下表列出了在给定资源上运行每个 Cloud Storage XML 方法所需的 Identity and Access Management (IAM) 权限。
| 方法 | 资源 | 子资源 | 必需的 IAM 权限1 |
|---|---|---|---|
DELETE | bucket | storage.buckets.delete | |
DELETE | object | storage.objects.delete | |
DELETE | object | uploadId | storage.multipartUploads.abort |
GET | storage.buckets.list | ||
GET | bucket | storage.objects.list | |
GET | bucket | acls3 | storage.buckets.getstorage.buckets.getIamPolicy |
GET | bucket | 非 ACL 元数据 | storage.buckets.get |
GET | bucket | uploads | storage.multipartUploads.list |
GET | object | storage.objects.get | |
GET | object | acls3 | storage.objects.getstorage.objects.getIamPolicy |
GET | object | encryption | storage.objects.get |
GET | object | retention | storage.objects.get |
GET | object | uploadId | storage.multipartUploads.listParts |
HEAD | bucket | storage.buckets.get | |
HEAD | object | storage.objects.get | |
POST | object | storage.objects.createstorage.objects.delete4storage.objects.setRetention5 | |
POST | object | uploadId | storage.multipartUploads.createstorage.objects.createstorage.objects.delete4 |
POST | object | uploads | storage.multipartUploads.createstorage.objects.createstorage.objects.setRetention5 |
PUT | bucket | storage.buckets.createstorage.buckets.enableObjectRetention6 | |
PUT | bucket | acls3 | storage.buckets.getstorage.buckets.getIamPolicystorage.buckets.setIamPolicystorage.buckets.update |
PUT | bucket | 非 ACL 元数据 | storage.buckets.update |
PUT7 | object | storage.objects.createstorage.objects.get2storage.objects.delete4storage.objects.setRetention5 | |
PUT | object | acls3 | storage.objects.getstorage.objects.getIamPolicystorage.objects.setIamPolicystorage.objects.update |
PUT | object | compose | storage.objects.createstorage.objects.getstorage.objects.delete4storage.objects.setRetention5 |
PUT | object | retention | storage.objects.setRetentionstorage.objects.updatestorage.objects.overrideUnlockedRetention8 |
PUT | object | uploadId | storage.multipartUploads.createstorage.objects.create |
GET | Projects.hmacKeys | storage.hmacKeys.get | |
POST | Projects.hmacKeys | storage.hmacKeys.createstorage.hmacKeys.updatestorage.hmacKeys.delete |
1 如果您在请求中使用 x-goog-user-project 标头或 userProject 查询字符串参数,则除了发出请求所需的正常 IAM 权限之外,您还必须拥有所指定项目 ID 的 serviceusage.services.use 权限。
2 如果请求包含 x-goog-copy-source 标头,则访问源存储分区需要此权限。
3 此子资源不适用于启用了统一存储分区级访问权限的存储分区。
4 只有在插入的对象与存储分区中现有的对象名称相同时,才需要这项权限。
5 仅当请求包含 x-goog-object-lock-mode 和 x-goog-object-lock-retain-until-date 标头时,才需要此权限。
6 仅当请求包含 x-goog-bucket-object-lock-enabled 标头且该标头设为 true 时,才需要此权限。
7 无需任何权限即可发出与可续传上传关联的 PUT 请求。
8 仅当请求包含 x-goog-bypass-governance-retention 标头且该标头设为 true 时,才需要此权限。
后续步骤
- 如需查看角色及其所含权限的列表,请参阅适用于 Cloud Storage 的 IAM 角色。