Skip to content
This repository has been archived by the owner on Apr 13, 2023. It is now read-only.

fix: add multi-tenant metadata route #392

Merged
merged 1 commit into from
Aug 4, 2021

Conversation

carvantes
Copy link
Contributor

The /metadata path for tenant-specific urls must be allowed without authorization on the APIGW config

It would be ideal to have this path only exists when --enableMultiTenancy true is used but AFAIK it's not possible to use CFN conditionals in the events part of the serverless yaml. It doesn't pose any risk since /tenant/{tenantId}/metadata is a 404 anyways when multi-tenancy is not enabled.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@carvantes carvantes marked this pull request as ready for review August 2, 2021 15:08
Copy link
Contributor

@Bingjiling Bingjiling left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@carvantes carvantes merged commit 476a774 into feat-multitenancy Aug 4, 2021
@carvantes carvantes deleted the dev-metadata-route branch August 4, 2021 02:06
carvantes added a commit that referenced this pull request Aug 18, 2021
* feat: add tenantId attribute to Cognito user pool (#348)

* feat: remove unneeded scope checks in authorizer (#347)

* feat: update lambda state machine to accommodate tenantId (#367)

* feat: add "enableMultiTenancy" CFN parameter  (#381)

* test: add multi-tenancy integ tests (#387)

* fix: remove _id, _tenantId from bulk export results (#384)

* feat: Group export scripts (#389)

* fix: add multi-tenant metadata route (#392)

* fix: allow more concurrent export jobs for multi-tenant deployments (#397)

* test: integ tests for Group export (#393)

* feat: add ES hard delete config value (#398)

* docs: update postman collection and docs to use Id token  (#399)

* docs: add multi-tenancy docs (#400)


Co-authored-by: Yanyu Zheng <yz2690@columbia.edu>

BREAKING CHANGE: The Cognito IdToken is now used instead of the accessToken to authorize requests.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants