mirror of
https://we.phorge.it/source/phorge.git
synced 2024-11-26 08:42:41 +01:00
Remove product literal strings in "pht()", part 22
Summary: Ref T13658. Test Plan: Static checks only. Maniphest Tasks: T13658 Differential Revision: https://secure.phabricator.com/D21788
This commit is contained in:
parent
b1079b79e5
commit
7fd8263185
6 changed files with 13 additions and 11 deletions
|
@ -68,9 +68,10 @@ final class PhabricatorPeopleWelcomeController
|
|||
->appendRemarkupInstructions(
|
||||
pht(
|
||||
'This workflow will send this user ("%s") a copy of the "Welcome to '.
|
||||
'Phabricator" email that users normally receive when their '.
|
||||
'%s" email that users normally receive when their '.
|
||||
'accounts are created by an administrator.',
|
||||
$user->getUsername()))
|
||||
$user->getUsername(),
|
||||
PlatformSymbols::getPlatformServerName()))
|
||||
->appendRemarkupInstructions(
|
||||
pht(
|
||||
'The email will contain a link that the user may use to log in '.
|
||||
|
|
|
@ -154,7 +154,7 @@ final class PhameBlog extends PhameDAO
|
|||
$href = PhabricatorEnv::getProductionURI(
|
||||
'/config/edit/policy.allow-public/');
|
||||
return pht(
|
||||
'For custom domains to work, this Phabricator instance must be '.
|
||||
'For custom domains to work, this this server must be '.
|
||||
'configured to allow the public access policy. Configure this '.
|
||||
'setting %s, or ask an administrator to configure this setting. '.
|
||||
'The domain can be specified later once this setting has been '.
|
||||
|
|
|
@ -37,7 +37,7 @@ final class PhabricatorPolicyConfigOptions
|
|||
->setSummary(pht('Allow users to set object visibility to public.'))
|
||||
->setDescription(
|
||||
pht(
|
||||
"Phabricator allows you to set the visibility of objects (like ".
|
||||
"This software allows you to set the visibility of objects (like ".
|
||||
"repositories and tasks) to 'Public', which means **anyone ".
|
||||
"on the internet can see them, without needing to log in or ".
|
||||
"have an account**.".
|
||||
|
@ -59,7 +59,7 @@ final class PhabricatorPolicyConfigOptions
|
|||
->setSummary(pht(
|
||||
'Lock specific application policies so they can not be edited.'))
|
||||
->setDescription(pht(
|
||||
'Phabricator has application policies which can dictate whether '.
|
||||
'This software has application policies which can dictate whether '.
|
||||
'users can take certain actions, such as creating new users. '."\n\n".
|
||||
'This setting allows for "locking" these policies such that no '.
|
||||
'further edits can be made on a per-policy basis.'))
|
||||
|
|
|
@ -248,7 +248,7 @@ final class PhabricatorPolicy
|
|||
case PhabricatorPolicies::POLICY_PUBLIC:
|
||||
return pht(
|
||||
'This object is public and can be viewed by anyone, even if they '.
|
||||
'do not have a Phabricator account.');
|
||||
'do not have an account on this server.');
|
||||
case PhabricatorPolicies::POLICY_USER:
|
||||
return pht('Logged in users can take this action.');
|
||||
case PhabricatorPolicies::POLICY_ADMIN:
|
||||
|
|
|
@ -28,9 +28,10 @@ final class PhabricatorRepositoryConfigOptions
|
|||
->setDescription(
|
||||
pht(
|
||||
'The default location in which to store working copies and other '.
|
||||
'data about repositories. Phabricator will control and manage '.
|
||||
'data about repositories. %s will control and manage '.
|
||||
'data here, so you should **not** choose an existing directory '.
|
||||
'full of data you care about.')),
|
||||
'full of data you care about.',
|
||||
PlatformSymbols::getPlatformServerName())),
|
||||
);
|
||||
}
|
||||
|
||||
|
|
|
@ -1947,7 +1947,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
|
|||
'point at this host, or the "device.id" configuration file on '.
|
||||
'this host may be incorrect.'.
|
||||
"\n\n".
|
||||
'Requests routed within the cluster by Phabricator are always '.
|
||||
'Requests routed within the cluster are always '.
|
||||
'expected to be sent to a node which can serve the request. To '.
|
||||
'prevent loops, this request will not be proxied again.'.
|
||||
"\n\n".
|
||||
|
@ -2209,7 +2209,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
|
|||
throw new PhutilAggregateException(
|
||||
pht(
|
||||
'Unable to read device public key while attempting to make '.
|
||||
'authenticated method call within the Phabricator cluster. '.
|
||||
'authenticated method call within the cluster. '.
|
||||
'Use `%s` to register keys for this device. Exception: %s',
|
||||
'bin/almanac register',
|
||||
$ex->getMessage()),
|
||||
|
@ -2224,7 +2224,7 @@ final class PhabricatorRepository extends PhabricatorRepositoryDAO
|
|||
throw new PhutilAggregateException(
|
||||
pht(
|
||||
'Unable to read device private key while attempting to make '.
|
||||
'authenticated method call within the Phabricator cluster. '.
|
||||
'authenticated method call within the cluster. '.
|
||||
'Use `%s` to register keys for this device. Exception: %s',
|
||||
'bin/almanac register',
|
||||
$ex->getMessage()),
|
||||
|
|
Loading…
Reference in a new issue