From 24bd74aedcd82e9f67c43712e44147aef5dd2d1a Mon Sep 17 00:00:00 2001 From: 230404 <230404@epvc.pt> Date: Mon, 15 Dec 2025 14:01:45 +0000 Subject: [PATCH] firebase incerida --- .firebaserc | 5 +++++ database.rules.json | 7 +++++++ firebase.json | 8 ++++++++ lib/pages/home.dart | 2 +- storage.rules | 12 ++++++++++++ 5 files changed, 33 insertions(+), 1 deletion(-) create mode 100644 .firebaserc create mode 100644 database.rules.json create mode 100644 firebase.json create mode 100644 storage.rules diff --git a/.firebaserc b/.firebaserc new file mode 100644 index 0000000..c8e9cc7 --- /dev/null +++ b/.firebaserc @@ -0,0 +1,5 @@ +{ + "projects": { + "default": "playmaker-9e0fc" + } +} diff --git a/database.rules.json b/database.rules.json new file mode 100644 index 0000000..f54493d --- /dev/null +++ b/database.rules.json @@ -0,0 +1,7 @@ +{ + /* Visit https://firebase.google.com/docs/database/security to learn more about security rules. */ + "rules": { + ".read": false, + ".write": false + } +} \ No newline at end of file diff --git a/firebase.json b/firebase.json new file mode 100644 index 0000000..602d1eb --- /dev/null +++ b/firebase.json @@ -0,0 +1,8 @@ +{ + "storage": { + "rules": "storage.rules" + }, + "database": { + "rules": "database.rules.json" + } +} diff --git a/lib/pages/home.dart b/lib/pages/home.dart index 2002644..60683c0 100644 --- a/lib/pages/home.dart +++ b/lib/pages/home.dart @@ -24,7 +24,7 @@ class _HomeScreenState extends State { break; case 1: print('Navegar para tela de Jogo'); - Navigator.push(context, MaterialPageRoute(builder: (_) => GameScreen())); + // Navigator.push(context, MaterialPageRoute(builder: (_) => GameScreen())); break; case 2: print('Navegar para tela de Equipas'); diff --git a/storage.rules b/storage.rules new file mode 100644 index 0000000..f08744f --- /dev/null +++ b/storage.rules @@ -0,0 +1,12 @@ +rules_version = '2'; + +// Craft rules based on data in your Firestore database +// allow write: if firestore.get( +// /databases/(default)/documents/users/$(request.auth.uid)).data.isAdmin; +service firebase.storage { + match /b/{bucket}/o { + match /{allPaths=**} { + allow read, write: if false; + } + } +}