As 《ASP.NET Core 3 The framework reveals 》 Upgraded version ,《ASP.NET Core 6 The framework reveals 》 Not only for ASP.NET Core 6 Has been revised , And added some contents that were not originally included . about ASP.NET Core Frame speaking , The core is the construction of middleware pipeline , This is also 《ASP.NET Core 6 The framework reveals 》 The core content , Now this part is close to 200 The content of the page is published as a sample chapter , I hope it can help you better understand ASP.NET Core The nature of the frame . Scan the QR code below and download or read it through Baidu online disk , Other download or reading channels : Baidu SkyDrive OneDrive( You can browse directly ) Blog Garden

The first 1 Chapter Programming experience

Although the readers of this book are mostly .NET Core The developer of the , about .NET Core And ASP.NET Core The basic programming mode of is also very familiar , But when we upgrade to .NET 6, Many things have changed . Many features have been added , Some existing programming methods have also been improved , Some are even no longer recommended . In especial ASP.NET Core 6 To launch the Minimal API Application hosting makes the program extremely simple , Therefore, all demonstration examples in this book will adopt this programming mode . This chapter provides 20 A minimalist example , They can help readers understand ASP.NET Core Have a general understanding of the basic programming mode of .

The first 14 Chapter Service bearing

With the help of .NET The services provided bear (Hosting) System , We can host or host one or more long-running background services in the created application . Any operation that needs to run in the background for a long time can be defined as a standardized service and carried by the system ,ASP.NET Finally, the application is also embodied as such a bearer service . This chapter mainly introduces “ generalization ” Service bearer system , It won't involve anything about ASP.NET The content of .

The first 15 Chapter Application hosting ( Part 1 )

ASP.NET Core It's a Web Development platform , Instead of a simple development framework . This is because ASP.NET Core Designed to provide a highly extensible request processing pipeline . We can use the customization of pipeline to build a development framework with different programming modes . Because this part is the core of this book , So it's divided into 3 Chapter ( The first 15~17 Chapter ) Give a comprehensive introduction to the request processing pipeline .

The first 16 Chapter Application hosting ( medium-length )

“ The first 15 Chapter   Application hosting ( On )” A series of examples are used to demonstrate ASP.NET Core Applied programming mode , And take this to experience the pipeline based request processing process . This pipeline is composed of a server and a number of ordered middleware , It seems simple , Many details are actually hidden . Set the pipe to ASP.NET Core The status of the framework cannot be raised too high , In order to make readers have a deep understanding of this , Before introducing the construction of real pipelines , Let's introduce a Mini Version of ASP.NET Core frame .

The first 17 Chapter Application hosting ( The next part )

stay “ The first 16 Chapter   Application hosting ( in )” in , We simulated with very little code ASP.NET Core Implementation of framework , This is equivalent to building a “ skeleton ”, Now we will leave the rest “ muscles ” Fill up , Restore a complete framework . This chapter mainly introduces the construction process of real pipelines and the principle of application bearing , as well as Minimal API Behind the scenes “ The story “.

《ASP.NET Core 6 The framework reveals 》 Sample seal [200 page /5 Chapter ] More articles about

  1. 《ASP.NET Core 3 The framework reveals 》5 Discount and pre-sale and sample seal release

    <ASP.NET Core 3 The framework reveals > Jd.com officially began pre-sale yesterday afternoon , And sold nearly 1000 sets in half a day . To give back to the reader , The publishing house talked with JD 5 Discount price . meanwhile , I take the core content of this book as a sample chapter (3 Chapter ) ...

  2. [ASP.NET Core 3 The framework reveals ] Dependency injection : Inversion of control

    ASP.NET Core The framework is based on some core infrastructure , These basic frameworks include dependency injection . file system . Configuration options and diagnostic logs etc . These frameworks are more than just supports ASP.NET Core Foundation of framework , We do the same when developing applications ...

  3. [ASP.NET Core 3 The framework reveals ] Dependency injection [5]: Using containers to provide services

    It's no exaggeration to say , Whole ASP.NET Core The framework is based on the dependency injection framework .ASP.NET Core The application builds the pipeline at startup and the service objects used in processing each request from the dependency injection container . The dependency injection capacity ...

  4. [ASP.NET Core 3 The framework reveals ] To configure [6]: Diversified configuration sources [ Part 1 ]

    .NET Core One of the main features of this new configuration model is the support for a variety of different configuration sources . We can put the memory variable . Command line arguments . Environment variables and physical files are used as the source of the original configuration data . If the physical file is used as the configuration source , We can choose ...

  5. [ASP.NET Core 3 The framework reveals ] Options[2]: How to use configuration options correctly [ The next part ]

    Four . Direct initialization Options object The examples demonstrated above share a common feature , That is to say, the configuration system is used to provide binding Options The original data of the object , actually ,Options The framework has a completely independent model , Can be called Options ...

  6. 《ASP.NET Core 3 The framework reveals 》 Readership , Welcome to join

    As a 17 Year of .NET developer , I can't understand one thing in particular : Our computer book market is full of a series of introductions ASP.NET Web Forms.ASP.NET MVC.ASP.NET Web API Books , But I can't find ...

  7. ASP.NET Core 6 Framework unveiling example demonstration [01]: Programming experience

    As <ASP.NET Core 3 The framework reveals > Upgraded version ,<ASP.NET Core 6 The framework reveals > There are many new chapters , At the same time, make a lot of modifications to the existing content . Although this book aims at ASP.NET ...

  8. ASP.NET Core 6 Framework unveiling example demonstration [06]: Dependency injection framework design details

    Because dependency injection plays an important role , therefore <ASP.NET Core 6 The framework reveals > Most of the chapters in will cover this topic . This book 3 Chapter pairs .NET The design and implementation of native dependency injection framework are systematically introduced , Some of them ...

  9. ASP.NET Core 6 The framework reveals - Example Demo [ Ongoing update &hellip;]

    As <ASP.NET Core 3 The framework reveals > Upgraded version ,<ASP.NET Core 6 The framework reveals > There are many new chapters , At the same time, make a lot of modifications to the existing content . Although this book aims at ASP.NET ...

  10. ASP.NET Core 6 Framework unveiling example demonstration [10]:Options Basic programming mode

    Dependency injection enables us to define dependent functions as services , Finally, it is injected into the component or service consuming the function in a loose coupling form . In addition to consuming services carrying certain functions in the form of dependency injection , You can also consume the data carrying configuration data in the same way Options Yes ...

Random recommendation

  1. Atitit. Security program planning and design 4gm &#160;v1 q928

    Atitit. Security program planning and design 4gm  v1 q928 1. Security architecture design and functional security detection 1 2. https1 3. Account security system 1 4. Profile security  1 5. Source code encryption and security 2 6. The highest intensity ...

  2. hdoj 1872 Stable sequencing

    Stable sequencing Time Limit: 3000/1000 MS (Java/Others)    Memory Limit: 32768/32768 K (Java/Others)Total Submis ...

  3. Linux Kernel Null pointer reverse reference denial of Service Vulnerability

    Vulnerability name : Linux Kernel Null pointer reverse reference denial of Service Vulnerability CNNVD Number : CNNVD-201306-449 Release time : 2013-07-01 Update time : 2013-07-01 Hazard rating :   ...

  4. Principal component analysis R Language

    Principal component analysis (Principal Component Analysis,PCA), It's a statistical method . Through orthogonal transformation, a set of variables that may be correlated are transformed into a set of linear uncorrelated variables , The transformed set of variables is called principal component . principle : ...

  5. Synchronized Usage of

    synchronized yes Java Keywords in , It's a kind of synchrolock . It decorates the following objects : 1. Modifies a block of code , The decorated block of code is called the synchronized statement block , The scope of its action is curly braces {} Enclosed code , The object is to call this code ...

  6. Spring And BeanFactory( turn )

    BeanFactory yes Spring Of “ The heart ”. It is Spring IoC The true face of the container . Spring Use BeanFactory To instantiate . Configure and manage Bean. however , In most cases we don't use it directly Bean ...

  7. C# in DataGridView Yes XML Use of documents

    Just add one form DataGridView Control is OK . For a detailed explanation, please refer to the document in the previous article that draws lessons from the blog Garden of the end of the song and the end of the people . XML The document code is as follows :test.xml <?xml version="1.0& ...

  8. KiCad EDA Best practices for schematic Libraries

    KiCad EDA Best practices for schematic Libraries Because of Alias Alias component , You don't have to have one. Every component has one . Recommend a component library for each component type . because Value and The component name is the same , So the component name should be as simple as possible ...

  9. C Language Voting system : Given the candidate , Enter the name of the candidate from the keyboard , Count the votes , And output the final winner

    Voting system : Given the list of candidates , Enter the name of the candidate from the keyboard , Count the votes , And output the final winner . If the name entered by the voter is not on the candidate list , The number of votes is invalid . // Kaluga Gio - Blog Garden  http://www.cnblogs.com ...

  10. Hibernate Series of ID Generation strategy

    One . summary hibernate There are two ways to implement the primary key generation strategy , Namely XML Generate id And annotation methods (@GeneratedValue), Here is a summary one by one . Two .XML Configuration method This way is in XX.hbm.xml writing ...