diff --git a/services/keyvault/2015-06-01/keyvault/models.go b/services/keyvault/2015-06-01/keyvault/models.go index 81e69502effb..e82c76324b5d 100644 --- a/services/keyvault/2015-06-01/keyvault/models.go +++ b/services/keyvault/2015-06-01/keyvault/models.go @@ -170,7 +170,7 @@ type AdministratorDetails struct { FirstName *string `json:"first_name,omitempty"` // LastName - Last name. LastName *string `json:"last_name,omitempty"` - // EmailAddress - Email addresss. + // EmailAddress - Email address. EmailAddress *string `json:"email,omitempty"` // Phone - Phone number. Phone *string `json:"phone,omitempty"` @@ -782,7 +782,7 @@ func (cup CertificateUpdateParameters) MarshalJSON() ([]byte, error) { // Contact the contact information for the vault certificates. type Contact struct { - // EmailAddress - Email addresss. + // EmailAddress - Email address. EmailAddress *string `json:"email,omitempty"` // Name - Name. Name *string `json:"name,omitempty"` @@ -1603,6 +1603,6 @@ type X509CertificateProperties struct { SubjectAlternativeNames *SubjectAlternativeNames `json:"sans,omitempty"` // KeyUsage - List of key usages. KeyUsage *[]KeyUsageType `json:"key_usage,omitempty"` - // ValidityInMonths - The duration that the ceritifcate is valid in months. + // ValidityInMonths - The duration that the certificate is valid in months. ValidityInMonths *int32 `json:"validity_months,omitempty"` } diff --git a/services/keyvault/2016-10-01/keyvault/client.go b/services/keyvault/2016-10-01/keyvault/client.go index bf9cf182c7f3..42943238bae2 100644 --- a/services/keyvault/2016-10-01/keyvault/client.go +++ b/services/keyvault/2016-10-01/keyvault/client.go @@ -1149,7 +1149,7 @@ func (client BaseClient) DeleteStorageAccountResponder(resp *http.Response) (res // dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly // necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed // using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that -// have a key-reference but do not have access to the public key material. This operation requires the keys/encypt +// have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt // permission. // Parameters: // vaultBaseURL - the vault name, for example https://myvault.vault.azure.net. diff --git a/services/keyvault/2016-10-01/keyvault/models.go b/services/keyvault/2016-10-01/keyvault/models.go index 6a58bef535ee..66803aee108c 100644 --- a/services/keyvault/2016-10-01/keyvault/models.go +++ b/services/keyvault/2016-10-01/keyvault/models.go @@ -58,7 +58,7 @@ const ( // RecoverableProtectedSubscription Soft-delete is enabled for this vault, and the subscription is // protected against immediate deletion. RecoverableProtectedSubscription DeletionRecoveryLevel = "Recoverable+ProtectedSubscription" - // RecoverablePurgeable Soft-delete is enabled for this vault; A priveleged user may trigger an immediate, + // RecoverablePurgeable Soft-delete is enabled for this vault; A privileged user may trigger an immediate, // irreversible deletion(purge) of a deleted entity. RecoverablePurgeable DeletionRecoveryLevel = "Recoverable+Purgeable" ) @@ -222,7 +222,7 @@ type AdministratorDetails struct { FirstName *string `json:"first_name,omitempty"` // LastName - Last name. LastName *string `json:"last_name,omitempty"` - // EmailAddress - Email addresss. + // EmailAddress - Email address. EmailAddress *string `json:"email,omitempty"` // Phone - Phone number. Phone *string `json:"phone,omitempty"` @@ -843,7 +843,7 @@ func (cup CertificateUpdateParameters) MarshalJSON() ([]byte, error) { // Contact the contact information for the vault certificates. type Contact struct { - // EmailAddress - Email addresss. + // EmailAddress - Email address. EmailAddress *string `json:"email,omitempty"` // Name - Name. Name *string `json:"name,omitempty"` @@ -2214,7 +2214,7 @@ type SasDefinitionListResult struct { autorest.Response `json:"-"` // Value - A response message containing a list of SAS definitions along with a link to the next page of SAS definitions. Value *[]SasDefinitionItem `json:"value,omitempty"` - // NextLink - The URL to get the next set of SAS defintions. + // NextLink - The URL to get the next set of SAS definitions. NextLink *string `json:"nextLink,omitempty"` } @@ -3032,6 +3032,6 @@ type X509CertificateProperties struct { SubjectAlternativeNames *SubjectAlternativeNames `json:"sans,omitempty"` // KeyUsage - List of key usages. KeyUsage *[]KeyUsageType `json:"key_usage,omitempty"` - // ValidityInMonths - The duration that the ceritifcate is valid in months. + // ValidityInMonths - The duration that the certificate is valid in months. ValidityInMonths *int32 `json:"validity_months,omitempty"` } diff --git a/services/keyvault/v7.0/keyvault/client.go b/services/keyvault/v7.0/keyvault/client.go index ac65a1211d3d..6a7bd496609b 100644 --- a/services/keyvault/v7.0/keyvault/client.go +++ b/services/keyvault/v7.0/keyvault/client.go @@ -1309,7 +1309,7 @@ func (client BaseClient) DeleteStorageAccountResponder(resp *http.Response) (res // dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly // necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed // using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that -// have a key-reference but do not have access to the public key material. This operation requires the keys/encypt +// have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt // permission. // Parameters: // vaultBaseURL - the vault name, for example https://myvault.vault.azure.net. diff --git a/services/keyvault/v7.0/keyvault/models.go b/services/keyvault/v7.0/keyvault/models.go index f50838701b5f..836c6f49a9c4 100644 --- a/services/keyvault/v7.0/keyvault/models.go +++ b/services/keyvault/v7.0/keyvault/models.go @@ -236,7 +236,7 @@ type AdministratorDetails struct { FirstName *string `json:"first_name,omitempty"` // LastName - Last name. LastName *string `json:"last_name,omitempty"` - // EmailAddress - Email addresss. + // EmailAddress - Email address. EmailAddress *string `json:"email,omitempty"` // Phone - Phone number. Phone *string `json:"phone,omitempty"` @@ -877,7 +877,7 @@ func (cup CertificateUpdateParameters) MarshalJSON() ([]byte, error) { // Contact the contact information for the vault certificates. type Contact struct { - // EmailAddress - Email addresss. + // EmailAddress - Email address. EmailAddress *string `json:"email,omitempty"` // Name - Name. Name *string `json:"name,omitempty"` @@ -2784,7 +2784,7 @@ type SasDefinitionListResult struct { autorest.Response `json:"-"` // Value - A response message containing a list of SAS definitions along with a link to the next page of SAS definitions. Value *[]SasDefinitionItem `json:"value,omitempty"` - // NextLink - The URL to get the next set of SAS defintions. + // NextLink - The URL to get the next set of SAS definitions. NextLink *string `json:"nextLink,omitempty"` } @@ -3620,6 +3620,6 @@ type X509CertificateProperties struct { SubjectAlternativeNames *SubjectAlternativeNames `json:"sans,omitempty"` // KeyUsage - List of key usages. KeyUsage *[]KeyUsageType `json:"key_usage,omitempty"` - // ValidityInMonths - The duration that the ceritifcate is valid in months. + // ValidityInMonths - The duration that the certificate is valid in months. ValidityInMonths *int32 `json:"validity_months,omitempty"` }