Stage 7: microservice development | 01-springboot | 17 task [watch wild God's essays]
Task (asynchronous, scheduled, mail)
Asynchronous task~
Multithreading
Timed task~
timerExpression~
Mail sending~
timepop3/SMTP service
1, Asynchronous task (async)
1. Application scenario
1. It takes time to send e-mail. Open asynchrony to let the user receive the information of the sent e-mail first, and then another thread sends ...
Added by daijames on Tue, 18 Jan 2022 01:33:53 +0200
Docker+nacos+seata1.3.0 installation and use (people climbing over the pit)
I had a day before that. Although seata is easy to use and super simple to use, the installation and configuration is really troublesome. I met various pits. Let's get to the point. o(╥﹏╥)o
I edition
Note: if the versions do not match, there will also be various errors. You can match the versions according to the official website.
sea ...
Added by johnnyblotter on Tue, 18 Jan 2022 00:10:52 +0200
SpringBoot source code analysis II (startup process principle)
Spring Boot source code analysis II (startup process principle)
entrance
@SpringBootApplication
public class MyApplication {
public static void main(String[] args) {
SpringApplication.run(MyApplication.class, args);
}
}
**SpringApplication.run(MyApplication.class, args);** Follow in
public static ConfigurableApplica ...
Added by GBahle on Mon, 17 Jan 2022 21:59:40 +0200
Implementation principle of HashMap (just read this article)
HashMap is a collection container that senior java engineers must be proficient in. Its importance is almost equal to the importance of Volatile in concurrent programming (visibility and order).Through the detailed explanation of graphic source code, this article deeply analyzes the important kernel knowledge of HashMap, which is easy to read, ...
Added by pietbez on Mon, 17 Jan 2022 20:29:41 +0200
Learn the application scenario of Spring boot based java distributed middleware message middleware RabbitMQ and the event driven model of Spring
summary
Installation and introduction
Introduction to typical application scenarios
Asynchronous communication and service decoupling
Taking user registration as the actual scenario, the traditional enterprise application processes user registration. First, the user enters user name, email or mobile phone number on the interface. After conf ...
Added by afatkidrunnin on Mon, 17 Jan 2022 17:58:11 +0200
Integrating spring security, spring boot and redis, jwt realizes the function of separate login authentication and picture verification code at the front and back ends
Integrating spring security, spring boot and redis, jwt realizes the function of separate login authentication and picture verification code at the front and back ends
First, we need to understand the general implementation process of the spring security filter chain: That is, when a user initiates a request, he will enter the Security filter ...
Added by Kevin3374 on Mon, 17 Jan 2022 15:33:09 +0200
SpringBoot integrates Pulsar, a distributed messaging platform
Hello, I'm brother Jun.
As an excellent message flow platform, Pulsar is used more and more. This article explains Pulsar's Java client.
Deploy Pulsar
Pulsar can be deployed in three ways: local binary installation, docker deployment and Kubernetes deployment.
This paper uses docker to deploy a single node Pulsar cluster. The experimental e ...
Added by Beavis2084 on Mon, 17 Jan 2022 05:13:37 +0200
Build the simplest multi data source with mybatis plus as the framework (different data sources under different packages)
1.1 introducing pom dependency
When introducing SpringBoot and SpringCloud versions, pay special attention to their compatibility Reference: https://spring.io/projects/spring-cloud
<!--introduce springboot Parent project dependency-->
<!--Introduce dependency:
It can be omitted version Tag to get some reasonable ...
Added by fred_m on Mon, 17 Jan 2022 02:18:53 +0200
12. Configuring cross domain Cors with SpringBoot
01. Homology strategy
The same origin policy is a security function of the browser. Client scripts from different sources cannot read or write to each other's resources without explicit authorization. Homology policy is the cornerstone of browser security.
What is the source
The source [origin] is the protocol, domain name and port number. F ...
Added by Ricklord on Sun, 16 Jan 2022 20:17:02 +0200
Spring cloud alibaba -- environment construction
catalogue
1. Operating environment
2. Use ieda to build the project
2.1 create parent project
2.2 creating subproject works
2.3 two subprojects call each other
1. Operating environment
(1)jdk 1.8+
(2)maven 3.2.x+
2. Use ieda to build the project
2.1 create parent project
(1) First, create a parent project to manage sub projects and ...
Added by madsporkmurderer on Sun, 16 Jan 2022 20:04:33 +0200