From 926cfad2ae991cd71be58b4572bc1f4ebdd4ac10 Mon Sep 17 00:00:00 2001 From: Andrew Schleifer Date: Sun, 2 Nov 2025 09:10:12 -0500 Subject: [PATCH] Fix several typos --- about/pangolin-vs-vpn.mdx | 2 +- manage/identity-providers/auto-provisioning.mdx | 2 +- manage/identity-providers/azure.mdx | 2 +- manage/identity-providers/google.mdx | 2 +- manage/identity-providers/openid-connect.mdx | 2 +- manage/identity-providers/pocket-id.mdx | 2 +- manage/identity-providers/zitadel.mdx | 2 +- manage/sites/update-site.mdx | 2 +- self-host/community-guides/homeassistant.mdx | 2 +- self-host/community-guides/metrics.mdx | 8 ++++---- self-host/community-guides/overview.mdx | 2 +- self-host/community-guides/proxyprotocol.mdx | 2 +- self-host/enterprise-edition.mdx | 4 ++-- 13 files changed, 17 insertions(+), 17 deletions(-) diff --git a/about/pangolin-vs-vpn.mdx b/about/pangolin-vs-vpn.mdx index b5c9935..7f10402 100644 --- a/about/pangolin-vs-vpn.mdx +++ b/about/pangolin-vs-vpn.mdx @@ -57,7 +57,7 @@ Pangolin provides secure, application-specific ingress and routing without the l -### Simplified Ingess Infrastructure +### Simplified Ingress Infrastructure diff --git a/manage/identity-providers/auto-provisioning.mdx b/manage/identity-providers/auto-provisioning.mdx index ca1052d..5261a8a 100644 --- a/manage/identity-providers/auto-provisioning.mdx +++ b/manage/identity-providers/auto-provisioning.mdx @@ -77,7 +77,7 @@ In the Community Edition, identity providers are managed at the server level and After you create an IdP, on the edit page, you can manage organization policies via the "Organization Policies" tab. You can set default (fallback) policies, or define them on a per org basis. -### How Organization Policies Are Evalutated +### How Organization Policies Are Evaluated It is helpful to think of the auto provisioning process as follows: diff --git a/manage/identity-providers/azure.mdx b/manage/identity-providers/azure.mdx index 18c4808..b6aa497 100644 --- a/manage/identity-providers/azure.mdx +++ b/manage/identity-providers/azure.mdx @@ -38,7 +38,7 @@ We will revisit the **Authorised redirect URIs** field later, as we do not have ## Creating an Azure Entra ID IdP in Pangolin -In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the Azure Entra ID provider option. +In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the Azure Entra ID provider option. diff --git a/manage/identity-providers/google.mdx b/manage/identity-providers/google.mdx index eb5250b..b9bf022 100644 --- a/manage/identity-providers/google.mdx +++ b/manage/identity-providers/google.mdx @@ -48,7 +48,7 @@ After hitting "Create", you will be able to see the "Client ID" and "Client secr ## Creating a Google IdP in Pangolin -In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the Google provider option. +In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the Google provider option. diff --git a/manage/identity-providers/openid-connect.mdx b/manage/identity-providers/openid-connect.mdx index e6dbf77..af48404 100644 --- a/manage/identity-providers/openid-connect.mdx +++ b/manage/identity-providers/openid-connect.mdx @@ -7,7 +7,7 @@ This identity provider follows the OpenID Connect protocol. This means that it c ## Creating a Generic OAuth2/OIDC IdP in Pangolin -In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the OAuth2/OIDC provider option. +In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the OAuth2/OIDC provider option. diff --git a/manage/identity-providers/pocket-id.mdx b/manage/identity-providers/pocket-id.mdx index 1f63924..27515a0 100644 --- a/manage/identity-providers/pocket-id.mdx +++ b/manage/identity-providers/pocket-id.mdx @@ -40,7 +40,7 @@ After you have created the OIDC Client, take note of the following fields from t ## Configuring Identity Providers in Pangolin -In Pangolin, go to “Identity Providers” and click “Add Indentity Provider”. Select the OAuth2/OIDC provider option. +In Pangolin, go to “Identity Providers” and click “Add Identity Provider”. Select the OAuth2/OIDC provider option. "Name" should be set to something memorable (eg. Pocket ID). The "Provider Type" should be set to the default `OAuth2/OIDC`. diff --git a/manage/identity-providers/zitadel.mdx b/manage/identity-providers/zitadel.mdx index a470825..08720f6 100644 --- a/manage/identity-providers/zitadel.mdx +++ b/manage/identity-providers/zitadel.mdx @@ -53,7 +53,7 @@ When you click create, you'll be shown the `ClientSecret` and `ClientId`. Make s ## Configuring Identity Providers in Pangolin -In Pangolin, go to “Identity Providers” and click “Add Indentity Provider”. Select the OAuth2/OIDC provider option. +In Pangolin, go to “Identity Providers” and click “Add Identity Provider”. Select the OAuth2/OIDC provider option. "Name" should be set to something memorable (eg. Zitadel). The "Provider Type" should be set to the default `OAuth2/OIDC`. diff --git a/manage/sites/update-site.mdx b/manage/sites/update-site.mdx index 4ec7d93..5263781 100644 --- a/manage/sites/update-site.mdx +++ b/manage/sites/update-site.mdx @@ -5,7 +5,7 @@ description: "Update Newt to the latest version" The update process depends on how you originally installed Newt. -Find the lates version in the [GitHub releases](https://github.com/fosrl/newt/releases). +Find the latest version in the [GitHub releases](https://github.com/fosrl/newt/releases). ## Docker Installation diff --git a/self-host/community-guides/homeassistant.mdx b/self-host/community-guides/homeassistant.mdx index 04c6bd2..d788fc5 100644 --- a/self-host/community-guides/homeassistant.mdx +++ b/self-host/community-guides/homeassistant.mdx @@ -80,7 +80,7 @@ homeassistant: - "https://.example.com" # <-- Replace with URL of created resource in Pangolin ``` -4.5: If you wan't to use SSO Authentication in Pangolin you need to set up the `configuration.yaml` like this: +4.5: If you want to use SSO Authentication in Pangolin you need to set up the `configuration.yaml` like this: ``` http: cors_allowed_origins: diff --git a/self-host/community-guides/metrics.mdx b/self-host/community-guides/metrics.mdx index a82c7ab..6d1732a 100644 --- a/self-host/community-guides/metrics.mdx +++ b/self-host/community-guides/metrics.mdx @@ -19,7 +19,7 @@ This setup will increase the use of your server RAM. For claiming metrics from Traefik we have to adjust some configuration files. -1. Udpate the `docker-compose.yml` file of the Pangolin stack to expose metrics port `8082` for the Prometheus connection: +1. Update the `docker-compose.yml` file of the Pangolin stack to expose metrics port `8082` for the Prometheus connection: ```yaml service: @@ -63,7 +63,7 @@ sudo docker restart traefik gerbil For claiming metrics from Crowdsec we have to adjust the docker compose files. -1. Udpate the `docker-compose.yml` file of the Pangolin stack to expose metrics port `6060` for the Prometheus connection: +1. Update the `docker-compose.yml` file of the Pangolin stack to expose metrics port `6060` for the Prometheus connection: ```yaml service: @@ -130,7 +130,7 @@ scrape_configs: - targets: ["172.17.0.1:6060"] ``` -3. Create a folder `data` in `/config/prometheus` and change the ower and owning group: +3. Create a folder `data` in `/config/prometheus` and change the owner and owning group: ```bash chown nobody:nogroup data @@ -139,7 +139,7 @@ chown nobody:nogroup data 4. Start the Prometheus container: ```bash -sudo docker conpose up -d +sudo docker compose up -d ``` ## Grafana diff --git a/self-host/community-guides/overview.mdx b/self-host/community-guides/overview.mdx index bcdee69..9403e17 100644 --- a/self-host/community-guides/overview.mdx +++ b/self-host/community-guides/overview.mdx @@ -42,7 +42,7 @@ For more details, please refer to the following resources: ## Metrics -Currently you can claim metric data from Traefik and Crowdsec with Prometheus and visiulize it within a Grafana Dashboard. +Currently you can claim metric data from Traefik and Crowdsec with Prometheus and visualize it within a Grafana Dashboard. ### Prometheus diff --git a/self-host/community-guides/proxyprotocol.mdx b/self-host/community-guides/proxyprotocol.mdx index 0b5cb6a..a6a68c6 100644 --- a/self-host/community-guides/proxyprotocol.mdx +++ b/self-host/community-guides/proxyprotocol.mdx @@ -3,7 +3,7 @@ title: "Proxy Protocol" description: "Using Proxy Protocol to Preserve Client IPs for TCP/UDP backends" --- -Did you ever want to get the real ip instead of newt's IP or traefik's IP for TCP/UDP applications? Then follow below, Just be warned this is not a begineer guide. +Did you ever want to get the real ip instead of newt's IP or traefik's IP for TCP/UDP applications? Then follow below, Just be warned this is not a beginner guide. This guide shows how to enable Proxy Protocol manually until a GUI option becomes available. diff --git a/self-host/enterprise-edition.mdx b/self-host/enterprise-edition.mdx index 6c95d5f..b7737e9 100644 --- a/self-host/enterprise-edition.mdx +++ b/self-host/enterprise-edition.mdx @@ -66,7 +66,7 @@ The Enterprise Edition is distributed under the **Fossorial Commercial License** Complete the license application form. - Innacurate representation is a violation of the license and will result in the license being revoked. + Inaccurate representation is a violation of the license and will result in the license being revoked. @@ -121,7 +121,7 @@ The Enterprise Edition is distributed under the **Fossorial Commercial License** ``` - The Enterprise Edition image is stagged with `ee` (e.g., `fosrl/pangolin:ee-latest`) and is different from the Community Edition (`fosrl/pangolin:latest`). Make sure to use the correct image. + The Enterprise Edition image is tagged with `ee` (e.g., `fosrl/pangolin:ee-latest`) and is different from the Community Edition (`fosrl/pangolin:latest`). Make sure to use the correct image.