-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathfirestore.rules
More file actions
70 lines (59 loc) · 2.02 KB
/
firestore.rules
File metadata and controls
70 lines (59 loc) · 2.02 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Helper function: Check if user is authenticated
function isAuthenticated() {
return request.auth != null;
}
// Helper function: Check if user is admin (checks user document role)
function isAdmin() {
return isAuthenticated() &&
get(/databases/$(database)/documents/users/$(request.auth.uid)).data.role == 'admin';
}
// Helper function: Check if user owns the resource
function isOwner(userId) {
return isAuthenticated() &&
request.auth.uid == userId;
}
// User profiles
match /users/{userId} {
allow read: if isOwner(userId) || isAdmin();
allow write: if isOwner(userId);
// Allow admins to update any user profile (for member level changes, role changes, etc.)
allow update: if isAdmin();
// User's chats
match /chats/{chatId} {
allow read, write: if isOwner(userId);
// Chat messages
match /messages/{messageId} {
allow read, write: if isOwner(userId);
}
}
}
// Context sources (admin manages, all authenticated users can read)
match /contextSources/{sourceId} {
allow read: if isAuthenticated();
allow write: if isAdmin();
}
// Chunks (read-only for authenticated users, system writes)
match /chunks/{chunkId} {
allow read: if isAuthenticated();
allow write: if false; // Only backend functions can write
}
// System configuration (admin only)
match /systemConfig/{doc} {
allow read: if isAdmin();
allow write: if isAdmin();
}
// System statistics cache (read by admins, write by backend functions)
match /systemStats/{doc} {
allow read: if isAdmin();
allow write: if false; // Only backend functions can write
}
// Journeys (read by authenticated users, write by admins)
match /journeys/{journeyId} {
allow read: if isAuthenticated();
allow write: if isAdmin();
}
}
}