From 7927c766c4de05322633772bb98f18bf081ebefb Mon Sep 17 00:00:00 2001 From: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com> Date: Fri, 7 Jan 2022 10:52:09 -0500 Subject: [PATCH] docs: fix typo in azure auth debug log mode --- website/content/docs/auth/azure.mdx | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/website/content/docs/auth/azure.mdx b/website/content/docs/auth/azure.mdx index a85e5314a54e..8f1606111c41 100644 --- a/website/content/docs/auth/azure.mdx +++ b/website/content/docs/auth/azure.mdx @@ -194,14 +194,14 @@ for your server at `path/to/plugins`: ## Azure Debug Logs -The Azure auth plugin supports debug logging which includes additional information +The Azure auth plugin supports debug logging which includes additional information about requests and responses from the Azure API. To enable the Azure debug logs, set the following environment variable on the Vault server: ```shell -AZURE_SDK_GO_LOGGING=debug +AZURE_GO_SDK_LOG_LEVEL=DEBUG ``` ## API @@ -295,7 +295,7 @@ using VaultSharp.V1.Commons; namespace Examples { - public class AzureAuthExample + public class AzureAuthExample { public class InstanceMetadata { @@ -307,7 +307,7 @@ namespace Examples const string MetadataEndPoint = "http://169.254.169.254/metadata/instance?api-version=2017-08-01"; const string AccessTokenEndPoint = "http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https://management.azure.com/"; - /// + /// /// Fetches a key-value secret (kv-v2) after authenticating to Vault via Azure authentication. /// This example assumes you have a configured Azure AD Application. /// @@ -323,7 +323,7 @@ namespace Examples if(String.IsNullOrEmpty(roleName)) { throw new System.ArgumentNullException("Vault Role Name"); - } + } string jwt = GetJWT(); InstanceMetadata metadata = GetMetadata(); @@ -332,16 +332,16 @@ namespace Examples var vaultClientSettings = new VaultClientSettings(vaultAddr, authMethod); IVaultClient vaultClient = new VaultClient(vaultClientSettings); - + // We can retrieve the secret from the VaultClient object Secret kv2Secret = null; kv2Secret = vaultClient.V1.Secrets.KeyValue.V2.ReadSecretAsync(path: "/creds").Result; - + var password = kv2Secret.Data.Data["password"]; - + return password.ToString(); } - + /// /// Query Azure Resource Manage for metadata about the Azure instance /// @@ -356,7 +356,7 @@ namespace Examples StreamReader streamResponse = new StreamReader(metadataResponse.GetResponseStream()); string stringResponse = streamResponse.ReadToEnd(); var resultsDict = JsonConvert.DeserializeObject>(stringResponse); - + return resultsDict["compute"]; } @@ -372,7 +372,7 @@ namespace Examples HttpWebResponse response = (HttpWebResponse)request.GetResponse(); // Pipe response Stream to a StreamReader and extract access token - StreamReader streamResponse = new StreamReader(response.GetResponseStream()); + StreamReader streamResponse = new StreamReader(response.GetResponseStream()); string stringResponse = streamResponse.ReadToEnd(); var resultsDict = JsonConvert.DeserializeObject>(stringResponse);