Skip to content

Commit d7e5374

Browse files
Fix build warnings in functions-secrets-tutorial.md
- Change nested tab IDs from parent+child syntax (#tab/in-place+portal, #tab/keyvault+portal, etc.) to simple #tab/portal and #tab/cli to eliminate duplicate tab ID and different tab ID set warnings - Rename duplicate H2 headings: 'Verify the secret' becomes 'Verify the Container Apps secret' and 'Verify the Key Vault secret' Co-authored-by: Copilot <[email protected]>
1 parent e3b8532 commit d7e5374

1 file changed

Lines changed: 15 additions & 15 deletions

File tree

articles/container-apps/functions-secrets-tutorial.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Azure Container Apps provides two ways to store secrets that your function code
4444

4545
Container Apps stores secrets in the app's `configuration.secrets` array. The platform encrypts values at rest. You can reference secrets defined here in environment variables, scale rules, volume mounts, and Dapr components.
4646

47-
### [Portal](#tab/in-place+portal)
47+
### [Portal](#tab/portal)
4848

4949
1. Go to your Functions container app in the [Azure portal](https://portal.azure.com).
5050

@@ -62,7 +62,7 @@ Container Apps stores secrets in the app's `configuration.secrets` array. The pl
6262

6363
1. Select **Add**.
6464

65-
### [Azure CLI](#tab/in-place+cli)
65+
### [Azure CLI](#tab/cli)
6666

6767
Add a secret when you create your Functions container app:
6868

@@ -91,7 +91,7 @@ az containerapp secret set \
9191

9292
After you store a secret, reference it in an environment variable so your function code can read it.
9393

94-
### [Portal](#tab/in-place+portal)
94+
### [Portal](#tab/portal)
9595

9696
1. In your Functions container app, under *Application*, select **Revisions and replicas**.
9797

@@ -111,7 +111,7 @@ After you store a secret, reference it in an environment variable so your functi
111111

112112
1. Select **Save**, and then select **Create** to deploy the new revision.
113113

114-
### [Azure CLI](#tab/in-place+cli)
114+
### [Azure CLI](#tab/cli)
115115

116116
```azurecli
117117
az containerapp update \
@@ -122,9 +122,9 @@ az containerapp update \
122122

123123
---
124124

125-
## Verify the secret
125+
## Verify the Container Apps secret
126126

127-
Confirm your function can read the secret value by invoking the function and checking that it runs without errors related to missing configuration.
127+
Confirm your function can read the secret valueby invoking the function and checking that it runs without errors related to missing configuration.
128128

129129
```bash
130130
curl "https://<FUNCTIONS_APP_URL>/api/<FUNCTION_NAME>"
@@ -148,7 +148,7 @@ curl "https://<FUNCTIONS_APP_URL>/api/<FUNCTION_NAME>"
148148

149149
Your container app needs a managed identity to authenticate to Key Vault without credentials.
150150

151-
### [Portal](#tab/keyvault+portal)
151+
### [Portal](#tab/portal)
152152

153153
1. Go to your Functions container app in the [Azure portal](https://portal.azure.com).
154154

@@ -158,7 +158,7 @@ Your container app needs a managed identity to authenticate to Key Vault without
158158

159159
1. Select **Save**, and then select **Yes** to confirm.
160160

161-
### [Azure CLI](#tab/keyvault+cli)
161+
### [Azure CLI](#tab/cli)
162162

163163
```azurecli
164164
az containerapp identity assign \
@@ -173,7 +173,7 @@ az containerapp identity assign \
173173

174174
Assign the **Key Vault Secrets User** role to the managed identity so it can read secrets.
175175

176-
### [Portal](#tab/keyvault+portal)
176+
### [Portal](#tab/portal)
177177

178178
1. Go to your Key Vault in the [Azure portal](https://portal.azure.com).
179179

@@ -191,7 +191,7 @@ Assign the **Key Vault Secrets User** role to the managed identity so it can rea
191191

192192
1. Select **Review + assign**.
193193

194-
### [Azure CLI](#tab/keyvault+cli)
194+
### [Azure CLI](#tab/cli)
195195

196196
```azurecli
197197
PRINCIPAL_ID=$(az containerapp show \
@@ -215,7 +215,7 @@ az role assignment create \
215215

216216
## Store a secret in Key Vault
217217

218-
### [Portal](#tab/keyvault+portal)
218+
### [Portal](#tab/portal)
219219

220220
1. In your Key Vault, under *Objects*, select **Secrets**.
221221

@@ -235,7 +235,7 @@ az role assignment create \
235235

236236
1. Copy the **Secret Identifier** URI. Use the versionless URI (without the trailing version segment) to enable automatic rotation.
237237

238-
### [Azure CLI](#tab/keyvault+cli)
238+
### [Azure CLI](#tab/cli)
239239

240240
```azurecli
241241
az keyvault secret set \
@@ -258,7 +258,7 @@ echo $SECRET_URI
258258

259259
Create a Container Apps secret that references the Key Vault secret, then bind it to an environment variable.
260260

261-
### [Portal](#tab/keyvault+portal)
261+
### [Portal](#tab/portal)
262262

263263
1. Go to your Functions container app. Under *Settings*, select **Secrets**.
264264

@@ -277,7 +277,7 @@ Create a Container Apps secret that references the Key Vault secret, then bind i
277277

278278
1. Under *Application*, select **Revisions and replicas**. Create a new revision with the environment variable `DATABASE_PASSWORD` referencing the `database-password` secret.
279279

280-
### [Azure CLI](#tab/keyvault+cli)
280+
### [Azure CLI](#tab/cli)
281281

282282
For system-assigned identity:
283283

@@ -308,7 +308,7 @@ az containerapp update \
308308

309309
---
310310

311-
## Verify the secret
311+
## Verify the Key Vault secret
312312

313313
Invoke your function and confirm it runs without errors related to missing configuration:
314314

0 commit comments

Comments
 (0)