in src/Saas.Application/deployment/script/map-to-config-entries-parameters.py [0:0]
def patch_paramenters_file(
app_name: str,
identity_outputs: str,
paramenter_file: str,
config_file: str) -> None:
with open(config_file, 'r') as f:
config = json.load(f)
with open(identity_outputs, 'r') as f:
identity_outputs = json.load(f)
with open(paramenter_file, 'r') as f:
parameters = json.load(f)
parameters['parameters'].update(get_output_value(identity_outputs, 'version'))
parameters['parameters'].update(get_output_value(identity_outputs, 'keyVaultName'))
parameters['parameters'].update(get_output_value(identity_outputs, 'keyVaultUri'))
parameters['parameters'].update(get_output_value(identity_outputs, 'userAssignedIdentityName'))
parameters['parameters'].update(get_output_value(identity_outputs, 'appConfigurationName'))
parameters['parameters'].update(get_deploy_b2c_value(config, 'domainName', 'azureB2CDomain'))
parameters['parameters'].update(get_deploy_b2c_value(config, 'tenantId', 'azureB2cTenantId'))
parameters['parameters'].update(get_deploy_b2c_value(config, 'instance', 'azureAdB2CInstanceURL'))
parameters['parameters'].update(get_b2c_value(config, 'signedOutCallBackPath', 'signedOutCallBackPath'))
parameters['parameters'].update(get_b2c_value(config, 'signUpSignInPolicyId', 'signUpSignInPolicyId'))
parameters['parameters'].update(get_app_value(config, app_name, 'appId', 'clientId'))
parameters['parameters'].update(get_app_value(config, app_name, 'certificateKeyName', 'certificateKeyName'))
with open(paramenter_file, 'w+') as f:
f.write(json.dumps(parameters, indent=4))