go language learning -- > basic grammar
Basic syntax of golang
1. Naming rules
All naming of function name, variable name, constant name, type name, statement label and package name in go language follow a simple naming rule Must be with a letter or underscore_ Start with any number of letters, numbers, or underscores Upper and lower case letters are considered different in go ...
Posted by scoppc on Wed, 15 Dec 2021 09:53:23 +0100
Implementing distributed locks with Go + Redis
Why do I need distributed locksUser ordersLock uid to prevent repeated orders.Inventory deductionLock inventory to prevent oversold.Balance deductionLock the account to prevent concurrent operations.When sharing the same resource in a distributed system, distributed locks are often needed to ensure the consistency of change resources.Distribute ...
Posted by Solarpitch on Wed, 15 Dec 2021 04:29:34 +0100
Go -- operation, process control (if, for, switch, goto, defer) exception mechanism (panic, recover)
V Arithmetic operation
Logic and
0 && 0 =1
1 && 1 =1
1 && 0 =0
Logical or
0 || 0 =0
0 || 1 =1
1 || 0 =1
1 || 1 =1
Relational operation: the result is also true and false
Arithmetic operator
+ ,- ,* ,/ ,%
Self increment: + +, which can only be used for variables and can only be placed later Self ...
Posted by amazinggrace1983 on Wed, 15 Dec 2021 00:35:34 +0100
[Go synchronization primitive]
In Go language, there are not only easy-to-use and advanced synchronization mechanisms such as channel, but also sync Mutex ,sync.WaitGroup and others compare the original synchronization mechanism. Through them, we can more flexibly control data synchronization and multi process concurrency.
Resource competition
In a goroutine, if the alloca ...
Posted by avario on Tue, 14 Dec 2021 03:34:01 +0100
Implementing distributed locks with Go + Redis
Why do I need distributed locks
User orders
Lock uid to prevent repeated orders.
Inventory deduction
Lock inventory to prevent oversold.
Balance deduction
Lock the account to prevent concurrent operations. When sharing the same resource in a distributed system, distributed locks are often needed to ensure the consistency of ...
Posted by herrin on Tue, 14 Dec 2021 03:26:53 +0100
Go execution script command use case and source code analysis
brief introduction
In development, we may encounter the need to invoke scripts in the program, or involve the interaction between two languages. The author met the need to call Python in go before, and then applied the go-python3 Library in the code. Actually, calling the script of Python in go is also a solution. This article will introduce ...
Posted by yanti on Sun, 12 Dec 2021 11:47:39 +0100
Read the usage scenario of Go anonymous structure
prefaceAnonymous behavior is very common in go language, such as:Anonymous function: that is, what we know as closureAnonymous fields in structureAnonymous structuresThe design of anonymous behavior brings some difficulties in understanding, but after you are familiar with the use of anonymous design, you will find that anonymous design can hel ...
Posted by Paul Moran on Sat, 11 Dec 2021 10:03:02 +0100
go series - string underlying implementation
String
The go standard library builtin defines all built-in types. The source code is located in Src / builtin / builtin go
string is a collection of 8-bit bytesUsually, but not necessarily, UTF-8 encoded text.In addition, two important points were mentioned:
string can be null (length 0), but not nilstring object cannot be modified ...
Posted by robinjohn on Sat, 11 Dec 2021 04:21:11 +0100
Go language learning checking and patching Day7
Author: Regan YueSource: Hang Seng LIGHT cloud communityGo language learning checking and patching Day7Zero. PrefaceBecause I have a weak foundation, I often encounter a lot of confused problems when using Go language, so I am determined to check and fill in the gaps in Go language. This [Go language checking and filling in] series is mainly to ...
Posted by SupaMonkey on Fri, 10 Dec 2021 02:57:39 +0100
Deeply analyze the principle and application of go bit operation and bit mask
As a non professional self-taught wild programmer, it's really silly to just come into contact with bit operation, but it's not so mysterious after being familiar with it. It's often used when watching some excellent open source projects or custom network protocol encapsulation. Recently, I saw a good article on bit operation by foreigners. So ...
Posted by osti on Fri, 10 Dec 2021 02:44:23 +0100