Restore delegate_to for Google Transfer Operators retrieving from Google Cloud. #37925
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR restores the
delegate_to
parameter to Transfer Operators moving Google Cloud data to Google Drive removed when addressing #29088 via #30748.The
delgate_to
parameter provides Google Suite Hooks a method of interacting with user spaces, as service accounts are not able to interact with user owned spaces with implicit permissions. While it makes sense thatdelegate_to
has been deprecated in favour ofimpersonation_chain
for the Google Cloud Hooks, I suspect this was removed in error from GoogleDriveHooks in Transfer Operators that also include Google Cloud Hooks. Google Drive Hooks and Transfer Operators that do not involve Google Cloud still supports thedelegate_to
parameter, so it make sense that the Transfer operators copying from Google Cloud into Google Drive do as well.This PR contains the following changes:
delegate_to
argument only applies to the GoogleDrive hooks.^ Add meaningful description above
Read the Pull Request Guidelines for more information.
In case of fundamental code changes, an Airflow Improvement Proposal (AIP) is needed.
In case of a new dependency, check compliance with the ASF 3rd Party License Policy.
In case of backwards incompatible changes please leave a note in a newsfragment file, named
{pr_number}.significant.rst
or{issue_number}.significant.rst
, in newsfragments.