feat: rename users to account or person

Replace translated text in most locations

Signed-off-by: Vincent Petry <vincent@nextcloud.com>
This commit is contained in:
Vincent Petry 2022-09-21 17:44:32 +02:00 committed by John Molakvoæ
parent b63abdae8c
commit 839ddaa354
No known key found for this signature in database
GPG Key ID: 60C25B8C072916CF
109 changed files with 220 additions and 220 deletions

View File

@ -123,7 +123,7 @@ class Notifier implements INotifier {
];
if ($isDeletedActor) {
$subject = $l->t('You were mentioned on "{file}", in a comment by a user that has since been deleted');
$subject = $l->t('You were mentioned on "{file}", in a comment by an account that has since been deleted');
} else {
$subject = $l->t('{user} mentioned you in a comment on "{file}"');
$subjectParameters['user'] = [

View File

@ -211,7 +211,7 @@ class NotifierTest extends TestCase {
public function testPrepareSuccessDeletedUser() {
$fileName = 'Gre\'thor.odp';
$message = 'You were mentioned on "Gre\'thor.odp", in a comment by a user that has since been deleted';
$message = 'You were mentioned on "Gre\'thor.odp", in a comment by an account that has since been deleted';
/** @var Node|MockObject $node */
$node = $this->createMock(Node::class);
@ -255,7 +255,7 @@ class NotifierTest extends TestCase {
$this->notification
->expects($this->once())
->method('setRichSubject')
->with('You were mentioned on "{file}", in a comment by a user that has since been deleted', $this->anything())
->with('You were mentioned on "{file}", in a comment by an account that has since been deleted', $this->anything())
->willReturnSelf();
$this->notification
->expects($this->once())

View File

@ -3,8 +3,8 @@
xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd">
<id>contactsinteraction</id>
<name>Contacts Interaction</name>
<summary>Manages interaction between users and contacts</summary>
<description>Collect data about user and contacts interactions and provide an address book for the data</description>
<summary>Manages interaction between accounts and contacts</summary>
<description>Collect data about accounts and contacts interactions and provide an address book for the data</description>
<version>1.10.0</version>
<licence>agpl</licence>
<author>Christoph Wurst</author>

View File

@ -6,7 +6,7 @@
<summary>Dashboard app</summary>
<description><![CDATA[Start your day informed
The Nextcloud Dashboard is your starting point of the day, giving you an overview of your upcoming appointments, urgent emails, chat messages, incoming tickets, latest tweets and much more! Users can add the widgets they like and change the background to their liking.]]>
The Nextcloud Dashboard is your starting point of the day, giving you an overview of your upcoming appointments, urgent emails, chat messages, incoming tickets, latest tweets and much more! People can add the widgets they like and change the background to their liking.]]>
</description>
<version>7.9.0</version>
<licence>agpl</licence>

View File

@ -1,7 +1,7 @@
<template>
<div>
<NcSettingsSection :name="$t('dav', 'Availability')"
:description="$t('dav', 'If you configure your working hours, other users will see when you are out of office when they book a meeting.')">
:description="$t('dav', 'If you configure your working hours, other people will see when you are out of office when they book a meeting.')">
<AvailabilityForm />
</NcSettingsSection>
<NcSettingsSection v-if="!hideAbsenceSettings"

View File

@ -24,7 +24,7 @@ style('encryption', 'settings-admin');
<span class="msg"></span>
<br/>
<em>
<?php p($l->t("The recovery key is an extra encryption key that is used to encrypt files. It allows recovery of a user's files if the user forgets his or her password.")) ?>
<?php p($l->t("The recovery key is an additional encryption key used to encrypt files. It is used to recover files from an account if the password is forgotten.")) ?>
</em>
<br/>
<input type="password"

View File

@ -132,7 +132,7 @@ class FederatedShareProvider implements IShareProvider {
$alreadySharedGroup = $this->getSharedWith($shareWith, IShare::TYPE_REMOTE_GROUP, $share->getNode(), 1, 0);
if (!empty($alreadyShared) || !empty($alreadySharedGroup)) {
$message = 'Sharing %1$s failed, because this item is already shared with %2$s';
$message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with user %2$s', [$share->getNode()->getName(), $shareWith]);
$message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with the account %2$s', [$share->getNode()->getName(), $shareWith]);
$this->logger->debug(sprintf($message, $share->getNode()->getName(), $shareWith), ['app' => 'Federated File Sharing']);
throw new \Exception($message_t);
}
@ -143,8 +143,8 @@ class FederatedShareProvider implements IShareProvider {
$currentServer = $this->addressHandler->generateRemoteURL();
$currentUser = $sharedBy;
if ($this->addressHandler->compareAddresses($cloudId->getUser(), $cloudId->getRemote(), $currentUser, $currentServer)) {
$message = 'Not allowed to create a federated share with the same user.';
$message_t = $this->l->t('Not allowed to create a federated share with the same user');
$message = 'Not allowed to create a federated share to the same account.';
$message_t = $this->l->t('Not allowed to create a federated share to the same account');
$this->logger->debug($message, ['app' => 'Federated File Sharing']);
throw new \Exception($message_t);
}

View File

@ -22,44 +22,44 @@
<template>
<NcSettingsSection :name="t('federatedfilesharing', 'Federated Cloud Sharing')"
:description="t('federatedfilesharing', 'Adjust how people can share between servers. This includes shares between users on this server as well if they are using federated sharing.')"
:description="t('federatedfilesharing', 'Adjust how people can share between servers. This includes shares between people on this server as well if they are using federated sharing.')"
:doc-url="sharingFederatedDocUrl">
<NcCheckboxRadioSwitch type="switch"
:checked.sync="outgoingServer2serverShareEnabled"
@update:checked="update('outgoing_server2server_share_enabled', outgoingServer2serverShareEnabled)">
{{ t('federatedfilesharing', 'Allow users on this server to send shares to other servers (this option also allows WebDAV access to public shares)') }}
{{ t('federatedfilesharing', 'Allow people on this server to send shares to other servers (this option also allows WebDAV access to public shares)') }}
</NcCheckboxRadioSwitch>
<NcCheckboxRadioSwitch type="switch"
:checked.sync="incomingServer2serverShareEnabled"
@update:checked="update('incoming_server2server_share_enabled', incomingServer2serverShareEnabled)">
{{ t('federatedfilesharing', 'Allow users on this server to receive shares from other servers') }}
{{ t('federatedfilesharing', 'Allow people on this server to receive shares from other servers') }}
</NcCheckboxRadioSwitch>
<NcCheckboxRadioSwitch v-if="federatedGroupSharingSupported"
type="switch"
:checked.sync="outgoingServer2serverGroupShareEnabled"
@update:checked="update('outgoing_server2server_group_share_enabled', outgoingServer2serverGroupShareEnabled)">
{{ t('federatedfilesharing', 'Allow users on this server to send shares to groups on other servers') }}
{{ t('federatedfilesharing', 'Allow people on this server to send shares to groups on other servers') }}
</NcCheckboxRadioSwitch>
<NcCheckboxRadioSwitch v-if="federatedGroupSharingSupported"
type="switch"
:checked.sync="incomingServer2serverGroupShareEnabled"
@update:checked="update('incoming_server2server_group_share_enabled', incomingServer2serverGroupShareEnabled)">
{{ t('federatedfilesharing', 'Allow users on this server to receive group shares from other servers') }}
{{ t('federatedfilesharing', 'Allow people on this server to receive group shares from other servers') }}
</NcCheckboxRadioSwitch>
<NcCheckboxRadioSwitch type="switch"
:checked.sync="lookupServerEnabled"
@update:checked="update('lookupServerEnabled', lookupServerEnabled)">
{{ t('federatedfilesharing', 'Search global and public address book for users') }}
{{ t('federatedfilesharing', 'Search global and public address book for people') }}
</NcCheckboxRadioSwitch>
<NcCheckboxRadioSwitch type="switch"
:checked.sync="lookupServerUploadEnabled"
@update:checked="update('lookupServerUploadEnabled', lookupServerUploadEnabled)">
{{ t('federatedfilesharing', 'Allow users to publish their data to a global and public address book') }}
{{ t('federatedfilesharing', 'Allow people to publish their data to a global and public address book') }}
</NcCheckboxRadioSwitch>
</NcSettingsSection>
</template>

View File

@ -397,7 +397,7 @@ class FederatedShareProviderTest extends \Test\TestCase {
$share = $this->provider->create($share);
$this->fail();
} catch (\Exception $e) {
$this->assertEquals('Not allowed to create a federated share with the same user', $e->getMessage());
$this->assertEquals('Not allowed to create a federated share to the same account', $e->getMessage());
}
$qb = $this->connection->getQueryBuilder();
@ -459,7 +459,7 @@ class FederatedShareProviderTest extends \Test\TestCase {
try {
$this->provider->create($share);
} catch (\Exception $e) {
$this->assertEquals('Sharing myFile failed, because this item is already shared with user user@server.com', $e->getMessage());
$this->assertEquals('Sharing myFile failed, because this item is already shared with account user@server.com', $e->getMessage());
}
}

View File

@ -3,8 +3,8 @@
xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd">
<id>federation</id>
<name>Federation</name>
<summary>Federation allows you to connect with other trusted servers to exchange the user directory.</summary>
<description>Federation allows you to connect with other trusted servers to exchange the user directory. For example this will be used to auto-complete external users for federated sharing.</description>
<summary>Federation allows you to connect with other trusted servers to exchange the account directory.</summary>
<description>Federation allows you to connect with other trusted servers to exchange the account directory. For example this will be used to auto-complete external accounts for federated sharing.</description>
<version>1.19.0</version>
<licence>agpl</licence>
<author>Bjoern Schiessle</author>

View File

@ -8,7 +8,7 @@ style('federation', 'settings-admin')
?>
<div id="ocFederationSettings" class="section">
<h2><?php p($l->t('Trusted servers')); ?></h2>
<p class="settings-hint"><?php p($l->t('Federation allows you to connect with other trusted servers to exchange the user directory. For example this will be used to auto-complete external users for federated sharing. It is not necessary to add a server as trusted server in order to create a federated share.')); ?></p>
<p class="settings-hint"><?php p($l->t('Federation allows you to connect with other trusted servers to exchange the account directory. For example this will be used to auto-complete external accounts for federated sharing. It is not necessary to add a server as trusted server in order to create a federated share.')); ?></p>
<ul id="listOfTrustedServers">
<?php foreach ($_['trustedServers'] as $trustedServer) { ?>

View File

@ -69,7 +69,7 @@
_setupClipboard: function() {
var clipboard = new Clipboard('.permalink');
clipboard.on('success', function(e) {
OC.Notification.show(t('files', 'Direct link was copied (only works for users who have access to this file/folder)'), {type: 'success'});
OC.Notification.show(t('files', 'Direct link was copied (only works for people who have access to this file/folder)'), {type: 'success'});
});
clipboard.on('error', function(e) {
var $row = this.$('.permalink-field');
@ -166,7 +166,7 @@
starAltText: isFavorite ? t('files', 'Favorited') : t('files', 'Favorite'),
starClass: isFavorite ? 'icon-starred' : 'icon-star',
permalink: this._makePermalink(this.model.get('id')),
permalinkTitle: t('files', 'Copy direct link (only works for users who have access to this file/folder)')
permalinkTitle: t('files', 'Copy direct link (only works for people who have access to this file/folder)')
}));
// TODO: we really need OC.Previews

View File

@ -163,7 +163,7 @@ class Provider implements IProvider {
if (!isset($parsedParameters['user'])) {
// External user via public link share
$subject = str_replace('{user}', $this->activityLang->t('"remote user"'), $subject);
$subject = str_replace('{user}', $this->activityLang->t('"remote person"'), $subject);
}
$this->setSubjects($event, $subject, $parsedParameters);
@ -281,7 +281,7 @@ class Provider implements IProvider {
if (!isset($parsedParameters['user'])) {
// External user via public link share
$subject = str_replace('{user}', $this->activityLang->t('"remote user"'), $subject);
$subject = str_replace('{user}', $this->activityLang->t('"remote person"'), $subject);
}
$this->setSubjects($event, $subject, $parsedParameters);

View File

@ -5,9 +5,9 @@
<name>External storage support</name>
<summary>Adds basic external storage support</summary>
<description>
This application enables administrators to configure connections to external storage providers, such as FTP servers, S3 or SWIFT object stores, other Nextcloud servers, WebDAV servers, and more. Administrators can choose which types of storage to enable and can mount these storage locations for a user, a group, or the entire system. Users will see a new folder appear in their root Nextcloud directory, which they can access and use like any other Nextcloud folder. External storage also allows users to share files stored in these external locations. In these cases, the credentials for the owner of the file are used when the recipient requests the file from external storage, thereby ensuring that the recipient can access the shared file.
This application enables administrators to configure connections to external storage providers, such as FTP servers, S3 or SWIFT object stores, other Nextcloud servers, WebDAV servers, and more. Administration can choose which types of storage to enable and can mount these storage locations for an account, a group, or the entire system. Users will see a new folder appear in their root Nextcloud directory, which they can access and use like any other Nextcloud folder. External storage also allows people to share files stored in these external locations. In these cases, the credentials for the owner of the file are used when the recipient requests the file from external storage, thereby ensuring that the recipient can access the shared file.
External storage can be configured using the GUI or at the command line. This second option provides the advanced user with more flexibility for configuring bulk external storage mounts and setting mount priorities. More information is available in the external storage GUI documentation and the external storage Configuration File documentation.
External storage can be configured using the GUI or at the command line. This second option provides the administration with more flexibility for configuring bulk external storage mounts and setting mount priorities. More information is available in the external storage GUI documentation and the external storage Configuration File documentation.
</description>
<version>1.21.0</version>
<licence>agpl</licence>

View File

@ -91,7 +91,7 @@ function initApplicableUsersMultiselect($elements, userListLimit) {
return;
}
return $elements.select2({
placeholder: t('files_external', 'Type to select user or group.'),
placeholder: t('files_external', 'Type to select account or group.'),
allowClear: true,
multiple: true,
toggleSelect: true,

View File

@ -158,7 +158,7 @@ class Notify extends Base {
} catch (\Exception $e) {
$output->writeln('<error>Error while trying to create storage</error>');
if ($noAuth) {
$output->writeln('<error>Username and/or password required</error>');
$output->writeln('<error>Account name and/or password required</error>');
}
return self::FAILURE;
}

View File

@ -172,7 +172,7 @@ class UserGlobalStoragesController extends StoragesController {
} else {
return new DataResponse(
[
'message' => $this->l10n->t('Storage with ID "%d" is not user editable', [$id])
'message' => $this->l10n->t('Storage with ID "%d" is not editable by non-admins', [$id])
],
Http::STATUS_FORBIDDEN
);

View File

@ -38,7 +38,7 @@ class OpenStackV2 extends AuthMechanism {
->setScheme(self::SCHEME_OPENSTACK)
->setText($l->t('OpenStack v2'))
->addParameters([
new DefinitionParameter('user', $l->t('Username')),
new DefinitionParameter('user', $l->t('Account name')),
(new DefinitionParameter('password', $l->t('Password')))
->setType(DefinitionParameter::VALUE_PASSWORD),
new DefinitionParameter('tenant', $l->t('Tenant name')),

View File

@ -42,7 +42,7 @@ class OpenStackV3 extends AuthMechanism {
->setScheme(self::SCHEME_OPENSTACK)
->setText($l->t('OpenStack v3'))
->addParameters([
new DefinitionParameter('user', $l->t('Username')),
new DefinitionParameter('user', $l->t('Account name')),
new DefinitionParameter('domain', $l->t('Domain')),
(new DefinitionParameter('password', $l->t('Password')))
->setType(DefinitionParameter::VALUE_PASSWORD),

View File

@ -37,7 +37,7 @@ class Rackspace extends AuthMechanism {
->setScheme(self::SCHEME_OPENSTACK)
->setText($l->t('Rackspace'))
->addParameters([
new DefinitionParameter('user', $l->t('Username')),
new DefinitionParameter('user', $l->t('Account name')),
(new DefinitionParameter('key', $l->t('API key')))
->setType(DefinitionParameter::VALUE_PASSWORD),
])

View File

@ -35,9 +35,9 @@ class Password extends AuthMechanism {
$this
->setIdentifier('password::password')
->setScheme(self::SCHEME_PASSWORD)
->setText($l->t('Username and password'))
->setText($l->t('Account name and password'))
->addParameters([
new DefinitionParameter('user', $l->t('Username')),
new DefinitionParameter('user', $l->t('Account name')),
(new DefinitionParameter('password', $l->t('Password')))
->setType(DefinitionParameter::VALUE_PASSWORD),
]);

View File

@ -52,7 +52,7 @@ class UserGlobalAuth extends AuthMechanism {
->setIdentifier('password::global::user')
->setVisibility(BackendService::VISIBILITY_DEFAULT)
->setScheme(self::SCHEME_PASSWORD)
->setText($l->t('Global credentials, user entered'));
->setText($l->t('Global credentials, manually entered'));
}
public function saveBackendOptions(IUser $user, $id, $backendOptions) {

View File

@ -50,9 +50,9 @@ class UserProvided extends AuthMechanism implements IUserProvided {
->setIdentifier('password::userprovided')
->setVisibility(BackendService::VISIBILITY_ADMIN)
->setScheme(self::SCHEME_PASSWORD)
->setText($l->t('User entered, store in database'))
->setText($l->t('Manually entered, store in database'))
->addParameters([
(new DefinitionParameter('user', $l->t('Username')))
(new DefinitionParameter('user', $l->t('Account name')))
->setFlag(DefinitionParameter::FLAG_USER_PROVIDED),
(new DefinitionParameter('password', $l->t('Password')))
->setType(DefinitionParameter::VALUE_PASSWORD)

View File

@ -47,7 +47,7 @@ class RSA extends AuthMechanism {
->setScheme(self::SCHEME_PUBLICKEY)
->setText($l->t('RSA public key'))
->addParameters([
new DefinitionParameter('user', $l->t('Username')),
new DefinitionParameter('user', $l->t('Account name')),
new DefinitionParameter('public_key', $l->t('Public key')),
(new DefinitionParameter('private_key', 'private_key'))
->setType(DefinitionParameter::VALUE_HIDDEN),

View File

@ -46,7 +46,7 @@ class RSAPrivateKey extends AuthMechanism {
->setScheme(self::SCHEME_PUBLICKEY)
->setText($l->t('RSA private key'))
->addParameters([
new DefinitionParameter('user', $l->t('Username')),
new DefinitionParameter('user', $l->t('Account name')),
(new DefinitionParameter('password', $l->t('Password')))
->setFlag(DefinitionParameter::FLAG_OPTIONAL)
->setType(DefinitionParameter::VALUE_PASSWORD),

View File

@ -67,7 +67,7 @@ class SMB extends Backend {
(new DefinitionParameter('check_acl', $l->t('Verify ACL access when listing files')))
->setType(DefinitionParameter::VALUE_BOOLEAN)
->setFlag(DefinitionParameter::FLAG_OPTIONAL)
->setTooltip($l->t("Check the ACL's of each file or folder inside a directory to filter out items where the user has no read permissions, comes with a performance penalty")),
->setTooltip($l->t("Check the ACL's of each file or folder inside a directory to filter out items where the account has no read permissions, comes with a performance penalty")),
(new DefinitionParameter('timeout', $l->t('Timeout')))
->setType(DefinitionParameter::VALUE_HIDDEN)
->setFlag(DefinitionParameter::FLAG_OPTIONAL),

View File

@ -46,7 +46,7 @@ class SMB_OC extends Backend {
->setText($l->t('SMB/CIFS using OC login'))
->addParameters([
new DefinitionParameter('host', $l->t('Host')),
(new DefinitionParameter('username_as_share', $l->t('Username as share')))
(new DefinitionParameter('username_as_share', $l->t('Account name as share')))
->setType(DefinitionParameter::VALUE_BOOLEAN),
(new DefinitionParameter('share', $l->t('Share')))
->setFlag(DefinitionParameter::FLAG_OPTIONAL),

View File

@ -167,7 +167,7 @@ class Swift extends \OC\Files\Storage\Common {
or (empty($params['user']) && empty($params['userid'])) or empty($params['bucket'])
or empty($params['region'])
) {
throw new StorageBadConfigException("API Key or password, Username, Bucket and Region have to be configured.");
throw new StorageBadConfigException("API Key or password, Account name, Bucket and Region have to be configured.");
}
$user = $params['user'];

View File

@ -108,7 +108,7 @@ function writeParameterInput($parameter, $options, $classes = []) {
<form data-can-create="<?php echo $canCreateMounts?'true':'false' ?>" data-can-create-local="<?php echo $canCreateNewLocalStorage?'true':'false' ?>" id="files_external" class="section" data-encryption-enabled="<?php echo $_['encryptionEnabled']?'true': 'false'; ?>">
<h2 class="inlineblock" data-anchor-name="external-storage"><?php p($l->t('External storage')); ?></h2>
<a target="_blank" rel="noreferrer" class="icon-info" title="<?php p($l->t('Open documentation'));?>" href="<?php p(link_to_docs('admin-external-storage')); ?>"></a>
<p class="settings-hint"><?php p($l->t('External storage enables you to mount external storage services and devices as secondary Nextcloud storage devices. You may also allow users to mount their own external storage services.')); ?></p>
<p class="settings-hint"><?php p($l->t('External storage enables you to mount external storage services and devices as secondary Nextcloud storage devices. You may also allow people to mount their own external storage services.')); ?></p>
<?php if (isset($_['dependencies']) and ($_['dependencies'] !== '') and $canCreateMounts) {
print_unescaped(''.$_['dependencies'].'');
} ?>
@ -171,7 +171,7 @@ uasort($sortedBackends, function ($a, $b) {
<td class="configuration"></td>
<?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN): ?>
<td class="applicable" align="right">
<label><input type="checkbox" class="applicableToAllUsers" checked="" /><?php p($l->t('All users')); ?></label>
<label><input type="checkbox" class="applicableToAllUsers" checked="" /><?php p($l->t('All people')); ?></label>
<div class="applicableUsersContainer">
<input type="hidden" class="applicableUsers" style="width:20em;" value="" />
</div>
@ -193,7 +193,7 @@ uasort($sortedBackends, function ($a, $b) {
value="1" <?php if ($_['allowUserMounting']) {
print_unescaped(' checked="checked"');
} ?> />
<label for="allowUserMounting"><?php p($l->t('Allow users to mount external storage')); ?></label> <span id="userMountingMsg" class="msg"></span>
<label for="allowUserMounting"><?php p($l->t('Allow people to mount external storage')); ?></label> <span id="userMountingMsg" class="msg"></span>
<p id="userMountingBackends"<?php if (!$_['allowUserMounting']): ?> class="hidden"<?php endif; ?>>
<?php
@ -228,7 +228,7 @@ uasort($sortedBackends, function ($a, $b) {
<input type="text" name="username"
autocomplete="false"
value="<?php p($_['globalCredentials']['user']); ?>"
placeholder="<?php p($l->t('Username')) ?>"/>
placeholder="<?php p($l->t('Account name')) ?>"/>
<input type="password" name="password"
autocomplete="false"
value="<?php p($_['globalCredentials']['password']); ?>"

View File

@ -5,7 +5,7 @@
<name>File sharing</name>
<summary>File sharing</summary>
<description>
This application enables users to share files within Nextcloud. If enabled, the admin can choose which groups can share files. The applicable users can then share files and folders with other users and groups within Nextcloud. In addition, if the admin enables the share link feature, an external link can be used to share files with other users outside of Nextcloud. Admins can also enforce passwords, expirations dates, and enable server to server sharing via share links, as well as sharing from mobile devices.
This application enables people to share files within Nextcloud. If enabled, the admin can choose which groups can share files. The applicable people can then share files and folders with other people and groups within Nextcloud. In addition, if the admin enables the share link feature, an external link can be used to share files with other people outside of Nextcloud. Admins can also enforce passwords, expirations dates, and enable server to server sharing via share links, as well as sharing from mobile devices.
Turning the feature off removes shared files and folders on the server for all share recipients, and also on the sync clients and mobile apps. More information is available in the Nextcloud Documentation.
</description>

View File

@ -687,7 +687,7 @@ class ShareAPIController extends OCSController {
if ($shareType === IShare::TYPE_USER) {
// Valid user is required to share
if ($shareWith === null || !$this->userManager->userExists($shareWith)) {
throw new OCSNotFoundException($this->l->t('Please specify a valid user'));
throw new OCSNotFoundException($this->l->t('Please specify a valid account to share with'));
}
$share->setSharedWith($shareWith);
$share->setPermissions($permissions);
@ -762,7 +762,7 @@ class ShareAPIController extends OCSController {
}
if ($shareWith === null) {
throw new OCSNotFoundException($this->l->t('Please specify a valid federated user ID'));
throw new OCSNotFoundException($this->l->t('Please specify a valid federated account ID'));
}
$share->setSharedWith($shareWith);

View File

@ -29,7 +29,7 @@
class="checkbox"
type="checkbox"
@change="toggleEnabled">
<label for="files-sharing-personal-settings-accept">{{ t('files_sharing', 'Accept user and group shares by default') }}</label>
<label for="files-sharing-personal-settings-accept">{{ t('files_sharing', 'Accept shares from other accounts and groups by default') }}</label>
</p>
<p v-if="allowCustomDirectory">
<SelectShareFolderDialogue />

View File

@ -72,9 +72,9 @@ export default {
internalLinkSubtitle() {
if (this.fileInfo.type === 'dir') {
return t('files_sharing', 'Only works for users with access to this folder')
return t('files_sharing', 'Only works for people with access to this folder')
}
return t('files_sharing', 'Only works for users with access to this file')
return t('files_sharing', 'Only works for people with access to this file')
},
},

View File

@ -94,7 +94,7 @@ export default {
},
subTitle() {
return (this.showInheritedShares && this.shares.length === 0)
? t('files_sharing', 'No other users with access found')
? t('files_sharing', 'No other accounts with access found')
: ''
},
toggleTooltip() {

View File

@ -1679,7 +1679,7 @@ class ShareAPIControllerTest extends TestCase {
public function testCreateShareUserNoShareWith() {
$this->expectException(\OCP\AppFramework\OCS\OCSNotFoundException::class);
$this->expectExceptionMessage('Please specify a valid user');
$this->expectExceptionMessage('Please specify a valid person to share with');
$share = $this->newShare();
$this->shareManager->method('newShare')->willReturn($share);
@ -1707,7 +1707,7 @@ class ShareAPIControllerTest extends TestCase {
public function testCreateShareUserNoValidShareWith() {
$this->expectException(\OCP\AppFramework\OCS\OCSNotFoundException::class);
$this->expectExceptionMessage('Please specify a valid user');
$this->expectExceptionMessage('Please specify a valid person to share with');
$share = $this->newShare();
$this->shareManager->method('newShare')->willReturn($share);

View File

@ -3,10 +3,10 @@
xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd">
<id>files_trashbin</id>
<name>Deleted files</name>
<summary>This application enables users to restore files that were deleted from the system.</summary>
<summary>This application enables people to restore files that were deleted from the system.</summary>
<description>
This application enables users to restore files that were deleted from the system. It displays a list of deleted files in the web interface, and has options to restore those deleted files back to the users file directories or remove them permanently from the system. Restoring a file also restores related file versions, if the versions application is enabled. When a file is deleted from a share, it can be restored in the same manner, though it is no longer shared. By default, these files remain in the trash bin for 30 days.
To prevent a user from running out of disk space, the Deleted files app will not utilize more than 50% of the currently available free quota for deleted files. If the deleted files exceed this limit, the app deletes the oldest files until it gets below this limit. More information is available in the Deleted Files documentation.
This application enables people to restore files that were deleted from the system. It displays a list of deleted files in the web interface, and has options to restore those deleted files back to the people file directories or remove them permanently from the system. Restoring a file also restores related file versions, if the versions application is enabled. When a file is deleted from a share, it can be restored in the same manner, though it is no longer shared. By default, these files remain in the trash bin for 30 days.
To prevent an account from running out of disk space, the Deleted files app will not utilize more than 50% of the currently available free quota for deleted files. If the deleted files exceed this limit, the app deletes the oldest files until it gets below this limit. More information is available in the Deleted Files documentation.
</description>
<version>1.19.0</version>

View File

@ -5,8 +5,8 @@
<name>Versions</name>
<summary>This application automatically maintains older versions of files that are changed.</summary>
<description>
This application automatically maintains older versions of files that are changed. When enabled, a hidden versions folder is provisioned in every user's directory and is used to store old file versions. A user can revert to an older version through the web interface at any time, with the replaced file becoming a version. The app automatically manages the versions folder to ensure the user does not run out of Quota because of versions.
In addition to the expiry of versions, the versions app makes certain never to use more than 50% of the user's currently available free space. If stored versions exceed this limit, the app will delete the oldest versions first until it meets this limit. More information is available in the Versions documentation.
This application automatically maintains older versions of files that are changed. When enabled, a hidden versions folder is provisioned in every user's directory and is used to store old file versions. A user can revert to an older version through the web interface at any time, with the replaced file becoming a version. The app automatically manages the versions folder to ensure the account does not run out of Quota because of versions.
In addition to the expiry of versions, the versions app makes certain never to use more than 50% of the account's currently available free space. If stored versions exceed this limit, the app will delete the oldest versions first until it meets this limit. More information is available in the Versions documentation.
</description>
<version>1.22.0</version>
<licence>agpl</licence>

View File

@ -50,7 +50,7 @@ class ExpireVersions extends Command {
->addArgument(
'user_id',
InputArgument::OPTIONAL | InputArgument::IS_ARRAY,
'expire file versions of the given user(s), if no user is given file versions for all users will be expired.'
'expire file versions of the given account(s), if no account is given file versions for all accounts will be expired.'
);
}
@ -65,7 +65,7 @@ class ExpireVersions extends Command {
if (!empty($users)) {
foreach ($users as $user) {
if (!$this->userManager->userExists($user)) {
$output->writeln("<error>Unknown user $user</error>");
$output->writeln("<error>Unknown account $user</error>");
return self::FAILURE;
}

View File

@ -3,8 +3,8 @@
xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd">
<id>lookup_server_connector</id>
<name>Lookup Server Connector</name>
<summary>Sync public user information with the lookup server</summary>
<description>Sync public user information with the lookup server</description>
<summary>Sync public account information with the lookup server</summary>
<description>Sync public account information with the lookup server</description>
<version>1.17.0</version>
<licence>agpl</licence>
<author>Bjoern Schiessle</author>

View File

@ -3,10 +3,10 @@
xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd">
<id>provisioning_api</id>
<name>Provisioning API</name>
<summary>This application enables a set of APIs that external systems can use to manage users, groups and apps.</summary>
<summary>This application enables a set of APIs that external systems can use to manage accounts, groups and apps.</summary>
<description>
This application enables a set of APIs that external systems can use to create, edit, delete and query user
attributes, query, set and remove groups, set quota and query total storage used in Nextcloud. Group admin users
This application enables a set of APIs that external systems can use to create, edit, delete and query account
attributes, query, set and remove groups, set quota and query total storage used in Nextcloud. Group admin accounts
can also query Nextcloud and perform the same functions as an admin for groups they manage. The API also enables
an admin to query for active Nextcloud applications, application info, and to enable or disable an app remotely.
Once the app is enabled, HTTP requests can be used via a Basic Auth header to perform any of the functions

View File

@ -133,7 +133,7 @@ class AppConfigController extends OCSController {
}
if (!$this->isAllowedToChangedKey($user, $app, $key)) {
throw new NotAdminException($this->l10n->t('Logged in user must be an administrator or have authorization to edit this setting.'));
throw new NotAdminException($this->l10n->t('Logged in account must be an administrator or have authorization to edit this setting.'));
}
try {

View File

@ -83,7 +83,7 @@ class VerificationController extends Controller {
public function showVerifyMail(string $token, string $userId, string $key) {
if ($this->userSession->getUser()->getUID() !== $userId) {
// not a public page, hence getUser() must return an IUser
throw new InvalidArgumentException('Logged in user is not mail address owner');
throw new InvalidArgumentException('Logged in account is not mail address owner');
}
$email = $this->crypto->decrypt($key);
@ -102,7 +102,7 @@ class VerificationController extends Controller {
public function verifyMail(string $token, string $userId, string $key) {
try {
if ($this->userSession->getUser()->getUID() !== $userId) {
throw new InvalidArgumentException('Logged in user is not mail address owner');
throw new InvalidArgumentException('Logged in account is not mail address owner');
}
$email = $this->crypto->decrypt($key);
$ref = \substr(hash('sha256', $email), 0, 8);

View File

@ -27,6 +27,6 @@ use OCP\AppFramework\Http;
class NotSubAdminException extends \Exception {
public function __construct() {
parent::__construct('Logged in user must be at least a sub admin', Http::STATUS_FORBIDDEN);
parent::__construct('Logged in account must be at least a sub admin', Http::STATUS_FORBIDDEN);
}
}

View File

@ -132,7 +132,7 @@ class ChangePasswordController extends Controller {
return new JSONResponse([
'status' => 'error',
'data' => [
'message' => $this->l->t('No user supplied'),
'message' => $this->l->t('No account name supplied'),
],
]);
}
@ -186,7 +186,7 @@ class ChangePasswordController extends Controller {
return new JSONResponse([
'status' => 'error',
'data' => [
'message' => $this->l->t('Please provide an admin recovery password; otherwise, all user data will be lost.'),
'message' => $this->l->t('Please provide an admin recovery password; otherwise, all account data will be lost.'),
]
]);
} elseif ($recoveryEnabledForUser && ! $validRecoveryPassword) {
@ -212,7 +212,7 @@ class ChangePasswordController extends Controller {
return new JSONResponse([
'status' => 'error',
'data' => [
'message' => $this->l->t('Backend does not support password change, but the user\'s encryption key was updated.'),
'message' => $this->l->t('Backend does not support password change, but the encryption of the account key was updated.'),
]
]);
} elseif (!$result && !$recoveryEnabledForUser) {

View File

@ -180,6 +180,6 @@ class MailSettingsController extends Controller {
}
$this->config->setAppValue('core', 'emailTestSuccessful', '0');
return new DataResponse($this->l10n->t('You need to set your user email before being able to send test emails. Go to %s for that.', [$this->urlGenerator->linkToRouteAbsolute('settings.PersonalSettings.index')]), Http::STATUS_BAD_REQUEST);
return new DataResponse($this->l10n->t('You need to set your account email before being able to send test emails. Go to %s for that.', [$this->urlGenerator->linkToRouteAbsolute('settings.PersonalSettings.index')]), Http::STATUS_BAD_REQUEST);
}
}

View File

@ -240,7 +240,7 @@ class UsersController extends Controller {
$disabledUsersGroup = [
'id' => 'disabled',
'name' => 'Disabled users',
'name' => 'Disabled accounts',
'usercount' => $disabledUsers
];
@ -388,7 +388,7 @@ class UsersController extends Controller {
[
'status' => 'error',
'data' => [
'message' => $this->l10n->t('Invalid user')
'message' => $this->l10n->t('Invalid account')
]
],
Http::STATUS_UNAUTHORIZED

View File

@ -134,7 +134,7 @@ class NewUserMailHelper {
}
$emailTemplate->addBodyText($l10n->t('Welcome to your %s account, you can add, protect, and share your data.', [$this->themingDefaults->getName()]));
if ($user->getBackendClassName() !== 'LDAP') {
$emailTemplate->addBodyText($l10n->t('Your username is: %s', [$userId]));
$emailTemplate->addBodyText($l10n->t('Your account name is: %s', [$userId]));
}
if ($generatePasswordResetToken) {
$leftButtonText = $l10n->t('Set your password');

View File

@ -67,7 +67,7 @@ class SubadminMiddleware extends Middleware {
public function beforeController($controller, $methodName) {
if (!$this->reflector->hasAnnotation('NoSubAdminRequired') && !$this->reflector->hasAnnotation('AuthorizedAdminSetting')) {
if (!$this->isSubAdmin) {
throw new NotAdminException($this->l10n->t('Logged in user must be a subadmin'));
throw new NotAdminException($this->l10n->t('Logged in account must be a subadmin'));
}
}
}

View File

@ -46,7 +46,7 @@ class CheckUserCertificates implements ISetupCheck {
}
public function getName(): string {
return $this->l10n->t('Old user imported certificates');
return $this->l10n->t('Old administration imported certificates');
}
public function run(): SetupResult {
@ -55,8 +55,8 @@ class CheckUserCertificates implements ISetupCheck {
return SetupResult::success();
}
if ($this->configValue === 'not-run-yet') {
return SetupResult::info($this->l10n->t('A background job is pending that checks for user imported SSL certificates. Please check back later.'));
return SetupResult::info($this->l10n->t('A background job is pending that checks for administration imported SSL certificates. Please check back later.'));
}
return SetupResult::error($this->l10n->t('There are some user imported SSL certificates present, that are not used anymore with Nextcloud 21. They can be imported on the command line via "occ security:certificates:import" command. Their paths inside the data directory are shown below.'));
return SetupResult::error($this->l10n->t('There are some administration imported SSL certificates present, that are not used anymore with Nextcloud 21. They can be imported on the command line via "occ security:certificates:import" command. Their paths inside the data directory are shown below.'));
}
}

View File

@ -1,6 +1,6 @@
<template>
<NcSettingsSection :name="t('settings', 'Two-Factor Authentication')"
:description="t('settings', 'Two-factor authentication can be enforced for all users and specific groups. If they do not have a two-factor provider configured, they will be unable to log into the system.')"
:description="t('settings', 'Two-factor authentication can be enforced for all accounts and specific groups. If they do not have a two-factor provider configured, they will be unable to log into the system.')"
:doc-url="twoFactorAdminDoc">
<p v-if="loading">
<span class="icon-loading-small two-factor-loading" />
@ -50,7 +50,7 @@
<p class="top-margin">
<em>
<!-- this text is also found in the documentation. update it there as well if it ever changes -->
{{ t('settings', 'When groups are selected/excluded, they use the following logic to determine if a user has 2FA enforced: If no groups are selected, 2FA is enabled for everyone except members of the excluded groups. If groups are selected, 2FA is enabled for all members of these. If a user is both in a selected and excluded group, the selected takes precedence and 2FA is enforced.') }}
{{ t('settings', 'When groups are selected/excluded, they use the following logic to determine if an account has 2FA enforced: If no groups are selected, 2FA is enabled for everyone except members of the excluded groups. If groups are selected, 2FA is enabled for all members of these. If an account is both in a selected and excluded group, the selected takes precedence and 2FA is enforced.') }}
</em>
</p>
</template>

View File

@ -130,7 +130,7 @@
class="appslink"
:href="app.documentation.user"
target="_blank"
rel="noreferrer noopener">{{ t('settings', 'User documentation') }} </a>
rel="noreferrer noopener">{{ t('settings', 'Usage documentation') }} </a>
<a v-if="app.documentation && app.documentation.admin"
class="appslink"
:href="app.documentation.admin"

View File

@ -27,7 +27,7 @@
{{ t('settings', 'Use the credentials below to configure your app or device. For security reasons this password will only be shown once.') }}
</p>
<div class="token-dialog__name">
<NcTextField :label="t('settings', 'Username')" :value="loginName" readonly />
<NcTextField :label="t('settings', 'Account name')" :value="loginName" readonly />
<NcButton type="tertiary"
:title="copyLoginNameLabel"
:aria-label="copyLoginNameLabel"

View File

@ -54,7 +54,7 @@
@update:checked="onBackgroundJobModeChanged">
{{ t('settings', 'AJAX') }}
</NcCheckboxRadioSwitch>
<em>{{ t('settings', 'Execute one task with each page loaded. Use case: Single user instance.') }}</em>
<em>{{ t('settings', 'Execute one task with each page loaded. Use case: Single account instance.') }}</em>
<NcCheckboxRadioSwitch type="radio"
:checked.sync="backgroundJobsMode"
@ -63,7 +63,7 @@
@update:checked="onBackgroundJobModeChanged">
{{ t('settings', 'Webcron') }}
</NcCheckboxRadioSwitch>
<em>{{ t('settings', 'cron.php is registered at a webcron service to call cron.php every 5 minutes over HTTP. Use case: Very small instance (15 users depending on the usage).') }}</em>
<em>{{ t('settings', 'cron.php is registered at a webcron service to call cron.php every 5 minutes over HTTP. Use case: Very small instance (15 accounts depending on the usage).') }}</em>
<NcCheckboxRadioSwitch type="radio"
:disabled="!cliBasedCronPossible"
@ -121,7 +121,7 @@ export default {
cronLabel() {
let desc = t('settings', 'Use system cron service to call the cron.php file every 5 minutes.')
if (this.cliBasedCronPossible) {
desc += '<br>' + t('settings', 'The cron.php needs to be executed by the system user "{user}".', { user: this.cliBasedCronUser })
desc += '<br>' + t('settings', 'The cron.php needs to be executed by the system account "{user}".', { user: this.cliBasedCronUser })
} else {
desc += '<br>' + t('settings', 'The PHP POSIX extension is required. See {linkstart}PHP documentation{linkend} for more details.', {
linkstart: '<a target="_blank" rel="noreferrer nofollow" class="external" href="https://www.php.net/manual/en/book.posix.php">',

View File

@ -28,7 +28,7 @@
</h2>
<p class="settings-hint">
{{ t('settings', 'Enable or disable profile by default for new users.') }}
{{ t('settings', 'Enable or disable profile by default for new accounts.') }}
</p>
<NcCheckboxRadioSwitch type="switch"

View File

@ -30,7 +30,7 @@
</h2>
<NcNoteCard type="warning"
show-alert>
{{ t('settings', 'You are about to remove the group "{group}". The users will NOT be deleted.', { group: name }) }}
{{ t('settings', 'You are about to remove the group "{group}". The accounts will NOT be deleted.', { group: name }) }}
</NcNoteCard>
<div class="modal__button-row">
<NcButton type="secondary"

View File

@ -31,10 +31,10 @@
<NcEmptyContent v-if="filteredUsers.length === 0"
class="empty"
:name="isInitialLoad && loading.users ? null : t('settings', 'No users')">
:name="isInitialLoad && loading.users ? null : t('settings', 'No accounts')">
<template #icon>
<NcLoadingIcon v-if="isInitialLoad && loading.users"
:name="t('settings', 'Loading users …')"
:name="t('settings', 'Loading accounts …')"
:size="64" />
<NcIconSvgWrapper v-else
:svg="usersSvg" />
@ -61,7 +61,7 @@
@scroll-end="handleScrollEnd">
<template #before>
<caption class="hidden-visually">
{{ t('settings', 'List of users. This list is not fully rendered for performance reasons. The users will be rendered as you navigate through the list.') }}
{{ t('settings', 'List of accounts. This list is not fully rendered for performance reasons. The accounts will be rendered as you navigate through the list.') }}
</caption>
</template>
@ -320,8 +320,8 @@ export default {
}
logger.debug(`${this.users.length} total user(s) loaded`)
} catch (error) {
logger.error('Failed to load users', { error })
showError('Failed to load users')
logger.error('Failed to load accounts', { error })
showError('Failed to load accounts')
}
this.loading.users = false
this.isInitialLoad = false
@ -368,7 +368,7 @@ export default {
setNewUserDefaultGroup(value) {
if (value && value.length > 0) {
// setting new user default group to the current selected one
// setting new account default group to the current selected one
const currentGroup = this.groups.find(group => group.id === value)
if (currentGroup) {
this.newUser.groups = [currentGroup]

View File

@ -28,7 +28,7 @@
:data-cy-user-row="user.id">
<td class="row__cell row__cell--avatar" data-cy-user-list-cell-avatar>
<NcLoadingIcon v-if="isLoadingUser"
:name="t('settings', 'Loading user …')"
:name="t('settings', 'Loading account …')"
:size="32" />
<NcAvatar v-else-if="visible"
disable-menu
@ -87,7 +87,7 @@
@trailing-button-click="updatePassword" />
</template>
<span v-else-if="isObfuscated">
{{ t('settings', 'You do not have permissions to see the details of this user') }}
{{ t('settings', 'You do not have permissions to see the details of this account') }}
</span>
</td>
@ -130,7 +130,7 @@
:multiple="true"
:append-to-body="false"
:options="availableGroups"
:placeholder="t('settings', 'Add user to group')"
:placeholder="t('settings', 'Add account to group')"
:taggable="settings.isAdmin"
:value="userGroups"
label="name"
@ -152,7 +152,7 @@
<template v-if="editing && settings.isAdmin && subAdminsGroups.length > 0">
<label class="hidden-visually"
:for="'subadmins' + uniqueId">
{{ t('settings', 'Set user as admin for') }}
{{ t('settings', 'Set account as admin for') }}
</label>
<NcSelect data-cy-user-list-input-subadmins
:data-loading="loading.subadmins || undefined"
@ -165,7 +165,7 @@
:multiple="true"
:no-wrap="true"
:options="subAdminsGroups"
:placeholder="t('settings', 'Set user as admin for')"
:placeholder="t('settings', 'Set account as admin for')"
:value="userSubAdminsGroups"
@option:deselected="removeUserSubAdmin"
@option:selected="options => addUserSubAdmin(options.at(-1))" />
@ -180,7 +180,7 @@
<template v-if="editing">
<label class="hidden-visually"
:for="'quota' + uniqueId">
{{ t('settings', 'Select user quota') }}
{{ t('settings', 'Select account quota') }}
</label>
<NcSelect v-model="editedUserQuota"
:close-on-select="true"
@ -193,7 +193,7 @@
:clearable="false"
:input-id="'quota' + uniqueId"
:options="quotaOptions"
:placeholder="t('settings', 'Select user quota')"
:placeholder="t('settings', 'Select account quota')"
:taggable="true"
@option:selected="setUserQuota" />
</template>
@ -398,8 +398,8 @@ export default {
computed: {
managerLabel() {
// TRANSLATORS This string describes a manager in the context of an organization
return t('settings', 'Set user manager')
// TRANSLATORS This string describes a person's manager in the context of an organization
return t('settings', 'Set line manager')
},
isObfuscated() {
@ -469,7 +469,7 @@ export default {
const actions = [
{
icon: 'icon-delete',
text: t('settings', 'Delete user'),
text: t('settings', 'Delete account'),
action: this.deleteUser,
},
{
@ -479,7 +479,7 @@ export default {
},
{
icon: this.user.enabled ? 'icon-close' : 'icon-add',
text: this.user.enabled ? t('settings', 'Disable user') : t('settings', 'Enable user'),
text: this.user.enabled ? t('settings', 'Disable account') : t('settings', 'Enable account'),
action: this.enableDisableUser,
},
]
@ -586,8 +586,8 @@ export default {
value: this.currentManager ? this.currentManager.id : '',
})
} catch (error) {
// TRANSLATORS This string describes a manager in the context of an organization
showError(t('setting', 'Failed to update user manager'))
// TRANSLATORS This string describes a line manager in the context of an organization
showError(t('setting', 'Failed to update line manager'))
console.error(error)
} finally {
this.loading.manager = false

View File

@ -22,7 +22,7 @@
-->
<template>
<NcActions :aria-label="t('settings', 'Toggle user actions menu')"
<NcActions :aria-label="t('settings', 'Toggle account actions menu')"
:disabled="disabled"
:inline="1">
<NcActionButton :data-cy-user-list-action-toggle-edit="`${edit}`"

View File

@ -180,14 +180,14 @@ export const SCOPE_PROPERTY_ENUM = Object.freeze({
name: SCOPE_ENUM.FEDERATED,
displayName: t('settings', 'Federated'),
tooltip: t('settings', 'Only synchronize to trusted servers'),
tooltipDisabled: t('settings', 'Not available as federation has been disabled for your account, contact your system administrator if you have any questions'),
tooltipDisabled: t('settings', 'Not available as federation has been disabled for your account, contact your system administration if you have any questions'),
iconClass: 'icon-contacts-dark',
},
[SCOPE_ENUM.PUBLISHED]: {
name: SCOPE_ENUM.PUBLISHED,
displayName: t('settings', 'Published'),
tooltip: t('settings', 'Synchronize to trusted servers and the global and public address book'),
tooltipDisabled: t('settings', 'Not available as publishing user specific data to the lookup server is not allowed, contact your system administrator if you have any questions'),
tooltipDisabled: t('settings', 'Not available as publishing account specific data to the lookup server is not allowed, contact your system administration if you have any questions'),
iconClass: 'icon-link',
},
})

View File

@ -41,7 +41,7 @@ export const VISIBILITY_PROPERTY_ENUM = Object.freeze({
},
[VISIBILITY_ENUM.SHOW_USERS_ONLY]: {
name: VISIBILITY_ENUM.SHOW_USERS_ONLY,
label: t('settings', 'Show to logged in users only'),
label: t('settings', 'Show to logged in accounts only'),
},
[VISIBILITY_ENUM.HIDE]: {
name: VISIBILITY_ENUM.HIDE,

View File

@ -23,9 +23,9 @@
<template>
<Fragment>
<NcContent app-name="settings">
<NcAppNavigation :aria-label="t('settings', 'User management')">
<NcAppNavigation :aria-label="t('settings', 'Account management')">
<NcAppNavigationNew button-id="new-user-button"
:text="t('settings','New user')"
:text="t('settings','New account')"
@click="showNewUserMenu"
@keyup.enter="showNewUserMenu"
@keyup.space="showNewUserMenu">
@ -37,7 +37,7 @@
<template #list>
<NcAppNavigationItem id="everyone"
:exact="true"
:name="t('settings', 'Active users')"
:name="t('settings', 'Active accounts')"
:to="{ name: 'users' }">
<template #icon>
<AccountGroup :size="20" />
@ -117,7 +117,7 @@
<template #footer>
<ul class="app-navigation-entry__settings">
<NcAppNavigationItem :name="t('settings', 'User management settings')"
<NcAppNavigationItem :name="t('settings', 'Account management settings')"
@click="isDialogOpen = true">
<template #icon>
<Cog :size="20" />
@ -214,13 +214,13 @@ export default {
computed: {
pageHeading() {
if (this.selectedGroupDecoded === null) {
return t('settings', 'Active users')
return t('settings', 'Active accounts')
}
const matchHeading = {
admin: t('settings', 'Admins'),
disabled: t('settings', 'Disabled users'),
disabled: t('settings', 'Disabled accounts'),
}
return matchHeading[this.selectedGroupDecoded] ?? t('settings', 'User group: {group}', { group: this.selectedGroupDecoded })
return matchHeading[this.selectedGroupDecoded] ?? t('settings', 'Account group: {group}', { group: this.selectedGroupDecoded })
},
showConfig() {

View File

@ -12,7 +12,7 @@
} ?>
href="<?php print_unescaped($_['urlUserDocs']); ?>">
<span class="help-list__text">
<?php p($l->t('User documentation')); ?>
<?php p($l->t('Account documentation')); ?>
</span>
</a>
</li>
@ -25,7 +25,7 @@
} ?>
href="<?php print_unescaped($_['urlAdminDocs']); ?>">
<span class="help-list__text">
<?php p($l->t('Administrator documentation')); ?>
<?php p($l->t('Administration documentation')); ?>
</span>
</a>
</li>

View File

@ -148,7 +148,7 @@ $mail_sendmailmode = [
print_unescaped(' class="hidden"');
} ?>>
<label for="mail_smtpname"><?php p($l->t('Credentials')); ?></label>
<input type="text" name="mail_smtpname" id="mail_smtpname" placeholder="<?php p($l->t('SMTP Username'))?>"
<input type="text" name="mail_smtpname" id="mail_smtpname" placeholder="<?php p($l->t('SMTP account name'))?>"
value="<?php p($_['mail_smtpname']) ?>" />
<input type="text" name="mail_smtppassword" id="mail_smtppassword" autocomplete="off"
placeholder="<?php p($l->t('SMTP Password'))?>" value="<?php p($_['mail_smtppassword']) ?>" />

View File

@ -171,7 +171,7 @@ class MailSettingsControllerTest extends \Test\TestCase {
// Ensure that it fails when no mail address has been specified
$response = $this->mailController->sendTestMail();
$this->assertSame(Http::STATUS_BAD_REQUEST, $response->getStatus());
$this->assertSame('You need to set your user email before being able to send test emails. Go to for that.', $response->getData());
$this->assertSame('You need to set your account email before being able to send test emails. Go to for that.', $response->getData());
// If no exception is thrown it should work
$this->config

View File

@ -262,7 +262,7 @@ class NewUserMailHelperTest extends TestCase {
<table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%">
<tr style="padding:0;text-align:left;vertical-align:top">
<th style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left">
<p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your username is: john</p>
<p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your account name is: john</p>
</th>
<th class="expander" style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th>
</tr>
@ -363,7 +363,7 @@ Welcome aboard
Welcome to your TestCloud account, you can add, protect, and share your data.
Your username is: john
Your account name is: john
Set your password: https://example.com/resetPassword/MySuperLongSecureRandomToken
@ -498,7 +498,7 @@ EOF;
<table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%">
<tr style="padding:0;text-align:left;vertical-align:top">
<th style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left">
<p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your username is: john</p>
<p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your account name is: john</p>
</th>
<th class="expander" style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th>
</tr>
@ -599,7 +599,7 @@ Welcome aboard John Doe
Welcome to your TestCloud account, you can add, protect, and share your data.
Your username is: john
Your account name is: john
Go to TestCloud: https://example.com/

View File

@ -116,8 +116,8 @@ class ShareByMailProvider implements IShareProvider {
*/
$alreadyShared = $this->getSharedWith($shareWith, IShare::TYPE_EMAIL, $share->getNode(), 1, 0);
if (!empty($alreadyShared)) {
$message = 'Sharing %1$s failed, because this item is already shared with user %2$s';
$message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with user %2$s', [$share->getNode()->getName(), $shareWith]);
$message = 'Sharing %1$s failed, because this item is already shared with account %2$s';
$message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with account %2$s', [$share->getNode()->getName(), $shareWith]);
$this->logger->debug(sprintf($message, $share->getNode()->getName(), $shareWith), ['app' => 'Federated File Sharing']);
throw new \Exception($message_t);
}

View File

@ -22,7 +22,7 @@
<template>
<NcSettingsSection :name="t('sharebymail', 'Share by mail')"
:description="t('sharebymail', 'Allows users to share a personalized link to a file or folder by putting in an email address.')">
:description="t('sharebymail', 'Allows people to share a personalized link to a file or folder by putting in an email address.')">
<NcCheckboxRadioSwitch type="switch"
:checked.sync="sendPasswordMail"
@update:checked="update('sendpasswordmail', sendPasswordMail)">

View File

@ -3,8 +3,8 @@
xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd">
<id>systemtags</id>
<name>Collaborative tags</name>
<summary>Collaborative tagging functionality which shares tags among users.</summary>
<description>Collaborative tagging functionality which shares tags among users. Great for teams.
<summary>Collaborative tagging functionality which shares tags among people.</summary>
<description>Collaborative tagging functionality which shares tags among people. Great for teams.
(If you are a provider with a multi-tenancy installation, it is advised to deactivate this app as tags are shared.)</description>
<version>1.19.0</version>
<licence>agpl</licence>

View File

@ -42,7 +42,7 @@
<template v-if="!isWebUpdaterRecommended && updaterEnabled && webUpdaterEnabled">
<h3 class="warning">
{{ t('updatenotification', 'Please note that the web updater is not recommended with more than 100 users! Please use the command line updater instead!') }}
{{ t('updatenotification', 'Please note that the web updater is not recommended with more than 100 accounts! Please use the command line updater instead!') }}
</h3>
</template>
@ -233,7 +233,7 @@ export default {
},
noteDelayedStableString() {
return t('updatenotification', 'Note that after a new release the update only shows up after the first minor release or later. We roll out new versions spread out over time to our users and sometimes skip a version when issues are found. Learn more about updates and release channels at {link}')
return t('updatenotification', 'Note that after a new release the update only shows up after the first minor release or later. We roll out new versions spread out over time and sometimes skip a version when issues are found. Learn more about updates and release channels at {link}')
.replace('{link}', '<a href="https://nextcloud.com/release-channels/">https://nextcloud.com/release-channels/</a>')
},

View File

@ -54,7 +54,7 @@ class LdapInvalidUuids implements ISetupCheck {
&& count($this->groupMapping->getList(0, 1, true)) === 0) {
return SetupResult::success($this->l10n->t('None found'));
} else {
return SetupResult::warning($this->l10n->t('Invalid UUIDs of LDAP users or groups have been found. Please review your "Override UUID detection" settings in the Expert part of the LDAP configuration and use "occ ldap:update-uuid" to update them.'));
return SetupResult::warning($this->l10n->t('Invalid UUIDs of LDAP accounts or groups have been found. Please review your "Override UUID detection" settings in the Expert part of the LDAP configuration and use "occ ldap:update-uuid" to update them.'));
}
}
}

View File

@ -5,7 +5,7 @@
<name>Weather status</name>
<summary>Weather status in your dashboard</summary>
<description><![CDATA[Weather status integrated in the Dashboard app.
User's position can be automatically determined or manually defined. A 6 hours forecast is then displayed.
The geographic location can be automatically determined or manually defined. A 6 hours forecast is then displayed.
This status can also be integrated in other places like the Calendar app.]]></description>
<version>1.9.0</version>
<licence>agpl</licence>

View File

@ -59,7 +59,7 @@ const RequestChecks = [
},
{
class: 'OCA\\WorkflowEngine\\Check\\UserGroupMembership',
name: t('workflowengine', 'User group membership'),
name: t('workflowengine', 'Group membership'),
operators: [
{ operator: 'is', name: t('workflowengine', 'is member of') },
{ operator: '!is', name: t('workflowengine', 'is not member of') },

View File

@ -64,10 +64,10 @@ class Install extends Command {
->addOption('database-name', null, InputOption::VALUE_REQUIRED, 'Name of the database')
->addOption('database-host', null, InputOption::VALUE_REQUIRED, 'Hostname of the database', 'localhost')
->addOption('database-port', null, InputOption::VALUE_REQUIRED, 'Port the database is listening on')
->addOption('database-user', null, InputOption::VALUE_REQUIRED, 'User name to connect to the database')
->addOption('database-user', null, InputOption::VALUE_REQUIRED, 'Account name to connect to the database')
->addOption('database-pass', null, InputOption::VALUE_OPTIONAL, 'Password of the database user', null)
->addOption('database-table-space', null, InputOption::VALUE_OPTIONAL, 'Table space of the database (oci only)', null)
->addOption('admin-user', null, InputOption::VALUE_REQUIRED, 'User name of the admin account', 'admin')
->addOption('admin-user', null, InputOption::VALUE_REQUIRED, 'Account name of the admin account', 'admin')
->addOption('admin-pass', null, InputOption::VALUE_REQUIRED, 'Password of the admin account')
->addOption('admin-email', null, InputOption::VALUE_OPTIONAL, 'E-Mail of the admin account')
->addOption('data-dir', null, InputOption::VALUE_REQUIRED, 'Path to data directory', \OC::$SERVERROOT."/data");
@ -150,7 +150,7 @@ class Install extends Command {
if ($db !== 'sqlite') {
if (is_null($dbUser)) {
throw new InvalidArgumentException("Database user not provided.");
throw new InvalidArgumentException("Database account not provided.");
}
if (is_null($dbName)) {
throw new InvalidArgumentException("Database name not provided.");

View File

@ -49,11 +49,11 @@ class Add extends Command {
protected function configure() {
$this
->setName('user:add')
->setDescription('adds a user')
->setDescription('adds an account')
->addArgument(
'uid',
InputArgument::REQUIRED,
'User ID used to login (must only contain a-z, A-Z, 0-9, -, _ and @)'
'Account ID used to login (must only contain a-z, A-Z, 0-9, -, _ and @)'
)
->addOption(
'password-from-env',
@ -65,20 +65,20 @@ class Add extends Command {
'display-name',
null,
InputOption::VALUE_OPTIONAL,
'User name used in the web UI (can contain any characters)'
'Account name used in the web UI (can contain any characters)'
)
->addOption(
'group',
'g',
InputOption::VALUE_OPTIONAL | InputOption::VALUE_IS_ARRAY,
'groups the user should be added to (The group will be created if it does not exist)'
'groups the account should be added to (The group will be created if it does not exist)'
);
}
protected function execute(InputInterface $input, OutputInterface $output): int {
$uid = $input->getArgument('uid');
if ($this->userManager->userExists($uid)) {
$output->writeln('<error>The user "' . $uid . '" already exists.</error>');
$output->writeln('<error>The account "' . $uid . '" already exists.</error>');
return 1;
}
@ -121,9 +121,9 @@ class Add extends Command {
if ($user instanceof IUser) {
$output->writeln('<info>The user "' . $user->getUID() . '" was created successfully</info>');
$output->writeln('<info>The account "' . $user->getUID() . '" was created successfully</info>');
} else {
$output->writeln('<error>An error occurred while creating the user</error>');
$output->writeln('<error>An error occurred while creating the account</error>');
return 1;
}
@ -151,7 +151,7 @@ class Add extends Command {
}
if ($group instanceof IGroup) {
$group->addUser($user);
$output->writeln('User "' . $user->getUID() . '" added to group "' . $group->getGID() . '"');
$output->writeln('Account "' . $user->getUID() . '" added to group "' . $group->getGID() . '"');
}
}
return 0;

View File

@ -54,11 +54,11 @@ class Add extends Command {
$this
->setName('user:auth-tokens:add')
->setAliases(['user:add-app-password'])
->setDescription('Add app password for the named user')
->setDescription('Add app password for the named account')
->addArgument(
'user',
InputArgument::REQUIRED,
'Username to add app password for'
'Account name to add app password for'
)
->addOption(
'password-from-env',
@ -75,7 +75,7 @@ class Add extends Command {
$user = $this->userManager->get($username);
if (is_null($user)) {
$output->writeln('<error>User does not exist</error>');
$output->writeln('<error>Account does not exist</error>');
return 1;
}
@ -89,7 +89,7 @@ class Add extends Command {
/** @var QuestionHelper $helper */
$helper = $this->getHelper('question');
$question = new Question('Enter the user password: ');
$question = new Question('Enter the account password: ');
$question->setHidden(true);
/** @var null|string $password */
$password = $helper->ask($input, $output, $question);

View File

@ -60,7 +60,7 @@ class LastSeen extends Base {
$lastLogin = $user->getLastLogin();
if ($lastLogin === 0) {
$output->writeln('User ' . $user->getUID() .
$output->writeln('Account ' . $user->getUID() .
' has never logged in, yet.');
} else {
$date = new \DateTime();

View File

@ -63,7 +63,7 @@ class Report extends Command {
protected function execute(InputInterface $input, OutputInterface $output): int {
$table = new Table($output);
$table->setHeaders(['User Report', '']);
$table->setHeaders(['Account Report', '']);
$userCountArray = $this->countUsers();
$total = 0;
if (!empty($userCountArray)) {

View File

@ -55,7 +55,7 @@ class ResetPassword extends Base {
->addArgument(
'user',
InputArgument::REQUIRED,
'Username to reset password'
'Account name to reset password'
)
->addOption(
'password-from-env',

View File

@ -51,7 +51,7 @@ class Setting extends Base {
->addArgument(
'uid',
InputArgument::REQUIRED,
'User ID used to login'
'Account ID used to login'
)
->addArgument(
'app',

View File

@ -318,7 +318,7 @@ class LostController extends Controller {
$user = $this->userManager->get($input);
if ($user instanceof IUser) {
if (!$user->isEnabled()) {
throw new ResetPasswordException('User ' . $user->getUID() . ' is disabled');
throw new ResetPasswordException('Account ' . $user->getUID() . ' is disabled');
}
return $user;

View File

@ -134,6 +134,6 @@ class OCSController extends \OCP\AppFramework\OCSController {
return new DataResponse($data);
}
return new DataResponse(['User not found'], 404);
return new DataResponse(['Account not found'], 404);
}
}

View File

@ -73,11 +73,11 @@ class ProfileApiController extends OCSController {
$targetUser = $this->userManager->get($targetUserId);
if (!$this->userManager->userExists($targetUserId)) {
throw new OCSNotFoundException('User does not exist');
throw new OCSNotFoundException('Account does not exist');
}
if ($requestingUser !== $targetUser) {
throw new OCSForbiddenException('Users can only edit their own visibility settings');
throw new OCSForbiddenException('People can only edit their own visibility settings');
}
// Ensure that a profile config is created in the database
@ -85,7 +85,7 @@ class ProfileApiController extends OCSController {
$config = $this->configMapper->get($targetUserId);
if (!in_array($paramId, array_keys($config->getVisibilityMap()), true)) {
throw new OCSBadRequestException('User does not have a profile parameter with ID: ' . $paramId);
throw new OCSBadRequestException('Account does not have a profile parameter with ID: ' . $paramId);
}
$config->setVisibility($paramId, $visibility);

View File

@ -77,8 +77,8 @@ class CoreNotifier implements INotifier {
}
if ($notification->getSubject() === 'user_limit_reached') {
$notification->setParsedSubject($l->t('The user limit of this instance is reached.'));
$notification->setParsedMessage($l->t('Enter your subscription key in the support app in order to increase the user limit. This does also grant you all additional benefits that Nextcloud Enterprise offers and is highly recommended for the operation in companies.'));
$notification->setParsedSubject($l->t('The account limit of this instance is reached.'));
$notification->setParsedMessage($l->t('Enter your subscription key in the support app in order to increase the account limit. This does also grant you all additional benefits that Nextcloud Enterprise offers and is highly recommended for the operation in companies.'));
$notification->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'places/contacts.svg')));
$action = $notification->createAction();
$label = $l->t('Learn more ↗');

View File

@ -1,2 +1,2 @@
Here goes the user documentation
Here goes the usage documentation
In the meantime go to <a href="https://nextcloud.com/support/" target="_blank">nextcloud.com/support/</a>

View File

@ -176,10 +176,10 @@ export default {
},
errorLabel() {
if (this.invalidPassword) {
return t('core', 'Wrong username or password.')
return t('core', 'Wrong account name or password.')
}
if (this.userDisabled) {
return t('core', 'User disabled')
return t('core', 'This account is disabled')
}
if (this.throttleDelay > 5000) {
return t('core', 'We have detected multiple invalid login attempts from your IP. Therefore your next login is throttled up to 30 seconds.')

View File

@ -10,8 +10,8 @@
:value="user"
:autocomplete="autoCompleteAllowed ? 'on' : 'off'"
:error="!validCredentials"
:label="t('core', 'Username or email')"
:placeholder="t('core', 'Username or email')"
:label="t('core', 'Account name or email')"
:placeholder="t('core', 'Account name or email')"
:helper-text="!validCredentials ? t('core', 'Your account is not setup for passwordless login.') : ''"
@update:value="changeUsername" />

View File

@ -27,7 +27,7 @@ declare(strict_types=1);
//some strings that are used in /lib but won't be translatable unless they are in /core too
$l = \OCP\Util::getL10N('core');
$l->t("Personal");
$l->t("Users");
$l->t("Accounts");
$l->t("Apps");
$l->t("Admin");
$l->t("Help");

View File

@ -35,7 +35,7 @@ script('core', 'install');
<fieldset id="adminaccount">
<legend><?php print_unescaped($l->t('Create an <strong>admin account</strong>')); ?></legend>
<p>
<label for="adminlogin"><?php p($l->t('Username')); ?></label>
<label for="adminlogin"><?php p($l->t('Account name')); ?></label>
<input type="text" name="adminlogin" id="adminlogin"
value="<?php p($_['adminlogin']); ?>"
autocomplete="off" autocapitalize="none" spellcheck="false" autofocus required>
@ -100,7 +100,7 @@ script('core', 'install');
<fieldset id='databaseField'>
<div id="use_other_db">
<p class="grouptop">
<label for="dbuser"><?php p($l->t('Database user')); ?></label>
<label for="dbuser"><?php p($l->t('Database account')); ?></label>
<input type="text" name="dbuser" id="dbuser"
value="<?php p($_['dbuser']); ?>"
autocomplete="off" autocapitalize="none" spellcheck="false">

View File

@ -53,8 +53,8 @@ $urlGenerator = $_['urlGenerator'];
<form action="<?php p($urlGenerator->linkToRouteAbsolute('core.ClientFlowLogin.apptokenRedirect')); ?>" method="post" id="app-token-login-field" class="hidden">
<p class="grouptop">
<input type="text" name="user" id="user" placeholder="<?php p($l->t('Username')) ?>">
<label for="user" class="infield"><?php p($l->t('Username')) ?></label>
<input type="text" name="user" id="user" placeholder="<?php p($l->t('Account name')) ?>">
<label for="user" class="infield"><?php p($l->t('Account name')) ?></label>
</p>
<p class="groupbottom">
<input type="password" name="password" id="password" placeholder="<?php p($l->t('App password')) ?>">

View File

@ -53,8 +53,8 @@ $urlGenerator = $_['urlGenerator'];
<form action="<?php p($urlGenerator->linkToRouteAbsolute('core.ClientFlowLoginV2.apptokenRedirect')); ?>" method="post" id="app-token-login-field" class="hidden">
<p class="grouptop">
<input type="text" name="user" id="user" placeholder="<?php p($l->t('Username')) ?>">
<label for="user" class="infield"><?php p($l->t('Username')) ?></label>
<input type="text" name="user" id="user" placeholder="<?php p($l->t('Account name')) ?>">
<label for="user" class="infield"><?php p($l->t('Account name')) ?></label>
</p>
<p class="groupbottom">
<input type="password" name="password" id="password" placeholder="<?php p($l->t('App password')) ?>">

View File

@ -3,7 +3,7 @@
<h2 class="title"><?php p($l->t('Update needed')) ?></h2>
<div class="text-left">
<?php if ($_['tooBig']) {
p($l->t('Please use the command line updater because you have a big instance with more than 50 users.'));
p($l->t('Please use the command line updater because you have a big instance with more than 50 accounts.'));
} else {
p($l->t('Please use the command line updater because updating via browser is disabled in your config.php.'));
} ?><br><br>

View File

@ -180,20 +180,20 @@ class SecurityMiddleware extends Middleware {
}
}
if (!$authorized) {
throw new NotAdminException($this->l10n->t('Logged in user must be an admin, a sub admin or gotten special right to access this setting'));
throw new NotAdminException($this->l10n->t('Logged in account must be an admin, a sub admin or gotten special right to access this setting'));
}
}
if ($this->hasAnnotationOrAttribute($reflectionMethod, 'SubAdminRequired', SubAdminRequired::class)
&& !$this->isSubAdmin
&& !$this->isAdminUser
&& !$authorized) {
throw new NotAdminException($this->l10n->t('Logged in user must be an admin or sub admin'));
throw new NotAdminException($this->l10n->t('Logged in account must be an admin or sub admin'));
}
if (!$this->hasAnnotationOrAttribute($reflectionMethod, 'SubAdminRequired', SubAdminRequired::class)
&& !$this->hasAnnotationOrAttribute($reflectionMethod, 'NoAdminRequired', NoAdminRequired::class)
&& !$this->isAdminUser
&& !$authorized) {
throw new NotAdminException($this->l10n->t('Logged in user must be an admin'));
throw new NotAdminException($this->l10n->t('Logged in account must be an admin'));
}
}

View File

@ -56,7 +56,7 @@ class UserDeletedFilesCleanupListener implements IEventListener {
$userHome = $this->mountProviderCollection->getHomeMountForUser($event->getUser());
$storage = $userHome->getStorage();
if (!$storage) {
throw new \Exception("User has no home storage");
throw new \Exception("Account has no home storage");
}
// remove all wrappers, so we do the delete directly on the home storage bypassing any wrapper

View File

@ -138,7 +138,7 @@ class AvatarManager implements IAvatarManager {
} catch (NotPermittedException | StorageNotAvailableException $e) {
$this->logger->error("Unable to delete user avatars for $userId. gnoring avatar deletion");
} catch (NoUserException $e) {
$this->logger->debug("User $userId not found. gnoring avatar deletion");
$this->logger->debug("Account $userId not found. Ignoring avatar deletion");
}
$this->config->deleteUserValue($userId, 'avatar', 'generated');
}

View File

@ -383,7 +383,7 @@ class Root extends Folder implements IRootFolder {
try {
$folder = $this->get('/' . $userId . '/files');
if (!$folder instanceof \OCP\Files\Folder) {
throw new \Exception("User folder for $userId exists as a file");
throw new \Exception("Account folder for \"$userId\" exists as a file");
}
} catch (NotFoundException $e) {
if (!$this->nodeExists('/' . $userId)) {

View File

@ -1155,7 +1155,7 @@ class Server extends ServerContainer implements IServerContainer {
$userDisplayName = $manager->getDisplayName($id);
if ($userDisplayName === null) {
$l = $c->get(IFactory::class)->get('core');
return $l->t('Unknown user');
return $l->t('Unknown account');
}
return $userDisplayName;
});

View File

@ -265,7 +265,7 @@ class Setup {
$dbType = $options['dbtype'];
if (empty($options['adminlogin'])) {
$error[] = $l->t('Set an admin username.');
$error[] = $l->t('Set an admin account name.');
}
if (empty($options['adminpass'])) {
$error[] = $l->t('Set an admin password.');
@ -311,7 +311,7 @@ class Setup {
$dbType = 'sqlite3';
}
//generate a random salt that is used to salt the local user passwords
//generate a random salt that is used to salt the local passwords
$salt = $this->random->generate(30);
// generate a secret
$secret = $this->random->generate(48);
@ -345,7 +345,7 @@ class Setup {
return $error;
} catch (Exception $e) {
$error[] = [
'error' => 'Error while trying to create admin user: ' . $e->getMessage(),
'error' => 'Error while trying to create admin account: ' . $e->getMessage(),
'exception' => $e,
'hint' => '',
];
@ -365,13 +365,13 @@ class Setup {
return $error;
}
$this->outputDebug($output, 'Create admin user');
//create the user and group
$user = null;
$this->outputDebug($output, 'Create admin account');
//create the and group
$ = null;
try {
$user = Server::get(IUserManager::class)->createUser($username, $password);
if (!$user) {
$error[] = "User <$username> could not be created.";
$error[] = "Account <$username> could not be created.";
return $error;
}
} catch (Exception $exception) {
@ -428,7 +428,7 @@ class Setup {
$userSession->login($username, $password);
$user = $userSession->getUser();
if (!$user) {
$error[] = "No user found in session.";
$error[] = "No account found in session.";
return $error;
}
$userSession->createSessionToken($request, $user->getUID(), $username, $password);

View File

@ -71,9 +71,9 @@ abstract class AbstractDatabase {
public function validate($config) {
$errors = [];
if (empty($config['dbuser']) && empty($config['dbname'])) {
$errors[] = $this->trans->t("Enter the database username and name for %s", [$this->dbprettyname]);
$errors[] = $this->trans->t("Enter the database account name and name for %s", [$this->dbprettyname]);
} elseif (empty($config['dbuser'])) {
$errors[] = $this->trans->t("Enter the database username for %s", [$this->dbprettyname]);
$errors[] = $this->trans->t("Enter the database account name for %s", [$this->dbprettyname]);
} elseif (empty($config['dbname'])) {
$errors[] = $this->trans->t("Enter the database name for %s", [$this->dbprettyname]);
}

View File

@ -73,7 +73,7 @@ class MySQL extends AbstractDatabase {
$this->logger->error($e->getMessage(), [
'exception' => $e,
]);
throw new \OC\DatabaseSetupException($this->trans->t('MySQL username and/or password not valid'),
throw new \OC\DatabaseSetupException($this->trans->t('MySQL account name and/or password not valid'),
$this->trans->t('You need to enter details of an existing account.'), 0, $e);
}
}

View File

@ -53,9 +53,9 @@ class OCI extends AbstractDatabase {
public function validate($config) {
$errors = [];
if (empty($config['dbuser']) && empty($config['dbname'])) {
$errors[] = $this->trans->t("Enter the database username and name for %s", [$this->dbprettyname]);
$errors[] = $this->trans->t("Enter the database account name and name for %s", [$this->dbprettyname]);
} elseif (empty($config['dbuser'])) {
$errors[] = $this->trans->t("Enter the database username for %s", [$this->dbprettyname]);
$errors[] = $this->trans->t("Enter the database account name for %s", [$this->dbprettyname]);
} elseif (empty($config['dbname'])) {
$errors[] = $this->trans->t("Enter the database name for %s", [$this->dbprettyname]);
}
@ -75,7 +75,7 @@ class OCI extends AbstractDatabase {
. ' NLS_LANG=' . getenv('NLS_LANG')
. ' tnsnames.ora is ' . (is_readable(getenv('ORACLE_HOME') . '/network/admin/tnsnames.ora') ? '' : 'not ') . 'readable', 0, $e);
}
throw new \OC\DatabaseSetupException($this->trans->t('Oracle username and/or password not valid'),
throw new \OC\DatabaseSetupException($this->trans->t('Oracle account name and/or password not valid'),
'Check environment: ORACLE_HOME=' . getenv('ORACLE_HOME')
. ' ORACLE_SID=' . getenv('ORACLE_SID')
. ' LD_LIBRARY_PATH=' . getenv('LD_LIBRARY_PATH')

Some files were not shown because too many files have changed in this diff Show More