You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/backends/gcloud.rst
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,18 +19,15 @@ current Google Compute Engine (GCE) or Google Kubernetes Engine (GKE) instance
19
19
for authentication. In most cases, the default service accounts are not sufficient
20
20
to read/write and sign files in GCS.
21
21
22
-
1. Create a service account.
23
-
(`Google Getting Started Guide <https://cloud.google.com/docs/authentication/getting-started>`__)
22
+
1. Create a service account. (`Google Getting Started Guide <https://cloud.google.com/docs/authentication/getting-started>`__)
24
23
25
24
2. Create the key and download `your-project-XXXXX.json` file.
26
25
27
-
3. Make sure your service account has access to the bucket and appropriate permissions.
28
-
(`Using IAM Permissions <https://cloud.google.com/storage/docs/access-control/using-iam-permissions>`__)
26
+
3. Make sure your service account has access to the bucket and appropriate permissions. (`Using IAM Permissions <https://cloud.google.com/storage/docs/access-control/using-iam-permissions>`__)
29
27
30
-
4. The key must be mounted/available to your running Django app.
31
-
Note: a json keyfile will work for developer machines (or other instances outside Google infrastructure).
28
+
4. The key must be mounted/available to your running Django app. Note: a json keyfile will work for developer machines (or other instances outside Google infrastructure).
32
29
33
-
5. Set an environment variable of GOOGLE_APPLICATION_CREDENTIALS to path of the json file.
30
+
5. Set an environment variable of GOOGLE_APPLICATION_CREDENTIALS to the path of the json file.
34
31
35
32
Alternatively, you can use the setting `GS_CREDENTIALS` as described below.
36
33
@@ -118,11 +115,12 @@ translated.)
118
115
For most cases, the blob will need to be set to the ``publicRead`` ACL in order for the file to be viewed.
119
116
If GS_DEFAULT_ACL is not set, the blob will have the default permissions set by the bucket.
120
117
121
-
``publicRead`` files will return a public - non-expiring url. All other files return
118
+
``publicRead`` files will return a public, non-expiring url. All other files return
122
119
a signed (expiring) url.
123
120
124
-
**GS_DEFAULT_ACL must be set to ``publicRead`` to return a public url.** Even if you set
125
-
the bucket to public or set the file permissions directly in GCS to public.
121
+
.. note::
122
+
GS_DEFAULT_ACL must be set to 'publicRead' to return a public url. Even if you set
123
+
the bucket to public or set the file permissions directly in GCS to public.
0 commit comments