Fixes spell across test classes and comments (#14958)

This commit is contained in:
John Doe 2019-10-13 20:46:20 -07:00 committed by Justin Kotalik
parent 64349f1eae
commit 288bedd9a3
9 changed files with 12 additions and 12 deletions

View File

@ -379,7 +379,7 @@ namespace Microsoft.AspNetCore.Antiforgery
/// <param name="httpContext">The <see cref="HttpContext"/>.</param>
protected virtual void SetDoNotCacheHeaders(HttpContext httpContext)
{
// Since antifogery token generation is not very obvious to the end users (ex: MVC's form tag generates them
// Since antiforgery token generation is not very obvious to the end users (ex: MVC's form tag generates them
// by default), log a warning to let users know of the change in behavior to any cache headers they might
// have set explicitly.
LogCacheHeaderOverrideWarning(httpContext.Response);

View File

@ -56,7 +56,7 @@ namespace Microsoft.AspNetCore.Antiforgery.Internal
public void DefaultUniqueClaimTypes_NotPresent_SerializesAllClaimTypes()
{
var identity = new ClaimsIdentity("someAuthentication");
identity.AddClaim(new Claim(ClaimTypes.Email, "someone@antifrogery.com"));
identity.AddClaim(new Claim(ClaimTypes.Email, "someone@antiforgery.com"));
identity.AddClaim(new Claim(ClaimTypes.GivenName, "some"));
identity.AddClaim(new Claim(ClaimTypes.Surname, "one"));
identity.AddClaim(new Claim(ClaimTypes.NameIdentifier, string.Empty));

View File

@ -626,7 +626,7 @@ namespace Microsoft.AspNetCore.Components.E2ETest.Tests
Browser.Exists(incompleteItemsSelector);
// Mark first item as done; observe the remaining incomplete item appears unchecked
// because the diff algoritm explicitly unchecks it
// because the diff algorithm explicitly unchecks it
appElement.FindElement(By.CssSelector(".incomplete-items .item-isdone")).Click();
Browser.True(() =>
{
@ -636,7 +636,7 @@ namespace Microsoft.AspNetCore.Components.E2ETest.Tests
});
// Mark first done item as not done; observe the remaining complete item appears checked
// because the diff algoritm explicitly re-checks it
// because the diff algorithm explicitly re-checks it
appElement.FindElement(By.CssSelector(".complete-items .item-isdone")).Click();
Browser.True(() =>
{

View File

@ -265,7 +265,7 @@ namespace Microsoft.AspNetCore.Routing
{
if (_logger != null)
{
// Multiple threads might have tried to accquire the lock at the same time. Technically
// Multiple threads might have tried to acquire the lock at the same time. Technically
// there is nothing wrong if things get reinitialized by a second thread, but its easy
// to prevent by just rechecking and returning here.
return;

View File

@ -31,7 +31,7 @@ namespace Microsoft.AspNetCore.WebUtilities
/// Defaults to 32kb.
/// </param>
/// <param name="bufferLimit">
/// The maximum amouont of bytes that the <see cref="FileBufferingWriteStream"/> is allowed to buffer.
/// The maximum amount of bytes that the <see cref="FileBufferingWriteStream"/> is allowed to buffer.
/// </param>
/// <param name="tempFileDirectoryAccessor">Provides the location of the directory to write buffered contents to.
/// When unspecified, uses the value specified by the environment variable <c>ASPNETCORE_TEMP</c> if available, otherwise
@ -117,7 +117,7 @@ namespace Microsoft.AspNetCore.WebUtilities
}
else
{
// If the MemoryStream is incapable of accomodating the content to be written
// If the MemoryStream is incapable of accommodating the content to be written
// spool to disk.
EnsureFileStream();

View File

@ -159,7 +159,7 @@ namespace Microsoft.AspNetCore.Mvc.ApiExplorer
// 2. When a type is specified, use GetSupportedContentTypes to expand wildcards and get the range of content-types formatters support.
// 3. When no formatter supports the specified content-type, use the user specified value as is. This is useful in actions where the user
// dictates the content-type.
// e.g. [Produces("application/pdf")] Action() => FileStream("somefile.pdf", "applicaiton/pdf");
// e.g. [Produces("application/pdf")] Action() => FileStream("somefile.pdf", "application/pdf");
foreach (var apiResponse in responseTypes)
{

View File

@ -123,7 +123,7 @@ namespace Microsoft.AspNetCore.Mvc.Formatters.Json
// Overflow buffer is always empty when we get here and we can use it's full length to write contents to.
Utf8.FromUtf16(_charBuffer, _overflowBuffer.Array, out var overFlowChars, out var overflowBytes, isFinalBlock: false);
Debug.Assert(overflowBytes > 0 && overFlowChars > 0, "We expect writes to the overflow buffer to always succeed since it is large enough to accomodate at least one char.");
Debug.Assert(overflowBytes > 0 && overFlowChars > 0, "We expect writes to the overflow buffer to always succeed since it is large enough to accommodate at least one char.");
_charBuffer = _charBuffer.Slice(overFlowChars);

View File

@ -77,7 +77,7 @@ namespace Microsoft.AspNetCore.Server.HttpSys
[InlineData("invalid address")]
[InlineData("")]
[InlineData(null)]
public void OverridingIServerAdressesFeatureWithDirectConfiguration_WarnsOnStart(string serverAddress)
public void OverridingIServerAddressesFeatureWithDirectConfiguration_WarnsOnStart(string serverAddress)
{
var overrideAddress = "http://localhost:11002/";
@ -94,7 +94,7 @@ namespace Microsoft.AspNetCore.Server.HttpSys
}
[ConditionalFact]
public void UseIServerAdressesFeature_WhenNoDirectConfiguration()
public void UseIServerAddressesFeature_WhenNoDirectConfiguration()
{
var serverAddress = "http://localhost:11001/";

View File

@ -153,7 +153,7 @@ namespace Microsoft.Extensions.Internal
}
[TestActivate]
public static int StaticActivatablProperty { get; set; }
public static int StaticActivatableProperty { get; set; }
}
private class TestClassWithPropertyVisiblity