Skip to content

Commit 23077a7

Browse files
authored
Fix: Miscellaneous Typos (#701)
1 parent 9fe563a commit 23077a7

File tree

10 files changed

+21
-20
lines changed

10 files changed

+21
-20
lines changed

docs/jumpstart/action-items.mdx

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Before we can get started, here's the minimum information we need from you.
6363

6464
Please also provision a single test user in your IdP for Cloud Posse to use for testing and add those user credentials to 1Password.
6565

66-
- [AWS Identity Center (SSO) ClickOps](/layers/identity/aws-sso/)
66+
- [Setup AWS Identity Center (SSO)](/layers/identity/aws-sso/)
6767

6868
<Admonition type="caution">
6969
- GSuite does not automatically sync Users and Groups with AWS Identity Center without additional configuration! If using GSuite as an IdP, considering deploying the [ssosync tool](https://github.com/awslabs/ssosync).
@@ -76,10 +76,9 @@ Before we can get started, here's the minimum information we need from you.
7676

7777
If deploying AWS SAML as an alternative to AWS SSO, we will need a separate configuration and metadata file. Again, please refer to the relevant linked guide.
7878

79-
- [GSuite](https://aws.amazon.com/blogs/desktop-and-application-streaming/setting-up-g-suite-saml-2-0-federation-with-amazon-appstream-2-0/): Follow Steps 1 through 7. This document refers to Appstream, but the process will be the same for AWS.
80-
- [Office 365](/layers/identity/tutorials/how-to-setup-saml-login-to-aws-from-office-365)
81-
- [JumpCloud](https://support.jumpcloud.com/support/s/article/getting-started-applications-saml-sso2)
82-
- [Okta](https://help.okta.com/en-us/Content/Topics/DeploymentGuides/AWS/aws-configure-identity-provider.htm)
79+
Please see the following guide and follow the steps to export metadata for your Identity Provider integration. All steps in AWS will be handled by Cloud Posse.
80+
81+
- [Setup AWS SAML](/layers/identity/aws-saml/)
8382
</Step>
8483
</Steps>
8584

docs/layers/accounts/design-decisions/decide-on-aws-organization-strategy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Cloud Posse recommends starting with a **Net-New Organization**
2222

2323
- Only one AWS Control Tower can exist in an organization.
2424

25-
- AWS Control Tower only recenlty became managable with Terraform, and full support is not availble.
25+
- AWS Control Tower only recently became manageable with Terraform, and full support is not available.
2626
Depending on the Scope of Work, Cloud Posse is usually responsible for provisioning accounts with terraform which requires all the same access as Control Tower.
2727

2828
- Member accounts can only be provisioned from the top-level root “organization” account

docs/layers/ecs/tutorials/1password-scim-bridge.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ import CollapsibleText from "@site/src/components/CollapsibleText";
1616

1717
## Implementation
1818

19-
The implementation of this is fairly simple. We will generate credentials for the SCIM bridge in 1Password, store them in AWS SSM Parameter Store, deploy the SCIM bridge ECS service, and then finally connect your choosen identity provider.
19+
The implementation of this is fairly simple. We will generate credentials for the SCIM bridge in 1Password, store them in AWS SSM Parameter Store, deploy the SCIM bridge ECS service, and then finally connect your chosen identity provider.
2020

2121
<Steps>
2222
<Step>
@@ -88,8 +88,6 @@ The implementation of this is fairly simple. We will generate credentials for th
8888
OP_CONFIRMATION_INTERVAL: "300"
8989
map_secrets:
9090
OP_SESSION: "1password/scim/scimsession"
91-
# OP_WORKSPACE_CREDENTIALS: ""
92-
# OP_WORKSPACE_SETTINGS: ""
9391
log_configuration:
9492
logDriver: awslogs
9593
options: {}

docs/layers/eks/design-decisions/decide-on-secrets-management-for-eks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,6 @@ We recommend using the External Secrets Operator with AWS SSM Parameter Store. T
5757

5858
However, we are in the process of evaluating the AWS Secrets Manager secrets with Kubernetes Secrets Store CSI Driver solution. This is the AWS supported option and may be a better long-term solution. We will build the required Terraform component to support this solution.
5959

60-
## Consquences
60+
## Consequences
6161

6262
We will develop the `eks/secrets-store-csi-driver` component using the [Secrets Store CSI Driver](https://secrets-store-csi-driver.sigs.k8s.io/getting-started/installation)

docs/layers/identity/aws-saml.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,11 @@ identity. You can use this federated identity to connect directly to a given AWS
3030
Here are some example setup references:
3131
<Tabs queryString="idp">
3232
<TabItem value="google" label="Google Workspace">
33-
Follow the [AWS documentation for Google Workspace](https://aws.amazon.com/blogs/desktop-and-application-streaming/setting-up-g-suite-saml-2-0-federation-with-amazon-appstream-2-0/). Once you have completed the setup, download the metadata file.
33+
<Steps>
34+
1. Open the [AWS documentation for GSuite](https://aws.amazon.com/blogs/desktop-and-application-streaming/setting-up-g-suite-saml-2-0-federation-with-amazon-appstream-2-0/)
35+
1. Follow Steps 1 through 7. This document refers to Appstream, but the process will be the same for AWS.
36+
1. Once you have completed the setup, download the metadata file.
37+
</Steps>
3438
</TabItem>
3539
<TabItem value="okta" label="Okta">
3640

docs/layers/project/create-repository.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Learn how to create a GitHub repository to host infrastructure tools and configu
6969
With the GitHub repository prepared, we are now ready to import the Cloud Posse reference architecture.
7070

7171
<Admonition type="info" title="Where do I get these files?">
72-
The contents of this respository are supplied as part of our [Quickstart](/quickstart) or [Jumpstart](/jumpstart) packages. For the remainder of this guide, we will assume you have access to the reference architecture configurations.
72+
The contents of this repository are supplied as part of our [Quickstart](/quickstart) or [Jumpstart](/jumpstart) packages. For the remainder of this guide, we will assume you have access to the reference architecture configurations.
7373
<PrimaryCTA to="/quickstart">Learn More</PrimaryCTA>
7474
</Admonition>
7575

docs/layers/project/toolbox.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Geodesic is a powerful Linux toolbox container designed to optimize DevOps workf
2727

2828
<DismissibleDialog id="q2" expires="30" className="floating tall wide">
2929
<h1>Where are the configs?</h1>
30-
<p>The configurations are availble via our Quickstart</p>
30+
<p>The configurations are available via our Quickstart</p>
3131
<PrimaryCTA to="/quickstart">Try Quickstart</PrimaryCTA>
3232
</DismissibleDialog>
3333

docs/layers/software-delivery/ecs-ecspresso/ecs-partial-task-definitions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,4 +218,4 @@ Changes through Terraform will not immediately be reflected in the ECS Service.
218218
been updated, but whatever was in the `task-definition.json` file in the S3 bucket will be used for deployment.
219219

220220
To update the ECS Service after updating the Terraform for it, you must deploy through GitHub Actions. This will then
221-
download the new template and create a new updated `task-defintion.json` to store in s3.
221+
download the new template and create a new updated `task-definition.json` to store in s3.

docs/layers/software-delivery/eks-argocd/tutorials/github-commit-notifications.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Our implementation of Argo CD breaks up notifications into "notifiers", "templat
8080
"body": "{\"context\":\"continuous-delivery/{{.app.metadata.name}}\",\"description\":\"ArgoCD\",\"state\":\"pending\",\"target_url\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\"}"
8181
"method": "POST"
8282
"path": "/repos/{{call .repo.FullNameByRepoURL .app.spec.source.repoURL}}/statuses/{{.app.status.operationState.operation.sync.revision}}"
83-
template.app-deploy-succeded: |
83+
template.app-deploy-succeeded: |
8484
"alertmanager": null
8585
"message": "Application {{ .app.metadata.name }} is now running new version of deployments
8686
manifests."
@@ -103,7 +103,7 @@ Our implementation of Argo CD breaks up notifications into "notifiers", "templat
103103
eks/argocd:
104104
vars:
105105
notifications_templates:
106-
app-deploy-succeded:
106+
app-deploy-succeeded:
107107
message: "Application {{ .app.metadata.name }} is now running new version of deployments"
108108
webhook:
109109
foo-repo-github-commit:
@@ -146,15 +146,15 @@ Our implementation of Argo CD breaks up notifications into "notifiers", "templat
146146
- "app-deploy-started"
147147
"when": "app.status.operationState.phase in ['Running'] or ( app.status.operationState.phase
148148
== 'Succeeded' and app.status.health.status == 'Progressing' )"
149-
trigger.on-deploy-succeded: |
149+
trigger.on-deploy-succeeded: |
150150
- "oncePer": "app.status.sync.revision"
151151
"send":
152-
- "app-deploy-succeded"
152+
- "app-deploy-succeeded"
153153
"when": "app.status.operationState.phase == 'Succeeded' and app.status.health.status
154154
== 'Healthy'"
155155
```
156156

157-
These triggers may trigger _multiple templates_. For example `trigger.on-deploy-succeded` triggers both `template.app-deploy-succeded.webhook.app-repo-github-commit-status` and `template.app-deploy-succeded.webhook.argocd-repo-github-commit-status`.
157+
These triggers may trigger _multiple templates_. For example `trigger.on-deploy-succeeded` triggers both `template.app-deploy-succeeded.webhook.app-repo-github-commit-status` and `template.app-deploy-succeeded.webhook.argocd-repo-github-commit-status`.
158158
</Step>
159159

160160
</Steps>

docs/layers/spacelift/design-decisions/design-decisions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ import DocCardList from '@theme/DocCardList';
77
import Intro from '@site/src/components/Intro';
88

99
<Intro>
10-
Review the key design decisions for how you'll leverage Spacelift for continous delivery of your infrastructure with Terraform and Atmos.
10+
Review the key design decisions for how you'll leverage Spacelift for continuous delivery of your infrastructure with Terraform and Atmos.
1111
</Intro>
1212

1313
<DocCardList/>

0 commit comments

Comments
 (0)