Springboot&security Encrypted Login Process Based on Front-end and Back-end Separation of RSA Password

    Introduction to RSA Encryption RSA encryption is an asymmetric encryption. The decryption can be completed without directly transferring the key. This ensures the security of the information and avoids the risk of being cracked by transfer ...

Added by alkhatareykha on Fri, 13 Sep 2019 09:01:14 +0300

Springboot Integration Spring Security 03 - Access Control

Springboot Integration Spring Security 03 - Access Control stay Springboot Integration Spring Security 02 - Use custom landing pages We have learned to customize our own landing page. Let's continue to learn about Spring Security's permission contr ...

Added by bacil on Thu, 12 Sep 2019 16:23:28 +0300

Spring Boot Personal Learning Notes #2

8. log Common log frameworks: JUL JCL jboos-logging logback log4j log4j2 slf4j... Log facade (log abstraction layer) Log implementation JCL(jakarta commons logging) , slf4j(simple logging facade for java) , jboss-logging log4j , JUL(java.ut ...

Added by danielle on Wed, 11 Sep 2019 12:15:00 +0300

Eureka of Spring Cloud Source Analysis Chapter 4: How Service Registration was Initiated

Original Link: https://blog.csdn.net/boling_cavalry/article/details/82721583 In the Spring Cloud environment, both service providers and consumers will register themselves to Eureka after startup. Starting from this chapter, we will explore ...

Added by kweathe on Sat, 07 Sep 2019 05:36:46 +0300

Test observation and personal understanding of Hystrix timeout mechanism and thread state

When we use Hystrix, most of the time we complete the request call directly based on Spring Cloud annotations. One of our projects is to manually create HystrixCommand to wrap RestTemplate to initiate requests. However, in the process of service running, it is found that when HystrixCommand returns fallback result overtime, the RestTemplate re ...

Added by karnul on Thu, 05 Sep 2019 10:32:02 +0300

Custom Annotation Injection Property Values (Based on Reflection and Static Variables)

Links to the original text: http://markey.cc/2019/02/16/SpringBoot%E4%B9%8B%E8%87%AA%E5%AE%9A%E4%B9%89%E6%B3%A8%E8%A7%A3%EF%BC%88%E5%9F%BA%E4%BA%8E%E5%8F%8D%E5%B0%84%E5%92%8C%E9%9D%99%E6%80%81%E5%8F%98%E9%87%8F%EF%BC%89/ This article wil ...

Added by sheffrem on Wed, 04 Sep 2019 10:41:34 +0300

Sprinig Boot elegantly implements interface idempotency, which was so simple

1. Concepts Idempotency, commonly referred to as an interface, makes the same request multiple times and must ensure that the operation can only be performed once For example: Order interface, order cannot be created more than once Payment interface, double payment of the same order can only be deducted once Alipay callback interface, may hav ...

Added by reivax_dj on Tue, 03 Sep 2019 21:09:11 +0300

java Logging Framework from scratch: Logging Framework Slf4j

Catalog One: Logging System in java Web Project II: Classification of Logging Systems 3: springboot integrates slf4j 1. Add mavne support 2. Configuring xml and developing yml 3. Code testing 4. Logging IV: Logging using Aop method, and a ...

Added by CMC on Tue, 27 Aug 2019 13:19:51 +0300

Thymeleaf's Initial Knowledge and Use

##Template Engine In addition to JSP, SpringBoot also provides many other template engines, such as freemarker, thymeleaf, and so on. JSP is officially not recommended for SpringBoot, and Thymeleaf is the view layer technology recommended for Sprin ...

Added by iShaun on Tue, 27 Aug 2019 04:52:32 +0300

AbstractAdvisorAutoProxyCreator for Springboot Source Analysis

Summary: Spring's proxies are mainly divided into ProxyCreatorSupport s and ProxyProcessorSupport in the upper level, the former based on the proxy factory, the latter based on the postprocessor, or think of the postprocessor as the automatic proxy.When there are more beans in the spring container that require aop weaving, simply using ProxyFac ...

Added by env3rt on Sun, 25 Aug 2019 08:43:57 +0300