|
1 | 1 | # Environment Variables
|
2 | 2 |
|
3 |
| -Nuxt VueFire automatically picks up a few environment variables to configure Firebase from your `.env` file. These usually take precedence over other options defined in `nuxt.config.ts`. They usually try to better support the existing Firebase environment variables. |
| 3 | +Nuxt VueFire automatically picks up a few environment variables to configure Firebase from your `.env` file. These usually take precedence over other options defined in `nuxt.config.ts`. They usually try to support the existing Firebase environment variables better. |
4 | 4 |
|
5 | 5 | ## Admin SDK
|
6 | 6 |
|
7 |
| -If you are doing SSR, you will need to provide the `GOOGLE_APPLICATION_CREDENTIALS` environment variable with the path to the service account file. This is usually a JSON file that you can download from the Firebase Console > Project Settings > Service Accounts > Generate new private key. |
| 7 | +During development, if you are doing SSR, you must provide the `GOOGLE_APPLICATION_CREDENTIALS` environment variable with the path to the service account file. This is usually a JSON file you can download from the Firebase Console > Project Settings > Service Accounts > Generate new private key. |
8 | 8 |
|
9 | 9 | ```
|
10 | 10 | GOOGLE_APPLICATION_CREDENTIALS=service-account.json
|
11 | 11 | ```
|
12 | 12 |
|
13 |
| -Make sure **to exclude both, the `.env` and `service-account.json` files from your version control system**. |
| 13 | +Ensure **to exclude the `.env` and `service-account.json` files from your version control system**. This variable will be automatically set on Firebase and Google Cloud deployments. |
14 | 14 |
|
15 | 15 | ::: tip
|
16 |
| -When deploying outside of Firebase, the `GOOGLE_APPLICATION_CREDENTIALS` environment variable has to be set manually. Instead of setting it to the path of the service account file, you can set it to the content of the file itself. Note it will have to fit in **one single line**. |
| 16 | + |
| 17 | +When deploying to something other than Firebase or Google Cloud, the `GOOGLE_APPLICATION_CREDENTIALS` environment variable must be set manually. Instead of setting it to the path of the service account file, you can set it to the content of the file itself. Note it will have to fit in **one single line**: |
| 18 | + |
| 19 | +``` |
| 20 | +GOOGLE_APPLICATION_CREDENTIALS='{"type":"service_account","project_id":"...","private_key_id":"...","private_key":"-----BEGIN PRIVATE KEY-----\n[redacted]\n-----END PRIVATE KEY-----\n"}' |
| 21 | +``` |
| 22 | + |
17 | 23 | :::
|
18 | 24 |
|
19 | 25 | ## AppCheck
|
20 | 26 |
|
21 |
| -If you are using AppCheck, you can specify the `FIREBASE_APPCHECK_DEBUG_TOKEN` environment variable to use a debug token in development. This is useful in **protected** CI environments or if you run multiple Firebase projects on your machine and don't want to rely on the local generation of the debug token |
| 27 | +If you are using AppCheck, you can specify the `FIREBASE_APPCHECK_DEBUG_TOKEN` environment variable to use a debug token in development. This is useful in **protected** CI environments or if you run multiple Firebase projects on your machine and don't want to rely on the local generation of the debug token. |
22 | 28 |
|
23 | 29 | ```
|
24 | 30 | FIREBASE_APPCHECK_DEBUG_TOKEN=********-****-****-****-************
|
25 | 31 | ```
|
26 | 32 |
|
27 | 33 | These can be generated on the Firebase Console > AppCheck > Apps > Manage Debug Tokens.
|
28 | 34 |
|
29 |
| -This variable will not be used in production unless `debug: true` is passed during a build or generate command. This allows you to still test locally using a debug token without having to worry about accidentally deploying it to production. |
| 35 | +This variable will not be used in production unless `debug: true` is passed during a build or generate command. This allows you to still test locally using a debug token without worrying about accidentally deploying it to production. |
30 | 36 |
|
31 | 37 | ## Debugging utilities
|
32 | 38 |
|
|
0 commit comments