下表列出了在给定资源上运行每个 Cloud Storage XML 方法所需的 Identity and Access Management (IAM) 权限。
| 方法 | 资源 | 子资源 | 必需的 IAM 权限1 | 
|---|---|---|---|
DELETE | 
      bucket | 
      storage.buckets.delete | 
    |
DELETE | 
      object | 
      storage.objects.delete | 
    |
DELETE | 
      object | 
      uploadId | 
      storage.multipartUploads.abort | 
    
GET | 
      storage.buckets.list | 
    ||
GET | 
      bucket | 
      storage.objects.list | 
    |
GET | 
      bucket | 
      acls3 | 
      storage.buckets.getstorage.buckets.getIamPolicy | 
    
GET | 
      bucket | 
      非 ACL 元数据 | storage.buckets.get | 
    
GET | 
      bucket | 
      uploads | 
      storage.multipartUploads.list | 
    
GET | 
      object | 
      storage.objects.get | 
    |
GET | 
      object | 
      acls3 | 
      storage.objects.getstorage.objects.getIamPolicy | 
    
GET | 
      object | 
      encryption | 
      storage.objects.get | 
    
GET | 
      object | 
      retention | 
      storage.objects.get | 
    
GET | 
      object | 
      uploadId | 
      storage.multipartUploads.listParts | 
    
HEAD | 
      bucket | 
      storage.buckets.get | 
    |
HEAD | 
      object | 
      storage.objects.get | 
    |
POST | 
      object | 
      storage.objects.createstorage.objects.delete4storage.objects.setRetention5 | 
    |
POST | 
      object | 
      uploadId | 
      storage.multipartUploads.createstorage.objects.createstorage.objects.delete4 | 
    
POST | 
      object | 
      uploads | 
      storage.multipartUploads.createstorage.objects.createstorage.objects.setRetention5 | 
    
PUT | 
      bucket | 
      storage.buckets.createstorage.buckets.enableObjectRetention6 | 
    |
PUT | 
      bucket | 
      acls3 | 
      storage.buckets.getstorage.buckets.getIamPolicystorage.buckets.setIamPolicystorage.buckets.update | 
    
PUT | 
      bucket | 
      非 ACL 元数据 | storage.buckets.update | 
    
PUT7 | 
      object | 
      storage.objects.createstorage.objects.get2storage.objects.delete4storage.objects.setRetention5 | 
    |
PUT | 
      object | 
      acls3 | 
      storage.objects.getstorage.objects.getIamPolicystorage.objects.setIamPolicystorage.objects.update | 
    
PUT | 
      object | 
      compose | 
      storage.objects.createstorage.objects.getstorage.objects.delete4storage.objects.setRetention5 | 
    
PUT | 
      object | 
      retention | 
      storage.objects.setRetentionstorage.objects.updatestorage.objects.overrideUnlockedRetention8 | 
    
PUT | 
      object | 
      uploadId | 
      storage.multipartUploads.createstorage.objects.create | 
    
GET | 
      Projects.hmacKeys | 
      storage.hmacKeys.get | 
    |
POST | 
      Projects.hmacKeys | 
      storage.hmacKeys.createstorage.hmacKeys.updatestorage.hmacKeys.delete | 
    
1 如果您在请求中使用 x-goog-user-project 标头或 userProject 查询字符串参数,则除了发出请求所需的正常 IAM 权限之外,您还必须拥有所指定项目 ID 的 serviceusage.services.use 权限。
2 如果请求包含 x-goog-copy-source 标头,则访问源存储分区需要此权限。
3 此子资源不适用于启用了统一存储分区级访问权限的存储分区。
4 只有在插入的对象与存储分区中现有的对象名称相同时,才需要这项权限。
5 仅当请求包含 x-goog-object-lock-mode 和 x-goog-object-lock-retain-until-date 标头时,才需要此权限。
6 仅当请求包含 x-goog-bucket-object-lock-enabled 标头且该标头设为 true 时,才需要此权限。
7 无需任何权限即可发出与可续传上传关联的 PUT 请求。
8 仅当请求包含 x-goog-bypass-governance-retention 标头且该标头设为 true 时,才需要此权限。
后续步骤
- 如需查看角色及其所含权限的列表,请参阅适用于 Cloud Storage 的 IAM 角色。