diff --git a/src/SecurityInsights/SecurityInsights.Autorest/README.md b/src/SecurityInsights/SecurityInsights.Autorest/README.md
index b5506b75aa70..50844deeef8a 100644
--- a/src/SecurityInsights/SecurityInsights.Autorest/README.md
+++ b/src/SecurityInsights/SecurityInsights.Autorest/README.md
@@ -111,7 +111,7 @@ directive:
verb: Set
set:
verb: Update
- # fix subject name to encrichment
+ # fix subject name to enrichment
- where:
subject: DomainWhois
set:
@@ -184,7 +184,7 @@ directive:
subject: EntityTimeline
variant: List
remove: true
- # Rename Id for user expierence
+ # Rename Id for user experience
- where:
subject: AlertRuleAction
parameter-name: Id
@@ -337,7 +337,7 @@ directive:
- where:
variant: ^Append$|^AppendViaIdentity$|^Connect$|^ConnectViaIdentity$|^CreateViaIdentity$|^CreateViaIdentityExpanded$|^Expand$|^ExpandViaIdentity$|^ExpandViaIdentityExpanded$|^GetViaIdentityExpanded$|^PostViaIdentity$|^Query$|^QueryViaIdentity$|^QueriesViaIdentity$|^Replace$|^ReplaceViaIdentity$
remove: true
- # fix Equals that conflicts with inhertied property
+ # fix Equals that conflicts with inherited property
- where:
enum-name: AutomationRulePropertyConditionSupportedOperator
enum-value-name: Equals
diff --git a/src/SecurityInsights/SecurityInsights.Autorest/docs/Get-AzSentinelEntityActivity.md b/src/SecurityInsights/SecurityInsights.Autorest/docs/Get-AzSentinelEntityActivity.md
index bfb7275e5c59..80c8e65303d6 100644
--- a/src/SecurityInsights/SecurityInsights.Autorest/docs/Get-AzSentinelEntityActivity.md
+++ b/src/SecurityInsights/SecurityInsights.Autorest/docs/Get-AzSentinelEntityActivity.md
@@ -49,7 +49,7 @@ This command gets insights and activities for an Entity.
$Entity | Get-AzSentinelEntityActivity
```
-This command gets insights and activies for an Entity by object
+This command gets insights and activities for an Entity by object
## PARAMETERS
diff --git a/src/SecurityInsights/SecurityInsights.Autorest/docs/New-AzSentinelAlertRule.md b/src/SecurityInsights/SecurityInsights.Autorest/docs/New-AzSentinelAlertRule.md
index cd5453b81089..6323325d765d 100644
--- a/src/SecurityInsights/SecurityInsights.Autorest/docs/New-AzSentinelAlertRule.md
+++ b/src/SecurityInsights/SecurityInsights.Autorest/docs/New-AzSentinelAlertRule.md
@@ -95,7 +95,7 @@ This command creates an Alert Rule of the MicrosoftSecurityIncidentCreation kind
### Example 5: Create a Scheduled Alert Rule
```powershell
-New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Exection Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventId == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
+New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Execution Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventId == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
```
This command creates an Alert Rule of the Scheduled kind.
diff --git a/src/SecurityInsights/SecurityInsights.Autorest/examples/Get-AzSentinelEntityActivity.md b/src/SecurityInsights/SecurityInsights.Autorest/examples/Get-AzSentinelEntityActivity.md
index ec4944808d24..eb57b2ce39bc 100644
--- a/src/SecurityInsights/SecurityInsights.Autorest/examples/Get-AzSentinelEntityActivity.md
+++ b/src/SecurityInsights/SecurityInsights.Autorest/examples/Get-AzSentinelEntityActivity.md
@@ -24,4 +24,4 @@ This command gets insights and activities for an Entity.
$Entity | Get-AzSentinelEntityActivity
```
-This command gets insights and activies for an Entity by object
\ No newline at end of file
+This command gets insights and activities for an Entity by object
\ No newline at end of file
diff --git a/src/SecurityInsights/SecurityInsights.Autorest/examples/New-AzSentinelAlertRule.md b/src/SecurityInsights/SecurityInsights.Autorest/examples/New-AzSentinelAlertRule.md
index 9f96df72e7fc..ce2ebe5003ca 100644
--- a/src/SecurityInsights/SecurityInsights.Autorest/examples/New-AzSentinelAlertRule.md
+++ b/src/SecurityInsights/SecurityInsights.Autorest/examples/New-AzSentinelAlertRule.md
@@ -32,7 +32,7 @@ This command creates an Alert Rule of the MicrosoftSecurityIncidentCreation kind
### Example 5: Create a Scheduled Alert Rule
```powershell
-New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Exection Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventId == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
+New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Execution Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventId == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
```
This command creates an Alert Rule of the Scheduled kind. Please note that that query (parameter -Query) needs to be on a single line as as string.
diff --git a/src/SecurityInsights/SecurityInsights.Autorest/test/Update-AzSentinelSetting.Tests.ps1 b/src/SecurityInsights/SecurityInsights.Autorest/test/Update-AzSentinelSetting.Tests.ps1
index b9f464e3c0e1..6fac65eb2d65 100644
--- a/src/SecurityInsights/SecurityInsights.Autorest/test/Update-AzSentinelSetting.Tests.ps1
+++ b/src/SecurityInsights/SecurityInsights.Autorest/test/Update-AzSentinelSetting.Tests.ps1
@@ -18,13 +18,13 @@ Describe 'Update-AzSentinelSetting' -Tag 'LiveOnly' {
It 'UpdateExpanded' {
Update-AzSentinelSetting -ResourceGroupName $env.resourceGroupName -WorkspaceName $env.workspaceName -SettingsName Anomalies -Enabled $false
$settings = get-AzSentinelSetting -ResourceGroupName $env.resourceGroupName -WorkspaceName $env.workspaceName
- $sttings.Name | Should -Not -Contain "Anomalies"
+ $settings.Name | Should -Not -Contain "Anomalies"
}
It 'UpdateViaIdentityExpanded' {
$setting = Get-AzSentinelSetting -ResourceGroupName $env.resourceGroupName -WorkspaceName $env.workspaceName -SettingsName EyesOn
Update-AzSentinelSetting -InputObject $setting -Enabled $false
$settings = get-AzSentinelSetting -ResourceGroupName $env.resourceGroupName -WorkspaceName $env.workspaceName
- $sttings.Name | Should -Not -Contain "EyesOn"
+ $settings.Name | Should -Not -Contain "EyesOn"
}
}
diff --git a/src/SecurityInsights/SecurityInsights.Autorest/test/utils.ps1 b/src/SecurityInsights/SecurityInsights.Autorest/test/utils.ps1
index 548e85da8a9e..fbdd7e5d65f4 100644
--- a/src/SecurityInsights/SecurityInsights.Autorest/test/utils.ps1
+++ b/src/SecurityInsights/SecurityInsights.Autorest/test/utils.ps1
@@ -240,7 +240,7 @@ function setupEnv() {
$bookmarkExpansionId = (New-Guid).Guid
$null = $env.Add('bookmarkExpansionId', $bookmarkExpansionId)
- #Create Bookmark Realtion
+ #Create Bookmark Relation
Write-Host "Start to create test bookmark Relation"
$null = $env.Add('NewBookmarkRelationName', ("NewbookmarkRelation"+ (RandomString -allChars $false -len 6)))
$null = $env.Add('NewBookmarkRelationId', ((New-Guid).Guid))
@@ -370,7 +370,7 @@ function setupEnv() {
#cant pre-create to test.
#OnboardingState
- #create additonal workspaces in first template
+ #create additional workspaces in first template
#Setting
#Nothing to create
@@ -379,7 +379,7 @@ function setupEnv() {
#SourceControlRepository
#nothing to create
- #ThreatIntelligeneceIndicator
+ #ThreatIntelligenceIndicator
Write-Host "Start to create test threat intelligence indicator"
Create-ThreatIntelligenceIndicator -PSVerb Get -WorkspaceName $env.workspaceName -IP "8.8.8.1"
Create-ThreatIntelligenceIndicator -PSVerb Remove -WorkspaceName $env.workspaceName -IP "8.8.8.2"
@@ -387,7 +387,7 @@ function setupEnv() {
Create-ThreatIntelligenceIndicator -PSVerb Update -WorkspaceName $env.workspaceName -IP "8.8.8.4"
Create-ThreatIntelligenceIndicator -PSVerb UpdateViaId -WorkspaceName $env.workspaceName -IP "8.8.8.5"
- #ThreatIntelligeneceIndicatorMetric
+ #ThreatIntelligenceIndicatorMetric
#nothing to create
# For any resources you created for test, you should add it to $env here.
diff --git a/src/SelfHelp/SelfHelp.Autorest/docs/Invoke-AzSelfHelpCheckNameAvailability.md b/src/SelfHelp/SelfHelp.Autorest/docs/Invoke-AzSelfHelpCheckNameAvailability.md
index 1d58fa256b69..b1eb5667aaa7 100644
--- a/src/SelfHelp/SelfHelp.Autorest/docs/Invoke-AzSelfHelpCheckNameAvailability.md
+++ b/src/SelfHelp/SelfHelp.Autorest/docs/Invoke-AzSelfHelpCheckNameAvailability.md
@@ -60,7 +60,7 @@ Message NameAvailable Reason
True
```
-Checks if resource name is avilabale/unique for the scope or not
+Checks if resource name is available/unique for the scope or not
## PARAMETERS
diff --git a/src/SelfHelp/SelfHelp.Autorest/examples/Invoke-AzSelfHelpCheckNameAvailability.md b/src/SelfHelp/SelfHelp.Autorest/examples/Invoke-AzSelfHelpCheckNameAvailability.md
index d552caf9eef0..d9b475144af3 100644
--- a/src/SelfHelp/SelfHelp.Autorest/examples/Invoke-AzSelfHelpCheckNameAvailability.md
+++ b/src/SelfHelp/SelfHelp.Autorest/examples/Invoke-AzSelfHelpCheckNameAvailability.md
@@ -16,6 +16,6 @@ Message NameAvailable Reason
True
```
-Checks if resource name is avilabale/unique for the scope or not
+Checks if resource name is available/unique for the scope or not
diff --git a/src/ServiceBus/ServiceBus/ChangeLog.md b/src/ServiceBus/ServiceBus/ChangeLog.md
index 5f78449272f4..ab6ab57fc252 100644
--- a/src/ServiceBus/ServiceBus/ChangeLog.md
+++ b/src/ServiceBus/ServiceBus/ChangeLog.md
@@ -101,7 +101,7 @@ for a better powershell experience and as a result would witness breaking change
* Added new command 'Test-AzServiceBusNameAvailability' to check the name availability for queue and topic
## Version 1.3.0
-* Added new cmmdlet added for generating SAS token : New-AzServiceBusAuthorizationRuleSASToken
+* Added new cmdlet added for generating SAS token : New-AzServiceBusAuthorizationRuleSASToken
* Added verification and error message for authorizationrules rights if only 'Manage' is assigned
## Version 1.2.1
diff --git a/src/ServiceBus/ServiceBus/Cmdlets/AuthorizationRule/NewAzureServiceBusAuthorizationRuleSASToken.cs b/src/ServiceBus/ServiceBus/Cmdlets/AuthorizationRule/NewAzureServiceBusAuthorizationRuleSASToken.cs
index 505250299d09..0766aa1db18f 100644
--- a/src/ServiceBus/ServiceBus/Cmdlets/AuthorizationRule/NewAzureServiceBusAuthorizationRuleSASToken.cs
+++ b/src/ServiceBus/ServiceBus/Cmdlets/AuthorizationRule/NewAzureServiceBusAuthorizationRuleSASToken.cs
@@ -30,7 +30,7 @@ namespace Microsoft.Azure.Commands.ServiceBus.Commands
[Cmdlet("New", ResourceManager.Common.AzureRMConstants.AzureRMPrefix + "ServiceBusAuthorizationRuleSASToken", DefaultParameterSetName = NamespaceAuthoRuleParameterSet, SupportsShouldProcess = true), OutputType(typeof(PSSharedAccessSignatureAttributes))]
public class NewAzureAuthorizationRuleSASToken : AzureServiceBusCmdletBase
{
- [Parameter(Mandatory = true, ValueFromPipelineByPropertyName = true, Position = 0, HelpMessage = "ARM ResourceId of the Authoraization Rule")]
+ [Parameter(Mandatory = true, ValueFromPipelineByPropertyName = true, Position = 0, HelpMessage = "ARM ResourceId of the Authorization Rule")]
[ResourceGroupCompleter]
[ValidateNotNullOrEmpty]
[Alias(AliasResourceId)]
diff --git a/src/ServiceBus/ServiceBus/Resources.Designer.cs b/src/ServiceBus/ServiceBus/Resources.Designer.cs
index 46f4109eb006..b4c1742b98d6 100644
--- a/src/ServiceBus/ServiceBus/Resources.Designer.cs
+++ b/src/ServiceBus/ServiceBus/Resources.Designer.cs
@@ -106,7 +106,7 @@ internal static string CreateQueueAuthorizationrule {
}
///
- /// Looks up a localized string similar to Create a new Rule:{0} for Subscription:{1} of Namsespae:{2}.
+ /// Looks up a localized string similar to Create a new Rule:{0} for Subscription:{1} of Namespace:{2}.
///
internal static string CreateRule {
get {
@@ -115,7 +115,7 @@ internal static string CreateRule {
}
///
- /// Looks up a localized string similar to Create a new Subscription:{0} for Topic:{1} of Namsespae:{2}.
+ /// Looks up a localized string similar to Create a new Subscription:{0} for Topic:{1} of Namespace:{2}.
///
internal static string CreateSubscription {
get {
@@ -169,7 +169,7 @@ internal static string DRFailOver {
}
///
- /// Looks up a localized string similar to Deleting Alias: {0} of Nnamespace{1}.
+ /// Looks up a localized string similar to Deleting Alias: {0} of Namespace{1}.
///
internal static string DRRemoveAlias {
get {
@@ -223,7 +223,7 @@ internal static string RemoveMigrationConfiguration {
}
///
- /// Looks up a localized string similar to Delete Namespace:{0} ofthe ResourceGroup:{1}.
+ /// Looks up a localized string similar to Delete Namespace:{0} of the ResourceGroup:{1}.
///
internal static string RemoveNamespace {
get {
@@ -232,7 +232,7 @@ internal static string RemoveNamespace {
}
///
- /// Looks up a localized string similar to Are you sure you want to delete AtuhorizationRule:{0} of Namespace: {1}.
+ /// Looks up a localized string similar to Are you sure you want to delete AuthorizationRule:{0} of Namespace: {1}.
///
internal static string RemoveNamespaceAuthorizationRule {
get {
@@ -250,7 +250,7 @@ internal static string RemoveQueue {
}
///
- /// Looks up a localized string similar to Removeing AtuhorizationRule:{0} from Queue::{1} of Namespace: {2}.
+ /// Looks up a localized string similar to Removing AuthorizationRule:{0} from Queue::{1} of Namespace: {2}.
///
internal static string RemoveQueueAuthorizationRule {
get {
@@ -286,7 +286,7 @@ internal static string RemoveTopic {
}
///
- /// Looks up a localized string similar to Removeing AtuhorizationRule:{0} from Topic: {1} of Namespace: {2}.
+ /// Looks up a localized string similar to Removing AuthorizationRule:{0} from Topic: {1} of Namespace: {2}.
///
internal static string RemoveTopicAuthorizationRule {
get {
@@ -295,7 +295,7 @@ internal static string RemoveTopicAuthorizationRule {
}
///
- /// Looks up a localized string similar to Removing AtuhorizationRule:{0} of Namespace: {1}.
+ /// Looks up a localized string similar to Removing AuthorizationRule:{0} of Namespace: {1}.
///
internal static string RemovingNamespaceAuthorizationRule {
get {
@@ -304,7 +304,7 @@ internal static string RemovingNamespaceAuthorizationRule {
}
///
- /// Looks up a localized string similar to Are you sure you want to remove AtuhorizationRule:{0} from Queue:{1} of Namespace: {2}.
+ /// Looks up a localized string similar to Are you sure you want to remove AuthorizationRule:{0} from Queue:{1} of Namespace: {2}.
///
internal static string RemovingQueueAuthorizationRule {
get {
@@ -313,7 +313,7 @@ internal static string RemovingQueueAuthorizationRule {
}
///
- /// Looks up a localized string similar to Are you sure you want to remove AtuhorizationRule:{0} from Topic: {1} of Namespace: {2}.
+ /// Looks up a localized string similar to Are you sure you want to remove AuthorizationRule:{0} from Topic: {1} of Namespace: {2}.
///
internal static string RemovingTopicAuthorizationRule {
get {
@@ -340,7 +340,7 @@ internal static string StartMigrationConfiguration {
}
///
- /// Looks up a localized string similar to Update Namespace:{0} of the ResorceGroup:{1}.
+ /// Looks up a localized string similar to Update Namespace:{0} of the ResourceGroup:{1}.
///
internal static string UpdateNamespace {
get {
diff --git a/src/ServiceBus/ServiceBus/Resources.resx b/src/ServiceBus/ServiceBus/Resources.resx
index 70a601b1cca3..7f229c745117 100644
--- a/src/ServiceBus/ServiceBus/Resources.resx
+++ b/src/ServiceBus/ServiceBus/Resources.resx
@@ -157,7 +157,7 @@
Invoking Geo DR failover and reconfigure the alias - {0} to point to the secondary namespace - {1}
- Deleting Alias: {0} of Nnamespace{1}
+ Deleting Alias: {0} of Namespace{1}
File {0} does not exist
@@ -187,10 +187,10 @@
Delete the Migration Configuration
- Delete Namespace:{0} ofthe ResourceGroup:{1}
+ Delete Namespace:{0} of the ResourceGroup:{1}
- Are you sure you want to delete AtuhorizationRule:{0} of Namespace: {1}
+ Are you sure you want to delete AuthorizationRule:{0} of Namespace: {1}
Remove PrivateEndpoint named: {0} for Namespace: {1} of ResourceGroup: {2}
@@ -199,7 +199,7 @@
Deleting Queue:{0} of Namespace:{1}
- Removing AtuhorizationRule:{0} from Queue::{1} of Namespace: {2}
+ Removing AuthorizationRule:{0} from Queue::{1} of Namespace: {2}
Deleting Rule:{0} for Subscription:{1} of Namespace:{2}
@@ -211,16 +211,16 @@
Deleting Topic:{0} of Namespace:{1}
- Removeing AuthorizationRule:{0} from Topic: {1} of Namespace: {2}
+ Removing AuthorizationRule:{0} from Topic: {1} of Namespace: {2}
Removing AuthorizationRule:{0} of Namespace: {1}
- Are you sure you want to remove AtuhorizationRule:{0} from Queue:{1} of Namespace: {2}
+ Are you sure you want to remove AuthorizationRule:{0} from Queue:{1} of Namespace: {2}
- Are you sure you want to remove AtuhorizationRule:{0} from Topic: {1} of Namespace: {2}
+ Are you sure you want to remove AuthorizationRule:{0} from Topic: {1} of Namespace: {2}
Get the Migration configuration
@@ -229,7 +229,7 @@
Start Standard to Premium Migration
- Update Namespace:{0} of the ResorceGroup:{1}
+ Update Namespace:{0} of the ResourceGroup:{1}
Updating AuthorizationRule named:{0} for Namespace: {1}
diff --git a/src/ServiceFabric/ServiceFabric.Test/Resources/templateCNCert.json b/src/ServiceFabric/ServiceFabric.Test/Resources/templateCNCert.json
index f2c24ac8f503..d16240e6377d 100644
--- a/src/ServiceFabric/ServiceFabric.Test/Resources/templateCNCert.json
+++ b/src/ServiceFabric/ServiceFabric.Test/Resources/templateCNCert.json
@@ -100,7 +100,7 @@
"certificateIssuerThumbprint": {
"type": "string",
"metadata": {
- "description": "Certificate Issuer thumprints separated by comma"
+ "description": "Certificate Issuer thumbprints separated by comma"
}
},
"sourceVaultValue": {
diff --git a/src/ServiceFabric/ServiceFabric.Test/ScenarioTests/Common.ps1 b/src/ServiceFabric/ServiceFabric.Test/ScenarioTests/Common.ps1
index 00109cb738a8..ec8f98ad53c9 100644
--- a/src/ServiceFabric/ServiceFabric.Test/ScenarioTests/Common.ps1
+++ b/src/ServiceFabric/ServiceFabric.Test/ScenarioTests/Common.ps1
@@ -23,7 +23,7 @@
# $policy = New-AzKeyVaultCertificatePolicy -SecretContentType application/x-pkcs12 -SubjectName "CN=AzureRMSFTestCert2" -IssuerName Self
# Add-AzKeyVaultCertificate -VaultName azurermsfkv -Name AzureRMSFTestCert2 -CertificatePolicy $policy
# Get-AzKeyVaultCertificate -VaultName azurermsfkv -Name AzureRMSFTestCert2 | select Thumbprint, SecretId
-# # Add the above values to Get-SecretUrl and Get-Thumbrprint
+# # Add the above values to Get-SecretUrl and Get-Thumbprint
#
# # add certificate for application test to key vault (AzureRMSFTestCertApp)
# $policyCertApp = New-AzKeyVaultCertificatePolicy -SecretContentType application/x-pkcs12 -SubjectName "CN=AzureRMSFTestCertApp" -IssuerName Self
diff --git a/src/ServiceFabric/ServiceFabric/ChangeLog.md b/src/ServiceFabric/ServiceFabric/ChangeLog.md
index b37273b5bf9e..765e7cdd5bde 100644
--- a/src/ServiceFabric/ServiceFabric/ChangeLog.md
+++ b/src/ServiceFabric/ServiceFabric/ChangeLog.md
@@ -147,7 +147,7 @@
## Version 1.2.0
* Fixed typo in example for `Update-AzServiceFabricReliability` reference documentation
-* Adding new cmdlets to manage appliaction and services:
+* Adding new cmdlets to manage application and services:
- New-AzServiceFabricApplication
- New-AzServiceFabricApplicationType
- New-AzServiceFabricApplicationTypeVersion
@@ -186,6 +186,6 @@
## Version 1.0.0
* General availability of `Az.ServiceFabric` module
* Upgraded Service Fabric SDK dependency to version 1.1.0.
- - This change allows the cmdlets to suport certifiates by common names.
-* Added optinal parameters -CertCommonName and -CertIssuerThumbprint to `New-AzureRmServiceFabricCluster` to support creating cluster with certificate by common name.
+ - This change allows the cmdlets to support certificates by common names.
+* Added optional parameters -CertCommonName and -CertIssuerThumbprint to `New-AzureRmServiceFabricCluster` to support creating cluster with certificate by common name.
* Added optional parameters -CertCommonName and -CertIssuerThumbprint to `Add-AzureRmServiceFabricClusterCertificate` to support adding certificate by common name.
diff --git a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/NewAzServiceFabricManagedClusterApplicationTypeVersion.cs b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/NewAzServiceFabricManagedClusterApplicationTypeVersion.cs
index 9a87b776bcc4..615f5ded04d1 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/NewAzServiceFabricManagedClusterApplicationTypeVersion.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/NewAzServiceFabricManagedClusterApplicationTypeVersion.cs
@@ -26,7 +26,7 @@ namespace Microsoft.Azure.Commands.ServiceFabric.Commands
[Cmdlet(VerbsCommon.New, ResourceManager.Common.AzureRMConstants.AzurePrefix + Constants.ServiceFabricPrefix + "ManagedClusterApplicationTypeVersion", SupportsShouldProcess = true), OutputType(typeof(PSManagedApplicationTypeVersion))]
public class NewAzServiceFabricManagedClustersApplicationTypeVersion : ManagedApplicationCmdletBase
{
- #region Paramters
+ #region Parameters
[Parameter(Mandatory = true, Position = 0, ValueFromPipelineByPropertyName = true,
HelpMessage = "Specify the name of the resource group.")]
[ResourceGroupCompleter]
diff --git a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/SetAzServiceFabricManagedClusterApplicationTypeVersion.cs b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/SetAzServiceFabricManagedClusterApplicationTypeVersion.cs
index 37f2cc3807b2..5c1f5b531254 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/SetAzServiceFabricManagedClusterApplicationTypeVersion.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ApplicationTypeVersions/SetAzServiceFabricManagedClusterApplicationTypeVersion.cs
@@ -32,7 +32,7 @@ public class SetAzServiceFabricManagedClustersApplicationTypeVersion : ManagedAp
private const string ByInputObject = "ByInputObject";
private const string ByResourceId = "ByResourceId";
- #region Paramters
+ #region Parameters
[Parameter(Mandatory = true, Position = 0, ParameterSetName = ByResourceGroup, ValueFromPipelineByPropertyName = true,
HelpMessage = "Specify the name of the resource group.")]
[ResourceGroupCompleter]
diff --git a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/Applications/SetAzServiceFabricManagedClusterApplication.cs b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/Applications/SetAzServiceFabricManagedClusterApplication.cs
index 055cd6ed5608..764b6cb210d4 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/Applications/SetAzServiceFabricManagedClusterApplication.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/Applications/SetAzServiceFabricManagedClusterApplication.cs
@@ -194,29 +194,29 @@ public class SetAzServiceFabricManagedClusterApplication : ManagedApplicationCmd
public SwitchParameter ConsiderWarningAsError { get; set; }
[Parameter(Mandatory = false, ParameterSetName = ByResourceGroup,
- HelpMessage = "Specifies the maximum percent of unhelthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByResourceId,
- HelpMessage = "Specifies the maximum percent of unhelthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByInputObject,
- HelpMessage = "Specifies the maximum percent of unhelthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[ValidateRange(0, 100)]
public int DefaultServiceTypeMaxPercentUnhealthyPartitionsPerService { get; set; }
[Parameter(Mandatory = false, ParameterSetName = ByResourceGroup,
- HelpMessage = "Specifies the maximum percent of unhelthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByResourceId,
- HelpMessage = "Specifies the maximum percent of unhelthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByInputObject,
- HelpMessage = "Specifies the maximum percent of unhelthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[ValidateRange(0, 100)]
public int DefaultServiceTypeMaxPercentUnhealthyReplicasPerPartition { get; set; }
[Parameter(Mandatory = false, ParameterSetName = ByResourceGroup,
- HelpMessage = "Specifies the maximum percent of unhelthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByResourceId,
- HelpMessage = "Specifies the maximum percent of unhelthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByInputObject,
- HelpMessage = "Specifies the maximum percent of unhelthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
[ValidateRange(0, 100)]
public int DefaultServiceTypeUnhealthyServicesMaxPercent { get; set; }
diff --git a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ManagedClusters/RemoveAzServiceFabricManagedClusterClientCertificate.cs b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ManagedClusters/RemoveAzServiceFabricManagedClusterClientCertificate.cs
index 051ced75c893..b6d9f04c5aec 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ManagedClusters/RemoveAzServiceFabricManagedClusterClientCertificate.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/ManagedClusters/RemoveAzServiceFabricManagedClusterClientCertificate.cs
@@ -120,7 +120,7 @@ private ManagedCluster GetClusterWithRemovedClientCert()
if (currentCluster.Clients == null || currentCluster.Clients.Count() == 0)
{
- throw new InvalidOperationException("The cluster has no client certifices registered.");
+ throw new InvalidOperationException("The cluster has no client certificates registered.");
}
int initialSize = currentCluster.Clients.Count();
diff --git a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeType.cs b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeType.cs
index 8fe54125cf58..b524dec0f2b1 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeType.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeType.cs
@@ -82,11 +82,11 @@ public class RemoveAzServiceFabricManagedNodeType : ServiceFabricManagedCmdletBa
public string[] NodeName { get; set; }
[Parameter(Mandatory = false, ParameterSetName = DeleteNodeByName,
- HelpMessage = "Using this flag will force the removal even if service fabric is unable to disable the nodes. Use with caution as this might cause data loss if stateful workloads are running on the nodes, or might bring the cluster down if there are not enough seed nodes after the opearion.")]
+ HelpMessage = "Using this flag will force the removal even if service fabric is unable to disable the nodes. Use with caution as this might cause data loss if stateful workloads are running on the nodes, or might bring the cluster down if there are not enough seed nodes after the operation.")]
[Parameter(Mandatory = false, ParameterSetName = DeleteNodeByObj,
- HelpMessage = "Using this flag will force the removal even if service fabric is unable to disable the nodes. Use with caution as this might cause data loss if stateful workloads are running on the nodes, or might bring the cluster down if there are not enough seed nodes after the opearion.")]
+ HelpMessage = "Using this flag will force the removal even if service fabric is unable to disable the nodes. Use with caution as this might cause data loss if stateful workloads are running on the nodes, or might bring the cluster down if there are not enough seed nodes after the operation.")]
[Parameter(Mandatory = false, ParameterSetName = DeleteNodeById,
- HelpMessage = "Using this flag will force the removal even if service fabric is unable to disable the nodes. Use with caution as this might cause data loss if stateful workloads are running on the nodes, or might bring the cluster down if there are not enough seed nodes after the opearion.")]
+ HelpMessage = "Using this flag will force the removal even if service fabric is unable to disable the nodes. Use with caution as this might cause data loss if stateful workloads are running on the nodes, or might bring the cluster down if there are not enough seed nodes after the operation.")]
public SwitchParameter ForceRemoveNode { get; set; }
[Parameter(Mandatory = false,
diff --git a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeTypeVMExtension.cs b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeTypeVMExtension.cs
index df5b728437e9..5ea243ef1685 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeTypeVMExtension.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/ManagedClusters/NodeTypes/RemoveAzServiceFabricManagedNodeTypeVMExtension.cs
@@ -72,7 +72,7 @@ public class RemoveAzServiceFabricManagedNodeTypeVMExtension : ServiceFabricMana
public override void ExecuteCmdlet()
{
this.SetParams();
- if (ShouldProcess(target: this.Name, action: string.Format("Remove Extenions {0} from node type {1}", this.Name, this.NodeTypeName)))
+ if (ShouldProcess(target: this.Name, action: string.Format("Remove Extensions {0} from node type {1}", this.Name, this.NodeTypeName)))
{
try
{
diff --git a/src/ServiceFabric/ServiceFabric/Commands/NewAzServiceFabricService.cs b/src/ServiceFabric/ServiceFabric/Commands/NewAzServiceFabricService.cs
index bd17dea0679d..b7d2672f13f3 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/NewAzServiceFabricService.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/NewAzServiceFabricService.cs
@@ -504,7 +504,7 @@ private ServiceResource WaitForDeployment(Deployment deployment, string deployme
if (deploymentTask.IsFaulted)
{
PrintSdkExceptionDetail(deploymentTask.Exception);
- WriteVerbose("Create Service 0peration failed.");
+ WriteVerbose("Create Service Operation failed.");
throw deploymentTask.Exception;
}
diff --git a/src/ServiceFabric/ServiceFabric/Commands/ServiceFabricClusterCertificateCmdlet.cs b/src/ServiceFabric/ServiceFabric/Commands/ServiceFabricClusterCertificateCmdlet.cs
index 7bff09b7bd9e..f1a7231ae6f0 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/ServiceFabricClusterCertificateCmdlet.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/ServiceFabricClusterCertificateCmdlet.cs
@@ -496,7 +496,7 @@ protected static string CreateDefaultKeyVaultName(string resourceGroupName)
}
// resource group name can't be used for key vault name
- // use random string instread
+ // use random string instead
if (sb.Length == 0)
{
targetCopy = Path.GetFileNameWithoutExtension(Path.GetRandomFileName());
@@ -592,7 +592,7 @@ private CertificateInformation GetCertificateInforamtionFromSecret(string secret
- WriteVerboseWithTimestamp("Certificate fround for identifier {0} with thumbprint {1} and common name {2}.", secretIdentifier, thumbprint, commonName);
+ WriteVerboseWithTimestamp("Certificate found for identifier {0} with thumbprint {1} and common name {2}.", secretIdentifier, thumbprint, commonName);
return new CertificateInformation()
{
diff --git a/src/ServiceFabric/ServiceFabric/Commands/UpdateAzServiceFabricApplication.cs b/src/ServiceFabric/ServiceFabric/Commands/UpdateAzServiceFabricApplication.cs
index 00ad06cf3c22..522e273bd616 100644
--- a/src/ServiceFabric/ServiceFabric/Commands/UpdateAzServiceFabricApplication.cs
+++ b/src/ServiceFabric/ServiceFabric/Commands/UpdateAzServiceFabricApplication.cs
@@ -147,23 +147,23 @@ public class UpdateAzServiceFabricApplication : ProxyResourceCmdletBase
public SwitchParameter ConsiderWarningAsError { get; set; }
[Parameter(Mandatory = false, ParameterSetName = ByResourceGroup,
- HelpMessage = "Specifies the maximum percent of unhelthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByResourceId,
- HelpMessage = "Specifies the maximum percent of unhelthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy partitions per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[ValidateRange(0, 100)]
public int DefaultServiceTypeMaxPercentUnhealthyPartitionsPerService { get; set; }
[Parameter(Mandatory = false, ParameterSetName = ByResourceGroup,
- HelpMessage = "Specifies the maximum percent of unhelthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByResourceId,
- HelpMessage = "Specifies the maximum percent of unhelthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy replicas per service allowed by the health policy for the default service type to use for the monitored upgrade.")]
[ValidateRange(0, 100)]
public int DefaultServiceTypeMaxPercentUnhealthyReplicasPerPartition { get; set; }
[Parameter(Mandatory = false, ParameterSetName = ByResourceGroup,
- HelpMessage = "Specifies the maximum percent of unhelthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
[Parameter(Mandatory = false, ParameterSetName = ByResourceId,
- HelpMessage = "Specifies the maximum percent of unhelthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
+ HelpMessage = "Specifies the maximum percent of unhealthy services allowed by the health policy for the default service type to use for the monitored upgrade.")]
[ValidateRange(0, 100)]
public int DefaultServiceTypeUnhealthyServicesMaxPercent { get; set; }
@@ -221,7 +221,7 @@ public override void ExecuteCmdlet()
if (currentApp.TypeVersion.Equals(this.ApplicationTypeVersion))
{
- throw new PSInvalidOperationException(string.Format("The application '{0}' is alrady running with type version '{1}'.", currentApp.Name, currentApp.TypeVersion));
+ throw new PSInvalidOperationException(string.Format("The application '{0}' is already running with type version '{1}'.", currentApp.Name, currentApp.TypeVersion));
}
var appTypeVersion = SafeGetResource(() =>
@@ -235,7 +235,7 @@ public override void ExecuteCmdlet()
if (appTypeVersion == null)
{
throw new PSArgumentException(
- string.Format("Application type version {0}:{1} not found. Create the type version before runnig this command.",
+ string.Format("Application type version {0}:{1} not found. Create the type version before running this command.",
currentApp.TypeName,
this.ApplicationTypeVersion));
}
diff --git a/src/ServiceFabric/ServiceFabric/Models/ManagedClusters/PSManagedService.cs b/src/ServiceFabric/ServiceFabric/Models/ManagedClusters/PSManagedService.cs
index 5674aac0f7b7..04dd0016c5c3 100644
--- a/src/ServiceFabric/ServiceFabric/Models/ManagedClusters/PSManagedService.cs
+++ b/src/ServiceFabric/ServiceFabric/Models/ManagedClusters/PSManagedService.cs
@@ -69,7 +69,7 @@ public PSManagedService(ServiceResource service)
}
else
{
- throw new PSInvalidCastException(string.Format("Unable to cast service properties as stateles or stateful. Type {0}", service.Properties.GetType()));
+ throw new PSInvalidCastException(string.Format("Unable to cast service properties as stateless or stateful. Type {0}", service.Properties.GetType()));
}
}
diff --git a/src/ServiceFabric/ServiceFabric/Properties/Resources.Designer.cs b/src/ServiceFabric/ServiceFabric/Properties/Resources.Designer.cs
index 0b027ac99e6e..e23dfae803d7 100644
--- a/src/ServiceFabric/ServiceFabric/Properties/Resources.Designer.cs
+++ b/src/ServiceFabric/ServiceFabric/Properties/Resources.Designer.cs
@@ -232,7 +232,7 @@ internal static string CerObjectNotInBundle {
}
///
- /// Looks up a localized string similar to Certificate common name mistmatch the name provided is: '{0}' and the common name found in the certificate is: '{1}'. Please make sure you're using the correct certificate and common name..
+ /// Looks up a localized string similar to Certificate common name mismatch the name provided is: '{0}' and the common name found in the certificate is: '{1}'. Please make sure you're using the correct certificate and common name..
///
internal static string CertificateCommonNameMismatch {
get {
@@ -250,7 +250,7 @@ internal static string CertificateMixTPAndCN {
}
///
- /// Looks up a localized string similar to The thumprint provided '{0}' is different from the thumbprint '{1}' for certificate {2} version {3} in keyvault {4}..
+ /// Looks up a localized string similar to The thumbprint provided '{0}' is different from the thumbprint '{1}' for certificate {2} version {3} in keyvault {4}..
///
internal static string CertificateThumbprintMismatch {
get {
diff --git a/src/ServiceFabric/ServiceFabric/Properties/Resources.resx b/src/ServiceFabric/ServiceFabric/Properties/Resources.resx
index b816e49253ce..951c1d0b087a 100644
--- a/src/ServiceFabric/ServiceFabric/Properties/Resources.resx
+++ b/src/ServiceFabric/ServiceFabric/Properties/Resources.resx
@@ -172,7 +172,7 @@
Cannot update Sku while durability level is Bronze, please update durability level to Silver or above first.
- Certificate common name mistmatch the name provided is: '{0}' and the common name found in the certificate is: '{1}'. Please make sure you're using the correct certificate and common name.
+ Certificate common name mismatch the name provided is: '{0}' and the common name found in the certificate is: '{1}'. Please make sure you're using the correct certificate and common name.
Unable to mix certificates by common name and thumbprint. There is already a certificate, if this was set up by thumbprint you cannot add a new one by common name and vice versa.
@@ -334,7 +334,7 @@
Unable to retrieve the certificate object form keyvault {0}, with name {1} and version {2}. This might mean the certificate is not managed, please use -Thumbprint parameter to specify the thumbprint corresponding to the secret identifier.
- The thumprint provided '{0}' is different from the thumbprint '{1}' for certificate {2} version {3} in keyvault {4}.
+ The thumbprint provided '{0}' is different from the thumbprint '{1}' for certificate {2} version {3} in keyvault {4}.
No change has been found for NodeType {0}. Operation is canceled.