External provider source code analysis - main processing logic analysis
summary
Next, we will analyze the source code of the external provider component.
Based on tag v1 six
https://github.com/kubernetes-csi/external-provisioner/releases/tag/v1.6.0
RBD usage analysis combined with CEPH CSI
Introduction to the role of external provider
(1) When creating pvc, the external provider participates in the creation o ...
Added by sweetstuff2003 on Tue, 08 Mar 2022 23:17:42 +0200
django rest framework version, parser and source code analysis of python Django
1, rest framework version introduction
In the previous article, we introduced three authentication functions of the rest framework, perform_ Authentication, permissions and throttles, which are inherited from the View method through APIView and reflected by the dispatch method through initialize_ The request method encapsulates a request(R ...
Added by Kano on Fri, 04 Mar 2022 20:58:08 +0200
mybatis framework: first and second level cache
The previous article mentioned that the cache will be used when querying. Its built-in two-level cache is as follows:// The L1 cache is bound to sqlsession in the executor
// org.apache.ibatis.executor.BaseExecutor#localCache
// Point to org apache. ibatis. cache. impl. PerpetualCache#cache
private Map<Object, Object> cache = new HashMap& ...
Added by ceemac on Tue, 01 Mar 2022 13:04:40 +0200
OKio source code analysis
Okio article reading and writing timeout detection mechanism. Firstly, it will introduce several important classes in okio, and then provide a code for reading and writing files with Okio api. According to this code, it will analyze the overall reading and writing process, and analyze why okio is more efficient than using Java io directly. Fina ...
Added by blackmamba on Mon, 28 Feb 2022 08:06:06 +0200
Glide's caching mechanism
Glide's cache is divided into two modules, one is memory cache and the other is hard disk cache.
The function of memory cache is to prevent duplicate data from being read;
The function of hard disk cache is to prevent applications from repeatedly downloading and reading data from the network or other places.
Cache Key of Glide
The code that ...
Added by davidprogramer on Sun, 27 Feb 2022 23:38:07 +0200
HashMap source code analysis + interview questions, based on jdk1 8 line by line analysis, this is enough for the interview!
Before reading this article, it is recommended to read the blogger's article on red black tree, which describes the evolution from binary sort tree → AVL tree → red black tree. Transmission address: Quick understanding of red and black trees
HashMap source code analysis + interview questions
1, Hash introduction
Core theory
...
Added by lingo5 on Sun, 20 Feb 2022 08:43:57 +0200
CEPH CSI source code analysis RBD driver controller server analysis
Kubernetes CEPH CSI analysis directory navigation
CEPH CSI source code analysis (4) - RBD driver controller server analysis
When the driver type specified when the CEPH CSI component is started is rbd, the services related to rbd driver will be started. Then, according to the parameter configuration of controllerserver and nodeserver, decide ...
Added by Sharif on Sun, 20 Feb 2022 01:44:50 +0200
HashSet source code analysis, based on jdk1 8 detailed analysis
Before reading this article, it is recommended to read the blogger's article on HashMap: HashMap source code analysis + interview questions
HashSet source code analysis
1, Basic introduction
The underlying implementation is based on HashMap, so it is not guaranteed to iterate according to the insertion order or other order The time-con ...
Added by finkrattaz on Fri, 18 Feb 2022 21:28:44 +0200
CEPH CSI source code analysis RBD driver nodeserver analysis
Kubernetes CEPH CSI analysis directory navigation
CEPH CSI source code analysis (6) - RBD driver nodeserver analysis (Part 2)
When the driver type specified when the CEPH CSI component is started is rbd, the services related to rbd driver will be started. Then, according to the parameter configuration of controllerserver and nodeserver, decid ...
Added by zak on Thu, 17 Feb 2022 13:39:54 +0200
"Spring Aop" source code analysis 4: Aop source code analysis
As we all know, all aspects of AOP must be through the creation of agents (you should listen to all the basic concepts of AOP, so I won't repeat them here). But then the problem arises. We have analyzed the parsing and creation of ordinary bean s. Where does AOP create proxy objects and how to match tangent points. This article also focuses on ...
Added by spheonix on Sat, 12 Feb 2022 04:49:25 +0200