/app-cicd-demo

Primary LanguageGoApache License 2.0Apache-2.0

Cloud Run Template Microservice

A template repository for a Cloud Run microservice, written in Go.

Run on Google Cloud

Prerequisite

  • Enable the Cloud Run API via the console or CLI:
gcloud services enable run.googleapis.com

Features

  • gorilla/mux: A request router and dispatcher
  • Buildpack support Tooling to build production-ready container images from source code and without a Dockerfile
  • Dockerfile: Container build instructions
  • SIGTERM handler: Catch termination signal for cleanup before Cloud Run stops the container
  • Service metadata: Access service metadata, project Id and region, at runtime
  • Structured logging w/ Log Correlation JSON formatted logger, parsable by Cloud Logging, with automatic correlation of container logs to a request log.
  • Unit and System tests Basic unit and system tests setup for the microservice

Local Development

Cloud Code

This template works with Cloud Code, an IDE extension to let you rapidly iterate, debug, and run code on Kubernetes and Cloud Run.

Learn how to use Cloud Code for:

CLI tooling.

Local development

  1. Set Project Id:

    export GOOGLE_CLOUD_PROJECT=<GCP_PROJECT_ID>
  2. Build and Start the server:

    go build -o server && ./server

Deploying a Cloud Run service

  1. Set Project Id:

    export GOOGLE_CLOUD_PROJECT=<GCP_PROJECT_ID>
  2. Enable the Artifact Registry API:

    gcloud services enable artifactregistry.googleapis.com
  3. Create an Artifact Registry repo:

    export REPOSITORY="samples"
    export REGION=us-central1
    gcloud artifacts repositories create $REPOSITORY --location $REGION --repository-format "docker"
  4. Use the gcloud credential helper to authorize Docker to push to your Container Registry:

     gcloud auth configure-docker
  5. Build and push the container using docker:

    gcloud builds submit --pack image=us-central1-docker.pkg.dev/$GOOGLE_CLOUD_PROJECT/samples/microservice-template:manual
  6. Deploy to Cloud Run:

    gcloud run deploy microservice-template \
      --image us-central1-docker.pkg.dev/$GOOGLE_CLOUD_PROJECT/samples/microservice-template:manual

Run sample tests

  1. Pass credentials via GOOGLE_APPLICATION_CREDENTIALS env var:

    export GOOGLE_APPLICATION_CREDENTIALS="[PATH]"
  2. Set Project Id:

    export GOOGLE_CLOUD_PROJECT=<GCP_PROJECT_ID>
  3. Run unit tests

    go test ./...
  4. Run system tests

    gcloud builds submit \
        --config advance.cloudbuild.yaml \
        --substitutions=COMMIT_SHA=manual,REPO_NAME=manual

    The Cloud Build configuration file will build and deploy the containerized service to Cloud Run, run tests, then clean up testing resources. This configuration restricts public access to the test service. Therefore, service accounts need to have the permission to issue ID tokens for request authorization:

    • Enable Cloud Run, Cloud Build, Artifact Registry, and IAM APIs:

      gcloud services enable run.googleapis.com cloudbuild.googleapis.com iamcredentials.googleapis.com artifactregistry.googleapis.com
    • Set environment variables.

      export PROJECT_ID="$(gcloud config get-value project)"
      export PROJECT_NUMBER="$(gcloud projects describe $(gcloud config get-value project) --format='value(projectNumber)')"
    • Create an Artifact Registry repo (or use another already created repo):

      export REPOSITORY="samples"
      export REGION=us-central1
      gcloud artifacts repositories create $REPOSITORY --location $REGION --repository-format "docker"
    • Create service account token-creator with Service Account Token Creator and Cloud Run Invoker roles.

      gcloud iam service-accounts create token-creator
      
      gcloud projects add-iam-policy-binding $PROJECT_ID \
          --member="serviceAccount:token-creator@$PROJECT_ID.iam.gserviceaccount.com" \
          --role="roles/iam.serviceAccountTokenCreator"
      gcloud projects add-iam-policy-binding $PROJECT_ID \
          --member="serviceAccount:token-creator@$PROJECT_ID.iam.gserviceaccount.com" \
          --role="roles/run.invoker"
    • Add Service Account Token Creator role to the Cloud Build service account.

      gcloud projects add-iam-policy-binding $PROJECT_ID \
          --member="serviceAccount:$PROJECT_NUMBER@cloudbuild.gserviceaccount.com" \
          --role="roles/iam.serviceAccountTokenCreator"

Maintenance & Support

This repo performs basic periodic testing for maintenance. Please use the issue tracker for bug reports, features requests and submitting pull requests.

Contributions

Please see the contributing guidelines

License

This library is licensed under Apache 2.0. Full license text is available in LICENSE.