Most important Design Principles in a row Single Responsibility principle Open Closed principle Liskov Substitution principle Interface Segregation principle Dependency Inversion principle YAGNI DRY
To configure proxy for a Vagrant host: 1. put the following configuration in the Vagrant file authenticating proxy: Not replace the following keywordt with the real data: USERNAME PASSWORD PROXYADDRESS PROXYPORT Ex: vagrantuser/vagrantpassword@vagranthost:8080 2: restart the host or alternatively, execute “vagrant provision” This configuration creates a new file in the “/etc/apt/apt.conf.d” directory with the name: … More Vagrant machine proxy configuration
A short explanation and usage of Annotations General rules: @ sign at the front of interface keyword Method declarations defines annotation elements Return types are: String, Enum, Class, Annotation, primitive and Arrays of these types Methods can have default falues usage : Annotation sorts: 1. Marker annotation : these type annotations have no … More Java Annotations in Short
Username and passwords can be extracted from the Service Accounts. Following function extracts the data from the service account: The UsernamePasswordCredential element contains username and unencrypted password: Thus step 1: put the result of the “bea:lookupBasicCredentials” function call in a variable (ex: useraccount) in an assing action step 2: you can use it as: $useraccount/con:username/text() … More Using Service Accounts for Authentication and Authorisation in OSB
Standaard thread dump analyser tools are not good enough to analyse the thread dumps of OSB. The Project Kenai tool ThreadLogic can be very usefull for analysing OSB stuck threads. The project URL is: https://java.net/projects/threadlogic OSB shows most of the time not enough information about the stuck threads. Adding workmanagers to Business Services en Proxy … More ThreadLogic – Oracle Service Bus Threaddump analyser
Dynamic proxying is used widely in the frameworks, so a basic understanding of the implementation can be helpfull to use those frameworks. Of course, there can be a situation where a dynamic proxy implementation can be a good choice. Here a simple example of a dynamic proxy implementation using Java 8 If … More Java Dynamic Proxy
The timezone of de date or dateTime element in OSB using XPATH can be translated as:
Following methods are the best practices to design stable systems in complex environment. There are of course much more patterns but these are particularly the patterns I have used on my projects. – Decoupling: Software should be built in independent modules. Microservices is a very good way of decoupling. This pattern makes it possible to … More Best practices for Stable Enterprise Software Design
Interceptor example in Java EE to enable the interceptor, either add an element to beans.xml like: or add a Priority annotaion Interceptors enabled using @Priority are called before interceptors enabled using beans.xml, the lower priority values are called first.
Decorator example in Java EE to enable the decorator, either add an xml element in de beans xml or add a priority to the code Decorators enabled using @Priority are called before decorators enabled using beans.xml, the lower priority values are called first.