For the life of me, I cannot understand why the following is resulting in a false
for allowing writes. Assume my users
collection is empty to start, and I am writing a document of the following form from my Angular frontend:
{
displayName: 'FooBar',
email: '[email protected]'
}
My current security rules:
service cloud.firestore {
match /databases/{database}/documents {
match /users/{userId} {
function isAdmin() {
return resource.data.role == 'ADMIN';
}
function isEditingRole() {
return request.resource.data.role != null;
}
function isEditingOwnRole() {
return isOwnDocument() && isEditingRole();
}
function isOwnDocument() {
return request.auth.uid == userId;
}
allow read: if isOwnDocument() || isAdmin();
allow write: if !isEditingOwnRole() && (isOwnDocument() || isAdmin());
}
}
}
In general, I want no users to be able to edit their own role. Regular users can edit their own document otherwise, and admins can edit anyone's.
Stubbing isEditingRole()
for false
gives the expected result, so I've narrowed it down to that expression.
The write keeps coming back false, and I cannot determine why. Any ideas or fixes would be helpful!
Edit 1
Things I've tried:
function isEditingRole() {
return request.resource.data.keys().hasAny(['role']);
}
and
function isEditingRole() {
return 'role' in request.resource.data;
}
and
function isEditingRole() {
return 'role' in request.resource.data.keys();
}
Edit 2
Note that eventually, admins will set a role for users, so a role could eventually exist on a document. This means that, according to the Firestore docs below, the request will have a role
key, even if wasn't in the original request.
Fields not provided in the request which exist in the resource are added to
request.resource.data
. Rules can test whether a field is modified by comparingrequest.resource.data.foo
toresource.data.foo
knowing that every field in theresource
will also be present inrequest.resource
even if it was not submitted in the write request.
According to that, I think the three options from "Edit 1" are ruled out. I did try the suggestion of request.resource.data.role != resource.data.role
and that's not working either... I'm at a loss and am beginning to wonder if there's actually a bug in Firestore.
Your rules will be a lot more readable and maintainable if you create a custom function to check for updates. For example:
service cloud.firestore {
match /databases/{database}/documents {
function isUpdatingField(fieldName) {
return (!(fieldName in resource.data) && fieldName in request.resource.data) || resource.data[fieldName] != request.resource.data[fieldName];
}
match /users/{userId} {
// Read rules here ...
allow write: if !isUpdatingField("role") && !isUpdatingField("adminOnlyAttribute");
}
}
}
So in the end, it seems I was assuming that resource.data.nonExistentField == null
would return false
, when it actually returns an Error
(according to this and my tests). So my original solution may have been running into that. This is puzzling because the opposite should work according to the docs, but maybe the docs are referring to a value being "non-existent", rather than the key -- a subtle distinction.
I still don't have 100% clarity, but this is what I ended up with that worked:
function isAddingRole() {
return !('role' in resource.data) && 'role' in request.resource.data;
}
function isChangingRole() {
return 'role' in resource.data && 'role' in request.resource.data && resource.data.role != request.resource.data.role;
}
function isEditingRole() {
return isAddingRole() || isChangingRole();
}
Another thing that still puzzles me is that, according to the docs, I shouldn't need the && 'role' in request.resource.data
part in isChangingRole()
, because it should be inserted automatically by Firestore. Though this didn't seem to be the case, as removing it causes my write to fail for permissions issues.
It could likely be clarified/improved by breaking the write out into the create
, update
, and delete
parts, instead of just allow write: if !isEditingOwnRole() && (isOwnDocument() || isAdmin());
.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With