When we use Spring Security in a standard way, it performs quite a standard actions. For example, Spring Security blocks the un-authenticated requests to the resource (URL resource) and redirects (with 302) to the /login page. But sometimes we want different behavior. Customized behavior such as if the requester is web-browser we want to redirect them to the /login page. But if the requester is not a browser and purely generates RestAPI type of request, then redirection would have no sense. Of course, we could have written some logic on the requester client side to consider 302 as non-authorized behavior.
Storing Json Formatted Spring Session in Redis
I have found combination of these three is a quite interesting topic. Actually four, because usually Spring Session is used with Spring Security. There are many resources for Spring Session storing in Redis, but when it comes to storing session in Json format not many infos are there. I have found some but I felt they were not good enough to finish up practically.
Netflix Interactive Content, Bandersnatch (Movie)
As a developer I think Netflix done great job about bandersnatch. They have designed a complex story map, where the story flows and the user who watches the movie can choose the direction of the flow. Definitely there will be many critics about this decision of the Netflix. Because many people will think that movie is the art which must created by artist and watched only with a single flow. What Netflix has done with bandersnatch is new type off art called interactive movie, but it sounds more like a description to the technology. Could be given more fancy specific name.
Disable Hiding Exception Messages (Spring Security)
We will need a UserDetailService implementation, which depends on each development requirements.
Introduction to the Spring Security
Today I’m starting the series of Spring-Security articles, and most of them will be references from web-sites and book named “Spring-Security” from authors Mick Knutson,Robert Winch and Peter Mularien. Before going into an example of Spring Security lets clarify why do we need spring security.
Building Microservices (Book Review)
The book has been written by Sam Newman, who talks about microservice architecture usage around the world, including in organizations like Netflix, Amazon, Gilt and the REA group, who have all found that the increased autonomy gives huge advantages to their teams. While I was reading this book, I got the similar feelings to the books such as “Clean Code” and “Clean Architecture”. The author has collected many useful experiences about microservice architecture, some of them very familiar to us, but some of them are gives us “aha” points.
Cloud Native Infrastructure (Book Review)
The book was what I have expected from infrastructure book. There were no source codes, except some configuration scripts. The book contains the collection of experiences about cloud-native solutions. It mostly talks about development and deployment processes on the cloud-native.
KOSSCON 2018
Korean Open Source Software Conference has gathered many open source communities and contributors. It has become common for conferences these days have tracks: AI, BigDATA, Blockchain, Cloud. This conference was no exception. I have visited cloud development related topics.
NHN Forward 2018
Conference organized by NHN Enterprise (Intercontinental Seoul Parnas 19.11.2018) has encompassed many different topics. I have especially was interested in java related topics. How the big tech companies like NHN itself would approach the issue regarding to Oracle recent declarations about Java becoming non-free anymore.
P-NP, Approximate Algorithms
P and NP is the problem that always comes out while we are studying algorithms, and usually, it comes up at the end of any algorithms book. The reason it comes out at the latest pages is that it is quite an advanced topic.