Google Cloud Storage¶
This backend implements the Django File API for Google Cloud Storage using the Python library provided by Google.
Installation¶
Use pip to install from PyPI:
pip install django-storages[google]
Configuration & Settings¶
Django 4.2 changed the way file storage objects are configured. In particular, it made it easier to independently configure
storage backends and add additional ones. To configure multiple storage objects pre Django 4.2 required subclassing the backend
because the settings were global, now you pass them under the key OPTIONS. For example, to save media files to GCS on Django
>= 4.2 you’d define:
STORAGES = {
"default": {
"BACKEND": "storages.backends.gcloud.GoogleCloudStorage",
"OPTIONS": {
...your_options_here
},
},
}
On Django < 4.2 you’d instead define:
DEFAULT_FILE_STORAGE = "storages.backends.gcloud.GoogleCloudStorage"
To put static files on GCS via collectstatic on Django >= 4.2 you’d include the staticfiles key (at the same level as
default) in the STORAGES dictionary while on Django < 4.2 you’d instead define:
STATICFILES_STORAGE = "storages.backends.gcloud.GoogleCloudStorage"
The settings documented in the following sections include both the key for OPTIONS (and subclassing) as
well as the global value. Given the significant improvements provided by the new API, migration is strongly encouraged.
Authentication Settings¶
By default, this library will try to use the credentials associated with the current Google Cloud infrastructure/environment for authentication.
In most cases, the default service accounts are not sufficient to read/write and sign files in GCS, so you will need to create a dedicated service account:
Create a service account. (Google Getting Started Guide)
Make sure your service account has access to the bucket and appropriate permissions. (Using IAM Permissions)
Ensure this service account is associated to the type of compute being used (Google Compute Engine (GCE), Google Kubernetes Engine (GKE), Google Cloud Run (GCR), etc)
If your app only handles
publicReadstorage objects then the above steps are all that is requiredIf your app handles signed (expiring) urls, then read through the options in the
Settings for Signed Urlsin the following section
Settings for Signed Urls¶
IAM Sign Blob API¶
Note
There is currently a limitation in the GCS client for Python which by default requires a service account private key file to be present when generating signed urls. The service account private key file is unavailable when running on compute services. Compute Services (App Engine, Cloud Run, Cloud Functions, Compute Engine, etc) fetch access tokens from the metadata server
Due to the above limitation, currently the only way to generate a signed url without having the private key file mounted in the env is through the IAM Sign Blob API.
Note
The IAM Sign Blob API has quota limits which could be a deal-breaker.
To use the IAM Sign Blob API set iam_sign_blob or GS_IAM_SIGN_BLOB to True. When this setting is enabled,
signed urls are generated through the IAM SignBlob API using the attached service account email and access_token
instead of the credentials in the key file.
An additional optional setting sa_email or GS_SA_EMAIL is also available. It allows you to override the service account
used to generate the signed url if it is different from the one attached to your env. It’s also useful for local/development
use cases where the metadata server isn’t available and storing private key files is dangerous.
Mounted Private Key¶
If the above method is not sufficient for your needs you can still use the service account key file for authentication (not recommended by Google):
Create the key and download
your-project-XXXXX.jsonfile.Ensure the key is mounted/available to your running app.
Set an environment variable of
GOOGLE_APPLICATION_CREDENTIALSto the path of the JSON file.
Alternatively, you can set credentials or GS_CREDENTIALS to the path of the JSON file.
Settings¶
bucket_name or GS_BUCKET_NAME
Required
The name of the GCS bucket that will host the files.
project_id or GS_PROJECT_ID
default:
NoneYour Google Cloud project ID. If unset, falls back to the default inferred from the environment.
gzip or GS_IS_GZIPPED
default:
FalseWhether or not to enable gzipping of content types specified by
gzip_content_types.
gzip_content_types or GZIP_CONTENT_TYPES
default:
(text/css,text/javascript,application/javascript,application/x-javascript,image/svg+xml)The list of content types to be gzipped when
gzipisTrue.
credentials or GS_CREDENTIALS
default:
NoneThe OAuth2 credentials to use for the connection. Be sure to read through all of Authentication Settings first. (i.e.
GOOGLE_APPLICATION_CREDENTIALS):from google.oauth2 import service_account GS_CREDENTIALS = service_account.Credentials.from_service_account_file( "path/to/credentials.json" )
default_acl or GS_DEFAULT_ACL
default:
NoneACL used when creating a new blob, from the list of predefined ACLs. (A “JSON API” ACL is preferred but an “XML API/gsutil” ACL will be translated.)
For most cases, the blob will need to be set to the
publicReadACL in order for the file to be viewed. Ifdefault_aclis not set, the blob will have the default permissions set by the bucket.
publicReadfiles will return a public, non-expiring url. All other files return a signed (expiring) url.
Note
GS_DEFAULT_ACL must be set to ‘publicRead’ to return a public url. Even if you set the bucket to public or set the file permissions directly in GCS to public.
Note
When using this setting, make sure you have fine-grained access control enabled on your bucket,
as opposed to Uniform access control, or else, file uploads will return with HTTP 400. If you
already have a bucket with Uniform access control set to public read, please keep
GS_DEFAULT_ACL to None and set GS_QUERYSTRING_AUTH to False.
querystring_auth or GS_QUERYSTRING_AUTH
default:
TrueWhether or not to force URL signing. Set this to
Falsefor buckets where all objects are public.
file_overwrite or GS_FILE_OVERWRITE
default:
TrueBy default files with the same name will overwrite each other. Set this to
Falseto have extra characters appended.
max_memory_size or GS_MAX_MEMORY_SIZE
default:
0i.e do not rolloverThe maximum amount of memory a returned file can take up (in bytes) before being rolled over into a temporary file on disk. Default is 0: Do not roll over.
blob_chunk_size or GS_BLOB_CHUNK_SIZE
default:
NoneThe size of blob chunks that are sent via resumable upload. If this is not set then the generated request must fit in memory. Recommended if you are going to be uploading large files.
Note
This must be a multiple of 256K (1024 * 256)
object_parameters or GS_OBJECT_PARAMETERS
default: {}
Dictionary of key-value pairs mapping from blob property name to value.
Use this to set parameters on all objects. To set these on a per-object basis, subclass the backend and override
GoogleCloudStorage.get_object_parameters.The valid property names are
acl cache_control content_disposition content_encoding content_language content_type metadata storage_classIf not set, the
content_typeproperty will be guessed.If set,
acloverrides GS_DEFAULT_ACL.
Warning
Do not set name. This is set automatically based on the filename.
custom_endpoint or GS_CUSTOM_ENDPOINT
default:
NoneSets a custom endpoint, that will be used instead of
https://storage.googleapis.comwhen generating URLs for files.
location or GS_LOCATION
default:
''Subdirectory in which files will be stored.
expiration or GS_EXPIRATION
default:
timedelta(seconds=86400))The time that a generated URL is valid before expiration. The default is 1 day. Public files will return a url that does not expire.
Note: Default Google Compute Engine (GCE) Service accounts are unable to sign urls.
The
expirationvalue is handled by the underlying Google library. It supports timedelta, datetime, or integer seconds since epoch time.Note: The maximum value for this option is 7 days (604800 seconds) in version v4 (See this Github issue)
iam_sign_blob or GS_IAM_SIGN_BLOB
default:
FalseGenerate signed urls using the IAM Sign Blob API. See IAM Sign Blob API for more info.
sa_email or GS_SA_EMAIL
default:
NoneOverride the service account used for generating signed urls using the IAM Sign Blob API. See IAM Sign Blob API for more info.