@recaptime-dev's working patches + fork for Phorge, a community fork of Phabricator. (Upstream dev and stable branches are at upstream/main and upstream/stable respectively.) hq.recaptime.dev/wiki/Phorge
phorge phabricator
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

Remove product literal strings in "pht()", part 22

Summary: Ref T13658.

Test Plan: Static checks only.

Maniphest Tasks: T13658

Differential Revision: https://secure.phabricator.com/D21788

+13 -11
+3 -2
src/applications/people/controller/PhabricatorPeopleWelcomeController.php
··· 68 68 ->appendRemarkupInstructions( 69 69 pht( 70 70 'This workflow will send this user ("%s") a copy of the "Welcome to '. 71 - 'Phabricator" email that users normally receive when their '. 71 + '%s" email that users normally receive when their '. 72 72 'accounts are created by an administrator.', 73 - $user->getUsername())) 73 + $user->getUsername(), 74 + PlatformSymbols::getPlatformServerName())) 74 75 ->appendRemarkupInstructions( 75 76 pht( 76 77 'The email will contain a link that the user may use to log in '.
+1 -1
src/applications/phame/storage/PhameBlog.php
··· 154 154 $href = PhabricatorEnv::getProductionURI( 155 155 '/config/edit/policy.allow-public/'); 156 156 return pht( 157 - 'For custom domains to work, this Phabricator instance must be '. 157 + 'For custom domains to work, this this server must be '. 158 158 'configured to allow the public access policy. Configure this '. 159 159 'setting %s, or ask an administrator to configure this setting. '. 160 160 'The domain can be specified later once this setting has been '.
+2 -2
src/applications/policy/config/PhabricatorPolicyConfigOptions.php
··· 37 37 ->setSummary(pht('Allow users to set object visibility to public.')) 38 38 ->setDescription( 39 39 pht( 40 - "Phabricator allows you to set the visibility of objects (like ". 40 + "This software allows you to set the visibility of objects (like ". 41 41 "repositories and tasks) to 'Public', which means **anyone ". 42 42 "on the internet can see them, without needing to log in or ". 43 43 "have an account**.". ··· 59 59 ->setSummary(pht( 60 60 'Lock specific application policies so they can not be edited.')) 61 61 ->setDescription(pht( 62 - 'Phabricator has application policies which can dictate whether '. 62 + 'This software has application policies which can dictate whether '. 63 63 'users can take certain actions, such as creating new users. '."\n\n". 64 64 'This setting allows for "locking" these policies such that no '. 65 65 'further edits can be made on a per-policy basis.'))
+1 -1
src/applications/policy/storage/PhabricatorPolicy.php
··· 248 248 case PhabricatorPolicies::POLICY_PUBLIC: 249 249 return pht( 250 250 'This object is public and can be viewed by anyone, even if they '. 251 - 'do not have a Phabricator account.'); 251 + 'do not have an account on this server.'); 252 252 case PhabricatorPolicies::POLICY_USER: 253 253 return pht('Logged in users can take this action.'); 254 254 case PhabricatorPolicies::POLICY_ADMIN:
+3 -2
src/applications/repository/config/PhabricatorRepositoryConfigOptions.php
··· 28 28 ->setDescription( 29 29 pht( 30 30 'The default location in which to store working copies and other '. 31 - 'data about repositories. Phabricator will control and manage '. 31 + 'data about repositories. %s will control and manage '. 32 32 'data here, so you should **not** choose an existing directory '. 33 - 'full of data you care about.')), 33 + 'full of data you care about.', 34 + PlatformSymbols::getPlatformServerName())), 34 35 ); 35 36 } 36 37
+3 -3
src/applications/repository/storage/PhabricatorRepository.php
··· 1947 1947 'point at this host, or the "device.id" configuration file on '. 1948 1948 'this host may be incorrect.'. 1949 1949 "\n\n". 1950 - 'Requests routed within the cluster by Phabricator are always '. 1950 + 'Requests routed within the cluster are always '. 1951 1951 'expected to be sent to a node which can serve the request. To '. 1952 1952 'prevent loops, this request will not be proxied again.'. 1953 1953 "\n\n". ··· 2209 2209 throw new PhutilAggregateException( 2210 2210 pht( 2211 2211 'Unable to read device public key while attempting to make '. 2212 - 'authenticated method call within the Phabricator cluster. '. 2212 + 'authenticated method call within the cluster. '. 2213 2213 'Use `%s` to register keys for this device. Exception: %s', 2214 2214 'bin/almanac register', 2215 2215 $ex->getMessage()), ··· 2224 2224 throw new PhutilAggregateException( 2225 2225 pht( 2226 2226 'Unable to read device private key while attempting to make '. 2227 - 'authenticated method call within the Phabricator cluster. '. 2227 + 'authenticated method call within the cluster. '. 2228 2228 'Use `%s` to register keys for this device. Exception: %s', 2229 2229 'bin/almanac register', 2230 2230 $ex->getMessage()),