Skip to content

Commit 5773032

Browse files
committed
Fix warnings
1 parent de880dd commit 5773032

File tree

2 files changed

+19
-15
lines changed

2 files changed

+19
-15
lines changed

articles/connectors/connectors-native-http.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ For technical information about trigger and action parameters, see the following
3939
* [HTTP trigger parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-trigger)
4040
* [HTTP action parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-action)
4141

42-
<a name="http-trigger"></a>
42+
<a id="http-trigger"></a>
4343

4444
## Add an HTTP trigger
4545

@@ -91,7 +91,7 @@ This built-in trigger makes an HTTP call to the specified URL for an endpoint an
9191

9292
---
9393

94-
<a name="http-action"></a>
94+
<a id="http-action"></a>
9595

9696
## Add an HTTP action
9797

@@ -169,7 +169,7 @@ An HTTP trigger or action outputs the following information:
169169

170170
For information about encryption, security, and authorization for outbound calls from your workflow, such as [Transport Layer Security (TLS)](https://en.wikipedia.org/wiki/Transport_Layer_Security), self-signed certificates, or [Microsoft Entra ID Open Authentication](../active-directory/develop/index.yml), see [Access for outbound calls to other services and systems](../logic-apps/logic-apps-securing-a-logic-app.md#secure-outbound-requests).
171171

172-
<a name="single-tenant-authentication"></a>
172+
<a id="single-tenant-authentication"></a>
173173

174174
## Authentication for single-tenant environment
175175

@@ -179,7 +179,7 @@ If you have a Standard logic app resource in single-tenant Azure Logic Apps, and
179179

180180
* [Client certificate or Microsoft Entra ID Open Authentication (Microsoft Entra ID OAuth) with the *Certificate* credential type](#client-certificate-authentication): Add the app setting `WEBSITE_LOAD_USER_PROFILE`, and set the value to *1*.
181181

182-
<a name="tls-certificate-authentication"></a>
182+
<a id="tlsssl-certificate-authentication"></a>
183183

184184
### TLS certificate authentication
185185

@@ -217,9 +217,9 @@ For example, if you're working in Visual Studio Code, follow these steps:
217217
218218
For more information, see [Manage app settings - local.settings.json](../logic-apps/edit-app-settings-host-settings.md#manage-app-settings).
219219

220-
<a name="client-certificate-authentication"></a>
220+
<a id="client-certificate-authentication"></a>
221221

222-
<a name='client-certificate-or-azure-ad-oauth-with-certificate-credential-type-authentication'></a>
222+
<a id='client-certificate-or-azure-ad-oauth-with-certificate-credential-type-authentication'></a>
223223

224224
### Client certificate or Microsoft Entra ID OAuth with *Certificate* credential type authentication
225225

@@ -303,7 +303,7 @@ For example, suppose you have a logic app that sends an HTTP POST request to a w
303303

304304
:::image type="content" source="./media/connectors-native-http/http-action-urlencoded.png" alt-text="Screenshot that shows the workflow with HTTP request and content-type header set to application slash x-www-form-urlencoded." lightbox="./media/connectors-native-http/http-action-urlencoded.png":::
305305

306-
<a name="asynchronous-pattern"></a>
306+
<a id="asynchronous-pattern"></a>
307307

308308
## Asynchronous request-response behavior
309309

@@ -321,7 +321,7 @@ For *stateless* workflows in single-tenant Azure Logic Apps, HTTP-based actions
321321
1. On the information pane that opens, select **Settings**.
322322
1. Under **Networking**, find the **Asynchronous pattern** setting.
323323

324-
<a name="disable-asynchronous-operations"></a>
324+
<a id="disable-asynchronous-operations"></a>
325325

326326
## Disable asynchronous operations
327327

@@ -330,21 +330,21 @@ Sometimes, you might want to disable the HTTP action's asynchronous behavior in
330330
* [Avoid HTTP timeouts for long-running tasks](#avoid-http-timeouts)
331331
* [Disable checking location headers](#disable-location-header-check)
332332

333-
<a name="turn-off-asynchronous-pattern-setting"></a>
333+
<a id="turn-off-asynchronous-pattern-setting"></a>
334334

335335
### Turn off asynchronous pattern setting
336336

337337
1. In the workflow designer, select the HTTP action, and on the information pane that opens, select **Settings**.
338338

339339
1. Under **Networking**, find the **Asynchronous pattern** setting. Turn the setting to **Off** if enabled.
340340

341-
<a name="add-disable-async-pattern-option"></a>
341+
<a id="add-disable-async-pattern-option"></a>
342342

343343
### Disable asynchronous pattern in action's JSON definition
344344

345345
In the HTTP action's underlying JSON definition, [add the `DisableAsyncPattern` operation option](../logic-apps/logic-apps-workflow-actions-triggers.md#operation-options) to the action's definition so that the action follows the synchronous operation pattern instead. For more information, see also [Run actions in a synchronous operation pattern](../logic-apps/logic-apps-workflow-actions-triggers.md#disable-asynchronous-pattern).
346346

347-
<a name="avoid-http-timeouts"></a>
347+
<a id="avoid-http-timeouts"></a>
348348

349349
## Avoid HTTP timeouts for long-running tasks
350350

@@ -373,7 +373,7 @@ Here's the same example that shows the HTTP action response that contains `Retry
373373

374374
Sometimes, the destination service responds by returning the results one page at a time. If the response specifies the next page with the `nextLink` or `@odata.nextLink` property, you can turn on the **Pagination** setting on the HTTP action. This setting causes the HTTP action to automatically follow these links and get the next page. However, if the response specifies the next page with any other tag, you might have to add a loop to your workflow. Make this loop follow that tag and manually get each page until the tag is null.
375375

376-
<a name="disable-location-header-check"></a>
376+
<a id="disable-location-header-check"></a>
377377

378378
## Disable checking location headers
379379

@@ -385,7 +385,7 @@ Some endpoints, services, systems, or APIs return a `202 ACCEPTED` response that
385385

386386
## Known issues
387387

388-
<a name="omitted-headers"></a>
388+
<a id="omitted-headers"></a>
389389

390390
### Omitted HTTP headers
391391

@@ -404,7 +404,7 @@ If an HTTP trigger or action includes these headers, Azure Logic Apps removes th
404404

405405
Although Azure Logic Apps doesn't stop you from saving logic apps that use an HTTP trigger or action with these headers, Azure Logic Apps ignores these headers.
406406

407-
<a name="mismatch-content-type"></a>
407+
<a id="mismatch-content-type"></a>
408408

409409
### Response content doesn't match the expected content type
410410

articles/logic-apps/edit-app-settings-host-settings.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.custom: fasttrack-edit
1010
# Customer intent: As a logic app workflow developer, I want to learn about application settings and host settings that I can edit to customize the way that my Standard workflows run.
1111
---
1212

13-
# Edit host and app settings for single-tenant Standard Azure Logic Apps
13+
# Edit host and app settings for Standard logic apps in single-tenant Azure Logic Apps
1414

1515
[!INCLUDE [logic-apps-sku-standard](../../includes/logic-apps-sku-standard.md)]
1616

@@ -584,6 +584,10 @@ To add a host setting, follow these steps:
584584
}
585585
```
586586

587+
### [Azure CLI](#tab/azure-cli)
588+
589+
Not available.
590+
587591
---
588592

589593
## Related content

0 commit comments

Comments
 (0)