Skip to content

Commit 72e3acf

Browse files
authored
Spelling Fixes (#27960)
1 parent fb2c252 commit 72e3acf

File tree

54 files changed

+93
-93
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+93
-93
lines changed

src/Accounts/Accounts.Test/AzureRMProfileTests.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,11 +108,11 @@ private static RMProfileClient SetupTestEnvironment(List<string> tenants, List<s
108108
{
109109
MockSubscriptionClientFactory.SubGetQueueVerLatest.Enqueue(() =>
110110
{
111-
throw new CloudException("Subscription is not in the tenenat.");
111+
throw new CloudException("Subscription is not in the tenant.");
112112
});
113113
subscriptionGetQueue.Enqueue(() =>
114114
{
115-
throw new CloudException("Subscription is not in the tenenat.");
115+
throw new CloudException("Subscription is not in the tenant.");
116116
});
117117
}
118118
}

src/Accounts/Accounts.Test/ConnectAzAccountScenarioTests.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ function Test-MaxContextPopulationWithSpecifiedValue
3838
}
3939
Else
4040
{
41-
# subtract 1 only for test freamwork
41+
# subtract 1 only for test framework
4242
Assert-AreEqual $maxContextPopulation ((Get-AzContext -ListAvailable).count-1)
4343
}
4444

@@ -69,7 +69,7 @@ function Test-MaxContextPopulationWithDefaultValue
6969
}
7070
Else
7171
{
72-
# subtract 1 only for test freamwork
72+
# subtract 1 only for test framework
7373
Assert-AreEqual $defaultContextPopulation ((Get-AzContext -ListAvailable).count-1)
7474
}
7575
}

src/Accounts/Accounts.Test/DefaultCmdletTests.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ function Test-DefaultResourceGroup
3232
$storedValue = (Get-AzContext).ExtendedProperties["Default Resource Group"]
3333
Assert-Null($storedValue)
3434

35-
# Test Resoure Group created when it doesn't exist
35+
# Test Resource Group created when it doesn't exist
3636
$output = Set-AzDefault -ResourceGroupName $rgname -Force
3737
$resourcegroup = Get-AzResourceGroup -Name $rgname
3838
Assert-AreEqual $output.Name $resourcegroup.ResourceGroupName

src/Accounts/Accounts.Test/Mocks/MockDataStore.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@ public void RemoveCertificate(string thumbprint)
303303
/// Converts unix asterisk based file pattern to regex
304304
/// </summary>
305305
/// <param name="wildcard">Asterisk based pattern</param>
306-
/// <returns>Regeular expression of null is empty</returns>
306+
/// <returns>Regular expression of null is empty</returns>
307307
private static string WildcardToRegex(string wildcard)
308308
{
309309
if (wildcard == null || wildcard == "") return wildcard;

src/Accounts/Accounts.Test/Mocks/MockSubscriptionClientFactoryVersion2019.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ private ISubscriptionsOperations GetSubscriptionMock(List<Subscription> subscrip
195195
}
196196
if (subscriptionGetList == null || !subscriptionGetList.Any())
197197
{
198-
throw new CloudException("Subscripiton is not in the tenant.");
198+
throw new CloudException("Subscription is not in the tenant.");
199199
}
200200
var result = new AzureOperationResponse<Subscription>()
201201
{

src/Accounts/Accounts.Test/SubscriptionCmdletTests.ps1

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Tests each of the major parts of retrieving subscriptions in ARM mode
8686
#>
8787
function Test-SetAzureRmContextEndToEnd
8888
{
89-
# This test requires that the tenant contains atleast two subscriptions
89+
# This test requires that the tenant contains at least two subscriptions
9090
$allSubscriptions = Get-AzSubscription
9191
$secondSubscription = $allSubscriptions[1]
9292
Assert-True { $allSubscriptions[0] -ne $null }
@@ -123,7 +123,7 @@ function Test-SetAzureRmContextWithoutSubscription
123123

124124
<#
125125
.SYNOPSIS
126-
Check whether tags works with subscripiton
126+
Check whether tags works with subscription
127127
.DESCRIPTION
128128
SmokeTest
129129
#>
@@ -135,7 +135,7 @@ function Test-GetSubscriptionsWithTags
135135

136136
<#
137137
.SYNOPSIS
138-
Tests whether subscripitions before and after context rename and set are equal.
138+
Tests whether subscriptions before and after context rename and set are equal.
139139
.DESCRIPTION
140140
SmokeTest
141141
#>
@@ -156,7 +156,7 @@ function Test-GetSubscriptionsAfterContextRenameAndSet
156156

157157
<#
158158
.SYNOPSIS
159-
Tests whether subscripitions is successfully when default profile is set to the context without a ServicePrincipalSecret.
159+
Tests whether subscriptions is successfully when default profile is set to the context without a ServicePrincipalSecret.
160160
.DESCRIPTION
161161
SmokeTest
162162
#>

src/Accounts/Accounts/Account/ConnectAzureRmAccount.cs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ public class ConnectAzureRmAccountCommand : AzureContextModificationCmdlet, IMod
226226
public SwitchParameter SendCertificateChain { get; set; }
227227

228228

229-
[Parameter(ParameterSetName = ServicePrincipalCertificateFileParameterSet, Mandatory = true, HelpMessage = "The path of certficate file in pkcs#12 format.")]
229+
[Parameter(ParameterSetName = ServicePrincipalCertificateFileParameterSet, Mandatory = true, HelpMessage = "The path of certificate file in pkcs#12 format.")]
230230
public String CertificatePath { get; set; }
231231

232232
[Parameter(ParameterSetName = ServicePrincipalCertificateFileParameterSet, HelpMessage = "The password required to access the pkcs#12 certificate file.")]
@@ -296,7 +296,7 @@ protected override void BeginProcessing()
296296
// todo: ideally cancellation token should be passed to authentication factory as a parameter
297297
// however AuthenticationFactory.Authenticate does not support it
298298
// so I store it in AzureSession.Instance as a global variable
299-
// todo: CancellationTokenSource should be visiable only in cmdlet class
299+
// todo: CancellationTokenSource should be visible only in cmdlet class
300300
// CancellationTokenSource.Token should be passed to other classes
301301
AzureSession.Instance.RegisterComponent("LoginCancellationToken", () => new CancellationTokenSource(), true);
302302
}
@@ -901,7 +901,7 @@ private void AddConfigTelemetry()
901901
}
902902
catch (Exception ex)
903903
{
904-
WriteDebug(string.Format("Failed to add telemtry for config as {0}", ex.Message));
904+
WriteDebug(string.Format("Failed to add telemetry for config as {0}", ex.Message));
905905
}
906906
}
907907

src/Accounts/Accounts/AutoSave/DisableAzureRmContextAutosave.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ void DisableAutosave(IAzureSession session, bool writeAutoSaveFile, out ContextA
7777
if(originalTokenCacheProvider is SharedTokenCacheProvider)
7878
{
7979
var token = originalTokenCacheProvider.ReadTokenData();
80-
//must explicitely use type PowerShellTokenCacheProvider
80+
//must explicitly use type PowerShellTokenCacheProvider
8181
PowerShellTokenCacheProvider cacheProvider = new InMemoryTokenCacheProvider(token);
8282
AzureSession.Instance.RegisterComponent(PowerShellTokenCacheProvider.PowerShellTokenCacheProviderKey, () => cacheProvider, true);
8383
}

src/Accounts/Accounts/ChangeLog.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@
104104

105105
## Version 2.19.0
106106
> [!IMPORTANT]
107-
> Preannouncement: The default interactive login experience will change from browser based to `Web Account Manager` (WAM) based on supported platforms, [learn more](https://learn.microsoft.com/en-us/entra/msal/dotnet/acquiring-tokens/desktop-mobile/wam). Only interactive login flow is influeced by WAM. This will take effect from the release of **May 21st**.
107+
> Preannouncement: The default interactive login experience will change from browser based to `Web Account Manager` (WAM) based on supported platforms, [learn more](https://learn.microsoft.com/en-us/entra/msal/dotnet/acquiring-tokens/desktop-mobile/wam). Only interactive login flow is influenced by WAM. This will take effect from the release of **May 21st**.
108108
* Fixed secrets detection issues.
109109

110110
## Version 2.17.0
@@ -259,7 +259,7 @@
259259
* Removed legacy assembly System.Private.ServiceModel and System.ServiceModel.Primitives [#16063]
260260

261261
## Version 2.7.1
262-
* Copied `ServicePrincipalSecret` and `CertificatePassword` from Az.Accounts buildin profile to customer set profile. [#16617]
262+
* Copied `ServicePrincipalSecret` and `CertificatePassword` from Az.Accounts builtin profile to customer set profile. [#16617]
263263
* Updated help message and help markdown for parameter `Tenant` of the cmdlet `Set-AzContext`. [#16515]
264264
* Fixed the issue that Azure PowerShell could not work in a workflow. [#16408]
265265
* Fixed the doubled Api Version in the URI of the underlying request issued by `Invoke-AzRestMethod`. [#16615]
@@ -301,7 +301,7 @@
301301
* Updated Azure.Core to 1.16.0
302302

303303
## Version 2.5.1
304-
* Fixed access error when subscripiton has no `Tags` property [#15425].
304+
* Fixed access error when subscription has no `Tags` property [#15425].
305305

306306
## Version 2.5.0
307307
* Added Tags, AuthorizationSource to PSAzureSusbscripiton and added TenantType, DefaultDomain, TenantBrandingLogoUrl, CountryCode to PSAzureTenant [#15220]
@@ -368,7 +368,7 @@
368368
## Version 2.1.1
369369
* Fixed the issue that token is not renewed after expiring for LRO [#13367]
370370
* Fixed the issue that AccountId is not respected in MSI [#13376]
371-
* Fixed the issue that error message is unclear if browser is not avaialable for Interactive auth [#13340]
371+
* Fixed the issue that error message is unclear if browser is not available for Interactive auth [#13340]
372372

373373
## Version 2.1.0
374374
* [Breaking Change] Removed `Get-AzProfile` and `Select-AzProfile`

src/Accounts/Accounts/CommonModule/AzModule.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ internal async Task OnFinally(string id, CancellationToken cancellationToken, Ge
296296
{
297297
if(!response.IsSuccessStatusCode && qos.Exception == null)
298298
{
299-
// add "InternalException" as message because it is just for telemtry tracking.
299+
// add "InternalException" as message because it is just for telemetry tracking.
300300
AzPSCloudException ex = (response.StatusCode == HttpStatusCode.NotFound) ?
301301
new AzPSResourceNotFoundCloudException("InternalException") : new AzPSCloudException("InternalException");
302302
try

0 commit comments

Comments
 (0)