql Interception.md

Table/Entity Relationships Menu: [Data Permission Rules], [Document Permissions] The relationship between the two: [Document Permission] Based on the Data Permission Rules, in order to facilitate re-encapsulation, the Create Document Permission actually automatically maintains several tables related to the Data Permission Rules; [Data Permissio ...

Added by telefiend on Wed, 01 Dec 2021 21:57:14 +0200

Thread pool learning 5

8. Tools for sharing models 8.1 thread pool Compared with pooling technology, it is common. Thread pool, database connection pool, Http connection pool and so on are all applications of this idea. The idea of pooling technology is mainly to reduce the consumption of resources and improve the utilization of resources. Thread pools provid ...

Added by Chris16962 on Wed, 01 Dec 2021 04:28:21 +0200

Spring Cloud microservice Gateway component

What is Spring Cloud Gateway As the entrance of traffic, the common functions of gateway include routing and forwarding, permission verification, flow restriction, etc. Spring Cloud Gateway is the second-generation gateway framework officially launched by Spring Cloud, which is positioned to replace Netflix Zuul1.0. Compared with Zuul, Spr ...

Added by [/Darthus] on Tue, 30 Nov 2021 20:27:23 +0200

Microservice summary

The foundation of microservice architecture (MSA) is to develop a single application into a group of small independent services, which run in their own process, develop and deploy independently. The microservice in the program is to extract the commonness of each business system and make it into an independent service.   SpringCloud Al ...

Added by Wayne Herbert on Mon, 29 Nov 2021 22:41:34 +0200

This paper explains the principle and implementation of consistent hash

Why do I need a consistent hash First, what is hash Hash, generally translated as hash, or transliterated as hash, is to transform an input of any length (also known as pre mapping pre image) into a fixed length output through hash algorithm, and the output is the hash value. This transformation is a compression mapping, that is, the hash valu ...

Added by alexrait1 on Sun, 28 Nov 2021 23:48:00 +0200

HZERO microservice platform 07: login log, verification code login, jwt token, etc. of code analysis

Login log analysis LoginAuditProcessor records the login log, which can only record the implicit process and mobile phone number jump; An AuthenticationSuccessEventListener is added to record the password process; 2021-04-02: client_credentials cannot be recorded yet Authorization code mode is not tested; Code flow Bottom up analysis process: ...

Added by blue928 on Tue, 23 Nov 2021 17:28:11 +0200