diff --git a/README.md b/README.md index 10fc060..6a8efb2 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ -# GSoft.Extensions.Configuration.Secrets +# Workleap.Extensions.Configuration.Secrets -[![nuget](https://img.shields.io/nuget/v/GSoft.Extensions.Configuration.Secrets.svg?logo=nuget)](https://www.nuget.org/packages/GSoft.Extensions.Configuration.Secrets/) -[![build](https://img.shields.io/github/actions/workflow/status/gsoft-inc/gsoft-extensions-configuration-secrets/publish.yml?logo=github)](https://github.com/gsoft-inc/gsoft-extensions-configuration-secrets/actions/workflows/publish.yml) +[![nuget](https://img.shields.io/nuget/v/Workleap.Extensions.Configuration.Secrets.svg?logo=nuget)](https://www.nuget.org/packages/Workleap.Extensions.Configuration.Secrets/) +[![build](https://img.shields.io/github/actions/workflow/status/gsoft-inc/wl-extensions-configuration-secrets/publish.yml?logo=github)](https://github.com/gsoft-inc/wl-extensions-configuration-secrets/actions/workflows/publish.yml) This package allows storing configuration values in [Azure Key Vault Secrets](https://docs.microsoft.com/en-us/dotnet/api/overview/azure/extensions.aspnetcore.configuration.secrets-readme), using the right [Azure credentials](https://docs.microsoft.com/en-us/dotnet/api/overview/azure/identity-readme#credential-classes) based on the current [environment](https://docs.microsoft.com/en-us/dotnet/core/extensions/generic-host#ihostenvironment). @@ -12,7 +12,7 @@ It can also be used to register `ITokenCredentialProvider` and `ISecretClientPro ## Getting started ``` -dotnet add package GSoft.Extensions.Configuration.Secrets +dotnet add package Workleap.Extensions.Configuration.Secrets ``` Example with an **ASP.NET Core minimal API**: @@ -59,4 +59,4 @@ var secretClient = secretClientProvider.GetSecretClient(configurationKey); ## License -Copyright © 2022, GSoft inc. This code is licensed under the Apache License, Version 2.0. You may obtain a copy of this license at https://github.com/gsoft-inc/gsoft-license/blob/master/LICENSE. +Copyright © 2022, Workleap. This code is licensed under the Apache License, Version 2.0. You may obtain a copy of this license at https://github.com/gsoft-inc/gsoft-license/blob/master/LICENSE. diff --git a/src/Directory.Build.props b/src/Directory.Build.props index c1a5c3f..f5972a3 100644 --- a/src/Directory.Build.props +++ b/src/Directory.Build.props @@ -1,9 +1,9 @@ - Copyright © Groupe GSoft Inc. $([System.DateTime]::UtcNow.ToString(yyyy)) - GSoft Group Inc. - GSoft Group Inc. - https://github.com/gsoft-inc/gsoft-extensions-configuration-secrets + Copyright © Workleap. $([System.DateTime]::UtcNow.ToString(yyyy)) + Workleap + Workleap + https://github.com/gsoft-inc/wl-extensions-configuration-secrets true Apache-2.0 10 diff --git a/src/GSoft.Extensions.Configuration.Secrets/PublicAPI.Shipped.txt b/src/GSoft.Extensions.Configuration.Secrets/PublicAPI.Shipped.txt deleted file mode 100644 index 5adcac0..0000000 --- a/src/GSoft.Extensions.Configuration.Secrets/PublicAPI.Shipped.txt +++ /dev/null @@ -1,27 +0,0 @@ -#nullable enable -const GSoft.Extensions.Configuration.Secrets.SecretClientConfigurationKeys.ApplicationConfiguration = "Azure:KeyVaults:ApplicationConfiguration" -> string! -const GSoft.Extensions.Configuration.Secrets.SecretClientConfigurationKeys.UserPersonalInformation = "Azure:KeyVaults:UserPersonalInformation" -> string! -GSoft.Extensions.Configuration.Secrets.ISecretClientProvider -GSoft.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(GSoft.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! -GSoft.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(string! configurationKey, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! -GSoft.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(System.Uri! keyVaultUri, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! -GSoft.Extensions.Configuration.Secrets.ITokenCredentialProvider -GSoft.Extensions.Configuration.Secrets.ITokenCredentialProvider.GetTokenCredential() -> Azure.Core.TokenCredential! -GSoft.Extensions.Configuration.Secrets.KeyVaultKind -GSoft.Extensions.Configuration.Secrets.KeyVaultKind.ApplicationConfiguration = 0 -> GSoft.Extensions.Configuration.Secrets.KeyVaultKind -GSoft.Extensions.Configuration.Secrets.KeyVaultKind.UserPersonalInformation = 1 -> GSoft.Extensions.Configuration.Secrets.KeyVaultKind -GSoft.Extensions.Configuration.Secrets.SecretClientConfigurationKeys -GSoft.Extensions.Configuration.Secrets.SecretClientProvider -GSoft.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(GSoft.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! -GSoft.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(string! configurationKey, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! -GSoft.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(System.Uri! keyVaultUri, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! -GSoft.Extensions.Configuration.Secrets.SecretClientProvider.SecretClientProvider(Microsoft.Extensions.Configuration.IConfiguration! configuration, Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void -GSoft.Extensions.Configuration.Secrets.SecretClientProvider.SecretClientProvider(Microsoft.Extensions.Configuration.IConfigurationBuilder! configurationBuilder, Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void -GSoft.Extensions.Configuration.Secrets.ServiceCollectionExtensions -GSoft.Extensions.Configuration.Secrets.TokenCredentialProvider -GSoft.Extensions.Configuration.Secrets.TokenCredentialProvider.GetTokenCredential() -> Azure.Core.TokenCredential! -GSoft.Extensions.Configuration.Secrets.TokenCredentialProvider.TokenCredentialProvider(Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void -static GSoft.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null, GSoft.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind = GSoft.Extensions.Configuration.Secrets.KeyVaultKind.ApplicationConfiguration) -> Microsoft.Extensions.Configuration.IConfigurationBuilder! -static GSoft.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, string! configurationKey, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null) -> Microsoft.Extensions.Configuration.IConfigurationBuilder! -static GSoft.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, System.Uri! keyVaultUri, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null) -> Microsoft.Extensions.Configuration.IConfigurationBuilder! -static GSoft.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.DependencyInjection.IServiceCollection! services) -> Microsoft.Extensions.DependencyInjection.IServiceCollection! \ No newline at end of file diff --git a/src/GSoft.Extensions.Configuration.Secrets.Tests/CachedInteractiveBrowserCredentialTests.cs b/src/Workleap.Extensions.Configuration.Secrets.Tests/CachedInteractiveBrowserCredentialTests.cs similarity index 84% rename from src/GSoft.Extensions.Configuration.Secrets.Tests/CachedInteractiveBrowserCredentialTests.cs rename to src/Workleap.Extensions.Configuration.Secrets.Tests/CachedInteractiveBrowserCredentialTests.cs index 1c9f5df..5b1337f 100644 --- a/src/GSoft.Extensions.Configuration.Secrets.Tests/CachedInteractiveBrowserCredentialTests.cs +++ b/src/Workleap.Extensions.Configuration.Secrets.Tests/CachedInteractiveBrowserCredentialTests.cs @@ -1,4 +1,4 @@ -namespace GSoft.Extensions.Configuration.Secrets.Tests; +namespace Workleap.Extensions.Configuration.Secrets.Tests; public class CachedInteractiveBrowserCredentialTests { diff --git a/src/GSoft.Extensions.Configuration.Secrets.Tests/TokenCredentialProviderTests.cs b/src/Workleap.Extensions.Configuration.Secrets.Tests/TokenCredentialProviderTests.cs similarity index 96% rename from src/GSoft.Extensions.Configuration.Secrets.Tests/TokenCredentialProviderTests.cs rename to src/Workleap.Extensions.Configuration.Secrets.Tests/TokenCredentialProviderTests.cs index 7c397ac..3724640 100644 --- a/src/GSoft.Extensions.Configuration.Secrets.Tests/TokenCredentialProviderTests.cs +++ b/src/Workleap.Extensions.Configuration.Secrets.Tests/TokenCredentialProviderTests.cs @@ -2,7 +2,7 @@ using Microsoft.Extensions.FileProviders; using Microsoft.Extensions.Hosting; -namespace GSoft.Extensions.Configuration.Secrets.Tests; +namespace Workleap.Extensions.Configuration.Secrets.Tests; public class TokenCredentialProviderTests { diff --git a/src/GSoft.Extensions.Configuration.Secrets.Tests/GSoft.Extensions.Configuration.Secrets.Tests.csproj b/src/Workleap.Extensions.Configuration.Secrets.Tests/Workleap.Extensions.Configuration.Secrets.Tests.csproj similarity index 81% rename from src/GSoft.Extensions.Configuration.Secrets.Tests/GSoft.Extensions.Configuration.Secrets.Tests.csproj rename to src/Workleap.Extensions.Configuration.Secrets.Tests/Workleap.Extensions.Configuration.Secrets.Tests.csproj index aef73ba..5d3d9e8 100644 --- a/src/GSoft.Extensions.Configuration.Secrets.Tests/GSoft.Extensions.Configuration.Secrets.Tests.csproj +++ b/src/Workleap.Extensions.Configuration.Secrets.Tests/Workleap.Extensions.Configuration.Secrets.Tests.csproj @@ -4,11 +4,11 @@ false true true - ../GSoft.Extensions.Configuration.Secrets.snk + ../Workleap.Extensions.Configuration.Secrets.snk - + diff --git a/src/GSoft.Extensions.Configuration.Secrets.sln b/src/Workleap.Extensions.Configuration.Secrets.sln similarity index 75% rename from src/GSoft.Extensions.Configuration.Secrets.sln rename to src/Workleap.Extensions.Configuration.Secrets.sln index 721d2aa..1a68273 100644 --- a/src/GSoft.Extensions.Configuration.Secrets.sln +++ b/src/Workleap.Extensions.Configuration.Secrets.sln @@ -3,7 +3,7 @@ Microsoft Visual Studio Solution File, Format Version 12.00 # Visual Studio Version 16 VisualStudioVersion = 16.0.30114.105 MinimumVisualStudioVersion = 10.0.40219.1 -Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "GSoft.Extensions.Configuration.Secrets", "GSoft.Extensions.Configuration.Secrets\GSoft.Extensions.Configuration.Secrets.csproj", "{14419884-4E2D-4E4E-82EC-0479BF7C9771}" +Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Workleap.Extensions.Configuration.Secrets", "Workleap.Extensions.Configuration.Secrets\Workleap.Extensions.Configuration.Secrets.csproj", "{14419884-4E2D-4E4E-82EC-0479BF7C9771}" EndProject Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "files", "files", "{52ECE719-1249-44BF-8009-9F8EB307F0C7}" ProjectSection(SolutionItems) = preProject @@ -12,7 +12,7 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "files", "files", "{52ECE719 ..\README.md = ..\README.md EndProjectSection EndProject -Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "GSoft.Extensions.Configuration.Secrets.Tests", "GSoft.Extensions.Configuration.Secrets.Tests\GSoft.Extensions.Configuration.Secrets.Tests.csproj", "{95BDB0B0-DB8E-4CF7-B856-3D0CB27D8025}" +Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Workleap.Extensions.Configuration.Secrets.Tests", "Workleap.Extensions.Configuration.Secrets.Tests\Workleap.Extensions.Configuration.Secrets.Tests.csproj", "{95BDB0B0-DB8E-4CF7-B856-3D0CB27D8025}" EndProject Global GlobalSection(SolutionConfigurationPlatforms) = preSolution diff --git a/src/GSoft.Extensions.Configuration.Secrets.snk b/src/Workleap.Extensions.Configuration.Secrets.snk similarity index 100% rename from src/GSoft.Extensions.Configuration.Secrets.snk rename to src/Workleap.Extensions.Configuration.Secrets.snk diff --git a/src/GSoft.Extensions.Configuration.Secrets/CachedInteractiveBrowserCredential.cs b/src/Workleap.Extensions.Configuration.Secrets/CachedInteractiveBrowserCredential.cs similarity index 98% rename from src/GSoft.Extensions.Configuration.Secrets/CachedInteractiveBrowserCredential.cs rename to src/Workleap.Extensions.Configuration.Secrets/CachedInteractiveBrowserCredential.cs index d2b875f..df59341 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/CachedInteractiveBrowserCredential.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/CachedInteractiveBrowserCredential.cs @@ -6,7 +6,7 @@ using Azure.Core; using Azure.Identity; -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; /// /// This class should only be used for development purposes diff --git a/src/GSoft.Extensions.Configuration.Secrets/FiddlerProxyDetector.cs b/src/Workleap.Extensions.Configuration.Secrets/FiddlerProxyDetector.cs similarity index 95% rename from src/GSoft.Extensions.Configuration.Secrets/FiddlerProxyDetector.cs rename to src/Workleap.Extensions.Configuration.Secrets/FiddlerProxyDetector.cs index 9591cac..6ade3b7 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/FiddlerProxyDetector.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/FiddlerProxyDetector.cs @@ -1,6 +1,6 @@ using System; -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; internal static class FiddlerProxyDetector { diff --git a/src/GSoft.Extensions.Configuration.Secrets/ISecretClientProvider.cs b/src/Workleap.Extensions.Configuration.Secrets/ISecretClientProvider.cs similarity index 87% rename from src/GSoft.Extensions.Configuration.Secrets/ISecretClientProvider.cs rename to src/Workleap.Extensions.Configuration.Secrets/ISecretClientProvider.cs index d3da4f8..120a271 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/ISecretClientProvider.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/ISecretClientProvider.cs @@ -1,7 +1,7 @@ using System; using Azure.Security.KeyVault.Secrets; -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; public interface ISecretClientProvider { diff --git a/src/GSoft.Extensions.Configuration.Secrets/ITokenCredentialProvider.cs b/src/Workleap.Extensions.Configuration.Secrets/ITokenCredentialProvider.cs similarity index 67% rename from src/GSoft.Extensions.Configuration.Secrets/ITokenCredentialProvider.cs rename to src/Workleap.Extensions.Configuration.Secrets/ITokenCredentialProvider.cs index f777ab6..74aa15a 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/ITokenCredentialProvider.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/ITokenCredentialProvider.cs @@ -1,6 +1,6 @@ using Azure.Core; -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; public interface ITokenCredentialProvider { diff --git a/src/GSoft.Extensions.Configuration.Secrets/KeyVaultKind.cs b/src/Workleap.Extensions.Configuration.Secrets/KeyVaultKind.cs similarity index 87% rename from src/GSoft.Extensions.Configuration.Secrets/KeyVaultKind.cs rename to src/Workleap.Extensions.Configuration.Secrets/KeyVaultKind.cs index ef10f1e..f2bf0db 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/KeyVaultKind.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/KeyVaultKind.cs @@ -1,4 +1,4 @@ -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; public enum KeyVaultKind { diff --git a/src/Workleap.Extensions.Configuration.Secrets/PublicAPI.Shipped.txt b/src/Workleap.Extensions.Configuration.Secrets/PublicAPI.Shipped.txt new file mode 100644 index 0000000..dfeab93 --- /dev/null +++ b/src/Workleap.Extensions.Configuration.Secrets/PublicAPI.Shipped.txt @@ -0,0 +1,27 @@ +#nullable enable +const Workleap.Extensions.Configuration.Secrets.SecretClientConfigurationKeys.ApplicationConfiguration = "Azure:KeyVaults:ApplicationConfiguration" -> string! +const Workleap.Extensions.Configuration.Secrets.SecretClientConfigurationKeys.UserPersonalInformation = "Azure:KeyVaults:UserPersonalInformation" -> string! +Workleap.Extensions.Configuration.Secrets.ISecretClientProvider +Workleap.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(Workleap.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! +Workleap.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(string! configurationKey, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! +Workleap.Extensions.Configuration.Secrets.ISecretClientProvider.GetSecretClient(System.Uri! keyVaultUri, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! +Workleap.Extensions.Configuration.Secrets.ITokenCredentialProvider +Workleap.Extensions.Configuration.Secrets.ITokenCredentialProvider.GetTokenCredential() -> Azure.Core.TokenCredential! +Workleap.Extensions.Configuration.Secrets.KeyVaultKind +Workleap.Extensions.Configuration.Secrets.KeyVaultKind.ApplicationConfiguration = 0 -> Workleap.Extensions.Configuration.Secrets.KeyVaultKind +Workleap.Extensions.Configuration.Secrets.KeyVaultKind.UserPersonalInformation = 1 -> Workleap.Extensions.Configuration.Secrets.KeyVaultKind +Workleap.Extensions.Configuration.Secrets.SecretClientConfigurationKeys +Workleap.Extensions.Configuration.Secrets.SecretClientProvider +Workleap.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(Workleap.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! +Workleap.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(string! configurationKey, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! +Workleap.Extensions.Configuration.Secrets.SecretClientProvider.GetSecretClient(System.Uri! keyVaultUri, Azure.Security.KeyVault.Secrets.SecretClientOptions? options = null) -> Azure.Security.KeyVault.Secrets.SecretClient! +Workleap.Extensions.Configuration.Secrets.SecretClientProvider.SecretClientProvider(Microsoft.Extensions.Configuration.IConfiguration! configuration, Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void +Workleap.Extensions.Configuration.Secrets.SecretClientProvider.SecretClientProvider(Microsoft.Extensions.Configuration.IConfigurationBuilder! configurationBuilder, Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void +Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions +Workleap.Extensions.Configuration.Secrets.TokenCredentialProvider +Workleap.Extensions.Configuration.Secrets.TokenCredentialProvider.GetTokenCredential() -> Azure.Core.TokenCredential! +Workleap.Extensions.Configuration.Secrets.TokenCredentialProvider.TokenCredentialProvider(Microsoft.Extensions.Hosting.IHostEnvironment! environment) -> void +static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null, Workleap.Extensions.Configuration.Secrets.KeyVaultKind keyVaultKind = Workleap.Extensions.Configuration.Secrets.KeyVaultKind.ApplicationConfiguration) -> Microsoft.Extensions.Configuration.IConfigurationBuilder! +static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, string! configurationKey, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null) -> Microsoft.Extensions.Configuration.IConfigurationBuilder! +static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.Configuration.IConfigurationBuilder! builder, Microsoft.Extensions.Hosting.IHostEnvironment! environment, System.Uri! keyVaultUri, Azure.Extensions.AspNetCore.Configuration.Secrets.AzureKeyVaultConfigurationOptions? options = null) -> Microsoft.Extensions.Configuration.IConfigurationBuilder! +static Workleap.Extensions.Configuration.Secrets.ServiceCollectionExtensions.AddKeyVaultSecrets(this Microsoft.Extensions.DependencyInjection.IServiceCollection! services) -> Microsoft.Extensions.DependencyInjection.IServiceCollection! \ No newline at end of file diff --git a/src/GSoft.Extensions.Configuration.Secrets/PublicAPI.Unshipped.txt b/src/Workleap.Extensions.Configuration.Secrets/PublicAPI.Unshipped.txt similarity index 100% rename from src/GSoft.Extensions.Configuration.Secrets/PublicAPI.Unshipped.txt rename to src/Workleap.Extensions.Configuration.Secrets/PublicAPI.Unshipped.txt diff --git a/src/GSoft.Extensions.Configuration.Secrets/SecretClientConfigurationKeys.cs b/src/Workleap.Extensions.Configuration.Secrets/SecretClientConfigurationKeys.cs similarity index 81% rename from src/GSoft.Extensions.Configuration.Secrets/SecretClientConfigurationKeys.cs rename to src/Workleap.Extensions.Configuration.Secrets/SecretClientConfigurationKeys.cs index 52f2e4a..67379c7 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/SecretClientConfigurationKeys.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/SecretClientConfigurationKeys.cs @@ -1,4 +1,4 @@ -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; public static class SecretClientConfigurationKeys { diff --git a/src/GSoft.Extensions.Configuration.Secrets/SecretClientProvider.cs b/src/Workleap.Extensions.Configuration.Secrets/SecretClientProvider.cs similarity index 98% rename from src/GSoft.Extensions.Configuration.Secrets/SecretClientProvider.cs rename to src/Workleap.Extensions.Configuration.Secrets/SecretClientProvider.cs index 676cb73..42a2aa0 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/SecretClientProvider.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/SecretClientProvider.cs @@ -4,7 +4,7 @@ using Microsoft.Extensions.Configuration; using Microsoft.Extensions.Hosting; -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; public sealed class SecretClientProvider : ISecretClientProvider { diff --git a/src/GSoft.Extensions.Configuration.Secrets/ServiceCollectionExtensions.cs b/src/Workleap.Extensions.Configuration.Secrets/ServiceCollectionExtensions.cs similarity index 97% rename from src/GSoft.Extensions.Configuration.Secrets/ServiceCollectionExtensions.cs rename to src/Workleap.Extensions.Configuration.Secrets/ServiceCollectionExtensions.cs index 65724a0..cae4689 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/ServiceCollectionExtensions.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/ServiceCollectionExtensions.cs @@ -5,7 +5,7 @@ using Microsoft.Extensions.DependencyInjection.Extensions; using Microsoft.Extensions.Hosting; -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; public static class ServiceCollectionExtensions { diff --git a/src/GSoft.Extensions.Configuration.Secrets/TokenCredentialProvider.cs b/src/Workleap.Extensions.Configuration.Secrets/TokenCredentialProvider.cs similarity index 97% rename from src/GSoft.Extensions.Configuration.Secrets/TokenCredentialProvider.cs rename to src/Workleap.Extensions.Configuration.Secrets/TokenCredentialProvider.cs index eaadc64..3704c69 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/TokenCredentialProvider.cs +++ b/src/Workleap.Extensions.Configuration.Secrets/TokenCredentialProvider.cs @@ -5,7 +5,7 @@ using Azure.Identity; using Microsoft.Extensions.Hosting; -namespace GSoft.Extensions.Configuration.Secrets; +namespace Workleap.Extensions.Configuration.Secrets; public sealed class TokenCredentialProvider : ITokenCredentialProvider { diff --git a/src/GSoft.Extensions.Configuration.Secrets/GSoft.Extensions.Configuration.Secrets.csproj b/src/Workleap.Extensions.Configuration.Secrets/Workleap.Extensions.Configuration.Secrets.csproj similarity index 71% rename from src/GSoft.Extensions.Configuration.Secrets/GSoft.Extensions.Configuration.Secrets.csproj rename to src/Workleap.Extensions.Configuration.Secrets/Workleap.Extensions.Configuration.Secrets.csproj index ba659ad..65a7de2 100644 --- a/src/GSoft.Extensions.Configuration.Secrets/GSoft.Extensions.Configuration.Secrets.csproj +++ b/src/Workleap.Extensions.Configuration.Secrets/Workleap.Extensions.Configuration.Secrets.csproj @@ -4,12 +4,12 @@ True True snupkg - GSoft.Extensions.Configuration.Secrets - GSoft.Extensions.Configuration.Secrets + Workleap.Extensions.Configuration.Secrets + Workleap.Extensions.Configuration.Secrets README.md true true - ../GSoft.Extensions.Configuration.Secrets.snk + ../Workleap.Extensions.Configuration.Secrets.snk @@ -29,7 +29,7 @@ - +