Spring Security Resolution (1) - Authorization Process
_When learning Spring Cloud, when you encounter the content related to the authorized service oauth, you always have a half-knowledge, so you decide to first learn and collate the content, principles and design related to Spring Security, Spring Security Oauth2 and other privileges, certif ...
Posted on Mon, 19 Aug 2019 19:21:08 -0700 by pixelgirl
"To cross the glacier of the Yellow River, we will travel all over the world with snow." No matter in life or in the computer world, there will inevitably be an exception. Last article RESTful API returns uniform JSON data format Explains the handling of uniform returns, which is a normal situation for requests; this a ...
Posted on Mon, 19 Aug 2019 17:50:09 -0700 by thewitt
Custom landing page: Create a simple login.html landing page under the static folder
Posted on Mon, 19 Aug 2019 06:59:38 -0700 by wallabee
I. What is mock? The role of mock
mock is a test tool that achieves its desired results by simulating uncontrollable or complex request results (such as third party requests) and controlling request parameters. Popularly speaking, it is the &quo ...
Posted on Mon, 19 Aug 2019 01:52:30 -0700 by northk
What is an XSS attack?
XSS attack, which is called cross-site scripting attack, is to avoid confusion with the abbreviation of Cascading Style Sheets (CSS). Therefore, cross-site scripting attack is abbreviated as XSS. XSS is a computer security v ...
Posted on Sat, 17 Aug 2019 02:28:59 -0700 by Daggeth
Built-in routing predicate factory
Spring Cloud Gateway has built-in a series of routing predicate factories so that we can flexibly use Gateway for request forwarding in development. Here I tabulate all the routing predicate factories built into Gateway as follows:
Routing predicate factory
The request is fo ...
Posted on Fri, 16 Aug 2019 07:13:51 -0700 by gbuck
We should be a man with a blueprint in his chest and a plan in his feet.
The annotation-based programming model provided by Spring MVC greatly simplifies the development of web applications, and we are all beneficiaries. For example, we use @RequestMapping, @ExceptionHandler annotations on the @RestController annotated ...
Posted on Thu, 15 Aug 2019 08:45:56 -0700 by bizshop
Everyone should think clearly about this question: Are you a grandfather or a god?
Last article Describes the core principles of @ModelAttribute. This article focuses on the use of scenarios, demonstrates the use of @ModelAttribute in different scenarios, and points for attention (of course, some related principles will ...
Posted on Thu, 15 Aug 2019 08:41:39 -0700 by wizzkid
How to Write Data Access Layer in maven Multimode--dao Layer
How to write dao layer module with mybatis framework
dao layer module:
web layer module:
So how to test it?
In recent days, I ...
Posted on Thu, 15 Aug 2019 06:40:51 -0700 by phpfolk2003
Data validation on the client side is not safe and effective for any application, which requires us to validate the validity of data on the server side when developing.SpringMVC has its own good support for data validation on the server side. It can validate the validity of data we submit to the server side according to our prior conventions. F ...
Posted on Wed, 14 Aug 2019 23:53:57 -0700 by PHPGuru_2700