From 437f367f3396832d48e35d0b18d27d0580eea33b Mon Sep 17 00:00:00 2001 From: Arie Heinrich Date: Mon, 30 Jun 2025 21:20:16 +0200 Subject: [PATCH 1/2] fix spelling --- .../NewNetAppFilesActiveDirectory.cs | 2 +- .../UpdateNetAppFilesActiveDirectory.cs | 2 +- src/NetAppFiles/NetAppFiles/ChangeLog.md | 14 ++-- .../Models/PSNetAppFilesActiveDirectory.cs | 2 +- .../NewNetAppFilesSnapshotPolicy.cs | 4 +- .../SetNetAppFilesSnapshotPolicy.cs | 4 +- .../UpdateNetAppFilesSnapshotPolicy.cs | 4 +- .../NewAzureNetAppFilesExportPolicyObject.cs | 2 +- .../VolumeGroup/NewNetAppFilesVolumeGroup.cs | 68 +++++++++---------- .../ScenarioTests/ApplicationGatewayTests.ps1 | 4 +- .../AzureFirewallPolicyTests.ps1 | 6 +- .../ScenarioTests/MultiIpConfigOnNicTests.ps1 | 6 +- .../ScenarioTests/NetworkManagerTests.ps1 | 2 +- .../NetworkSecurityGroupTests.ps1 | 28 ++++---- .../ScenarioTests/PrivateEndpointTests.ps1 | 12 ++-- .../ScenarioTests/PrivateLinkServiceTests.ps1 | 4 +- .../ScenarioTests/PublicIpAddressTests.ps1 | 20 +++--- .../ScenarioTests/RouteServerTests.ps1 | 2 +- .../ScenarioTests/VirtualNetworkTests.cs | 6 +- .../ScenarioTests/VirtualRouterTests.ps1 | 2 +- ...e-AzNetworkSecurityPerimeterAccessRule.ps1 | 6 +- ...-AzNetworkSecurityPerimeterAssociation.ps1 | 4 +- .../Update-AzNetworkSecurityPerimeterLink.ps1 | 6 +- ...kSecurityPerimeterLoggingConfiguration.ps1 | 6 +- ...rkSecurityPerimeterLoggingConfiguration.md | 4 +- ...rkSecurityPerimeterLoggingConfiguration.md | 4 +- .../test/utils.ps1 | 14 ++-- 27 files changed, 119 insertions(+), 119 deletions(-) diff --git a/src/NetAppFiles/NetAppFiles/ActiveDirectory/NewNetAppFilesActiveDirectory.cs b/src/NetAppFiles/NetAppFiles/ActiveDirectory/NewNetAppFilesActiveDirectory.cs index 625f347bf925..1d3734acaf77 100644 --- a/src/NetAppFiles/NetAppFiles/ActiveDirectory/NewNetAppFilesActiveDirectory.cs +++ b/src/NetAppFiles/NetAppFiles/ActiveDirectory/NewNetAppFilesActiveDirectory.cs @@ -202,7 +202,7 @@ public override void ExecuteCmdlet() var anfAccount = AzureNetAppFilesManagementClient.Accounts.Get(ResourceGroupName, AccountName); if (anfAccount == null) { - throw new ArgumentException($"Specified NetAppAccount with name '{this.AccountName}' does not extist in Resource Group '{this.ResourceGroupName}'"); + throw new ArgumentException($"Specified NetAppAccount with name '{this.AccountName}' does not exist in Resource Group '{this.ResourceGroupName}'"); } var activeDirectory = new Management.NetApp.Models.ActiveDirectory diff --git a/src/NetAppFiles/NetAppFiles/ActiveDirectory/UpdateNetAppFilesActiveDirectory.cs b/src/NetAppFiles/NetAppFiles/ActiveDirectory/UpdateNetAppFilesActiveDirectory.cs index 46fc25505d22..bc37ca8c47a5 100644 --- a/src/NetAppFiles/NetAppFiles/ActiveDirectory/UpdateNetAppFilesActiveDirectory.cs +++ b/src/NetAppFiles/NetAppFiles/ActiveDirectory/UpdateNetAppFilesActiveDirectory.cs @@ -229,7 +229,7 @@ public override void ExecuteCmdlet() var anfAccount = AzureNetAppFilesManagementClient.Accounts.Get(ResourceGroupName, AccountName); if (anfAccount == null) { - throw new ArgumentException($"Specified NetAppAccount with name '{this.AccountName}' does not extist in Resource Group '{this.ResourceGroupName}'"); + throw new ArgumentException($"Specified NetAppAccount with name '{this.AccountName}' does not exist in Resource Group '{this.ResourceGroupName}'"); } string dnsStr = null; if (Dns != null) diff --git a/src/NetAppFiles/NetAppFiles/ChangeLog.md b/src/NetAppFiles/NetAppFiles/ChangeLog.md index c59e9dfb5da8..41ee6bbaf545 100644 --- a/src/NetAppFiles/NetAppFiles/ChangeLog.md +++ b/src/NetAppFiles/NetAppFiles/ChangeLog.md @@ -52,7 +52,7 @@ ## Version 0.18.0 * Fixed some minor issues * Added `SnapshotName` to `New-AzNetAppFilesBackup` -* Fixed `New-AzNetAppFilesBackup`, `Label` is not a requred parameter +* Fixed `New-AzNetAppFilesBackup`, `Label` is not a required parameter ## Version 0.17.0 * Updated to api-version 2024-03-01 @@ -121,9 +121,9 @@ Breaking change: * Added cmdLet `Update-NetAppFilesAccountCredential` * Added properties `Identity`, `Encryption` and `DisableShowmount` to `PSNetAppFilesAccount` * Added properties `Encrypted` and `Zones`, `DeleteBaseSnapshot`, `KeyVaultPrivateEndpointResourceId`,`SmbAccessBasedEnumeration`, `SmbNonBrowsable`, `EncryptionKeySource`, `VolumeSpecName` to `PSNetAppFilesVolume` -* Added paramter `CoolAccess` to `Update-AzNetAppFilesPool` -* Added paramter `DeleteBaseSnapshot`, `SmbAccessBasedEnumeration`, `SmbNonBrowsable`, `EncryptionKeySource` and `KeyVaultPrivateEndpointResourceId` to `New-AzNetAppFilesVolume` -* Added paramter `CoolAccess`, `CoolnessPeriod`, `EncryptionKeySource` and `KeyVaultPrivateEndpointResourceId` to `Update-AzNetAppFilesVolume` +* Added parameter `CoolAccess` to `Update-AzNetAppFilesPool` +* Added parameter `DeleteBaseSnapshot`, `SmbAccessBasedEnumeration`, `SmbNonBrowsable`, `EncryptionKeySource` and `KeyVaultPrivateEndpointResourceId` to `New-AzNetAppFilesVolume` +* Added parameter `CoolAccess`, `CoolnessPeriod`, `EncryptionKeySource` and `KeyVaultPrivateEndpointResourceId` to `Update-AzNetAppFilesVolume` * Planning to deprecate the cmdLet `Get-AzNetAppFilesVault` as it will not be needed ## Version 0.10.0 @@ -144,7 +144,7 @@ Breaking change: * Added `CapacityPoolResourceId`, `ProximityPlacementGroup`, `VolumeSpecName` and `PlacementRules` to `Volume` Breaking change: -* The `Administrators` parameter in `New-AzNetAppFilesActiveDirectory` and `Update-AzNetAppFilesActiveDirectory` is changed to singularform `Administrator` to follow Powrshell convetion +* The `Administrators` parameter in `New-AzNetAppFilesActiveDirectory` and `Update-AzNetAppFilesActiveDirectory` is changed to singularform `Administrator` to follow Powershell convention ## Version 0.8.0 * Added list NetAppAccounts by subscription @@ -221,14 +221,14 @@ Breaking change: - BackupId - SecurityStyle - KerberosEnabled -* Add paramters to `Update-AzNetAppFilesVolume` +* Add parameters to `Update-AzNetAppFilesVolume` - Backup to to enable Backups and Backup Policy - totalThroughputMips * Add property StatusDetails to Account * Add properties to support LDAP over SSL/TLS to ActiveDirectory * Add properties to support Kerberos to ExportPolicy rule * Add QosType parameter to Pool `New-AzNetAppFilesPool` and `Update-AzNetAppFilesPool` -* Breaking Removed ServiecLevel from `Update-AzNetAppFilesPool` as that updating servie level is not supported +* Breaking Removed ServiecLevel from `Update-AzNetAppFilesPool` as that updating service level is not supported * Add `Initialize-AzNetAppFilesReplication` cmdLet * Add ForceBreak parameter to `Suspend-AzNetAppFilesReplication` to force break the replication if replication is in status transferring diff --git a/src/NetAppFiles/NetAppFiles/Models/PSNetAppFilesActiveDirectory.cs b/src/NetAppFiles/NetAppFiles/Models/PSNetAppFilesActiveDirectory.cs index 71e9ed92368d..9d8fc011f4bf 100644 --- a/src/NetAppFiles/NetAppFiles/Models/PSNetAppFilesActiveDirectory.cs +++ b/src/NetAppFiles/NetAppFiles/Models/PSNetAppFilesActiveDirectory.cs @@ -33,7 +33,7 @@ public class PSNetAppFilesActiveDirectory public string AccountName { get; set; } /// - /// Id of the active drectory. + /// Id of the active directory. /// Value of this property can not be set by user. /// /// Id of the Active Directory. diff --git a/src/NetAppFiles/NetAppFiles/SnapshotPolicy/NewNetAppFilesSnapshotPolicy.cs b/src/NetAppFiles/NetAppFiles/SnapshotPolicy/NewNetAppFilesSnapshotPolicy.cs index 96a8526d6177..2397e1032946 100644 --- a/src/NetAppFiles/NetAppFiles/SnapshotPolicy/NewNetAppFilesSnapshotPolicy.cs +++ b/src/NetAppFiles/NetAppFiles/SnapshotPolicy/NewNetAppFilesSnapshotPolicy.cs @@ -92,13 +92,13 @@ public class NewAzureRmNetAppFilesSnapshotPolicy : AzureNetAppFilesCmdletBase [Parameter( Mandatory = true, - HelpMessage = "A hashtable array which represents the montly Schedule")] + HelpMessage = "A hashtable array which represents the monthly Schedule")] [ValidateNotNullOrEmpty] public PSNetAppFilesWeeklySchedule WeeklySchedule { get; set; } [Parameter( Mandatory = true, - HelpMessage = "A hashtable array which represents the montly Schedule")] + HelpMessage = "A hashtable array which represents the monthly Schedule")] [ValidateNotNullOrEmpty] public PSNetAppFilesMonthlySchedule MonthlySchedule { get; set; } diff --git a/src/NetAppFiles/NetAppFiles/SnapshotPolicy/SetNetAppFilesSnapshotPolicy.cs b/src/NetAppFiles/NetAppFiles/SnapshotPolicy/SetNetAppFilesSnapshotPolicy.cs index f57d9ac954bf..e476005dfb1d 100644 --- a/src/NetAppFiles/NetAppFiles/SnapshotPolicy/SetNetAppFilesSnapshotPolicy.cs +++ b/src/NetAppFiles/NetAppFiles/SnapshotPolicy/SetNetAppFilesSnapshotPolicy.cs @@ -93,13 +93,13 @@ public class SetAzureRmNetAppFilesSnapshotPolicy : AzureNetAppFilesCmdletBase [Parameter( Mandatory = true, - HelpMessage = "A hashtable array which represents the montly Schedule")] + HelpMessage = "A hashtable array which represents the monthly Schedule")] [ValidateNotNullOrEmpty] public PSNetAppFilesWeeklySchedule WeeklySchedule { get; set; } [Parameter( Mandatory = true, - HelpMessage = "A hashtable array which represents the montly Schedule")] + HelpMessage = "A hashtable array which represents the monthly Schedule")] [ValidateNotNullOrEmpty] public PSNetAppFilesMonthlySchedule MonthlySchedule { get; set; } diff --git a/src/NetAppFiles/NetAppFiles/SnapshotPolicy/UpdateNetAppFilesSnapshotPolicy.cs b/src/NetAppFiles/NetAppFiles/SnapshotPolicy/UpdateNetAppFilesSnapshotPolicy.cs index d29e5318d281..2988eeaf5ec5 100644 --- a/src/NetAppFiles/NetAppFiles/SnapshotPolicy/UpdateNetAppFilesSnapshotPolicy.cs +++ b/src/NetAppFiles/NetAppFiles/SnapshotPolicy/UpdateNetAppFilesSnapshotPolicy.cs @@ -96,13 +96,13 @@ public class UpdateAzureRmNetAppFilesSnapshotPolicy : AzureNetAppFilesCmdletBase [Parameter( Mandatory = false, - HelpMessage = "A hashtable array which represents the montly Schedule")] + HelpMessage = "A hashtable array which represents the monthly Schedule")] [ValidateNotNullOrEmpty] public PSNetAppFilesWeeklySchedule WeeklySchedule { get; set; } [Parameter( Mandatory = false, - HelpMessage = "A hashtable array which represents the montly Schedule")] + HelpMessage = "A hashtable array which represents the monthly Schedule")] [ValidateNotNullOrEmpty] public PSNetAppFilesMonthlySchedule MonthlySchedule { get; set; } diff --git a/src/NetAppFiles/NetAppFiles/Volume/NewAzureNetAppFilesExportPolicyObject.cs b/src/NetAppFiles/NetAppFiles/Volume/NewAzureNetAppFilesExportPolicyObject.cs index 0311dbf6be26..b90e6c26230c 100644 --- a/src/NetAppFiles/NetAppFiles/Volume/NewAzureNetAppFilesExportPolicyObject.cs +++ b/src/NetAppFiles/NetAppFiles/Volume/NewAzureNetAppFilesExportPolicyObject.cs @@ -24,7 +24,7 @@ public class NewAzureNetAppFilesExportPolicyObject : AzureNetAppFilesCmdletBase { [Parameter( Mandatory = true, - HelpMessage = "List of items which need to be included into endpont scope.", + HelpMessage = "List of items which need to be included into endpoint scope.", ParameterSetName = "ExportPolicyObject")] [ValidateNotNullOrEmpty] public PSNetAppFilesExportPolicyRule[] Rule { get; set; } diff --git a/src/NetAppFiles/NetAppFiles/VolumeGroup/NewNetAppFilesVolumeGroup.cs b/src/NetAppFiles/NetAppFiles/VolumeGroup/NewNetAppFilesVolumeGroup.cs index d1f97a9d29c9..a28f5a16ce72 100644 --- a/src/NetAppFiles/NetAppFiles/VolumeGroup/NewNetAppFilesVolumeGroup.cs +++ b/src/NetAppFiles/NetAppFiles/VolumeGroup/NewNetAppFilesVolumeGroup.cs @@ -51,11 +51,11 @@ public class NewAzureRmNetAppFilesVolumeGroup : AzureNetAppFilesCmdletBase public const string DefaultOracleSystemId = "ORA1"; public const int DefaultCapacityOverhead = 50; public const int DefaultDataVolumes = 2; - private const string DefaultCapacityOverheadHelp = "50"; //do to limitation of current compliler this must be text + private const string DefaultCapacityOverheadHelp = "50"; //do to limitation of current compiler this must be text public const int DefaultStartingHostId = 1; - private const string DefaultStartingHostIdHelp = "1"; //do to limitation of current compliler this must be text + private const string DefaultStartingHostIdHelp = "1"; //do to limitation of current compiler this must be text public const int DefaultHostCount = 1; - private const string DefaultHostCountHelp = "1"; //do to limitation of current compliler this must be text + private const string DefaultHostCountHelp = "1"; //do to limitation of current compiler this must be text private const string DefaultSubnetName = "Default"; private readonly string[] DefaultProtocoTypes = new string[] { VolumeProtocolTypes.NSFv41 }; @@ -210,7 +210,7 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize will be autocalculated or specify an integer value representing size.")] + HelpMessage = "Specify capacity (in GiB). If omitted DataSize will be autocalculated or specify an integer value representing size.")] public long? DataSize { get; set; } [Parameter( @@ -230,17 +230,17 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance will be autocalculated or specify and integer value representing throughput.")] + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance will be autocalculated or specify and integer value representing throughput.")] public int? DataPerformance { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited LogSize will be autocalculated or specify an integer value representing size.")] + HelpMessage = "Specify capacity (in GiB). If omitted LogSize will be autocalculated or specify an integer value representing size.")] public long? LogSize { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited LogPerformance will be autocalculated or specify and integer value representing throughput.")] + HelpMessage = "Specify throughput in MiB/s. If omitted LogPerformance will be autocalculated or specify and integer value representing throughput.")] public int? LogPerformance { get; set; } [Parameter( @@ -260,12 +260,12 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited SharedSize will be autocalculated or specify an integer value representing size.")] + HelpMessage = "Specify capacity (in GiB). If omitted SharedSize will be autocalculated or specify an integer value representing size.")] public long? SharedSize { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited SharedPerformance will be autocalculated or specify and integer value representing throughput.")] + HelpMessage = "Specify throughput in MiB/s. If omitted SharedPerformance will be autocalculated or specify and integer value representing throughput.")] public int? SharedPerformance { get; set; } [Parameter( @@ -285,12 +285,12 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize will be autocalculated or specify an integer value representing size.")] + HelpMessage = "Specify capacity (in GiB). If omitted DataSize will be autocalculated or specify an integer value representing size.")] public long? DataBackupSize { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataBackupPerformance will be autocalculated or specify an integer value representing throughput.")] + HelpMessage = "Specify throughput in MiB/s. If omitted DataBackupPerformance will be autocalculated or specify an integer value representing throughput.")] public int? DataBackupPerformance { get; set; } [Parameter( @@ -310,12 +310,12 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize will be autocalculated or specify an integer value representing size.")] + HelpMessage = "Specify capacity (in GiB). If omitted DataSize will be autocalculated or specify an integer value representing size.")] public long? LogBackupSize { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited LogBackupPerformance will be autocalculated or specify an integer value representing throughput.")] + HelpMessage = "Specify throughput in MiB/s. If omitted LogBackupPerformance will be autocalculated or specify an integer value representing throughput.")] public int? LogBackupPerformance { get; set; } [Parameter( @@ -335,7 +335,7 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "HANA System Replication (HSR): Replication between the same SID instance on hosts in the same region, or differerent regions. This could be Scale-Up or Scale-Out configurations.")] + HelpMessage = "HANA System Replication (HSR): Replication between the same SID instance on hosts in the same region, or different regions. This could be Scale-Up or Scale-Out configurations.")] [PSDefaultValue(Help = "Default true", Value = false)] public SwitchParameter HannaSystemReplication { get; set; } @@ -411,13 +411,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited a DataSize size for disk 2 will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted a DataSize size for disk 2 will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName )] public long? DataSize2 { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance for disk 2 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance for disk 2 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? Data2Performance { get; set; } @@ -438,13 +438,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize for disk 3 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 3 this will be ignored. For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted DataSize for disk 3 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 3 this will be ignored. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? DataSize3 { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance for disk 3 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance for disk 3 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? Data3Performance { get; set; } @@ -465,13 +465,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize for disk 4 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 4 this will be ignored. For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted DataSize for disk 4 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 4 this will be ignored. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? Data4Size { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance for disk 4 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance for disk 4 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? Data4Performance { get; set; } @@ -492,13 +492,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize for disk 5 will be autocalculated or specify an integer value representing size.If NumberOfDataVolume is less than 5 this will be ignored. For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted DataSize for disk 5 will be autocalculated or specify an integer value representing size.If NumberOfDataVolume is less than 5 this will be ignored. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? Data5Size { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance for disk 5 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance for disk 5 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? Data5Performance { get; set; } @@ -519,13 +519,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize for disk 6 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 6 this will be ignored. For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted DataSize for disk 6 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 6 this will be ignored. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? Data6Size { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance for disk 6 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance for disk 6 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? Data6Performance { get; set; } @@ -546,13 +546,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize for disk 7 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 7 this will be ignored. For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted DataSize for disk 7 will be autocalculated or specify an integer value representing size. If NumberOfDataVolume is less than 7 this will be ignored. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? Data7Size { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance for disk 7 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance for disk 7 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName )] public int? Data7Performance { get; set; } @@ -574,13 +574,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited DataSize for disk 8 will be autocalculated or specify an integer value representing size.If NumberOfDataVolume is less than 8 this will be ignored. For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted DataSize for disk 8 will be autocalculated or specify an integer value representing size.If NumberOfDataVolume is less than 8 this will be ignored. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? DataSize8 { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited DataPerformance for disk 8 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted DataPerformance for disk 8 will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? DataPerformance8 { get; set; } @@ -601,13 +601,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited Size for BinarySize will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted Size for BinarySize will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? BinarySize { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited BinaryPerformance will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted BinaryPerformance will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? BinaryPerformance { get; set; } @@ -628,13 +628,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited Size for BackupSize will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted Size for BackupSize will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? BackupSize { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited BackupPerformance will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted BackupPerformance will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? BackupPerformance { get; set; } @@ -655,13 +655,13 @@ public string SystemId [Parameter( Mandatory = false, - HelpMessage = "Specify capacity (in GiB). If ommited Size for LogMirrorSize will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", + HelpMessage = "Specify capacity (in GiB). If omitted Size for LogMirrorSize will be autocalculated or specify an integer value representing size.For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public long? LogMirrorSize { get; set; } [Parameter( Mandatory = false, - HelpMessage = "Specify throughput in MiB/s. If ommited LogMirrorPerformance will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", + HelpMessage = "Specify throughput in MiB/s. If omitted LogMirrorPerformance will be autocalculated or specify and integer value representing throughput. For Oracle Application Volume Groups only", ParameterSetName = OracleParameterSetName)] public int? LogMirrorPerformance { get; set; } diff --git a/src/Network/Network.Test/ScenarioTests/ApplicationGatewayTests.ps1 b/src/Network/Network.Test/ScenarioTests/ApplicationGatewayTests.ps1 index f9663ce23ee7..9f78986a4832 100644 --- a/src/Network/Network.Test/ScenarioTests/ApplicationGatewayTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/ApplicationGatewayTests.ps1 @@ -254,7 +254,7 @@ function Test-ApplicationGatewayCRUD Assert-NotNull $getgw.Probes[0].Match Assert-Null $getgw.Probes[0].Match.StatusCodes - # Check that statuscode of probe[1] is still an emtpy list + # Check that statuscode of probe[1] is still an empty list Assert-NotNull $getgw.Probes[1] Assert-NotNull $getgw.Probes[1].Match Assert-NotNull $getgw.Probes[1].Match.StatusCodes @@ -358,7 +358,7 @@ function Test-ApplicationGatewayCRUD $getgw = Set-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener03Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp $listener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener03Name - # Modify rule to remove URL rotuing + # Modify rule to remove URL routing $pool = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $getgw -Name $poolName $getgw = Set-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $getgw -Name $rule03Name -RuleType basic -HttpListener $listener -BackendHttpSettings $poolSetting -BackendAddressPool $pool diff --git a/src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1 b/src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1 index 619ac6f938da..9532bc54699b 100644 --- a/src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1 @@ -1057,7 +1057,7 @@ function Test-AzureFirewallPolicyPremiumWithTerminateTLSEnabled { Assert-AreEqual $appRule1Fqdn1 $appRule.TargetFqdns[0] Assert-AreEqual $appRule1Fqdn2 $appRule.TargetFqdns[1] - # Verify TerminatTLS flag is set + # Verify TerminateTLS flag is set Assert-AreEqual true $appRule.TerminateTLS $testPipelineRg = Get-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -AzureFirewallPolicyName $getAzureFirewallPolicy.Name -ResourceGroupName $rgname @@ -1171,7 +1171,7 @@ function Test-AzureFirewallPolicyPremiumWithTerminateTLSDisabledAndTargetUrls { Assert-AreEqual $appRule1TargetUrl1 $appRule.TargetUrls[0] Assert-AreEqual $appRule1TargetUrl2 $appRule.TargetUrls[1] - # Verify TerminatTLS flag is NOT set + # Verify TerminateTLS flag is NOT set Assert-AreEqual false $appRule.TerminateTLS $testPipelineRg = Get-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -AzureFirewallPolicyName $getAzureFirewallPolicy.Name -ResourceGroupName $rgname @@ -1290,7 +1290,7 @@ function Test-AzureFirewallPolicyPremiumWithTerminateTLSEnabledAndTargetUrls { Assert-AreEqual $appRule1TargetUrl1 $appRule.TargetUrls[0] Assert-AreEqual $appRule1TargetUrl2 $appRule.TargetUrls[1] - # Verify TerminatTLS flag is set + # Verify TerminateTLS flag is set Assert-AreEqual true $appRule.TerminateTLS $testPipelineRg = Get-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -AzureFirewallPolicyName $getAzureFirewallPolicy.Name -ResourceGroupName $rgname diff --git a/src/Network/Network.Test/ScenarioTests/MultiIpConfigOnNicTests.ps1 b/src/Network/Network.Test/ScenarioTests/MultiIpConfigOnNicTests.ps1 index 8ecae7d9e76a..39b80bec719f 100644 --- a/src/Network/Network.Test/ScenarioTests/MultiIpConfigOnNicTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/MultiIpConfigOnNicTests.ps1 @@ -59,7 +59,7 @@ function Test-LBWithMultiIpConfigNICCRUD Assert-AreEqual 0 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count - # Create 3 network interfaces each with 2 ipconfig and accociate to loadbalancer + # Create 3 network interfaces each with 2 ipconfig and associate to loadbalancer $nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] $nic1 = Get-AzNetworkInterface -Name $nicName1 -ResourceGroupName $rgname | Add-AzNetworkInterfaceIpConfig -Name $ipconfig1Name -PrivateIpAddressVersion ipv4 -Subnet $vnet.Subnets[0] | Set-AzNetworkInterface @@ -118,7 +118,7 @@ function Test-LBWithMultiIpConfigNICCRUD <# .SYNOPSIS -Tests creating a NIC with Loadbalancer references with muultiple ip config +Tests creating a NIC with Loadbalancer references with multiple ip config #> function Test-AddNICToLBWithMultiIpConfig { @@ -171,7 +171,7 @@ function Test-AddNICToLBWithMultiIpConfig Assert-AreEqual "Succeeded" $lb.ProvisioningState Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count - # Create network interface with 1 ip and accociate to loadbalancer + # Create network interface with 1 ip and associate to loadbalancer $nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] -LoadBalancerBackendAddressPool $lb.BackendAddressPools[0] -LoadBalancerInboundNatRule $lb.InboundNatRules[0] #verify nic configs diff --git a/src/Network/Network.Test/ScenarioTests/NetworkManagerTests.ps1 b/src/Network/Network.Test/ScenarioTests/NetworkManagerTests.ps1 index e626f9ae78bf..bfbf1631e91e 100644 --- a/src/Network/Network.Test/ScenarioTests/NetworkManagerTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/NetworkManagerTests.ps1 @@ -19,7 +19,7 @@ Tests creating new simple public networkmanager function Test-NetworkManagerCRUD { # Setup - # Need to update subscriptionId before runing in live mode + # Need to update subscriptionId before running in live mode $rgName = Get-ResourceGroupName $networkManagerName = Get-ResourceName $rglocation = "centraluseuap" diff --git a/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 b/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 index 6369fc2e1c06..c12d834c105f 100644 --- a/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 @@ -154,7 +154,7 @@ function Test-NetworkSecurityGroup-SecurityRuleCRUD $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } # Create SecurityRule - $securityRule = New-AzNetworkSecurityRuleConfig -Name $securityRule1Name -Description "desciption" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 123 -Direction Inbound + $securityRule = New-AzNetworkSecurityRuleConfig -Name $securityRule1Name -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 123 -Direction Inbound # Create NetworkSecurityGroup $nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgname -Location $location -SecurityRule $securityRule @@ -177,7 +177,7 @@ function Test-NetworkSecurityGroup-SecurityRuleCRUD Assert-AreEqual "DenyAllOutBound" $getNsg.DefaultSecurityRules[5].Name Assert-AreEqual $securityRule1Name $getNsg.SecurityRules[0].Name Assert-NotNull $getNsg.SecurityRules[0].Etag - Assert-AreEqual "desciption" $getNsg.SecurityRules[0].Description + Assert-AreEqual "description" $getNsg.SecurityRules[0].Description Assert-AreEqual "Tcp" $getNsg.SecurityRules[0].Protocol Assert-AreEqual "23-45" $getNsg.SecurityRules[0].SourcePortRange Assert-AreEqual "46-56" $getNsg.SecurityRules[0].DestinationPortRange @@ -206,7 +206,7 @@ function Test-NetworkSecurityGroup-SecurityRuleCRUD Assert-AreEqual $list[0].SecurityRules[0].Etag $getNsg.SecurityRules[0].Etag # Add a network security rule - $job = Get-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName | Add-AzNetworkSecurityRuleConfig -Name $securityRule2Name -Description "desciption2" -Protocol Tcp -SourcePortRange "26-43" -DestinationPortRange "45-53" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Deny -Priority 122 -Direction Outbound | Set-AzNetworkSecurityGroup -AsJob + $job = Get-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName | Add-AzNetworkSecurityRuleConfig -Name $securityRule2Name -Description "description2" -Protocol Tcp -SourcePortRange "26-43" -DestinationPortRange "45-53" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Deny -Priority 122 -Direction Outbound | Set-AzNetworkSecurityGroup -AsJob $job | Wait-Job $nsg = $job | Receive-Job Assert-AreEqual 2 @($nsg.SecurityRules).Count @@ -229,7 +229,7 @@ function Test-NetworkSecurityGroup-SecurityRuleCRUD Assert-AreEqual $securityRules[1].Name $nsg.SecurityRules[1].Name # Set security rule - $nsg = Get-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName | Set-AzNetworkSecurityRuleConfig -Name $securityRule2Name -Description "desciption2" -Protocol Tcp -SourcePortRange "26-43" -DestinationPortRange "45-53" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 122 -Direction Outbound | Set-AzNetworkSecurityGroup + $nsg = Get-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName | Set-AzNetworkSecurityRuleConfig -Name $securityRule2Name -Description "description2" -Protocol Tcp -SourcePortRange "26-43" -DestinationPortRange "45-53" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 122 -Direction Outbound | Set-AzNetworkSecurityGroup $securityRule2 = $nsg | Get-AzNetworkSecurityRuleConfig -name $securityRule2Name Assert-AreEqual "Allow" $securityRule2.Access @@ -278,11 +278,11 @@ function Test-NetworkSecurityGroup-MultiValuedRules $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } # Create SecurityRule - $securityRule1 = New-AzNetworkSecurityRuleConfig -Name $securityRule1Name -Description "desciption" -Protocol Tcp -SourcePortRange 23-45,80-90 -DestinationPortRange 46-56,70-80 -SourceAddressPrefix 10.10.20.0/24,192.168.0.0/24 -DestinationAddressPrefix 10.10.30.0/24,192.168.2.0/24 -Access Allow -Priority 123 -Direction Inbound - $securityRule2 = New-AzNetworkSecurityRuleConfig -Name $securityRule2Name -Description "desciption" -Protocol Tcp -SourcePortRange 10-20,30-40 -DestinationPortRange 10-20,30-40 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 120 -Direction Inbound - $securityRule3 = New-AzNetworkSecurityRuleConfig -Name $securityRule3Name -Description "desciption" -Protocol Icmp -SourcePortRange 50-60,100-110 -DestinationPortRange 120-130,131-140 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 125 -Direction Inbound - $securityRule4 = New-AzNetworkSecurityRuleConfig -Name $securityRule4Name -Description "desciption" -Protocol Esp -SourcePortRange 150-160,170-180 -DestinationPortRange 190-200,210-220 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 127 -Direction Inbound - $securityRule5 = New-AzNetworkSecurityRuleConfig -Name $securityRule5Name -Description "desciption" -Protocol Ah -SourcePortRange 230-240,250-260 -DestinationPortRange 270-280,290-300 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 129 -Direction Inbound + $securityRule1 = New-AzNetworkSecurityRuleConfig -Name $securityRule1Name -Description "description" -Protocol Tcp -SourcePortRange 23-45,80-90 -DestinationPortRange 46-56,70-80 -SourceAddressPrefix 10.10.20.0/24,192.168.0.0/24 -DestinationAddressPrefix 10.10.30.0/24,192.168.2.0/24 -Access Allow -Priority 123 -Direction Inbound + $securityRule2 = New-AzNetworkSecurityRuleConfig -Name $securityRule2Name -Description "description" -Protocol Tcp -SourcePortRange 10-20,30-40 -DestinationPortRange 10-20,30-40 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 120 -Direction Inbound + $securityRule3 = New-AzNetworkSecurityRuleConfig -Name $securityRule3Name -Description "description" -Protocol Icmp -SourcePortRange 50-60,100-110 -DestinationPortRange 120-130,131-140 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 125 -Direction Inbound + $securityRule4 = New-AzNetworkSecurityRuleConfig -Name $securityRule4Name -Description "description" -Protocol Esp -SourcePortRange 150-160,170-180 -DestinationPortRange 190-200,210-220 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 127 -Direction Inbound + $securityRule5 = New-AzNetworkSecurityRuleConfig -Name $securityRule5Name -Description "description" -Protocol Ah -SourcePortRange 230-240,250-260 -DestinationPortRange 270-280,290-300 -SourceAddressPrefix Storage -DestinationAddressPrefix Storage -Access Allow -Priority 129 -Direction Inbound # Create NetworkSecurityGroup $nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgname -Location $location -SecurityRules $securityRule1,$securityRule2,$securityRule3,$securityRule4,$securityRule5 @@ -307,7 +307,7 @@ function Test-NetworkSecurityGroup-MultiValuedRules # verify rule 1. Assert-AreEqual $securityRule1Name $getNsg.SecurityRules[0].Name Assert-NotNull $getNsg.SecurityRules[0].Etag - Assert-AreEqual "desciption" $getNsg.SecurityRules[0].Description + Assert-AreEqual "description" $getNsg.SecurityRules[0].Description Assert-AreEqual "Tcp" $getNsg.SecurityRules[0].Protocol Assert-AreEqual 2 @($getNsg.SecurityRules[0].SourcePortRange).Count Assert-AreEqual "23-45" $getNsg.SecurityRules[0].SourcePortRange[0] @@ -326,7 +326,7 @@ function Test-NetworkSecurityGroup-MultiValuedRules Assert-AreEqual "Inbound" $getNsg.SecurityRules[0].Direction # verify rule 2 - Assert-AreEqual "desciption" $getNsg.SecurityRules[1].Description + Assert-AreEqual "description" $getNsg.SecurityRules[1].Description Assert-AreEqual "Tcp" $getNsg.SecurityRules[1].Protocol Assert-AreEqual 2 @($getNsg.SecurityRules[1].SourcePortRange).Count Assert-AreEqual "10-20" $getNsg.SecurityRules[1].SourcePortRange[0] @@ -343,7 +343,7 @@ function Test-NetworkSecurityGroup-MultiValuedRules Assert-AreEqual "Inbound" $getNsg.SecurityRules[1].Direction # verify rule 3 - Assert-AreEqual "desciption" $getNsg.SecurityRules[2].Description + Assert-AreEqual "description" $getNsg.SecurityRules[2].Description Assert-AreEqual "Icmp" $getNsg.SecurityRules[2].Protocol Assert-AreEqual 2 @($getNsg.SecurityRules[2].SourcePortRange).Count Assert-AreEqual "50-60" $getNsg.SecurityRules[2].SourcePortRange[0] @@ -360,7 +360,7 @@ function Test-NetworkSecurityGroup-MultiValuedRules Assert-AreEqual "Inbound" $getNsg.SecurityRules[2].Direction # verify rule 4 - Assert-AreEqual "desciption" $getNsg.SecurityRules[3].Description + Assert-AreEqual "description" $getNsg.SecurityRules[3].Description Assert-AreEqual "Esp" $getNsg.SecurityRules[3].Protocol Assert-AreEqual 2 @($getNsg.SecurityRules[3].SourcePortRange).Count Assert-AreEqual "150-160" $getNsg.SecurityRules[3].SourcePortRange[0] @@ -377,7 +377,7 @@ function Test-NetworkSecurityGroup-MultiValuedRules Assert-AreEqual "Inbound" $getNsg.SecurityRules[3].Direction # verify rule 5 - Assert-AreEqual "desciption" $getNsg.SecurityRules[4].Description + Assert-AreEqual "description" $getNsg.SecurityRules[4].Description Assert-AreEqual "Ah" $getNsg.SecurityRules[4].Protocol Assert-AreEqual 2 @($getNsg.SecurityRules[4].SourcePortRange).Count Assert-AreEqual "230-240" $getNsg.SecurityRules[4].SourcePortRange[0] diff --git a/src/Network/Network.Test/ScenarioTests/PrivateEndpointTests.ps1 b/src/Network/Network.Test/ScenarioTests/PrivateEndpointTests.ps1 index 7f4fc101003a..90c2f8fb06a8 100644 --- a/src/Network/Network.Test/ScenarioTests/PrivateEndpointTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/PrivateEndpointTests.ps1 @@ -61,7 +61,7 @@ function Test-PrivateEndpointCRUD $job | Wait-Job $ilbcreate = $job | Receive-Job - # Verfify if load balancer is created successfully + # Verify if load balancer is created successfully Assert-NotNull $ilbcreate; Assert-AreEqual $ilbName $ilbcreate.Name; Assert-AreEqual $location $ilbcreate.Location; @@ -76,7 +76,7 @@ function Test-PrivateEndpointCRUD $plscreate = $job | Receive-Job $vPrivateLinkService = Get-AzPrivateLinkService -Name $PrivateLinkServiceName -ResourceGroupName $rgName - # Verfify if private link service is created successfully + # Verify if private link service is created successfully Assert-NotNull $vPrivateLinkService; Assert-AreEqual $PrivateLinkServiceName $vPrivateLinkService.Name; Assert-NotNull $vPrivateLinkService.IpConfigurations; @@ -303,7 +303,7 @@ function Test-PrivateEndpointInEdgeZone $beaddresspool= New-AzLoadBalancerBackendAddressPoolConfig -Name $ilbBackendName $ilbcreate = New-AzLoadBalancer -ResourceGroupName $rgname -Name $ilbName -Location $location -FrontendIpConfiguration $frontendIP -BackendAddressPool $beaddresspool -Sku "Standard" -EdgeZone $edgeZone - # Verfify if load balancer is created successfully + # Verify if load balancer is created successfully Assert-NotNull $ilbcreate Assert-AreEqual $ilbName $ilbcreate.Name Assert-AreEqual $location $ilbcreate.Location @@ -315,7 +315,7 @@ function Test-PrivateEndpointInEdgeZone $vPrivateLinkService = New-AzPrivateLinkService -ResourceGroupName $rgname -Name $PrivateLinkServiceName -Location $location -IpConfiguration $IpConfiguration -LoadBalancerFrontendIpConfiguration $LoadBalancerFrontendIpConfiguration -EdgeZone $edgeZone - # Verfify if private link service is created successfully + # Verify if private link service is created successfully Assert-NotNull $vPrivateLinkService Assert-AreEqual $PrivateLinkServiceName $vPrivateLinkService.Name Assert-NotNull $vPrivateLinkService.IpConfigurations; @@ -384,7 +384,7 @@ function Test-PrivateEndpointApplicationSecurityGroup $job | Wait-Job $nlbcreate = $job | Receive-Job - # Verfify if load balancer is created successfully + # Verify if load balancer is created successfully Assert-NotNull $nlbcreate Assert-AreEqual $nlbName $nlbcreate.Name Assert-AreEqual $location $nlbcreate.Location @@ -399,7 +399,7 @@ function Test-PrivateEndpointApplicationSecurityGroup $plscreate = $job | Receive-Job $pls = Get-AzPrivateLinkService -Name $plsName -ResourceGroupName $rgName - # Verfify if private link service is created successfully + # Verify if private link service is created successfully Assert-NotNull $pls Assert-AreEqual $plsName $pls.Name Assert-NotNull $pls.IpConfigurations diff --git a/src/Network/Network.Test/ScenarioTests/PrivateLinkServiceTests.ps1 b/src/Network/Network.Test/ScenarioTests/PrivateLinkServiceTests.ps1 index 58260b82e4f8..4b8458efaac2 100644 --- a/src/Network/Network.Test/ScenarioTests/PrivateLinkServiceTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/PrivateLinkServiceTests.ps1 @@ -58,7 +58,7 @@ function Test-PrivateLinkServiceCRUD $job | Wait-Job $ilbcreate = $job | Receive-Job - # Verfify if load balancer is created successfully + # Verify if load balancer is created successfully Assert-NotNull $ilbcreate; Assert-AreEqual $ilbName $ilbcreate.Name; Assert-AreEqual (Normalize-Location $location) $ilbcreate.Location; @@ -294,7 +294,7 @@ function Test-PrivateLinkServiceInEdgeZone $beaddresspool= New-AzLoadBalancerBackendAddressPoolConfig -Name $ilbBackendName $ilbcreate = New-AzLoadBalancer -ResourceGroupName $rgname -Name $ilbName -Location $location -FrontendIpConfiguration $frontendIP -BackendAddressPool $beaddresspool -Sku "Standard" -EdgeZone $edgeZone - # Verfify if load balancer is created successfully + # Verify if load balancer is created successfully Assert-NotNull $ilbcreate Assert-AreEqual $ilbName $ilbcreate.Name Assert-AreEqual (Normalize-Location $location) $ilbcreate.Location diff --git a/src/Network/Network.Test/ScenarioTests/PublicIpAddressTests.ps1 b/src/Network/Network.Test/ScenarioTests/PublicIpAddressTests.ps1 index bb11d30b991b..414cddd8be5e 100644 --- a/src/Network/Network.Test/ScenarioTests/PublicIpAddressTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/PublicIpAddressTests.ps1 @@ -31,7 +31,7 @@ function Test-PublicIpAddressCRUD # Create the resource group $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } - # Create publicIpAddres + # Create public IpAddress $job = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel -AsJob $job | Wait-Job $actual = $job | Receive-Job @@ -101,7 +101,7 @@ function Test-PublicIpAddressCRUD-NoDomainNameLabel # Create the resource group $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } - # Create publicIpAddres + # Create public IpAddress $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $location -AllocationMethod Static $expected = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName @@ -152,7 +152,7 @@ function Test-PublicIpAddressCRUD-StaticAllocation # Create the resource group $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } - # Create publicIpAddres + # Create public IpAddress $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $location -AllocationMethod Static $expected = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName @@ -205,7 +205,7 @@ function Test-PublicIpAddressCRUD-WithDomainNameLabelScope # Create the resource group $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } - # Create publicIpAddres + # Create public IpAddress $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $rglocation -AllocationMethod Static -DomainNameLabel $domainNameLabel -DomainNameLabelScope $domainNameLabelScope $publicip = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname Assert-AreEqual $publicip.ResourceGroupName $actual.ResourceGroupName @@ -250,7 +250,7 @@ function Test-PublicIpAddressCRUD-EditDomainNameLavel # Create the resource group $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } - # Create publicIpAddres + # Create public IpAddress $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel $publicip = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname Assert-AreEqual $publicip.ResourceGroupName $actual.ResourceGroupName @@ -302,7 +302,7 @@ function Test-PublicIpAddressCRUD-ReverseFqdn # Create the resource group $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } - # Create publicIpAddres + # Create public IpAddress $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel $publicip = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname Assert-AreEqual $publicip.ResourceGroupName $actual.ResourceGroupName @@ -364,7 +364,7 @@ function Test-PublicIpAddressCRUD-IpTag Assert-AreEqual $IpTag2.IpTagType "RoutingPreference" Assert-AreEqual $IpTag2.Tag "/Internet" - # Create publicIpAddres + # Create public IpAddress $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel -IpTag $IpTag $publicip = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname Assert-AreEqual $publicip.ResourceGroupName $actual.ResourceGroupName @@ -416,7 +416,7 @@ function Test-PublicIpAddressIpVersion # Create the resource group $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } - # Create publicIpAddres with default ipversion + # Create public IpAddress with default ipversion $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel $expected = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName @@ -439,7 +439,7 @@ function Test-PublicIpAddressIpVersion Assert-AreEqual $domainNameLabel $list[0].DnsSettings.DomainNameLabel Assert-AreEqual $list[0].PublicIpAddressVersion IPv4 - # Create publicIpAddres with IPv4 ipversion + # Create public IpAddress with IPv4 ipversion $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname1 -location $location -AllocationMethod Static -IpAddressVersion IPv4 $expected = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname1 Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName @@ -450,7 +450,7 @@ function Test-PublicIpAddressIpVersion Assert-AreEqual "Succeeded" $expected.ProvisioningState Assert-AreEqual $expected.PublicIpAddressVersion IPv4 - # Create publicIpAddres with IPv6 ipversion + # Create public IpAddress with IPv6 ipversion $actual = New-AzPublicIpAddress -ResourceGroupName $rgname -name $rname2 -location $location -AllocationMethod Static -IpAddressVersion IPv6 $expected = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $rname2 Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName diff --git a/src/Network/Network.Test/ScenarioTests/RouteServerTests.ps1 b/src/Network/Network.Test/ScenarioTests/RouteServerTests.ps1 index 54497d183970..9d472e293db8 100644 --- a/src/Network/Network.Test/ScenarioTests/RouteServerTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/RouteServerTests.ps1 @@ -148,7 +148,7 @@ function Test-RouteServerPeerCRUD <# .SYNOPSIS -Test route server peer learned and advertiesd routes (bgp routes) +Test route server peer learned and advertised routes (bgp routes) #> function Test-RouteServerPeerRoutes { diff --git a/src/Network/Network.Test/ScenarioTests/VirtualNetworkTests.cs b/src/Network/Network.Test/ScenarioTests/VirtualNetworkTests.cs index 5de60c1b3cb8..0e4685df943b 100644 --- a/src/Network/Network.Test/ScenarioTests/VirtualNetworkTests.cs +++ b/src/Network/Network.Test/ScenarioTests/VirtualNetworkTests.cs @@ -114,17 +114,17 @@ public void TestVirtualNetworkPeeringCRUD() TestRunner.RunTestScript("Test-VirtualNetworkPeeringCRUD"); } - [Fact(Skip ="We need to update the way tokens are aquired, as of now aquiring tokens for multiple tenants is broken")] + [Fact(Skip ="We need to update the way tokens are acquired, as of now acquiring tokens for multiple tenants is broken")] [Trait(Category.AcceptanceType, Category.LiveOnly)] [Trait(Category.Owner, NrpTeamAlias.wanrpdev_subset1)] public void TestMultiTenantVNetPCRUD() { //this test is special, it requires 2 vnets, one of them created in a tenant other than the current context - //The test assumes one of the vnet (n the other tenant) is already up and runing + //The test assumes one of the vnet (n the other tenant) is already up and running //The test will create the second vnet and the peer them //The underlying cmdlet will actually get a token for the other tenant and pass it on in the REST call.. //Because of the need to get a token for the remote VNets's tenant, we cant ruin this under a service principal - //This test needs to be run in a live user mode only where the user is asusmed to have access to both the tenants + //This test needs to be run in a live user mode only where the user is assumed to have access to both the tenants TestRunner.RunTestScript("Test-MultiTenantVNetPCRUD"); diff --git a/src/Network/Network.Test/ScenarioTests/VirtualRouterTests.ps1 b/src/Network/Network.Test/ScenarioTests/VirtualRouterTests.ps1 index 84b0b7c49ea5..56de445908bc 100644 --- a/src/Network/Network.Test/ScenarioTests/VirtualRouterTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/VirtualRouterTests.ps1 @@ -143,7 +143,7 @@ function Test-VirtualRouterPeerCRUD <# .SYNOPSIS -Test virtual router peer learned and advertiesd routes (bgp routes) +Test virtual router peer learned and advertised routes (bgp routes) #> function Test-VirtualRouterPeerRoutes { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 index 6d67613baf9c..77b933d529c7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 @@ -24,7 +24,7 @@ function Update-AzNetworkSecurityPerimeterAccessRule { [CmdletBinding(DefaultParameterSetName = 'UpdateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( - #Runtime paramters + #Runtime parameters [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] @@ -133,7 +133,7 @@ function Update-AzNetworkSecurityPerimeterAccessRule { ${ProfileName}, - # Body paramters + # Body parameters [Parameter(HelpMessage = "Address Prefix")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] @@ -177,7 +177,7 @@ function Update-AzNetworkSecurityPerimeterAccessRule { # Subscription ids ${Subscription} - # Add only those paramters which can be updated + # Add only those parameters which can be updated ) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAssociation.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAssociation.ps1 index e9117dfd803d..2e8c519f7892 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAssociation.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAssociation.ps1 @@ -24,7 +24,7 @@ function Update-AzNetworkSecurityPerimeterAssociation { [CmdletBinding(DefaultParameterSetName = 'UpdateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( - #Runtime paramters + #Runtime parameters [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] @@ -128,7 +128,7 @@ function Update-AzNetworkSecurityPerimeterAssociation { ${SecurityPerimeterName}, - # Body paramters + # Body parameters [Parameter(HelpMessage = "Access Mode")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLink.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLink.ps1 index e146c8df8058..39c294ed6230 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLink.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLink.ps1 @@ -24,7 +24,7 @@ function Update-AzNetworkSecurityPerimeterLink { [CmdletBinding(DefaultParameterSetName = 'UpdateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( - #Runtime paramters + #Runtime parameters [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] @@ -128,7 +128,7 @@ function Update-AzNetworkSecurityPerimeterLink { ${SecurityPerimeterName}, - # Body paramters + # Body parameters [Parameter(HelpMessage = "Auto approved remote perimeter resource id")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] @@ -148,7 +148,7 @@ function Update-AzNetworkSecurityPerimeterLink { # remote inbound profiles ${RemoteInboundProfile} - # Add only those paramters which can be updated + # Add only those parameters which can be updated ) process { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLoggingConfiguration.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLoggingConfiguration.ps1 index ecc528bf1370..a5c440fa52a5 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLoggingConfiguration.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterLoggingConfiguration.ps1 @@ -24,7 +24,7 @@ function Update-AzNetworkSecurityPerimeterLoggingConfiguration { [CmdletBinding(DefaultParameterSetName = 'UpdateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( - #Runtime paramters + #Runtime parameters [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] @@ -128,7 +128,7 @@ function Update-AzNetworkSecurityPerimeterLoggingConfiguration { ${SecurityPerimeterName}, - # Body paramters + # Body parameters [Parameter(HelpMessage = "Log categories to enable")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] @@ -136,7 +136,7 @@ function Update-AzNetworkSecurityPerimeterLoggingConfiguration { # Enabled log categories ${EnabledLogCategory} - # Add only those paramters which can be updated + # Add only those parameters which can be updated ) process { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/docs/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md b/src/Network/NetworkSecurityPerimeter.Autorest/docs/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md index e557f78600cc..33054d618a96 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/docs/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/docs/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md @@ -42,7 +42,7 @@ Gets the NSP logging configuration. ## EXAMPLES -### Example 1: Get NetworkSsecurityPerimeter LoggingConfiguration +### Example 1: Get NetworkSecurityPerimeter LoggingConfiguration ```powershell Get-AzNetworkSecurityPerimeterLoggingConfiguration -ResourceGroupName rg-test-1 -SecurityPerimeterName nsp-test-1 ``` @@ -63,7 +63,7 @@ Type : Microsoft.Network/networkSecurityPerimeters/loggi Version : 4 ``` -Get NetworkSsecurityPerimeter LoggingConfiguration +Get NetworkSecurityPerimeter LoggingConfiguration ## PARAMETERS diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/examples/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md index 7704c7117aba..7acf94d40018 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/examples/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Get-AzNetworkSecurityPerimeterLoggingConfiguration.md @@ -1,4 +1,4 @@ -### Example 1: Get NetworkSsecurityPerimeter LoggingConfiguration +### Example 1: Get NetworkSecurityPerimeter LoggingConfiguration ```powershell Get-AzNetworkSecurityPerimeterLoggingConfiguration -ResourceGroupName rg-test-1 -SecurityPerimeterName nsp-test-1 ``` @@ -19,4 +19,4 @@ Type : Microsoft.Network/networkSecurityPerimeters/loggi Version : 4 ``` -Get NetworkSsecurityPerimeter LoggingConfiguration \ No newline at end of file +Get NetworkSecurityPerimeter LoggingConfiguration \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/utils.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test/utils.ps1 index da67d0da0da3..900ef93ae4a3 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/utils.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/utils.ps1 @@ -200,13 +200,13 @@ function cleanupEnv() { Write-Host -ForegroundColor Green "[CLEANUP] Success remove link" } catch{ - Write-Host -ForegroundColor Red "Error occcured with removing link" + Write-Host -ForegroundColor Red "Error occured with removing link" $_.Exception.ToString() } } } catch{ - Write-Host -ForegroundColor Red "Error occcured with listing link" + Write-Host -ForegroundColor Red "Error occured with listing link" $_.Exception.ToString() } @@ -224,14 +224,14 @@ function cleanupEnv() { Remove-AzNetworkSecurityPerimeterLinkReference -Name $ref.Name -ResourceGroupName $rg -SecurityPerimeterName $nsp Write-Host -ForegroundColor Green "[CLEANUP] Success remove reference" }catch{ - Write-Host -ForegroundColor Red "Error occcured with removing link reference" + Write-Host -ForegroundColor Red "Error occured with removing link reference" $_.Exception.ToString() } } } catch{ - Write-Host -ForegroundColor Red "Error occcured with listing link ref" + Write-Host -ForegroundColor Red "Error occured with listing link ref" $_.Exception.ToString() } @@ -241,7 +241,7 @@ function cleanupEnv() { Write-Host -ForegroundColor Green "[CLEANUP] Success remove nsp" } catch{ - Write-Host -ForegroundColor Red "Error occcured with removing nsp" + Write-Host -ForegroundColor Red "Error occured with removing nsp" $_.Exception.ToString() } } @@ -252,12 +252,12 @@ function cleanupEnv() { Write-Host -ForegroundColor Green "[CLEANUP] Success remove resource group" } catch{ - Write-Host -ForegroundColor Red "Error occcured with removing rg" + Write-Host -ForegroundColor Red "Error occured with removing rg" $_.Exception.ToString() } } catch{ - Write-Host -ForegroundColor Red "Error occcured with listing nsps" + Write-Host -ForegroundColor Red "Error occured with listing nsps" } Write-Host -ForegroundColor Magenta "Removing resources done, check previous logs for details." From dd34ad8e63e89b04b638c849a871aa66012bb3e8 Mon Sep 17 00:00:00 2001 From: Arie Heinrich Date: Tue, 1 Jul 2025 21:54:34 +0200 Subject: [PATCH 2/2] revert value to fix tests --- .../Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 b/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 index c12d834c105f..aa4947b9ee61 100644 --- a/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 +++ b/src/Network/Network.Test/ScenarioTests/NetworkSecurityGroupTests.ps1 @@ -154,7 +154,7 @@ function Test-NetworkSecurityGroup-SecurityRuleCRUD $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } # Create SecurityRule - $securityRule = New-AzNetworkSecurityRuleConfig -Name $securityRule1Name -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 123 -Direction Inbound + $securityRule = New-AzNetworkSecurityRuleConfig -Name $securityRule1Name -Description "desciption" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 123 -Direction Inbound # Create NetworkSecurityGroup $nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgname -Location $location -SecurityRule $securityRule