Skip to content

Commit 18f424d

Browse files
Address review comments
1 parent fadac47 commit 18f424d

File tree

4 files changed

+13
-8
lines changed

4 files changed

+13
-8
lines changed

bicep/parameters.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,12 @@
1212
}
1313
},
1414
"sqlAdminLogin": {
15-
"value": "wviriya"
15+
"value": ""
1616
},
1717
"sqlAdminPassword": {
1818
"reference": {
1919
"keyVault": {
20-
"id": "/subscriptions/10fe34c7-c442-46d8-b43f-2c92651e6545/resourceGroups/common-rg/providers/Microsoft.KeyVault/vaults/wviriya-kv"
20+
"id": ""
2121
},
2222
"secretName": "sqlAdminPassword"
2323
}

documentation/setup.md

+4
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,8 @@ There are 4 ways to provision the required resources:
170170

171171
### Manual via the Portal
172172

173+
> ⚠️ Manual provisioning docs are obsolete will be deprecated soon. Please use [Bicep provisioning](#deploy-from-bicep) instead.
174+
173175
Log in to the [Azure portal](https://portal.azure.com).
174176

175177
#### Create the Resource Group
@@ -641,6 +643,8 @@ Once completed, please jump to the [setup](#setup) section to continue.
641643

642644
### Cake Provision
643645

646+
> ⚠️ Cake provisioning support and docs will be deprecated soon. Please use [Bicep provisioning](#deploy-from-bicep) instead.
647+
644648
The `Cake` script responsible to `deploy` and `provision` is included in the `dotnet` source directory. In order to run the Cake Script locally and deploy to your Azure Subscription, there are some pre-requisites:
645649

646650
1. Create a service principal that can be used to authenticate the script to use your Azure subscription. This can be easily accomplished using the following PowerShell script:

dotnet/ServerlessMicroservices.Shared/Services/TokenValidationService.cs

+2-1
Original file line numberDiff line numberDiff line change
@@ -90,9 +90,10 @@ async Task<ClaimsPrincipal> ValidateJwt(string token)
9090
{
9191
var handler = new JwtSecurityTokenHandler();
9292
handler.InboundClaimTypeMap.Clear();
93-
93+
#if DEBUG
9494
// Debugging purposes only, set this to false for production
9595
Microsoft.IdentityModel.Logging.IdentityModelEventSource.ShowPII = true;
96+
#endif
9697

9798
try
9899
{

test/settings.example.js

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
// Auth
2-
window.authClientId = 'a298b04d-dbe2-4fc8-8191-b64c1fd287e2';
3-
window.authAuthority = 'https://wviriyab2c.b2clogin.com/wviriyab2c.onmicrosoft.com/B2C_1_default-signin';
4-
window.knownAuthority = 'wviriyab2c.b2clogin.com';
2+
window.authClientId = '';
3+
window.authAuthority = 'https://{tenant_name}.b2clogin.com/{tenant_name}.onmicrosoft.com/{policy_name}';
4+
window.knownAuthority = '{tenant_name}.b2clogin.com';
55
window.redirectUri = 'http://localhost:4280';
6-
window.loginScopes = ['https://wviriyab2c.onmicrosoft.com/509b5353-3a44-4d09-85ed-64bf2e30ccb8/rideshare'];
7-
window.apiScopes = ['https://wviriyab2c.onmicrosoft.com/509b5353-3a44-4d09-85ed-64bf2e30ccb8/rideshare'];
6+
window.loginScopes = ['openid', '{api_scope}']; // e.g. 'https://rideshare.onmicrosoft.com/serverless-spa-api/Rides.ReadWrite'
7+
window.apiScopes = ['{api_scopes}']; // e.g. 'https://rideshare.onmicrosoft.com/serverless-spa-api/Rides.ReadWrite'
88
window.authEnabled = true;
99

1010

0 commit comments

Comments
 (0)