Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: fix some typos #2048

Merged
merged 2 commits into from
Feb 5, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion runatlantis.io/docs/custom-workflows.md
Original file line number Diff line number Diff line change
Expand Up @@ -164,7 +164,7 @@ If using the server `repos.yaml` file, you would use the following config:

```yaml
# repos.yaml
# Specify TERRAGRUNT_TFPATH environment variable to accomodate setting --default-tf-version
# Specify TERRAGRUNT_TFPATH environment variable to accommodate setting --default-tf-version
# Generate json plan via terragrunt for policy checks
repos:
- id: "/.*/"
Expand Down
2 changes: 1 addition & 1 deletion runatlantis.io/docs/policy-checking.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ policies:
- example-dev
policy_sets:
- name: example-conf-tests
path: /home/atlantis/conftest_policies # Consider seperate vcs & mount into container
path: /home/atlantis/conftest_policies # Consider separate vcs & mount into container
source: local
workflows:
custom:
Expand Down
6 changes: 3 additions & 3 deletions runatlantis.io/docs/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -81,10 +81,10 @@ could be stolen. Enable SSL/HTTPS using the `--ssl-cert-file` and `--ssl-key-fil
flags.

### Enable Authentication on Atlantis Web Server
It is very reccomended to enable authentication in the web service. Enable BasicAuth using the `--web-basic-auth=true` and setup a username and a password using `--web-username=yourUsername` and `--web-password=yourPassword` flags.
It is very recommended to enable authentication in the web service. Enable BasicAuth using the `--web-basic-auth=true` and setup a username and a password using `--web-username=yourUsername` and `--web-password=yourPassword` flags.

You can also pass these as environment variables `ATLANTIS_WEB_BASIC_AUTH=true` `ATLANTIS_WEB_USERNAME=yourUsername` and `ATLANTIS_WEB_PASSWORD=yourPassword`.

::tip Tip
:::tip Tip
We do encourage the usage of complex passwords in order to prevent basic bruteforcing attacks.
:::
:::
2 changes: 1 addition & 1 deletion runatlantis.io/docs/troubleshooting-https.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ the file passed to `--ssl-cert-file` should be the concatenation of the server's

If you have this error when specifying a TLS cert with a key:
```
[EROR] server.go:413 server: Tls: private key does not match public key
[ERROR] server.go:413 server: Tls: private key does not match public key
```

Check that the locally signed certificate authority is prepended to the self signed certificate.
Expand Down