Cloud Source Repositories provides fully featured, private Git repositories hosted on Google Cloud.
You can use Cloud Source Repositories for collaborative, version-controlled development of any app or service, including those that run on App Engine and Compute Engine.
If you're familiar with Git, you can get started quickly with
Cloud Source Repositories. For example, you can add Cloud Source Repositories to a
local Git repository as a remote, or you can connect it to a hosted repository
on GitHub or Bitbucket. From a local repository, you can use the standard set of
Git commands to interact with the repository in the cloud, including
You can create multiple repositories for a single Google Cloud project, allowing you to organize the code associated with your cloud project in whatever way works best for you.
You can connect an existing GitHub or Bitbucket repository to Cloud Source Repositories. Connected repositories are synchronized with Cloud Source Repositories automatically.
Because repositories in Cloud Source Repositories are Git repositories, you can continue to use the editor of your choice to work on your code. For a more integrated experience, see the following topics:
Cloud Source Repositories also provide a source browser that you can use to view repository files from within the GCP Console.
Cloud Source Repositories automatically send logs on repository activity to Cloud Logging to help track and troubleshoot data access.
You can use these logs to review recent repository synchronization, repository access by other users, and administrative actions such as creations, deletions, and permission changes. Moreover, you can configure notification settings such that an alert is sent to you when an error is logged during a repository synchronization.
For more information regarding reading and writing log entries in Logging, see this quickstart. For information about possible billing configurations to manage storage of your logs, see Logging pricing.
Security key detection
Cloud Source Repositories offer security key detection to block
transactions that contain sensitive information. This feature is designed to
improve the security of your source code. Enabling it is a best practice. For
more information, see
Detecting security keys.
- Learn how to set up a repository.
- Learn how to add a repository as a remote.
- Learn how to connect a repository hosted on GitHub or Bitbucket.
- Learn how to use the source browser.