Spring Cloud AWS – Messaging Support
In the final article, we move on to AWS Messaging Support. 1. AWS Messaging Support 1.1. SQS (Simple Queue Service) We can send messages to an SQS queue using the QueueMessagingTemplate. To create...
View ArticleA Quick Guide to Maven Wrapper
1. Overview The Maven Wrapper is an excellent choice for projects that need a specific version of Maven (or for users that don’t want to install Maven at all). Instead of installing many versions of...
View ArticleSpring Security 5 – OAuth2 Login
1. Overview Spring Security 5 introduces a new OAuth2LoginConfigurer class that we can use for configuring an external authorization server. In this article, we’ll explore some of the various...
View ArticleIntegration Guide for Spring and EJB
1. Overview In this article, we’ll show how to integrate Spring and remote Enterprise Java Beans (EJB). To do this, we’ll create some EJBs and the necessary remote interfaces, and then we’ll run them...
View ArticleTry-with-resources in Kotlin
1. Introduction Managed languages, such as those targeting the JVM, automatically handle the most common resource: memory. However, we need to deal with all kinds of resources, not just memory: files,...
View ArticleWriting a Jenkins Plugin
1. Overview Jenkins is an open-source Continuous Integration server, which enables to create a custom plugin creation for particular task/environment. In this article, we’ll go through the whole...
View ArticleJava Weekly, Issue 212
Here we go… 1. Spring and Java >> Creating a Kotlin DSL for validation [blog.sourced-bvba.be] DSLs can be powerful in Kotlin – especially when they leverage reified generics. >> Spring,...
View ArticleIntroduction to Spring Method Security
1. Introduction Simply put, Spring Security supports authorization semantics at the method level. Typically, we could secure our service layer by, for example, restricting which roles are able to...
View ArticleA Guide to JavaLite – Building a RESTful CRUD application
1. Introduction JavaLite is a collection of frameworks for simplifying common tasks that every developer has to deal with when building applications. In this tutorial, we’re going to take a look at...
View ArticleUsing JWT with Spring Security OAuth
1. Overview In this tutorial we’ll discuss how to get our Spring Security OAuth2 implementation to make use of JSON Web Tokens. We’re also continuing to built on top of the previous article in this...
View ArticleExceptions in Netty
1. Overview In this quick article, we’ll be looking at exception handling in Netty. Simply put, Netty is a framework for building high-performance asynchronous and event-driven network applications....
View ArticleSpring MVC Tutorial
1. Overview and Maven This is a simple Spring MVC tutorial showing how to set up a Spring MVC project, both with Java-based Configuration as well as with XML Configuration. The Maven artifacts for...
View ArticleGetting Started with Java RMI
1. Overview When two JVMs need to communicate, Java RMI is one option we have to make that happen. In this article, we’ll bootstrap a simple example showcasing Java RMI technology. 2. Creating the...
View ArticleSpring Boot Actuator
1. Overview In this article, we’re going to introduce Spring Boot Actuator. We’ll cover the basics first, then discuss in detail what’s available in Spring Boot 1.x vs 2.x. We’ll learn how to use,...
View ArticleThe Trie Data Structure in Java
1. Overview Data structures represent a crucial asset in computer programming, and knowing when and why to use them is very important. This article is a brief introduction to trie (pronounced “try”)...
View ArticleCreating and Configuring Jetty 9 Server in Java
1. Overview In this article, we’ll talk about creating and configuring a Jetty instance programmatically. Jetty is an HTTP server and servlet container designed to be lightweight and easily...
View ArticleSpring Security – Auto Login User After Registration
1. Overview In this quick tutorial, we’ll discuss how to auto-authenticate users immediately after the registration process – in a Spring Security implementation. Simply put, once the user finishes...
View ArticleSpring 5 and Servlet 4 – The PushBuilder
1. Introduction The Server Push technology — part of HTTP/2 (RFC 7540) — allows us to send resources to the client proactively from the server-side. This is a major change from HTTP/1.X pull-based...
View ArticleAn Example of Load Balancing with Zuul and Eureka
1. Overview In this article, we’ll look at how load balancing works with Zuul and Eureka. We’ll route requests to a REST Service discovered by Spring Cloud Eureka through Zuul Proxy. 2. Initial Setup...
View ArticleAn Introduction to Kong
1. Introduction Kong is an open-source API gateway and microservice management layer. Based on Nginx and the lua-nginx-module (specifically OpenResty), Kong’s pluggable architecture makes it flexible...
View Article