Previously: Recently in the Learning Dependency injection (Dependency injection) model, saw Martin Fowler's article (Original: https://martinfowler.com/articles/injection.html)
Example uses a Picocontainer container example, and then went to the Internet to find the container source code is a jar package, the rogue can only reverse the compiler.
Required Toolset:
Eclipse 4.2
Jadclipse (Extract code: 3FVD)
Installation steps:
1. Copy the Net.sf.jadclipse_3.3.0.jar to the plugins directory of Eclipse, set the executable path of jad and the resulting temporary file as shown in:
2, set *. class file type is open by default, click the Add Add button under Associate Editors bar, add jadclipse Class Files Viewer and set as default,
View the package source code method, load the jar package and navigate to the left package name and press F3.
Specific details can also refer to another article: https://www.cnblogs.com/xxyfhjl/p/5836060.html
Reprint: https://www.cnblogs.com/gy1010/p/6781520.html
Eclipse Anti-Compile plugin jadclipse installation tutorial