Hi there,
sorry but there is no way to fetch all the packages.
As stated here, the nuget feeds for abp are based on a custom implementation. Listing all available packages does not work and its not planned to implement that feature.
I refunded your question.
Try it with also setting the variable WEBSITE_LOAD_USER_PROFILE=1.
If this still not works we can make a meeting so i can have a deep look into your project and the azure web service.
Ok i found out that the issue is only related to windows app services. Can reproduce it on a fresh f1 windows app service. You could try to add an application setting entry "WEBSITE_LOAD_USER_PROFILE" with the value 1 to your app service.
Here is the stackoverflow question i found in regards to azure web apps and x509 certs: https://stackoverflow.com/questions/66367406/cngkey-system-security-cryptography-cryptographicexception-the-system-cannot-fin
If the WEBSITE_LOAD_USER_PROFILE still not works you could try setting WEBSITE_LOAD_CERTIFICATES to some random value. There where some comments that this would only work for non shared web apps.
For the f1 plan i used to test it, this stackoverflow was really helpful: https://stackoverflow.com/questions/9951729/x509certificate-constructor-exception/10048789#10048789
Long story short, adding the MachineKeySet-StoreFlag to the constructor of the cert should fix the issue for you:
private X509Certificate2 GetSigningCertificate(IWebHostEnvironment hostingEnv, IConfiguration configuration)
{
var fileName = "authserver.pfx";
var passPhrase = "2D7AA457-5D33-48D6-936F-C48E5EF468ED";
var file = Path.Combine(hostingEnv.ContentRootPath, fileName);
if (!File.Exists(file))
{
throw new FileNotFoundException($"Signing Certificate couldn't found: {file}");
}
return new X509Certificate2(file, passPhrase, X509KeyStorageFlags.MachineKeySet);
}
Hi,
do you get any error messages or logs inside the api host when the user tries to log in?
From what i see the user is fine. Do you have enabled that the user must confirm his/her email before he can login? You could set EmailConfirmed to 1 and try again.
Could you show me the path settings?
Also you might could try to switch to a linux app service, if that would be an option for you.
You could create a new solution using abp suite with the same name as your existing project. After that you copy the maui project inside your existing projects src directory and add it to the existing solution.
Hope this helps.
Hey, make sure the file is located in the content root. Not in the applications wwwroot. As you see in the screenshot of my example apps kudo browser.
Some other questions that might help me to find a solution for you:
I was able to deploy a fresh abp mvc (non-tiered) application to an azure web app using the following steps (https://abpazuretest.azurewebsites.net/#):
dotnet dev-certs https -v -ep authserver.pfx -p 2D7AA457-5D33-48D6-936F-C48E5EF468ED
These steps are extracted from the official abp documentation for configuring OpenIdDict: https://docs.abp.io/en/abp/latest/Deployment/Configuring-OpenIddict
Hi,
in what project is the exception thrown? You might need to add the mapping inside the UI Layer´s AutoMapperProfile.
Please let me know what UI Layer you use and if your application is tiered (seperated auth server)
You might want to checkout this: https://codejack.com/2022/12/deploying-abp-io-to-an-azure-appservice/
There are detailed explanations for configuring your application for azure app services.
Please let me know if this helps you.