• 一步一步学习IdentityServer4 (7) IdentityServer4成功配置全部配置


    auth.liyouming.com 全部配

    public class Startup
        {
            public Startup(IConfiguration configuration)
            {
                Configuration = configuration;
            }
    
            public IConfiguration Configuration { get; }
    
    
            public void ConfigureServices(IServiceCollection services)
            {
    
                services.AddMvc();
    
    
    
                #region 业务数据库
                services.AddOptions();
                services.AddDbContext<CustomContext>(builder =>
                {
                    builder.UseSqlServer(this.Configuration["ConnectionString"], options =>
                    {
                        options.UseRowNumberForPaging();
                        options.MigrationsAssembly("LYM.OAuth2OpenId");
                    });
                }, ServiceLifetime.Transient); 
                #endregion
    
    
                #region IdentityServer4  By liyouming Add At 2017-11-28 
                //结合EFCore生成IdentityServer4数据库
                // 项目工程文件最后添加 <ItemGroup><DotNetCliToolReference Include="Microsoft.EntityFrameworkCore.Tools.DotNet" Version="2.0.0" /></ItemGroup>
    
    
                //dotnet ef migrations add InitialIdentityServerPersistedGrantDbMigration -c PersistedGrantDbContext -o Data/Migrations/IdentityServer/PersistedGrantDb
                //dotnet ef migrations add InitialIdentityServerConfigurationDbMigration -c ConfigurationDbContext -o Data/Migrations/IdentityServer/ConfigurationDb
    
                //黎又铭 Add 2017-11-28 添加IdentityServer4对EFCore数据库的支持
                //但是这里需要初始化数据 默认生成的数据库中是没有配置数据
                const string connectionString = @"Data Source=192.168.0.42;Initial Catalog=A.IdentityServer4;User ID=sa;password=lym123!@#;Integrated Security=false;";
                var migrationsAssembly = typeof(Startup).GetTypeInfo().Assembly.GetName().Name;
                 string customUrl = this.Configuration["Authority"]; //"http://192.168.0.42:5000";
                #region 添加对IdentiyServer4配置内容处理 By Liyouming 2017-11-29
                services.AddIdentityServer(idroptions =>
                   {
                       //设置将在发现文档中显示的颁发者名称和已发布的JWT令牌。建议不要设置此属性,该属性从客户端使用的主机名中推断颁发者名称
                       //idroptions.IssuerUri = "";
                       //设置认证
                       idroptions.Authentication = new IdentityServer4.Configuration.AuthenticationOptions
                       {
                           //监控浏览器cookie不难发现lym.Cookies=8660972474e55224ff37f7421c79a530 实际是cookie记录服务器session的名称
                           CheckSessionCookieName = "lym.SessionId", // CookieAuthenticationDefaults.AuthenticationScheme,//用于检查会话端点的cookie的名称
                           CookieLifetime = new TimeSpan(1, 0, 0),//身份验证Cookie生存期(仅在使用IdentityServer提供的Cookie处理程序时有效)
                           CookieSlidingExpiration = true,//指定cookie是否应该滑动(仅在使用IdentityServer提供的cookie处理程序时有效)
                           RequireAuthenticatedUserForSignOutMessage = true //指示是否必须对用户进行身份验证才能接受参数以结束会话端点。默认为false
                       };
                       //活动事件 允许配置是否应该将哪些事件提交给注册的事件接收器
                       idroptions.Events = new IdentityServer4.Configuration.EventsOptions
                       {
                           RaiseErrorEvents = true,
                           RaiseFailureEvents = true,
                           RaiseSuccessEvents = true,
                           RaiseInformationEvents = true
    
                       };
                       //允许设置各种协议参数(如客户端ID,范围,重定向URI等)的长度限制
                       //idroptions.InputLengthRestrictions = new IdentityServer4.Configuration.InputLengthRestrictions
                       //{
                       //    //可以看出下面很多参数都是对长度的限制 
                       //    AcrValues = 100,
                       //    AuthorizationCode = 100,
                       //    ClientId = 100,
                       //    /*
                       //    ..
                       //    ..
                       //    ..
                       //    */
                       //    ClientSecret = 1000
                       //};
                       //用户交互页面定向设置处理
                       idroptions.UserInteraction = new IdentityServer4.Configuration.UserInteractionOptions
                       {
    
                           LoginUrl = customUrl + "/Account/Login",//【必备】登录地址  
                           LogoutUrl = customUrl + "/Account/Logout",//【必备】退出地址 
                           ConsentUrl = customUrl + "/Consent/Index",//【必备】允许授权同意页面地址
                           ErrorUrl = customUrl + "/Error/Index", //【必备】错误页面地址
                           LoginReturnUrlParameter = "returnUrl",//【必备】设置传递给登录页面的返回URL参数的名称。默认为returnUrl 
                           LogoutIdParameter = "logoutId", //【必备】设置传递给注销页面的注销消息ID参数的名称。缺省为logoutId 
                           ConsentReturnUrlParameter = "returnUrl", //【必备】设置传递给同意页面的返回URL参数的名称。默认为returnUrl
                           ErrorIdParameter = "errorId", //【必备】设置传递给错误页面的错误消息ID参数的名称。缺省为errorId
                           CustomRedirectReturnUrlParameter = "returnUrl", //【必备】设置从授权端点传递给自定义重定向的返回URL参数的名称。默认为returnUrl
                           CookieMessageThreshold = 5 //【必备】由于浏览器对Cookie的大小有限制,设置Cookies数量的限制,有效的保证了浏览器打开多个选项卡,一旦超出了Cookies限制就会清除以前的Cookies值
                       };
                       //缓存参数处理  缓存起来提高了效率 不用每次从数据库查询
                       idroptions.Caching = new IdentityServer4.Configuration.CachingOptions
                       {
                           ClientStoreExpiration = new TimeSpan(1, 0, 0),//设置Client客户端存储加载的客户端配置的数据缓存的有效时间 
                           ResourceStoreExpiration = new TimeSpan(1, 0, 0),// 设置从资源存储加载的身份和API资源配置的缓存持续时间
                           CorsExpiration = new TimeSpan(1, 0, 0)  //设置从资源存储的跨域请求数据的缓存时间
                       };
                       //IdentityServer支持一些端点的CORS。底层CORS实现是从ASP.NET Core提供的,因此它会自动注册在依赖注入系统中
                       idroptions.Cors = new IdentityServer4.Configuration.CorsOptions
                       {
                           CorsPaths = new List<PathString>() {
                               new PathString("/")
                           }, //支持CORS的IdentityServer中的端点。默认为发现,用户信息,令牌和撤销终结点
    
                           CorsPolicyName = "default", //【必备】将CORS请求评估为IdentityServer的CORS策略的名称(默认为"IdentityServer4")。处理这个问题的策略提供者是ICorsPolicyService在依赖注入系统中注册的。如果您想定制允许连接的一组CORS原点,则建议您提供一个自定义的实现ICorsPolicyService
                           PreflightCacheDuration = new TimeSpan(1, 0, 0)//可为空的<TimeSpan>,指示要在预检Access-Control-Max-Age响应标题中使用的值。默认为空,表示在响应中没有设置缓存头
                       };
    
    
    
                   })
                #endregion
    
                #region 添加IdentityServer4 认证证书相关处理  By Liyouming 2017-11-29
                //AddSigningCredential 添加登录证书 这个是挂到IdentityServer4中间件上  提供多种证书处理  RsaSecurityKeySigningCredentials
                //这里可以采用IdentiServe4的证书封装出来
                //添加一个签名密钥服务,该服务将指定的密钥材料提供给各种令牌创建/验证服务。您可以从证书存储中传入X509Certificate2一个SigningCredential或一个证书引用
                //.AddSigningCredential(new System.Security.Cryptography.X509Certificates.X509Certificate2()
                //{
                //    Archived = true,
                //    FriendlyName = "",
                //    PrivateKey = System.Security.Cryptography.AsymmetricAlgorithm.Create("key")
                //})
                //AddDeveloperSigningCredential在启动时创建临时密钥材料。这是仅用于开发场景,当您没有证书使用。
                //生成的密钥将被保存到文件系统,以便在服务器重新启动之间保持稳定(可以通过传递来禁用false)。
                //这解决了在开发期间client / api元数据缓存不同步的问题
                .AddDeveloperSigningCredential()
                   //添加验证令牌的密钥。它们将被内部令牌验证器使用,并将显示在发现文档中。
                   //您可以从证书存储中传入X509Certificate2一个SigningCredential或一个证书引用。这对于关键的转换场景很有用
                   //.AddValidationKeys(new AsymmetricSecurityKey[] {
    
                   //}) 
                #endregion
    
                #region 添加IdentityServer4用户缓存数据 By Liyouming 2017-11-29
                   //添加配置数据全部配置到内存中 如果有EFCore数据库持久化这里不会配置 只需要配置 AddConfigurationStore、AddOperationalStore 数据仓储服务
                   //寄存器IClientStore和ICorsPolicyService实现基于内存中的Client配置对象集合。
                   //.AddInMemoryClients(IdrConfig.IdrConfigurations.GetClient())
                   //IResourceStore基于IdentityResource配置对象的内存中收集来注册实现。
                   //.AddInMemoryIdentityResources(IdrConfig.IdrConfigurations.GetIdentityResources())
                   //IResourceStore基于ApiResource配置对象的内存中收集来注册实现。
                   //.AddInMemoryApiResources(IdrConfig.IdrConfigurations.GetApiResources())
                   //添加测试用户
                   //.AddTestUsers(new List<IdentityServer4.Test.TestUser>() {
    
                   //    new IdentityServer4.Test.TestUser{
                   //        SubjectId=Guid.NewGuid().ToString(),
                   //        Username="liyouming",
                   //        Password="liyouming"
    
                   //    }
                   //}) 
                #endregion
    
    
                #region 添加对IdentityServer4 EF数据库持久化支持 By Liyouming 2017-11-29
                   //黎又铭 Add 2017-11-28 添加IdentityServer4对EFCore数据库的支持
                   .AddConfigurationStore(options =>
                {
                    options.ConfigureDbContext = builder =>
                    {
                        builder.UseSqlServer(connectionString,
                            builderoptions =>
                            {
                                builderoptions.MigrationsAssembly(migrationsAssembly);
                            });
                    };
                })
                .AddOperationalStore(options =>
                {
                    options.ConfigureDbContext = builder =>
                    {
                        builder.UseSqlServer(connectionString, builderoptions =>
                        {
                            builderoptions.MigrationsAssembly(migrationsAssembly);
                        });
    
                    };
    
                    options.EnableTokenCleanup = true;  //允许对Token的清理
                    options.TokenCleanupInterval = 1800;  //清理周期时间Secends
                })
                #endregion
    
                ;
                #endregion
    
    
    
                //services.AddScoped<IUserService, UserService>();
    
                #region 添加授权验证方式 这里是Cookies & OpenId Connect 
                JwtSecurityTokenHandler.DefaultInboundClaimTypeMap.Clear();
                services.AddAuthentication(
                    options =>
                    {
                        options.DefaultScheme = "lym.oauth.cookies";
                        options.DefaultChallengeScheme = "oidc";
                    }
                    )
                .AddCookie("lym.oauth.cookies", options=> {
    
                    options.ExpireTimeSpan = TimeSpan.FromMinutes(60);
                    options.Cookie.Name = "lym.idrserver";
    
                })  //监控浏览器Cookies不难发现有这样一个 .AspNetCore.lym.Cookies 记录了加密的授权信息 
                .AddOpenIdConnect("oidc", options =>
                {
                    options.Authority = customUrl;
                    options.ClientId = "lym.clienttest";
                    options.ClientSecret = "lym.clienttest";
                    options.RequireHttpsMetadata = false;
                    options.SaveTokens = true;
                    options.ResponseType = "code id_token";
                    //布尔值来设置处理程序是否应该转到用户信息端点检索。额外索赔或不在id_token创建一个身份收到令牌端点。默认为“false”
                    options.GetClaimsFromUserInfoEndpoint = true;
                    options.CallbackPath = new PathString("/oidc/login-callback");
                    options.SignInScheme = "lym.oauth.cookies";
                    options.SignOutScheme = "lym.oauth.cookies";
                    options.RemoteSignOutPath = new PathString("/oidc/front-channel-logout-callback");
                    options.Scope.Add("openid");
                    options.Scope.Add("profile");
                    options.Scope.Add("cloudservices");
                    options.Events = new OpenIdConnectEvents
                    {
                        OnRedirectToIdentityProvider = OnRedirectToIdentityProvider,
                        OnRemoteSignOut = OnRemoteSignOut,
                        OnRemoteFailure = OnRemoteFailure,
                        OnAuthenticationFailed = OnAuthenticationFailed,
                        OnRedirectToIdentityProviderForSignOut = OnRedirectToIdentityProviderForSignOut,
                        OnAuthorizationCodeReceived = OnAuthorizationCodeReceived,
                        OnMessageReceived = OnMessageReceived,
                        OnTicketReceived = OnTicketReceived,
                        OnTokenResponseReceived = OnTokenResponseReceived,
                        OnTokenValidated = OnTokenValidated,
                        OnUserInformationReceived = OnUserInformationReceived
                    };
                });
                #endregion
    
    
            }
            #region  Events事件
            private static Task OnRedirectToIdentityProvider(RedirectContext context)
            {
                if (context.HttpContext.Items.ContainsKey("idp"))
                {
                    var idp = context.HttpContext.Items["idp"];
                    context.ProtocolMessage.AcrValues = "idp:" + idp;
                }
    
                return Task.FromResult(0);
            }
    
            private static Task OnRemoteSignOut(RemoteSignOutContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnRemoteFailure(RemoteFailureContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnAuthenticationFailed(AuthenticationFailedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnRedirectToIdentityProviderForSignOut(RedirectContext context)
            {
                context.ProtocolMessage.PostLogoutRedirectUri = context.Request.Scheme + "://" + context.Request.Host;
                return Task.FromResult(0);
            }
            private static Task OnAuthorizationCodeReceived(AuthorizationCodeReceivedContext context)
            {
                return Task.FromResult(0);
            }
            private static Task OnMessageReceived(MessageReceivedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnTicketReceived(TicketReceivedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnTokenResponseReceived(TokenResponseReceivedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnTokenValidated(TokenValidatedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnUserInformationReceived(UserInformationReceivedContext context)
            {
                return Task.FromResult(0);
            }
            #endregion
    
            public void ConfigureContainer(ContainerBuilder builder)
            {
                //Autofac 注入
                builder.RegisterInstance(this.Configuration).AsImplementedInterfaces();
    
                //builder.RegisterType<RedisProvider>().As<IRedisProvider>().SingleInstance();
    
                builder.AddUnitOfWork(provider =>
                {
                    provider.Register(new LYM.Data.EntityFramework.ClubUnitOfWorkRegisteration());
                });
    
                builder.RegisterModule<CoreModule>()
                    .RegisterModule<EntityFrameworkModule>();
            }
            // This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
            public void Configure(IApplicationBuilder app, IHostingEnvironment env)
            {
                if (env.IsDevelopment())
                {
                    app.UseDeveloperExceptionPage();
                    app.UseBrowserLink();
                }
                else
                {
                    app.UseExceptionHandler("/Home/Error");
                }
                app.UseAuthentication();
                app.UseStaticFiles();
    
                app.UseIdentityServer();
    
                app.UseMvc(routes =>
                {
                    routes.MapRoute(
                        name: "default",
                        template: "{controller=Home}/{action=Index}/{id?}");
                });
    
    
                // app.UseMvcWithDefaultRoute();
    
    
            }
        }
    auth.liyouming.com

    web.liyouming.com 全部配置

     public class Startup
        {
            public Startup(IConfiguration configuration)
            {
    
                Configuration = configuration;
            }
    
            public IConfiguration Configuration { get; }
    
    
            public void ConfigureServices(IServiceCollection services)
            {
    
                #region 数据库连接
                string customUrl = this.Configuration["Authority"];
                services.AddMvc();
                services.AddOptions();
                services.AddDbContext<CustomContext>(builder =>
                {
                    builder.UseSqlServer(this.Configuration["ConnectionString"], options =>
                    {
                        options.UseRowNumberForPaging();
                        options.MigrationsAssembly("LYM.WebSite");
                    });
                }, ServiceLifetime.Transient);
                #endregion
    
    
                #region 添加授权验证方式 这里是Cookies & OpenId Connect 
                JwtSecurityTokenHandler.DefaultInboundClaimTypeMap.Clear();
                services.AddAuthentication(
                    options =>
                    {
                        options.DefaultScheme = "lym.oauth.cookies";// CookieAuthenticationDefaults.AuthenticationScheme;
                        options.DefaultChallengeScheme = "oidc";
                    }
                    )
                .AddCookie("lym.oauth.cookies", options =>
                {
    
                    options.ExpireTimeSpan = TimeSpan.FromMinutes(60);
                    options.Cookie.Name = "lym.website";
    
                })  //监控浏览器Cookies不难发现有这样一个 .AspNetCore.lym.Cookies 记录了加密的授权信息 
                .AddOpenIdConnect("oidc", options =>
                {
                    options.Authority = customUrl;
                    options.ClientId = "lym.clienttest1";
                    options.ClientSecret = "lym.clienttest";
                    options.RequireHttpsMetadata = false;
                    options.SaveTokens = true;
                    options.ResponseType = "code id_token";
                    //布尔值来设置处理程序是否应该转到用户信息端点检索。额外索赔或不在id_token创建一个身份收到令牌端点。默认为“false”
                    options.GetClaimsFromUserInfoEndpoint = true;
                    options.CallbackPath = new PathString("/oidc/login-callback");
                    options.SignInScheme = "lym.oauth.cookies";
                    options.SignOutScheme = "lym.oauth.cookies";
                    options.RemoteSignOutPath = new PathString("/oidc/front-channel-logout-callback");
                    options.Scope.Add("openid");
                    options.Scope.Add("profile");
                    options.Scope.Add("cloudservices");
                    options.Events = new OpenIdConnectEvents
                    {
                        OnRedirectToIdentityProvider = OnRedirectToIdentityProvider,
                        OnRemoteSignOut = OnRemoteSignOut,
                        OnRemoteFailure = OnRemoteFailure,
                        OnAuthenticationFailed = OnAuthenticationFailed,
                        OnRedirectToIdentityProviderForSignOut = OnRedirectToIdentityProviderForSignOut,
                        OnAuthorizationCodeReceived = OnAuthorizationCodeReceived,
                        OnMessageReceived = OnMessageReceived,
                        OnTicketReceived = OnTicketReceived,
                        OnTokenResponseReceived = OnTokenResponseReceived,
                        OnTokenValidated = OnTokenValidated,
                        OnUserInformationReceived = OnUserInformationReceived
                    };
    
    
                });
                #endregion
    
    
    
                #region Cap配置
    
                //services.AddDbContext<CapApiContext>(builder =>
                //{
                //    builder.UseSqlServer(this.Configuration["CapConnectionString"]);
                //}, ServiceLifetime.Transient);
    
                //services.AddCap(x =>
                //{
                //    //EF实体框架
                //    x.UseEntityFramework<CapApiContext>();
    
                //    // Dapper
                //    // x.UseSqlServer("Your ConnectionStrings");
    
                //    //  RabbitMQ 消息
    
                //    //x.UseRabbitMQ(rabbitMQOption =>
                //    //{
    
                //    //    #region UseRabbitMQ 参数说明
                //    //    //HostName 宿主地址    string localhost
                //    //    //UserName 用户名 string guest
                //    //    //Password 密码  string guest
                //    //    //VirtualHost 虚拟主机    string  /
                //    //    //Port    端口号 int -1
                //    //    //TopicExchangeName CAP默认Exchange名称 string cap.default.topic
                //    //    //RequestedConnectionTimeout RabbitMQ连接超时时间  int 30,000 毫秒
                //    //    //SocketReadTimeout   RabbitMQ消息读取超时时间    int 30,000 毫秒
                //    //    //SocketWriteTimeout  RabbitMQ消息写入超时时间    int 30,000 毫秒
                //    //    //QueueMessageExpires 队列中消息自动删除时间 int(10天) 毫秒 
                //    //    #endregion
                //    //    rabbitMQOption.HostName = "192.168.0.42";
                //    //    //rabbitMQOption.VirtualHost = "/rabbit";
                //    //    //rabbitMQOption.UserName = "lym123";
                //    //    //rabbitMQOption.Password = "lym123";
                //    //    rabbitMQOption.Port = 5672;
                //    //    // rabbitmq options.
                //    //});
    
                //    x.UseRabbitMQ("localhost");
    
                //    // Kafka 消息
                //    // x.UseKafka("localhost:5003");
    
                //    //    执行失败消息时的回调函数,详情见下文        Action<MessageType,string,string>
                //    //x.FailedCallback = null;
                //    //处理消息的线程默认轮询等待时间(秒)        15 秒
                //    x.PollingDelay = 15;
                //    //启动队列中消息的处理器个数    2
                //    x.QueueProcessorCount = 2;
                //    //失败重试次数
                //    x.FailedRetryCount = 3;
                //    //失败重试时间间隔
                //    x.FailedRetryInterval = 15;
    
    
                //});
    
                #endregion
    
            }
            #region  Events事件
            private static Task OnRedirectToIdentityProvider(RedirectContext context)
            {
                if (context.HttpContext.Items.ContainsKey("idp"))
                {
                    var idp = context.HttpContext.Items["idp"];
                    context.ProtocolMessage.AcrValues = "idp:" + idp;
                }
    
                return Task.FromResult(0);
            }
    
            private static Task OnRemoteSignOut(RemoteSignOutContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnRemoteFailure(RemoteFailureContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnAuthenticationFailed(AuthenticationFailedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnRedirectToIdentityProviderForSignOut(RedirectContext context)
            {
                context.ProtocolMessage.PostLogoutRedirectUri = context.Request.Scheme + "://" + context.Request.Host;
                return Task.FromResult(0);
            }
            private static Task OnAuthorizationCodeReceived(AuthorizationCodeReceivedContext context)
            {
                return Task.FromResult(0);
            }
            private static Task OnMessageReceived(MessageReceivedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnTicketReceived(TicketReceivedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnTokenResponseReceived(TokenResponseReceivedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnTokenValidated(TokenValidatedContext context)
            {
                return Task.FromResult(0);
            }
    
            private static Task OnUserInformationReceived(UserInformationReceivedContext context)
            {
                return Task.FromResult(0);
            }
            #endregion
            public void ConfigureContainer(ContainerBuilder builder)
            {
                //Autofac 注入
                builder.RegisterInstance(this.Configuration).AsImplementedInterfaces();
    
                //builder.RegisterType<RedisProvider>().As<IRedisProvider>().SingleInstance();
    
                builder.AddUnitOfWork(provider =>
                {
                    provider.Register(new LYM.Data.EntityFramework.ClubUnitOfWorkRegisteration());
                });
    
                builder.RegisterModule<CoreModule>()
                    .RegisterModule<EntityFrameworkModule>();
            }
    
            public void Configure(IApplicationBuilder app, IHostingEnvironment env)
            {
                if (env.IsDevelopment())
                {
                    app.UseDeveloperExceptionPage();
                    app.UseBrowserLink();
                }
                else
                {
                    app.UseExceptionHandler("/Home/Error");
                }
    
                app.UseStaticFiles();
                app.UseAuthentication();
                app.UseMvc(routes =>
                {
                    routes.MapRoute(
                        name: "default",
                        template: "{controller=Home}/{action=Index}/{id?}");
                });
    
              // app.UseCap(); //Cap配置
            }
        }
    web.liyouming.com

    centos7.0 环境 

     

     SSO登录,SSO退出 搞定

    下面是登录视频演示:

     

    项目目录结构

  • 相关阅读:
    SAX方式解析XML文件实例
    DOM方式解析XML文件实例
    国外程序员整理的Java资源
    研发十大站点
    UMA
    [转]Hadoop YARN任务提交流程
    JAVA的内存模型
    2014年总结
    Storm因机器断电等,启动supervisor异常
    Python几个算法实现
  • 原文地址:https://www.cnblogs.com/liyouming/p/8144387.html
Copyright © 2020-2023  润新知