检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
ObsClient.enums.PermissionRead WRITE A grantee with this permission for a bucket can upload, overwrite, and delete any object in the bucket. This permission is not applicable to objects.
Parent: CORSRule Constraints: None Range: The following HTTP methods are supported: GET PUT HEAD POST DELETE Default value: None AllowedOrigin String Yes Definition: The origin that is allowed to access the bucket.
DELETE: It measures the total number of DELETE requests made for the bucket and the objects in it in the last 30 days. Month-over-month growth It compares the current month's data with the previous month's data, showing the data increase or decrease.
Write A user with this permission can upload objects to a bucket, and can delete and overwrite existing objects in the bucket. Object read Objects in a bucket inherit the read permission configured for the bucket.
If data stored in OBS is no longer used, you can delete it to avoid expenditures. To help make sure your account never falls into arrears, you can configure the Balance Alert on the Overview page of the Billing Center.
Restrictions To delete bucket tags, you must be the bucket owner or have the required permission (obs:bucket:DeleteBucketTagging in IAM or DeleteBucketTagging in a bucket policy).
Restrictions To delete the static website hosting configuration of a bucket, you must be the bucket owner or have the required permission (obs:bucket:DeleteBucketWebsite in IAM or DeleteBucketWebsite in a bucket policy).
Restrictions To delete the CORS configuration of a bucket, you must be the bucket owner or have the required permission (obs:bucket:PutBucketCORS in IAM or PutBucketCORS in a bucket policy).
OBSServiceConfiguration *conf = [[OBSServiceConfiguration alloc] initWithURLString:endPoint credentialProvider:credentialProvider]; // Initialize an instance of OBSClient. client = [[OBSClient alloc] initWithConfiguration:conf]; // Delete a bucket policy.
Restrictions To delete the policy of a bucket, you must be the bucket owner or the bucket owner's IAM user with the required permission (obs:bucket:DeleteBucketPolicy in IAM or DeleteBucketPolicy in a bucket policy).
Restrictions To delete the CORS configuration of a bucket, you must be the bucket owner or have the required permission (obs:bucket:PutBucketCORS in IAM or PutBucketCORS in a bucket policy).
Restrictions To delete bucket tags, you must be the bucket owner or have the required permission (obs:bucket:DeleteBucketTagging in IAM or DeleteBucketTagging in a bucket policy).
' => 'https://your-endpoint' ] ); $resp = $obsClient->setBucketCors ( [ 'Bucket' => 'bucketname', 'CorsRules' => [ [ 'ID' => 'rule1', //Specify the request method, which can be GET, PUT, DELETE
A lifecycle rule cannot delete WORM-protected objects, but can transition their storage class. After an object is no longer protected, it will be deleted when meeting the expiration rule in a lifecycle configuration.
Using APIs Configuring Tags for a Bucket Using SDKs Java Python C Go BrowserJS .NET Android iOS PHP Node.js Related Operations In the tag list, click Edit to change the tag value or click Delete to remove the tag. Parent Topic: Bucket Management
Restrictions To delete the policy of a bucket, you must be the bucket owner or have the required permission (obs:bucket:DeleteBucketPolicy in IAM or DeleteBucketPolicy in a bucket policy).
Public Read/Write: Anyone can read, write, or delete objects in the bucket. Bucket Name test-example-bucket Name of a bucket. After a bucket is created, its name cannot be changed.
Public Read/Write: Anyone can read, write, or delete objects in the bucket. Bucket Name test-example-bucket Name of a bucket. After a bucket is created, its name cannot be changed.
Public Read/Write: Anyone can read, write, or delete objects in the bucket. Bucket Name test-example-bucket Name of a bucket. After a bucket is created, its name cannot be changed.
Users of department A fail to download or delete any object from the bucket of department A. Users of department A fail to download or delete any object from the bucket of department B. If the preceding requirements are met, the permission configuration is successful.