diff --git a/Docs/operational-scripts.md b/Docs/operational-scripts.md index 2434cfbc..8823790f 100644 --- a/Docs/operational-scripts.md +++ b/Docs/operational-scripts.md @@ -46,7 +46,7 @@ Parameters: * **OutputFolder**: Output Folder. Defaults to the path 'Output'. -* **AutoCreateParameters**: Automatically create parameters for Azure Policy Sets and Assginment Files. +* **AutoCreateParameters**: Automatically create parameters for Azure Policy Sets and Assignment Files. * **UseBuiltIn**: Default to using builtin policies rather than local versions. diff --git a/Scripts/Helpers/Build-AssignmentDefinitionAtLeaf.ps1 b/Scripts/Helpers/Build-AssignmentDefinitionAtLeaf.ps1 index 61283579..7b59ff07 100644 --- a/Scripts/Helpers/Build-AssignmentDefinitionAtLeaf.ps1 +++ b/Scripts/Helpers/Build-AssignmentDefinitionAtLeaf.ps1 @@ -159,7 +159,7 @@ function Build-AssignmentDefinitionAtLeaf { continue } elseif (-not (Confirm-ValidPolicyResourceName -Name $name)) { - Write-Error " Leaf Node $($nodeName): Assignment name '$name' contains invalid charachters <>*%&:?.+/ or ends with a space." + Write-Error " Leaf Node $($nodeName): Assignment name '$name' contains invalid characters <>*%&:?.+/ or ends with a space." $hasErrors = $true continue } diff --git a/Scripts/Helpers/Build-AssignmentPlan.ps1 b/Scripts/Helpers/Build-AssignmentPlan.ps1 index d60b7517..d8117bf3 100644 --- a/Scripts/Helpers/Build-AssignmentPlan.ps1 +++ b/Scripts/Helpers/Build-AssignmentPlan.ps1 @@ -33,7 +33,7 @@ function Build-AssignmentPlan { Write-Warning "No Policy Assignment files found! Deleting any Policy Assignments." } - # Cache role assognments and definitions + # Cache role assignments and definitions $deployedPolicyAssignments = $deployedPolicyResources.policyassignments.managed $deployedRoleAssignmentsByPrincipalId = $DeployedPolicyResources.roleAssignmentsByPrincipalId $deleteCandidates = $deployedPolicyAssignments.Clone() @@ -330,12 +330,12 @@ function Build-AssignmentPlan { } otherPaC { if ($VerbosePreference -eq "Continue") { - Write-AssignmentDetails -DisplayName $displayName -Scope $shortScope -Prefix "Skipping delete (owened by other PaC):" -IdentityStatus $identityStatus + Write-AssignmentDetails -DisplayName $displayName -Scope $shortScope -Prefix "Skipping delete (owned by other PaC):" -IdentityStatus $identityStatus } } unknownOwner { if ($VerbosePreference -eq "Continue") { - Write-AssignmentDetails -DisplayName $displayName -Scope $shortScope -Prefix "Skipping delete owmed by unknown (strategy $strategy):" -IdentityStatus $identityStatus + Write-AssignmentDetails -DisplayName $displayName -Scope $shortScope -Prefix "Skipping delete owned by unknown (strategy $strategy):" -IdentityStatus $identityStatus } } managedByDfcSecurityPolicies { diff --git a/Scripts/Helpers/Build-ExemptionsPlan.ps1 b/Scripts/Helpers/Build-ExemptionsPlan.ps1 index cd1d1338..1ff52565 100644 --- a/Scripts/Helpers/Build-ExemptionsPlan.ps1 +++ b/Scripts/Helpers/Build-ExemptionsPlan.ps1 @@ -106,7 +106,7 @@ function Build-ExemptionsPlan { $errorInfo.hasLocalErrors = $false $entryNumber++ - #region read row values andd skip empty rows on CSV files + #region read row values and skip empty rows on CSV files $name = $row.name $displayName = $row.displayName $exemptionCategory = $row.exemptionCategory @@ -141,11 +141,11 @@ function Build-ExemptionsPlan { continue } } - #endregion read row values andd skip empty rows on CSV files + #endregion read row values and skip empty rows on CSV files if ($isCsvFile) { - #region CSV files can define the assignment with assignmentReferenceId or the leagcy policyAssignmentId + #region CSV files can define the assignment with assignmentReferenceId or the legacy policyAssignmentId if ([string]::IsNullOrWhitespace($assignmentReferenceId) -xor [string]::IsNullOrWhitespace($policyAssignmentId)) { if (-not [string]::IsNullOrWhitespace($assignmentReferenceId)) { if ($assignmentReferenceId.StartsWith("policyDefinitions/")) { @@ -173,7 +173,7 @@ function Build-ExemptionsPlan { else { Add-ErrorMessage -ErrorInfo $errorInfo -ErrorString "exactly one of the columns policyAssignmentId or assignmentReferenceId must have a non-empty cell" -EntryNumber $entryNumber } - #endregion CSV files can define the assignment with assignmentReferenceId or the leagcy policyAssignmentId + #endregion CSV files can define the assignment with assignmentReferenceId or the legacy policyAssignmentId #region Convert referenceIds into array (if cell empty, set to empty array) $final = @() @@ -202,7 +202,7 @@ function Build-ExemptionsPlan { } #endregion table must contain scope or scopes column - #region Convert resourceSelectors into array (if cell empty, set to Snull) + #region Convert resourceSelectors into array (if cell empty, set to $null) $resourceSelectors = $null $step1 = $row.resourceSelectors if (-not [string]::IsNullOrWhiteSpace($step1)) { @@ -219,7 +219,7 @@ function Build-ExemptionsPlan { } } } - #endregion Convert resourceSelectors into array (if cell empty, set to Snull) + #endregion Convert resourceSelectors into array (if cell empty, set to $null) #region convert metadata JSON to object $step1 = $row.metadata @@ -420,7 +420,7 @@ function Build-ExemptionsPlan { } else { if (-not (Confirm-ValidPolicyResourceName -Name $name)) { - Add-ErrorMessage -ErrorInfo $errorInfo -ErrorString "name '$($name.Substring(0, 32))...' contains invalid charachters <>*%&:?.+/ or ends with a space." -EntryNumber $entryNumber + Add-ErrorMessage -ErrorInfo $errorInfo -ErrorString "name '$($name.Substring(0, 32))...' contains invalid characters <>*%&:?.+/ or ends with a space." -EntryNumber $entryNumber } elseif ($name.Length -gt 64) { Add-ErrorMessage -ErrorInfo $errorInfo -ErrorString "name too long (max 64 characters)" -EntryNumber $entryNumber diff --git a/Scripts/Helpers/Build-PolicyPlan.ps1 b/Scripts/Helpers/Build-PolicyPlan.ps1 index 81aa2bc6..b528f8c9 100644 --- a/Scripts/Helpers/Build-PolicyPlan.ps1 +++ b/Scripts/Helpers/Build-PolicyPlan.ps1 @@ -77,7 +77,7 @@ function Build-PolicyPlan { Write-Error "Policy from file '$($file.Name)' requires a name" -ErrorAction Stop } if (-not (Confirm-ValidPolicyResourceName -Name $name)) { - Write-Error "Policy from file '$($file.Name) has a name '$name' containing invalid charachters <>*%&:?.+/ or ends with a space." -ErrorAction Stop + Write-Error "Policy from file '$($file.Name) has a name '$name' containing invalid characters <>*%&:?.+/ or ends with a space." -ErrorAction Stop } if ($null -eq $displayName) { Write-Error "Policy '$name' from file '$($file.Name)' requires a displayName" -ErrorAction Stop diff --git a/Scripts/Helpers/Build-PolicySetPlan.ps1 b/Scripts/Helpers/Build-PolicySetPlan.ps1 index bc95d7d7..301076f1 100644 --- a/Scripts/Helpers/Build-PolicySetPlan.ps1 +++ b/Scripts/Helpers/Build-PolicySetPlan.ps1 @@ -74,7 +74,7 @@ function Build-PolicySetPlan { Write-Error "Policy Set from file '$($file.Name)' requires a name" -ErrorAction Stop } if (-not (Confirm-ValidPolicyResourceName -Name $name)) { - Write-Error "Policy Set from file '$($file.Name) has a name '$name' containing invalid charachters <>*%&:?.+/ or ends with a space." -ErrorAction Stop + Write-Error "Policy Set from file '$($file.Name) has a name '$name' containing invalid characters <>*%&:?.+/ or ends with a space." -ErrorAction Stop } if ($null -eq $displayName) { Write-Error "Policy Set '$name' from file '$($file.Name)' requires a displayName" -ErrorAction Stop diff --git a/Scripts/Helpers/Build-ScopeTableForManagementGroup.ps1 b/Scripts/Helpers/Build-ScopeTableForManagementGroup.ps1 index ec8e463a..092423d3 100644 --- a/Scripts/Helpers/Build-ScopeTableForManagementGroup.ps1 +++ b/Scripts/Helpers/Build-ScopeTableForManagementGroup.ps1 @@ -118,7 +118,7 @@ function Build-ScopeTableForManagementGroup { } #endregion recurse down the tree - #region augment this parents scope's details with this mangement group's details + #region augment this parents scope's details with this management group's details if ($null -ne $ParentScopeDetails) { $parentScopeChildrenTable = $ParentScopeDetails.childrenTable $parentScopeResourceGroupsTable = $ParentScopeDetails.resourceGroupsTable @@ -144,7 +144,7 @@ function Build-ScopeTableForManagementGroup { $null = $parentScopeExcludedScopesTable.Add($excludedScope, $excludedScopesTable.$excludedScope) } } - #endregion augment this parents scope's details with this mangement group's details + #endregion augment this parents scope's details with this management group's details return $scopeDetails } \ No newline at end of file diff --git a/Scripts/Helpers/Build-ScopeTableForSubscription.ps1 b/Scripts/Helpers/Build-ScopeTableForSubscription.ps1 index 73477380..052be9f9 100644 --- a/Scripts/Helpers/Build-ScopeTableForSubscription.ps1 +++ b/Scripts/Helpers/Build-ScopeTableForSubscription.ps1 @@ -105,7 +105,7 @@ function Build-ScopeTableForSubscription { } #endregion augment resource groups scope details - #region augemnt this parents scope's details with this subscription's details + #region augment this parents scope's details with this subscription's details if ($null -ne $ParentScopeDetails) { $parentScopeChildrenTable = $ParentScopeDetails.childrenTable $parentScopeResourceGroupsTable = $ParentScopeDetails.resourceGroupsTable @@ -131,7 +131,7 @@ function Build-ScopeTableForSubscription { $null = $parentScopeExcludedScopesTable.Add($excludedScope, $excludedScopesTable.$excludedScope) } } - #endregion augemnt this parents scope's details with this subscription's details + #endregion augment this parents scope's details with this subscription's details return $scopeDetails } \ No newline at end of file diff --git a/Scripts/Helpers/Confirm-ActiveAzExemptions.ps1 b/Scripts/Helpers/Confirm-ActiveAzExemptions.ps1 index 9c47fcfb..6e1e2ae4 100644 --- a/Scripts/Helpers/Confirm-ActiveAzExemptions.ps1 +++ b/Scripts/Helpers/Confirm-ActiveAzExemptions.ps1 @@ -80,7 +80,7 @@ function Confirm-ActiveAzExemptions { all = $allExemptions active = $activeExemptions expiresInDays = $expiringExemptions # Subset of active - orphaned = $orphanedExemptions # Orpahned trumps expired + orphaned = $orphanedExemptions # Orphaned trumps expired expired = $expiredExemptions } diff --git a/Scripts/Helpers/Confirm-ObjectValueEqualityDeep.ps1 b/Scripts/Helpers/Confirm-ObjectValueEqualityDeep.ps1 index 8103c6cf..b2f4c116 100644 --- a/Scripts/Helpers/Confirm-ObjectValueEqualityDeep.ps1 +++ b/Scripts/Helpers/Confirm-ObjectValueEqualityDeep.ps1 @@ -14,7 +14,7 @@ function Confirm-ObjectValueEqualityDeep { return $true } if ($null -eq $Object1) { - # $Object1 is $null, swap $Object1 and $Object2 to ensure that Object1 (the old Object2) is not $null and Object2 (the old Object1) is $null (setting it to $null is ommited because it is not used in the subsequent code) + # $Object1 is $null, swap $Object1 and $Object2 to ensure that Object1 (the old Object2) is not $null and Object2 (the old Object1) is $null (setting it to $null is omitted because it is not used in the subsequent code) $Object1 = $Object2 $Object2 = $null } diff --git a/Scripts/Helpers/Confirm-PacOwner.ps1 b/Scripts/Helpers/Confirm-PacOwner.ps1 index cc9e8225..6122b8b2 100644 --- a/Scripts/Helpers/Confirm-PacOwner.ps1 +++ b/Scripts/Helpers/Confirm-PacOwner.ps1 @@ -24,10 +24,10 @@ function Confirm-PacOwner { $definitionIdParts = Split-AzPolicyResourceId -Id $properties.policyDefinitionId if ($definitionIdParts.scopeType -eq "builtin") { # Check if the owner is a special case, either managed by DfC's "Security Policies" or one of the "Defender Plans" - # This didcult due to inconsistent naming and createdBy users. + # This is difficult due to inconsistent naming and createdBy users. # At present, the only way to identify these is by string comparing the description field. This is not ideal. # "Security Policies" (e.g., MCSB, NIST, ...) use a description "This object has been generated by Microsoft Defender for Cloud. To make changes, navigate to the security policies management page.", - # "Defender Plans" (e.g., Servers, App Service, Databases, ...) use a description srtaing with "This policy assignment was automatically created by " + # "Defender Plans" (e.g., Servers, App Service, Databases, ...) use a description starting with "This policy assignment was automatically created by " if ($description.StartsWith("This object has been generated by ")) { $ManagedByCounters.dfcSecurityPolicies += 1 return "managedByDfcSecurityPolicies" diff --git a/Scripts/Helpers/Confirm-ParametersDefinitionMatch.ps1 b/Scripts/Helpers/Confirm-ParametersDefinitionMatch.ps1 index c027339a..ec8c685d 100644 --- a/Scripts/Helpers/Confirm-ParametersDefinitionMatch.ps1 +++ b/Scripts/Helpers/Confirm-ParametersDefinitionMatch.ps1 @@ -24,7 +24,7 @@ function Confirm-ParametersDefinitionMatch { } } foreach ($existingParameterName in $existingParameters.Keys) { - # ignore paramer name case + # ignore parameter name case $definedParameterNameArray = $definedParameters.Keys -eq $existingParameterName if ($definedParameterNameArray.Count -gt 0) { # found a matching parameter name (case insensitive) diff --git a/Scripts/Helpers/Confirm-PolicyResourceExclusions.ps1 b/Scripts/Helpers/Confirm-PolicyResourceExclusions.ps1 index 7f08c5a8..043a15a7 100644 --- a/Scripts/Helpers/Confirm-PolicyResourceExclusions.ps1 +++ b/Scripts/Helpers/Confirm-PolicyResourceExclusions.ps1 @@ -22,7 +22,7 @@ function Confirm-PolicyResourceExclusions { return $true, $resourceIdParts } if (-not $ScopeTable.ContainsKey($scope)) { - Write-Verbose "Unmanged scope '$scope', resource '$($ResourceId)'" + Write-Verbose "Unmanaged scope '$scope', resource '$($ResourceId)'" if ($null -ne $PolicyResourceTable) { $PolicyResourceTable.counters.unmanagedScopes += 1 } diff --git a/Scripts/Helpers/Confirm-ValidPolicyResourceName.ps1 b/Scripts/Helpers/Confirm-ValidPolicyResourceName.ps1 index 59d991b8..3562b3fd 100644 --- a/Scripts/Helpers/Confirm-ValidPolicyResourceName.ps1 +++ b/Scripts/Helpers/Confirm-ValidPolicyResourceName.ps1 @@ -5,7 +5,7 @@ function Confirm-ValidPolicyResourceName { $Name ) - # Test is the Name has any charcters from thisn string of characters "<>*%&:?.+/" in it or ends with a space + # Test is the Name has any characters from this string of characters "<>*%&:?.+/" in it or ends with a space if ($Name -match "[\<\>\*\%\&\:\?\+\/\\]" -or $Name.EndsWith(" ")) { return $false } diff --git a/Scripts/Helpers/Convert-AllowedEffectsToCsvString.ps1 b/Scripts/Helpers/Convert-AllowedEffectsToCsvString.ps1 index 32a7e054..e6533e6a 100644 --- a/Scripts/Helpers/Convert-AllowedEffectsToCsvString.ps1 +++ b/Scripts/Helpers/Convert-AllowedEffectsToCsvString.ps1 @@ -30,7 +30,7 @@ function Convert-AllowedEffectsToCsvString { $effectArray = @() foreach ($effectValue in @( "Modify", "Append", "DenyAction", "Deny", "Audit", "Manual", "DeployIfNotExists", "AuditIfNotExists", "Disabled" )) { - # sorted logicaly + # sorted logically if ($allowedList -contains $effectValue) { $effectArray += $effectValue } diff --git a/Scripts/Helpers/Convert-PolicyResourcesDetailsToFlatList.ps1 b/Scripts/Helpers/Convert-PolicyResourcesDetailsToFlatList.ps1 index 98f821df..bfe4d9a1 100644 --- a/Scripts/Helpers/Convert-PolicyResourcesDetailsToFlatList.ps1 +++ b/Scripts/Helpers/Convert-PolicyResourcesDetailsToFlatList.ps1 @@ -260,7 +260,7 @@ function Convert-PolicyResourcesDetailsToFlatList { } else { $null = $parametersAlreadyCovered.Add($parameterName, $true) - $parameter.multiUse = $false # Redo multi-use based on sorted liist of Policies + $parameter.multiUse = $false # Redo multi-use based on sorted list of Policies $parameterValue = $null if ($null -ne $assignmentId) { diff --git a/Scripts/Helpers/Find-AzNonCompliantResources.ps1 b/Scripts/Helpers/Find-AzNonCompliantResources.ps1 index 231f0e90..81cd27dc 100644 --- a/Scripts/Helpers/Find-AzNonCompliantResources.ps1 +++ b/Scripts/Helpers/Find-AzNonCompliantResources.ps1 @@ -13,7 +13,7 @@ function Find-AzNonCompliantResources { ) Write-Information "===================================================================================================" - Write-Information "Retrieve Policy Commpliance List" + Write-Information "Retrieve Policy Compliance List" Write-Information "===================================================================================================" $effectFilter = "" if ($PolicyEffectFilter -and $ExcludeManualPolicyEffect) { diff --git a/Scripts/Helpers/Get-CalculatedPolicyAssignmentsAndReferenceIds.ps1 b/Scripts/Helpers/Get-CalculatedPolicyAssignmentsAndReferenceIds.ps1 index 0e22e4b0..fef39036 100644 --- a/Scripts/Helpers/Get-CalculatedPolicyAssignmentsAndReferenceIds.ps1 +++ b/Scripts/Helpers/Get-CalculatedPolicyAssignmentsAndReferenceIds.ps1 @@ -19,8 +19,8 @@ function Get-CalculatedPolicyAssignmentsAndReferenceIds { $index = 0 foreach ($assignment in $Assignments) { $assignmentId = $assignment.id - $assignmentPoperties = Get-PolicyResourceProperties $assignment - $assignedPolicyDefinitionId = $assignmentPoperties.policyDefinitionId + $assignmentProperties = Get-PolicyResourceProperties $assignment + $assignedPolicyDefinitionId = $assignmentProperties.policyDefinitionId if ($assignedPolicyDefinitionId.Contains("/providers/Microsoft.Authorization/policyDefinitions/", [StringComparison]::InvariantCultureIgnoreCase)) { @@ -29,10 +29,10 @@ function Get-CalculatedPolicyAssignmentsAndReferenceIds { id = $assignmentId scope = $assignment.scope name = $assignment.name - displayName = $assignmentPoperties.displayName + displayName = $assignmentProperties.displayName assignedPolicyDefinitionId = $assignedPolicyDefinitionId policyDefinitionId = $assignedPolicyDefinitionId - notScopes = $assignmentPoperties.notScopes + notScopes = $assignmentProperties.notScopes isPolicyAssignment = $true allowReferenceIdsInRow = $false policyDefinitionReferenceIds = $null @@ -58,7 +58,7 @@ function Get-CalculatedPolicyAssignmentsAndReferenceIds { elseif ($assignedPolicyDefinitionId.Contains("/providers/Microsoft.Authorization/policySetDefinitions/", [StringComparison]::InvariantCultureIgnoreCase)) { $thisPolicySetReferences = $null - #region caclculate referenceId values for this Policy Set + #region calculate referenceId values for this Policy Set if ($byPolicySetIdPolicyDefinitionReferences.ContainsKey($assignedPolicyDefinitionId)) { # use previously calculated values $thisPolicySetReferences = $byPolicySetIdPolicyDefinitionReferences.$assignedPolicyDefinitionId @@ -101,17 +101,17 @@ function Get-CalculatedPolicyAssignmentsAndReferenceIds { $policyIndex++ } } - #endregion caclculate referenceId values for this Policy Set + #endregion calculate referenceId values for this Policy Set #region calculated assignment for this policyAssignment AND for this policySetId $calculatedPolicyAssignment = @{ id = $assignmentId scope = $assignment.scope name = $assignment.name - displayName = $assignmentPoperties.displayName + displayName = $assignmentProperties.displayName assignedPolicyDefinitionId = $assignedPolicyDefinitionId policyDefinitionId = $null - notScopes = $assignmentPoperties.notScopes + notScopes = $assignmentProperties.notScopes isPolicyAssignment = $false allowReferenceIdsInRow = $true policyDefinitionReferenceIds = $thisPolicySetReferences.policyDefinitionReferenceIds @@ -141,10 +141,10 @@ function Get-CalculatedPolicyAssignmentsAndReferenceIds { id = $assignmentId scope = $assignment.scope name = $assignment.name - displayName = $assignmentPoperties.displayName + displayName = $assignmentProperties.displayName assignedPolicyDefinitionId = $assignedPolicyDefinitionId policyDefinitionId = $policyDefinitionId - notScopes = $assignmentPoperties.notScopes + notScopes = $assignmentProperties.notScopes isPolicyAssignment = $false allowReferenceIdsInRow = $false policyDefinitionReferenceIds = $thisPolicyReferences.referenceIds diff --git a/Scripts/Helpers/Get-HydrationChildManagementGroupNameList.ps1 b/Scripts/Helpers/Get-HydrationChildManagementGroupNameList.ps1 index fce0f252..117d0226 100644 --- a/Scripts/Helpers/Get-HydrationChildManagementGroupNameList.ps1 +++ b/Scripts/Helpers/Get-HydrationChildManagementGroupNameList.ps1 @@ -1,4 +1,4 @@ -function Get-HydrrationChildManagementGroupNameList { +function Get-HydrationChildManagementGroupNameList { <# .SYNOPSIS This function retrieves a list of all child management groups of a given management group. diff --git a/Scripts/Helpers/Out-DocumentationForPolicyAssignments.ps1 b/Scripts/Helpers/Out-DocumentationForPolicyAssignments.ps1 index 6b2b88d2..f292ad19 100644 --- a/Scripts/Helpers/Out-DocumentationForPolicyAssignments.ps1 +++ b/Scripts/Helpers/Out-DocumentationForPolicyAssignments.ps1 @@ -34,7 +34,7 @@ function Out-DocumentationForPolicyAssignments { $flatPolicyListAcrossEnvironments = @{} foreach ($environmentCategory in $environmentCategories) { if (-not $AssignmentsByEnvironment.ContainsKey($environmentCategory)) { - # Should never happen (programing bug) + # Should never happen (programming bug) Write-Error "Unknown environmentCategory '$environmentCategory' encountered - bug in EPAC PowerShell code" -ErrorAction Stop } @@ -181,7 +181,7 @@ function Out-DocumentationForPolicyAssignments { # Find which env category is missing, add it to $policyDef foreach ($env in $flatPolicyListAcrossEnvironments[$policyDefCompare].environmentList.keys) { if (-not $flatPolicyListAcrossEnvironments[$policyDef].environmentList.ContainsKey($env)) { - # Copy envrionemnt from match to original key + # Copy environment from match to original key $flatPolicyListAcrossEnvironments[$policyDef].environmentList[$env] = $flatPolicyListAcrossEnvironments[$policyDefCompare].environmentList[$env] } } @@ -565,7 +565,7 @@ function Out-DocumentationForPolicyAssignments { if ($environmentList.ContainsKey($environmentCategory)) { $perEnvironment = $environmentList.$environmentCategory - # Valide doNotDisableDeprecatedPolicies for env + # Validate doNotDisableDeprecatedPolicies for env $envPacSelector = $AssignmentsByEnvironment."$($perEnvironment.environmentCategory)".pacEnvironmentSelector $doNotDisableDeprecatedPolicies = $PacEnvironments.$envPacSelector.doNotDisableDeprecatedPolicies diff --git a/Scripts/HydrationKit/Copy-HydrationManagementGroupHierarchy.ps1 b/Scripts/HydrationKit/Copy-HydrationManagementGroupHierarchy.ps1 index 072692f2..013cfc2a 100644 --- a/Scripts/HydrationKit/Copy-HydrationManagementGroupHierarchy.ps1 +++ b/Scripts/HydrationKit/Copy-HydrationManagementGroupHierarchy.ps1 @@ -18,7 +18,7 @@ .EXAMPLE Copy-HydrationManagementGroupHierarchy -SourceGroupName "IntermediateRoot" -DestinationParentGroupName "11111111-1111-1111-1111-111111111111" -Prefix "EpacDev-" - This will copy the hierarchy from "IntermediateRoot" to the tenant root "11111111-1111-1111-1111-111111111111", using "EpacDev-InternmediateRoot" as the new Intermediate Root for this environment. + This will copy the hierarchy from "IntermediateRoot" to the tenant root "11111111-1111-1111-1111-111111111111", using "EpacDev-IntermediateRoot" as the new Intermediate Root for this environment. .LINK https://aka.ms/epac diff --git a/Scripts/HydrationKit/Install-HydrationEpac.ps1 b/Scripts/HydrationKit/Install-HydrationEpac.ps1 index 9c8b8145..cc02a296 100644 --- a/Scripts/HydrationKit/Install-HydrationEpac.ps1 +++ b/Scripts/HydrationKit/Install-HydrationEpac.ps1 @@ -176,9 +176,9 @@ if ($answers.useCurrent) { } } $exportFolder = Join-Path $output "Export" "Definitions" - $updatedAssignmtentsFolder = Join-Path $output "UpdatedAssignments" - if (!(Test-Path $updatedAssignmtentsFolder)) { - $null = New-Item -ItemType Directory -Path $updatedAssignmtentsFolder -Force + $updatedAssignmentsFolder = Join-Path $output "UpdatedAssignments" + if (!(Test-Path $updatedAssignmentsFolder)) { + $null = New-Item -ItemType Directory -Path $updatedAssignmentsFolder -Force } $exportedAssignments = (Get-ChildItem $(Join-Path $exportFolder "policyAssignments") -File "*.jsonc").FullName $SourcePacSelector = ($answers.environments.values | Where-Object { $_.intermediateRootGroupName -eq $answers.epacSourceGroupName }).pacSelector @@ -186,7 +186,7 @@ if ($answers.useCurrent) { foreach ($assignment in $exportedAssignments) { New-HydrationAssignmentPacSelector -SourcePacSelector $SourcePacSelector -NewPacSelector $NewPacSelector -MGHierarchyPrefix $answers.epacPrefix -MGHierarchySuffix $answers.epacSuffix -Definitions $exportFolder -Output $output -ErrorAction Stop } - Copy-Item -Path $($updatedAssignmtentsFolder + '/*') -Destination $(Join-Path $definitions "policyAssignments") -Recurse -Force + Copy-Item -Path $($updatedAssignmentsFolder + '/*') -Destination $(Join-Path $definitions "policyAssignments") -Recurse -Force } ## Build EPAC MG Structure Write-Information "`n################################################################################" diff --git a/Scripts/HydrationKit/New-HydrationAnswerFile.ps1 b/Scripts/HydrationKit/New-HydrationAnswerFile.ps1 index 06db45aa..2831c9d8 100644 --- a/Scripts/HydrationKit/New-HydrationAnswerFile.ps1 +++ b/Scripts/HydrationKit/New-HydrationAnswerFile.ps1 @@ -86,7 +86,7 @@ Write-Host "We show your target tenant to be $($returnData.initialTenantId), whi Write-Host " This information was taken from Get-AzContext.`n`n" $response = Read-Host "If this is incorrect, please type 'N' to leave the script. `nOtherwise press enter to continue." if ($response -eq "N") { - Write-Warnig "You have chosen to exit the script. If your connection information was incorrect, use Connect-AzAccount with the TenantId and SubscriptionId options to specify the connection you desire." + Write-Warning "You have chosen to exit the script. If your connection information was incorrect, use Connect-AzAccount with the TenantId and SubscriptionId options to specify the connection you desire." return } Write-Host "`nYou have chosen to continue." @@ -95,9 +95,9 @@ Write-Information "`nGathering supporting information for script processing...`n ## PacSelector do { Write-Host "`n################################################################################" - if ($repeat) { Write-Host "The value `'$($tenantEntry.pacSelector)`' is an invalid selection for PacSelector. Please use only alpha-neumeric characters, dashes, and underscores." } + if ($repeat) { Write-Host "The value `'$($tenantEntry.pacSelector)`' is an invalid selection for PacSelector. Please use only alpha-numeric characters, dashes, and underscores." } Write-Host "We must choose a unique string to identify the deployment environment to be governed by EPAC where your deployed resources reside.`n" - Write-Host "Please choose a name for the PacSelector. Only alpha-neumeric characters, dashes, and underscores are permitted." + Write-Host "Please choose a name for the PacSelector. Only alpha-numeric characters, dashes, and underscores are permitted." Write-Host "This is the name that will be used to identify the unique PacSelector in Global Settings under which settings for this deployment will be grouped for use in policy orchestration by EPAC.`n" Write-Host "Recommendation: 'tenant01'" $repeat = $true @@ -133,7 +133,7 @@ Write-Information "`nResult Verified for variable intermediateRootGroupName: $($ do { Write-Host "`n################################################################################" if ($repeat) { Write-Host "Please choose an existing Management Group ID. $($tenantEntry.initialPolicyScope) could not be located within the current Tenant.`n" } - Write-Host "We must choose a Management Group that will recieve initial assignments intended for Management Groups in the $($tenantEntry.pacSelector) PacSelector." + Write-Host "We must choose a Management Group that will receive initial assignments intended for Management Groups in the $($tenantEntry.pacSelector) PacSelector." Write-Host " - This can be any Management Group inside of $($tenantEntry.intermediateRootGroupName), but initial deployments are intended to audit the environment" Write-Host " and are generally applied at the top level of the PacSelector.`n" Write-Host "Recommendation: $($tenantEntry.intermediateRootGroupName)" @@ -258,7 +258,7 @@ do { #TESTREM: $returnData.pacOwnerId = Read-Host "Please provide a PacOwnerId, we recommend that it include a unique GUID." $returnData.pacOwnerId = Read-Host "What would you like to use as the pacOwnerId?" if (!($returnData.pacOwnerId -match '^[a-zA-Z0-9_-]+$')) { - Write-Warning "Invalid characters detected. Please use only alpha-neumeric characters, dashes, and underscores." + Write-Warning "Invalid characters detected. Please use only alpha-numeric characters, dashes, and underscores." $repeat = $true } else { @@ -280,7 +280,7 @@ do { if ($repeat) { Write-Host "Please choose one of the following platforms: $($acceptablePlatforms -join ", ")." } Write-Host "We must choose a DevOps Platform to use for deployment of policies using EPAC.`n" Write-Host "This will populate pipelines for supported types, but will not modify the configuration of your deployment environment at this time." - Write-Host "If your deployment tool is not among those listed, you can choose 'other' and create your own, or choose one of the supported platforms to recieve pipelines to start from.1n" + Write-Host "If your deployment tool is not among those listed, you can choose 'other' and create your own, or choose one of the supported platforms to receive pipelines to start from.1n" Write-Host "Valid choices: $($acceptablePlatforms -join ", ").`n" $returnData.platform = Read-Host "What DevOps Platform will you be using to run EPAC?" $repeat = $true diff --git a/Scripts/HydrationKit/New-HydrationCaf3Hierarchy.ps1 b/Scripts/HydrationKit/New-HydrationCaf3Hierarchy.ps1 index b88fc623..0ff5954e 100644 --- a/Scripts/HydrationKit/New-HydrationCaf3Hierarchy.ps1 +++ b/Scripts/HydrationKit/New-HydrationCaf3Hierarchy.ps1 @@ -37,7 +37,7 @@ param ( ) $InformationPreference = "Continue" $mgLists = [ordered]@{ - $DestinationRootName = @("Platform", "LandingZones", "Decomissioned", "Sandbox") + $DestinationRootName = @("Platform", "LandingZones", "Decommissioned", "Sandbox") Platform = @("Identity", "Management", "Connectivity") LandingZones = @("Corp", "Online") } diff --git a/Scripts/Operations/Build-PolicyDocumentation.ps1 b/Scripts/Operations/Build-PolicyDocumentation.ps1 index bb32c165..3a0afe75 100644 --- a/Scripts/Operations/Build-PolicyDocumentation.ps1 +++ b/Scripts/Operations/Build-PolicyDocumentation.ps1 @@ -1,6 +1,6 @@ <# .SYNOPSIS - Builds documentation from instructions in policyDocumentations folder reading the delployed Policy Resources from the EPAC envioronment. + Builds documentation from instructions in policyDocumentations folder reading the deployed Policy Resources from the EPAC environment. .PARAMETER DefinitionsRootFolder Definitions folder path. Defaults to environment variable `$env:PAC_DEFINITIONS_FOLDER or './Definitions'. @@ -18,19 +18,19 @@ Suppresses prompt for confirmation to delete existing file in interactive mode .PARAMETER IncludeManualPolicies - Include Policies with effect Manual. Default: do not include Polcies with effect Manual. + Include Policies with effect Manual. Default: do not include Policies with effect Manual. .EXAMPLE Build-PolicyDocumentation.ps1 -DefinitionsRootFolder "C:\PAC\Definitions" -OutputFolder "C:\PAC\Output" -Interactive - Builds documentation from instructions in policyDocumentations folder reading the delployed Policy Resources from the EPAC envioronment. + Builds documentation from instructions in policyDocumentations folder reading the deployed Policy Resources from the EPAC environment. .EXAMPLE Build-PolicyDocumentation.ps1 -Interactive - Builds documentation from instructions in policyDocumentations folder reading the delployed Policy Resources from the EPAC envioronment. The script prompts for the PAC environment and uses the default definitions and output folders. + Builds documentation from instructions in policyDocumentations folder reading the deployed Policy Resources from the EPAC environment. The script prompts for the PAC environment and uses the default definitions and output folders. .EXAMPLE Build-PolicyDocumentation.ps1 -DefinitionsRootFolder "C:\PAC\Definitions" -OutputFolder "C:\PAC\Output" -Interactive -SuppressConfirmation - Builds documentation from instructions in policyDocumentations folder reading the delployed Policy Resources from the EPAC envioronment. The script prompts for the PAC environment and uses the default definitions and output folders. It suppresses prompt for confirmation to delete existing file in interactive mode. + Builds documentation from instructions in policyDocumentations folder reading the deployed Policy Resources from the EPAC environment. The script prompts for the PAC environment and uses the default definitions and output folders. It suppresses prompt for confirmation to delete existing file in interactive mode. .LINK https://azure.github.io/enterprise-azure-policy-as-code/#deployment-scripts @@ -54,7 +54,7 @@ param ( [Parameter(Mandatory = $false, HelpMessage = "Suppresses prompt for confirmation of each file in interactive mode")] [switch] $SuppressConfirmation, - [Parameter(Mandatory = $false, HelpMessage = "Include Policies with effect Manual. Default: do not include Polcies with effect Manual.")] + [Parameter(Mandatory = $false, HelpMessage = "Include Policies with effect Manual. Default: do not include Policies with effect Manual.")] [switch] $IncludeManualPolicies, [Parameter(Mandatory = $false, HelpMessage = "Include if using a PAT token for pushing to ADO Wiki.")] @@ -409,7 +409,7 @@ foreach ($file in $files) { $overrideEnvironmentCategory = $documentationSpec.documentAssignments.documentAllAssignments.overrideEnvironmentCategory } - # Update overrideEnvironemntCategory where applicable + # Update overrideEnvironmentCategory where applicable if (!$overrideEnvironmentCategory -eq "") { foreach ($environment in $environmentCategories) { foreach ($category in $overrideEnvironmentCategory.PSObject.Properties) { diff --git a/Scripts/Operations/Export-AzAdvertizerPolicy.ps1 b/Scripts/Operations/Export-AzAdvertizerPolicy.ps1 index 978d4a83..85f0dcb3 100644 --- a/Scripts/Operations/Export-AzAdvertizerPolicy.ps1 +++ b/Scripts/Operations/Export-AzAdvertizerPolicy.ps1 @@ -9,7 +9,7 @@ Output Folder. Defaults to the path 'Output'. .PARAMETER AutoCreateParameters - Automatically create parameters for Azure Policy Sets and Assginment Files. + Automatically create parameters for Azure Policy Sets and Assignment Files. .PARAMETER UseBuiltIn Default to using builtin policies rather than local versions. @@ -29,7 +29,7 @@ .EXAMPLE "./Out-AzAdvertizerPolicy.ps1" -AzAdvertizerUrl "https://www.azadvertizer.net/azpolicyinitiativesadvertizer/Deny-PublicPaaSEndpoints.html" -PacSelector "EPAC-Prod" -Scope "/providers/Microsoft.Management/managementGroups/4fb849a3-3ff3-4362-af8e-45174cd753dd" - Retrieves Policy from AzAdvertizer, sets the PacSelector in the assginment files to "EPAC-Prod" and the scope to the managmenet group path provided. + Retrieves Policy from AzAdvertizer, sets the PacSelector in the assignment files to "EPAC-Prod" and the scope to the management group path provided. .LINK https://azure.github.io/enterprise-azure-policy-as-code/policy-exemptions/ @@ -43,7 +43,7 @@ param ( [Parameter(Mandatory = $false, HelpMessage = "Output Folder. Defaults to the path 'Output'")] [string] $OutputFolder, - [Parameter(Mandatory = $false, HelpMessage = "Automatically create parameters for Azure Policy Sets and Assginment Files")] + [Parameter(Mandatory = $false, HelpMessage = "Automatically create parameters for Azure Policy Sets and Assignment Files")] [bool] $AutoCreateParameters = $true, [Parameter(Mandatory = $false, HelpMessage = "Default to using builtin policies rather than local versions")] diff --git a/Scripts/Operations/Export-NonComplianceReports.ps1 b/Scripts/Operations/Export-NonComplianceReports.ps1 index 2109f95c..1f9956f8 100644 --- a/Scripts/Operations/Export-NonComplianceReports.ps1 +++ b/Scripts/Operations/Export-NonComplianceReports.ps1 @@ -183,11 +183,11 @@ else { $fullDetailsList = [System.Collections.ArrayList]::new() - # determine the seperator and encoding to use based on the WindowsNewLineCells parameter - $seperator = "," + # determine the separator and encoding to use based on the WindowsNewLineCells parameter + $separator = "," $encoding = "utf8NoBOM" if ($windowsNewLineCells) { - $seperator = ",`r`n" + $separator = ",`r`n" $encoding = "utf8BOM" } @@ -280,7 +280,7 @@ else { #endregion retrieve and augment the entry properties #region create full details list hash table - $groupNames = $policyDefinitionGroupNames -join $seperator + $groupNames = $policyDefinitionGroupNames -join $separator $fullDetails = @{ assignmentName = $policyAssignmentName assignmentScope = $policyAssignmentScope @@ -601,9 +601,9 @@ else { Write-Information "Writing summary by Policy to $summaryCsvPath" $sortedSummaryList = $summaryListByPolicy | Sort-Object { $_.category }, { $_.policyDefinitionName } | ForEach-Object { $groupNamesHashtable = $_.groupNames - $summaryGroupNames = $groupNamesHashtable.Keys -join $seperator + $summaryGroupNames = $groupNamesHashtable.Keys -join $separator $assignmentsHashtable = $_.assignments - $assignments = $assignmentsHashtable.Keys -join $seperator + $assignments = $assignmentsHashtable.Keys -join $separator $normalizedSummary = [ordered]@{ "Category" = $_.category "Policy Name" = $_.policyName @@ -654,12 +654,12 @@ else { #region simplified details by Policy CSV $detailsCsvPath = Join-Path $pacEnvironment.outputFolder "non-compliance-report" "details-by-policy.csv" - Write-Information "Writing simplfied details by Policy to $detailsCsvPath" + Write-Information "Writing simplified details by Policy to $detailsCsvPath" $sortedDetailsList = $detailsListByPolicy | Sort-Object { $_.category }, { $_.policyName }, { $_.resourceId } | ForEach-Object { $assignmentsHashtable = $_.assignments - $assignments = $assignmentsHashtable.Keys -join $seperator + $assignments = $assignmentsHashtable.Keys -join $separator $groupNamesHashtable = $_.groupNames - $detailsGroupNames = $groupNamesHashtable.Keys -join $seperator + $detailsGroupNames = $groupNamesHashtable.Keys -join $separator $normalizedDetails = [ordered]@{ "Category" = $_.category "Policy Name" = $_.policyName @@ -685,7 +685,7 @@ else { #region simplified details by Resource Id CSV $detailsCsvPath = Join-Path $pacEnvironment.outputFolder "non-compliance-report" "details-by-resource.csv" - Write-Information "Writing simplfied details by Resource Id to $detailsCsvPath" + Write-Information "Writing simplified details by Resource Id to $detailsCsvPath" $sortedDetailsList = $detailsListByResource | Sort-Object { $_.resourceId }, { $_.category }, { $_.policyName } | ForEach-Object { $normalizedDetails = [ordered]@{ "Resource Id" = $_.resourceId @@ -717,7 +717,7 @@ else { Write-Information "Writing full details by Assignment to $detailsCsvPath" $sortedDetailsList = $fullDetailsList | Sort-Object { $_.assignmentName }, { $_.assignmentScope }, { $_.category }, { $_.policyName }, { $_.referenceId }, { $_.resourceId } | ForEach-Object { $groupNamesHashtable = $_.groupNames - $detailsGroupNames = $groupNamesHashtable.Keys -join $seperator + $detailsGroupNames = $groupNamesHashtable.Keys -join $separator $normalizedDetails = [ordered]@{ "Assignment Name" = $_.assignmentName "Assignment Scope" = $_.assignmentScope diff --git a/Scripts/Operations/New-AzRemediationTasks.ps1 b/Scripts/Operations/New-AzRemediationTasks.ps1 index c940f463..e5f28d48 100644 --- a/Scripts/Operations/New-AzRemediationTasks.ps1 +++ b/Scripts/Operations/New-AzRemediationTasks.ps1 @@ -130,7 +130,7 @@ $rawNonCompliantList, $deployedPolicyResources, $scopeTable = Find-AzNonComplian -PolicyEffectFilter $policyEffectFilter Write-Information "===================================================================================================" -Write-Information "Collating non-compliant resources by Assignment Id and (if Policy Set) policyDefintionReferenceId" +Write-Information "Collating non-compliant resources by Assignment Id and (if Policy Set) policyDefinitionReferenceId" Write-Information "===================================================================================================" @@ -230,7 +230,7 @@ else { $created = 0 $failedToCreate = 0 $failed = 0 - $succeded = 0 + $succeeded = 0 $collatedByAssignmentId.Values | Sort-Object { $_.policyAssignmentId }, { $_.category }, { $_.policyName } | ForEach-Object { if ($_.policyDefinitionReferenceId) { Write-Information "'$($_.shortScope)/$($_.policyAssignmentName)|$($_.policyDefinitionReferenceId)': $($_.resourceCount) resources, '$($_.policyDefinitionName)', $($_.policyDefinitionAction)" @@ -250,7 +250,7 @@ else { } # $null = $runningPolicyRemediationTasks.Add($newPolicyRemediationTask) $created++ - $succeded++ + $succeeded++ } else { $newPolicyRemediationTask = Start-AzPolicyRemediation @parameters -ErrorAction SilentlyContinue -WhatIf:$WhatIfPreference @@ -268,7 +268,7 @@ else { } elseif ($newPolicyRemediationTask.ProvisioningState -eq 'Succeeded') { Write-Information "`tRemediation Task succeeded immediately." - $succeded++ + $succeeded++ $created++ } elseif ($newPolicyRemediationTask.ProvisioningState -eq 'Failed') { @@ -319,7 +319,7 @@ else { $remediationTaskState = "WhatIf - Succeeded" Write-Information "`tWhatIf: Remediation Task '$($runningPolicyRemediationTask.Name)' might have succeeded." $taskDone = $true - $succeded++ + $succeeded++ } else { Write-Verbose "`tChecking the provisioning state of the '$($runningPolicyRemediationTask.Name)' Remediation Task" @@ -330,7 +330,7 @@ else { if ($remediationTaskState -eq 'Succeeded') { Write-Information "`tRemediation Task '$($runningPolicyRemediationTask.Name)' succeeded." $taskDone = $true - $succeded++ + $succeeded++ } elseif ($remediationTaskState -eq 'Failed') { Write-Information "`tRemediation Task '$($runningPolicyRemediationTask.Name)' failed." @@ -369,7 +369,7 @@ else { Write-Information "===================================================================================================" Write-Information "WhatIf: $needed needed" Write-Information "WhatIf: $created created" - Write-Information "WhatIf: $succeded succeded" + Write-Information "WhatIf: $succeeded succeeded" } else { Write-Information "===================================================================================================" @@ -381,7 +381,7 @@ else { Write-Information "$failedToCreate failed to create" } Write-Information "$created created" - Write-Information "$succeded succeded" + Write-Information "$succeeded succeeded" if ($failed -gt 0) { Write-Information "$failed failed" if (-not $Interactive) { diff --git a/Scripts/Operations/New-AzureDevOpsBug.ps1 b/Scripts/Operations/New-AzureDevOpsBug.ps1 index d1059121..7fdcccba 100644 --- a/Scripts/Operations/New-AzureDevOpsBug.ps1 +++ b/Scripts/Operations/New-AzureDevOpsBug.ps1 @@ -78,7 +78,7 @@ else { Write-Output "`The '$($ModuleName)' PowerShell module is not yet imported" try { Import-Module $ModuleName -Force - Write-Output "The '$($ModuleName)' PowerShell module has been imported succesfully" + Write-Output "The '$($ModuleName)' PowerShell module has been imported successfully" } catch { Write-Error $_ @@ -89,7 +89,7 @@ else { try { Install-Module -Name $ModuleName -Force Import-Module $ModuleName -Force - Write-Output "The '$($ModuleName)' PowerShell module has been installed and imported succesfully" + Write-Output "The '$($ModuleName)' PowerShell module has been installed and imported successfully" } catch { Write-Error $_ @@ -103,7 +103,7 @@ Write-Output "`nAuthenticate to the '$($ProjectName)' Project located in the '$( try { Set-VSTeamAccount -Account $OrganizationName -PersonalAccessToken $PersonalAccessToken Set-VSTeamDefaultProject -Project $ProjectName - Write-Output "Succesfully authenticated to the '$($ProjectName)' Project located in the '$($OrganizationName)' Organization" + Write-Output "Successfully authenticated to the '$($ProjectName)' Project located in the '$($OrganizationName)' Organization" } catch { Write-Error $_ @@ -120,7 +120,7 @@ try { } $uri = "https://dev.azure.com/{0}/{1}/{2}/_apis/work/teamsettings/iterations?api-version=5.1" -f $OrganizationName, $ProjectName, $TeamName $iterationPaths = (Invoke-RestMethod -Method Get -Headers $headers -Uri $uri).value - Write-Output "Succesfully retrieved the Iterations Paths of the '$($TeamName)' team" + Write-Output "Successfully retrieved the Iterations Paths of the '$($TeamName)' team" } catch { Write-Error $_ @@ -160,7 +160,7 @@ Write-Verbose "Add the HTML table to the Repro Steps of the Bug" $ReproSteps = @" $htmlTable "@ -Write-Output "Succesfully created the HTML table that will be included in the Bug" +Write-Output "Successfully created the HTML table that will be included in the Bug" #endregion #region Create a Bug on the current Iteration of the team @@ -180,7 +180,7 @@ try { 'IterationPath' = $currentIterationPath.path } Add-VSTeamWorkItem @workItemParams | Out-Null - Write-Output "Succesfully created a Bug on the '$($currentIterationPath.name)' Iteration of the '$($TeamName)' team" + Write-Output "Successfully created a Bug on the '$($currentIterationPath.name)' Iteration of the '$($TeamName)' team" } catch { Write-Error $_ diff --git a/Scripts/Operations/New-GitHubIssue.ps1 b/Scripts/Operations/New-GitHubIssue.ps1 index 2077d488..1d19b374 100644 --- a/Scripts/Operations/New-GitHubIssue.ps1 +++ b/Scripts/Operations/New-GitHubIssue.ps1 @@ -75,7 +75,7 @@ $htmlTable = $failedPolicyRemediationTasks | ConvertTo-Html @htmlParams -Fragmen $htmlBody = @" $htmlTable "@ -Write-Output "Succesfully created the HTML table that will be included in the Issue" +Write-Output "Successfully created the HTML table that will be included in the Issue" #endregion #region Create the Issue in Github @@ -98,7 +98,7 @@ try { } | ConvertTo-Json Invoke-RestMethod -Method Post -Uri $uri -Headers $headers -Body $body | Out-Null - Write-Output "Succesfully created the Issue in the '$($RepositoryName)' GitHub Repository that is located under the '$($OrganizationName)' GitHub Organization" + Write-Output "Successfully created the Issue in the '$($RepositoryName)' GitHub Repository that is located under the '$($OrganizationName)' GitHub Organization" } catch { Write-Error $_ diff --git a/StarterKit/Pipelines/AzureDevOps/GitHub-Flow/epac-remediation-pipeline.yml b/StarterKit/Pipelines/AzureDevOps/GitHub-Flow/epac-remediation-pipeline.yml index 2c38baf1..2ed857bf 100644 --- a/StarterKit/Pipelines/AzureDevOps/GitHub-Flow/epac-remediation-pipeline.yml +++ b/StarterKit/Pipelines/AzureDevOps/GitHub-Flow/epac-remediation-pipeline.yml @@ -6,7 +6,7 @@ parameters: - tenant variables: - # This pipeline is used to auto remdiate Azure policy that are non-compliant. + # This pipeline is used to auto remediate Azure policy that are non-compliant. PAC_OUTPUT_FOLDER: ./Output PAC_DEFINITIONS_FOLDER: ./Definitions diff --git a/StarterKit/Pipelines/AzureDevOps/Release-Flow/epac-remediation-pipeline.yml b/StarterKit/Pipelines/AzureDevOps/Release-Flow/epac-remediation-pipeline.yml index 2fd6f2ba..235696a6 100644 --- a/StarterKit/Pipelines/AzureDevOps/Release-Flow/epac-remediation-pipeline.yml +++ b/StarterKit/Pipelines/AzureDevOps/Release-Flow/epac-remediation-pipeline.yml @@ -7,7 +7,7 @@ parameters: - prod variables: - # This pipeline is used to auto remdiate Azure policy that are non-compliant. + # This pipeline is used to auto remediate Azure policy that are non-compliant. PAC_OUTPUT_FOLDER: ./Output PAC_DEFINITIONS_FOLDER: ./Definitions diff --git a/StarterKit/Pipelines/GitHubActions/GitHub-Flow/epac-remediation-workflow.yml b/StarterKit/Pipelines/GitHubActions/GitHub-Flow/epac-remediation-workflow.yml index 72dd2522..eccbf414 100644 --- a/StarterKit/Pipelines/GitHubActions/GitHub-Flow/epac-remediation-workflow.yml +++ b/StarterKit/Pipelines/GitHubActions/GitHub-Flow/epac-remediation-workflow.yml @@ -1,4 +1,4 @@ -# This pipeline is used to auto remdiate Azure policy that are non-compliant. +# This pipeline is used to auto remediate Azure policy that are non-compliant. name: EPAC Remediation ## Change the cron job schedule according to the requirement diff --git a/StarterKit/Pipelines/GitHubActions/Release-Flow/epac-remediation-workflow.yml b/StarterKit/Pipelines/GitHubActions/Release-Flow/epac-remediation-workflow.yml index 30c8d49b..e6294d9e 100644 --- a/StarterKit/Pipelines/GitHubActions/Release-Flow/epac-remediation-workflow.yml +++ b/StarterKit/Pipelines/GitHubActions/Release-Flow/epac-remediation-workflow.yml @@ -1,4 +1,4 @@ -# This pipeline is used to auto remdiate Azure policy that are non-compliant. +# This pipeline is used to auto remediate Azure policy that are non-compliant. name: EPAC Remediation ## Change the cron job schedule according to the requirement