Stage 7: microservice development | 01-springboot | 17 task [watch wild God's essays]

Task (asynchronous, scheduled, mail) Asynchronous task~ Multithreading Timed task~ timerExpression~ Mail sending~ timepop3/SMTP service 1, Asynchronous task (async) 1. Application scenario ​ 1. It takes time to send e-mail. Open asynchrony to let the user receive the information of the sent e-mail first, and then another thread sends ...

Added by daijames on Tue, 18 Jan 2022 01:33:53 +0200

Docker+nacos+seata1.3.0 installation and use (people climbing over the pit)

I had a day before that. Although seata is easy to use and super simple to use, the installation and configuration is really troublesome. I met various pits. Let's get to the point. o(╥﹏╥)o I edition Note: if the versions do not match, there will also be various errors. You can match the versions according to the official website. sea ...

Added by johnnyblotter on Tue, 18 Jan 2022 00:10:52 +0200

SpringBoot source code analysis II (startup process principle)

Spring Boot source code analysis II (startup process principle) entrance @SpringBootApplication public class MyApplication { public static void main(String[] args) { SpringApplication.run(MyApplication.class, args); } } **SpringApplication.run(MyApplication.class, args);** Follow in public static ConfigurableApplica ...

Added by GBahle on Mon, 17 Jan 2022 21:59:40 +0200

Implementation principle of HashMap (just read this article)

HashMap is a collection container that senior java engineers must be proficient in. Its importance is almost equal to the importance of Volatile in concurrent programming (visibility and order).Through the detailed explanation of graphic source code, this article deeply analyzes the important kernel knowledge of HashMap, which is easy to read, ...

Added by pietbez on Mon, 17 Jan 2022 20:29:41 +0200

Learn the application scenario of Spring boot based java distributed middleware message middleware RabbitMQ and the event driven model of Spring

summary Installation and introduction Introduction to typical application scenarios Asynchronous communication and service decoupling Taking user registration as the actual scenario, the traditional enterprise application processes user registration. First, the user enters user name, email or mobile phone number on the interface. After conf ...

Added by afatkidrunnin on Mon, 17 Jan 2022 17:58:11 +0200

Integrating spring security, spring boot and redis, jwt realizes the function of separate login authentication and picture verification code at the front and back ends

Integrating spring security, spring boot and redis, jwt realizes the function of separate login authentication and picture verification code at the front and back ends First, we need to understand the general implementation process of the spring security filter chain: That is, when a user initiates a request, he will enter the Security filter ...

Added by Kevin3374 on Mon, 17 Jan 2022 15:33:09 +0200

SpringBoot integrates Pulsar, a distributed messaging platform

Hello, I'm brother Jun. As an excellent message flow platform, Pulsar is used more and more. This article explains Pulsar's Java client. Deploy Pulsar Pulsar can be deployed in three ways: local binary installation, docker deployment and Kubernetes deployment. This paper uses docker to deploy a single node Pulsar cluster. The experimental e ...

Added by Beavis2084 on Mon, 17 Jan 2022 05:13:37 +0200

Build the simplest multi data source with mybatis plus as the framework (different data sources under different packages)

1.1 introducing pom dependency When introducing SpringBoot and SpringCloud versions, pay special attention to their compatibility Reference: https://spring.io/projects/spring-cloud <!--introduce springboot Parent project dependency--> <!--Introduce dependency: It can be omitted version Tag to get some reasonable ...

Added by fred_m on Mon, 17 Jan 2022 02:18:53 +0200

12. Configuring cross domain Cors with SpringBoot

01. Homology strategy The same origin policy is a security function of the browser. Client scripts from different sources cannot read or write to each other's resources without explicit authorization. Homology policy is the cornerstone of browser security. What is the source The source [origin] is the protocol, domain name and port number. F ...

Added by Ricklord on Sun, 16 Jan 2022 20:17:02 +0200

Spring cloud alibaba -- environment construction

catalogue 1. Operating environment 2. Use ieda to build the project 2.1 create parent project 2.2 creating subproject works 2.3 two subprojects call each other 1. Operating environment (1)jdk 1.8+ (2)maven 3.2.x+ 2. Use ieda to build the project 2.1 create parent project (1) First, create a parent project to manage sub projects and ...

Added by madsporkmurderer on Sun, 16 Jan 2022 20:04:33 +0200