thank you very much it's very helpful.
We are using QA environment for automation test.
For above test account, could user password set to never expire?
When an tenant has 2FA enabled, it's not able for automation API testing. So when a tenant has 2FA enabled, could particular user account has it disabled? If yes, which database table shall I check the value? Is there admin UI for it?
Or do you have any other better idea for backend API automation testing?
We can close this ticket. Finally identified it's our code issue, somewhere try the exception and convert it to some other type's exception.
We can close ticket, since I disabled the dynamic claim feature per AI bot's suggestion
Hi,
We noticed that when the application (Micro Service template) is deployed to Azure Kubernetes, Applications insight show the application throw 401 exception, the error details as below:
Failed to refresh remote claims for user: ae264b2c-aa17-336e-500c-3a0f39672a03 Volo.Abp.AspNetCore.Authentication.JwtBearer.DynamicClaims.WebRemoteDynamicClaimsPrincipalContributorCache
Do you have any clue about the error?
Thanks,
Can close this ticket. I gave two short of lock grace period, and I also add a loop / sleep try n times to acquire the lock. Then the code works
We have a distributed lock code like this, but it seems, the second thread didn't wait till first thread finished db insert
await using var handle = await _distributedLock.TryAcquireAsync($"api-lock", TimeSpan.FromMinutes(5));
try {
if (handle != null)
{
var rtCertifcate = _apiClient.CallApi (); //external API
if (!string.IsNullOrWhiteSpace(rtCertifcate ))
{
//insert into database for rtCertifcate
return rtCertifcate
}
}
else
{
// If we can't acquire the lock, fall back to database lookup
Logger.LogWarning("....");
}
}
catch
{
}
//Code read certificate from database