diff --git a/.firebase/hosting.YnVpbGQ.cache b/.firebase/hosting.YnVpbGQ.cache new file mode 100644 index 0000000..3230546 --- /dev/null +++ b/.firebase/hosting.YnVpbGQ.cache @@ -0,0 +1,11 @@ +asset-manifest.json,1699361709010,ca3e067036e4a9ef0666735fd834e46a30ff2eef7634da76f95f44586bff6b77 +index.html,1699361709006,34ab037ddf6593464b2aaad39398628632bf32c0b5bda4c7d4bdb6dba85ce51b +manifest.json,1699361671382,0958a5e0c831126100c8c2d06a6bbaa665a3900f21aaff4130238a6f5a113aa1 +robots.txt,1699361671382,2544ca049f223a42bff01f72ad930a5edba75bbb7199d0f8430a02ff5aca16ec +static/js/787.fe1675bb.chunk.js,1699361709054,09044c094544c6017476721265373bd92ca82ed8434b6f9c010fe07087e14d49 +static/js/787.fe1675bb.chunk.js.map,1699361709062,683229073c7ef9ee1a721578162763c4560a3420f836b325c01601e50f646529 +static/js/main.1c6a2750.js.LICENSE.txt,1699361709054,c8bddbf75def1f05e0571ef84d5053e7a4d4156dfae8ebc4a275dab4d285a1ec +static/css/main.6ccd65a8.css,1699361709054,265f9979f4391283252fdae35b22ffd098a887c8d5f299ccf72fa2f4335c8303 +static/css/main.6ccd65a8.css.map,1699361709054,6d6f3434075d5f325c92f6ab942391103fcbf237317eb7d825dd42e97c416961 +static/js/main.1c6a2750.js,1699361709054,946fa60316004b4cce42d0a08e826c684e927a5628e9d6d27d702a4d01d88b87 +static/js/main.1c6a2750.js.map,1699361709058,b0bd0dd6072e362ed23aa06d50e2e3e5664db2327b60ece6493e9b56fa39f248 diff --git a/.firebaserc b/.firebaserc new file mode 100644 index 0000000..3f31874 --- /dev/null +++ b/.firebaserc @@ -0,0 +1,5 @@ +{ + "projects": { + "default": "rayyan-h-tafe-nsw-2" + } +} diff --git a/firebase.json b/firebase.json new file mode 100644 index 0000000..992cfce --- /dev/null +++ b/firebase.json @@ -0,0 +1,23 @@ +{ + "firestore": { + "rules": "firestore.rules", + "indexes": "firestore.indexes.json" + }, + "hosting": { + "public": "build", + "ignore": [ + "firebase.json", + "**/.*", + "**/node_modules/**" + ], + "rewrites": [ + { + "source": "**", + "destination": "/index.html" + } + ] + }, + "storage": { + "rules": "storage.rules" + } +} diff --git a/firestore.rules b/firestore.rules new file mode 100644 index 0000000..6316ef0 --- /dev/null +++ b/firestore.rules @@ -0,0 +1,19 @@ +rules_version = '2'; + +service cloud.firestore { + match /databases/{database}/documents { + + // This rule allows anyone with your Firestore database reference to view, edit, + // and delete all data in your Firestore database. It is useful for getting + // started, but it is configured to expire after 30 days because it + // leaves your app open to attackers. At that time, all client + // requests to your Firestore database will be denied. + // + // Make sure to write security rules for your app before that time, or else + // all client requests to your Firestore database will be denied until you Update + // your rules + match /{document=**} { + allow read, write: if request.time < timestamp.date(2023, 12, 7); + } + } +} \ No newline at end of file diff --git a/storage.rules b/storage.rules new file mode 100644 index 0000000..f08744f --- /dev/null +++ b/storage.rules @@ -0,0 +1,12 @@ +rules_version = '2'; + +// Craft rules based on data in your Firestore database +// allow write: if firestore.get( +// /databases/(default)/documents/users/$(request.auth.uid)).data.isAdmin; +service firebase.storage { + match /b/{bucket}/o { + match /{allPaths=**} { + allow read, write: if false; + } + } +}