Skip to main content

Google Cloud Storage

With Google Cloud Storage modules in Make, you can manage the buckets and objects in your Google Cloud Storage account.

To use the Google Cloud Storage modules, you must have a Google account, and a Google Cloud Storage project created in your Google Console. You can create an account at accounts.google.com. You need to add Make as an authorized data source in Google Cloud Storage.

Refer to the Google Cloud Storage API documentation for a list of available endpoints.

Note

Make's use and transfer of information received from Google APIs to any other app will adhere to Google API Services User Data Policy.

Connect Google Cloud Storage to Make

To establish the connection, you must:

Create and configure a Google Cloud Console project for Google Cloud Storage

Before you establish the connection in Make, you must create and configure a project in the Google Cloud Console to obtain your client credentials.

Create a Google Cloud Console project for Google Cloud Storage

To create a Google Cloud Console project:

  1. Log in to the Google Cloud Console using your Google credentials.

  2. In the top menu, click Select a project > New project.

  3. Enter a Project name and select the Location for your project.

  4. Click Create.

  5. In the top menu, check if your new project is selected in the Select a project dropdown. If not, select the project you just created.

Enable APIs for Google Cloud Console

To enable the required APIs:

  1. Open the left navigation menu and go to APIs & Services > Library.

  2. Search for and enable the following APIs: Cloud Resource Manager API, Cloud Pub/Sub API (only for the Watch Objects module).

Create your Google Cloud Storage client credentials

To create your client credentials:

  1. In the left sidebar, click Credentials.

  2. Click + Create Credentials > OAuth client ID.

  3. In the Application type dropdown, select Web application.

  4. Update the Name of your OAuth client. This will help you identify it in the console.

  5. In the Authorized redirect URIs section, click + Add URI and enter the following redirect URI: https://www.integromat.com/oauth/cb/google-custom.

  6. Click Create.

  7. Copy your Client ID and Client secret values and store them in a safe place.

You will use these values in the Client ID and Client Secret fields in Make.

Establish the connection with Google Cloud Storage in Make

To establish the connection in Make:

  1. Log in to your Make account, add a Google Cloud Storage module to your scenario, and click Create a connection.

    Note: If you add a module with an instant tag, click Create a webhook, then Create a connection.

  2. Optional: In the Connection name field, enter a name for the connection.

  3. In the Client ID and Client Secret fields, enter the values you copied in the Create your Google Cloud Storage client credentials section above.

  4. Optional: Switch on the Show advanced settings toggle and add the needed scopes.

  5. Click Sign in with Google.

  6. If prompted, authenticate your account and confirm access.

You have successfully established the connection. You can now edit your scenario and add more Google Cloud Storage modules. If your connection requires reauthorization at any point, follow the connection renewal steps here.

Build Google Cloud Storage Scenarios

After connecting the app, you can perform the following actions:

Buckets
  • Create a Bucket

    Note: Refer to Google documentation to learn more about buckets name.

    In the Labels field, specify key-value metadata pairs that allow you to group your buckets along with other Google Cloud resources such as virtual machine instances and persistent disks. For example, you can use labels to create a team key that has values alphabeta, and delta, and apply the team:alphateam:beta, and team:delta labels to different buckets in order to indicate which team is associated with those buckets. You can create a maximum of 64 labels.

    In the Predefined ACL field, select a predefined set of access controls for this bucket:

    • authenticatedRead: Project team owners get OWNER access, and allAuthenticatedUsers get READER access.

    • private: Project team owners get OWNER access.

    • projectPrivate: Project team members get access according to their roles.

    • publicRead: Project team owners get OWNER access, and allUsers get READER access.

    • publicReadWrite: Project team owners get OWNER access, and allUsers get WRITER access.

    In the Predefined Default Object ACL field, select a predefined set of default object access controls for this bucket:

    • authenticatedRead: Object owner gets OWNER access, and allAuthenticatedUsers get READER access.

    • bucketOwnerFullControl: Object owner gets OWNER access, and project team owners get OWNER access.

    • bucketOwnerRead: Object owner gets OWNER access, and project team owners get READER access.

    • private: Object owner gets OWNER access.

    • projectPrivate: Object owner gets OWNER access, and project team members get access according to their roles.

    • publicRead: Object owner gets OWNER access, and allUsers get READER access.

  • Get a Bucket

  • List Buckets

  • Update a Bucket

  • Delete an Empty Bucket

Objects
  • Watch Objects

    Note

    This app uses webhooks to trigger a scenario when an event occurs instantly. All webhook modules have an instant tag next to their name.

    When you create a Google Cloud Storage webhook in Make, it is attached automatically.

    To use this module, you must:

    • Enable Cloud Pub/Sub API

    • Assign a Pub/Sub Owner IAM role. To do it, in Google Cloud Console go to IAM & Admin > IAM.

  • Upload an Object

    Note: The maximum size is 5 TB.

  • Merge Objects

  • Get an Object

  • Search Objects

  • Clone an Object

  • Update an Object

  • Delete an Object

Bucket ACLs
  • Create a Bucket ACL

  • Get a Bucket ACL

  • List Bucket ACLs

  • Update a Bucket ACL

  • Delete a Bucket ACL

Bucket Default Object ACLs
  • Create a Bucket's Default Object ACL

  • Get a Bucket's Default Object ACLs

  • Update a Bucket's Default Object ACL

  • Delete a Bucket's Default Object ACL

Object ACLs
  • Create an Object ACL

  • Get an Object ACL

  • List Object ACLs

  • Update an Object ACL

  • Delete an Object ACL

Other
  • Make an API Call