Skip to content

Commit 3e93259

Browse files
committed
command formatting
1 parent 16bda2f commit 3e93259

File tree

3 files changed

+13
-4
lines changed

3 files changed

+13
-4
lines changed

articles/container-registry/container-registry-tasks-authentication-key-vault.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,12 +124,15 @@ az acr task create \
124124

125125
[!INCLUDE [container-registry-tasks-system-id-properties](../../includes/container-registry-tasks-system-id-properties.md)]
126126

127-
## Grant identity access to key vault
127+
## Give identity access to key vault
128128

129129
Run the following [az keyvault set-policy][az-keyvault-set-policy] command to set an access policy on the key vault. The following example allows the identity to read secrets from the key vault.
130130

131131
```azurecli
132-
az keyvault set-policy --name mykeyvault --resource-group myResourceGroup --object-id $principalID --secret-permissions get
132+
az keyvault set-policy --name mykeyvault \
133+
--resource-group myResourceGroup \
134+
--object-id $principalID \
135+
--secret-permissions get
133136
```
134137

135138
## Add Docker Hub credentials to the task

articles/container-registry/container-registry-tasks-authentication-managed-identity.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,10 @@ The following example assigns a managed identity the permissions to pull from a
9191

9292

9393
```azurecli
94-
az role assignment create --assignee <servicePrincipalID> --scope <registryID> --role acrpull
94+
az role assignment create \
95+
--assignee <servicePrincipalID> \
96+
--scope <registryID> \
97+
--role acrpull
9598
```
9699

97100
### 4. (Optional) Add credentials to the task

articles/container-registry/container-registry-tasks-cross-registry-authentication.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,10 @@ baseregID=$(az acr show --name mybaseregistry --query id --output tsv)
111111
Use the [az role assignment create][az-role-assignment-create] command to assign the identity the `acrpull` role to the base registry. This role has permissions only to pull images from the registry.
112112

113113
```azurecli
114-
az role assignment create --assignee $principalID --scope $baseregID --role acrpull
114+
az role assignment create \
115+
--assignee $principalID \
116+
--scope $baseregID \
117+
--role acrpull
115118
```
116119

117120
## Add target registry credentials to task

0 commit comments

Comments
 (0)