Skip to content

Commit af9b3b5

Browse files
committed
remove comments
1 parent 0be0e90 commit af9b3b5

File tree

1 file changed

+0
-14
lines changed

1 file changed

+0
-14
lines changed

tests/integration/Microsoft.Bot.Builder.Integration.AspNet.Core.Tests/CloudAdapterTests.cs

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -811,20 +811,6 @@ public async Task ExpiredTokenShouldThrowUnauthorizedAccessException()
811811
// Arrange
812812
var headerDictionaryMock = new Mock<IHeaderDictionary>();
813813

814-
// Expired token with removed AppID
815-
// This token will be validated against real endpoint https://login.microsoftonline.com/common/discovery/v2.0/keys
816-
// So when the signing key is removed in endpoint, it will not be Expired exception, we need to generate a new token
817-
// - create a new app registration: https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/CreateApplicationBlade/quickStartType~/null/isMSAApp~/false
818-
// - create an access token via powershell script (need to wait for one day so it is expired)
819-
// $Form = @{
820-
// client_id = "YOUR_APP_ID"
821-
// scope = "https://api.botframework.com/.default"
822-
// client_secret = "YOUR_APP_SECRET"
823-
// grant_type = "client_credentials"
824-
// }
825-
// (Invoke-WebRequest -Uri 'https://login.microsoftonline.com/botframework.com/oauth2/v2.0/token' -Method Post -Form $Form).Content
826-
// - delete the app
827-
828814
// Fake expired token
829815
var tid = Guid.NewGuid().ToString();
830816
var header = new { alg = "RS256", typ = "JWT", kid = Guid.NewGuid().ToString() };

0 commit comments

Comments
 (0)