Skip to content

Commit aaf5273

Browse files
committed
refactor: clean up
1 parent f72ff28 commit aaf5273

File tree

2 files changed

+7
-14
lines changed

2 files changed

+7
-14
lines changed

sources/platform/collaboration/general-resource-access.md

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -130,13 +130,12 @@ Even when a resource is restricted, you might still want to share it with someon
130130
#### How pre-signed URLs work
131131

132132
A pre-signed URL is a regular HTTPS link that includes a cryptographic signature verifying that access has been explicitly granted by someone with valid permissions.
133-
When the signed URL is used, Apify validates the signature and grants temporary access only to the file or record it refers to - no API token required.
133+
When the signed URL is used, Apify validates the signature and grants access - no API token required.
134134

135135
**Key properties**:
136136

137137
- **Works with restricted resources** – Even if “General resource access” is set to **Restricted**, the signed URL will work without asking for API token.
138-
**Time-limited (optional)** – Links can be either **temporary** (expiring after a specified duration) or **permanent**, depending on how they’re generated.
139-
**Lightweight** - Ideal for embedding in emails, webhooks, reports, or notifications where authentication isn’t possible.
138+
- **Time-limited or permantent** – Links can be either **temporary** (expiring after a specified duration) or **permanent**, depending on how they’re generated.
140139

141140
#### What links can be pre-signed
142141

@@ -171,7 +170,7 @@ The response also contains:
171170

172171
#### How to generate pre-signed URLs
173172

174-
You can create pre-signed URLs either through the Apify Console or programmatically via the API or SDK.
173+
You can create pre-signed URLs either through the Apify Console or programmatically via the Apify API client.
175174

176175
**In console:**
177176

@@ -263,12 +262,6 @@ This is very useful if you wish to expose a storage publicly with an easy to rem
263262

264263
If you own a public Actor in the Apify Store, you need to make sure that your Actor will work even for users who have restricted access to their resources. Over time, you might see a growing number of users with **General resource access** set to **Restricted**.
265264

266-
:::tip Testing public access behavior
267-
268-
To test your public Actor, run it using an account with **General resource access** set to restricted. You can use your developer account, or create a temporary testing Apify account.
269-
270-
:::
271-
272265
In practice, this means that:
273266

274267
- All API requests made by your Actor must include a valid API token.
@@ -290,7 +283,7 @@ This section provides a practical guide and best practices to help you update yo
290283

291284
#### 1. Always authenticate API requests
292285

293-
All API requests from your Actor should use authenticated methods.
286+
All API requests from your Actor should be authenticated.
294287
When using the [Apify SDK](https://docs.apify.com/sdk/js/) or [Apify Client](https://docs.apify.com/api/client/js/), this is done automatically.
295288

296289
If your Actor makes direct API calls, include the API token manually:
@@ -323,8 +316,8 @@ const recordUrl = kvStore.getRecordPublicUrl(recordKey);
323316
await Actor.pushData({ recordUrl });
324317
```
325318

326-
For details on how to generate pre-signed URLs, see the section
327-
👉 [Sharing restricted resources with pre-signed URLs](/platform/collaboration/general-resource-access#pre-signed-urls).
319+
To learn more about generating pre-signed URLs, refer to the section [Sharing restricted resources with pre-signed URLs](/platform/collaboration/general-resource-access#pre-signed-urls).
320+
328321

329322
:::note Using Console URLs
330323

sources/platform/integrations/programming/api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ If it’s **on**, the token can implicitly access the default storage of the Act
176176

177177
If the toggle is **off**, the token can still trigger and inspect runs, but access to the default storages is restricted:
178178

179-
- For accounts with **Restricted general resource access**, the token cannot read or write default storages. [Learn more about restricted general resource access](/platform/collaboration/general-resource-access).
179+
- For accounts with **Restricted general resource access**, the token cannot read or write to default storages. [Learn more about restricted general resource access](/platform/collaboration/general-resource-access).
180180
- For accounts with **Unrestricted general resource access**, the default storages can still be read anonymously using their IDs, but writing is prevented.
181181

182182

0 commit comments

Comments
 (0)