1
0
Fork 0
mirror of https://we.phorge.it/source/phorge.git synced 2024-11-26 08:42:41 +01:00

Remove product literal strings in "pht()", part 22

Summary: Ref T13658.

Test Plan: Static checks only.

Maniphest Tasks: T13658

Differential Revision: https://secure.phabricator.com/D21788
This commit is contained in:
epriestley 2022-04-25 16:19:17 -07:00
parent b1079b79e5
commit 7fd8263185
6 changed files with 13 additions and 11 deletions

View file

@ -68,9 +68,10 @@ final class PhabricatorPeopleWelcomeController
->appendRemarkupInstructions( ->appendRemarkupInstructions(
pht( pht(
'This workflow will send this user ("%s") a copy of the "Welcome to '. 'This workflow will send this user ("%s") a copy of the "Welcome to '.
'Phabricator" email that users normally receive when their '. '%s" email that users normally receive when their '.
'accounts are created by an administrator.', 'accounts are created by an administrator.',
$user->getUsername())) $user->getUsername(),
PlatformSymbols::getPlatformServerName()))
->appendRemarkupInstructions( ->appendRemarkupInstructions(
pht( pht(
'The email will contain a link that the user may use to log in '. 'The email will contain a link that the user may use to log in '.

View file

@ -154,7 +154,7 @@ final class PhameBlog extends PhameDAO
$href = PhabricatorEnv::getProductionURI( $href = PhabricatorEnv::getProductionURI(
'/config/edit/policy.allow-public/'); '/config/edit/policy.allow-public/');
return pht( return pht(
'For custom domains to work, this Phabricator instance must be '. 'For custom domains to work, this this server must be '.
'configured to allow the public access policy. Configure this '. 'configured to allow the public access policy. Configure this '.
'setting %s, or ask an administrator to configure this setting. '. 'setting %s, or ask an administrator to configure this setting. '.
'The domain can be specified later once this setting has been '. 'The domain can be specified later once this setting has been '.

View file

@ -37,7 +37,7 @@ final class PhabricatorPolicyConfigOptions
->setSummary(pht('Allow users to set object visibility to public.')) ->setSummary(pht('Allow users to set object visibility to public.'))
->setDescription( ->setDescription(
pht( pht(
"Phabricator allows you to set the visibility of objects (like ". "This software allows you to set the visibility of objects (like ".
"repositories and tasks) to 'Public', which means **anyone ". "repositories and tasks) to 'Public', which means **anyone ".
"on the internet can see them, without needing to log in or ". "on the internet can see them, without needing to log in or ".
"have an account**.". "have an account**.".
@ -59,7 +59,7 @@ final class PhabricatorPolicyConfigOptions
->setSummary(pht( ->setSummary(pht(
'Lock specific application policies so they can not be edited.')) 'Lock specific application policies so they can not be edited.'))
->setDescription(pht( ->setDescription(pht(
'Phabricator has application policies which can dictate whether '. 'This software has application policies which can dictate whether '.
'users can take certain actions, such as creating new users. '."\n\n". 'users can take certain actions, such as creating new users. '."\n\n".
'This setting allows for "locking" these policies such that no '. 'This setting allows for "locking" these policies such that no '.
'further edits can be made on a per-policy basis.')) 'further edits can be made on a per-policy basis.'))

View file

@ -248,7 +248,7 @@ final class PhabricatorPolicy
case PhabricatorPolicies::POLICY_PUBLIC: case PhabricatorPolicies::POLICY_PUBLIC:
return pht( return pht(
'This object is public and can be viewed by anyone, even if they '. 'This object is public and can be viewed by anyone, even if they '.
'do not have a Phabricator account.'); 'do not have an account on this server.');
case PhabricatorPolicies::POLICY_USER: case PhabricatorPolicies::POLICY_USER:
return pht('Logged in users can take this action.'); return pht('Logged in users can take this action.');
case PhabricatorPolicies::POLICY_ADMIN: case PhabricatorPolicies::POLICY_ADMIN:

View file

@ -28,9 +28,10 @@ final class PhabricatorRepositoryConfigOptions
->setDescription( ->setDescription(
pht( pht(
'The default location in which to store working copies and other '. 'The default location in which to store working copies and other '.
'data about repositories. Phabricator will control and manage '. 'data about repositories. %s will control and manage '.
'data here, so you should **not** choose an existing directory '. 'data here, so you should **not** choose an existing directory '.
'full of data you care about.')), 'full of data you care about.',
PlatformSymbols::getPlatformServerName())),
); );
} }

View file

@ -1947,7 +1947,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
'point at this host, or the "device.id" configuration file on '. 'point at this host, or the "device.id" configuration file on '.
'this host may be incorrect.'. 'this host may be incorrect.'.
"\n\n". "\n\n".
'Requests routed within the cluster by Phabricator are always '. 'Requests routed within the cluster are always '.
'expected to be sent to a node which can serve the request. To '. 'expected to be sent to a node which can serve the request. To '.
'prevent loops, this request will not be proxied again.'. 'prevent loops, this request will not be proxied again.'.
"\n\n". "\n\n".
@ -2209,7 +2209,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
throw new PhutilAggregateException( throw new PhutilAggregateException(
pht( pht(
'Unable to read device public key while attempting to make '. 'Unable to read device public key while attempting to make '.
'authenticated method call within the Phabricator cluster. '. 'authenticated method call within the cluster. '.
'Use `%s` to register keys for this device. Exception: %s', 'Use `%s` to register keys for this device. Exception: %s',
'bin/almanac register', 'bin/almanac register',
$ex->getMessage()), $ex->getMessage()),
@ -2224,7 +2224,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
throw new PhutilAggregateException( throw new PhutilAggregateException(
pht( pht(
'Unable to read device private key while attempting to make '. 'Unable to read device private key while attempting to make '.
'authenticated method call within the Phabricator cluster. '. 'authenticated method call within the cluster. '.
'Use `%s` to register keys for this device. Exception: %s', 'Use `%s` to register keys for this device. Exception: %s',
'bin/almanac register', 'bin/almanac register',
$ex->getMessage()), $ex->getMessage()),