airflow.providers.amazon.aws.transfers.glacier_to_gcs

Module Contents

class airflow.providers.amazon.aws.transfers.glacier_to_gcs.GlacierToGCSOperator(*, aws_conn_id: str = 'aws_default', gcp_conn_id: str = 'google_cloud_default', vault_name: str, bucket_name: str, object_name: str, gzip: bool, chunk_size: int = 1024, delegate_to: Optional[str] = None, google_impersonation_chain: Optional[Union[str, Sequence[str]]] = None, **kwargs)[source]

Bases: airflow.models.BaseOperator

Transfers data from Amazon Glacier to Google Cloud Storage

Note

Please be warn that GlacierToGCSOperator may depends on memory usage. Transferring big files may not working well.

See also

For more information on how to use this operator, take a look at the guide: GlacierToGCSOperator

Parameters
  • aws_conn_id (str) -- The reference to the AWS connection details

  • gcp_conn_id (str) -- The reference to the GCP connection details

  • vault_name (string) -- the Glacier vault on which job is executed

  • bucket_name (str) -- the Google Cloud Storage bucket where the data will be transferred

  • object_name (str) -- the name of the object to check in the Google cloud storage bucket.

  • gzip (bool) -- option to compress local file or file data for upload

  • chunk_size (int) -- size of chunk in bytes the that will downloaded from Glacier vault

  • delegate_to (str) -- The account to impersonate using domain-wide delegation of authority, if any. For this to work, the service account making the request must have domain-wide delegation enabled.

  • google_impersonation_chain -- Optional Google service account to impersonate using short-term credentials, or chained list of accounts required to get the access_token of the last account in the list, which will be impersonated in the request. If set as a string, the account must grant the originating account the Service Account Token Creator IAM role. If set as a sequence, the identities from the list must grant Service Account Token Creator IAM role to the directly preceding identity, with first account from the list granting this role to the originating account (templated).

template_fields = ['vault_name', 'bucket_name', 'object_name'][source]
execute(self, context)[source]

Was this entry helpful?