You can use Cloud Source Repositories for collaborative, version-controlled development of any app or service, including those that run on App Engine and Compute Engine. If you use Cloud Debugger, you can use Cloud Source Repositories and related tools in the Google Cloud Console to view debugging information alongside your code during app runtime.
If you're familiar with Git, you can get started quickly with
Cloud Source Repositories. For example, you can add Cloud Source Repositories to a
local Git repository as a remote, or you can connect it to a hosted repository
on GitHub or Bitbucket. From a local repository, you can use the standard set of
Git commands to interact with the repository in the cloud, including
You can create multiple repositories for a single Google Cloud project, allowing you to organize the code associated with your cloud project in whatever way works best for you.
Because repositories in Cloud Source Repositories are Git repositories, you can continue to use the editor of your choice to work on your code. For a more integrated experience, see the following topics:
Cloud Source Repositories also provide a source browser that you can use to view repository files from within the GCP Console.
Cloud Source Repositories automatically send logs on repository activity to Cloud Logging to help track and troubleshoot data access.
You can use these logs to review recent repository synchronization, repository access by other users, and administrative actions such as creations, deletions, and permission changes. Moreover, you can configure notification settings such that an alert is sent to you when an error is logged during a repository synchronization.
For more information regarding reading and writing log entries in Logging, see this quickstart. For information about possible billing configurations to manage storage of your logs, see Logging pricing.
Security key detection
Cloud Source Repositories offer security key detection to block
transactions that contain sensitive information. This feature is designed to
improve the security of your source code. Enabling it is a best practice. For
more information, see
Detecting security keys.