-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow user to set keyvault secret client option #577
Conversation
...osoft.Extensions.Configuration.AzureAppConfiguration/AzureAppConfigurationKeyVaultOptions.cs
Outdated
Show resolved
Hide resolved
...ns.Configuration.AzureAppConfiguration/AzureKeyVaultReference/AzureKeyVaultSecretProvider.cs
Outdated
Show resolved
Hide resolved
We have |
I think part of the reason all the methods in I think that means |
…etProvider into zhiyuanliang/secret-client-option
It's not just the naming. The benefit of public AzureAppConfigurationOptions ConfigureClientOptions(Action<ConfigurationClientOptions> configure) |
I agree here, I prefer the case where the user gets passed a ClientOptions in the callback. So in your example the usage becomes
|
@jimmyca15 @zhenlan I agree with the proposal. But my only concern is that user will not be able to set SecretClientOptions.Version through the callback pattern. This is the implementation of public class SecretClientOptions : ClientOptions
{
internal const ServiceVersion LatestVersion = ServiceVersion.V7_5;
public ServiceVersion Version { get; }
public bool DisableChallengeResourceVerification { get; set; }
public SecretClientOptions(ServiceVersion version = ServiceVersion.V7_5)
{
Version = version;
this.ConfigureLogging();
}
} If user want to configure the keyvault version, it can only be achieved through constructor because |
@zhiyuanliang-ms I think it's a good call out, but I still think it's the pattern we want. |
Why this PR?
#274
Visible change
New API
AzureAppConfigurationKeyVaultOptions.ConfigureClientOptions
usage: