Skip to content

Commit f0dd9b4

Browse files
feat(storagetransfer): update the api
#### storagetransfer:v1 The following keys were added: - schemas.AzureBlobStorageData.properties.federatedIdentityConfig.$ref (Total Keys: 1) - schemas.FederatedIdentityConfig (Total Keys: 4)
1 parent 351cc8a commit f0dd9b4

File tree

2 files changed

+44
-1
lines changed

2 files changed

+44
-1
lines changed

docs/dyn/storagetransfer_v1.transferJobs.html

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,10 @@ <h3>Method Details</h3>
240240
},
241241
&quot;container&quot;: &quot;A String&quot;, # Required. The container to transfer from the Azure Storage account.
242242
&quot;credentialsSecret&quot;: &quot;A String&quot;, # Optional. The Resource name of a secret in Secret Manager. The Azure SAS token must be stored in Secret Manager in JSON format: { &quot;sas_token&quot; : &quot;SAS_TOKEN&quot; } GoogleServiceAccount must be granted `roles/secretmanager.secretAccessor` for the resource. See [Configure access to a source: Microsoft Azure Blob Storage] (https://cloud.google.com/storage-transfer/docs/source-microsoft-azure#secret_manager) for more information. If `credentials_secret` is specified, do not specify azure_credentials. Format: `projects/{project_number}/secrets/{secret_name}`
243+
&quot;federatedIdentityConfig&quot;: { # Identities of a user registered Azure application that enables identity federation to trust tokens issued by the user&#x27;s Google service account. For more information about Azure application and identity federation, see [Register an application with the Microsoft identity platform] (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) Azure RBAC roles then need be assigned to the Azure application to authorize access to the user&#x27;s Azure data source. For more information about Azure RBAC roles for blobs, see [Manage Access Rights with RBAC] (https://learn.microsoft.com/en-us/rest/api/storageservices/authorize-with-azure-active-directory#manage-access-rights-with-rbac) # Optional. Federated identity config of a user registered Azure application. If `federated_identity_config` is specified, do not specify azure_credentials or credentials_secret.
244+
&quot;clientId&quot;: &quot;A String&quot;, # Required. Client (application) ID of the application with federated credentials.
245+
&quot;tenantId&quot;: &quot;A String&quot;, # Required. Tenant (directory) ID of the application with federated credentials.
246+
},
243247
&quot;path&quot;: &quot;A String&quot;, # Root path to transfer objects. Must be an empty string or full path name that ends with a &#x27;/&#x27;. This field is treated as an object prefix. As such, it should generally not begin with a &#x27;/&#x27;.
244248
&quot;storageAccount&quot;: &quot;A String&quot;, # Required. The name of the Azure Storage account.
245249
},
@@ -443,6 +447,10 @@ <h3>Method Details</h3>
443447
},
444448
&quot;container&quot;: &quot;A String&quot;, # Required. The container to transfer from the Azure Storage account.
445449
&quot;credentialsSecret&quot;: &quot;A String&quot;, # Optional. The Resource name of a secret in Secret Manager. The Azure SAS token must be stored in Secret Manager in JSON format: { &quot;sas_token&quot; : &quot;SAS_TOKEN&quot; } GoogleServiceAccount must be granted `roles/secretmanager.secretAccessor` for the resource. See [Configure access to a source: Microsoft Azure Blob Storage] (https://cloud.google.com/storage-transfer/docs/source-microsoft-azure#secret_manager) for more information. If `credentials_secret` is specified, do not specify azure_credentials. Format: `projects/{project_number}/secrets/{secret_name}`
450+
&quot;federatedIdentityConfig&quot;: { # Identities of a user registered Azure application that enables identity federation to trust tokens issued by the user&#x27;s Google service account. For more information about Azure application and identity federation, see [Register an application with the Microsoft identity platform] (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) Azure RBAC roles then need be assigned to the Azure application to authorize access to the user&#x27;s Azure data source. For more information about Azure RBAC roles for blobs, see [Manage Access Rights with RBAC] (https://learn.microsoft.com/en-us/rest/api/storageservices/authorize-with-azure-active-directory#manage-access-rights-with-rbac) # Optional. Federated identity config of a user registered Azure application. If `federated_identity_config` is specified, do not specify azure_credentials or credentials_secret.
451+
&quot;clientId&quot;: &quot;A String&quot;, # Required. Client (application) ID of the application with federated credentials.
452+
&quot;tenantId&quot;: &quot;A String&quot;, # Required. Tenant (directory) ID of the application with federated credentials.
453+
},
446454
&quot;path&quot;: &quot;A String&quot;, # Root path to transfer objects. Must be an empty string or full path name that ends with a &#x27;/&#x27;. This field is treated as an object prefix. As such, it should generally not begin with a &#x27;/&#x27;.
447455
&quot;storageAccount&quot;: &quot;A String&quot;, # Required. The name of the Azure Storage account.
448456
},
@@ -673,6 +681,10 @@ <h3>Method Details</h3>
673681
},
674682
&quot;container&quot;: &quot;A String&quot;, # Required. The container to transfer from the Azure Storage account.
675683
&quot;credentialsSecret&quot;: &quot;A String&quot;, # Optional. The Resource name of a secret in Secret Manager. The Azure SAS token must be stored in Secret Manager in JSON format: { &quot;sas_token&quot; : &quot;SAS_TOKEN&quot; } GoogleServiceAccount must be granted `roles/secretmanager.secretAccessor` for the resource. See [Configure access to a source: Microsoft Azure Blob Storage] (https://cloud.google.com/storage-transfer/docs/source-microsoft-azure#secret_manager) for more information. If `credentials_secret` is specified, do not specify azure_credentials. Format: `projects/{project_number}/secrets/{secret_name}`
684+
&quot;federatedIdentityConfig&quot;: { # Identities of a user registered Azure application that enables identity federation to trust tokens issued by the user&#x27;s Google service account. For more information about Azure application and identity federation, see [Register an application with the Microsoft identity platform] (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) Azure RBAC roles then need be assigned to the Azure application to authorize access to the user&#x27;s Azure data source. For more information about Azure RBAC roles for blobs, see [Manage Access Rights with RBAC] (https://learn.microsoft.com/en-us/rest/api/storageservices/authorize-with-azure-active-directory#manage-access-rights-with-rbac) # Optional. Federated identity config of a user registered Azure application. If `federated_identity_config` is specified, do not specify azure_credentials or credentials_secret.
685+
&quot;clientId&quot;: &quot;A String&quot;, # Required. Client (application) ID of the application with federated credentials.
686+
&quot;tenantId&quot;: &quot;A String&quot;, # Required. Tenant (directory) ID of the application with federated credentials.
687+
},
676688
&quot;path&quot;: &quot;A String&quot;, # Root path to transfer objects. Must be an empty string or full path name that ends with a &#x27;/&#x27;. This field is treated as an object prefix. As such, it should generally not begin with a &#x27;/&#x27;.
677689
&quot;storageAccount&quot;: &quot;A String&quot;, # Required. The name of the Azure Storage account.
678690
},
@@ -888,6 +900,10 @@ <h3>Method Details</h3>
888900
},
889901
&quot;container&quot;: &quot;A String&quot;, # Required. The container to transfer from the Azure Storage account.
890902
&quot;credentialsSecret&quot;: &quot;A String&quot;, # Optional. The Resource name of a secret in Secret Manager. The Azure SAS token must be stored in Secret Manager in JSON format: { &quot;sas_token&quot; : &quot;SAS_TOKEN&quot; } GoogleServiceAccount must be granted `roles/secretmanager.secretAccessor` for the resource. See [Configure access to a source: Microsoft Azure Blob Storage] (https://cloud.google.com/storage-transfer/docs/source-microsoft-azure#secret_manager) for more information. If `credentials_secret` is specified, do not specify azure_credentials. Format: `projects/{project_number}/secrets/{secret_name}`
903+
&quot;federatedIdentityConfig&quot;: { # Identities of a user registered Azure application that enables identity federation to trust tokens issued by the user&#x27;s Google service account. For more information about Azure application and identity federation, see [Register an application with the Microsoft identity platform] (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) Azure RBAC roles then need be assigned to the Azure application to authorize access to the user&#x27;s Azure data source. For more information about Azure RBAC roles for blobs, see [Manage Access Rights with RBAC] (https://learn.microsoft.com/en-us/rest/api/storageservices/authorize-with-azure-active-directory#manage-access-rights-with-rbac) # Optional. Federated identity config of a user registered Azure application. If `federated_identity_config` is specified, do not specify azure_credentials or credentials_secret.
904+
&quot;clientId&quot;: &quot;A String&quot;, # Required. Client (application) ID of the application with federated credentials.
905+
&quot;tenantId&quot;: &quot;A String&quot;, # Required. Tenant (directory) ID of the application with federated credentials.
906+
},
891907
&quot;path&quot;: &quot;A String&quot;, # Root path to transfer objects. Must be an empty string or full path name that ends with a &#x27;/&#x27;. This field is treated as an object prefix. As such, it should generally not begin with a &#x27;/&#x27;.
892908
&quot;storageAccount&quot;: &quot;A String&quot;, # Required. The name of the Azure Storage account.
893909
},
@@ -1111,6 +1127,10 @@ <h3>Method Details</h3>
11111127
},
11121128
&quot;container&quot;: &quot;A String&quot;, # Required. The container to transfer from the Azure Storage account.
11131129
&quot;credentialsSecret&quot;: &quot;A String&quot;, # Optional. The Resource name of a secret in Secret Manager. The Azure SAS token must be stored in Secret Manager in JSON format: { &quot;sas_token&quot; : &quot;SAS_TOKEN&quot; } GoogleServiceAccount must be granted `roles/secretmanager.secretAccessor` for the resource. See [Configure access to a source: Microsoft Azure Blob Storage] (https://cloud.google.com/storage-transfer/docs/source-microsoft-azure#secret_manager) for more information. If `credentials_secret` is specified, do not specify azure_credentials. Format: `projects/{project_number}/secrets/{secret_name}`
1130+
&quot;federatedIdentityConfig&quot;: { # Identities of a user registered Azure application that enables identity federation to trust tokens issued by the user&#x27;s Google service account. For more information about Azure application and identity federation, see [Register an application with the Microsoft identity platform] (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) Azure RBAC roles then need be assigned to the Azure application to authorize access to the user&#x27;s Azure data source. For more information about Azure RBAC roles for blobs, see [Manage Access Rights with RBAC] (https://learn.microsoft.com/en-us/rest/api/storageservices/authorize-with-azure-active-directory#manage-access-rights-with-rbac) # Optional. Federated identity config of a user registered Azure application. If `federated_identity_config` is specified, do not specify azure_credentials or credentials_secret.
1131+
&quot;clientId&quot;: &quot;A String&quot;, # Required. Client (application) ID of the application with federated credentials.
1132+
&quot;tenantId&quot;: &quot;A String&quot;, # Required. Tenant (directory) ID of the application with federated credentials.
1133+
},
11141134
&quot;path&quot;: &quot;A String&quot;, # Root path to transfer objects. Must be an empty string or full path name that ends with a &#x27;/&#x27;. This field is treated as an object prefix. As such, it should generally not begin with a &#x27;/&#x27;.
11151135
&quot;storageAccount&quot;: &quot;A String&quot;, # Required. The name of the Azure Storage account.
11161136
},
@@ -1316,6 +1336,10 @@ <h3>Method Details</h3>
13161336
},
13171337
&quot;container&quot;: &quot;A String&quot;, # Required. The container to transfer from the Azure Storage account.
13181338
&quot;credentialsSecret&quot;: &quot;A String&quot;, # Optional. The Resource name of a secret in Secret Manager. The Azure SAS token must be stored in Secret Manager in JSON format: { &quot;sas_token&quot; : &quot;SAS_TOKEN&quot; } GoogleServiceAccount must be granted `roles/secretmanager.secretAccessor` for the resource. See [Configure access to a source: Microsoft Azure Blob Storage] (https://cloud.google.com/storage-transfer/docs/source-microsoft-azure#secret_manager) for more information. If `credentials_secret` is specified, do not specify azure_credentials. Format: `projects/{project_number}/secrets/{secret_name}`
1339+
&quot;federatedIdentityConfig&quot;: { # Identities of a user registered Azure application that enables identity federation to trust tokens issued by the user&#x27;s Google service account. For more information about Azure application and identity federation, see [Register an application with the Microsoft identity platform] (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) Azure RBAC roles then need be assigned to the Azure application to authorize access to the user&#x27;s Azure data source. For more information about Azure RBAC roles for blobs, see [Manage Access Rights with RBAC] (https://learn.microsoft.com/en-us/rest/api/storageservices/authorize-with-azure-active-directory#manage-access-rights-with-rbac) # Optional. Federated identity config of a user registered Azure application. If `federated_identity_config` is specified, do not specify azure_credentials or credentials_secret.
1340+
&quot;clientId&quot;: &quot;A String&quot;, # Required. Client (application) ID of the application with federated credentials.
1341+
&quot;tenantId&quot;: &quot;A String&quot;, # Required. Tenant (directory) ID of the application with federated credentials.
1342+
},
13191343
&quot;path&quot;: &quot;A String&quot;, # Root path to transfer objects. Must be an empty string or full path name that ends with a &#x27;/&#x27;. This field is treated as an object prefix. As such, it should generally not begin with a &#x27;/&#x27;.
13201344
&quot;storageAccount&quot;: &quot;A String&quot;, # Required. The name of the Azure Storage account.
13211345
},

googleapiclient/discovery_cache/documents/storagetransfer.v1.json

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -632,7 +632,7 @@
632632
}
633633
}
634634
},
635-
"revision": "20250503",
635+
"revision": "20250510",
636636
"rootUrl": "https://storagetransfer.googleapis.com/",
637637
"schemas": {
638638
"AgentPool": {
@@ -764,6 +764,10 @@
764764
"description": "Optional. The Resource name of a secret in Secret Manager. The Azure SAS token must be stored in Secret Manager in JSON format: { \"sas_token\" : \"SAS_TOKEN\" } GoogleServiceAccount must be granted `roles/secretmanager.secretAccessor` for the resource. See [Configure access to a source: Microsoft Azure Blob Storage] (https://cloud.google.com/storage-transfer/docs/source-microsoft-azure#secret_manager) for more information. If `credentials_secret` is specified, do not specify azure_credentials. Format: `projects/{project_number}/secrets/{secret_name}`",
765765
"type": "string"
766766
},
767+
"federatedIdentityConfig": {
768+
"$ref": "FederatedIdentityConfig",
769+
"description": "Optional. Federated identity config of a user registered Azure application. If `federated_identity_config` is specified, do not specify azure_credentials or credentials_secret."
770+
},
767771
"path": {
768772
"description": "Root path to transfer objects. Must be an empty string or full path name that ends with a '/'. This field is treated as an object prefix. As such, it should generally not begin with a '/'.",
769773
"type": "string"
@@ -932,6 +936,21 @@
932936
},
933937
"type": "object"
934938
},
939+
"FederatedIdentityConfig": {
940+
"description": "Identities of a user registered Azure application that enables identity federation to trust tokens issued by the user's Google service account. For more information about Azure application and identity federation, see [Register an application with the Microsoft identity platform] (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) Azure RBAC roles then need be assigned to the Azure application to authorize access to the user's Azure data source. For more information about Azure RBAC roles for blobs, see [Manage Access Rights with RBAC] (https://learn.microsoft.com/en-us/rest/api/storageservices/authorize-with-azure-active-directory#manage-access-rights-with-rbac)",
941+
"id": "FederatedIdentityConfig",
942+
"properties": {
943+
"clientId": {
944+
"description": "Required. Client (application) ID of the application with federated credentials.",
945+
"type": "string"
946+
},
947+
"tenantId": {
948+
"description": "Required. Tenant (directory) ID of the application with federated credentials.",
949+
"type": "string"
950+
}
951+
},
952+
"type": "object"
953+
},
935954
"GcsData": {
936955
"description": "In a GcsData resource, an object's name is the Cloud Storage object's name and its \"last modification time\" refers to the object's `updated` property of Cloud Storage objects, which changes when the content or the metadata of the object is updated.",
937956
"id": "GcsData",

0 commit comments

Comments
 (0)