Zooper.Owl.AzureKeyVault
1.0.0
dotnet add package Zooper.Owl.AzureKeyVault --version 1.0.0
NuGet\Install-Package Zooper.Owl.AzureKeyVault -Version 1.0.0
<PackageReference Include="Zooper.Owl.AzureKeyVault" Version="1.0.0" />
<PackageVersion Include="Zooper.Owl.AzureKeyVault" Version="1.0.0" />
<PackageReference Include="Zooper.Owl.AzureKeyVault" />
paket add Zooper.Owl.AzureKeyVault --version 1.0.0
#r "nuget: Zooper.Owl.AzureKeyVault, 1.0.0"
#:package Zooper.Owl.AzureKeyVault@1.0.0
#addin nuget:?package=Zooper.Owl.AzureKeyVault&version=1.0.0
#tool nuget:?package=Zooper.Owl.AzureKeyVault&version=1.0.0
Zooper.Owl
<img src="icon.png" alt="Zooper.Owl Logo" width="120" align="right"/>
Zooper.Owl is a modular .NET library for secure configuration management that provides seamless integration with Azure Key Vault, Hashicorp Vault, and enhanced application settings. It enables developers to easily retrieve and manage secrets across different platforms with a consistent API.
Key Features
- Azure Key Vault Integration: Retrieve secrets from Azure Key Vault with automatic authentication
- Hashicorp Vault Integration: Connect to Hashicorp Vault with recursive secret loading support
- Enhanced Application Settings: Smart handling of environment-specific configurations
- Composite Providers: Access multiple secret stores with intelligent fallback mechanisms
- Minimal Dependencies: Lightweight implementation with focused dependencies
- Easy Configuration: Simple extension methods for registration in dependency injection
- Fully Documented API: Comprehensive XML documentation for all public members
Installation
Choose the package that suits your needs:
# For Azure Key Vault integration
dotnet add package Zooper.Owl.AzureKeyVault
# For Hashicorp Vault integration
dotnet add package Zooper.Owl.HashicorpVault
# For enhanced application settings
dotnet add package Zooper.Owl.AppSettings
Quick Start
Azure Key Vault Integration
// In Program.cs or Startup.cs
public void ConfigureServices(IServiceCollection services)
{
// Configure Azure Key Vault with settings from configuration
builder.AddAzureKeyVault();
// Or with explicit credentials
builder.AddAzureKeyVault(
tenantId: "your-tenant-id",
url: "https://your-vault.vault.azure.net/",
clientId: "your-client-id",
clientSecret: "your-client-secret"
);
// For multiple vaults with fallback behavior
builder.AddCompositeKeyVault(new[] {
"https://primary-vault.vault.azure.net/",
"https://backup-vault.vault.azure.net/"
});
}
// Then use IConfiguration to access your secrets
public class MyService
{
private readonly IConfiguration _configuration;
public MyService(IConfiguration configuration)
{
_configuration = configuration;
}
public void DoSomething()
{
var mySecret = _configuration["SecretName"];
}
}
Hashicorp Vault Integration
// In Program.cs or Startup.cs
public void ConfigureServices(IServiceCollection services)
{
// Configure Hashicorp Vault
builder.AddHashicorpVault(
uri: "https://vault.example.com:8200",
vaultToken: "your-vault-token",
mountPoint: "secret"
);
}
// Then use IConfiguration to access your secrets
// Vault path structure like "secret/data/myapp/database/password"
// becomes "myapp:database:password" in configuration
Enhanced Application Settings
// In Program.cs or Startup.cs
public void ConfigureServices(IServiceCollection services)
{
// Configure with default appsettings.json and appsettings.{Environment}.json
builder.ConfigureAppSettings();
// Or with custom settings file name
builder.ConfigureAppSettings("mysettings");
}
Core Concepts
Composite Key Vault Provider
Accesses multiple Azure Key Vaults with automatic fallback:
// If a secret isn't found in the first vault, it tries the second, and so on
var vaultUris = new[] {
"https://primary-vault.vault.azure.net/",
"https://secondary-vault.vault.azure.net/"
};
var provider = new CompositeKeyVaultProvider(vaultUris);
Recursive Hashicorp Vault Loading
Automatically traverses the Vault's structure, loading all secrets:
// Loads all secrets from all paths and subpaths
// Transforms them into configuration values with appropriate key names
services.AddHashicorpVault(
uri: "https://vault.example.com:8200",
vaultToken: "your-token",
mountPoint: "secret"
);
Environment-Specific Configuration
Automatically loads the right configuration for your environment:
// Loads appsettings.json, then overlays appsettings.Development.json
// if ASPNETCORE_ENVIRONMENT is Development
builder.ConfigureAppSettings();
Best Practices
Security Recommendations
- Use Managed Identities: When possible, use Azure Managed Identities instead of client credentials
- Rotate Credentials: Regularly rotate your vault access tokens and credentials
- Limit Scope: Apply the principle of least privilege to vault access policies
- Environment Variables: Consider using environment variables for sensitive connection details
Configuration Organization
- Logical Grouping: Organize secrets and configurations into logical groups
- Naming Conventions: Use consistent naming patterns for configuration keys
- Fallback Strategy: Set up a clear fallback strategy for configurations across environments
Advanced Usage
Combining Multiple Sources
public void ConfigureServices(IServiceCollection services)
{
// Set up multiple configuration sources in priority order
builder.ConfigureAppSettings()
.AddAzureKeyVault()
.AddHashicorpVault(uri, token, mountPoint);
}
Custom Authentication
// For Azure Key Vault with custom credential provider
var credential = new DefaultAzureCredential(new DefaultAzureCredentialOptions
{
ExcludeEnvironmentCredential = true,
ExcludeManagedIdentityCredential = false
});
// Use with Azure Key Vault client
Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
License
This project is licensed under the MIT License - see the LICENSE file for details.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. net9.0 was computed. net9.0-android was computed. net9.0-browser was computed. net9.0-ios was computed. net9.0-maccatalyst was computed. net9.0-macos was computed. net9.0-tvos was computed. net9.0-windows was computed. net10.0 was computed. net10.0-android was computed. net10.0-browser was computed. net10.0-ios was computed. net10.0-maccatalyst was computed. net10.0-macos was computed. net10.0-tvos was computed. net10.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 was computed. |
.NET Framework | net461 was computed. net462 was computed. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.0
- Azure.Extensions.AspNetCore.Configuration.Secrets (>= 1.4.0)
- Azure.Identity (>= 1.13.2)
- Microsoft.Extensions.Hosting (>= 6.0.0)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last Updated |
---|---|---|
1.0.0 | 222 | 4/19/2025 |