Control access to specific fields
This page builds on the concepts in Structuring Security Rules and Writing Conditions for Security Rules to explain how you can use Firestore Security Rules to create rules that allow clients to perform operations on some fields in a document but not others.
There may be times when you want to control changes to a document not at the document level but at the field level.
For instance, you might want to allow a client to create or change a document, but not allow them to edit certain fields in that document. Or you may wish to enforce that any document that a client always creates contains a certain set of fields. This guide covers how you can accomplish some of these tasks using Firestore Security Rules.
Allowing read access only for specific fields
Reads in Firestore are performed at the document level. You either retrieve the full document, or you retrieve nothing. There is no way to retrieve a partial document. It is impossible using security rules alone to prevent users from reading specific fields within a document.
If there are certain fields within a document that you want to keep hidden from
some users, the best way would be to put them in a separate document. For
instance, you might consider creating a document in a private
subcollection
like so:
/employees/{emp_id}
name: "Alice Hamilton",
department: 461,
start_date: <timestamp>
/employees/{emp_id}/private/finances
salary: 80000,
bonus_mult: 1.25,
perf_review: 4.2
Then you can add security rules that have different levels of access for the
two collections. In this example, we're using custom auth claims
to say that only users with the custom auth claim role
equal to Finance
can
view an employee's financial information.
service cloud.firestore {
match /databases/{database}/documents {
// Allow any logged in user to view the public employee data
match /employees/{emp_id} {
allow read: if request.resource.auth != null
// Allow only users with the custom auth claim of "Finance" to view
// the employee's financial data
match /private/finances {
allow read: if request.resource.auth &&
request.resource.auth.token.role == 'Finance'
}
}
}
}
Restricting fields on document creation
Firestore is schemaless, meaning that there are no restrictions at the database level for what fields a document contains. While this flexibility can make development easier, there will be times when you want to ensure that clients can only create documents that contain specific fields, or don't contain other fields.
You can create these rules by examining the keys
method of the
request.resource.data
object. This is a list of all fields that the client
is attempting to write in this new document. By combining this set of fields
with functions like hasOnly()
or hasAny()
,
you can add in logic that restricts the types of documents a user can add to
Firestore.
Requiring specific fields in new documents
Let's say you wanted to make sure that all documents created in a restaurant
collection contained at least a name
, location
, and city
field. You could
do that by calling hasAll()
on the list of keys in the new document.
service cloud.firestore {
match /databases/{database}/documents {
// Allow the user to create a document only if that document contains a name
// location, and city field
match /restaurant/{restId} {
allow create: if request.resource.data.keys().hasAll(['name', 'location', 'city']);
}
}
}
This allows restaurants to be created with other fields as well, but it ensures that all documents created by a client contain at least these three fields.
Forbidding specific fields in new documents
Similarly, you can prevent clients from creating documents that contain
specific fields by using hasAny()
against a list of forbidden fields. This method evaluates to true if a
document contains any of these fields, so you probably want to negate the
result in order to forbid certain fields.
For instance, in the following example, clients are not allowed to create a
document that contains an average_score
or rating_count
field since these
fields will be added by a server call at a later point.
service cloud.firestore {
match /databases/{database}/documents {
// Allow the user to create a document only if that document does *not*
// contain an average_score or rating_count field.
match /restaurant/{restId} {
allow create: if (!request.resource.data.keys().hasAny(
['average_score', 'rating_count']));
}
}
}
Creating an allowlist of fields for new documents
Instead of forbidding certain fields in new documents, you might want to create
a list of only those fields that are explicitly allowed in new documents. Then
you can use the hasOnly()
function to make sure that any new documents created contain just these fields
(or a subset of these fields) and no other.
service cloud.firestore {
match /databases/{database}/documents {
// Allow the user to create a document only if that document doesn't contain
// any fields besides the ones listed below.
match /restaurant/{restId} {
allow create: if (request.resource.data.keys().hasOnly(
['name', 'location', 'city', 'address', 'hours', 'cuisine']));
}
}
}
Combining required and optional fields
You can combine hasAll
and hasOnly
operations together in your security
rules to require some fields and allow others. For instance, this example
requires that all new documents contain the name
, location
, and city
fields, and optionally allows the address
, hours
, and cuisine
fields.
service cloud.firestore {
match /databases/{database}/documents {
// Allow the user to create a document only if that document has a name,
// location, and city field, and optionally address, hours, or cuisine field
match /restaurant/{restId} {
allow create: if (request.resource.data.keys().hasAll(['name', 'location', 'city'])) &&
(request.resource.data.keys().hasOnly(
['name', 'location', 'city', 'address', 'hours', 'cuisine']));
}
}
}
In a real-world scenario, you may wish to move this logic into a helper function to avoid duplicating your code and to more easily combine the optional and required fields into a single list, like so:
service cloud.firestore {
match /databases/{database}/documents {
function verifyFields(required, optional) {
let allAllowedFields = required.concat(optional);
return request.resource.data.keys().hasAll(required) &&
request.resource.data.keys().hasOnly(allAllowedFields);
}
match /restaurant/{restId} {
allow create: if verifyFields(['name', 'location', 'city'],
['address', 'hours', 'cuisine']);
}
}
}
Restricting fields on update
A common security practice is to only allow clients to edit some fields and not
others. You cannot accomplish this solely by looking at the
request.resource.data.keys()
list described in the previous section, since this
list represents the complete document as it would look after the update, and
would therefore include fields that the client did not change.
However, if you were to use the diff()
function, you could compare request.resource.data
with the
resource.data
object, which represents the document in the database before
the update. This creates a mapDiff
object, which is an object containing all of the changes between two different
maps.
By calling the affectedKeys()
method on this mapDiff, you can come up with a set of fields that were changed
in an edit. Then you can use functions like
hasOnly()
or hasAny()
to ensure that this set does (or doesn't) contain certain items.
Preventing some fields from being changed
By using the hasAny()
method on the set generated by affectedKeys()
and then negating the result, you can reject any client request that attempts to
change fields that you don't want changed.
For instance, you might want to allow clients to update information about a restaurant but not change their average score or number of reviews.
service cloud.firestore {
match /databases/{database}/documents {
match /restaurant/{restId} {
// Allow the client to update a document only if that document doesn't
// change the average_score or rating_count fields
allow update: if (!request.resource.data.diff(resource.data).affectedKeys()
.hasAny(['average_score', 'rating_count']));
}
}
}
Allowing only certain fields to be changed
Rather than specifying fields that you don't want changed, you can also use the
hasOnly()
function to specify a list of fields that you do want changed. This is generally
considered more secure because writes to any new document fields are
disallowed by default until you explicitly allow them in your security rules.
For instance, rather than disallowing the average_score
and rating_count
field, you could create security rules that allow clients to only change the
name
, location
, city
, address
, hours
, and cuisine
fields.
service cloud.firestore {
match /databases/{database}/documents {
match /restaurant/{restId} {
// Allow a client to update only these 6 fields in a document
allow update: if (request.resource.data.diff(resource.data).affectedKeys()
.hasOnly(['name', 'location', 'city', 'address', 'hours', 'cuisine']));
}
}
}
This means that if, in some future iteration of your app, restaurant documents
include a telephone
field, attempts to edit that field would fail
until you go back and add that field to the hasOnly()
list in your security
rules.
Enforcing field types
Another effect of Firestore being schemaless is that there is no
enforcement at the database level for what types of data can be stored in
specific fields. This is something you can enforce in security rules, however,
with the is
operator.
For example, the following security rule enforces that a review's score
field has to be an integer, the headline
, content
, and author_name
fields
are strings, and the review_date
is a timestamp.
service cloud.firestore {
match /databases/{database}/documents {
match /restaurant/{restId} {
// Restaurant rules go here...
match /review/{reviewId} {
allow create: if (request.resource.data.score is int &&
request.resource.data.headline is string &&
request.resource.data.content is string &&
request.resource.data.author_name is string &&
request.resource.data.review_date is timestamp
);
}
}
}
}
Valid data types for the is
operator are bool
, bytes
, float
, int
,
list
, latlng
, number
, path
, map
, string
, and timestamp
. The is
operator also supports constraint
, duration
, set
, and map_diff
data
types, but since these are generated by the security rules language itself and
not generated by clients, you rarely use them in most practical
applications.
list
and map
data types do not have support for generics, or type arguments.
In other words, you can use security rules to enforce that a certain field
contains a list or a map, but you can not enforce that a field contains a list
of all integers or all strings.
Similarly, you can use security rules to enforce type values for specific entries in a list or a map (using brakets notation or key names respectively), but there is no shortcut to enforce the data types of all members in a map or a list at once.
For example, the following rules ensure that a tags
field in a document
contains a list and that the first entry is a string. It also ensures that
the product
field contains a map that in turn contains a product name that
is a string and a quantity that is an integer.
service cloud.firestore {
match /databases/{database}/documents {
match /orders/{orderId} {
allow create: if request.resource.data.tags is list &&
request.resource.data.tags[0] is string &&
request.resource.data.product is map &&
request.resource.data.product.name is string &&
request.resource.data.product.quantity is int
}
}
}
}
Field types need to be enforced when both creating and updating a document. Therefore, you might want to consider creating a helper function that you can call in both the create and update sections of your security rules.
service cloud.firestore {
match /databases/{database}/documents {
function reviewFieldsAreValidTypes(docData) {
return docData.score is int &&
docData.headline is string &&
docData.content is string &&
docData.author_name is string &&
docData.review_date is timestamp;
}
match /restaurant/{restId} {
// Restaurant rules go here...
match /review/{reviewId} {
allow create: if reviewFieldsAreValidTypes(request.resource.data) &&
// Other rules may go here
allow update: if reviewFieldsAreValidTypes(request.resource.data) &&
// Other rules may go here
}
}
}
}
Enforcing types for optional fields
It's important to remember that calling request.resource.data.foo
on a
document where foo
doesn't exist results in an error, and therefore any
security rule making that call will deny the request. You can handle this
situation by using the get
method on request.resource.data
. The get
method allows you to provide a
default argument for the field you're retrieving from a map if that field
doesn't exist.
For example, if review documents also contain an optional photo_url
field
and an optional tags
field that you want to verify are strings and lists
respectively, you can accomplish this by rewriting the
reviewFieldsAreValidTypes
function to something like the following:
function reviewFieldsAreValidTypes(docData) {
return docData.score is int &&
docData.headline is string &&
docData.content is string &&
docData.author_name is string &&
docData.review_date is timestamp &&
docData.get('photo_url', '') is string &&
docData.get('tags', []) is list;
}
This rejects documents where tags
exists, but isn't a list, while still
permitting documents that don't contain a tags
(or photo_url
) field.
Partial writes are never allowed
One final note about Firestore Security Rules is that they either allow the client to make a change to a document, or they reject the entire edit. You cannot create security rules that accept writes to some fields in your document while rejecting others in the same operation.