Activities of "duyan11110"

Hi, I have to add reference to HttpClient proj of IdentityService and configure RemoteService in appsettings.json, right?

Hi,

What is the best way to get role list from IdentityService inAdministraionService?

Hi,

OK. Thanks. I will try it. But I need your guide when inserting data into permission related tables. Is there anything I have to pay attention?

Hi,

Here is my idea. Please advice if it is feasible.

  1. Create new table: MenuItems (Id, Url, ...)
  2. After saving menu items I will create all permission names for those menu items, with permission name = Id of menu item. These permission names will be under "MenuItem" permission group
  3. Create new page to set permissions of menu items for a role and save into AbpPermissionGrant
  4. Loading dynamic menu items with permissions checking will be like this: (copy from CMS Kit module for example)
private async Task ConfigureMainMenuAsync(MenuConfigurationContext context)
    {
        var featureChecker = context.ServiceProvider.GetRequiredService<IFeatureChecker>();
        if (GlobalFeatureManager.Instance.IsEnabled<MenuFeature>() && await featureChecker.IsEnabledAsync(CmsKitFeatures.MenuEnable))
        {
            var menuAppService = context.ServiceProvider.GetRequiredService<IMenuItemPublicAppService>();

            var menuItems = await menuAppService.GetListAsync();

            if (!menuItems.IsNullOrEmpty())
            {
                foreach (var menuItemDto in menuItems.Where(x => x.ParentId == null && x.IsActive))
                {
                    AddChildItems(menuItemDto, menuItems, context.Menu);
                }
            }
        }
    }

    private void AddChildItems(MenuItemDto menuItem, List<MenuItemDto> source, IHasMenuItems parent = null)
    {
        var applicationMenuItem = CreateApplicationMenuItem(menuItem);

        foreach (var item in source.Where(x => x.ParentId == menuItem.Id && x.IsActive))
        {
            AddChildItems(item, source, applicationMenuItem);
        }

        parent?.Items.Add(applicationMenuItem);
    }

    private ApplicationMenuItem CreateApplicationMenuItem(MenuItemDto menuItem)
    {
        return new ApplicationMenuItem(
            menuItem.DisplayName,
            menuItem.DisplayName,
            menuItem.Url,
            menuItem.Icon,
            menuItem.Order,
            menuItem.Target,
            menuItem.ElementId,
            menuItem.CssClass
        ).RequirePermissions(menuItem.Id.ToString());
    }

Hi,

Thanks for your code. But do I have to create permission name for each menu item before creating that menu item? I want to set permissions dynamically according to creating menu items.

  • ABP Framework version: v7.3.0
  • UI Type: MVC
  • Database System: EF Core (SQL Server)
  • Tiered (for MVC) or Auth Server Separated (for Angular): yes
  • Exception message and full stack trace:
  • Steps to reproduce the issue: I want to set permissions for dynamic menu items. I can mimic your CMS Kit module to create dynamic menu items but don't know how to set permissions for them. Please suggest me steps to achieve that. Thank you.

Check the docs before asking a question: https://docs.abp.io/en/commercial/latest/ Check the samples to see the basic tasks: https://docs.abp.io/en/commercial/latest/samples/index The exact solution to your question may have been answered before, and please first use the search on the homepage. Provide us with the following info:

  • ABP Framework version: 7.3.0
  • UI Type: MVC
  • Database System: EF Core (SQL Server)
  • Tiered (for MVC) or Auth Server Separated (for Angular): yes I am using microservice template to build my app and would like to encrypt connection string (both for host and tenants). I know that I have to override DefaultConnectionStringResolver and MultiTenantConnectionStringResolver but please show me detail steps to do that including where I should write that code. Thank you so much.

Hi,

I saved as the svg into a .svg file and use global css to override the rule and it works. I guest this issue related to bundling process because I tried to copy Themes folder of your LeptonX source code to my AuthServer project and modify layout-bundle.css but no luck, all my changes didn't be reflected when deploying on K8s.

Issue 2 & 3 are not important with me at this moment. If I have time, I will try again.

Hi,

Sorry, because of our policy, there is no way to check online. Do you have any suggestion why url path was changed? I will check based on your suggestions?

Hi, 1. I found differency on svg data source, but I don't know why. You can see below. On local machine:

data:image/svg+xml,%3Csvg width='2560' height='1600' viewBox='0 0 2560 1600' fill='none' xmlns='http://www.w3.org/2000/svg'%3E%3Cg clip-path='url(%23clip0_4014_34701)'%3E%3Crect width='2560' height='1600' fill='url(%23paint0_linear_4014_34701)'/%3E%3Crect opacity='0.9' width='2560' height='1686' fill='url(%23paint1_linear_4014_34701)'/%3E%3Cg style='mix-blend-mode:overlay'%3E%3Cpath d='M1.74072 1337.63C680.763 1414.42 465.955 401.198 805.448 407.212C1138.23 413.13 796.852 1215.7 1228.1 1168.22C1442.94 1144.58 1155.03 529.083 1432.96 427.322C1806.88 290.432 2008.9 1151.55 2560 338.353' stroke='white' stroke-width='1.25' 

On K8s

data:image/svg+xml,%3Csvg width='2560' height='1600' viewBox='0 0 2560 1600' fill='none' xmlns='http://www.w3.org/2000/svg'%3E%3Cg clip-path='url(../Themes/LeptonX/Global/side-menu/css/#clip0_4014_34701)'%3E%3Crect%20width='2560'%20height='1600'%20fill='url(../Themes/LeptonX/Global/side-menu/css/#paint0_linear_4014_34701)'/%3E%3Crect%20opacity='0.9'%20width='2560'%20height='1686'%20fill='url(../Themes/LeptonX/Global/side-menu/css/#paint1_linear_4014_34701)'/%3E%3Cg%20style='mix-blend-mode:overlay'%3E%3Cpath%20d='M1.74072%201337.63C680.763%201414.42%20465.955%20401. 

The url path is different. It's changed automatically.

2. There is no error when I click on Log in with this user menu, it come back to home page

[10:12:09 INF] Request starting HTTP/1.1 GET http://myapp-authserver/connect/authorize?client_id=Web.HelmHttpTesting&redirect_uri=http%3A%2F%2Fmyapp-web%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20roles%20email%20phone%20AccountService%20IdentityService%20AdministrationService%20SaasService%20CommonService%20CustomerService%20TestService&response_mode=form_post&nonce=638258767295213312.YmJhNjg4NzktMGEyYy00MjE4LThhY2ItMjk4NGM5NjFhZWZmZmZiNGExYmEtNGNkNC00MjFhLTgzMWQtZDJmMGM4NjZhNTVj&access_token=eyJhbGciOiJSUzI1NiIsImtpZCI6IkVBMTg0ODJFQjg0QUNCRjZCRkVCQ0FFMjRCQ0NFNjg0MURBQzVBRTEiLCJ4NXQiOiI2aGhJTHJoS3lfYV82OHJpUzh6bWhCMnNXdUUiLCJ0eXAiOiJhdCtqd3QifQ.eyJzdWIiOiI0ZjFkYWIzYS1iMTVmLTUwYjMtMjQ0MC0zYTBiZWY4YTJjNWIiLCJwcmVmZXJyZWRfdXNlcm5hbWUiOiJuZGFuIiwiZW1haWwiOiJuZGFuQGRldm1oY2JobmkubmV0Iiwicm9sZSI6ImFkbWluIiwidGVuYW50aWQiOiJlZTJiM2YxOS0wZTJlLTAyNWItMjg3OS0zYTBhMWIxODA5N2MiLCJwaG9uZV9udW1iZXJfdmVyaWZpZWQiOiJGYWxzZSIsImVtYWlsX3ZlcmlmaWVkIjoiRmFsc2UiLCJ1bmlxdWVfbmFtZSI6Im5kYW4iLCJvaV9wcnN0IjoiV2ViLkhlbG1IdHRwVGVzdGluZyIsImlzcyI6Imh0dHA6Ly9taGlicy1hdXRoc2VydmVyLyIsIm9pX2F1X2lkIjoiMGQyOGI1MjQtOTU4Ny00ZTQzLWYyMDMtM2EwYmY4M2NiYjcxIiwiY2xpZW50X2lkIjoiV2ViLkhlbG1IdHRwVGVzdGluZyIsIm9pX3Rrbl9pZCI6IjY5ZTEwZjk2LWMxNDMtNmZmZi01NWQ1LTNhMGM5ZWI0ODAwMSIsImF1ZCI6WyJBY2NvdW50U2VydmljZSIsIklkZW50aXR5U2VydmljZSIsIkFkbWluaXN0cmF0aW9uU2VydmljZSIsIlNhYXNTZXJ2aWNlIiwiQ29tbW9uU2VydmljZSIsIkN1c3RvbWVyU2VydmljZSIsIkpGU0FTZXJ2aWNlIiwiR2Jhc2VFVUNEYWlseVNlcnZpY2UiLCJWaXRhbERvd25sb2FkaW5nU2VydmljZSJdLCJzY29wZSI6Im9wZW5pZCBwcm9maWxlIHJvbGVzIGVtYWlsIHBob25lIEFjY291bnRTZXJ2aWNlIElkZW50aXR5U2VydmljZSBBZG1pbmlzdHJhdGlvblNlcnZpY2UgU2Fhc1NlcnZpY2UgQ29tbW9uU2VydmljZSBDdXN0b21lclNlcnZpY2UgSkZTQVNlcnZpY2UgR2Jhc2VFVUNEYWlseVNlcnZpY2UgVml0YWxEb3dubG9hZGluZ1NlcnZpY2UiLCJqdGkiOiJhOTc3OTlhNS0xMWNkLTQzMzMtYjFhMC00MTQ0MzI5MjVhNjMiLCJleHAiOjE2OTAzNjYyNDcsImlhdCI6MTY5MDI3OTg0N30.dqihhdf3eVmCcanCnDjA3RYR6gE0Sun173lvJlQrc-urHNAwbvWCOUZ-sqJZUgxpbWrtlf2ztakP3ddgaYHZl2e3vWgimNnw88vLrlK_eil1eALn2v6LCerKgtlPu96kmpoUc3q-Sh04IczKTKgD0G3_4KXZ8aoTeOa7xO8SkJk5UNwwfnkriaUqk4oXCQuczGuN_TmnPe5rfq-ND3bf0xEp-DlDKbEqi482S3LSX1PGojQl-u831L_NDK64Zt-98cCmFAgh6-KBv_PkAThSFsafil3ggKt7VJbNezDjAzd0xYtI9f7_zeDbrpzA87lpZ7_kqXkO9RCJFw2SWjD_Xg&userid=ba20d69e-c8c9-5284-2040-3a0c9e277061&state=CfDJ8HK8zmwAyDJBimnLTTpa4-dlY45W4YNpdPRq9ImwQvAJEyVjWQCZ6YcsypKSOgUtujVE_coJFn156F6kyOjZrB4e8KGC0-qHg1T-rkYcuApZwf9Xyb1HNlgZ0634vk7IUoWgZ1Bx7uIe22niaIoCohNJfl7-JGjYqnVCoRGc1GJISJHC81oOjDwe9EUSGPkLOeTOYJhxT5iNoddJ0SbyXQ1qpMrbetx0c-TC3dIf6y48rVD2cWbWUJSJSv9v023jCyZMUi2s8HkRO94szR7uwdKTkjKWFCIBpg2eZLkmj1avgSd98qtzcsfBH6OIBGhsYdI_cUMIJroP0b6I1X2R3JrF3zHfY7WnATk-M8CDNOQQxPlrMqHQ6lm073R3nCOOHQ&x-client-SKU=ID_NET6_0&x-client-ver=6.15.1.0 - -
[10:12:09 INF] The request URI matched a server endpoint: Authorization.
[10:12:09 INF] The authorization request was successfully extracted: {
  "client_id": "Web.HelmHttpTesting",
  "redirect_uri": "http://myapp-web/signin-oidc",
  "response_type": "code id_token",
  "scope": "openid profile roles email phone AccountService IdentityService AdministrationService SaasService CommonService CustomerService TestService",
  "response_mode": "form_post",
  "nonce": "638258767295213312.YmJhNjg4NzktMGEyYy00MjE4LThhY2ItMjk4NGM5NjFhZWZmZmZiNGExYmEtNGNkNC00MjFhLTgzMWQtZDJmMGM4NjZhNTVj",
  "access_token": "[redacted]",
  "userid": "ba20d69e-c8c9-5284-2040-3a0c9e277061",
  "state": "CfDJ8HK8zmwAyDJBimnLTTpa4-dlY45W4YNpdPRq9ImwQvAJEyVjWQCZ6YcsypKSOgUtujVE_coJFn156F6kyOjZrB4e8KGC0-qHg1T-rkYcuApZwf9Xyb1HNlgZ0634vk7IUoWgZ1Bx7uIe22niaIoCohNJfl7-JGjYqnVCoRGc1GJISJHC81oOjDwe9EUSGPkLOeTOYJhxT5iNoddJ0SbyXQ1qpMrbetx0c-TC3dIf6y48rVD2cWbWUJSJSv9v023jCyZMUi2s8HkRO94szR7uwdKTkjKWFCIBpg2eZLkmj1avgSd98qtzcsfBH6OIBGhsYdI_cUMIJroP0b6I1X2R3JrF3zHfY7WnATk-M8CDNOQQxPlrMqHQ6lm073R3nCOOHQ",
  "x-client-SKU": "ID_NET6_0",
  "x-client-ver": "6.15.1.0"
}.
[10:12:09 INF] The authorization request was successfully validated.
[10:12:09 INF] Executing endpoint 'Volo.Abp.OpenIddict.Controllers.AuthorizeController.HandleAsync (Volo.Abp.OpenIddict.AspNetCore)'
[10:12:09 INF] Route matched with {action = "Handle", controller = "Authorize", area = "", page = ""}. Executing controller action with signature System.Threading.Tasks.Task`1[Microsoft.AspNetCore.Mvc.IActionResult] HandleAsync() on controller Volo.Abp.OpenIddict.Controllers.AuthorizeController (Volo.Abp.OpenIddict.AspNetCore).
[10:12:09 INF] Skipping the execution of current filter as its not the most effective filter implementing the policy Microsoft.AspNetCore.Mvc.ViewFeatures.IAntiforgeryPolicy
[10:12:09 INF] Executing SignInResult with authentication scheme (OpenIddict.Server.AspNetCore) and the following principal: System.Security.Claims.ClaimsPrincipal.
[10:12:09 INF] The authorization response was successfully returned to 'http://myapp-web/signin-oidc' using the form post response mode: {
  "code": "[redacted]",
  "id_token": "[redacted]",
  "state": "CfDJ8HK8zmwAyDJBimnLTTpa4-dlY45W4YNpdPRq9ImwQvAJEyVjWQCZ6YcsypKSOgUtujVE_coJFn156F6kyOjZrB4e8KGC0-qHg1T-rkYcuApZwf9Xyb1HNlgZ0634vk7IUoWgZ1Bx7uIe22niaIoCohNJfl7-JGjYqnVCoRGc1GJISJHC81oOjDwe9EUSGPkLOeTOYJhxT5iNoddJ0SbyXQ1qpMrbetx0c-TC3dIf6y48rVD2cWbWUJSJSv9v023jCyZMUi2s8HkRO94szR7uwdKTkjKWFCIBpg2eZLkmj1avgSd98qtzcsfBH6OIBGhsYdI_cUMIJroP0b6I1X2R3JrF3zHfY7WnATk-M8CDNOQQxPlrMqHQ6lm073R3nCOOHQ",
  "iss": "http://myapp-authserver/"
}.
[10:12:09 INF] Executed action Volo.Abp.OpenIddict.Controllers.AuthorizeController.HandleAsync (Volo.Abp.OpenIddict.AspNetCore) in 146.6306ms
[10:12:09 INF] Executed endpoint 'Volo.Abp.OpenIddict.Controllers.AuthorizeController.HandleAsync (Volo.Abp.OpenIddict.AspNetCore)'
[10:12:09 INF] Request finished HTTP/1.1 GET http://myapp-authserver/connect/authorize?client_id=Web.HelmHttpTesting&redirect_uri=http%3A%2F%2Fmyapp-web%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20roles%20email%20phone%20AccountService%20IdentityService%20AdministrationService%20SaasService%20CommonService%20CustomerService%20TestService&response_mode=form_post&nonce=638258767295213312.YmJhNjg4NzktMGEyYy00MjE4LThhY2ItMjk4NGM5NjFhZWZmZmZiNGExYmEtNGNkNC00MjFhLTgzMWQtZDJmMGM4NjZhNTVj&access_token=eyJhbGciOiJSUzI1NiIsImtpZCI6IkVBMTg0ODJFQjg0QUNCRjZCRkVCQ0FFMjRCQ0NFNjg0MURBQzVBRTEiLCJ4NXQiOiI2aGhJTHJoS3lfYV82OHJpUzh6bWhCMnNXdUUiLCJ0eXAiOiJhdCtqd3QifQ.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.dqihhdf3eVmCcanCnDjA3RYR6gE0Sun173lvJlQrc-urHNAwbvWCOUZ-sqJZUgxpbWrtlf2ztakP3ddgaYHZl2e3vWgimNnw88vLrlK_eil1eALn2v6LCerKgtlPu96kmpoUc3q-Sh04IczKTKgD0G3_4KXZ8aoTeOa7xO8SkJk5UNwwfnkriaUqk4oXCQuczGuN_TmnPe5rfq-ND3bf0xEp-DlDKbEqi482S3LSX1PGojQl-u831L_NDK64Zt-98cCmFAgh6-KBv_PkAThSFsafil3ggKt7VJbNezDjAzd0xYtI9f7_zeDbrpzA87lpZ7_kqXkO9RCJFw2SWjD_Xg&userid=ba20d69e-c8c9-5284-2040-3a0c9e277061&state=CfDJ8HK8zmwAyDJBimnLTTpa4-dlY45W4YNpdPRq9ImwQvAJEyVjWQCZ6YcsypKSOgUtujVE_coJFn156F6kyOjZrB4e8KGC0-qHg1T-rkYcuApZwf9Xyb1HNlgZ0634vk7IUoWgZ1Bx7uIe22niaIoCohNJfl7-JGjYqnVCoRGc1GJISJHC81oOjDwe9EUSGPkLOeTOYJhxT5iNoddJ0SbyXQ1qpMrbetx0c-TC3dIf6y48rVD2cWbWUJSJSv9v023jCyZMUi2s8HkRO94szR7uwdKTkjKWFCIBpg2eZLkmj1avgSd98qtzcsfBH6OIBGhsYdI_cUMIJroP0b6I1X2R3JrF3zHfY7WnATk-M8CDNOQQxPlrMqHQ6lm073R3nCOOHQ&x-client-SKU=ID_NET6_0&x-client-ver=6.15.1.0 - - - 200 2160 text/html;charset=UTF-8 239.4523ms
[10:12:09 INF] Request starting HTTP/1.1 POST http://myapp-authserver/connect/token application/x-www-form-urlencoded 182
[10:12:09 INF] The request URI matched a server endpoint: Token.
[10:12:09 INF] The token request was successfully extracted: {
  "client_id": "Web.HelmHttpTesting",
  "client_secret": "[redacted]",
  "code": "[redacted]",
  "grant_type": "authorization_code",
  "redirect_uri": "http://myapp-web/signin-oidc"
}.
[10:12:09 INF] The token request was successfully validated.
[10:12:09 INF] Executing endpoint 'Volo.Abp.OpenIddict.Controllers.TokenController.HandleAsync (Volo.Abp.OpenIddict.AspNetCore)'
[10:12:09 INF] Route matched with {action = "Handle", controller = "Token", area = "", page = ""}. Executing controller action with signature System.Threading.Tasks.Task`1[Microsoft.AspNetCore.Mvc.IActionResult] HandleAsync() on controller Volo.Abp.OpenIddict.Controllers.TokenController (Volo.Abp.OpenIddict.AspNetCore).
[10:12:09 INF] Skipping the execution of current filter as its not the most effective filter implementing the policy Microsoft.AspNetCore.Mvc.ViewFeatures.IAntiforgeryPolicy
[10:12:09 INF] Executing SignInResult with authentication scheme (OpenIddict.Server.AspNetCore) and the following principal: System.Security.Claims.ClaimsPrincipal.
[10:12:09 INF] The token '960d5798-e9b5-f264-f0e8-3a0c9eb5bf71' was successfully marked as redeemed.
[10:12:09 INF] The response was successfully returned as a JSON document: {
  "access_token": "[redacted]",
  "token_type": "Bearer",
  "expires_in": 86399,
  "scope": "openid profile roles email phone AccountService IdentityService AdministrationService SaasService CommonService CustomerService TestService",
  "id_token": "[redacted]"
}.
[10:12:09 INF] Executed action Volo.Abp.OpenIddict.Controllers.TokenController.HandleAsync (Volo.Abp.OpenIddict.AspNetCore) in 65.6186ms
[10:12:09 INF] Executed endpoint 'Volo.Abp.OpenIddict.Controllers.TokenController.HandleAsync (Volo.Abp.OpenIddict.AspNetCore)'
[10:12:09 INF] Request finished HTTP/1.1 POST http://myapp-authserver/connect/token application/x-www-form-urlencoded 182 - 200 3248 application/json;charset=UTF-8 114.1058ms
[10:12:09 INF] Request starting HTTP/1.1 GET http://myapp-authserver/connect/userinfo - -
[10:12:09 INF] The request URI matched a server endpoint: Userinfo.
[10:12:09 INF] The userinfo request was successfully extracted: {
  "access_token": "[redacted]"
}.
[10:12:09 INF] The userinfo request was successfully validated.
[10:12:09 INF] Executing endpoint 'Volo.Abp.OpenIddict.Controllers.UserInfoController.Userinfo (Volo.Abp.OpenIddict.AspNetCore)'
[10:12:09 INF] Route matched with {action = "Userinfo", controller = "UserInfo", area = "", page = ""}. Executing controller action with signature System.Threading.Tasks.Task`1[Microsoft.AspNetCore.Mvc.IActionResult] Userinfo() on controller Volo.Abp.OpenIddict.Controllers.UserInfoController (Volo.Abp.OpenIddict.AspNetCore).
[10:12:09 INF] Skipping the execution of current filter as its not the most effective filter implementing the policy Microsoft.AspNetCore.Mvc.ViewFeatures.IAntiforgeryPolicy
[10:12:09 INF] Executing OkObjectResult, writing value of type 'System.Collections.Generic.Dictionary`2[[System.String, System.Private.CoreLib, Version=7.0.0.0, Culture=neutral, PublicKeyToken=7cec85d7bea7798e],[System.Object, System.Private.CoreLib, Version=7.0.0.0, Culture=neutral, PublicKeyToken=7cec85d7bea7798e]]'.
[10:12:09 INF] Executed action Volo.Abp.OpenIddict.Controllers.UserInfoController.Userinfo (Volo.Abp.OpenIddict.AspNetCore) in 25.3332ms
[10:12:09 INF] Executed endpoint 'Volo.Abp.OpenIddict.Controllers.UserInfoController.Userinfo (Volo.Abp.OpenIddict.AspNetCore)'
[10:12:09 INF] Request finished HTTP/1.1 GET http://myapp-authserver/connect/userinfo - - - 200 - application/json;+charset=utf-8 42.7677ms
[10:12:10 INF] Request starting HTTP/1.1 GET http://myapp-authserver/api/account/profile-picture-file/4f1dab3a-b15f-50b3-2440-3a0bef8a2c5b?api-version=1.0 - -
[10:12:10 INF] Executing endpoint 'Volo.Abp.Account.AccountController.GetProfilePictureFileAsync (Volo.Abp.Account.Pro.Public.HttpApi)'
[10:12:10 INF] Route matched with {area = "account", action = "GetProfilePictureFile", controller = "Account", page = ""}. Executing controller action with signature System.Threading.Tasks.Task`1[Volo.Abp.Content.IRemoteStreamContent] GetProfilePictureFileAsync(System.Guid) on controller Volo.Abp.Account.AccountController (Volo.Abp.Account.Pro.Public.HttpApi).
[10:12:10 INF] Executing ObjectResult, writing value of type 'Volo.Abp.Content.RemoteStreamContent'.
[10:12:10 INF] Executed action Volo.Abp.Account.AccountController.GetProfilePictureFileAsync (Volo.Abp.Account.Pro.Public.HttpApi) in 38.0525ms
[10:12:10 INF] Executed endpoint 'Volo.Abp.Account.AccountController.GetProfilePictureFileAsync (Volo.Abp.Account.Pro.Public.HttpApi)'
[10:12:10 INF] Request finished HTTP/1.1 GET http://myapp-authserver/api/account/profile-picture-file/4f1dab3a-b15f-50b3-2440-3a0bef8a2c5b?api-version=1.0 - - - 200 230348 image/jpeg 45.8526ms
Zobrazeno od 21 do 30 z celkem 49 záznamů
Made with ❤️ on ABP v8.2.0-preview Updated on března 25, 2024, 15:11