Skip to content

Commit ff356d6

Browse files
committed
fixing linter issues
1 parent 17552fe commit ff356d6

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/azure-resource-manager/bicep/bicep-functions-resource.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Built-in policy definitions are tenant level resources. For an example of deploy
107107
Returns a secret from an Azure Key Vault. Use this function to pass a secret to a secure string parameter of a Bicep module.
108108

109109
> [!NOTE]
110-
> `az.getSecret` can be used in `.bicepparam` files to retrieve key vault secrets. For more information, see [getSecret](./bicep-functions-parameters-file.md#getsecret).
110+
> `az.getSecret(subscriptionId, resourceGroupName, keyVaultName, secretName, secretVersion)` function can be used in `.bicepparam` files to retrieve key vault secrets. For more information, see [getSecret](./bicep-functions-parameters-file.md#getsecret).
111111
112112
You can only use the `getSecret` function from within the `params` section of a module. You can only use it with a `Microsoft.KeyVault/vaults` resource.
113113

@@ -120,7 +120,7 @@ module sql './sql.bicep' = {
120120
}
121121
```
122122

123-
You'll get an error if you attempt to use this function in any other part of the Bicep file. You'll also get an error if you use this function with string interpolation, even when used in the params section.
123+
You get an error if you attempt to use this function in any other part of the Bicep file. You also get an error if you use this function with string interpolation, even when used in the params section.
124124

125125
The function can be used only with a module parameter that has the `@secure()` decorator.
126126

articles/azure-resource-manager/bicep/scenarios-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ module exampleModule 'module.bicep' = {
8282

8383
### Use a key vault in a .bicepparam file
8484

85-
When you use `.bicepparam` file format, you can provide secure values to parameters by using [the `az.getSecret` function](bicep-functions-resource.md#azgetsecret).
85+
When you use `.bicepparam` file format, you can provide secure values to parameters by using [the `getSecret` function](bicep-functions-parameters-file.md#getsecret).
8686

8787
Reference the KeyVault by providing the subscription ID, resource group name, and key vault name. You can get the value of the secret by providing the secret name. You can optionally provide the secret version. If you don't provide the secret version, the latest version is used.
8888

0 commit comments

Comments
 (0)