Skip to content

Commit 980edab

Browse files
adds a new spell-checking workflow to the repository (#5377)
spell checker Co-authored-by: Gladwin Johnson <[email protected]>
1 parent 0b0e18f commit 980edab

File tree

13 files changed

+53
-30
lines changed

13 files changed

+53
-30
lines changed

.codespellignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
aci
2+
RefreshIn
3+
AKS

.github/workflows/spellcheck.yml

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
# .github/workflows/spellcheck.yml
2+
name: Spell check
3+
on: [pull_request]
4+
5+
jobs:
6+
spellcheck:
7+
runs-on: ubuntu-latest
8+
steps:
9+
- uses: actions/checkout@v4
10+
- uses: codespell-project/actions-codespell@v2
11+
with:
12+
check_filenames: true # also scan file names
13+
ignore_words_file: .codespellignore
14+
skip: >
15+
src/client/Microsoft.Identity.Client/json/**,
16+
tests/**,
17+
devapps/**,
18+
build/**,
19+
docs/**,
20+
prototype/**

CHANGELOG.md

Lines changed: 14 additions & 14 deletions
Large diffs are not rendered by default.

src/client/Microsoft.Identity.Client.Extensions.Msal/MsalCacheHelper.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ public event EventHandler<CacheChangedEventArgs> CacheChanged
137137
}
138138
catch (Exception e)
139139
{
140-
logger.LogError("An error occured while reading the token cache: " + e);
140+
logger.LogError("An error occurred while reading the token cache: " + e);
141141
logger.LogError("Deleting the token cache as it might be corrupt.");
142142
tempCache.Clear(ignoreExceptions: true);
143143
}

src/client/Microsoft.Identity.Client/AppConfig/AssertionRequestOptions.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ public class AssertionRequestOptions {
4141
public IEnumerable<string> ClientCapabilities { get; set; }
4242

4343
/// <summary>
44-
/// FMI path to be used for client assertion. Tokens are assocaited with this path in the cache.
44+
/// FMI path to be used for client assertion. Tokens are associated with this path in the cache.
4545
/// </summary>
4646
public string ClientAssertionFmiPath { get; set; }
4747
}

src/client/Microsoft.Identity.Client/Cache/cache.readme.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,26 +19,26 @@ When removing an account, a removal is performed on both the MSAL and the ADAL c
1919

2020
If the accountId is not null (note that the account id comes from ClientInfo), then delete everything with the same
2121
clientInfo and env.
22-
Otherwise, delete everything with the same diplayable id (aka preferred username) and env.
22+
Otherwise, delete everything with the same displayable id (aka preferred username) and env.
2323

2424
Note:
25-
- RemoveAdalUser is not scoped on ClientId, i.e. it will delete accoutns from different ClientIDs that match the criteria above
25+
- RemoveAdalUser is not scoped on ClientId, i.e. it will delete accounts from different ClientIDs that match the criteria above
2626
- GetAccounts and RemoveAccount do not work for ClientCredentail Grant
2727

2828
### Cache Schema
2929

30-
The location, keys and values of the items stored in the cache are standardized to allow interop (Xamarin iOS <-> obj-c iOS; Xamarin Android <-> Android; interal C++ <-> other platforms).
30+
The location, keys and values of the items stored in the cache are standardized to allow interop (Xamarin iOS <-> obj-c iOS; Xamarin Android <-> Android; internal C++ <-> other platforms).
3131
The document is here:
3232
https://identitydivision.visualstudio.com/DevEx/DevEx%20Team/_git/AuthLibrariesApiReview/pullrequest/540?path=%2FUnifiedSchema%2FSchema.md&_a=files
3333
(we can make this document public on request, keeping it on VSTS just for ease of sharing internally)
3434

3535
Key calculation is platform specific because there are specificities on iOS (multiple keys) and UWP (key size limit of 255 chars).
3636

37-
To ensure key uniqueness, scopes must be normalized (lowercased and oredred alphabetically).
37+
To ensure key uniqueness, scopes must be normalized (lowercased and ordered alphabetically).
3838

3939
## Other notes
4040

41-
MSAL is able able to retrieve objects of type IAccount from the MSAL cache.
41+
MSAL is able to retrieve objects of type IAccount from the MSAL cache.
4242
The token cache is scoped on Env and ClientId.
4343
When upgrading from ADALv3, the ClinetInfo is null because we do not request an IdToken;
4444
ClientCredetialGrant - there is also no IdToken -> no ClientInfo. However, this uses a different token cache (AppTokenCache instead of UserTokenCache). This token cache is not unified, i.e. AT obtained from MSAL will not be written back to ADAL (need to verify this statement).

src/client/Microsoft.Identity.Client/Extensibility/AbstractConfidentialClientAcquireTokenParameterBuilderExtension.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ public static AbstractAcquireTokenParameterBuilder<T> WithAuthenticationExtensio
7777
{
7878
if (builder.CommonParameters.OnBeforeTokenRequestHandler != null && authenticationExtension.OnBeforeTokenRequestHandler != null)
7979
{
80-
throw new InvalidOperationException("Cannot set both an AuthenticaitonOperation and an OnBeforeTokenRequestHandler");
80+
throw new InvalidOperationException("Cannot set both an AuthenticationOperation and an OnBeforeTokenRequestHandler");
8181
}
8282

8383
builder.CommonParameters.OnBeforeTokenRequestHandler = authenticationExtension.OnBeforeTokenRequestHandler;

src/client/Microsoft.Identity.Client/Internal/Requests/ClientCredentialRequest.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -290,7 +290,7 @@ private AuthenticationResult CreateAuthenticationResultFromCache(MsalAccessToken
290290
}
291291

292292
/// <summary>
293-
/// Gets overriden scopes for client credentials flow
293+
/// Gets overridden scopes for client credentials flow
294294
/// </summary>
295295
/// <param name="inputScopes"></param>
296296
/// <returns></returns>

src/client/Microsoft.Identity.Client/Internal/Requests/IntegratedWindowsAuthRequest.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ private async Task<UserAssertion> FetchAssertionFromWsTrustAsync()
7979
//IWA is currently not supported in pure adfs environments. See https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/2771
8080
throw new MsalClientException(
8181
MsalError.IntegratedWindowsAuthenticationFailed,
82-
"Integrated windows authenticaiton is not supported when using WithAdfsAuthority() to specify the authority in ADFS on premises environments"
82+
"Integrated windows authentication is not supported when using WithAdfsAuthority() to specify the authority in ADFS on premises environments"
8383
+ " See https://aka.ms/msal-net-iwa for more details.");
8484
}
8585

src/client/Microsoft.Identity.Client/Internal/Requests/Interactive/InteractiveRequest.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ private async Task<MsalTokenResponse> GetTokenResponseAsync(CancellationToken ca
168168
_requestParams.ExtraQueryParameters[InstanceAwareParam] = "true";
169169
}
170170

171-
// Aligh with MSAL CPP: https://github.com/AzureAD/microsoft-authentication-library-for-cpp/blob/4fa774db2b38cdce9c9b94e3e686ab53fc24b948/source/xplat/requests/WebRequestManager.cpp#L566
171+
// Align with MSAL CPP: https://github.com/AzureAD/microsoft-authentication-library-for-cpp/blob/4fa774db2b38cdce9c9b94e3e686ab53fc24b948/source/xplat/requests/WebRequestManager.cpp#L566
172172
// Always add 'haschrome=1' in the protocol to avoid unexpected back buttons on the first page.
173173
_requestParams.ExtraQueryParameters["haschrome"] = "1";
174174

0 commit comments

Comments
 (0)