Request Query Parameters for Security Rules
Introduce a request.query.parameters object to store key-value pairs from the query payload, enabling conditional access control based on user authentication state.
Current workarounds, like nesting documents in sub-collections, restrict uniqueness to a single field. This proposal allows queries to be filtered dynamically based on multiple conditions.
For example, access can be restricted based on user authentication state or location.
if request.query.parameters.user == request.auth.uid
if request.query.parameters.location == request.auth.token.region
if request.query.parameters.email != null
if request.query.parameters.email == request.auth.email
Privileged searches can be enabled with conditions such as:
if request.query.parameters.key == request.auth.token.vipkey
Range queries can be implemented using a function object to validate if a value is in range or test its min/max bounds.
if request.query.parameters.age == 37
if request.query.parameters.age.valid(37)
if request.query.parameters.age.min(17)
This approach prevents excessive database reads by filtering queries early, keeps operations lightweight and efficient, separates query logic from request.query for better maintainability, and provides more flexibility in data access without rigid document structures. It ensures data segregation while maintaining query performance.
the key take away is fine control over queries that could otherwise be hijacked or manipulated from the client, leading to excessive reads, exposing unwanted documents, or even conflict with regulatory requirements.