Base solution for your next web application
Starts in:
01 DAYS
01 HRS
01 MIN
01 SEC

Activities of "maharatha"

Following up again

is there an update to this ?

Following up on this.

Can you please confirm if you have recieved the file?

I am exactly havcing the same issue. I have sent the share link and have uploaded the project.

Things I need help :

  1. Fix teh existing issue
  2. and Enable Dashboard, i am unable to figure out how to intergate the dashboard.

This integration will help the whole community.

The email should have been sent from [email protected].

I have sent to [email protected]

Is there a way I can port the code easily without rewriting everything from the ground up.

Any updates on this ?

i am looking for a solution to this exact problem. I am dedicating a sub domain called api and the rest all tenant name.

My Angular app is hosted on a S3 bucet and Cloud Front on top of it.

I tried the above solution but of no sucess.

"Cookie “Abp.TenantId” will be soon rejected because it has the “sameSite” attribute set to “none” or an invalid value, without the “secure” attribute. To know more about the “sameSite“ attribute, read https://developer.mozilla.org/docs/Web/HTTP/Headers/Set-Cookie/SameSite"

Any other solution to set the TenantId by reading the sub domain from the angular app ?

https://github.com/aspnetzero/aspnet-zero-core/issues/3217

I believe I need more help on making the changes. My assumption was that if we register the KeyVault as mentioned above or something like below

return new WebHostBuilder()
                .ConfigureAppConfiguration((context, config) =>
                {
                    config.AddJsonFile("Secrets.json");
                    var root = config.Build();

                    var vault = root["KeyVault:Vault"];


                    if (!string.IsNullOrEmpty(vault) && !string.IsNullOrEmpty(root["KeyVault:ClientId"]) && !string.IsNullOrEmpty(root["KeyVault:ClientSecret"]))
                    {
                        config.AddAzureKeyVault(
                            $"https://{root["KeyVault:Vault"]}.vault.azure.net/",
                            root["KeyVault:ClientId"],
                            root["KeyVault:ClientSecret"],new DefaultKeyVaultSecretManager());
                    }
                    else if (!string.IsNullOrEmpty(vault) && !string.IsNullOrEmpty(root["KeyVault:ClientId"]))
                    {
                        using (var store = new X509Store(StoreName.My, StoreLocation.LocalMachine))
                        {
                            store.Open(OpenFlags.ReadOnly);
                            var certs = store.Certificates;
                            Debug.WriteLine("Num of certificates in store: " + certs.Count);
                            var distinguishedName = new X500DistinguishedName(root["KeyVault:SubjectDistinguishedName"]);
                            var certFound = certs.Find(X509FindType.FindBySubjectDistinguishedName,
                                distinguishedName.Name, false).OfType<X509Certificate2>();
                            if (!certFound.Any())
                            {
                                Debug.WriteLine("Unable to find the certificate to authenticate and access key vault");
                            }
                            else
                            {
                                // found the certificate 
                                config.AddAzureKeyVault($"https://{root["KeyVault:Vault"]}.vault.azure.net/", root["KeyVault:ClientId"], certFound.Single(),new DefaultKeyVaultSecretManager());
                                store.Close();
                            }
                        }
                    }

                })
                .UseKestrel(opt => opt.AddServerHeader = false)

it would automatically pick it up.

But it's clearly not happening.

So where should I change it, I tried :

 public override void PreInitialize()
        {
            if (!SkipDbContextRegistration)
            {
                Configuration.Modules.AbpEfCore().AddDbContext<EDRMSDbContext>(options =>
                {
                    if (options.ExistingConnection != null)
                    {
                        EDRMSDbContextConfigurer.Configure(options.DbContextOptions, options.ExistingConnection);
                    }
                    else
                    {
                        EDRMSDbContextConfigurer.Configure(options.DbContextOptions, _keyvault["ConnectionStrings:Default"]);
                    }
                });
            }

It worked for host but when i started creating Tenant with a different db connection string it ended ip creating in the host db.

So please provide a clear explanation how to register the Azure Key Vault with Abp as I am sure everyone is going to get benefitted out of this.

Showing 31 to 40 of 206 entries