-
Utilizing diverse technology stacks: By integrating various technologies such as app development, backend, and databases, the process of completing a project allows for the enhancement of skills in using and integrating diverse technology stacks.
-
Implementing comment and social features: I created this to experience the integration work between backend and frontend by implementing social features such as comments, likes, and shares that promote user interaction.
-
Practicing security and permission management: I created this project, similar to Instagram, to gain an understanding of user authentication, permission granting, and data security aspects, as part of practicing security and authorization management.
-
We are going to create social media by referring to Instagram.
-
Implementation pictures
- Sign up
- Login
- Create post
-
SwiftUI:
-
Springboot:
-
Mysql: We used MySQL to store user information.
-
Tomcat Server:
-
AWS: EC2,Route53,S3
-
Other Materials:
- 2023.12.15: We have implemented the Instagram UI
- 2023.12.24: We have looked into creating posts
- 2024.01.06: We have implemented user registration
- 2024.01.15: We have implemented login functionality.
- 2024.01.25: We have modified the user registration form(userid, password, key1, birthdate, fullName, profeilePicture)
- 2024.02.11: We updated the post_create.
- 2024.02.26: We have added a part to edit the post.
1. Token Implementation
- The reason for implementing tokens: Token-based registration is utilized to enhance authentication and security, facilitate stateless architecture, separate infrastructure components, improve user experience, and enable consistent authentication across applications.
1-2. Direct Implementation of Login and Sign-up Functionality
-
The reason for directly implementing the login and sign-up functionalities: I opted to implement the login and sign-up functionalities directly, without relying on frameworks like Spring Security, to deepen my understanding of the underlying concepts and operational principles.
-
By exploring various security and authentication techniques firsthand, I aimed to broaden my understanding of different technologies, contributing to making better decisions regarding technology stacks.