检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
By default, only the bucket owner can delete the tags of a bucket. The bucket owner can allow other users to perform this operation by setting a bucket policy or granting them the permission. Restrictions A bucket can have up to 10 tags.
Default value: None x-obs-grant-write String No Explanation: Grants the WRITE permission to all users in a specified domain to create, delete, and overwrite all objects in a bucket; and initiate multipart uploads, upload parts, copy parts, assemble parts, and cancel multipart uploads
WRITE Write permission A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. Such permission for an object is not applicable.
WRITE Write permission A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. Such permission for an object is not applicable.
You can perform download, delete, or other operations on folder objects just like on regular objects.
If the object has a delete marker, status code 404 is returned. To obtain the object metadata of a specified version, the versionId parameter can be used to specify the desired version.
If you need an inventory rule that covers only a subset of objects in the bucket, first delete the inventory rule configured for the entire bucket.
Value range: true: The deleted object is a delete marker. false: The deleted object is not a delete marker. Default value: false x-obs-version-id String Explanation: Object version ID.
How Do I Delete Millions of Objects in Batches Through Lifecycle Management? How Do I Configure the Browser to Directly Play a Video? Does OBS Support Object Upload with Encryption? More Developers Related Does OBS Provide an API for Deleting Fragments?
Users of department A fail to download or delete any object from the bucket of department A. If the preceding requirements are met, the permission configuration is successful. Parent topic: Best Practices for Enterprise Data Access Control
Configuring Lifecycle Rules for a Bucket (SDK for Python) ObsClient.setBucketLifecycle Configures lifecycle rules for a bucket to periodically transition objects between storage classes or delete objects.
This policy allows users to list, download, upload, and delete objects in the my-project directory of bucket obs-example. { "Version": "1.1", "Statement": [ { "Effect": "Allow", "Action": [ "obs:object:GetObject",
Bucket Read/Write Allows specified accounts to perform all actions excluding the following ones on a bucket and the objects in it: DeleteBucket (to delete a bucket) PutBucketPolicy (to configure a bucket policy) PutBucketAcl (to configure a bucket ACL) The specified actions are excluded
A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. This permission is not available for objects. PERMISSION_READ_ACP READ_ACP Permission to read an ACL.
A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. This permission is not available for objects. PERMISSION_READ_ACP READ_ACP Permission to read an ACL.
WRITE Write permission A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. Such permission for an object is not applicable.
WRITE Write permission A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. Such permission for an object is not applicable.
ObsClient.enums.PermissionWrite WRITE A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. This permission is not applicable to objects.
ObsClient.enums.PermissionWrite WRITE A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. This permission is not applicable to objects.
WRITE Write permission A grantee with this permission for a bucket can upload, overwrite, and delete any object or part in the bucket. Such permission for an object is not applicable.