Hi, Thank you. It's clear now
Hi, I managed to make it work without any customization. The issue was that I defined my custom permission provider in another microservice, and the configuration request was redirected to administration service. When I moved the permission provider to administration service, it worked. Now I have a question related to some code that I needed to write:
To add my provider I needed to write this code
public override void ConfigureServices(ServiceConfigurationContext context)
{
// Other codes
Configure<PermissionManagementOptions>(options =>
{
options.ManagementProviders.Add<DynamicPermissionManagementProvider>();
options.ProviderPolicies[DynamicPermissionValueProvider.ProviderName] = AdministrationServicePermissions.Dashboard.Host;
});
Configure<AbpPermissionOptions>(options =>
{
options.ValueProviders.Add<DynamicPermissionValueProvider>();
});
}
My question is about this line
options.ProviderPolicies[DynamicPermissionValueProvider.ProviderName] = AdministrationServicePermissions.Dashboard.Host;
Why is this needed? and does it matter what permission I provide for it?
Hi,
I resovled package and module dependency, and was able to use IPermissionManager
in my service, but faced another issue.
I defined new DynamicPermissionManagementProvider
extends PermissionManagementProvider
and DynamicPermissionValueProvider
extends PermissionValueProvider
to grant some users some dynamic permissions.
I was able to use the new provider and could see the granted permissions in the table AbpPermissionGrants
in database. Also logged the result of getting the permission using this line of code:
var granted = await _permissionManager.GetAsync(RisksManagementServicePermissions.Risks.Default, DynamicPermissionValueProvider.ProviderName, CurrentUser.Id.Value.ToString());
And found that the permission is actually granted to the user using my provider. But from angular side, when sending application-configuration
request (which includes in its response auth -> grantedPolicies
to tell angular app current users' permissions, I don't see my permission granted!
Any idea?
I checked it and it works fine in the Api.Host
project. How can I use it in the application layer? try to use IPermissionManager
in the ProductService.Application
project, it will not work directly. There is some dependency I need to add, can you tell what dependency or projects I need to add to make it work?
Hi,
I checked it and couldn't figure out how to get the provider that is granting the required permission, it can only tell if the permission is granted or not. Also the methods are not defined virtual
so couldn't override them
Thanks I solved my problem
Global filter is a nice approach, but needs some modifications for my case. I need in some place (maybe inside CreateFilterExpression
method or ShouldFilterEntity
method) to check the following: if the current user has the static permission (given from permissions dialog), the filter should not be applied (i.e: return all products). But If the user is not given the permission, the filter should apply (return only the products he was assigned as owner for).
P.S: my solustion is a micro-service solution, so I can't use IPermissionManager
in all micro-services (the PermissionManagement
module is only added to AdministrationService
)
I found the issue. In my service appsettings.json
file, the AuthServer:Authority
was wrong (was kept to localhost instead of the server URL of my service), when changed it worked fine. But I have a question (suggestion) regarding this: adding a new microservice to an existing solution requires some tedious code to be added (most of it inside OpenIddictDataSeeder
) can't we automate this inside abp new
command?
Thanks
This is set to true already (the logs are the same in my question). P.S: It works fine locally (on my PC with docker and tye configurations), this issue appeared when deployed on the server (using IIS to serve the services)
Unable to validate issuer. validationParameters.ValidIssuer is null or whitespace AND validationParameters.ValidIssuers is null or empty.
you can add
Microsoft.IdentityModel.Logging.IdentityModelEventSource.ShowPII = true;
to service to get the error details.
Already done from solution template
public class BaseServiceHttpApiHostModule : AbpModule
{
public override void ConfigureServices(ServiceConfigurationContext context)
{
//You can disable this setting in production to avoid any potential security risks.
Microsoft.IdentityModel.Logging.IdentityModelEventSource.ShowPII = true;