From a26bdf511782dbd80bab594ad41ebbda9af08eac Mon Sep 17 00:00:00 2001 From: osjbkm <112592792+osjbkm@users.noreply.github.com> Date: Thu, 22 May 2025 10:46:49 +0900 Subject: [PATCH] Update mobile-builder-connectivity-requirements.md Added information regarding proxy settings in machine.config for the Compiler service (related to RPM-5856) --- .../setup/mobile-builder-connectivity-requirements.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/src/setup-infra-platform/setup/mobile-builder-connectivity-requirements.md b/src/setup-infra-platform/setup/mobile-builder-connectivity-requirements.md index e345d3f02..b7a5a0392 100644 --- a/src/setup-infra-platform/setup/mobile-builder-connectivity-requirements.md +++ b/src/setup-infra-platform/setup/mobile-builder-connectivity-requirements.md @@ -40,6 +40,16 @@ Amazon CloudFront, which MABS uses, is a distributed service with the endpoint I The simplest, and potentially most secure way, of meeting this requirement is a proxy. When using a proxy to mediate the access with the internet, ensure it allows access to the **nativebuilder.api.outsystems.com** URL and any other URL the MABS service might require from the Internet for normal functioning. +Starting in Platform Server version 11.26, when publishing a mobile application, it is now the Compiler service that contacts MABS to build and generate the mobile application. To ensure that the Compiler service is able to use the proxy, update the machine.config file in the Deployment Controller server. Add the below code under the configuration node + +``` + + + + + +``` + ## Use a firewall to limit access to a domain If you have a firewall which allows limiting access by domain, use the firewall to limit access to the MABS domain. This opens your infrastructure only to the Cloud Front's IPs.