Skip to content

Commit 23b0797

Browse files
committed
Rendered draft.html
1 parent 1b9ea2a commit 23b0797

File tree

2 files changed

+23
-4
lines changed

2 files changed

+23
-4
lines changed

docs/draft.html

+21-2
Original file line numberDiff line numberDiff line change
@@ -526,8 +526,23 @@ <h2 data-number="1.1" id="the-call-for-memory-safety"><span class="header-sectio
526526
quality and reduce vulnerabilities? What are the options for introducing
527527
new memory safe code into existing projects and hardening software that
528528
already exists?</p>
529-
<p>There’s only one popular systems level/non-garbage collected language
530-
that provides rigorous memory safety. That’s the Rust language.<span class="citation" data-cites="rust-language">[<a href="https://doc.rust-lang.org/book/" role="doc-biblioref">rust-language</a>]</span> Although they play in the
529+
<blockquote>
530+
<p>Decades of vulnerabilities have proven how difficult it is to prevent
531+
memory-corrupting bugs when using C/C++. While garbage-collected
532+
languages like C# or Java have proven more resilient to these issues,
533+
there are scenarios where they cannot be used. For such cases, we’re
534+
betting on Rust as the alternative to C/C++. Rust is a modern language
535+
designed to compete with the performance C/C++, but with memory safety
536+
and thread safety guarantees built into the language. While we are not
537+
able to rewrite everything in Rust overnight, we’ve already adopted Rust
538+
in some of the most critical components of Azure’s infrastructure. We
539+
expect our adoption of Rust to expand substantially over time.</p>
540+
<p><cite>Microsoft Azure security evolution: Embrace secure
541+
multitenancy, Confidential Compute, and Rust</cite><span class="citation" data-cites="azure">[<a href="https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/" role="doc-biblioref">azure</a>]</span></p>
542+
</blockquote>
543+
<p>There’s only one mainstream systems level/non-garbage collected
544+
language that provides rigorous memory safety. That’s the Rust
545+
language.<span class="citation" data-cites="rust-language">[<a href="https://doc.rust-lang.org/book/" role="doc-biblioref">rust-language</a>]</span> Although they play in the
531546
same space, C++ and Rust have different designs with limited interop
532547
capability, making incremental migration from C++ to Rust a painstaking
533548
process.</p>
@@ -4928,6 +4943,10 @@ <h1 data-number="5" id="bibliography"><span class="header-section-number">5</spa
49284943
<div id="ref-arc" class="csl-entry" role="doc-biblioentry">
49294944
[arc] Automatic reference counting. <a href="https://docs.swift.org/swift-book/documentation/the-swift-programming-language/automaticreferencecounting/"><div class="csl-block">https://docs.swift.org/swift-book/documentation/the-swift-programming-language/automaticreferencecounting/</div></a>
49304945
</div>
4946+
<div id="ref-azure" class="csl-entry" role="doc-biblioentry">
4947+
[azure] Microsoft Azure security evolution: Embrace secure multitenancy,
4948+
Confidential Compute, and Rust. <a href="https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/"><div class="csl-block">https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/</div></a>
4949+
</div>
49314950
<div id="ref-borrow-checking" class="csl-entry" role="doc-biblioentry">
49324951
[borrow-checking] The Rust RFC Book - Non-lexical lifetimes. <a href="https://rust-lang.github.io/rfcs/2094-nll.html"><div class="csl-block">https://rust-lang.github.io/rfcs/2094-nll.html</div></a>
49334952
</div>

proposal/draft.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Security professionals urge projects to migrate away from C++ and adopt memory s
3636

3737
> Decades of vulnerabilities have proven how difficult it is to prevent memory-corrupting bugs when using C/C++. While garbage-collected languages like C# or Java have proven more resilient to these issues, there are scenarios where they cannot be used. For such cases, we’re betting on Rust as the alternative to C/C++. Rust is a modern language designed to compete with the performance C/C++, but with memory safety and thread safety guarantees built into the language. While we are not able to rewrite everything in Rust overnight, we’ve already adopted Rust in some of the most critical components of Azure’s infrastructure. We expect our adoption of Rust to expand substantially over time.
3838
>
39-
> -- <cite>Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust</cite>cite>[@azure]
39+
> -- <cite>Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust</cite>[@azure]
4040
4141
There's only one mainstream systems level/non-garbage collected language that provides rigorous memory safety. That's the Rust language.[@rust-language] Although they play in the same space, C++ and Rust have different designs with limited interop capability, making incremental migration from C++ to Rust a painstaking process.
4242

@@ -2833,7 +2833,7 @@ references:
28332833
28342834
- id: azure
28352835
citation-label: azure
2836-
title: Microsoft Azure security evolution: Embrace secure multitenancy, Confidential Compute, and Rust
2836+
title: Microsoft Azure security evolution&colon; Embrace secure multitenancy, Confidential Compute, and Rust
28372837
URL: https://azure.microsoft.com/en-us/blog/microsoft-azure-security-evolution-embrace-secure-multitenancy-confidential-compute-and-rust/
28382838
28392839
- id: rust-language

0 commit comments

Comments
 (0)