diff --git a/dev-packages/e2e-tests/test-applications/node-firebase/firestore.rules b/dev-packages/e2e-tests/test-applications/node-firebase/firestore.rules index 260e089a299b..20db64464c57 100644 --- a/dev-packages/e2e-tests/test-applications/node-firebase/firestore.rules +++ b/dev-packages/e2e-tests/test-applications/node-firebase/firestore.rules @@ -3,16 +3,8 @@ rules_version='2' service cloud.firestore { match /databases/{database}/documents { match /{document=**} { - // This rule allows anyone with your database reference to view, edit, - // and delete all data in your database. It is useful for getting - // started, but it is configured to expire after 30 days because it - // leaves your app open to attackers. At that time, all client - // requests to your database will be denied. - // - // Make sure to write security rules for your app before that time, or - // else all client requests to your database will be denied until you - // update your rules. - allow read, write: if request.time < timestamp.date(2025, 8, 17); + // general access within this test app's emulator is fine + allow read, write: if true; } } }