- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 190字
- 2021-07-23 18:59:13
Modules in Reactor
With the latest release of Reactor 3.0 the project has been structured with modularity in mind. Reactor 3.0 consists of four major components namely Core, IO, Addons, and Reactive Streams Commons.
- Reactor Core (https://github.com/reactor/reactor-core): The main library within Reactor. It provides foundational, non-blocking JVM-compliant Reactive Streams Specification implementations. It also contains code for Reactor types, such as Flux and Mono.
- Reactor IO (https://github.com/reactor/reactor-ipc): It contains backpressure-ready components that can be used to encode, decode, send (unicast, multicast, or request/response), and then serve connections. It also contains support for Kafka (https://kafka.apache.org/), Netty (http://netty.io/), and Aeron (https://github.com/real-logic/aeron).
- Addons (https://github.com/reactor/reactor-addons): As the name suggests, these are add-ons that consist of three components:
- reactor-adapter: Contains a bridge to RxJava 1 or 2 types, such as Observable, Completable, Single, Maybe, and Mono/Flux back and forth.
- reactor-logback: Supports logback over asynchronous reactor-core processors.
- reactor-extra: Contains more operations for Flux, which include mathematical operations such as sum and average.
- Reactive Streams Commons (https://github.com/reactor/reactive-streams-commons): A collaboration experiment project between Spring's Reactor and RxJava. It also contains Reactor-Streams-compliant operators that both projects implement. Issues fixed on one project are also fixed on the other.
推薦閱讀
- RESTful Java Web Services Security
- 數字身份與元宇宙信任治理
- Metasploit Penetration Testing Cookbook(Third Edition)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Wireshark 2 Quick Start Guide
- 網絡空間安全:管理者讀物
- 計算機使用安全與防護
- 開發者的Web安全戒律:真實威脅與防御實踐
- Mastering Kali Linux for Advanced Penetration Testing
- 安全實戰之滲透測試
- 工業物聯網安全
- ARM匯編與逆向工程:藍狐卷·基礎知識
- Digital Forensics with Kali Linux
- 可信計算3.0工程初步(第二版)
- Web安全之深度學習實戰