1
0
Fork 0
mirror of https://we.phorge.it/source/phorge.git synced 2024-11-26 00:32:42 +01:00

Remove product literal strings in "pht()", part 22

Summary: Ref T13658.

Test Plan: Static checks only.

Maniphest Tasks: T13658

Differential Revision: https://secure.phabricator.com/D21788
This commit is contained in:
epriestley 2022-04-25 16:19:17 -07:00
parent b1079b79e5
commit 7fd8263185
6 changed files with 13 additions and 11 deletions

View file

@ -68,9 +68,10 @@ final class PhabricatorPeopleWelcomeController
->appendRemarkupInstructions(
pht(
'This workflow will send this user ("%s") a copy of the "Welcome to '.
'Phabricator" email that users normally receive when their '.
'%s" email that users normally receive when their '.
'accounts are created by an administrator.',
$user->getUsername()))
$user->getUsername(),
PlatformSymbols::getPlatformServerName()))
->appendRemarkupInstructions(
pht(
'The email will contain a link that the user may use to log in '.

View file

@ -154,7 +154,7 @@ final class PhameBlog extends PhameDAO
$href = PhabricatorEnv::getProductionURI(
'/config/edit/policy.allow-public/');
return pht(
'For custom domains to work, this Phabricator instance must be '.
'For custom domains to work, this this server must be '.
'configured to allow the public access policy. Configure this '.
'setting %s, or ask an administrator to configure this setting. '.
'The domain can be specified later once this setting has been '.

View file

@ -37,7 +37,7 @@ final class PhabricatorPolicyConfigOptions
->setSummary(pht('Allow users to set object visibility to public.'))
->setDescription(
pht(
"Phabricator allows you to set the visibility of objects (like ".
"This software allows you to set the visibility of objects (like ".
"repositories and tasks) to 'Public', which means **anyone ".
"on the internet can see them, without needing to log in or ".
"have an account**.".
@ -59,7 +59,7 @@ final class PhabricatorPolicyConfigOptions
->setSummary(pht(
'Lock specific application policies so they can not be edited.'))
->setDescription(pht(
'Phabricator has application policies which can dictate whether '.
'This software has application policies which can dictate whether '.
'users can take certain actions, such as creating new users. '."\n\n".
'This setting allows for "locking" these policies such that no '.
'further edits can be made on a per-policy basis.'))

View file

@ -248,7 +248,7 @@ final class PhabricatorPolicy
case PhabricatorPolicies::POLICY_PUBLIC:
return pht(
'This object is public and can be viewed by anyone, even if they '.
'do not have a Phabricator account.');
'do not have an account on this server.');
case PhabricatorPolicies::POLICY_USER:
return pht('Logged in users can take this action.');
case PhabricatorPolicies::POLICY_ADMIN:

View file

@ -28,9 +28,10 @@ final class PhabricatorRepositoryConfigOptions
->setDescription(
pht(
'The default location in which to store working copies and other '.
'data about repositories. Phabricator will control and manage '.
'data about repositories. %s will control and manage '.
'data here, so you should **not** choose an existing directory '.
'full of data you care about.')),
'full of data you care about.',
PlatformSymbols::getPlatformServerName())),
);
}

View file

@ -1947,7 +1947,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
'point at this host, or the "device.id" configuration file on '.
'this host may be incorrect.'.
"\n\n".
'Requests routed within the cluster by Phabricator are always '.
'Requests routed within the cluster are always '.
'expected to be sent to a node which can serve the request. To '.
'prevent loops, this request will not be proxied again.'.
"\n\n".
@ -2209,7 +2209,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
throw new PhutilAggregateException(
pht(
'Unable to read device public key while attempting to make '.
'authenticated method call within the Phabricator cluster. '.
'authenticated method call within the cluster. '.
'Use `%s` to register keys for this device. Exception: %s',
'bin/almanac register',
$ex->getMessage()),
@ -2224,7 +2224,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
throw new PhutilAggregateException(
pht(
'Unable to read device private key while attempting to make '.
'authenticated method call within the Phabricator cluster. '.
'authenticated method call within the cluster. '.
'Use `%s` to register keys for this device. Exception: %s',
'bin/almanac register',
$ex->getMessage()),