检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
descriptionUpdateRepoDomainsRequestBody:= "description" request.Body = &model.UpdateRepoDomainsRequestBody{ Description: &descriptionUpd
、资源以及请求条件等。基于策略的授权是一种更加灵活的授权方式,能够满足企业对权限最小化的安全管控要求。例如:针对ECS服务,管理员能够控制IAM用户仅能对某一类云服务器资源进行指定的管理操作。 SWR目前有共享版和企业版两个版本,SWR共享版的权限如下: 如表1和表2所示,包括了SWR共享版的所有系统策略和系统角色。
descriptionCreateRepoDomainsRequestBody:= "description" request.Body = &model.CreateRepoDomainsRequestBody{ Description: &descriptionCre
().LINUX request.Body = &model.CreateRepoRequestBody{ Description: &descriptionCreateRepoRequestBody, Category: &categoryCreateRepoRequestBody
DATABASE request.Body = &model.UpdateRepoRequestBody{ Description: &descriptionUpdateRepoRequestBody, Category: &categoryUpdateRepoRequestBody
enable_cci_service Boolean 是否支持对接cci服务 enable_image_label Boolean 是否支持镜像标签 enable_pipeline Boolean 是否支持流水线服务 请求示例 GET https://{endpoint}/v2/manage/project
age/namespaces/{namespace}/repos?repository=test&category=linux&description=test&is_public=false 响应示例 {} 查询镜像仓库概要信息 接口相关信息 URI格式:GET /v2/man
"permit" : "read", "deadline" : "2021-10-01T16:00:00Z", "description" : "description", "creator_id" : "0504186e6a8010e01f3ec009a7279baa",
"read", "deadline" : "2018-10-01T16:00:00.000Z", "description" : "description", "creator_id" : "fb3f175c1fd146ab8cdae3272be6107b",
项相对应,只有发起请求的用户被授予授权项所对应的策略,该用户才能成功调用该接口。例如,用户要调用接口来查询云服务器列表,那么这个IAM用户被授予的策略中必须包含允许“ecs:servers:list”的授权项,该接口才能调用成功。 IAM支持的授权项 策略包含系统策略和自定义策略
支持审计的关键操作列表 表1 云审计服务支持的共享版SWR操作列表 操作名称 资源类型 事件名称 镜像上传 images postMultipartImagePackage 获取登录指令 dockerlogincmd createDockerConfig 获取概览信息 overview
组织编号 name String 仓库名称 category String 仓库类型(计划改造,每个镜像会有多个lable标示) description String 仓库描述信息 creator_id String 仓库创建者id creator_name String 仓库创建者
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted