Skip to content

Commit f7b600b

Browse files
authored
Merge pull request #294532 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 71dad6d + 4076d75 commit f7b600b

File tree

7 files changed

+10
-8
lines changed

7 files changed

+10
-8
lines changed

articles/governance/resource-graph/changes/get-resource-changes.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ When a resource is created, updated, or deleted, a new change resource (`Microso
6464
```
6565

6666
[See the full reference guide for change resource properties.](/rest/api/resources/changes)
67+
> [!NOTE]
68+
> Snapshots are not currently supported for deleted resources.
6769
6870
## Run a query
6971

articles/iot-edge/how-to-connect-downstream-device.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ You can use a service like [Azure Key Vault](/azure/key-vault/) or a function li
8686

8787
Once the root CA certificate is on the downstream device, make sure the applications that are connecting to the gateway can access the certificate.
8888

89-
Installing the root CA certificate in the operating system's certificate store generally allows most applications to use the root CA certificate. There are some exceptions, like NodeJS applications that don't use the OS certificate store but rather use the Node runtime's internal certificate store. If you can't install the certificate at the operating system level, skip ahead to [Use certificates with Azure IoT SDKs](#use-certificates-with-azure-iot-sdks).
89+
Installing the root CA certificate in the operating system's certificate store generally allows most applications to use the root CA certificate. There are some exceptions, like Node.js applications that don't use the OS certificate store but rather use the Node runtime's internal certificate store. If you can't install the certificate at the operating system level, skip ahead to [Use certificates with Azure IoT SDKs](#use-certificates-with-azure-iot-sdks).
9090

9191
Install the root CA certificate on either Ubuntu or Windows.
9292

@@ -144,7 +144,7 @@ Now you're ready to use certificates with a sample in the language of your choic
144144

145145
# [NodeJS](#tab/nodejs)
146146

147-
This section provides a sample application to connect an Azure IoT NodeJS device client to an IoT Edge gateway. For NodeJS applications, you must install the root CA certificate at the application level as shown here. NodeJS applications don't use the system's certificate store.
147+
This section provides a sample application to connect an Azure IoT Node.js device client to an IoT Edge gateway. For Node.js applications, you must install the root CA certificate at the application level as shown here. Node.js applications don't use the system's certificate store.
148148

149149
1. Get the sample for **edge_downstream_device.js** from the [Azure IoT device SDK for Node.js samples repo](https://github.com/Azure/azure-iot-sdk-node/tree/main/device/samples).
150150
1. Make sure that you have all the prerequisites to run the sample by reviewing the **readme.md** file.

articles/reliability/reliability-defender-devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To request recovery of a connector created in a downed region:
5959
resources
6060
| extend connectorType = tostring(parse_json(properties["environmentName"]))
6161
| where type == "microsoft.security/securityconnectors"
62-
| where connectorType in ("AzureDevOps", "Github", "GitLab")
62+
| where connectorType in ("AzureDevOps", "GitHub", "GitLab")
6363
| project connectorResourceId = id, region = location
6464
6565
1. Once the DevOps resources have been released from the old connector and appear for the new connector, [reconfigure the pull request annotations](/azure/defender-for-cloud/enable-pull-request-annotations) as needed.

articles/spring-apps/basic-standard/concept-app-customer-responsibilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ When you deploy your polyglot applications to the Enterprise plan, assign specif
5757
| .NET | [.NET and .NET core support policy](https://dotnet.microsoft.com/platform/support/policy/dotnet-core) |
5858
| Python | [Status of Python versions](https://devguide.python.org/versions/) |
5959
| Go | [Go release history](https://go.dev/doc/devel/release) |
60-
| NodeJS | [Nodejs releases](https://nodejs.org/en/about/previous-releases/) |
60+
| Node.js | [Nodejs releases](https://nodejs.org/en/about/previous-releases/) |
6161
| PHP | [PHP supported versions](https://www.php.net/supported-versions.php) |
6262

6363
### Stack image support

articles/spring-apps/enterprise/how-to-enterprise-configure-apm-integration-and-ca-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Azure Spring Apps supports CA certificates for all language family buildpacks, b
4545
| .NET | || || |
4646
| Go | | | || |
4747
| Python | | | | | |
48-
| NodeJS | |||||
48+
| Node.js | |||||
4949
| Web servers | | | || |
5050
| Java Native Image | | | | | |
5151
| PHP | |||| |

articles/spring-apps/enterprise/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following updates are now available:
3333
- App Accelerator: upgraded to 1.8.1.
3434
- Build service:
3535
- Go buildpack: added support for Go 1.22, deprecated Go 1.20, changed default version from Go 1.20 to Go 1.21.
36-
- NodeJS buildpack: changed default version from Node.js 19 to Node.js 20.
36+
- Node.js buildpack: changed default version from Node.js 19 to Node.js 20.
3737
- Java Native Image buildpack: deprecated Java 20, added Java 21.
3838
- PHP buildpack: added PHP 8.3
3939
- Regular upgrade to keep Azure Kubernetes Service up-to-date: upgraded to 1.29.7.

articles/storage/common/storage-explorer-network.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ To set credentials, you must go to the Proxy Settings dialog (**Edit** > **Confi
8787

8888
### Use system proxy
8989

90-
When this option is selected, Storage Explorer will use your OS proxy settings. More specifically, it will result in network calls being made using the Chromium networking stack. The Chromium networking stack is much more robust than the NodeJS networking stack normally used by Storage Explorer. Here's a snippet from [Chromium's documentation](https://www.chromium.org/developers/design-documents/network-settings) on what all it can do:
90+
When this option is selected, Storage Explorer will use your OS proxy settings. More specifically, it will result in network calls being made using the Chromium networking stack. The Chromium networking stack is much more robust than the Node.js networking stack normally used by Storage Explorer. Here's a snippet from [Chromium's documentation](https://www.chromium.org/developers/design-documents/network-settings) on what all it can do:
9191

9292
> The Chromium network stack uses the system network settings so that users and administrators can control the network settings of all applications easily. The network settings include:
9393
> - proxy settings
@@ -127,7 +127,7 @@ Currently, AzCopy only supports proxy servers that use **basic authentication**.
127127

128128
## SSL certificates
129129

130-
By default, Storage Explorer uses the NodeJS networking stack. NodeJS ships with a predefined list of trusted SSL certificates. Some networking technologies, such as proxy servers or anti-virus software, inject their own SSL certificates into network traffic. These certificates are often not present in NodeJS' certificate list. NodeJS won't trust responses that contain such a certificate. When NodeJS doesn't trust a response, then Storage Explorer will receive an error.
130+
By default, Storage Explorer uses the Node.js networking stack. Node.js ships with a predefined list of trusted SSL certificates. Some networking technologies, such as proxy servers or anti-virus software, inject their own SSL certificates into network traffic. These certificates are often not present in NodeJS' certificate list. Node.js won't trust responses that contain such a certificate. When Node.js doesn't trust a response, then Storage Explorer will receive an error.
131131

132132
You have multiple options for resolving such errors:
133133
- Use [**system proxy**](#use-system-proxy) as your proxy source.

0 commit comments

Comments
 (0)