diff --git a/src/Antiforgery/src/Internal/DefaultAntiforgery.cs b/src/Antiforgery/src/Internal/DefaultAntiforgery.cs
index 030f79c07e..3fab8af560 100644
--- a/src/Antiforgery/src/Internal/DefaultAntiforgery.cs
+++ b/src/Antiforgery/src/Internal/DefaultAntiforgery.cs
@@ -379,7 +379,7 @@ namespace Microsoft.AspNetCore.Antiforgery
/// The .
protected virtual void SetDoNotCacheHeaders(HttpContext httpContext)
{
- // Since antifogery token generation is not very obvious to the end users (ex: MVC's form tag generates them
+ // Since antiforgery token generation is not very obvious to the end users (ex: MVC's form tag generates them
// by default), log a warning to let users know of the change in behavior to any cache headers they might
// have set explicitly.
LogCacheHeaderOverrideWarning(httpContext.Response);
diff --git a/src/Antiforgery/test/DefaultClaimUidExtractorTest.cs b/src/Antiforgery/test/DefaultClaimUidExtractorTest.cs
index 1852b910da..67d690a83a 100644
--- a/src/Antiforgery/test/DefaultClaimUidExtractorTest.cs
+++ b/src/Antiforgery/test/DefaultClaimUidExtractorTest.cs
@@ -56,7 +56,7 @@ namespace Microsoft.AspNetCore.Antiforgery.Internal
public void DefaultUniqueClaimTypes_NotPresent_SerializesAllClaimTypes()
{
var identity = new ClaimsIdentity("someAuthentication");
- identity.AddClaim(new Claim(ClaimTypes.Email, "someone@antifrogery.com"));
+ identity.AddClaim(new Claim(ClaimTypes.Email, "someone@antiforgery.com"));
identity.AddClaim(new Claim(ClaimTypes.GivenName, "some"));
identity.AddClaim(new Claim(ClaimTypes.Surname, "one"));
identity.AddClaim(new Claim(ClaimTypes.NameIdentifier, string.Empty));
diff --git a/src/Components/test/E2ETest/Tests/ComponentRenderingTest.cs b/src/Components/test/E2ETest/Tests/ComponentRenderingTest.cs
index fa93b85717..ca9af22c99 100644
--- a/src/Components/test/E2ETest/Tests/ComponentRenderingTest.cs
+++ b/src/Components/test/E2ETest/Tests/ComponentRenderingTest.cs
@@ -626,7 +626,7 @@ namespace Microsoft.AspNetCore.Components.E2ETest.Tests
Browser.Exists(incompleteItemsSelector);
// Mark first item as done; observe the remaining incomplete item appears unchecked
- // because the diff algoritm explicitly unchecks it
+ // because the diff algorithm explicitly unchecks it
appElement.FindElement(By.CssSelector(".incomplete-items .item-isdone")).Click();
Browser.True(() =>
{
@@ -636,7 +636,7 @@ namespace Microsoft.AspNetCore.Components.E2ETest.Tests
});
// Mark first done item as not done; observe the remaining complete item appears checked
- // because the diff algoritm explicitly re-checks it
+ // because the diff algorithm explicitly re-checks it
appElement.FindElement(By.CssSelector(".complete-items .item-isdone")).Click();
Browser.True(() =>
{
diff --git a/src/Http/Routing/src/RouteBase.cs b/src/Http/Routing/src/RouteBase.cs
index c4b86692ff..019b7a7f7f 100644
--- a/src/Http/Routing/src/RouteBase.cs
+++ b/src/Http/Routing/src/RouteBase.cs
@@ -265,7 +265,7 @@ namespace Microsoft.AspNetCore.Routing
{
if (_logger != null)
{
- // Multiple threads might have tried to accquire the lock at the same time. Technically
+ // Multiple threads might have tried to acquire the lock at the same time. Technically
// there is nothing wrong if things get reinitialized by a second thread, but its easy
// to prevent by just rechecking and returning here.
return;
diff --git a/src/Http/WebUtilities/src/FileBufferingWriteStream.cs b/src/Http/WebUtilities/src/FileBufferingWriteStream.cs
index da24578135..354829c3b8 100644
--- a/src/Http/WebUtilities/src/FileBufferingWriteStream.cs
+++ b/src/Http/WebUtilities/src/FileBufferingWriteStream.cs
@@ -31,7 +31,7 @@ namespace Microsoft.AspNetCore.WebUtilities
/// Defaults to 32kb.
///
///
- /// The maximum amouont of bytes that the is allowed to buffer.
+ /// The maximum amount of bytes that the is allowed to buffer.
///
/// Provides the location of the directory to write buffered contents to.
/// When unspecified, uses the value specified by the environment variable ASPNETCORE_TEMP if available, otherwise
@@ -117,7 +117,7 @@ namespace Microsoft.AspNetCore.WebUtilities
}
else
{
- // If the MemoryStream is incapable of accomodating the content to be written
+ // If the MemoryStream is incapable of accommodating the content to be written
// spool to disk.
EnsureFileStream();
diff --git a/src/Mvc/Mvc.ApiExplorer/src/ApiResponseTypeProvider.cs b/src/Mvc/Mvc.ApiExplorer/src/ApiResponseTypeProvider.cs
index bd5b4d0f3a..11d2458456 100644
--- a/src/Mvc/Mvc.ApiExplorer/src/ApiResponseTypeProvider.cs
+++ b/src/Mvc/Mvc.ApiExplorer/src/ApiResponseTypeProvider.cs
@@ -159,7 +159,7 @@ namespace Microsoft.AspNetCore.Mvc.ApiExplorer
// 2. When a type is specified, use GetSupportedContentTypes to expand wildcards and get the range of content-types formatters support.
// 3. When no formatter supports the specified content-type, use the user specified value as is. This is useful in actions where the user
// dictates the content-type.
- // e.g. [Produces("application/pdf")] Action() => FileStream("somefile.pdf", "applicaiton/pdf");
+ // e.g. [Produces("application/pdf")] Action() => FileStream("somefile.pdf", "application/pdf");
foreach (var apiResponse in responseTypes)
{
diff --git a/src/Mvc/Mvc.Core/src/Formatters/TranscodingReadStream.cs b/src/Mvc/Mvc.Core/src/Formatters/TranscodingReadStream.cs
index 6361039ad7..7771093e89 100644
--- a/src/Mvc/Mvc.Core/src/Formatters/TranscodingReadStream.cs
+++ b/src/Mvc/Mvc.Core/src/Formatters/TranscodingReadStream.cs
@@ -123,7 +123,7 @@ namespace Microsoft.AspNetCore.Mvc.Formatters.Json
// Overflow buffer is always empty when we get here and we can use it's full length to write contents to.
Utf8.FromUtf16(_charBuffer, _overflowBuffer.Array, out var overFlowChars, out var overflowBytes, isFinalBlock: false);
- Debug.Assert(overflowBytes > 0 && overFlowChars > 0, "We expect writes to the overflow buffer to always succeed since it is large enough to accomodate at least one char.");
+ Debug.Assert(overflowBytes > 0 && overFlowChars > 0, "We expect writes to the overflow buffer to always succeed since it is large enough to accommodate at least one char.");
_charBuffer = _charBuffer.Slice(overFlowChars);
diff --git a/src/Servers/HttpSys/test/FunctionalTests/MessagePumpTests.cs b/src/Servers/HttpSys/test/FunctionalTests/MessagePumpTests.cs
index f9b4d81209..0e5270b82b 100644
--- a/src/Servers/HttpSys/test/FunctionalTests/MessagePumpTests.cs
+++ b/src/Servers/HttpSys/test/FunctionalTests/MessagePumpTests.cs
@@ -77,7 +77,7 @@ namespace Microsoft.AspNetCore.Server.HttpSys
[InlineData("invalid address")]
[InlineData("")]
[InlineData(null)]
- public void OverridingIServerAdressesFeatureWithDirectConfiguration_WarnsOnStart(string serverAddress)
+ public void OverridingIServerAddressesFeatureWithDirectConfiguration_WarnsOnStart(string serverAddress)
{
var overrideAddress = "http://localhost:11002/";
@@ -94,7 +94,7 @@ namespace Microsoft.AspNetCore.Server.HttpSys
}
[ConditionalFact]
- public void UseIServerAdressesFeature_WhenNoDirectConfiguration()
+ public void UseIServerAddressesFeature_WhenNoDirectConfiguration()
{
var serverAddress = "http://localhost:11001/";
diff --git a/src/Shared/test/Shared.Tests/PropertyActivatorTest.cs b/src/Shared/test/Shared.Tests/PropertyActivatorTest.cs
index a5cb1605b3..8775d692ca 100644
--- a/src/Shared/test/Shared.Tests/PropertyActivatorTest.cs
+++ b/src/Shared/test/Shared.Tests/PropertyActivatorTest.cs
@@ -153,7 +153,7 @@ namespace Microsoft.Extensions.Internal
}
[TestActivate]
- public static int StaticActivatablProperty { get; set; }
+ public static int StaticActivatableProperty { get; set; }
}
private class TestClassWithPropertyVisiblity