Tag:role

  • PostgreSQL security best practices

    Time:2021-7-30

    Database is the “Holy Grail” in the eyes of hackers. We need to take care of it like “flowers”. This article mainly introduces the best practices of database protection. First, starting with the most commonly used open source database PostgreSQL, we will introduce several security levels you need to consider one by one: Network layer […]

  • The Chinese version of redash takes PostgreSQL as an example to set user permissions

    Time:2021-7-26

    As a data visualization software, users use the Chinese version of redash more to find and analyze the data source without editing and changing the data content. When establishing the data source, configuring a database user with permission control can better ensure data security and avoid data loss caused by user misoperation. Next, take the […]

  • Design pattern learning 17 (Java implementation) — visitor pattern

    Time:2021-7-25

    Write in front Take notes on learning design patterns Improve the flexible use of design patterns Learning address https://www.bilibili.com/vide… https://www.bilibili.com/vide… Reference articles http://c.biancheng.net/view/1… Project source codehttps://gitee.com/zhuang-kang/DesignPattern 19. Visitor mode 19.1 definition and characteristics of visitor mode Definition of visitor mode:The operations acting on each element in a data structure are separated and encapsulated into independent […]

  • RBAC permission control of graphql request

    Time:2021-7-23

    outline Implementation mode adapter middleware Basic permission API summary outline The flexibility of graphql requests is far beyond restful requests, but the endpoint of graphql is generally a unified one, which determines what kind of data to return according to the request content and parameters in the body Therefore, the permission control of graphql request […]

  • Design pattern learning 11 (Java implementation) – appearance pattern

    Time:2021-7-18

    Write on the front Take notes on learning design patterns Improve the flexible use of design patterns Learning address https://www.bilibili.com/vide… https://www.bilibili.com/vide… Reference article http://c.biancheng.net/view/1… Project source codehttps://gitee.com/zhuang-kang/DesignPattern 13. Appearance mode 13.1 definition and characteristics of appearance pattern Facade mode is also called facade mode,It is a pattern that provides a consistent interface for multiple complex […]

  • Design pattern learning 12 (Java implementation) — enjoy meta pattern

    Time:2021-7-17

    Write on the front Take notes on learning design patterns Improve the flexible use of design patterns Learning address https://www.bilibili.com/vide… https://www.bilibili.com/vide… Reference article http://c.biancheng.net/view/1… Project source codehttps://gitee.com/zhuang-kang/DesignPattern 14. Enjoy yuan mode 14.1 definition and characteristics of Heyuan mode Definition of flyweight mode:Sharing technology is used to support the reuse of a large number of fine-grained […]

  • Mongodb (V) advanced_ Management: creation, deletion and modification of users

    Time:2021-7-8

    When mongodb is installed, it gives us the highest administrative authority by default, which is convenient for us to manage the database. We can use Mongo to link the database. That’s the principle. But in the actual development, this user can not be used, because we all know and the highest authority, security and reliability […]

  • Design pattern learning 09 (Java implementation) – bridging pattern

    Time:2021-7-1

    Write on the front Take notes on learning design patterns Improve the flexible use of design patterns Learning address https://www.bilibili.com/video/BV1G4411c7N4 https://www.bilibili.com/video/BV1Np4y1z7BU Reference article http://c.biancheng.net/view/1317.html Project source codehttps://gitee.com/zhuang-kang/DesignPattern 11. Bridge mode 11.1 definition and characteristics of bridge mode The definition of bridge mode is as follows:Separate abstraction from implementation so that they can change independently.It is […]

  • Design pattern learning 10 (Java implementation) – Decorator Pattern

    Time:2021-6-30

    Write on the front Take notes on learning design patterns Improve the flexible use of design patterns Learning address https://www.bilibili.com/video/BV1G4411c7N4 https://www.bilibili.com/video/BV1Np4y1z7BU Reference article http://c.biancheng.net/view/1317.html Project source codehttps://gitee.com/zhuang-kang/DesignPattern 12. Decorator mode 12.1 definition and characteristics of Decorator Pattern Definition of decorator mode:It refers to the mode of dynamically adding some responsibilities (i.e. adding additional functions) to […]

  • Election of raft algorithm

    Time:2021-6-26

    We have introduced the raft algorithm in front of us. Next, we will talk about each part in sections. Today we will talk about the details of the election. Before talking about the election, let’s first introduce the basis of raft algorithm. 1、 Raft foundation 1. Node role In raft, the server node can only […]

  • Knowledge sharing: do you know the role authorization and authentication of rights management?

    Time:2021-6-11

    In authority management, role authorization and authentication belong to the key module of authority module. Role authorization is the act of assigning menu resources that a role can operate to a specified role. Role authentication is the operation of verifying the permissions of user operated resources after a user plays a specified role and logs […]

  • Collect it! This open source online examination system, I love it

    Time:2021-6-3

    Hello everyone, I’m a heartbroken editor for the majority of programmers. I recommend a small tool / source code every day, fill your favorites, and share a little skill every day, so that you can easily save development efficiency, and achieve the goal of not working overtime, not staying up late and not losing your […]