Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: tenant access to endpoints leading to access the base wallet #3545

Merged
merged 2 commits into from
Feb 28, 2025

Conversation

thiagoromanos
Copy link
Contributor

@thiagoromanos thiagoromanos commented Feb 28, 2025

When using acapy with multitenant enabled and admin-insecure-mode, tenant endpoints (like [GET] /wallet/did for example) could be accessed without a bearer token.

With this fix, single tenant agents will access agent's endpoints with no problem, and multi-tenant agents will require a bearer token to access those endpoints.

Signed-off-by: Thiago Romano <thiagoromano.s@gmail.com>
dbluhm
dbluhm previously approved these changes Feb 28, 2025
@dbluhm
Copy link
Contributor

dbluhm commented Feb 28, 2025

Looks like one of the tests was perhaps encoded to expect the original behavior

@thiagoromanos
Copy link
Contributor Author

Found the test that was failing. Now, the question is, insecure_mode + multitenant wasn't supposed to work without a bearer token for tenant endpoints, right? (or am I missing something)

Signed-off-by: Thiago Romano <thiagoromano.s@gmail.com>
Copy link
Contributor

@jamshale jamshale left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this change makes sense as the insecure mode is only supposed to apply to the admin agent.

@thiagoromanos thiagoromanos merged commit a4dec2c into openwallet-foundation:main Feb 28, 2025
11 checks passed
@thiagoromanos thiagoromanos deleted the fix/mt-access branch February 28, 2025 16:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants