Devlive 开源社区 本次搜索耗时 0.629 秒,为您找到 208 个相关结果.
  • CosFile

    Description Key Features Options path [string] bucket [string] secret_id [string] secret_key [string] region [string] custom_filename [boolean] file_name_expression [string...
  • Java Custom Catalog

    4276 2024-06-29 《Apache Iceberg 1.5.2》
    Custom table operations implementation Custom file IO implementation Custom location provider implementation Custom IcebergSource It’s possible to read an iceberg table either...
  • OssJindoFile

    Description Key features Options path [string] bucket [string] access_key [string] access_secret [string] endpoint [string] custom_filename [boolean] file_name_expression [...
  • GitHub 趋势日报 (2025年05月24日)

    📈 今日整体趋势 Top 10 📊 分语言趋势 Top 5 Go Ruby C++ Rust Java Python Vim Script C TypeScript Swift C MDX Shell Jupyter Notebook PHP JavaScript Dart Markdown PowerShell HT...
  • Installation

    4190 2024-06-03 《Docusaurus 1.14.7》
    Installing Docusaurus Verifying Installation Running the example website Launching the server behind a proxy Updating Your Docusaurus Version Docusaurus was designed from the...
  • Introduction

    4178 2024-05-20 《Apache Answer 1.3.0》
    Features Streamlined Q&A Experience Hassle-free Community Management Cultivate a Thriving Community Customization and Plugins Privacy and Security More Apache Answer helps ...
  • Objects

    4176 2024-05-25 《Lodash 2.4.2》
    _.assign(object, [source], [callback], [thisArg]) Aliases Arguments Returns Example _.clone(value, [isDeep=false], [callback], [thisArg]) Arguments Returns Example _.clone...
  • Pulsar

    Support Those Engines Key features Description Supported DataSource Info Sink Options Parameter Interpretation client.service-url [String] admin.service-url [String] auth.pl...
  • JDOQL

    4071 2024-05-25 《Apache JDO 3.2.1》
    JDOQL Single-String JDOQL Accessing Fields Data types : literals Operators precedence Concatenation Expressions Example 1 - Use of Explicit Parameters Example 2 - Use of Impl...
  • 1. Authentication

    Kyuubi Authentication Mechanism Using KERBEROS Kyuubi Authentication Mechanism In a secure cluster, services should be able to identify and authenticate callers. As the ...