Daily Knowledge Drop
The Options.Create
method can be used in conjunction with the GetSection.Bind
methods to read settings from the Configuration provider(s), and modify them before adding them to the dependency injection container.
Configuring options
First we'll have a look at how to load options without any modification.
We have the following section in the appsettings.json file:
"Credentials": {
"Username": "admin",
"Password": "logMeIn"
}
The startup (using top level statements and a minimal endpoint) is as follows:
var builder = WebApplication.CreateBuilder(args);
// Get the section called "Credentials" from configuration
var optionSection = builder.Configuration.GetSection("Credentials");
// this line will bind the section to a Credentials class
// and add it to the DI container automatically
builder.Services.Configure<Credentials>(optionSection);
var app = builder.Build();
app.MapGet("/getoptions", (IOptions<Credentials> options) =>
{
return options.Value;
});
app.Run();
The builder.Services.Configure<Credentials>(optionSection);
block of code, will convert the optionSection to type Credentials and automatically add it to the dependency injection container as IOptions<Credentials>
.
It is best practice to use the options Pattern
(as described in this post), over just inserting Credentials as a singleton. The options pattern this is the default pattern when using Services.Configure.
Calling the endpoint defined above, will return the following:
{"username":"admin","password":"logMeIn"}
The obvious issue with all of the above, is that we are storing the password in plain text in the source control repository
. Next we will look at how the settings can be:
- Loaded from the configuration (without a password)
- Modified (to add the password from an environment variable)
- Added to the dependency injection container still using Options pattern
Only the startup code will need to change, and any other code which is using IOptions<Credentials>
will not be affected and be required to change.
Modifying options
To repeat - we are aiming to remove the password from the appsettings.json, inject it as an environment variable at runtime but still have it populated on the IOptions<Credentials>
class added to the dependency injection container.
Step one is to remove the password from appsettings.json file:
"Credentials": {
"Username": "admin"
}
Next, we update the startup to load the configuration slightly differently:
var builder = WebApplication.CreateBuilder(args);
// load the Credentials section from the configuration
// and bind it to the credentialOptions instance
var credentialOptions = new Credentials();
builder.Configuration.GetSection("Credentials").Bind(credentialOptions);
// modify the instance by setting the Password value from
// the environment variables
credentialOptions.Password = builder.Configuration["Credentials.Password"];
// Create IOptions<Credentials> from an instance of Credentials
var ioptions = Options.Create(credentialOptions);
// manually add to the DI container
builder.Services.AddSingleton(ioptions);
var app = builder.Build();
app.MapGet("/getoptions", (IOptions<Credentials> options) =>
{
return options.Value;
});
app.Run();
Here are few more steps are involved, when compared to the first example, but its not much more complex:
- Instead of using
builder.Services.Configure
to create an IOptions from the configuration directly, thebuilder.Configuration.GetSection.Bind
method is used to bind the configuration to an instance of Credentials (at this point we have no IOptions) - Manually update the instance using values from the environment variable (in this example)
- Use the
Options.Create
method to create IOptions<Credentials> from the instance of Credentials - Add the IOptions instance to the DI container (as a singleton)
Calling the endpoint defined above, now returns the following:
{"username":"admin","password":"logMeInEnvVar"}
We have a password, which was passed in as an environment variable
(with the key Credentials.Password), and no client code had to change, only startup code!
Notes
While there are better methods for dealing with passwords (such as storing them in a vault, and using a configuration provider to pull the values directly from the vault) - in some cases this is not feasible. So while this solution might not be the first choice, it definitely is a valid method to protect passwords, by not having them as part of the source code in a source control repository.
Daily Drop 137: 12-08-2022
At the start of 2022 I set myself the goal of learning one new coding related piece of knowledge a day.
It could be anything - some.NET / C# functionality I wasn't aware of, a design practice, a cool new coding technique, or just something I find interesting. It could be something I knew at one point but had forgotten, or something completely new, which I may or may never actually use.
The Daily Drop is a record of these pieces of knowledge - writing about and summarizing them helps re-enforce the information for myself, as well as potentially helps others learn something new as well.On This Page