Since Gradle 3 the Gradle daemon is automatically used to run Gradle.
This means Gradle will startup up faster after a first run.
Gradle tries to re-use a daemon if it is available.
We can check the status of the Gradle daemon processes with the new command-line option --status
.
We get the status results for the Gradle daemons with the same Gradle version that is used to view the status.
So when we use Gradle 3.0 with the --status
option we only see the 3.0 Gradle daemons.
The following example shows the sample output of running gradle
with the --status
option:
Continue reading →
The Software Development Kit Manager (SDKMAN!) is an awesome and very useful tool.
We can use it to install and manage candidates like Groovy, Grails, Griffon and Gradle.
If we want to know if a new version of an installed candidate is available we use the outdated
command.
SKDMAN! returns a list of candidates with newer versions and also displays the version we have and is available.
If we specify the candidate we can see if for that specific candidate a newer version is available.
For example we can get the following results:
Continue reading →
In object-oriented languages, like Java, this refers to the instance of the class where you run the method.
In javascript this is often also the case, but not always.
In this post we'll explore some situations.
And I give some tips on how to deal with them. The normal case. The function eat is defined on carrot.
And we simply run it. this will refer to the enclosing object, which is carrot, with name "carrot".
var carrot = {
name: "carrot",
eat: function () {
console.log(this);
console.log("eating " + this.name);
}
};
carrot.eat(); //result: eating carrot
Continue reading →
Securing an application is difficult.
Securing an entire application landscape is even more difficult! In this modern era of blazing fast microservices we do not want the additional complexity of having to secure it all manually.
This is where Spring Cloud Security comes in.
By combining proven technologies, it helps us achieve performant, configurable end-to-end security across multiple applications.
So what technologies are being combined? Well, a lot...
We will not mention them all here, but the foundation relies on Spring Boot and Spring Security OAuth.
OAuth, or, in our case, OAuth2 is basically an authorization delegation protocol.
To quote Wikipedia, OAuth:
[...] specifies a process for resource owners to authorize third-party access to their server resources without sharing their credentials.
Continue reading →