Skip to content

Commit

Permalink
Update documentation files (#2338)
Browse files Browse the repository at this point in the history
Add a new main page for the YARD documentation that contains the "guide" content,
and supports YARD links using {}, which the README.md file cannot, since it is
intended to be the main page shown on GitHub.
Add the other files, CODE_OF_CONDUCT, CONTRIBUTING, FAQ, TROUBLESHOOTING, but enable
YARD links on them, since their intended use is in documentation, not on GitHub
as is the top-level version of these files.
Customize these new files to be specific to gem specific, instead of project-wide.
  • Loading branch information
blowmage committed Sep 6, 2018
1 parent f6384e4 commit 2dacea9
Show file tree
Hide file tree
Showing 127 changed files with 11,599 additions and 5,265 deletions.
9 changes: 9 additions & 0 deletions google-cloud-bigquery/.yardopts
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,16 @@
--title=Google Cloud BigQuery
--markup markdown
--markup-provider redcarpet
--main OVERVIEW.md

./lib/**/*.rb
-
OVERVIEW.md
AUTHENTICATION.md
LOGGING.md
CONTRIBUTING.md
TROUBLESHOOTING.md
README.md
CHANGELOG.md
CODE_OF_CONDUCT.md
LICENSE
184 changes: 159 additions & 25 deletions google-cloud-bigquery/AUTHENTICATION.md
Original file line number Diff line number Diff line change
@@ -1,44 +1,178 @@
## With `google-cloud-ruby`
# Authentication

With `google-cloud-ruby` it's incredibly easy to get authenticated and start using Google's APIs. You can set your credentials on a global basis as well as on a per-API basis.
In general, the google-cloud-bigquery library uses [Service
Account](https://cloud.google.com/iam/docs/creating-managing-service-accounts)
credentials to connect to Google Cloud services. When running on Compute Engine
the credentials will be discovered automatically. When running on other
environments, the Service Account credentials can be specified by providing the
path to the [JSON
keyfile](https://cloud.google.com/iam/docs/managing-service-account-keys) for
the account (or the JSON itself) in environment variables. Additionally, Cloud
SDK credentials can also be discovered automatically, but this is only
recommended during development.

### Google Cloud Platform environments

While running on Google Cloud Platform environments such as Google Compute Engine, Google App Engine and Google Kubernetes Engine, no extra work is needed. The **Project ID** and **Credentials** and are discovered automatically. Code should be written as if already authenticated.

### Project and Credential Lookup
## Project and Credential Lookup

The google-cloud library aims to make authentication as simple as possible, and provides several mechanisms to configure your system without providing **Project ID** and **Service Account Credentials** directly in code.
The google-cloud-bigquery library aims to make authentication as simple as
possible, and provides several mechanisms to configure your system without
providing **Project ID** and **Service Account Credentials** directly in code.

**Project ID** is discovered in the following order:

1. Specify project ID in code
2. Discover project ID in environment variables
3. Discover GCE project ID
1. Specify project ID in method arguments
2. Specify project ID in configuration
3. Discover project ID in environment variables
4. Discover GCE project ID

**Credentials** are discovered in the following order:

1. Specify credentials in code
2. Discover credentials path in environment variables
3. Discover credentials JSON in environment variables
4. Discover credentials file in the Cloud SDK's path
5. Discover GCE credentials
1. Specify credentials in method arguments
2. Specify credentials in configuration
3. Discover credentials path in environment variables
4. Discover credentials JSON in environment variables
5. Discover credentials file in the Cloud SDK's path
6. Discover GCE credentials

### Google Cloud Platform environments

While running on Google Cloud Platform environments such as Google Compute
Engine, Google App Engine and Google Kubernetes Engine, no extra work is needed.
The **Project ID** and **Credentials** and are discovered automatically. Code
should be written as if already authenticated. Just be sure when you [set up the
GCE instance][gce-how-to], you add the correct scopes for the APIs you want to
access. For example:

* **All APIs**
* `https://www.googleapis.com/auth/cloud-platform`
* `https://www.googleapis.com/auth/cloud-platform.read-only`
* **BigQuery**
* `https://www.googleapis.com/auth/bigquery`
* `https://www.googleapis.com/auth/bigquery.insertdata`
* **Compute Engine**
* `https://www.googleapis.com/auth/compute`
* **Datastore**
* `https://www.googleapis.com/auth/datastore`
* `https://www.googleapis.com/auth/userinfo.email`
* **DNS**
* `https://www.googleapis.com/auth/ndev.clouddns.readwrite`
* **Pub/Sub**
* `https://www.googleapis.com/auth/pubsub`
* **Storage**
* `https://www.googleapis.com/auth/devstorage.full_control`
* `https://www.googleapis.com/auth/devstorage.read_only`
* `https://www.googleapis.com/auth/devstorage.read_write`

### Environment Variables

The **Project ID** and **Credentials JSON** can be placed in environment variables instead of declaring them directly in code. Each service has its own environment variable, allowing for different service accounts to be used for different services. The path to the **Credentials JSON** file can be stored in the environment variable, or the **Credentials JSON** itself can be stored for environments such as Docker containers where writing files is difficult or not encouraged.
The **Project ID** and **Credentials JSON** can be placed in environment
variables instead of declaring them directly in code. Each service has its own
environment variable, allowing for different service accounts to be used for
different services. (See the READMEs for the individual service gems for
details.) The path to the **Credentials JSON** file can be stored in the
environment variable, or the **Credentials JSON** itself can be stored for
environments such as Docker containers where writing files is difficult or not
encouraged.

The environment variables that BigQuery checks for project ID are:

1. `BIGQUERY_PROJECT`
2. `GOOGLE_CLOUD_PROJECT`

The environment variables that BigQuery checks for credentials are configured on {Google::Cloud::Bigquery::Credentials}:

1. `BIGQUERY_CREDENTIALS` - Path to JSON file, or JSON contents
2. `BIGQUERY_KEYFILE` - Path to JSON file, or JSON contents
3. `GOOGLE_CLOUD_CREDENTIALS` - Path to JSON file, or JSON contents
4. `GOOGLE_CLOUD_KEYFILE` - Path to JSON file, or JSON contents
5. `GOOGLE_APPLICATION_CREDENTIALS` - Path to JSON file

```ruby
require "google/cloud/bigquery"

ENV["BIGQUERY_PROJECT"] = "my-project-id"
ENV["BIGQUERY_CREDENTIALS"] = "path/to/keyfile.json"

bigquery = Google::Cloud::Bigquery.new
```

### Configuration

The **Project ID** and **Credentials JSON** can be configured instead of placing them in environment variables or providing them as arguments.

```ruby
require "google/cloud/bigquery"

Google::Cloud::Bigquery.configure do |config|
config.project_id = "my-project-id"
config.credentials = "path/to/keyfile.json"
end

bigquery = Google::Cloud::Bigquery.new
```

### Cloud SDK

This option allows for an easy way to authenticate during development. If
credentials are not provided in code or in environment variables, then Cloud SDK
credentials are discovered.

To configure your system for this, simply:

1. [Download and install the Cloud SDK](https://cloud.google.com/sdk)
2. Authenticate using OAuth 2.0 `$ gcloud auth login`
3. Write code as if already authenticated.

**NOTE:** This is _not_ recommended for running in production. The Cloud SDK
*should* only be used during development.

[gce-how-to]: https://cloud.google.com/compute/docs/authentication#using
[dev-console]: https://console.cloud.google.com/project

[enable-apis]: https://raw.githubusercontent.com/GoogleCloudPlatform/gcloud-common/master/authentication/enable-apis.png

[create-new-service-account]: https://raw.githubusercontent.com/GoogleCloudPlatform/gcloud-common/master/authentication/create-new-service-account.png
[create-new-service-account-existing-keys]: https://raw.githubusercontent.com/GoogleCloudPlatform/gcloud-common/master/authentication/create-new-service-account-existing-keys.png
[reuse-service-account]: https://raw.githubusercontent.com/GoogleCloudPlatform/gcloud-common/master/authentication/reuse-service-account.png

## Creating a Service Account

Google Cloud requires a **Project ID** and **Service Account Credentials** to
connect to the APIs. You will use the **Project ID** and **JSON key file** to
connect to most services with google-cloud-bigquery.

If you are not running this client on Google Compute Engine, you need a Google
Developers service account.

1. Visit the [Google Developers Console][dev-console].
1. Create a new project or click on an existing project.
1. Activate the slide-out navigation tray and select **API Manager**. From
here, you will enable the APIs that your application requires.

![Enable the APIs that your application requires][enable-apis]

*Note: You may need to enable billing in order to use these services.*

1. Select **Credentials** from the side navigation.

You should see a screen like one of the following.

![Create a new service account][create-new-service-account]

Here are the environment variables (in the order they are checked) for project ID:
![Create a new service account With Existing Keys][create-new-service-account-existing-keys]

1. BIGQUERY_PROJECT
2. GOOGLE_CLOUD_PROJECT
Find the "Add credentials" drop down and select "Service account" to be
guided through downloading a new JSON key file.

Here are the environment variables (in the order they are checked) for credentials:
If you want to re-use an existing service account, you can easily generate a
new key file. Just select the account you wish to re-use, and click "Generate
new JSON key":

1. `BIGQUERY_KEYFILE` - Path to JSON file
2. `GOOGLE_CLOUD_KEYFILE` - Path to JSON file
3. `BIGQUERY_KEYFILE_JSON` - JSON contents
4. `GOOGLE_CLOUD_KEYFILE_JSON` - JSON contents
![Re-use an existing service account][reuse-service-account]

The key file you download will be used by this library to authenticate API
requests and should be stored in a secure location.

## Troubleshooting

If you're having trouble authenticating you can ask for help by following the
{file:TROUBLESHOOTING.md Troubleshooting Guide}.
40 changes: 40 additions & 0 deletions google-cloud-bigquery/CODE_OF_CONDUCT.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
# Contributor Code of Conduct

As contributors and maintainers of this project, and in the interest of
fostering an open and welcoming community, we pledge to respect all people who
contribute through reporting issues, posting feature requests, updating
documentation, submitting pull requests or patches, and other activities.

We are committed to making participation in this project a harassment-free
experience for everyone, regardless of level of experience, gender, gender
identity and expression, sexual orientation, disability, personal appearance,
body size, race, ethnicity, age, religion, or nationality.

Examples of unacceptable behavior by participants include:

* The use of sexualized language or imagery
* Personal attacks
* Trolling or insulting/derogatory comments
* Public or private harassment
* Publishing other's private information, such as physical or electronic
addresses, without explicit permission
* Other unethical or unprofessional conduct.

Project maintainers have the right and responsibility to remove, edit, or reject
comments, commits, code, wiki edits, issues, and other contributions that are
not aligned to this Code of Conduct. By adopting this Code of Conduct, project
maintainers commit themselves to fairly and consistently applying these
principles to every aspect of managing this project. Project maintainers who do
not follow or enforce the Code of Conduct may be permanently removed from the
project team.

This code of conduct applies both within project spaces and in public spaces
when an individual is representing the project or its community.

Instances of abusive, harassing, or otherwise unacceptable behavior may be
reported by opening an issue or contacting one or more of the project
maintainers.

This Code of Conduct is adapted from the [Contributor
Covenant](http://contributor-covenant.org), version 1.2.0, available at
[http://contributor-covenant.org/version/1/2/0/](http://contributor-covenant.org/version/1/2/0/)

0 comments on commit 2dacea9

Please sign in to comment.