Skip to content

Commit

Permalink
chore: replace "GSoft" occurrences for "Workleap", when applicable (#30)
Browse files Browse the repository at this point in the history
  • Loading branch information
felpel authored Jul 20, 2023
1 parent 686bce1 commit 7f45b21
Show file tree
Hide file tree
Showing 20 changed files with 55 additions and 55 deletions.
10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# GSoft.Extensions.Configuration.Secrets
# Workleap.Extensions.Configuration.Secrets

[![nuget](https://img.shields.io/nuget/v/GSoft.Extensions.Configuration.Secrets.svg?logo=nuget)](https://www.nuget.org/packages/GSoft.Extensions.Configuration.Secrets/)
[![build](https://img.shields.io/github/actions/workflow/status/gsoft-inc/gsoft-extensions-configuration-secrets/publish.yml?logo=github)](https://github.com/gsoft-inc/gsoft-extensions-configuration-secrets/actions/workflows/publish.yml)
[![nuget](https://img.shields.io/nuget/v/Workleap.Extensions.Configuration.Secrets.svg?logo=nuget)](https://www.nuget.org/packages/Workleap.Extensions.Configuration.Secrets/)
[![build](https://img.shields.io/github/actions/workflow/status/gsoft-inc/wl-extensions-configuration-secrets/publish.yml?logo=github)](https://github.com/gsoft-inc/wl-extensions-configuration-secrets/actions/workflows/publish.yml)

This package allows storing configuration values in [Azure Key Vault Secrets](https://docs.microsoft.com/en-us/dotnet/api/overview/azure/extensions.aspnetcore.configuration.secrets-readme),
using the right [Azure credentials](https://docs.microsoft.com/en-us/dotnet/api/overview/azure/identity-readme#credential-classes) based on the current [environment](https://docs.microsoft.com/en-us/dotnet/core/extensions/generic-host#ihostenvironment).
Expand All @@ -12,7 +12,7 @@ It can also be used to register `ITokenCredentialProvider` and `ISecretClientPro
## Getting started

```
dotnet add package GSoft.Extensions.Configuration.Secrets
dotnet add package Workleap.Extensions.Configuration.Secrets
```

Example with an **ASP.NET Core minimal API**:
Expand Down Expand Up @@ -59,4 +59,4 @@ var secretClient = secretClientProvider.GetSecretClient(configurationKey);

## License

Copyright © 2022, GSoft inc. This code is licensed under the Apache License, Version 2.0. You may obtain a copy of this license at https://github.com/gsoft-inc/gsoft-license/blob/master/LICENSE.
Copyright © 2022, Workleap. This code is licensed under the Apache License, Version 2.0. You may obtain a copy of this license at https://github.com/gsoft-inc/gsoft-license/blob/master/LICENSE.
8 changes: 4 additions & 4 deletions src/Directory.Build.props
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
<Project>
<PropertyGroup>
<Copyright>Copyright © Groupe GSoft Inc. $([System.DateTime]::UtcNow.ToString(yyyy))</Copyright>
<Authors>GSoft Group Inc.</Authors>
<Owners>GSoft Group Inc.</Owners>
<PackageProjectUrl>https://github.com/gsoft-inc/gsoft-extensions-configuration-secrets</PackageProjectUrl>
<Copyright>Copyright © Workleap. $([System.DateTime]::UtcNow.ToString(yyyy))</Copyright>
<Authors>Workleap</Authors>
<Owners>Workleap</Owners>
<PackageProjectUrl>https://github.com/gsoft-inc/wl-extensions-configuration-secrets</PackageProjectUrl>
<PublishRepositoryUrl>true</PublishRepositoryUrl>
<PackageLicenseExpression>Apache-2.0</PackageLicenseExpression>
<LangVersion>10</LangVersion>
Expand Down
27 changes: 0 additions & 27 deletions src/GSoft.Extensions.Configuration.Secrets/PublicAPI.Shipped.txt

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
namespace GSoft.Extensions.Configuration.Secrets.Tests;
namespace Workleap.Extensions.Configuration.Secrets.Tests;

public class CachedInteractiveBrowserCredentialTests
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
using Microsoft.Extensions.FileProviders;
using Microsoft.Extensions.Hosting;

namespace GSoft.Extensions.Configuration.Secrets.Tests;
namespace Workleap.Extensions.Configuration.Secrets.Tests;

public class TokenCredentialProviderTests
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@
<IsPackable>false</IsPackable>
<IsTestProject>true</IsTestProject>
<SignAssembly>true</SignAssembly>
<AssemblyOriginatorKeyFile>../GSoft.Extensions.Configuration.Secrets.snk</AssemblyOriginatorKeyFile>
<AssemblyOriginatorKeyFile>../Workleap.Extensions.Configuration.Secrets.snk</AssemblyOriginatorKeyFile>
</PropertyGroup>

<ItemGroup>
<ProjectReference Include="..\GSoft.Extensions.Configuration.Secrets\GSoft.Extensions.Configuration.Secrets.csproj" />
<ProjectReference Include="..\Workleap.Extensions.Configuration.Secrets\Workleap.Extensions.Configuration.Secrets.csproj" />
</ItemGroup>

<ItemGroup>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio Version 16
VisualStudioVersion = 16.0.30114.105
MinimumVisualStudioVersion = 10.0.40219.1
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "GSoft.Extensions.Configuration.Secrets", "GSoft.Extensions.Configuration.Secrets\GSoft.Extensions.Configuration.Secrets.csproj", "{14419884-4E2D-4E4E-82EC-0479BF7C9771}"
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Workleap.Extensions.Configuration.Secrets", "Workleap.Extensions.Configuration.Secrets\Workleap.Extensions.Configuration.Secrets.csproj", "{14419884-4E2D-4E4E-82EC-0479BF7C9771}"
EndProject
Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "files", "files", "{52ECE719-1249-44BF-8009-9F8EB307F0C7}"
ProjectSection(SolutionItems) = preProject
Expand All @@ -12,7 +12,7 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "files", "files", "{52ECE719
..\README.md = ..\README.md
EndProjectSection
EndProject
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "GSoft.Extensions.Configuration.Secrets.Tests", "GSoft.Extensions.Configuration.Secrets.Tests\GSoft.Extensions.Configuration.Secrets.Tests.csproj", "{95BDB0B0-DB8E-4CF7-B856-3D0CB27D8025}"
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Workleap.Extensions.Configuration.Secrets.Tests", "Workleap.Extensions.Configuration.Secrets.Tests\Workleap.Extensions.Configuration.Secrets.Tests.csproj", "{95BDB0B0-DB8E-4CF7-B856-3D0CB27D8025}"
EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
using Azure.Core;
using Azure.Identity;

namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

/// <summary>
/// This class should only be used for development purposes
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
using System;

namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

internal static class FiddlerProxyDetector
{
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
using System;
using Azure.Security.KeyVault.Secrets;

namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

public interface ISecretClientProvider
{
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
using Azure.Core;

namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

public interface ITokenCredentialProvider
{
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

public enum KeyVaultKind
{
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
#nullable enable
const Workleap.Extensions.Configuration.Secrets.SecretClientConfigurationKeys.ApplicationConfiguration = "Azure:KeyVaults:ApplicationConfiguration" -> string!
const Workleap.Extensions.Configuration.Secrets.SecretClientConfigurationKeys.UserPersonalInformation = "Azure:KeyVaults:UserPersonalInformation" -> string!
Workleap.Extensions.Configuration.Secrets.ISecretClientProvider
Workleap.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(Workleap.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient!
Workleap.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(string! configurationKey, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient!
Workleap.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(System.Uri! keyVaultUri, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient!
Workleap.Extensions.Configuration.Secrets.ITokenCredentialProvider
Workleap.Extensions.Configuration.Secrets.ITokenCredentialProvider.GetTokenCredential() -> Azure.Core.TokenCredential!
Workleap.Extensions.Configuration.Secrets.KeyVaultKind
Workleap.Extensions.Configuration.Secrets.KeyVaultKind.ApplicationConfiguration = 0 -> Workleap.Extensions.Configuration.Secrets.KeyVaultKind
Workleap.Extensions.Configuration.Secrets.KeyVaultKind.UserPersonalInformation = 1 -> Workleap.Extensions.Configuration.Secrets.KeyVaultKind
Workleap.Extensions.Configuration.Secrets.SecretClientConfigurationKeys
Workleap.Extensions.Configuration.Secrets.SecretClientProvider
Workleap.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(Workleap.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient!
Workleap.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(string! configurationKey, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient!
Workleap.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(System.Uri! keyVaultUri, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient!
Workleap.Extensions.Configuration.Secrets.SecretClientProvider.SecretClientProvider(Microsoft.Extensions.Configuration.IConfiguration! configuration, Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void
Workleap.Extensions.Configuration.Secrets.SecretClientProvider.SecretClientProvider(Microsoft.Extensions.Configuration.IConfigurationBuilder! configurationBuilder, Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void
Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions
Workleap.Extensions.Configuration.Secrets.TokenCredentialProvider
Workleap.Extensions.Configuration.Secrets.TokenCredentialProvider.GetTokenCredential() -> Azure.Core.TokenCredential!
Workleap.Extensions.Configuration.Secrets.TokenCredentialProvider.TokenCredentialProvider(Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void
static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null, Workleap.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind = Workleap.Extensions.Configuration.Secrets.KeyVaultKind.ApplicationConfiguration) -> Microsoft.Extensions.Configuration.IConfigurationBuilder!
static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, string! configurationKey, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null) -> Microsoft.Extensions.Configuration.IConfigurationBuilder!
static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, System.Uri! keyVaultUri, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null) -> Microsoft.Extensions.Configuration.IConfigurationBuilder!
static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.DependencyInjection.IServiceCollection! services) -> Microsoft.Extensions.DependencyInjection.IServiceCollection!
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

public static class SecretClientConfigurationKeys
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.Hosting;

namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

public sealed class SecretClientProvider : ISecretClientProvider
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
using Microsoft.Extensions.DependencyInjection.Extensions;
using Microsoft.Extensions.Hosting;

namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

public static class ServiceCollectionExtensions
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
using Azure.Identity;
using Microsoft.Extensions.Hosting;

namespace GSoft.Extensions.Configuration.Secrets;
namespace Workleap.Extensions.Configuration.Secrets;

public sealed class TokenCredentialProvider : ITokenCredentialProvider
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,12 @@
<IsPackable>True</IsPackable>
<IncludeSymbols>True</IncludeSymbols>
<SymbolPackageFormat>snupkg</SymbolPackageFormat>
<AssemblyTitle>GSoft.Extensions.Configuration.Secrets</AssemblyTitle>
<PackageId>GSoft.Extensions.Configuration.Secrets</PackageId>
<AssemblyTitle>Workleap.Extensions.Configuration.Secrets</AssemblyTitle>
<PackageId>Workleap.Extensions.Configuration.Secrets</PackageId>
<PackageReadmeFile>README.md</PackageReadmeFile>
<PublishRepositoryUrl>true</PublishRepositoryUrl>
<SignAssembly>true</SignAssembly>
<AssemblyOriginatorKeyFile>../GSoft.Extensions.Configuration.Secrets.snk</AssemblyOriginatorKeyFile>
<AssemblyOriginatorKeyFile>../Workleap.Extensions.Configuration.Secrets.snk</AssemblyOriginatorKeyFile>
</PropertyGroup>

<ItemGroup>
Expand All @@ -29,7 +29,7 @@

<ItemGroup>
<!-- Exposes internal symbols to test projects and mocking libraries -->
<InternalsVisibleTo Include="GSoft.Extensions.Configuration.Secrets.Tests,PublicKey=002400000480000094000000060200000024000052534131000400000100010025301ce547647ab5ac9264ade0f9cdc0252796a257095add4791b0232c1def21bb9e0c87d218713f918565b23394362dbcb058e210c853a24ec33e6925ebedf654a0d65efb3828c855ff21eaaa67aeb9b24b81b8baff582a03df6ab04424c7e53cacbfe84d2765ce840389f900c55824d037d2c5b6b330ac0188a06ef6869dba" />
<InternalsVisibleTo Include="Workleap.Extensions.Configuration.Secrets.Tests,PublicKey=002400000480000094000000060200000024000052534131000400000100010025301ce547647ab5ac9264ade0f9cdc0252796a257095add4791b0232c1def21bb9e0c87d218713f918565b23394362dbcb058e210c853a24ec33e6925ebedf654a0d65efb3828c855ff21eaaa67aeb9b24b81b8baff582a03df6ab04424c7e53cacbfe84d2765ce840389f900c55824d037d2c5b6b330ac0188a06ef6869dba" />
<InternalsVisibleTo Include="DynamicProxyGenAssembly2, PublicKey=0024000004800000940000000602000000240000525341310004000001000100c547cac37abd99c8db225ef2f6c8a3602f3b3606cc9891605d02baa56104f4cfc0734aa39b93bf7852f7d9266654753cc297e7d2edfe0bac1cdcf9f717241550e0a7b191195b7667bb4f64bcb8e2121380fd1d9d46ad2d92d2d15605093924cceaf74c4861eff62abf69b9291ed0a340e113be11e6a7d3113e92484cf7045cc7" />
</ItemGroup>
</Project>

0 comments on commit 7f45b21

Please sign in to comment.