什么是将Cloud SQL数据库代理到Bitbucket管道的正确方法?

我有一个Google Cloud SQL Postgres实例(还尝试了一个MySQL数据库) .

打开所有连接端口允许bitbucket管道根据此示例管道正确部署基于Django的Google App Engine项目 - https://github.com/GoogleCloudPlatform/continuous-deployment-bitbucket/blob/master/bitbucket-pipelines.yml

但是,当我尝试限制对Cloud SQL实例的访问并使用cloud_sql_proxy时,我可以在本地正确部署,但Bitbucket总是无法找到SQL Server

我的bitbucket-pipelines.yml看起来像这样:

- export CLOUDSDK_CORE_DISABLE_PROMPTS=1
        # Google Cloud SDK is pinned for build reliability. Bump if the SDK complains about deprecation.
        - SDK_VERSION=127.0.0
        - SDK_FILENAME=google-cloud-sdk-${SDK_VERSION}-linux-x86_64.tar.gz
        - curl -O -J https://dl.google.com/dl/cloudsdk/channels/rapid/downloads/${SDK_FILENAME}
        - tar -zxvf ${SDK_FILENAME} --directory ${HOME}
        - export PATH=${PATH}:${HOME}/google-cloud-sdk/bin
        # Install Google App Engine SDK
        - GAE_PYTHONPATH=${HOME}/google_appengine
        - export PYTHONPATH=${PYTHONPATH}:${GAE_PYTHONPATH}
        - python scripts/fetch_gae_sdk.py $(dirname "${GAE_PYTHONPATH}")
        - echo "${PYTHONPATH}" && ls ${GAE_PYTHONPATH}
        # Install app & dev dependencies, test, deploy, test deployment
        - echo "key = '${GOOGLE_API_KEY}'" > api_key.py
        - echo ${GOOGLE_CLIENT_SECRET} > client-secret.json
        - gcloud auth activate-service-account --key-file client-secret.json
        - wget https://dl.google.com/cloudsql/cloud_sql_proxy.linux.amd64 -O cloud_sql_proxy
        - chmod +x cloud_sql_proxy
        - ./cloud_sql_proxy -instances=google-cloud-project-name:us-west1:google-cloud-sql-database-name=tcp:5432 &
        - gcloud app deploy --no-promote --project google-cloud-project-name --quiet

此时,我希望能够访问SQL数据库,但它似乎不可用,并且我的部署无法找到本地代理数据库