-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathfirestore.rules
71 lines (56 loc) · 2.28 KB
/
firestore.rules
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
function isEboard(userId) {
return get(/databases/$(database)/documents/users/$(userId)).data.roles.eboard == true;
}
function isRecruitment(userId) {
return get(/databases/$(database)/documents/users/$(userId)).data.roles.recruitmentteam == true;
}
function isAdmin(userId) {
return get(/databases/$(database)/documents/users/$(userId)).data.roles.admin == true;
}
match /website/{document=**} {
allow read: if true;
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid);
}
match /users/{userId} {
allow read: if true;
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid) || (request.auth.uid == userId);
}
match /inquisitor/{document=**} {
allow read: if request.auth != null;
match /generalSettings {
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid);
}
match /applicationFormConfig {
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid);
}
match /levelConfig {
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid);
}
match /data/questions/{question} {
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid);
}
match /data/applications/{applicationId} {
allow write: if isRecruitment(request.auth.uid) || isAdmin(request.auth.uid) || isEboard(request.auth.uid)|| (request.auth.uid == applicationId);
}
match /data/timeslots/{timeslot} {
allow write: if request.resource == null || request.resource.data.time is number;
}
}
match /config/{document=**} {
allow read: if true;
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid);
}
match /uids/{document=**} {
allow read: if true;
allow write: if isAdmin(request.auth.uid) || isEboard(request.auth.uid);
}
// service accounts can still read when it's set to false
// this way normal users can't access session data but Authenticator can
match /authSessions/{document=**} {
allow read, write: if false;
}
}
}