First of all, show the effect map.
All permissions are displayed here and the permissions of this role are bound.
Privilege display: first, get all the privilege tree from the privilege table, then get the corresponding privilege from the privilege role middle table (there is a ...
Posted on Thu, 03 Oct 2019 14:10:01 -0700 by van__
First, how to protect the gateway under high concurrent access
In the development of micro-services, it is sometimes necessary to limit the current of API to prevent network attacks, such as making a short message verification code API, to limit the client's request rate can resist short message bombi ...
Posted on Thu, 03 Oct 2019 12:55:38 -0700 by Cooper94
A small public SDK of the company needs to output the facet log of method calls for each project.
Output the tangent log of the specified class (method);
The tangent points of each project are configurable.
In fact, the demand is very clear.
SDK package is introduced into the project.
The tangent point is conf ...
Posted on Thu, 03 Oct 2019 10:12:36 -0700 by Trojan
We can use gateways to achieve a simple privilege verification, which involves another core function in Spring Cloud Zuul: request filtering. Request filtering is somewhat similar to Filter filters in Java. First, all requests are intercepted and then processed differently according to the scene. Her ...
Posted on Thu, 03 Oct 2019 06:36:41 -0700 by ExuLt4Nt
Project structure: you need to add webapp folders to store directory jsp files
Specify the location and suffix of jsp in the ...
Posted on Thu, 03 Oct 2019 05:55:31 -0700 by Centrek
When we operate in publish-subscribe mode, point-to-point does not work:
See news but no consumption; that is to say, this publish-subscribe mode operation is invalid!
How can both be done at the same time?
1. In the configuration file, comment o ...
Posted on Thu, 03 Oct 2019 05:42:25 -0700 by wezalmighty
Links to the original text: https://www.iteye.com/blog/panyongzheng-2258935
In Spring MVC applications, we often need to apply some view parser strategies to parse ...
Posted on Thu, 03 Oct 2019 04:25:54 -0700 by The Phoenix
Spring MVC 5.1.9 in the controller, a method jump view can also jump method problem solving
Spring MVC Framework version
Prerequisites for browsing this article
Configuration of spring MVC in this paper
Conclusion (An impatient friend can see this step directly)
Spring MVC Framework version ...
Posted on Wed, 02 Oct 2019 21:54:36 -0700 by m00gzilla
Microservice BCrypt Cryptographic Encryption
1 BCrypt cryptographic encryption
No application can save passwords in plain text, considering security. Password should be encrypted by hashing algorithm. There are many standard algorithms such as SHA.
Or MD5, combined with salt, is a good ...
Posted on Wed, 02 Oct 2019 10:23:30 -0700 by sogno
For beginners of springboot, some of the problems encountered during the learning process are recorded.
First, configure the Maven environment and local warehouse
Then enter the settings.xml configuration file under the conf folder of the Maven installation directory, and open the file with Notepadd++.
Configure the local warehouse to point ...
Posted on Tue, 01 Oct 2019 23:48:45 -0700 by Richard Bowser