You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request.
Please do not leave +1 or me too comments, they generate extra noise for issue followers and do not help prioritize the request.
If you are interested in working on this issue or have submitted a pull request, please leave a comment.
If an issue is assigned to a user, that user is claiming responsibility for the issue.
Customers working with a Google Technical Account Manager or Customer Engineer can ask them to reach out internally to expedite investigation and resolution of this issue.
Description
The current google_storage_transfer_job forces you to utilize a SAS token when moving data from Azure -> GCS even though GCP exposes a method to do this via federated identities in the console. I'd like it so that the same tenant_id and client_id options are exposed in the terraform module.
Community Note
Description
The current google_storage_transfer_job forces you to utilize a SAS token when moving data from Azure -> GCS even though GCP exposes a method to do this via federated identities in the console. I'd like it so that the same tenant_id and client_id options are exposed in the terraform module.
New or Affected Resource(s)
google_storage_transfer_job
Potential Terraform Configuration
References
No response
b/371607664
The text was updated successfully, but these errors were encountered: