I have switched to using Firebase for hosting my website, a welcome change from the mayhem that is AppEngine. I have been reading through the documentation and have seen that Firebase has a serve cmd line tool which creates a server on my localhost but with AppEngine I was able to run a test server that looked like 192.168.0.00:8080 which allowed me to view my website on my phone and other devices connected to my network.
Is there a way to set this up with Firebase? Or maybe a better way to test my website (with it still being private) on multiple devices connected to the same network? Thanks!
Related
I have a web app with a React frontend on Firebase that connects to a Django backend running on Google App Engine.
I have this setup duplicated for a "staging" environment. The problem is that anyone can access this staging environment.
I'd like to set this up so that you need to be on our VPN to access it.
Can someone point me in the right direction to setup this VPN and move the staging environment behind it?
If you are using Firebase Hosting I believe there's no other way to restrict the access and it does not have a firewall feature. You should use authentication method to restrict and limit who can access your web app.
In App Engine, you can restrict the access of your web server/application by using the following:
App Engine Firewall - #JohnHanley answer, control which using IP addresses can connect to the app.
Identity Aware Proxy - without using VPN you can limit who can access of your App Engine by using their user account. IAP is free but when used with Compute Engine, the required load balancing and firewall configuration may incur additional costs.
App Engine with Load Balancer - to secure and make your App Engine(Standard & Flexible) receives only internal and Cloud Load Balancing traffic
I'd like to set this up so that you need to be on our VPN to access
it.
You cannot limit access to just your VPN. App Engine is in Google's network and you cannot limit access based upon a VPN.
You can use App Engine firewall rules to control which IP addresses can connect to the service. Firebase however does not have firewall rules.
If the public side of your Internet router has a static IP address, then this is simple to setup.
I recommend using authorization to limit who can access your services.
I have made an angular application that will run in a secured network. This application also shows push notifications upon some operations. But the problem is that this application is showing push notifications when run outside the secured environment and not in the secured environment.
By secured network / environment I mean, there will be checks on the eligible links that a user can open on the secured network. So, I have a doubt that the service, which could be a HTTP link or some other protocol, that is responsible for getting the push notification to the machine and browser from web push servers need to be whitelisted by the administrator. And I don't know what are those links and ports and they are not mentioned anywhere (as per my knowledge). I need those links and ports for chrome, firefox and edge web push service which could improve this situation.
Thanks for any help in advance.
I have a bucket in Google Cloud which I have upload Angular template i.e. http://digitaldevnet.appspot.com
then I have VM instance IP where I have WordPress website i.e.
http://35.200.194.201
I found different tutorials where you can connect domain to Google Cloud hosting
but I want to connect appspot link i.e. http://digitaldevnet.appspot.com to WordPress site
can be connected and once we browse it should work as VM may be offline sometime.
Any recommendation and tutorial, please let me know
You would need to set up a Load balancer in order to direct your traffic between the GCE instance and the bucket, you can find the instructions for this over here.
Nevertheless, it would be a bit complicated as you would need to set up the configuration and some health checks so that the GCE instance is not accessible when it's down.
Hope you find this useful.
I want to execute espresso UI test on firebase test cloud devices and my staging environment is a VPN network. So, Is it possible to configure VPN on firebase test cloud or can we configure cisco any connect VPN on firebase test cloud devices?
Thanks!
You could try whitelisting the Test Labs IP addresses for VPN-less access:
https://firebase.google.com/docs/test-lab/android/get-started#ip-blocks
Sorry, there's currently no way to configure the network for devices in Firebase Test Lab. They are only able to access publicly available network resources.
Always feel free to file a feature request to see if there's anything that can be done to suit your needs.
I'm going to be making a fun Python project for myself. This is non concurrent. Only me will use this. I would have a desktop version of the app, with the DB on it. And then my phone would have an app that accesses the information on the DB over network and display the data I want.
For most of the SQLite checklist, seems like a perfect fit for a single user super small project. Except the network part is confusing. Some say no, or yes it's doable but not great. What's the consensus here? If I want to access my DB from my phone from anywhere, is SQLite capable? What problems could I run into with this...
You would have to host your DB somewhere accessible from the internet. By doing this, you open it up for attacks should someone get your server address. You can secure this by setting up a VPN from your phone to the PC, this would allows you to run the SQL server as just a local instance only accessed if you're on the VPN. SQL Lite should work just fine under a VPN setup since it won't require the server to have an open connection out to the internet.
As for problems. If you are somewhere where you cannot establish the VPN connection (firewall, port blocked, etc) you will be cut off from your server.