-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Firebase App Check #17095
Milestone
Comments
github-actions
bot
added
forward/review
In review; remove label to forward
service/firebase
labels
Jan 24, 2024
This was referenced Jan 31, 2024
This was referenced Feb 9, 2024
Merged
This was referenced Feb 12, 2024
This was referenced Feb 20, 2024
This was referenced Mar 7, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Community Note
Description
Support Firebase App Check in Terraform. App Check helps to protect your API resources from abuse by preventing unauthorized clients from accessing your backend resources. To use App Check, one should
New or Affected Resource(s)
Each attestation provider should have a dedicated Terraform resource. I'm planning to start with
google_firebase_app_check_play_integrity_config
for Android Play Integritygoogle_firebase_app_check_device_check_config
for Apple Device Checkgoogle_firebase_app_check_app_attest_config
for Apple App Attestgoogle_firebase_app_check_recaptcha_enterprise
for Web reCAPTCHA Enterprisegoogle_firebase_app_check_recaptcha_v3
for Web reCAPTCHA v3google_firebase_app_check_debug_token
for debug tokensFor protected APIs, there will be a dedicated Terraform resource
google_firebase_app_check_service_config
https://firebase.google.com/docs/app-check/enable-enforcementPotential Terraform Configuration
To use the App Attest provider and Firestore as an example
References
b/322602158
The text was updated successfully, but these errors were encountered: