Kill feign and release spring cloud square components
What is Spring Cloud Square
When talking about Spring Cloud ecology, you must be familiar with Feign. As shown in the figure below, Feign can hide the Rest requests of the underlying (okhttp, httpclient) and pretend to be similar to the Controller of spring MVC. You don't have to splice URLs, splice parameters and other operations by yourself. ...
Added by mikewooten on Fri, 04 Mar 2022 05:22:52 +0200
Java framework born of "cloud": building native executable files
Today, let's take a look at how fast the native executable built by Quarkus can be faster than the Spring application. The maturity of ecology is not discussed here.
TLDR
First, let's draw a conclusion and make a comparison with the Spring Web application with only one Controller.
Application start time: 0.012s vs 2.294s
...
Added by dfownz on Thu, 03 Mar 2022 22:45:29 +0200
Chapter 1 Introduction to Spring Boot and Spring MVC on the home page of the development community
Getting started with Spring MVC
The first layer is the web browser, and the second layer is the web browser, which is used to learn about the various web application transmission protocols. The first layer is the web browser, and the second layer is used to learn about these web application transmission protocols.
HTTP protocol
First, lear ...
Added by johanafm on Thu, 03 Mar 2022 21:00:15 +0200
IDEA Version Implements Role Maintenance
Since the videos in Silicon Valley are made by Eclipse software, some of which are different from IDEA, I'm here to share with you the differences between IDEA and Eclipse's operation, the source code involved in the operation (slightly different from the source code of the video), and the various problems you may encounter. These sources are t ...
Added by MmmVomit on Thu, 03 Mar 2022 20:16:45 +0200
The principle of generating QR code and scanning code can access different paths: for example, the links published by different test papers of questionnaire star can access different test papers
reflection:
This is the first time I have encountered this situation: I want to configure the form of nginx, and linux will automatically map the path every time a QR code is generated
But I copied the test links of several questionnaire stars and found that:
The paths of the same type of questions are the same. The only difference is the va ...
Added by kolanos7 on Thu, 03 Mar 2022 15:52:05 +0200
There are six common ways for Spring to inject bean s
I General form of annotation injection
Bean class
public class TestBean{
}
Configuration class @The Configuration annotation marks this class, which indicates that this class is a Spring Configuration class. It will be loaded when loading the Configuration.
@The annotation of Bean indicates that this is a method of injecting Bean, which wi ...
Added by mubashir on Thu, 03 Mar 2022 09:06:09 +0200
Spring's solution to circular dependency and consideration of three-level cache
1, First, look at several circular dependencies
1. Constructor injection loop dependency
@Service
public class A {
public A(B b) {
}
}
@Service
public class B {
public B(A a) {
}
}
2. singleton pattern field property or setter injection cyclic dependency
@Service
public class A {
@Autowired
private B b;
}
@Service ...
Added by BLottman on Thu, 03 Mar 2022 09:00:22 +0200
Spring Quick Start - Configuring Data Sources & Note Development
Spring Configuration Data Source
Role of data sources (connection pools)
Data sources (connection pools) occur to improve program performancePre-instantiate the data source to initialize partial connection resourcesGet from data source when using connection resourcesReturn the connected resource to the data source after useCommon data sources ...
Added by jkatcherny on Wed, 02 Mar 2022 19:25:44 +0200
Spring Chapter 17 circular dependency
1. Circular dependency resolution in the case of prototype Bean
First of all, Spring will not scan prototype beans in the scanning phase. These prototype beans will be created only when called. List several scenarios for prototype beans to briefly describe: (1) Suppose there are two objects, class A and class B, and both are defined as pro ...
Added by sid on Wed, 02 Mar 2022 17:21:31 +0200
61. Introduction to shiro zero Foundation (Foundation completion source code to be supplemented)
shiro (java security framework)
1 Introduction
Apache Shiro is a security framework for Java. At present, more and more people use Apache Shiro because it is quite simple. Compared with Spring Security, it may not be as powerful as Spring Security, but it may not need so complex things in actual work, so using a small and simple Shiro is enou ...
Added by scuba on Wed, 02 Mar 2022 15:12:18 +0200