Skip to content

Commit 23a9b3a

Browse files
committed
Fix Az.KeyVault Syntax Errors
1 parent 808ddfb commit 23a9b3a

6 files changed

+11
-9
lines changed

src/KeyVault/KeyVault/help/Export-AzKeyVaultSecurityDomain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Exports the security domain data of a managed HSM for importing on another HSM.
3333

3434
### Example 1
3535
```powershell
36-
Export-AzKeyVaultSecurityDomain -Name testmhsm -Certificates {pathOfCertificates}/sd1.cer, {pathOfCertificates}/sd2.cer, {pathOfCertificates}/sd3.cer -OutputPath {pathOfOutput}/sd.ps.json -Quorum 2
36+
Export-AzKeyVaultSecurityDomain -Name testmhsm -Certificates {{pathOfCertificates}/sd1.cer, {pathOfCertificates}/sd2.cer, {pathOfCertificates}/sd3.cer} -OutputPath {{pathOfOutput}/sd.ps.json} -Quorum 2
3737
```
3838

3939
This command retrieves the managed HSM named testmhsm and saves a backup of that managed HSM security domain to the specified output file.

src/KeyVault/KeyVault/help/Import-AzKeyVaultSecurityDomain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This cmdlet imports previously exported security domain data to a managed HSM.
3434
### Example 1
3535
```powershell
3636
$keys = @{PublicKey = "sd1.cer"; PrivateKey = "sd1.key"}, @{PublicKey = "sd2.cer"; PrivateKey = "sd2.key"}, @{PublicKey = "sd3.cer"; PrivateKey = "sd3.key"}
37-
Import-AzKeyVaultSecurityDomain -Name testmhsm -Keys $keys -SecurityDomainPath {pathOfBackup}\sd.ps.json
37+
Import-AzKeyVaultSecurityDomain -Name testmhsm -Keys $keys -SecurityDomainPath {{pathOfBackup}\sd.ps.json}
3838
```
3939

4040
First, the keys need be provided to decrypt the security domain data.

src/KeyVault/KeyVault/help/Invoke-AzKeyVaultKeyOperation.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Invoke-AzKeyVaultKeyOperation cmdlet supports
4545
### Encrypts using an encryption key
4646
```powershell
4747
$result = Invoke-AzKeyVaultKeyOperation -Operation Encrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String "test" -AsPlainText -Force) ult
48-
$result | fl
48+
$result | Format-List
4949
```
5050

5151
```output
@@ -60,7 +60,7 @@ Encrypts string "test" using test-key stored in test-kv. The returned result is
6060
```powershell
6161
$result
6262
$result = Invoke-AzKeyVaultKeyOperation -Operation Decrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String $result.Result -AsPlainText -Force) ult
63-
$result | fl
63+
$result | Format-List
6464
```
6565

6666
```output
@@ -75,7 +75,7 @@ Decrypts encrypted data that is encrypted using test-key stored in test-kv.
7575
```powershell
7676
$result = Invoke-AzKeyVaultKeyOperation -Operation Encrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String "test" -AsPlainText -Force)
7777
78-
$result | fl
78+
$result | Format-List
7979
```
8080

8181
```output
@@ -90,7 +90,7 @@ Encrypts string "test" using test-key stored in test-kv. The returned result is
9090
```powershell
9191
$result = Invoke-AzKeyVaultKeyOperation -Operation Wrap -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" -AsPlainText -Force)
9292
93-
$result | fl
93+
$result | Format-List
9494
```
9595

9696
```output

src/KeyVault/KeyVault/help/Set-AzKeyVaultCertificateIssuer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The Set-AzKeyVaultCertificateIssuer cmdlet sets a certificate issuer in a key va
3636
### Example 1: Set a certificate issuer
3737
```powershell
3838
$AdminDetails = New-AzKeyVaultCertificateAdministratorDetail -FirstName user -LastName name -EmailAddress [email protected]
39-
$OrgDetails = New-AzKeyVaultCertificateOrganizationDetail -AdministrationDetails $AdminDetails
39+
$OrgDetails = New-AzKeyVaultCertificateOrganizationDetail -AdministratorDetails $AdminDetails
4040
$Password = ConvertTo-SecureString -String P@ssw0rd -AsPlainText -Force
4141
Set-AzKeyVaultCertificateIssuer -VaultName "Contosokv01" -Name "TestIssuer01" -IssuerProvider "Test" -AccountId "555" -ApiKey $Password -OrganizationDetails $OrgDetails -PassThru
4242
```

src/KeyVault/KeyVault/help/Update-AzKeyVaultManagedHsm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ This cmdlet updates the state of an Azure managed HSM.
4040

4141
### Example 1: Update a managed Hsm directly
4242
```powershell
43-
Update-AzKeyVaultManagedHsm -Name $hsmName -ResourceGroupName $resourceGroupName -Tag @{testKey="testValue"} | fl
43+
Update-AzKeyVaultManagedHsm -Name $hsmName -ResourceGroupName $resourceGroupName -Tag @{testKey="testValue"} | Format-List
4444
```
4545

4646
```output

src/KeyVault/KeyVault/help/Update-AzKeyVaultSecret.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,9 @@ ContosoVault, using the stored variables.
6363

6464
### Example 2: Delete the tags and content type for a secret
6565
```powershell
66-
Update-AzKeyVaultSecret -VaultName 'ContosoVault' -Name 'HR' -Version '9EEA45C6EE50490B9C3176A80AC1A0DF' -ContentType '' -Tag -@{}
66+
$Tags = @{ 'Severity' = 'medium'; 'HR' = 'true'}
67+
$ContentType= 'xml'
68+
Update-AzKeyVaultSecret -VaultName 'ContosoVault' -Name 'HR' -Version '9EEA45C6EE50490B9C3176A80AC1A0DF' -ContentType $ContentType -Tag $Tags
6769
```
6870

6971
This command deletes the tags and the content type for the specified version of the secret named HR

0 commit comments

Comments
 (0)