检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
OBSSetBucketCORSRequest *request = [[OBSSetBucketCORSRequest alloc] initWithBucketName:@"bucketname"]; OBSCORSRule* rule = [OBSCORSRule new]; // Specify the request method, which can be GET, PUT, DELETE, POST, or HEAD. rule.allowedMethodList = @[OBSCORSHTTPGET,OBSCORSHTTPPUT,OBSCORSHTTPPOST
OBSSetBucketCORSRequest *request = [[OBSSetBucketCORSRequest alloc] initWithBucketName:@"bucketname"]; OBSCORSRule* rule = [OBSCORSRule new]; // Specify the request method, which can be GET, PUT, DELETE, POST, or HEAD. rule.allowedMethodList = @[OBSCORSHTTPGET,OBSCORSHTTPPUT,OBSCORSHTTPPOST
If an Archive object is being restored, you cannot suspend or delete the restore task. Objects in the Restoring state cannot be restored again. Procedure Log in to OBS Browser+. Go to the object list in the target bucket.
Lifecycle management: You can configure lifecycle rules to periodically transition objects between storage classes or delete objects.
Lifecycle management: You can configure lifecycle rules to periodically transition objects between storage classes or delete objects.
Lifecycle management: You can configure lifecycle rules to periodically transition objects between storage classes or delete objects.
Lifecycle management: You can configure lifecycle rules to periodically transition objects between storage classes or delete objects.
Lifecycle management: You can configure lifecycle rules to periodically transition objects between storage classes or delete objects.
Lifecycle management: You can configure lifecycle rules to periodically transition objects between storage classes or delete objects.
Lifecycle management: You can configure lifecycle rules to periodically transition objects between storage classes or delete objects.
Allowed Method PUT, GET, POST, DELETE, and HEAD Allows all HTTP methods. Allowed Header * Allows requests to carry any headers.
Before replicating the policies, delete some if necessary. Figure 2 Replicating online decompression policies Click OK to replicate the online decompression policies to the destination bucket. Parent Topic: Data Processing
After you change Private to Public Read/Write, anyone can read, write, and delete objects in the bucket. No identity authentication is required.
rule.AllowedHeaders.Add("x-obs-header"); // Specify the request method, which can be GET, PUT, DELETE, POST, or HEAD.
Grant permissions to users from a different department or project to download the shared data but not to write or delete the shared data. Grant each department with required IAM user permissions and use bucket policies to grant the IAM users independent permissions on resources.
Specify the origin of the cross-domain request. allowedOrigin.add( "http://www.a.com"); allowedOrigin.add( "http://www.b.com"); rule.setAllowedOrigin(allowedOrigin); ArrayList<String> allowedMethod = new ArrayList<String>(); // Specify the request method, which can be GET, PUT, DELETE
Grant permissions to users of a department or project to download the shared data but not to write or delete the shared data. Allocate IAM users with different roles to each department and use bucket policies to authorize the IAM users independent permissions on resources.
Figure 3 Configuration method Permissions To configure, obtain, or delete back-to-source by mirroring rules, you must have the Tenant Administrator permission assigned by using IAM.
In this case, you can increase the quota, cancel the quota limitation (by changing the quota to 0), or delete unwanted objects from the bucket. Request Syntax 1 2 3 4 5 6 7 8 9 10 PUT /?
req, err := http.NewRequest("DELETE", deleteObjectOutput.SignedUrl, nil) req.Header = deleteObjectOutput.ActualSignedRequestHeaders if err !