External provider source code analysis - main processing logic analysis

summary Next, we will analyze the source code of the external provider component. Based on tag v1 six https://github.com/kubernetes-csi/external-provisioner/releases/tag/v1.6.0 RBD usage analysis combined with CEPH CSI Introduction to the role of external provider (1) When creating pvc, the external provider participates in the creation o ...

Added by sweetstuff2003 on Tue, 08 Mar 2022 23:17:42 +0200

django rest framework version, parser and source code analysis of python Django

1, rest framework version introduction In the previous article, we introduced three authentication functions of the rest framework, perform_ Authentication, permissions and throttles, which are inherited from the View method through APIView and reflected by the dispatch method through initialize_ The request method encapsulates a request(R ...

Added by Kano on Fri, 04 Mar 2022 20:58:08 +0200

mybatis framework: first and second level cache

The previous article mentioned that the cache will be used when querying. Its built-in two-level cache is as follows:// The L1 cache is bound to sqlsession in the executor // org.apache.ibatis.executor.BaseExecutor#localCache // Point to org apache. ibatis. cache. impl. PerpetualCache#cache private Map<Object, Object> cache = new HashMap& ...

Added by ceemac on Tue, 01 Mar 2022 13:04:40 +0200

OKio source code analysis

Okio article reading and writing timeout detection mechanism. Firstly, it will introduce several important classes in okio, and then provide a code for reading and writing files with Okio api. According to this code, it will analyze the overall reading and writing process, and analyze why okio is more efficient than using Java io directly. Fina ...

Added by blackmamba on Mon, 28 Feb 2022 08:06:06 +0200

Glide's caching mechanism

Glide's cache is divided into two modules, one is memory cache and the other is hard disk cache. The function of memory cache is to prevent duplicate data from being read; The function of hard disk cache is to prevent applications from repeatedly downloading and reading data from the network or other places. Cache Key of Glide The code that ...

Added by davidprogramer on Sun, 27 Feb 2022 23:38:07 +0200

HashMap source code analysis + interview questions, based on jdk1 8 line by line analysis, this is enough for the interview!

Before reading this article, it is recommended to read the blogger's article on red black tree, which describes the evolution from binary sort tree → AVL tree → red black tree. Transmission address: Quick understanding of red and black trees HashMap source code analysis + interview questions 1, Hash introduction Core theory ...

Added by lingo5 on Sun, 20 Feb 2022 08:43:57 +0200

CEPH CSI source code analysis RBD driver controller server analysis

Kubernetes CEPH CSI analysis directory navigation CEPH CSI source code analysis (4) - RBD driver controller server analysis When the driver type specified when the CEPH CSI component is started is rbd, the services related to rbd driver will be started. Then, according to the parameter configuration of controllerserver and nodeserver, decide ...

Added by Sharif on Sun, 20 Feb 2022 01:44:50 +0200

HashSet source code analysis, based on jdk1 8 detailed analysis

Before reading this article, it is recommended to read the blogger's article on HashMap: HashMap source code analysis + interview questions HashSet source code analysis 1, Basic introduction The underlying implementation is based on HashMap, so it is not guaranteed to iterate according to the insertion order or other order The time-con ...

Added by finkrattaz on Fri, 18 Feb 2022 21:28:44 +0200

CEPH CSI source code analysis RBD driver nodeserver analysis

Kubernetes CEPH CSI analysis directory navigation CEPH CSI source code analysis (6) - RBD driver nodeserver analysis (Part 2) When the driver type specified when the CEPH CSI component is started is rbd, the services related to rbd driver will be started. Then, according to the parameter configuration of controllerserver and nodeserver, decid ...

Added by zak on Thu, 17 Feb 2022 13:39:54 +0200

"Spring Aop" source code analysis 4: Aop source code analysis

As we all know, all aspects of AOP must be through the creation of agents (you should listen to all the basic concepts of AOP, so I won't repeat them here). But then the problem arises. We have analyzed the parsing and creation of ordinary bean s. Where does AOP create proxy objects and how to match tangent points. This article also focuses on ...

Added by spheonix on Sat, 12 Feb 2022 04:49:25 +0200