mirror of
https://we.phorge.it/source/phorge.git
synced 2024-11-26 08:42:41 +01:00
Remove product literal strings in "pht()", part 22
Summary: Ref T13658. Test Plan: Static checks only. Maniphest Tasks: T13658 Differential Revision: https://secure.phabricator.com/D21788
This commit is contained in:
parent
b1079b79e5
commit
7fd8263185
6 changed files with 13 additions and 11 deletions
|
@ -68,9 +68,10 @@ final class PhabricatorPeopleWelcomeController
|
||||||
->appendRemarkupInstructions(
|
->appendRemarkupInstructions(
|
||||||
pht(
|
pht(
|
||||||
'This workflow will send this user ("%s") a copy of the "Welcome to '.
|
'This workflow will send this user ("%s") a copy of the "Welcome to '.
|
||||||
'Phabricator" email that users normally receive when their '.
|
'%s" email that users normally receive when their '.
|
||||||
'accounts are created by an administrator.',
|
'accounts are created by an administrator.',
|
||||||
$user->getUsername()))
|
$user->getUsername(),
|
||||||
|
PlatformSymbols::getPlatformServerName()))
|
||||||
->appendRemarkupInstructions(
|
->appendRemarkupInstructions(
|
||||||
pht(
|
pht(
|
||||||
'The email will contain a link that the user may use to log in '.
|
'The email will contain a link that the user may use to log in '.
|
||||||
|
|
|
@ -154,7 +154,7 @@ final class PhameBlog extends PhameDAO
|
||||||
$href = PhabricatorEnv::getProductionURI(
|
$href = PhabricatorEnv::getProductionURI(
|
||||||
'/config/edit/policy.allow-public/');
|
'/config/edit/policy.allow-public/');
|
||||||
return pht(
|
return pht(
|
||||||
'For custom domains to work, this Phabricator instance must be '.
|
'For custom domains to work, this this server must be '.
|
||||||
'configured to allow the public access policy. Configure this '.
|
'configured to allow the public access policy. Configure this '.
|
||||||
'setting %s, or ask an administrator to configure this setting. '.
|
'setting %s, or ask an administrator to configure this setting. '.
|
||||||
'The domain can be specified later once this setting has been '.
|
'The domain can be specified later once this setting has been '.
|
||||||
|
|
|
@ -37,7 +37,7 @@ final class PhabricatorPolicyConfigOptions
|
||||||
->setSummary(pht('Allow users to set object visibility to public.'))
|
->setSummary(pht('Allow users to set object visibility to public.'))
|
||||||
->setDescription(
|
->setDescription(
|
||||||
pht(
|
pht(
|
||||||
"Phabricator allows you to set the visibility of objects (like ".
|
"This software allows you to set the visibility of objects (like ".
|
||||||
"repositories and tasks) to 'Public', which means **anyone ".
|
"repositories and tasks) to 'Public', which means **anyone ".
|
||||||
"on the internet can see them, without needing to log in or ".
|
"on the internet can see them, without needing to log in or ".
|
||||||
"have an account**.".
|
"have an account**.".
|
||||||
|
@ -59,7 +59,7 @@ final class PhabricatorPolicyConfigOptions
|
||||||
->setSummary(pht(
|
->setSummary(pht(
|
||||||
'Lock specific application policies so they can not be edited.'))
|
'Lock specific application policies so they can not be edited.'))
|
||||||
->setDescription(pht(
|
->setDescription(pht(
|
||||||
'Phabricator has application policies which can dictate whether '.
|
'This software has application policies which can dictate whether '.
|
||||||
'users can take certain actions, such as creating new users. '."\n\n".
|
'users can take certain actions, such as creating new users. '."\n\n".
|
||||||
'This setting allows for "locking" these policies such that no '.
|
'This setting allows for "locking" these policies such that no '.
|
||||||
'further edits can be made on a per-policy basis.'))
|
'further edits can be made on a per-policy basis.'))
|
||||||
|
|
|
@ -248,7 +248,7 @@ final class PhabricatorPolicy
|
||||||
case PhabricatorPolicies::POLICY_PUBLIC:
|
case PhabricatorPolicies::POLICY_PUBLIC:
|
||||||
return pht(
|
return pht(
|
||||||
'This object is public and can be viewed by anyone, even if they '.
|
'This object is public and can be viewed by anyone, even if they '.
|
||||||
'do not have a Phabricator account.');
|
'do not have an account on this server.');
|
||||||
case PhabricatorPolicies::POLICY_USER:
|
case PhabricatorPolicies::POLICY_USER:
|
||||||
return pht('Logged in users can take this action.');
|
return pht('Logged in users can take this action.');
|
||||||
case PhabricatorPolicies::POLICY_ADMIN:
|
case PhabricatorPolicies::POLICY_ADMIN:
|
||||||
|
|
|
@ -28,9 +28,10 @@ final class PhabricatorRepositoryConfigOptions
|
||||||
->setDescription(
|
->setDescription(
|
||||||
pht(
|
pht(
|
||||||
'The default location in which to store working copies and other '.
|
'The default location in which to store working copies and other '.
|
||||||
'data about repositories. Phabricator will control and manage '.
|
'data about repositories. %s will control and manage '.
|
||||||
'data here, so you should **not** choose an existing directory '.
|
'data here, so you should **not** choose an existing directory '.
|
||||||
'full of data you care about.')),
|
'full of data you care about.',
|
||||||
|
PlatformSymbols::getPlatformServerName())),
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1947,7 +1947,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
|
||||||
'point at this host, or the "device.id" configuration file on '.
|
'point at this host, or the "device.id" configuration file on '.
|
||||||
'this host may be incorrect.'.
|
'this host may be incorrect.'.
|
||||||
"\n\n".
|
"\n\n".
|
||||||
'Requests routed within the cluster by Phabricator are always '.
|
'Requests routed within the cluster are always '.
|
||||||
'expected to be sent to a node which can serve the request. To '.
|
'expected to be sent to a node which can serve the request. To '.
|
||||||
'prevent loops, this request will not be proxied again.'.
|
'prevent loops, this request will not be proxied again.'.
|
||||||
"\n\n".
|
"\n\n".
|
||||||
|
@ -2209,7 +2209,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
|
||||||
throw new PhutilAggregateException(
|
throw new PhutilAggregateException(
|
||||||
pht(
|
pht(
|
||||||
'Unable to read device public key while attempting to make '.
|
'Unable to read device public key while attempting to make '.
|
||||||
'authenticated method call within the Phabricator cluster. '.
|
'authenticated method call within the cluster. '.
|
||||||
'Use `%s` to register keys for this device. Exception: %s',
|
'Use `%s` to register keys for this device. Exception: %s',
|
||||||
'bin/almanac register',
|
'bin/almanac register',
|
||||||
$ex->getMessage()),
|
$ex->getMessage()),
|
||||||
|
@ -2224,7 +2224,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
|
||||||
throw new PhutilAggregateException(
|
throw new PhutilAggregateException(
|
||||||
pht(
|
pht(
|
||||||
'Unable to read device private key while attempting to make '.
|
'Unable to read device private key while attempting to make '.
|
||||||
'authenticated method call within the Phabricator cluster. '.
|
'authenticated method call within the cluster. '.
|
||||||
'Use `%s` to register keys for this device. Exception: %s',
|
'Use `%s` to register keys for this device. Exception: %s',
|
||||||
'bin/almanac register',
|
'bin/almanac register',
|
||||||
$ex->getMessage()),
|
$ex->getMessage()),
|
||||||
|
|
Loading…
Reference in a new issue