Remove JIRA_SCHEMA_ID from entire application

- Remove JIRA_SCHEMA_ID from all documentation, config files, and scripts
- Update generate-schema.ts to always auto-discover schemas dynamically
- Runtime application already discovers schemas via /objectschema/list API
- Build script now automatically selects schema with most objects
- Remove JIRA_SCHEMA_ID from docker-compose.yml, Azure setup scripts, and all docs
- Application is now fully schema-agnostic and discovers schemas automatically
This commit is contained in:
2026-01-22 22:56:29 +01:00
parent f4399a8e4e
commit 57e4adc69c
14 changed files with 63 additions and 47 deletions

View File

@@ -22,13 +22,11 @@ FRONTEND_URL="https://${FRONTEND_APP_NAME}.azurewebsites.net"
echo ""
echo "📝 Configure these values:"
echo " JIRA_SCHEMA_ID: (your Jira schema ID)"
echo " JIRA_PAT: (your Jira Personal Access Token)"
echo " Or JIRA_OAUTH_CLIENT_ID and JIRA_OAUTH_CLIENT_SECRET"
echo ""
# Prompt for values (or set them as environment variables)
read -p "Enter JIRA_SCHEMA_ID (or press Enter to skip): " JIRA_SCHEMA_ID
read -p "Enter JIRA_PAT (or press Enter to skip): " JIRA_PAT
read -p "Enter JIRA_OAUTH_CLIENT_ID (or press Enter to skip): " JIRA_OAUTH_CLIENT_ID
read -p "Enter JIRA_OAUTH_CLIENT_SECRET (or press Enter to skip): " JIRA_OAUTH_CLIENT_SECRET
@@ -39,10 +37,6 @@ echo "🔧 Configuring backend app settings..."
# Build settings string
SETTINGS="NODE_ENV=production PORT=3001 JIRA_BASE_URL=https://jira.zuyderland.nl SESSION_SECRET=${SESSION_SECRET} FRONTEND_URL=${FRONTEND_URL}"
if [ -n "$JIRA_SCHEMA_ID" ]; then
SETTINGS="${SETTINGS} JIRA_SCHEMA_ID=${JIRA_SCHEMA_ID}"
fi
if [ -n "$JIRA_PAT" ]; then
SETTINGS="${SETTINGS} JIRA_PAT=${JIRA_PAT}"
fi

View File

@@ -200,13 +200,11 @@ echo " - JiraPat (if using PAT authentication)"
echo " - SessionSecret (generate with: openssl rand -hex 32)"
echo " - JiraOAuthClientId (if using OAuth)"
echo " - JiraOAuthClientSecret (if using OAuth)"
echo " - JiraSchemaId"
echo ""
echo "Commands to add secrets:"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name SessionSecret --value \$(openssl rand -hex 32)"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name JiraOAuthClientId --value <your-client-id>"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name JiraOAuthClientSecret --value <your-client-secret>"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name JiraSchemaId --value <your-schema-id>"
echo ""
echo -e "${GREEN}Step 5: Creating Application Insights...${NC}"
@@ -382,7 +380,6 @@ echo "1. Add secrets to Key Vault:"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name SessionSecret --value \$(openssl rand -hex 32)"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name JiraOAuthClientId --value <your-client-id>"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name JiraOAuthClientSecret --value <your-client-secret>"
echo " az keyvault secret set --vault-name $KEY_VAULT_NAME --name JiraSchemaId --value <your-schema-id>"
echo ""
echo "2. Update backend app settings to use Key Vault references:"
echo " See AZURE-NEW-SUBSCRIPTION-SETUP.md for details"