ByteDev.Azure.KeyVault
2.3.0
dotnet add package ByteDev.Azure.KeyVault --version 2.3.0
NuGet\Install-Package ByteDev.Azure.KeyVault -Version 2.3.0
<PackageReference Include="ByteDev.Azure.KeyVault" Version="2.3.0" />
paket add ByteDev.Azure.KeyVault --version 2.3.0
#r "nuget: ByteDev.Azure.KeyVault, 2.3.0"
// Install ByteDev.Azure.KeyVault as a Cake Addin #addin nuget:?package=ByteDev.Azure.KeyVault&version=2.3.0 // Install ByteDev.Azure.KeyVault as a Cake Tool #tool nuget:?package=ByteDev.Azure.KeyVault&version=2.3.0
ByteDev.Azure.KeyVault
.NET Standard library that provides some extended Azure Key Vault functionality build on top of the official Azure packages.
Installation
ByteDev.Azure.KeyVault has been written as a .NET Standard 2.1 library.
ByteDev.Azure.KeyVault is hosted as a package on nuget.org. To install from the Package Manager Console in Visual Studio run:
Install-Package ByteDev.Azure.KeyVault
Further details can be found on the nuget page.
Release Notes
Releases follow semantic versioning.
Full details of the release notes can be viewed on GitHub.
Usage
Secrets
Secrets functionality is accessed through the KeyVaultSecretClient
class.
Methods:
- DeleteAllAsync
- DeleteAndPurgeAsync
- DeleteAsync
- DeleteIfExistsAsync
- ExistsAsync
- GetAllAsync
- GetAsync
- GetDeletedAsync
- GetDeletedIfExistsAsync
- GetIfExistsAsync
- GetSectionAsync
- GetValueAsync
- GetValueIfExistsAsync
- GetValuesIfExistsAsync
- IsDeletedAsync
- PurgeAllDeletedAsync
- PurgeAsync
- PurgeIfDeletedAsync
- SafeSetValueAsync
- SetValueAsync
Example usage:
using ByteDev.Azure.KeyVault.Secrets;
// ...
IKeyVaultSecretClient client = new KeyVaultSecretClient(keyVaultUri);
// Create a secret
await client.SetValueAsync("Test1", "Some value");
// Get the secret's value
string value = await client.GetValueAsync("Test1");
// Delete the secret
await client.DeleteAsync("Test1", true);
// Purge the soft deleted secret
await client.PurgeAsync("Test1");
Secrets.Serialization
Deserialize Azure Key Vault secrets directly to a new class instance.
// Entitiy class (class you want to deserialize to)
public class Person
{
public string Name { get; set; }
[KeyVaultSecretName("email")]
public string EmailAddress { get; set; }
[KeyVaultSecretIgnore]
public string Mobile { get; set; }
}
The class above will check Azure Key Vault for the following named secrets:
Name
email
The Mobile
property will not be set on deserialization as it has been decorated with a KeyVaultSecretIgnoreAttribute
.
using ByteDev.Azure.KeyVault.Secrets;
using ByteDev.Azure.KeyVault.Secrets.Serialization;
// ...
IKeyVaultSecretClient client = new KeyVaultSecretClient(keyVaultUri);
IKeyVaultSecretSerializer serializer = new KeyVaultSecretSerializer(client);
var person = await serializer.DeserializeAsync<Person>();
// person.Name == (Value of "Name" secret)
// person.EmailAddress == (Value of "email" secret)
// person.Mobile == null
Keys
Keys functionality is accessed through the KeyVaultKeyClient
class.
Methods:
- CreateAsync
- DeleteAsync
- DeleteIfExistsAsync
- EncryptAsync / DecryptAsync
- ExistsAsync
- GetAsync
- PurgeAsync
- PurgeIfDeletedAsync
- SignAsync / VerifyAsync
- WrapAsync / UnwrapAsync
Example usage:
using ByteDev.Azure.KeyVault.Keys;
// ...
IKeyVaultKeyClient client = new KeyVaultKeyClient(keyVaultUri);
const string keyName = "MyKey";
const string clearText = "test string";
// Encrypt/decrypt some text using the Key Vault key
byte[] cipher = await client.EncryptAsync(keyName, EncryptionAlgorithm.RsaOaep, clearText, Encoding.Unicode);
string result = await client.DecryptAsync(keyName, EncryptionAlgorithm.RsaOaep, cipher, Encoding.Unicode);
// result == "test string"
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.1 is compatible. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.1
- Azure.Identity (>= 1.6.0)
- Azure.Security.KeyVault.Keys (>= 4.3.0)
- Azure.Security.KeyVault.Secrets (>= 4.3.0)
- ByteDev.Reflection (>= 2.3.1)
NuGet packages (1)
Showing the top 1 NuGet packages that depend on ByteDev.Azure.KeyVault:
Package | Downloads |
---|---|
ByteDev.Testing
.NET Standard library that provides some testing related functionality. |
GitHub repositories
This package is not used by any popular GitHub repositories.