Skip to content

Commit 17fa531

Browse files
Merge pull request #247937 from spelluru/relayfreshness08103
freshness updates
2 parents e5de191 + ce77f1e commit 17fa531

File tree

3 files changed

+13
-13
lines changed

3 files changed

+13
-13
lines changed

articles/azure-relay/network-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Network security for Azure Relay
33
description: This article describes how to use IP firewall rules and private endpoints with Azure Relay.
44
ms.topic: conceptual
5-
ms.date: 06/21/2022
5+
ms.date: 08/10/2023
66
---
77

88
# Network security for Azure Relay
@@ -20,7 +20,7 @@ By default, Relay namespaces are accessible from internet as long as the request
2020

2121
This feature is helpful in scenarios in which Azure Relay should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Relay with [Azure Express Route](../expressroute/expressroute-faqs.md#supported-services), you can create a **firewall rule** to allow traffic from only your on-premises infrastructure IP addresses.
2222

23-
The IP firewall rules are applied at the Relay namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that does not match an allowed IP rule on the Relay namespace is rejected as unauthorized. The response does not mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
23+
The IP firewall rules are applied at the Relay namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Relay namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
2424

2525
For more information, see [How to configure IP firewall for a Relay namespace](ip-firewall-virtual-networks.md)
2626

articles/azure-relay/relay-hybrid-connections-dotnet-api-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Overview of Azure Relay .NET Standard APIs | Microsoft Docs
33
description: This article summarizes some of the key an overview of Azure Relay Hybrid Connections .NET Standard API.
44
ms.topic: article
55
ms.custom: devx-track-csharp, devx-track-dotnet
6-
ms.date: 06/21/2022
6+
ms.date: 08/10/2023
77
---
88

99
# Azure Relay Hybrid Connections .NET Standard API overview
@@ -48,7 +48,7 @@ catch (ArgumentException ae)
4848

4949
## Hybrid connection stream
5050

51-
The [HybridConnectionStream][HCStream] class is the primary object used to send and receive data from an Azure Relay endpoint, whether you are working with a [HybridConnectionClient][HCClient], or a [HybridConnectionListener][HCListener].
51+
The [HybridConnectionStream][HCStream] class is the primary object used to send and receive data from an Azure Relay endpoint, whether you're working with a [HybridConnectionClient][HCClient], or a [HybridConnectionListener][HCListener].
5252

5353
### Getting a Hybrid connection stream
5454

@@ -78,7 +78,7 @@ var hybridConnectionStream = await client.CreateConnectionAsync();
7878

7979
### Receiving data
8080

81-
The [HybridConnectionStream][HCStream] class enables two-way communication. In most cases, you continuously receive from the stream. If you are reading text from the stream, you might also want to use a [StreamReader](/dotnet/api/system.io.streamreader) object, which enables easier parsing of the data. For example, you can read data as text, rather than as `byte[]`.
81+
The [HybridConnectionStream][HCStream] class enables two-way communication. In most cases, you continuously receive from the stream. If you're reading text from the stream, you might also want to use a [StreamReader](/dotnet/api/system.io.streamreader) object, which enables easier parsing of the data. For example, you can read data as text, rather than as `byte[]`.
8282

8383
The following code reads individual lines of text from the stream until a cancellation is requested:
8484

@@ -105,7 +105,7 @@ while (!cancellationToken.IsCancellationRequested)
105105

106106
### Sending data
107107

108-
Once you have a connection established, you can send a message to the Relay endpoint. Because the connection object inherits [Stream](/dotnet/api/system.io.stream), send your data as a `byte[]`. The following example shows how to do this:
108+
Once you have a connection established, you can send a message to the Relay endpoint. Because the connection object inherits [Stream](/dotnet/api/system.io.stream), send your data as a `byte[]`. The following example shows how to do it:
109109

110110
```csharp
111111
var data = Encoding.UTF8.GetBytes("hello");

articles/azure-relay/relay-hybrid-connections-node-ws-api-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview of the Azure Relay Node APIs | Microsoft Docs
33
description: This article provides an overview of the Node.js API for the Azure Relay service. It also shows how to use the hyco-ws Node package.
44
ms.topic: article
5-
ms.date: 06/21/2022
5+
ms.date: 08/10/2023
66
ms.custom: devx-track-js
77
---
88

@@ -33,7 +33,7 @@ listenUri = WebSocket.appendRelayToken(listenUri, 'ruleName', '...key...')
3333

3434
```
3535

36-
The helper methods are for use with this package, but can also be used by a Node server for enabling web or device clients to create listeners or senders. The server uses these methods by passing them URIs that embed short-lived tokens. These URIs can also be used with common WebSocket stacks that do not support setting HTTP headers for the WebSocket handshake. Embedding authorization tokens into the URI is supported primarily for those library-external usage scenarios.
36+
The helper methods are for use with this package, but can also be used by a Node server for enabling web or device clients to create listeners or senders. The server uses these methods by passing them URIs that embed short-lived tokens. These URIs can also be used with common WebSocket stacks that don't support setting HTTP headers for the WebSocket handshake. Embedding authorization tokens into the URI is supported primarily for those library-external usage scenarios.
3737

3838
#### createRelayListenUri
3939

@@ -49,7 +49,7 @@ URI can then be used with the relay version of the WebSocketServer class.
4949
- `token` (optional) - a previously issued Relay access token that is embedded in the listener URI (see the following example).
5050
- `id` (optional) - a tracking identifier that enables end-to-end diagnostics tracking of requests.
5151

52-
The `token` value is optional and should only be used when it is not possible to send HTTP headers along with the WebSocket handshake, as is the case with the W3C WebSocket stack.
52+
The `token` value is optional and should only be used when it isn't possible to send HTTP headers along with the WebSocket handshake, as is the case with the W3C WebSocket stack.
5353

5454

5555
#### createRelaySendUri
@@ -66,7 +66,7 @@ URI can be used with any WebSocket client.
6666
- `token` (optional) - a previously issued Relay access token that is embedded in the send URI (see the following example).
6767
- `id` (optional) - a tracking identifier that enables end-to-end diagnostics tracking of requests.
6868

69-
The `token` value is optional and should only be used when it is not possible to send HTTP headers along with the WebSocket handshake, as is the case with the W3C WebSocket stack.
69+
The `token` value is optional and should only be used when it isn't possible to send HTTP headers along with the WebSocket handshake, as is the case with the W3C WebSocket stack.
7070

7171

7272
#### createRelayToken
@@ -97,7 +97,7 @@ returns the token correctly appended to the input URI.
9797

9898
### Class ws.RelayedServer
9999

100-
The `hycows.RelayedServer` class is an alternative to the `ws.Server` class that does not listen on the local network, but delegates listening to the Azure Relay service.
100+
The `hycows.RelayedServer` class is an alternative to the `ws.Server` class that doesn't listen on the local network, but delegates listening to the Azure Relay service.
101101

102102
The two classes are mostly contract compatible, meaning that an existing application using the `ws.Server` class can easily be changed to use the relayed version. The main differences are in the constructor and in the available options.
103103

@@ -114,7 +114,7 @@ var wss = new server(
114114
});
115115
```
116116

117-
The `RelayedServer` constructor supports a different set of arguments than the `Server`, because it is not a standalone listener, or able to be embedded into an existing HTTP listener framework. There are also fewer options available since the WebSocket management is largely delegated to the Relay service.
117+
The `RelayedServer` constructor supports a different set of arguments than the `Server`, because it isn't a standalone listener, or able to be embedded into an existing HTTP listener framework. There are also fewer options available since the WebSocket management is largely delegated to the Relay service.
118118

119119
Constructor arguments:
120120

@@ -148,7 +148,7 @@ Emitted when a new WebSocket connection is accepted. The object is of type `ws.W
148148
function(error)
149149
```
150150

151-
If the underlying server emits an error, it is forwarded here.
151+
If the underlying server emits an error, it's forwarded here.
152152

153153
#### Helpers
154154

0 commit comments

Comments
 (0)