Fork me on GitHub

Programming, Internet & more

Category Archives for tutorials

Authentication with Spring Boot, Angular 2 and Keycloak

Last year, I wrote about how to[integrate AngularJS with Keycloak]. However, in the meantime many things have changed. There are new major versions for every used technology, Angular 2 is final and has continued the successful path of its predecessor AngularJS. Because the concepts of Angular 2 have changed so much, I’ve thought it […]

Also posted in spring, spring-boot | 9 Comments

Authentication with Spring Boot, AngularJS and Keycloak

Update There is a new version of this tutorial available for Angular 2 and Keycloak. Intro In this tutorial, I want to show you how to combine Keycloak with AngularJS and Spring Boot. The result will be a small application where you will get a frontend written in AngularJS and the big topics regarding authentication […]

Also posted in spring, spring-boot | 18 Comments

Continuous Delivery with Jenkins and Docker

If you’ve ever wondered how to actually build a continuous delivery pipeline for your project this is going to be the ultimative guide. I will tell you how you can build a continuous delivery pipeline from ground up. The pipeline will make heavy use of Jenkins together with Docker to provide a stable platform to […]

Also posted in javaee, programming | 1 Comment

Injecting properties in Java EE applications

In almost any application there are some settings that must be read from somewhere to configure the application. User names or IP addresses are great examples for such settings. To use settings is the standard procedure to make software configurable. There are many possibilities that one can use to achieve this. One example would be […]

Also posted in javaee, programming | 1 Comment

C# How to force decimal precision in xml serialization

Recently, I’ve tried to serialize some xml in c# and stumbled accross the problem that I had to force the precision scale of decimal values. By default the XmlSerializer uses the exact value of the underlying decimal value while serializing to xml. That means, if you assign 2 to a decimal value your xml will […]

Also posted in c#, programming | 1 Comment

JDBC Security with Glassfish 3.1 and Java EE 6

In this tutorial I would like to show you, how you can build a JDBC Security Realm working with Glassfish 3.1 and the Java EE 6 stack. At the end of the tutorial you should have a working user management backend based on a relational database. Most applications need some kind of security. The choice […]

Also posted in javaee | Leave a comment

JPA Persistence in a modular maven application

In this tutorial I would like to show you, how you can build a modular maven application together with working JPA persistence. That means, at the end of the tutorial you will be able to fetch your entities from several jar files into one application. The use-case is quite common. Assume you want to build […]

Also posted in persistence | 4 Comments

Introduction to QueryDSL

If you’ve ever used the JPA criteria API, you probably know its drawbacks: less readable very verbose very ugly Fortunately since some time there is QueryDSL around, which targets to solve this pain. QueryDSL is a framework that provides you with a simple and fluent api as an alternative to the JPA criteria api. Besides […]

Also posted in persistence | 2 Comments

Test Request-Scoped Beans with Spring

Spring makes it very easy to write test with jUnit. There are a lot of helpers like SpringJUnit4ClassRunner which allows you to write tests for spring-managed objects. But assume you have a web application and you have annotated most of your beans/controllers with @Scope(“request”) or @Scope(“session”). If you try to write a test for this […]

Also posted in spring | 5 Comments

Roles & Permissions with Spring-Security 3

The Spring-Security approach to model roles and permissions is, in my opinion, very strange. In fact, out of the box you have either an overly simple approach with just users and roles, or a very complex heavy weigh approach with security on every domain object instance. The most common requirement for security that I come […]

Also posted in spring | 1 Comment