Skip to content

Commit d995e64

Browse files
author
Bharathi Ramana Joshi
committed
Add java concurrency & oauth, update k8s
1 parent 5b4fee7 commit d995e64

File tree

3 files changed

+129
-3
lines changed

3 files changed

+129
-3
lines changed

java-concurrency.md

+80
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
# Chapter 2
2+
- Re-entrant lock: same thread can acquire same lock any number of times (e.g.
3+
subclass first acquires it and calls superclass method which again acquires).
4+
- Every java reference can be used as a lock via the `synchronized` block.
5+
6+
# Chapter 3
7+
- The compiler can reorder memory management instructions causing *visibility*
8+
issues: changes made to shared memory by one thread are not visible to other
9+
threads.
10+
- Visibility can happen due to objects being stored in cache etc.
11+
- `volatile` keyword can be used to mark a reference as being used by multiple
12+
threads and disable caching, forcing the JVM to load the object each time.
13+
- The most common use for volatile variables is as a completion, interruption,
14+
or status flag.
15+
- Use volatile variables iff:
16+
1. Writes to variable does not depend on current value
17+
2. Variable does not participate in invariants with other state variables
18+
3. Locking is not required for any other reason while variable is being
19+
accessed
20+
- Semantics of volatile variable are not strong enough to make increment
21+
operator ++ atomic.
22+
- Out-of-thin-air safety: a shared variable read by a thread will have a value
23+
written to it by some other thread (and not some garbage value). Only
24+
exception is non-volatile 64-bit numbers (long/double).
25+
- Publishing an object: making it available to code outside of its current
26+
scope.
27+
- Publishing an object should be done in a thread-safe, synchronized manner.
28+
Otherwise an incompletely constructed object may get published.
29+
- Any object reachable from a published object by following some chain of
30+
nonprivate field references and method calls has also been published.
31+
- Alien method of a class C is any method whose behaviour is not fully
32+
specified by C. E.g. methods in other class instances of C are passed to and
33+
overrideable methods in C.
34+
- (anonymous) inner classes also capture the reference to containing superclass
35+
and can publish the object.
36+
- Publishing an object from within its constructor can publish an incompletely
37+
constructed object.
38+
39+
# Chapter 5
40+
- Collections like `Map`, `List`, etc would require threads to lock entire
41+
collection to ensure correctness with concurrent access.
42+
- `ConcurrentModificationException`: an unchecked exception thrown when a
43+
collection that is being read (via an iterator) is changed concurrently by
44+
some other thread.
45+
- `ConcurrentModificationException` is a good faith exception meaning best
46+
effort is made to throw it, but no guarantee that it will thrown upon a
47+
concurrent modification.
48+
- Hidden iterators like `println("Set = " + set)` can also throw
49+
`ConcurrentModificationException` since above code gets translated to a call
50+
to an iteration of the set.
51+
- `ConcurrentHashMap`:
52+
+ arbitrary number of readers
53+
+ limited number of writers
54+
+ low performance penality on single core
55+
+ weakly consistent (approximately correct): iterator may or may not reflect
56+
concurrent updates
57+
+ `size` and `isEmpty` are approximate
58+
+ only when application needs to lock Map for exclusive access the
59+
ConcurrentHashMap is not correct replacement
60+
- Copy-on-write collection
61+
- `BlockingQueue`: blocks threads on queue underflow and overflow.
62+
- Implementations of `BlockingQueue`:
63+
+ LinkedBlockingQueue
64+
+ ArrayBlockingQueue
65+
+ PriorityBlockingQueue
66+
+ SynchronousQueue: queue of threads, consumer should always be ready to
67+
participate in hand-off from producer; otherwise producer will block
68+
- Work stealing pattern: consumers can consume from other consumer's queue
69+
- Deque: double eneded queue used for work stealing pattern
70+
- `CountDownLatch`: `await` and `countDown`
71+
- `Semaphore`: `acquire` and `release`. Fair if FIFO is followed in granting
72+
the permits.
73+
74+
# Chapter 6
75+
- Executor: separates task submission from task execution.
76+
- RejectedExecutionException: exception thrown when a task submitted to an
77+
executor is not run.
78+
79+
# Chapter 14
80+
- Use `wait`, `notify`, `notifyAll` on any `Object` for conditional variables.

k8s.md

+9-3
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
* Fault tolerance
1616
- Manifest: initial configuration.
1717
- Cluster -> Node -> Pod -> Container -> Application/microservice.
18-
- Pod: abstraction over containers to proivde a uniform communication interface
18+
- Pod: abstraction over containers to provide a uniform communication interface
1919
irrespective of underlying container (may be docker or something else).
2020
- Node: physical server/VM on which pods are running.
2121
- Each pod is assigned an IP address, not each container in the pod.
@@ -25,14 +25,20 @@
2525
- 1 control plane / master
2626
- kube-API server: interface to interact with master.
2727
- etcd: highly available key-value store for shared configuration, service
28-
discovey, and scheduler coordination.
28+
discovery, and scheduler coordination.
2929
- kube-scheduler: handles pod creation and management, match/assign any node to
3030
create and run pods.
3131
- Controller/manager: responsible for node detection, setting up network
3232
routes, setting up load balancers, volumne management
3333
- Components of a node:
3434
* Kubelet: agent running on each node that communicates with master via API
3535
server. Runs on port 10255.
36-
* Container engine: docker etc. Exposing containers on port specified in
36+
* Container engine/runtime: docker etc. Exposing containers on port specified in
3737
manifest.
3838
* Kube-proxy: assigns an IP address to each pod.
39+
- Deployment: manages a set of Pods to run an application workload, usually one
40+
that doesn't maintain state. A Deployment provides declarative updates for
41+
Pods and ReplicaSets. You describe a desired state in a Deployment, and the
42+
Deployment Controller changes the actual state to the desired state at a
43+
controlled rate
44+
-

oauth.md

+40
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
- OAuth is about authorization, NOT authentication
2+
- OAuth concepts:
3+
* Resource owner
4+
* Resource server
5+
* Grant type: process used to request and grant authorization
6+
* Scope: permission that is being requested (read-write access, profile access, etc)
7+
* Auth server: where grant type and scope are sent for authorization
8+
* Token: string on successful authorization
9+
* Claims: details on authorization granted
10+
- OAuth core
11+
* authorize endpoint: used by end user (resource owner) to grant permission
12+
for application to access resource. Returns authorization code or access code
13+
* token endpoint: used by application to trade authorization code for an
14+
access token
15+
- Optional endpoints:
16+
* userinfo (OpenID core connect)
17+
* discovery: gives all URLs and capabilities of OAuth server
18+
* introspect: get token status
19+
* revoke: used to deactivate a token
20+
- Grant type decision tree:
21+
1. For a user? No => Client Credential Grant Type
22+
2. Browser available? No => Device Grant Type
23+
3. Server-side only? No => Implicit grant type/Authorization code flow with PKCE
24+
Yes => Authorization code flow
25+
- OAuth scope: CRUD or more complicted; scopes are the permissions that we
26+
request not the endpoints that we use.
27+
- E.g. GitHub scopes: repo, public_repo, repo_deployment, repo:invite, etc
28+
- Some other examples: Google scope, okta
29+
- Some types of tokens :
30+
* Access (Core RFC 6749)
31+
* Refresh (Core RFC 6749)
32+
* ID (OpenID connect). JSON Web Token (JWT).
33+
- JWTs need validating.
34+
- Every JWT is made of 3 parts:
35+
* Header (algorithm used to sign)
36+
* Payload (key-value pairs called claims)
37+
* Signature (authentication)
38+
- Do not store sensitive information in JWTs
39+
- Authorization Code Flow:
40+
*

0 commit comments

Comments
 (0)