I want to know which user pushed the task on the firebase queue in my worker code. I can push the userId in the task, but that is not secure, any other user can push other user's userId. Is there a way I can access the user who pushed the task in the queue.
1
There are 1 best solutions below
Related Questions in FIREBASE
- Firebase facebook authentication not working
- Add @JsonAutoDetect to third party lib and firebase Java lib
- firebase-import timing out?
- Understanding Firebase orderByChild
- Wait until Firebase retrieves data
- Firebase logout show Permission denied error.
- angular $firebaseArrray: difference between controller and directive
- Firebase: combine filtering with ordering in swift
- AngularJS - Firebase - Promise Error
- How to get simple list of devices on a Nest account using Firebase in Android?
- Event-Driven(Real - Time) mobile set-up suggestions
- How do you nest two of Polymer's firebase-collection elements inside dom-repeat?
- AngularFire Watch and Retrieve Item Key
- Firebase and AngularFire - $add in a array - unexpected behaviour
- Saving an html object to firebase
Related Questions in FIREBASE-QUEUE
- Firebase optimisation for highly requested queue
- Firebase Android How To Get Query of Objects With Key List
- What could cause a Swift/Firebase app to act up the first time it is installed and never again?
- Google Cloud Functions: How to stub firebase queue for Unit Tests?
- Pushing a task with firebase-queue not working
- How to use PubSub to get one message at time
- Firebase; RangeError: Maximum call stack size exceeded
- Node GeoFire memory leak?
- Retry logic in Firebase Queue
- current user on firebase queue
- firebase-queue, there is a delay in the rate at which the worker receives task
- Firebase queue. Custom finished state
- What is the use case of firebase-queue sanitize?
- Firebase queue security rule issue
- firebase queue - retries are not working?
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
It's fairly easy to secure your database so that users can only push tasks that contain their own UID.
For example, say you have this JSON structure:
You can ensure that a user can only push tasks with their own UID under the
creatorproperty with these rules:I recommend you read the documentation on Firebase security rules and pay special attention to the section on user based security.