Skip to content

Commit 62ad0d5

Browse files
authored
Merge pull request #202538 from cebundy/clarify-secretref
[Container Apps]: clarify secretRef and passwordSecretRef parameters
2 parents dbcf781 + da600ae commit 62ad0d5

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

articles/container-apps/background-processing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ Create a file named *queue.json* and paste the following configuration code into
201201
},
202202
{
203203
"name": "QueueConnectionString",
204-
"secretref": "queueconnection"
204+
"secretRef": "queueconnection"
205205
}
206206
]
207207
}

articles/container-apps/code/secure-app-arm-template.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242
},
4343
{
4444
"name": "ConnectionString",
45-
"secretref": "queue-connection-string"
45+
"secretRef": "queue-connection-string"
4646
}
4747
]
4848
}

articles/container-apps/manage-secrets.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -93,11 +93,11 @@ Here, a connection string to a queue storage account is declared in the `--secre
9393

9494
## Using secrets
9595

96-
Application secrets are referenced via the `secretref` property. Secret values are mapped to application-level secrets where the `secretref` value matches the secret name declared at the application level.
96+
The secret value is mapped to the secret name declared at the application level as described in the [defining secrets](#defining-secrets) section. The `passwordSecretRef` and `secretRef` parameters are used to reference the secret names as environment variables at the container level. The `passwordSecretRef` provides a descriptive parameter name for secrets containing passwords.
9797

9898
## Example
9999

100-
The following example shows an application that declares a connection string at the application level and is used throughout the configuration via `secretref`.
100+
The following example shows an application that declares a connection string at the application level and is used throughout the configuration via `secretRef`.
101101

102102
# [ARM template](#tab/arm-template)
103103

@@ -120,10 +120,10 @@ az containerapp create \
120120
--environment "my-environment-name" \
121121
--image demos/myQueueApp:v1 \
122122
--secrets "queue-connection-string=$CONNECTIONSTRING" \
123-
--env-vars "QueueName=myqueue" "ConnectionString=secretref:queue-connection-string"
123+
--env-vars "QueueName=myqueue" "ConnectionString=secretRef:queue-connection-string"
124124
```
125125

126-
Here, the environment variable named `connection-string` gets its value from the application-level `queue-connection-string` secret by using `secretref`.
126+
Here, the environment variable named `connection-string` gets its value from the application-level `queue-connection-string` secret by using `secretRef`.
127127

128128
# [PowerShell](#tab/powershell)
129129

@@ -136,10 +136,10 @@ az containerapp create `
136136
--environment "my-environment-name" `
137137
--image demos/myQueueApp:v1 `
138138
--secrets "queue-connection-string=$CONNECTIONSTRING" `
139-
--env-vars "QueueName=myqueue" "ConnectionString=secretref:queue-connection-string"
139+
--env-vars "QueueName=myqueue" "ConnectionString=secretRef:queue-connection-string"
140140
```
141141

142-
Here, the environment variable named `connection-string` gets its value from the application-level `queue-connection-string` secret by using `secretref`.
142+
Here, the environment variable named `connection-string` gets its value from the application-level `queue-connection-string` secret by using `secretRef`.
143143

144144
---
145145

0 commit comments

Comments
 (0)