This page shows how to get started with the Cloud Client Libraries for the Google Cloud Scheduler API. Read more about the client libraries for Cloud APIs in Client Libraries Explained.
Installing the client library
For more information, see Setting Up a C# Development Environment.
For more information, see Setting Up Your Development Environment.
go get -u cloud.google.com/go/scheduler/apiv1
For more information, see Setting Up a Java Development Environment.
If you are using Maven,
add the following to your
<dependency> <groupId>com.google.cloud</groupId> <artifactId>google-cloud-scheduler</artifactId> <version>0.93.0-alpha</version> </dependency>
If you are using Gradle, add the following to your dependencies:
If you are using SBT, add the following to your dependencies:
libraryDependencies += "com.google.cloud" % "google-cloud-scheduler" % "0.93.0-alpha"
If you are using IntelliJ or Eclipse, you can add client libraries to your project using the following IDE plugins:
The plugins provide additional functionality, such as key management for service accounts. Refer to each plugin's documentation for details.
For more information, see Setting Up a Node.js Development Environment.
npm install --save @google-cloud/scheduler
composer require google/cloud-scheduler
For more information, see Setting Up a Python Development Environment.
Install this library in a virtualenv using
virtualenv is a tool to create isolated Python environments. The basic problem it addresses is one of dependencies and versions, and indirectly permissions.
pip install virtualenv virtualenv <your-env> source <your-env>/bin/activate <your-env>/bin/pip install google-cloud-scheduler
pip install virtualenv virtualenv <your-env> <your-env>\Scripts\activate <your-env>\Scripts\pip.exe install google-cloud-scheduler
For more information, see Setting Up a Ruby Development Environment.
gem install google-cloud-scheduler
Setting up authentication
To run the client library, you must first set up authentication by creating a service account with its key, and then setting an environment variable to point to that key. For more information, see the GCP authentication documentation .
- In the GCP Console, go to the Create
service account key page.
- From the Service account drop-down list, select New service account.
- In the Service account name field, enter a name .
- From the Role drop-down list, select Project > Owner.
- Click Create. A JSON file that contains your key downloads to your computer.
Create the service account. Replace [NAME] with your desired service account name.
gcloud iam service-accounts create [NAME]
Grant permissions to the service account. Replace [PROJECT_ID] with your project ID.
gcloud projects add-iam-policy-binding [PROJECT_ID] --member "serviceAccount: [NAME]@[PROJECT_ID].iam.gserviceaccount.com" --role "roles/owner"
Generate the key file. Replace [FILE_NAME] with a name for the key file.
gcloud iam service-accounts keys create [FILE_NAME].json --iam-account [NAME]@[PROJECT_ID].iam.gserviceaccount.com
Provide authentication credentials (the downloaded key) to your application code by setting the environment variable GOOGLE_APPLICATION_CREDENTIALS to point to the file where you stored the key. Replace [PATH] with the file path of the JSON file that contains your service account key, and [FILE_NAME] with the filename. This variable only applies to your current shell session, so if you open a new session, set the variable again.