Skip to content

Commit 94c070c

Browse files
jasonodonnellactions-user
authored andcommitted
docs: fix typo in azure auth debug log mode (#13593)
1 parent e54dd86 commit 94c070c

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

website/content/docs/auth/azure.mdx

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -194,14 +194,14 @@ for your server at `path/to/plugins`:
194194

195195
## Azure Debug Logs
196196

197-
The Azure auth plugin supports debug logging which includes additional information
197+
The Azure auth plugin supports debug logging which includes additional information
198198
about requests and responses from the Azure API.
199199

200200
To enable the Azure debug logs, set the following environment variable on the Vault
201201
server:
202202

203203
```shell
204-
AZURE_SDK_GO_LOGGING=debug
204+
AZURE_GO_SDK_LOG_LEVEL=DEBUG
205205
```
206206

207207
## API
@@ -295,7 +295,7 @@ using VaultSharp.V1.Commons;
295295

296296
namespace Examples
297297
{
298-
public class AzureAuthExample
298+
public class AzureAuthExample
299299
{
300300
public class InstanceMetadata
301301
{
@@ -307,7 +307,7 @@ namespace Examples
307307
const string MetadataEndPoint = "http://169.254.169.254/metadata/instance?api-version=2017-08-01";
308308
const string AccessTokenEndPoint = "http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https://management.azure.com/";
309309

310-
/// <summary>
310+
/// <summary>
311311
/// Fetches a key-value secret (kv-v2) after authenticating to Vault via Azure authentication.
312312
/// This example assumes you have a configured Azure AD Application.
313313
/// </summary>
@@ -323,7 +323,7 @@ namespace Examples
323323
if(String.IsNullOrEmpty(roleName))
324324
{
325325
throw new System.ArgumentNullException("Vault Role Name");
326-
}
326+
}
327327

328328
string jwt = GetJWT();
329329
InstanceMetadata metadata = GetMetadata();
@@ -332,16 +332,16 @@ namespace Examples
332332
var vaultClientSettings = new VaultClientSettings(vaultAddr, authMethod);
333333

334334
IVaultClient vaultClient = new VaultClient(vaultClientSettings);
335-
335+
336336
// We can retrieve the secret from the VaultClient object
337337
Secret<SecretData> kv2Secret = null;
338338
kv2Secret = vaultClient.V1.Secrets.KeyValue.V2.ReadSecretAsync(path: "/creds").Result;
339-
339+
340340
var password = kv2Secret.Data.Data["password"];
341-
341+
342342
return password.ToString();
343343
}
344-
344+
345345
/// <summary>
346346
/// Query Azure Resource Manage for metadata about the Azure instance
347347
/// </summary>
@@ -356,7 +356,7 @@ namespace Examples
356356
StreamReader streamResponse = new StreamReader(metadataResponse.GetResponseStream());
357357
string stringResponse = streamResponse.ReadToEnd();
358358
var resultsDict = JsonConvert.DeserializeObject<Dictionary<string, InstanceMetadata>>(stringResponse);
359-
359+
360360
return resultsDict["compute"];
361361
}
362362

@@ -372,7 +372,7 @@ namespace Examples
372372
HttpWebResponse response = (HttpWebResponse)request.GetResponse();
373373

374374
// Pipe response Stream to a StreamReader and extract access token
375-
StreamReader streamResponse = new StreamReader(response.GetResponseStream());
375+
StreamReader streamResponse = new StreamReader(response.GetResponseStream());
376376
string stringResponse = streamResponse.ReadToEnd();
377377
var resultsDict = JsonConvert.DeserializeObject<Dictionary<string, string>>(stringResponse);
378378

0 commit comments

Comments
 (0)