From bef420162ec9801332f67a817cce925aae38edc1 Mon Sep 17 00:00:00 2001 From: Anton Kolesnyk <41349689+antkmsft@users.noreply.github.com> Date: Sun, 17 Nov 2024 23:06:28 -0800 Subject: [PATCH] Fix typos (#6234) * Fix typos * Fix name collision * Re-trigger CI * Re-trigger CI --------- Co-authored-by: Anton Kolesnyk --- .../src/attestation_administration_client.cpp | 10 +++++----- .../src/attestation_client.cpp | 10 +++++----- .../azure-core/inc/azure/core/dll_import_export.hpp | 2 +- sdk/core/azure-core/src/http/curl/curl.cpp | 4 ++-- .../src/http/curl/curl_connection_private.hpp | 2 +- .../inc/azure/messaging/eventhubs/event_data_batch.hpp | 2 +- .../src/processor_load_balancer.cpp | 8 ++++---- .../test/ut/eventhubs_admin_client.cpp | 10 +++++----- .../test/ut/processor_load_balancer_test.cpp | 8 ++++---- .../azure-identity/src/azure_cli_credential.cpp | 2 +- .../azure-identity/src/client_credential_core.cpp | 2 +- .../azure-identity/src/default_azure_credential.cpp | 2 +- .../test/ut/default_azure_credential_test.cpp | 2 +- .../azure/keyvault/administration/backup_operation.hpp | 4 ++-- .../src/backup_client.cpp | 10 +++++----- .../src/settings_client.cpp | 10 +++++----- .../src/certificate_client.cpp | 10 +++++----- .../src/private/certificate_serializers.hpp | 2 +- .../inc/azure/keyvault/keys/key_client_models.hpp | 4 ++-- .../src/cryptography/cryptography_client.cpp | 10 +++++----- .../src/cryptography/signature_algorithm.cpp | 2 +- .../src/delete_key_operation.cpp | 2 +- .../azure-security-keyvault-keys/src/key_client.cpp | 10 +++++----- .../src/recover_deleted_key_operation.cpp | 2 +- .../test/ut/mocked_transport_adapter_test.hpp | 8 ++++---- .../inc/azure/keyvault/secrets/keyvault_operations.hpp | 4 ++-- .../src/secret_client.cpp | 10 +++++----- .../azure-data-tables/src/private/tables_constants.hpp | 2 +- sdk/tables/azure-data-tables/src/table_clients.cpp | 6 +++--- 29 files changed, 80 insertions(+), 80 deletions(-) diff --git a/sdk/attestation/azure-security-attestation/src/attestation_administration_client.cpp b/sdk/attestation/azure-security-attestation/src/attestation_administration_client.cpp index da9ff53d9..a528c472b 100644 --- a/sdk/attestation/azure-security-attestation/src/attestation_administration_client.cpp +++ b/sdk/attestation/azure-security-attestation/src/attestation_administration_client.cpp @@ -49,23 +49,23 @@ AttestationAdministrationClient::AttestationAdministrationClient( "azure-security-attestation-cpp", PackageVersion::ToString()} { - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; if (credential) { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {"https://attest.azure.net/.default"}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique(credential, tokenContext)); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, "security.attestation", PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } AttestationAdministrationClient AttestationAdministrationClient::Create( diff --git a/sdk/attestation/azure-security-attestation/src/attestation_client.cpp b/sdk/attestation/azure-security-attestation/src/attestation_client.cpp index aee46a7a9..6161e39c9 100644 --- a/sdk/attestation/azure-security-attestation/src/attestation_client.cpp +++ b/sdk/attestation/azure-security-attestation/src/attestation_client.cpp @@ -39,23 +39,23 @@ AttestationClient::AttestationClient( "azure-security-attestation-cpp", PackageVersion::ToString()} { - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; if (credential) { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {"https://attest.azure.net/.default"}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique(credential, tokenContext)); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, "security.attestation", PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } Azure::Response AttestationClient::GetOpenIdMetadata( diff --git a/sdk/core/azure-core/inc/azure/core/dll_import_export.hpp b/sdk/core/azure-core/inc/azure/core/dll_import_export.hpp index a3c95a934..a9fdee9cf 100644 --- a/sdk/core/azure-core/inc/azure/core/dll_import_export.hpp +++ b/sdk/core/azure-core/inc/azure/core/dll_import_export.hpp @@ -51,7 +51,7 @@ // endif() // // And if the SDK is being consumed using the neither option from the above (neither cmake -// fetchcontent nor a package, but some custom build process that is unknown to us, yet uncapable of +// fetchcontent nor a package, but some custom build process that is unknown to us, yet incapable of // handling AZ_xxx_BUILT_AS_DLL correctly), there is always an option for th consumer to define // AZ_xxx_DLL manually. // -- diff --git a/sdk/core/azure-core/src/http/curl/curl.cpp b/sdk/core/azure-core/src/http/curl/curl.cpp index 40c9efadf..f5f3533f5 100644 --- a/sdk/core/azure-core/src/http/curl/curl.cpp +++ b/sdk/core/azure-core/src/http/curl/curl.cpp @@ -785,7 +785,7 @@ void CurlSession::ParseChunkSize(Context const& context) if (index + 1 == this->m_innerBufferSize) { /* - * index + 1 represents the next possition to Read. If that's equal to the inner buffer + * index + 1 represents the next position to Read. If that's equal to the inner buffer * size it means that there is no more data and we need to fetch more from network. And * whatever we fetch will be the start of the chunk data. The bodyStart is set to 0 to * indicate the the next read call should read from the inner buffer start. @@ -2562,7 +2562,7 @@ CurlConnection::CurlConnection( if (result != CURLE_OK) { throw Http::TransportException( - "Broken connection. Couldn't get the active sockect for it." + "Broken connection. Couldn't get the active socket for it." + std::string(curl_easy_strerror(result))); } } diff --git a/sdk/core/azure-core/src/http/curl/curl_connection_private.hpp b/sdk/core/azure-core/src/http/curl/curl_connection_private.hpp index 1ddd0eae2..dc7bb3675 100644 --- a/sdk/core/azure-core/src/http/curl/curl_connection_private.hpp +++ b/sdk/core/azure-core/src/http/curl/curl_connection_private.hpp @@ -61,7 +61,7 @@ namespace Azure { namespace Core { constexpr static int32_t DefaultCleanerIntervalMilliseconds = 1000 * 90; // 60 sec -> expired connection is when it waits for 60 sec or more and it's not re-used constexpr static int32_t DefaultConnectionExpiredMilliseconds = 1000 * 60; - // Define the maximun allowed connections per host-index in the pool. If this number is + // Define the maximum allowed connections per host-index in the pool. If this number is // reached for the host-index, next connections trying to be added to the pool will be // ignored. constexpr static int32_t MaxConnectionsPerIndex = 1024; diff --git a/sdk/eventhubs/azure-messaging-eventhubs/inc/azure/messaging/eventhubs/event_data_batch.hpp b/sdk/eventhubs/azure-messaging-eventhubs/inc/azure/messaging/eventhubs/event_data_batch.hpp index 507ec6bd6..f62b07ec4 100644 --- a/sdk/eventhubs/azure-messaging-eventhubs/inc/azure/messaging/eventhubs/event_data_batch.hpp +++ b/sdk/eventhubs/azure-messaging-eventhubs/inc/azure/messaging/eventhubs/event_data_batch.hpp @@ -181,7 +181,7 @@ namespace Azure { namespace Messaging { namespace EventHubs { { if (!options.PartitionId.empty() && !options.PartitionKey.empty()) { - throw std::runtime_error("Either PartionID or PartitionKey can be set, but not both."); + throw std::runtime_error("Either PartitionID or PartitionKey can be set, but not both."); } if (options.PartitionId.empty()) diff --git a/sdk/eventhubs/azure-messaging-eventhubs/src/processor_load_balancer.cpp b/sdk/eventhubs/azure-messaging-eventhubs/src/processor_load_balancer.cpp index 84ffea452..2b99c5778 100644 --- a/sdk/eventhubs/azure-messaging-eventhubs/src/processor_load_balancer.cpp +++ b/sdk/eventhubs/azure-messaging-eventhubs/src/processor_load_balancer.cpp @@ -169,15 +169,15 @@ std::vector ProcessorLoadBalancer::GreedyLoadBalancer( (void)context; std::vector ours = loadBalancerInfo.Current; // try claiming from the completely unowned or expires ownerships _first_ - std::vector randomOwneships = GetRandomOwnerships( + std::vector randomOwnerships = GetRandomOwnerships( loadBalancerInfo.UnownedOrExpired, loadBalancerInfo.MaxAllowed - ours.size()); - ours.insert(ours.end(), randomOwneships.begin(), randomOwneships.end()); + ours.insert(ours.end(), randomOwnerships.begin(), randomOwnerships.end()); if (ours.size() < loadBalancerInfo.MaxAllowed) { // try claiming from the completely unowned or expires ownerships _first_ - std::vector randomOwnerships + std::vector additionalRandomOwnerships = GetRandomOwnerships(loadBalancerInfo.AboveMax, loadBalancerInfo.MaxAllowed - ours.size()); - ours.insert(ours.end(), randomOwnerships.begin(), randomOwnerships.end()); + ours.insert(ours.end(), additionalRandomOwnerships.begin(), additionalRandomOwnerships.end()); } for (Models::Ownership& ownership : ours) { diff --git a/sdk/eventhubs/azure-messaging-eventhubs/test/ut/eventhubs_admin_client.cpp b/sdk/eventhubs/azure-messaging-eventhubs/test/ut/eventhubs_admin_client.cpp index 3f5188a90..847dafc13 100644 --- a/sdk/eventhubs/azure-messaging-eventhubs/test/ut/eventhubs_admin_client.cpp +++ b/sdk/eventhubs/azure-messaging-eventhubs/test/ut/eventhubs_admin_client.cpp @@ -29,24 +29,24 @@ namespace Azure { namespace Messaging { namespace EventHubs { namespace Test { { Azure::Core::_internal::ClientOptions options; - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {"https://management.azure.com/.default"}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique( credential, tokenContext)); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; options.Telemetry.ApplicationId = "eventhubs.test"; m_pipeline = std::make_shared( options, "eventhubs.test", "1.0.0", - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } EventHubsManagement::EventHubsCreateOrUpdateOperation EventHubsManagement::CreateNamespace( diff --git a/sdk/eventhubs/azure-messaging-eventhubs/test/ut/processor_load_balancer_test.cpp b/sdk/eventhubs/azure-messaging-eventhubs/test/ut/processor_load_balancer_test.cpp index ffdc882ae..aebd571bf 100644 --- a/sdk/eventhubs/azure-messaging-eventhubs/test/ut/processor_load_balancer_test.cpp +++ b/sdk/eventhubs/azure-messaging-eventhubs/test/ut/processor_load_balancer_test.cpp @@ -128,9 +128,9 @@ namespace Azure { namespace Messaging { namespace EventHubs { namespace Test { EXPECT_TRUE(ownerships[0].PartitionId == "1" || ownerships[0].PartitionId == "2"); EXPECT_TRUE(ownerships[1].PartitionId == "1" || ownerships[1].PartitionId == "2"); - auto finalOwneships = loadBalancer.m_checkpointStore->ListOwnership( + auto finalOwnerships = loadBalancer.m_checkpointStore->ListOwnership( testEventHubFQDN, testEventHubName, testConsumerGroup); - EXPECT_EQ(finalOwneships.size(), 4ul); + EXPECT_EQ(finalOwnerships.size(), 4ul); } TEST_F(ProcessorLoadBalancerTest, Balanced_UnownedPartitions) @@ -183,9 +183,9 @@ namespace Azure { namespace Messaging { namespace EventHubs { namespace Test { auto ownerships = loadBalancer.LoadBalance(std::vector{"0", "1", "2", "3"}); EXPECT_FALSE(ownerships.size() == 0); - auto finalOwneships = loadBalancer.m_checkpointStore->ListOwnership( + auto finalOwnerships = loadBalancer.m_checkpointStore->ListOwnership( testEventHubFQDN, testEventHubName, testConsumerGroup); - auto ownersMap = GroupByOwner(finalOwneships); + auto ownersMap = GroupByOwner(finalOwnerships); auto commons = FindCommon(ownersMap); EXPECT_EQ(commons.size(), 0ul); } diff --git a/sdk/identity/azure-identity/src/azure_cli_credential.cpp b/sdk/identity/azure-identity/src/azure_cli_credential.cpp index 41c2c7d32..9d2944fc5 100644 --- a/sdk/identity/azure-identity/src/azure_cli_credential.cpp +++ b/sdk/identity/azure-identity/src/azure_cli_credential.cpp @@ -200,7 +200,7 @@ AccessToken AzureCliCredential::GetToken( // json::exception gets thrown when a string we provided for parsing is not a json object. // It should not get thrown if the string is a valid JSON, but there are specific problems // with the token JSON object - missing property, failure to parse a specific property etc. - // I.e. this means that the az commnd has rather printed some error message + // I.e. this means that the az command has rather printed some error message // (such as "ERROR: Please run az login to setup account.") instead of producing a JSON // object output. In this case, we want the exception to be thrown with the output from the // command (which is likely the error message) and not with the details of the exception diff --git a/sdk/identity/azure-identity/src/client_credential_core.cpp b/sdk/identity/azure-identity/src/client_credential_core.cpp index 81d99a299..7d7f0cec1 100644 --- a/sdk/identity/azure-identity/src/client_credential_core.cpp +++ b/sdk/identity/azure-identity/src/client_credential_core.cpp @@ -14,7 +14,7 @@ using Azure::Identity::_detail::TenantIdResolver; using Azure::Identity::_detail::TokenCredentialImpl; // The authority host used by the credentials is in the following order of precedence: -// 1. AuthorityHost option set/overriden by the user. +// 1. AuthorityHost option set/overridden by the user. // 2. The value of AZURE_AUTHORITY_HOST environment variable, which is the default value of the // option. // 3. If that environment variable isn't set or is empty, use Azure Public Cloud. diff --git a/sdk/identity/azure-identity/src/default_azure_credential.cpp b/sdk/identity/azure-identity/src/default_azure_credential.cpp index e6dafd328..9062fa472 100644 --- a/sdk/identity/azure-identity/src/default_azure_credential.cpp +++ b/sdk/identity/azure-identity/src/default_azure_credential.cpp @@ -27,7 +27,7 @@ DefaultAzureCredential::DefaultAzureCredential( IdentityLog::Write( IdentityLog::Level::Verbose, "Creating " + GetCredentialName() - + " which combines mutiple parameterless credentials into a single one.\n" + + " which combines multiple parameterless credentials into a single one.\n" + GetCredentialName() + " is only recommended for the early stages of development, " "and not for usage in production environment." diff --git a/sdk/identity/azure-identity/test/ut/default_azure_credential_test.cpp b/sdk/identity/azure-identity/test/ut/default_azure_credential_test.cpp index d57195238..5d40e5d9f 100644 --- a/sdk/identity/azure-identity/test/ut/default_azure_credential_test.cpp +++ b/sdk/identity/azure-identity/test/ut/default_azure_credential_test.cpp @@ -175,7 +175,7 @@ TEST(DefaultAzureCredential, LogMessages) EXPECT_EQ( log[0].second, "Identity: Creating DefaultAzureCredential which combines " - "mutiple parameterless credentials into a single one." + "multiple parameterless credentials into a single one." "\nDefaultAzureCredential is only recommended for the early stages of development, " "and not for usage in production environment." "\nOnce the developer focuses on the Credentials and Authentication aspects of their " diff --git a/sdk/keyvault/azure-security-keyvault-administration/inc/azure/keyvault/administration/backup_operation.hpp b/sdk/keyvault/azure-security-keyvault-administration/inc/azure/keyvault/administration/backup_operation.hpp index e59f39dbf..89974c272 100644 --- a/sdk/keyvault/azure-security-keyvault-administration/inc/azure/keyvault/administration/backup_operation.hpp +++ b/sdk/keyvault/azure-security-keyvault-administration/inc/azure/keyvault/administration/backup_operation.hpp @@ -44,7 +44,7 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Administra /** * @brief Only friend classes are permitted to construct a BackupOperation. This is - * because a KeyVaultPipelne is required and it is not exposed to customers. + * because a KeyVaultPipeline is required and it is not exposed to customers. * * @param backupClient A #BackupClient that is used for getting status updates. * @param status A BackupOperationStatus object. @@ -59,7 +59,7 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Administra m_isBackupOperation{isBackupOperation} {}; /** * @brief Only friend classes are permitted to construct a BackupOperation. This is - * because a KeyVaultPipelne is required and it is not exposed to customers. + * because a KeyVaultPipeline is required and it is not exposed to customers. * @param backupClient A BackupClient that is used for getting status updates. * @param continuationToken A string that is used to resume the operation. * @param isBackupOperation A boolean indicating if the operation is a backup operation or a diff --git a/sdk/keyvault/azure-security-keyvault-administration/src/backup_client.cpp b/sdk/keyvault/azure-security-keyvault-administration/src/backup_client.cpp index fc28a2c09..ec41b03ed 100644 --- a/sdk/keyvault/azure-security-keyvault-administration/src/backup_client.cpp +++ b/sdk/keyvault/azure-security-keyvault-administration/src/backup_client.cpp @@ -34,23 +34,23 @@ BackupClient::BackupClient( BackupClientOptions options) : m_vaultBaseUrl(vaultUrl), m_apiVersion(options.ApiVersion) { - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {_internal::UrlScope::GetScopeFromUrl(m_vaultBaseUrl)}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique<_internal::KeyVaultChallengeBasedAuthenticationPolicy>( credential, std::move(tokenContext))); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, _detail::KeyVaultServicePackageName, _detail::PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } Azure::Response BackupClient::FullBackup( diff --git a/sdk/keyvault/azure-security-keyvault-administration/src/settings_client.cpp b/sdk/keyvault/azure-security-keyvault-administration/src/settings_client.cpp index 0d21b0ae1..cf128dcf9 100644 --- a/sdk/keyvault/azure-security-keyvault-administration/src/settings_client.cpp +++ b/sdk/keyvault/azure-security-keyvault-administration/src/settings_client.cpp @@ -49,23 +49,23 @@ SettingsClient::SettingsClient( { auto apiVersion = options.ApiVersion; - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {_internal::UrlScope::GetScopeFromUrl(m_vaultUrl)}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique<_internal::KeyVaultChallengeBasedAuthenticationPolicy>( credential, std::move(tokenContext))); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, _detail::KeyVaultServicePackageName, _detail::PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } Azure::Response SettingsClient::UpdateSetting( diff --git a/sdk/keyvault/azure-security-keyvault-certificates/src/certificate_client.cpp b/sdk/keyvault/azure-security-keyvault-certificates/src/certificate_client.cpp index 188fdb5ca..b5b70c8ae 100644 --- a/sdk/keyvault/azure-security-keyvault-certificates/src/certificate_client.cpp +++ b/sdk/keyvault/azure-security-keyvault-certificates/src/certificate_client.cpp @@ -70,23 +70,23 @@ CertificateClient::CertificateClient( { auto apiVersion = options.ApiVersion; - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {_internal::UrlScope::GetScopeFromUrl(m_vaultUrl)}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique<_internal::KeyVaultChallengeBasedAuthenticationPolicy>( credential, std::move(tokenContext))); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, KeyVaultServicePackageName, PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } Response CertificateClient::GetCertificate( diff --git a/sdk/keyvault/azure-security-keyvault-certificates/src/private/certificate_serializers.hpp b/sdk/keyvault/azure-security-keyvault-certificates/src/private/certificate_serializers.hpp index 1fcec0bf7..a49a04fef 100644 --- a/sdk/keyvault/azure-security-keyvault-certificates/src/private/certificate_serializers.hpp +++ b/sdk/keyvault/azure-security-keyvault-certificates/src/private/certificate_serializers.hpp @@ -138,7 +138,7 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Certificat CertificateContactsSerializer() = delete; public: - static std::string Serialize(std::vector const& constacts); + static std::string Serialize(std::vector const& contacts); static CertificateContactsResult Deserialize( Azure::Core::Http::RawResponse const& rawResponse); }; diff --git a/sdk/keyvault/azure-security-keyvault-keys/inc/azure/keyvault/keys/key_client_models.hpp b/sdk/keyvault/azure-security-keyvault-keys/inc/azure/keyvault/keys/key_client_models.hpp index 69702051b..ed0506994 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/inc/azure/keyvault/keys/key_client_models.hpp +++ b/sdk/keyvault/azure-security-keyvault-keys/inc/azure/keyvault/keys/key_client_models.hpp @@ -860,7 +860,7 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Keys { /* * Only friend classes are permitted to construct a DeleteOperation. This is because a - * KeyVaultPipelne is required and it is not exposed to customers. + * KeyVaultPipeline is required and it is not exposed to customers. * * Since C++ doesn't offer `internal` access, we use friends-only instead. */ @@ -951,7 +951,7 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Keys { /* * Only friend classes are permitted to construct a RecoverDeletedKeyOperation. This is - * because a KeyVaultPipelne is required and it is not exposed to customers. + * because a KeyVaultPipeline is required and it is not exposed to customers. * * Since C++ doesn't offer `internal` access, we use friends-only instead. */ diff --git a/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/cryptography_client.cpp b/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/cryptography_client.cpp index 18fdfccc4..1aac194ce 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/cryptography_client.cpp +++ b/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/cryptography_client.cpp @@ -99,23 +99,23 @@ CryptographyClient::CryptographyClient( CryptographyClientOptions const& options) : m_keyId(Azure::Core::Url(keyId)), m_apiVersion(options.Version) { - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {_internal::UrlScope::GetScopeFromUrl(m_keyId)}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique<_internal::KeyVaultChallengeBasedAuthenticationPolicy>( std::move(credential), tokenContext)); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, KeyVaultServicePackageName, PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } Azure::Response CryptographyClient::Encrypt( diff --git a/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/signature_algorithm.cpp b/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/signature_algorithm.cpp index a343ecae8..38171c4fb 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/signature_algorithm.cpp +++ b/sdk/keyvault/azure-security-keyvault-keys/src/cryptography/signature_algorithm.cpp @@ -42,7 +42,7 @@ namespace Azure { { return std::make_unique(); } - throw std::runtime_error("Unkown Hash algorithm for: " + m_value); + throw std::runtime_error("Unknown Hash algorithm for: " + m_value); } }}}}} // namespace Azure::Security::KeyVault::Keys::Cryptography diff --git a/sdk/keyvault/azure-security-keyvault-keys/src/delete_key_operation.cpp b/sdk/keyvault/azure-security-keyvault-keys/src/delete_key_operation.cpp index ddd68a5a8..535b8117c 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/src/delete_key_operation.cpp +++ b/sdk/keyvault/azure-security-keyvault-keys/src/delete_key_operation.cpp @@ -49,7 +49,7 @@ Azure::Security::KeyVault::Keys::DeleteKeyOperation::PollInternal( } // To ensure the success of calling Poll multiple times, even after operation is completed, a - // copy of the raw HTTP response is returned instead of transfering the ownership of the raw + // copy of the raw HTTP response is returned instead of transferring the ownership of the raw // response inside the Operation. return rawResponse; } diff --git a/sdk/keyvault/azure-security-keyvault-keys/src/key_client.cpp b/sdk/keyvault/azure-security-keyvault-keys/src/key_client.cpp index 6de6fd48b..c496ffe06 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/src/key_client.cpp +++ b/sdk/keyvault/azure-security-keyvault-keys/src/key_client.cpp @@ -71,23 +71,23 @@ KeyClient::KeyClient( KeyClientOptions const& options) : m_vaultUrl(vaultUrl), m_apiVersion(options.ApiVersion) { - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {_internal::UrlScope::GetScopeFromUrl(m_vaultUrl)}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique<_internal::KeyVaultChallengeBasedAuthenticationPolicy>( std::move(credential), std::move(tokenContext))); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, KeyVaultServicePackageName, PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } Azure::Response KeyClient::GetKey( diff --git a/sdk/keyvault/azure-security-keyvault-keys/src/recover_deleted_key_operation.cpp b/sdk/keyvault/azure-security-keyvault-keys/src/recover_deleted_key_operation.cpp index 3753e7cdc..91644591c 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/src/recover_deleted_key_operation.cpp +++ b/sdk/keyvault/azure-security-keyvault-keys/src/recover_deleted_key_operation.cpp @@ -46,7 +46,7 @@ Azure::Security::KeyVault::Keys::RecoverDeletedKeyOperation::PollInternal( } // To ensure the success of calling Poll multiple times, even after operation is completed, a - // copy of the raw HTTP response is returned instead of transfering the ownership of the raw + // copy of the raw HTTP response is returned instead of transferring the ownership of the raw // response inside the Operation. return rawResponse; } diff --git a/sdk/keyvault/azure-security-keyvault-keys/test/ut/mocked_transport_adapter_test.hpp b/sdk/keyvault/azure-security-keyvault-keys/test/ut/mocked_transport_adapter_test.hpp index 85f5a4ead..946848cee 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/test/ut/mocked_transport_adapter_test.hpp +++ b/sdk/keyvault/azure-security-keyvault-keys/test/ut/mocked_transport_adapter_test.hpp @@ -108,14 +108,14 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Keys { nam KeyClientOptions const& options = KeyClientOptions()) : KeyClient(vaultUrl, nullptr, options) { - std::vector> perCallpolicies; - std::vector> perRetrypolicies; + std::vector> perCallPolicies; + std::vector> perRetryPolicies; m_pipeline = std::make_unique( options, "keyvault-keys", Azure::Security::KeyVault::Keys::_detail::PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } }; diff --git a/sdk/keyvault/azure-security-keyvault-secrets/inc/azure/keyvault/secrets/keyvault_operations.hpp b/sdk/keyvault/azure-security-keyvault-secrets/inc/azure/keyvault/secrets/keyvault_operations.hpp index e34f83513..33b7a324e 100644 --- a/sdk/keyvault/azure-security-keyvault-secrets/inc/azure/keyvault/secrets/keyvault_operations.hpp +++ b/sdk/keyvault/azure-security-keyvault-secrets/inc/azure/keyvault/secrets/keyvault_operations.hpp @@ -39,7 +39,7 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Secrets { /* * Only friend classes are permitted to construct an Operation. This is because a - * KeyVaultPipelne is required and it is not exposed to customers. + * KeyVaultPipeline is required and it is not exposed to customers. * * Since C++ doesn't offer `internal` access, we use friends-only instead. */ @@ -105,7 +105,7 @@ namespace Azure { namespace Security { namespace KeyVault { namespace Secrets { /* * Only friend classes are permitted to call the constructor . This is because a - * KeyVaultPipelne is required and it is not exposed to customers. + * KeyVaultPipeline is required and it is not exposed to customers. * * Since C++ doesn't offer `internal` access, we use friends-only instead. */ diff --git a/sdk/keyvault/azure-security-keyvault-secrets/src/secret_client.cpp b/sdk/keyvault/azure-security-keyvault-secrets/src/secret_client.cpp index 8528e1b78..b8031055a 100644 --- a/sdk/keyvault/azure-security-keyvault-secrets/src/secret_client.cpp +++ b/sdk/keyvault/azure-security-keyvault-secrets/src/secret_client.cpp @@ -68,24 +68,24 @@ SecretClient::SecretClient( auto apiVersion = options.ApiVersion; Azure::Core::Url url(vaultUrl); - std::vector> perRetrypolicies; + std::vector> perRetryPolicies; { Azure::Core::Credentials::TokenRequestContext tokenContext; tokenContext.Scopes = {_internal::UrlScope::GetScopeFromUrl(url)}; - perRetrypolicies.emplace_back( + perRetryPolicies.emplace_back( std::make_unique<_internal::KeyVaultChallengeBasedAuthenticationPolicy>( credential, tokenContext)); } - std::vector> perCallpolicies; + std::vector> perCallPolicies; m_pipeline = std::make_shared( options, KeyVaultServicePackageName, PackageVersion::ToString(), - std::move(perRetrypolicies), - std::move(perCallpolicies)); + std::move(perRetryPolicies), + std::move(perCallPolicies)); } Azure::Response SecretClient::GetSecret( diff --git a/sdk/tables/azure-data-tables/src/private/tables_constants.hpp b/sdk/tables/azure-data-tables/src/private/tables_constants.hpp index 8dbdc73b8..b46b3ce0f 100644 --- a/sdk/tables/azure-data-tables/src/private/tables_constants.hpp +++ b/sdk/tables/azure-data-tables/src/private/tables_constants.hpp @@ -17,7 +17,7 @@ namespace Azure { namespace Data { namespace Tables { namespace _detail { // various strings used in the library constexpr static const char* OriginHeader = "Origin"; constexpr static const char* AccessControlRequestMethodHeader = "Access-Control-Request-Method"; - constexpr static const char* ResrouceTypeService = "service"; + constexpr static const char* ResourceTypeService = "service"; constexpr static const char* ComponentProperties = "properties"; constexpr static const char* ContentTypeXml = "application/xml"; constexpr static const char* ContentTypeJson = "application/json"; diff --git a/sdk/tables/azure-data-tables/src/table_clients.cpp b/sdk/tables/azure-data-tables/src/table_clients.cpp index 7187269cd..7fd301287 100644 --- a/sdk/tables/azure-data-tables/src/table_clients.cpp +++ b/sdk/tables/azure-data-tables/src/table_clients.cpp @@ -119,7 +119,7 @@ Azure::Response TableServiceClient::SetServi std::string xmlBody = Serializers::SetServiceProperties(options); auto url = m_url; - url.AppendQueryParameter(ResourceTypeHeader, ResrouceTypeService); + url.AppendQueryParameter(ResourceTypeHeader, ResourceTypeService); url.AppendQueryParameter(CompHeader, ComponentProperties); Core::IO::MemoryBodyStream requestBody( reinterpret_cast(xmlBody.data()), xmlBody.length()); @@ -146,7 +146,7 @@ Azure::Response TableServiceClient::GetServicePr Core::Context const& context) { auto url = m_url; - url.AppendQueryParameter(ResourceTypeHeader, ResrouceTypeService); + url.AppendQueryParameter(ResourceTypeHeader, ResourceTypeService); url.AppendQueryParameter(CompHeader, ComponentProperties); Core::Http::Request request(Core::Http::HttpMethod::Get, url); @@ -173,7 +173,7 @@ Azure::Response TableServiceClient::GetStatistics( std::string accountName = host.substr(0, host.find('.')); accountName += "-secondary"; url.SetHost(accountName + "." + host.substr(host.find('.') + 1)); - url.AppendQueryParameter(ResourceTypeHeader, ResrouceTypeService); + url.AppendQueryParameter(ResourceTypeHeader, ResourceTypeService); url.AppendQueryParameter(CompHeader, "stats"); Core::Http::Request request(Core::Http::HttpMethod::Get, url);