diff --git a/.firebase/hosting.YnVpbGQ.cache b/.firebase/hosting.YnVpbGQ.cache new file mode 100644 index 0000000..8b630d0 --- /dev/null +++ b/.firebase/hosting.YnVpbGQ.cache @@ -0,0 +1,14 @@ +asset-manifest.json,1693301646560,eb6a9d1d6b255e05173150771f7caeea0f749f7fec663b1caf2e9f1aafe5507c +index.html,1693301646560,93162a33c9fd85fc1ccdbe78306001966d24973817819ce83635806371056ae2 +logo192.png,1693301635560,76c449ccb9cd117c2f2338f091b18f7050f3210e249b2228f5c81b23f34377cd +favicon.ico,1693301635560,c599b7a91ab3627e3538125d9f40adc2d4bf949046984262670545dc7738af06 +logo512.png,1693301635560,7779210d56c1f3741e2e487799fe3092def4fa6ac450a60532b807c3a8971205 +manifest.json,1693301635560,0958a5e0c831126100c8c2d06a6bbaa665a3900f21aaff4130238a6f5a113aa1 +robots.txt,1693301635564,2544ca049f223a42bff01f72ad930a5edba75bbb7199d0f8430a02ff5aca16ec +static/js/787.fe1675bb.chunk.js,1693301646568,09044c094544c6017476721265373bd92ca82ed8434b6f9c010fe07087e14d49 +static/js/787.fe1675bb.chunk.js.map,1693301646568,683229073c7ef9ee1a721578162763c4560a3420f836b325c01601e50f646529 +static/js/main.4f963e35.js.LICENSE.txt,1693301646564,7391be9bb57c056cb8cbea750c00cfe14652bbafff23b9f59dd95844217d86cc +static/css/main.7eebc124.css,1693301646564,de0cdeca7db0156d3c1b1c16bc8f8e9547f69e3a89e67b2eb3f82579b8260b64 +static/js/main.4f963e35.js,1693301646568,fade2e1c47e5a8a8e6292a83b0a049fc212b43c3e46a21331e1158835040c2f4 +static/css/main.7eebc124.css.map,1693301646568,9d3793f92543f0a71c40bd89c2a0bcc0c1e55ce49ca6bdc8d2ca0955c20b9613 +static/js/main.4f963e35.js.map,1693301646568,753d464f76b1191032d5d6731c2e30f6231087a8d545552e34dceab13a7289ad diff --git a/.firebaserc b/.firebaserc new file mode 100644 index 0000000..fb01799 --- /dev/null +++ b/.firebaserc @@ -0,0 +1,5 @@ +{ + "projects": { + "default": "rayyan-h-tafe-nsw" + } +} diff --git a/firebase.json b/firebase.json new file mode 100644 index 0000000..992cfce --- /dev/null +++ b/firebase.json @@ -0,0 +1,23 @@ +{ + "firestore": { + "rules": "firestore.rules", + "indexes": "firestore.indexes.json" + }, + "hosting": { + "public": "build", + "ignore": [ + "firebase.json", + "**/.*", + "**/node_modules/**" + ], + "rewrites": [ + { + "source": "**", + "destination": "/index.html" + } + ] + }, + "storage": { + "rules": "storage.rules" + } +} diff --git a/firestore.indexes.json b/firestore.indexes.json new file mode 100644 index 0000000..415027e --- /dev/null +++ b/firestore.indexes.json @@ -0,0 +1,4 @@ +{ + "indexes": [], + "fieldOverrides": [] +} diff --git a/firestore.rules b/firestore.rules new file mode 100644 index 0000000..8a1e6f7 --- /dev/null +++ b/firestore.rules @@ -0,0 +1,19 @@ +rules_version = '2'; + +service cloud.firestore { + match /databases/{database}/documents { + + // This rule allows anyone with your Firestore database reference to view, edit, + // and delete all data in your Firestore database. It is useful for getting + // started, but it is configured to expire after 30 days because it + // leaves your app open to attackers. At that time, all client + // requests to your Firestore database will be denied. + // + // Make sure to write security rules for your app before that time, or else + // all client requests to your Firestore database will be denied until you Update + // your rules + match /{document=**} { + allow read, write: if request.time < timestamp.date(2023, 9, 28); + } + } +} \ No newline at end of file diff --git a/src/App.js b/src/App.js index d36032d..25e7419 100644 --- a/src/App.js +++ b/src/App.js @@ -9,7 +9,7 @@ import Container from "react-bootstrap/Container"; import { Navbar } from "react-bootstrap/esm"; function App() { - const FBapp = initializeApp(firebaseConfig); + const FBapp = initializeApp(FirebaseConfig); return (
diff --git a/storage.rules b/storage.rules new file mode 100644 index 0000000..f08744f --- /dev/null +++ b/storage.rules @@ -0,0 +1,12 @@ +rules_version = '2'; + +// Craft rules based on data in your Firestore database +// allow write: if firestore.get( +// /databases/(default)/documents/users/$(request.auth.uid)).data.isAdmin; +service firebase.storage { + match /b/{bucket}/o { + match /{allPaths=**} { + allow read, write: if false; + } + } +}