You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Tasks/AzureKeyVaultV1/README.md
+2-11Lines changed: 2 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ Ensure the Azure endpoint has at least Get and List permissions for Secrets on t
51
51
52
52
For example, if there is a secret name: connectionString, a task variable `$(connectionString)` is created with the latest fetched value of the respective secret from Azure key vault. And this secret variable would be available to be consumed in subsequent tasks.
53
53
54
-
Certificates are also fetched from the vault as secrets. In this case, the task variable would contain the content of the PFX in base64 string format. To convert the string into a PFX file from the task variable, the following sample PowerShell code can be used (after passing the certificate variable as a parameter to the script):
54
+
If it is a certificate (example: a PFX file) that is fetched from the vault, then the task variable would contain the content of the PFX in string format. To retrieve the PFX file from the task variable, the following sample PowerShell code can be used (after passing the certificate variable as a parameter to the script):
55
55
56
56
```powershell
57
57
# Task parameters: $(PfxSecret)
@@ -61,16 +61,7 @@ Certificates are also fetched from the vault as secrets. In this case, the task
assert(tr.stdout.indexOf("##vso[task.setvariable variable=secret4;isOutput=false;issecret=true;]secret4-value")<0,"secret4 value should not be set");
38
+
assert(tr.stdout.indexOf("##vso[task.setvariable variable=secret4;issecret=true;]secret4-value")<0,"secret4 value should not be set");
39
39
40
40
done();
41
41
}
@@ -62,12 +62,12 @@ describe('Azure Key Vault', function () {
62
62
assert(tr.stdout.indexOf("getSecretValue is called for secret2")>0,"getSecretValue is called for secret2");
63
63
assert(tr.stdout.indexOf("getSecretValue is called for secret3/versionIdentifierGuid")>0,"getSecretValue is called for secret3/versionIdentifierGuid");
0 commit comments