Kong extends jwt plug-in to add blacklist verification

Kong Jwt plugin with blacklist extend Official jwt plug-in , keep token expiration and signature verification, add query redis blacklist database according to jti, and implement forced offline. Extended functions Optimize the configuration parameters, delete the token obtained from cookie, support the token obtained from url and header, ...

Posted on Fri, 15 May 2020 07:15:22 -0700 by Consolas

Encountered a fastjson assignment problem

Background: there is a change in requirements, and a modification scheme is determined. The test finds that there is a code to be modified. Is a json string. The project uses fastjson. The logic here is: first take out a JSONObject obj, and then take out a JSONArray jarr from it. The jarr add is a key value pair of JSONObject type, and then the ...

Posted on Thu, 14 May 2020 21:58:57 -0700 by Dixen

Core principle and Simulation of small program

This article will introduce the separation architecture of the logic layer of the core view layer of the applet, and simulate this dual thread model through iOS code. What is applet Applet is a new mobile application format, which depends on Web technology, but also integrates native application functions. At present, small program platforms o ...

Posted on Thu, 14 May 2020 01:57:40 -0700 by Xoid

Python+selenium+unittest+HTMLTestReportCN unit test framework sharing

Before that, Xiaobian shared the Python+selenium+unittest+HTMLTestRunner unit test framework. After a lot of time, they didn't touch the code for a long time. When it was opened, it was a clanging error report. A line of striking red error report reminded me that the code was updating. Why don't you make progress? There is nothing in-depth. The ...

Posted on Thu, 14 May 2020 00:01:11 -0700 by AoA_Falcon

Building reactive spring drivers from relational data

Let's talk about response Reactive programming is a kind of programming paradigm for data flow and change propagation. To be frank, it is to propagate the changed value through data flow. What is WebFlux The name of the WebFlux module is spring webplus, and the Flux in the name comes from the class Flux in the Reactor. Spring webplus has a ...

Posted on Wed, 13 May 2020 19:09:11 -0700 by phpcoder24july

Python hash tables and parsing

[TOC] Hello, everyone!It's been nearly a month and a half since my last article was published. It happened that this month I encountered a job adjustment and had to take care of my 10-month-old child. That's not easy, so I haven't updated it for such a long time.No, I try to finish this article a little bit every day,'Dripping water into the r ...

Posted on Wed, 13 May 2020 10:52:05 -0700 by jeff21

SpringBoot Getting Started Series Unified Log Collection!

Spring Boot exception handling was described earlier, and unclear friends can see the previous articles. Today we will focus on log collection in Spring Boot. Logs are the key to tracking error positioning issues. Especially in production environments, we need to quickly locate problems with logs. Springboot's logging framework is rich, and S ...

Posted on Wed, 13 May 2020 10:22:39 -0700 by Tandem

Talk about debezium's snapshot change record emitter

order This paper mainly studies the snapshot change record emitter of debezium SnapshotChangeRecordEmitter debezium-v1.1.1.Final/debezium-core/src/main/java/io/debezium/relational/SnapshotChangeRecordEmitter.java public class SnapshotChangeRecordEmitter extends RelationalChangeRecordEmitter { private final Object[] row; public Snapsho ...

Posted on Wed, 13 May 2020 08:50:06 -0700 by Stonewall

Security design scheme of third party application obtaining data

In the actual business, it is inevitable to interact and transfer data with the third-party system, so how to ensure the security of data in the transmission process (anti stealing)? In addition to the https protocol, can we add a general set of algorithms and specifications to ensure the security of transmission?   Now let's discuss some com ...

Posted on Tue, 12 May 2020 08:17:32 -0700 by flyingeagle855

Google auth combined with shiro two factor authentication

Login status: if Google auth is null/""/0: do not verify 1: enable dual factor authentication but not set 2: enable dual factor authentication and it has been set After the user logs in, first verify whether the account password is correct. Here, it is not verified by shiro, and it is verified by the background itself. After the ver ...

Posted on Mon, 11 May 2020 07:17:53 -0700 by chipmunken