Skip to content

Spelling Fixes #28089

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion src/Sql/Sql.Test/ScenarioTests/AdvisorTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -417,7 +417,7 @@ function ValidateElasticPool($responseAdvisor, $expectedElasticPool)
<#
.SYNOPSIS
Validates properties in Advisor response
Some Advisor properties are volatile and var with DB worload, so we exlude them from validation in tests.
Some Advisor properties are volatile and var with DB workload, so we exclude them from validation in tests.
#>
function ValidateAdvisorProperties($advisor, $expanded = $false)
{
Expand Down
14 changes: 7 additions & 7 deletions src/Sql/Sql.Test/ScenarioTests/AuditTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -890,7 +890,7 @@ function Test-ExtendedAuditOnServer

try
{
# Enable auditing policy, without speficying a predicate expression, and verify it.
# Enable auditing policy, without specifying a predicate expression, and verify it.
Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
$policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName
Assert-AreEqual "Enabled" $policy.BlobStorageTargetState
Expand All @@ -901,7 +901,7 @@ function Test-ExtendedAuditOnServer
Assert-AreEqual "Primary" $policy.StorageKeyType
Assert-AreEqual "" $policy.PredicateExpression

# Enable Extended auditing policy, speficying a predicate expression, and verify it.
# Enable Extended auditing policy, specifying a predicate expression, and verify it.
Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -PredicateExpression "statement <> 'select 1'"
$policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName
Assert-AreEqual "Enabled" $policy.BlobStorageTargetState
Expand All @@ -917,7 +917,7 @@ function Test-ExtendedAuditOnServer
$policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName
Assert-AreEqual "Disabled" $policy.BlobStorageTargetState

# Enable Extended auditing policy, without speficying a predicate expression, and verify it.
# Enable Extended auditing policy, without specifying a predicate expression, and verify it.
Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
$policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName
Assert-AreEqual "Enabled" $policy.BlobStorageTargetState
Expand Down Expand Up @@ -962,7 +962,7 @@ function Test-ExtendedAuditOnDatabase

try
{
# Enable auditing policy, without speficying a predicate expression, and verify it.
# Enable auditing policy, without specifying a predicate expression, and verify it.
Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
$policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
Assert-AreEqual "Enabled" $policy.BlobStorageTargetState
Expand All @@ -973,7 +973,7 @@ function Test-ExtendedAuditOnDatabase
Assert-AreEqual "Primary" $policy.StorageKeyType
Assert-AreEqual "" $policy.PredicateExpression

# Enable Extended auditing policy, speficying a predicate expression, and verify it.
# Enable Extended auditing policy, specifying a predicate expression, and verify it.
Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -PredicateExpression "statement <> 'select 1'"
$policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
Assert-AreEqual "Enabled" $policy.BlobStorageTargetState
Expand All @@ -989,7 +989,7 @@ function Test-ExtendedAuditOnDatabase
$policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
Assert-AreEqual "Disabled" $policy.BlobStorageTargetState

# Enable Extended auditing policy, without speficying a predicate expression, and verify it.
# Enable Extended auditing policy, without specifying a predicate expression, and verify it.
Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8
$policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName
Assert-AreEqual "Enabled" $policy.BlobStorageTargetState
Expand Down Expand Up @@ -1457,7 +1457,7 @@ function Test-MSSupportServerAuditingToStorageInVNet

<#
.SYNOPSIS
Test Database Auditing to storage acount in VNet
Test Database Auditing to storage account in VNet
#>
function Test-DatabaseAuditingToStorageInVNet
{
Expand Down
16 changes: 8 additions & 8 deletions src/Sql/Sql.Test/ScenarioTests/DataClassificationTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -539,7 +539,7 @@ function Create-SqlDataClassificationTestEnvironment ($testSuffix, $location = "

<#
.SYNOPSIS
Tests enable and disable recommdations on columns in a SQL database.
Tests enable and disable recommendations on columns in a SQL database.
#>
function Test-EnableDisableRecommendationsOnSqlDatabase
{
Expand Down Expand Up @@ -585,7 +585,7 @@ function Test-EnableDisableRecommendationsOnSqlDatabase
Assert-NotNullOrEmpty $secondInformationType
Assert-NotNullOrEmpty $secondSensitivityLabel

# Disable first two recommdations, second recommdation is disabled using pipeline.
# Disable first two recommendations, second recommendation is disabled using pipeline.
Disable-AzSqlDatabaseSensitivityRecommendation -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -SchemaName $firstSchemaName -TableName $firstTableName -ColumnName $firstColumnName
Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Disable-AzSqlDatabaseSensitivityRecommendation -SchemaName $secondSchemaName -TableName $secondTableName -ColumnName $secondColumnName

Expand All @@ -596,13 +596,13 @@ function Test-EnableDisableRecommendationsOnSqlDatabase
Assert-AreEqual $params.databaseName $recommendations.DatabaseName
Assert-AreEqual 2 ($recommendations.SensitivityLabels).count

# Verify disabled recommdations are not part of the new recommdations.
# Verify disabled recommendations are not part of the new recommendations.
Assert-AreNotEqual $firstColumnName ($recommendations.SensitivityLabels)[0].ColumnName
Assert-AreNotEqual $firstColumnName ($recommendations.SensitivityLabels)[1].ColumnName
Assert-AreNotEqual $secondColumnName ($recommendations.SensitivityLabels)[0].ColumnName
Assert-AreNotEqual $secondColumnName ($recommendations.SensitivityLabels)[1].ColumnName

# Enable second disabled recommdation.
# Enable second disabled recommendation.
Enable-AzSqlDatabaseSensitivityRecommendation -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -SchemaName $secondSchemaName -TableName $secondTableName -ColumnName $secondColumnName

# Get, using pipeline, recommended sensitivity labels, and verify.
Expand All @@ -612,25 +612,25 @@ function Test-EnableDisableRecommendationsOnSqlDatabase
Assert-AreEqual $params.serverName $recommendations.ServerName
Assert-AreEqual $params.databaseName $recommendations.DatabaseName

# Verify disabled recommdation is not part of the new recommdations.
# Verify disabled recommendation is not part of the new recommendations.
Assert-AreNotEqual $firstColumnName ($recommendations.SensitivityLabels)[0].ColumnName
Assert-AreNotEqual $firstColumnName ($recommendations.SensitivityLabels)[1].ColumnName
Assert-AreNotEqual $firstColumnName ($recommendations.SensitivityLabels)[2].ColumnName

# Disable, using pipeline, all recommended columns.
Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Get-AzSqlDatabaseSensitivityRecommendation | Disable-AzSqlDatabaseSensitivityRecommendation

# Verify no recommdations are retrieved since all are disabled.
# Verify no recommendations are retrieved since all are disabled.
$recommendations = Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Get-AzSqlDatabaseSensitivityRecommendation
Assert-AreEqual $params.rgname $recommendations.ResourceGroupName
Assert-AreEqual $params.serverName $recommendations.ServerName
Assert-AreEqual $params.databaseName $recommendations.DatabaseName
Assert-AreEqual 0 ($recommendations.SensitivityLabels).count

# Enable, using pipeline, second disabled recommdation and verify
# Enable, using pipeline, second disabled recommendation and verify
Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Enable-AzSqlDatabaseSensitivityRecommendation -SchemaName $secondSchemaName -TableName $secondTableName -ColumnName $secondColumnName

# Verify enabled recommdation is now part of the recommendations.
# Verify enabled recommendation is now part of the recommendations.
$recommendations = Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Get-AzSqlDatabaseSensitivityRecommendation
Assert-AreEqual $params.rgname $recommendations.ResourceGroupName
Assert-AreEqual $params.serverName $recommendations.ServerName
Expand Down
2 changes: 1 addition & 1 deletion src/Sql/Sql.Test/ScenarioTests/DataMaskingTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -295,7 +295,7 @@ function Test-DatabaseDataMaskingTextRuleLifecycle

<#
.SYNOPSIS
Tests that ilegal values prevent creation of rules
Tests that illegal values prevent creation of rules
#>
function Test-DatabaseDataMaskingRuleCreationFailures
{
Expand Down
4 changes: 2 additions & 2 deletions src/Sql/Sql.Test/ScenarioTests/DatabaseActivationTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@

<#
.SYNOPSIS
Test pasuing and resuming database.
Test pausing and resuming database.
#>
function Test-DatabasePauseResume
{
Expand Down Expand Up @@ -62,7 +62,7 @@ function Test-DatabasePauseResume

<#
.SYNOPSIS
Test pasuing and resuming database via piped cmdlets.
Test pausing and resuming database via piped cmdlets.
#>
function Test-DatabasePauseResumePiped
{
Expand Down
4 changes: 2 additions & 2 deletions src/Sql/Sql.Test/ScenarioTests/DatabaseBackupTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -243,7 +243,7 @@ function Test-LongTermRetentionV2
# Set the weekly retention on the database so that the first backup gets picked up, for example:
# Set-AzSqlDatabaseLongTermRetentionPolicy -ResourceGroup $resourceGroup -ServerName $serverName -DatabaseName $databaseName -WeeklyRetention P1W
# Wait about 18 hours until it gets properly copied and you see the backup when run get backups, for example:
# Get-AzSqlDatabaseLongTermRetentionBackup -Location $locationName -ServerName $serverName -DatabaeName $databaseName
# Get-AzSqlDatabaseLongTermRetentionBackup -Location $locationName -ServerName $serverName -DatabaseName $databaseName
$resourceGroup = "brandong-test"
$locationName = "eastus"
$serverName = "brandong-ltr-test"
Expand Down Expand Up @@ -299,7 +299,7 @@ function Test-LongTermRetentionV2ResourceGroupBased
# Set the weekly retention on the database so that the first backup gets picked up, for example:
# Set-AzSqlDatabaseLongTermRetentionPolicy -ResourceGroup $resourceGroup -ServerName $serverName -DatabaseName $databaseName -WeeklyRetention P1W
# Wait about 18 hours until it gets properly copied and you see the backup when run get backups, for example:
# Get-AzSqlDatabaseLongTermRetentionBackup -Location $locationName -ServerName $serverName -DatabaeName $databaseName -ResourceGroupName $resourceGroup
# Get-AzSqlDatabaseLongTermRetentionBackup -Location $locationName -ServerName $serverName -DatabaseName $databaseName -ResourceGroupName $resourceGroup
$resourceGroup = "brandong-test"
$locationName = "eastus"
$serverName = "brandong-ltr-test"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -173,7 +173,7 @@ function Test-RemoveDatabaseInternal ($serverVersion, $location = "westcentralu
-CollationName "SQL_Latin1_General_CP1_CI_AS" -MaxSizeBytes 250GB -Edition Stretch -RequestedServiceObjectiveName DS100
Assert-AreEqual $databaseName $stretchdb.DatabaseName

# Remove stretch databse
# Remove stretch database
Remove-AzSqlDatabase -ResourceGroupName $server.ResourceGroupname -ServerName $server.ServerName -DatabaseName $stretchdb.DatabaseName -Force

# Check total number of databases after removal
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ function Test-CreateJobPrivateEndpoint

$pe1 = Get-AzSqlElasticJobPrivateEndpoint -ElasticJobAgentObject $a1 -Name $peName

# valide agent level properties
# valid agent level properties
Assert-AreEqual $pe1.ResourceGroupName $a1.ResourceGroupName
Assert-AreEqual $pe1.ServerName $a1.ServerName
Assert-AreEqual $pe1.AgentName $a1.AgentName
Expand Down Expand Up @@ -74,7 +74,7 @@ function Test-GetJobPrivateEndpoint
# Validate with Default set
$pe1 = Get-AzSqlElasticJobPrivateEndpoint -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $peName

## valide agent level properties
## valid agent level properties
Assert-AreEqual $pe1.ResourceGroupName $a1.ResourceGroupName
Assert-AreEqual $pe1.ServerName $a1.ServerName
Assert-AreEqual $pe1.AgentName $a1.AgentName
Expand All @@ -90,7 +90,7 @@ function Test-GetJobPrivateEndpoint
# Validate with Parent object
$pe1 = Get-AzSqlElasticJobPrivateEndpoint -ElasticJobAgentObject $a1 -Name $peName

## valide agent level properties
## valid agent level properties
Assert-AreEqual $pe1.ResourceGroupName $a1.ResourceGroupName
Assert-AreEqual $pe1.ServerName $a1.ServerName
Assert-AreEqual $pe1.AgentName $a1.AgentName
Expand All @@ -106,7 +106,7 @@ function Test-GetJobPrivateEndpoint
# Validate with Piping
$pe1 = $a1 | Get-AzSqlElasticJobPrivateEndpoint -Name $peName

## valide agent level properties
## valid agent level properties
Assert-AreEqual $pe1.ResourceGroupName $a1.ResourceGroupName
Assert-AreEqual $pe1.ServerName $a1.ServerName
Assert-AreEqual $pe1.AgentName $a1.AgentName
Expand Down Expand Up @@ -147,7 +147,7 @@ function Test-RemoveJobPrivateEndpoint

$pe1 = Get-AzSqlElasticJobPrivateEndpoint -ElasticJobAgentObject $a1 -Name $peName

# valide agent level properties
# valid agent level properties
Assert-AreEqual $pe1.ResourceGroupName $a1.ResourceGroupName
Assert-AreEqual $pe1.ServerName $a1.ServerName
Assert-AreEqual $pe1.AgentName $a1.AgentName
Expand All @@ -162,7 +162,7 @@ function Test-RemoveJobPrivateEndpoint

$pe1 = Remove-AzSqlElasticJobPrivateEndpoint -ElasticJobAgentObject $a1 -Name $peName -Force

# valide agent level properties
# valid agent level properties
Assert-AreEqual $pe1.ResourceGroupName $a1.ResourceGroupName
Assert-AreEqual $pe1.ServerName $a1.ServerName
Assert-AreEqual $pe1.AgentName $a1.AgentName
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -266,7 +266,7 @@ function Test-RemoveTargetGroupWithDefaultParam ($a1)

<#
.SYNOPSIS
Tests removing a target group with inpuut object
Tests removing a target group with input object
.DESCRIPTION
SmokeTest
#>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ function Test-EndpointCertificate
Assert-NotNull $listCerts
Assert-AreEqual $listCerts.Count 2

# Get non existant cert #1 THROWS (via DeleteByInputObjectParameterSet)
# Get non existent cert #1 THROWS (via DeleteByInputObjectParameterSet)
$msgExcGet = "The requested resource of type '" + $endpointCertType + "' with name '" + "INVALID_TYPE" + "' was not found."
Assert-Throws { Get-AzSqlInstanceEndpointCertificate -InstanceObject $instance -EndpointType "INVALID_TYPE" } $msgExc

Expand Down
4 changes: 2 additions & 2 deletions src/Sql/Sql.Test/ScenarioTests/InstanceFailoverGroupTests.cs
Original file line number Diff line number Diff line change
Expand Up @@ -95,14 +95,14 @@ public void TestSetInstanceFailoverGroup_ManualToAutomaticNoGracePeriod()
TestRunner.RunTestScript("Test-SetInstanceFailoverGroup-ManualToAutomaticNoGracePeriod");
}

[Fact(Skip = "Command Swith should be executed on secondary.")]
[Fact(Skip = "Command Switch should be executed on secondary.")]
[Trait(Category.AcceptanceType, Category.CheckIn)]
public void Test_SwitchInstanceFailoverGroup()
{
TestRunner.RunTestScript("Test-SwitchInstanceFailoverGroup");
}

[Fact(Skip = "Command Swith should be executed on secondary.")]
[Fact(Skip = "Command Switch should be executed on secondary.")]
[Trait(Category.AcceptanceType, Category.CheckIn)]
public void Test_SwitchInstanceFailoverGroupAllowDataLoss()
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -262,7 +262,7 @@ function Test-ManagedInstanceLongTermRetentionResourceGroupBasedBackup
# Set the weekly retention on the database so that the first backup gets picked up, for example:
# Set-AzSqlInstanceDatabaseBackupLongTermRetentionPolicy -ResourceGroup $resourceGroup -InstanceName $managedInstanceName -DatabaseName $databaseName -WeeklyRetention P1W
# Wait about 18 hours until it gets properly copied and you see the backup when run get backups, for example:
# Get-AzSqlInstanceDatabaseLongTermRetentionBackup -Location $locationName -ServerName $serverName -DatabaeName $databaseName -ResourceGroupName $resourceGroup
# Get-AzSqlInstanceDatabaseLongTermRetentionBackup -Location $locationName -ServerName $serverName -DatabaseName $databaseName -ResourceGroupName $resourceGroup
$resourceGroup = "v-sntani-test-mi-rg"
$locationName = "westcentralus"
$managedInstanceName = "managedinstancearm"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -193,7 +193,7 @@ function Test-RestoreManagedDatabase
$targetManagedDatabaseName = Get-ManagedDatabaseName
$pointInTime = (Get-date).AddMinutes(5)

# Once database is created, backup service will automaticly take log backups every 5 minutes. We are waiting 450s to ensure backups are taken to which we can restore.
# Once database is created, backup service will automatically take log backups every 5 minutes. We are waiting 450s to ensure backups are taken to which we can restore.
if([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -eq "Record"){
Wait-Seconds 450
}
Expand Down Expand Up @@ -257,7 +257,7 @@ function Test-RestoreDeletedManagedDatabase
# Test remove using all parameters
Remove-AzSqlInstanceDatabase -ResourceGroupName $rg.ResourceGroupName -InstanceName $managedInstance.ManagedInstanceName -Name $managedDatabaseName -Force

# Wait to stabilaze
# Wait to stabilize
Wait-Seconds 60

# Get deleted database
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -135,7 +135,7 @@ function Test-CompleteManagedDatabaseLogReplay
-InstanceName $managedInstance `
-Name $managedDatabaseName

# Wait until restore state is Complted - this means restore has completed
# Wait until restore state is Completed - this means restore has completed
#
$status = $statusResponse.Status
if($status -eq $statusCompleted){
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ public void TestCreateUpdateManagedInstanceWithMinimalTlsVersion()
TestRunner.RunTestScript("Test-CreateUpdateManagedInstanceWithMinimalTlsVersion");
}

[Fact(Skip = "It is unknow for now how to fix this.")]
[Fact(Skip = "It is unknown for now how to fix this.")]
[Trait(Category.AcceptanceType, Category.CheckIn)]
public void TestCreateManagedInstanceWithMaintenanceConfigurationId()
{
Expand Down
Loading
Loading