diff options
author | Vincent Petry <vincent@nextcloud.com> | 2022-09-21 17:44:32 +0200 |
---|---|---|
committer | John Molakvoæ <skjnldsv@protonmail.com> | 2024-02-13 21:06:30 +0100 |
commit | 839ddaa3547bb0042b6225edf2df7bff1831cdd5 (patch) | |
tree | 353d49dd856548ca243bf1b9e15274372bbc518b | |
parent | b63abdae8c1708693addf1dc3b2f862131e0299d (diff) | |
download | nextcloud-server-839ddaa3547bb0042b6225edf2df7bff1831cdd5.tar.gz nextcloud-server-839ddaa3547bb0042b6225edf2df7bff1831cdd5.zip |
feat: rename users to account or person
Replace translated text in most locations
Signed-off-by: Vincent Petry <vincent@nextcloud.com>
109 files changed, 220 insertions, 220 deletions
diff --git a/apps/comments/lib/Notification/Notifier.php b/apps/comments/lib/Notification/Notifier.php index 94a46bbce78..9501c8b954c 100644 --- a/apps/comments/lib/Notification/Notifier.php +++ b/apps/comments/lib/Notification/Notifier.php @@ -123,7 +123,7 @@ class Notifier implements INotifier { ]; if ($isDeletedActor) { - $subject = $l->t('You were mentioned on "{file}", in a comment by a user that has since been deleted'); + $subject = $l->t('You were mentioned on "{file}", in a comment by an account that has since been deleted'); } else { $subject = $l->t('{user} mentioned you in a comment on "{file}"'); $subjectParameters['user'] = [ diff --git a/apps/comments/tests/Unit/Notification/NotifierTest.php b/apps/comments/tests/Unit/Notification/NotifierTest.php index 9281bb99fe8..e94f0686f18 100644 --- a/apps/comments/tests/Unit/Notification/NotifierTest.php +++ b/apps/comments/tests/Unit/Notification/NotifierTest.php @@ -211,7 +211,7 @@ class NotifierTest extends TestCase { public function testPrepareSuccessDeletedUser() { $fileName = 'Gre\'thor.odp'; - $message = 'You were mentioned on "Gre\'thor.odp", in a comment by a user that has since been deleted'; + $message = 'You were mentioned on "Gre\'thor.odp", in a comment by an account that has since been deleted'; /** @var Node|MockObject $node */ $node = $this->createMock(Node::class); @@ -255,7 +255,7 @@ class NotifierTest extends TestCase { $this->notification ->expects($this->once()) ->method('setRichSubject') - ->with('You were mentioned on "{file}", in a comment by a user that has since been deleted', $this->anything()) + ->with('You were mentioned on "{file}", in a comment by an account that has since been deleted', $this->anything()) ->willReturnSelf(); $this->notification ->expects($this->once()) diff --git a/apps/contactsinteraction/appinfo/info.xml b/apps/contactsinteraction/appinfo/info.xml index 0760d9b3626..4edaf402e08 100644 --- a/apps/contactsinteraction/appinfo/info.xml +++ b/apps/contactsinteraction/appinfo/info.xml @@ -3,8 +3,8 @@ xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd"> <id>contactsinteraction</id> <name>Contacts Interaction</name> - <summary>Manages interaction between users and contacts</summary> - <description>Collect data about user and contacts interactions and provide an address book for the data</description> + <summary>Manages interaction between accounts and contacts</summary> + <description>Collect data about accounts and contacts interactions and provide an address book for the data</description> <version>1.10.0</version> <licence>agpl</licence> <author>Christoph Wurst</author> diff --git a/apps/dashboard/appinfo/info.xml b/apps/dashboard/appinfo/info.xml index b5b739014ad..b4f2000123c 100644 --- a/apps/dashboard/appinfo/info.xml +++ b/apps/dashboard/appinfo/info.xml @@ -6,7 +6,7 @@ <summary>Dashboard app</summary> <description><![CDATA[Start your day informed -The Nextcloud Dashboard is your starting point of the day, giving you an overview of your upcoming appointments, urgent emails, chat messages, incoming tickets, latest tweets and much more! Users can add the widgets they like and change the background to their liking.]]> +The Nextcloud Dashboard is your starting point of the day, giving you an overview of your upcoming appointments, urgent emails, chat messages, incoming tickets, latest tweets and much more! People can add the widgets they like and change the background to their liking.]]> </description> <version>7.9.0</version> <licence>agpl</licence> diff --git a/apps/dav/src/views/Availability.vue b/apps/dav/src/views/Availability.vue index 62778839142..b39e5671da1 100644 --- a/apps/dav/src/views/Availability.vue +++ b/apps/dav/src/views/Availability.vue @@ -1,7 +1,7 @@ <template> <div> <NcSettingsSection :name="$t('dav', 'Availability')" - :description="$t('dav', 'If you configure your working hours, other users will see when you are out of office when they book a meeting.')"> + :description="$t('dav', 'If you configure your working hours, other people will see when you are out of office when they book a meeting.')"> <AvailabilityForm /> </NcSettingsSection> <NcSettingsSection v-if="!hideAbsenceSettings" diff --git a/apps/encryption/templates/settings-admin.php b/apps/encryption/templates/settings-admin.php index e9e9a97b900..290450bf8b6 100644 --- a/apps/encryption/templates/settings-admin.php +++ b/apps/encryption/templates/settings-admin.php @@ -24,7 +24,7 @@ style('encryption', 'settings-admin'); <span class="msg"></span> <br/> <em> - <?php p($l->t("The recovery key is an extra encryption key that is used to encrypt files. It allows recovery of a user's files if the user forgets his or her password.")) ?> + <?php p($l->t("The recovery key is an additional encryption key used to encrypt files. It is used to recover files from an account if the password is forgotten.")) ?> </em> <br/> <input type="password" diff --git a/apps/federatedfilesharing/lib/FederatedShareProvider.php b/apps/federatedfilesharing/lib/FederatedShareProvider.php index 479b636fd40..69813289cae 100644 --- a/apps/federatedfilesharing/lib/FederatedShareProvider.php +++ b/apps/federatedfilesharing/lib/FederatedShareProvider.php @@ -132,7 +132,7 @@ class FederatedShareProvider implements IShareProvider { $alreadySharedGroup = $this->getSharedWith($shareWith, IShare::TYPE_REMOTE_GROUP, $share->getNode(), 1, 0); if (!empty($alreadyShared) || !empty($alreadySharedGroup)) { $message = 'Sharing %1$s failed, because this item is already shared with %2$s'; - $message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with user %2$s', [$share->getNode()->getName(), $shareWith]); + $message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with the account %2$s', [$share->getNode()->getName(), $shareWith]); $this->logger->debug(sprintf($message, $share->getNode()->getName(), $shareWith), ['app' => 'Federated File Sharing']); throw new \Exception($message_t); } @@ -143,8 +143,8 @@ class FederatedShareProvider implements IShareProvider { $currentServer = $this->addressHandler->generateRemoteURL(); $currentUser = $sharedBy; if ($this->addressHandler->compareAddresses($cloudId->getUser(), $cloudId->getRemote(), $currentUser, $currentServer)) { - $message = 'Not allowed to create a federated share with the same user.'; - $message_t = $this->l->t('Not allowed to create a federated share with the same user'); + $message = 'Not allowed to create a federated share to the same account.'; + $message_t = $this->l->t('Not allowed to create a federated share to the same account'); $this->logger->debug($message, ['app' => 'Federated File Sharing']); throw new \Exception($message_t); } diff --git a/apps/federatedfilesharing/src/components/AdminSettings.vue b/apps/federatedfilesharing/src/components/AdminSettings.vue index 484dd9a519e..f9de2e0858c 100644 --- a/apps/federatedfilesharing/src/components/AdminSettings.vue +++ b/apps/federatedfilesharing/src/components/AdminSettings.vue @@ -22,44 +22,44 @@ <template> <NcSettingsSection :name="t('federatedfilesharing', 'Federated Cloud Sharing')" - :description="t('federatedfilesharing', 'Adjust how people can share between servers. This includes shares between users on this server as well if they are using federated sharing.')" + :description="t('federatedfilesharing', 'Adjust how people can share between servers. This includes shares between people on this server as well if they are using federated sharing.')" :doc-url="sharingFederatedDocUrl"> <NcCheckboxRadioSwitch type="switch" :checked.sync="outgoingServer2serverShareEnabled" @update:checked="update('outgoing_server2server_share_enabled', outgoingServer2serverShareEnabled)"> - {{ t('federatedfilesharing', 'Allow users on this server to send shares to other servers (this option also allows WebDAV access to public shares)') }} + {{ t('federatedfilesharing', 'Allow people on this server to send shares to other servers (this option also allows WebDAV access to public shares)') }} </NcCheckboxRadioSwitch> <NcCheckboxRadioSwitch type="switch" :checked.sync="incomingServer2serverShareEnabled" @update:checked="update('incoming_server2server_share_enabled', incomingServer2serverShareEnabled)"> - {{ t('federatedfilesharing', 'Allow users on this server to receive shares from other servers') }} + {{ t('federatedfilesharing', 'Allow people on this server to receive shares from other servers') }} </NcCheckboxRadioSwitch> <NcCheckboxRadioSwitch v-if="federatedGroupSharingSupported" type="switch" :checked.sync="outgoingServer2serverGroupShareEnabled" @update:checked="update('outgoing_server2server_group_share_enabled', outgoingServer2serverGroupShareEnabled)"> - {{ t('federatedfilesharing', 'Allow users on this server to send shares to groups on other servers') }} + {{ t('federatedfilesharing', 'Allow people on this server to send shares to groups on other servers') }} </NcCheckboxRadioSwitch> <NcCheckboxRadioSwitch v-if="federatedGroupSharingSupported" type="switch" :checked.sync="incomingServer2serverGroupShareEnabled" @update:checked="update('incoming_server2server_group_share_enabled', incomingServer2serverGroupShareEnabled)"> - {{ t('federatedfilesharing', 'Allow users on this server to receive group shares from other servers') }} + {{ t('federatedfilesharing', 'Allow people on this server to receive group shares from other servers') }} </NcCheckboxRadioSwitch> <NcCheckboxRadioSwitch type="switch" :checked.sync="lookupServerEnabled" @update:checked="update('lookupServerEnabled', lookupServerEnabled)"> - {{ t('federatedfilesharing', 'Search global and public address book for users') }} + {{ t('federatedfilesharing', 'Search global and public address book for people') }} </NcCheckboxRadioSwitch> <NcCheckboxRadioSwitch type="switch" :checked.sync="lookupServerUploadEnabled" @update:checked="update('lookupServerUploadEnabled', lookupServerUploadEnabled)"> - {{ t('federatedfilesharing', 'Allow users to publish their data to a global and public address book') }} + {{ t('federatedfilesharing', 'Allow people to publish their data to a global and public address book') }} </NcCheckboxRadioSwitch> </NcSettingsSection> </template> diff --git a/apps/federatedfilesharing/tests/FederatedShareProviderTest.php b/apps/federatedfilesharing/tests/FederatedShareProviderTest.php index 744cb769c54..0879217e293 100644 --- a/apps/federatedfilesharing/tests/FederatedShareProviderTest.php +++ b/apps/federatedfilesharing/tests/FederatedShareProviderTest.php @@ -397,7 +397,7 @@ class FederatedShareProviderTest extends \Test\TestCase { $share = $this->provider->create($share); $this->fail(); } catch (\Exception $e) { - $this->assertEquals('Not allowed to create a federated share with the same user', $e->getMessage()); + $this->assertEquals('Not allowed to create a federated share to the same account', $e->getMessage()); } $qb = $this->connection->getQueryBuilder(); @@ -459,7 +459,7 @@ class FederatedShareProviderTest extends \Test\TestCase { try { $this->provider->create($share); } catch (\Exception $e) { - $this->assertEquals('Sharing myFile failed, because this item is already shared with user user@server.com', $e->getMessage()); + $this->assertEquals('Sharing myFile failed, because this item is already shared with account user@server.com', $e->getMessage()); } } diff --git a/apps/federation/appinfo/info.xml b/apps/federation/appinfo/info.xml index 180882216d8..49e8537ec0f 100644 --- a/apps/federation/appinfo/info.xml +++ b/apps/federation/appinfo/info.xml @@ -3,8 +3,8 @@ xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd"> <id>federation</id> <name>Federation</name> - <summary>Federation allows you to connect with other trusted servers to exchange the user directory.</summary> - <description>Federation allows you to connect with other trusted servers to exchange the user directory. For example this will be used to auto-complete external users for federated sharing.</description> + <summary>Federation allows you to connect with other trusted servers to exchange the account directory.</summary> + <description>Federation allows you to connect with other trusted servers to exchange the account directory. For example this will be used to auto-complete external accounts for federated sharing.</description> <version>1.19.0</version> <licence>agpl</licence> <author>Bjoern Schiessle</author> diff --git a/apps/federation/templates/settings-admin.php b/apps/federation/templates/settings-admin.php index 62922b19994..a214160a264 100644 --- a/apps/federation/templates/settings-admin.php +++ b/apps/federation/templates/settings-admin.php @@ -8,7 +8,7 @@ style('federation', 'settings-admin') ?> <div id="ocFederationSettings" class="section"> <h2><?php p($l->t('Trusted servers')); ?></h2> - <p class="settings-hint"><?php p($l->t('Federation allows you to connect with other trusted servers to exchange the user directory. For example this will be used to auto-complete external users for federated sharing. It is not necessary to add a server as trusted server in order to create a federated share.')); ?></p> + <p class="settings-hint"><?php p($l->t('Federation allows you to connect with other trusted servers to exchange the account directory. For example this will be used to auto-complete external accounts for federated sharing. It is not necessary to add a server as trusted server in order to create a federated share.')); ?></p> <ul id="listOfTrustedServers"> <?php foreach ($_['trustedServers'] as $trustedServer) { ?> diff --git a/apps/files/js/mainfileinfodetailview.js b/apps/files/js/mainfileinfodetailview.js index 45988a60a02..e3357384cf9 100644 --- a/apps/files/js/mainfileinfodetailview.js +++ b/apps/files/js/mainfileinfodetailview.js @@ -69,7 +69,7 @@ _setupClipboard: function() { var clipboard = new Clipboard('.permalink'); clipboard.on('success', function(e) { - OC.Notification.show(t('files', 'Direct link was copied (only works for users who have access to this file/folder)'), {type: 'success'}); + OC.Notification.show(t('files', 'Direct link was copied (only works for people who have access to this file/folder)'), {type: 'success'}); }); clipboard.on('error', function(e) { var $row = this.$('.permalink-field'); @@ -166,7 +166,7 @@ starAltText: isFavorite ? t('files', 'Favorited') : t('files', 'Favorite'), starClass: isFavorite ? 'icon-starred' : 'icon-star', permalink: this._makePermalink(this.model.get('id')), - permalinkTitle: t('files', 'Copy direct link (only works for users who have access to this file/folder)') + permalinkTitle: t('files', 'Copy direct link (only works for people who have access to this file/folder)') })); // TODO: we really need OC.Previews diff --git a/apps/files/lib/Activity/Provider.php b/apps/files/lib/Activity/Provider.php index 8b817f92c1e..aede4bda127 100644 --- a/apps/files/lib/Activity/Provider.php +++ b/apps/files/lib/Activity/Provider.php @@ -163,7 +163,7 @@ class Provider implements IProvider { if (!isset($parsedParameters['user'])) { // External user via public link share - $subject = str_replace('{user}', $this->activityLang->t('"remote user"'), $subject); + $subject = str_replace('{user}', $this->activityLang->t('"remote person"'), $subject); } $this->setSubjects($event, $subject, $parsedParameters); @@ -281,7 +281,7 @@ class Provider implements IProvider { if (!isset($parsedParameters['user'])) { // External user via public link share - $subject = str_replace('{user}', $this->activityLang->t('"remote user"'), $subject); + $subject = str_replace('{user}', $this->activityLang->t('"remote person"'), $subject); } $this->setSubjects($event, $subject, $parsedParameters); diff --git a/apps/files_external/appinfo/info.xml b/apps/files_external/appinfo/info.xml index 650353b7b1f..01899ab6411 100644 --- a/apps/files_external/appinfo/info.xml +++ b/apps/files_external/appinfo/info.xml @@ -5,9 +5,9 @@ <name>External storage support</name> <summary>Adds basic external storage support</summary> <description> -This application enables administrators to configure connections to external storage providers, such as FTP servers, S3 or SWIFT object stores, other Nextcloud servers, WebDAV servers, and more. Administrators can choose which types of storage to enable and can mount these storage locations for a user, a group, or the entire system. Users will see a new folder appear in their root Nextcloud directory, which they can access and use like any other Nextcloud folder. External storage also allows users to share files stored in these external locations. In these cases, the credentials for the owner of the file are used when the recipient requests the file from external storage, thereby ensuring that the recipient can access the shared file. +This application enables administrators to configure connections to external storage providers, such as FTP servers, S3 or SWIFT object stores, other Nextcloud servers, WebDAV servers, and more. Administration can choose which types of storage to enable and can mount these storage locations for an account, a group, or the entire system. Users will see a new folder appear in their root Nextcloud directory, which they can access and use like any other Nextcloud folder. External storage also allows people to share files stored in these external locations. In these cases, the credentials for the owner of the file are used when the recipient requests the file from external storage, thereby ensuring that the recipient can access the shared file. -External storage can be configured using the GUI or at the command line. This second option provides the advanced user with more flexibility for configuring bulk external storage mounts and setting mount priorities. More information is available in the external storage GUI documentation and the external storage Configuration File documentation. +External storage can be configured using the GUI or at the command line. This second option provides the administration with more flexibility for configuring bulk external storage mounts and setting mount priorities. More information is available in the external storage GUI documentation and the external storage Configuration File documentation. </description> <version>1.21.0</version> <licence>agpl</licence> diff --git a/apps/files_external/js/settings.js b/apps/files_external/js/settings.js index db77fe4dfc1..39f4a6ab7f0 100644 --- a/apps/files_external/js/settings.js +++ b/apps/files_external/js/settings.js @@ -91,7 +91,7 @@ function initApplicableUsersMultiselect($elements, userListLimit) { return; } return $elements.select2({ - placeholder: t('files_external', 'Type to select user or group.'), + placeholder: t('files_external', 'Type to select account or group.'), allowClear: true, multiple: true, toggleSelect: true, diff --git a/apps/files_external/lib/Command/Notify.php b/apps/files_external/lib/Command/Notify.php index fd3a66a756e..1602ea6e354 100644 --- a/apps/files_external/lib/Command/Notify.php +++ b/apps/files_external/lib/Command/Notify.php @@ -158,7 +158,7 @@ class Notify extends Base { } catch (\Exception $e) { $output->writeln('<error>Error while trying to create storage</error>'); if ($noAuth) { - $output->writeln('<error>Username and/or password required</error>'); + $output->writeln('<error>Account name and/or password required</error>'); } return self::FAILURE; } diff --git a/apps/files_external/lib/Controller/UserGlobalStoragesController.php b/apps/files_external/lib/Controller/UserGlobalStoragesController.php index ba15afb2bdf..7b3f54d25c7 100644 --- a/apps/files_external/lib/Controller/UserGlobalStoragesController.php +++ b/apps/files_external/lib/Controller/UserGlobalStoragesController.php @@ -172,7 +172,7 @@ class UserGlobalStoragesController extends StoragesController { } else { return new DataResponse( [ - 'message' => $this->l10n->t('Storage with ID "%d" is not user editable', [$id]) + 'message' => $this->l10n->t('Storage with ID "%d" is not editable by non-admins', [$id]) ], Http::STATUS_FORBIDDEN ); diff --git a/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV2.php b/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV2.php index ddc734ff1ec..b16dcb5b651 100644 --- a/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV2.php +++ b/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV2.php @@ -38,7 +38,7 @@ class OpenStackV2 extends AuthMechanism { ->setScheme(self::SCHEME_OPENSTACK) ->setText($l->t('OpenStack v2')) ->addParameters([ - new DefinitionParameter('user', $l->t('Username')), + new DefinitionParameter('user', $l->t('Account name')), (new DefinitionParameter('password', $l->t('Password'))) ->setType(DefinitionParameter::VALUE_PASSWORD), new DefinitionParameter('tenant', $l->t('Tenant name')), diff --git a/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV3.php b/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV3.php index 44ea1c61155..62f9dda783b 100644 --- a/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV3.php +++ b/apps/files_external/lib/Lib/Auth/OpenStack/OpenStackV3.php @@ -42,7 +42,7 @@ class OpenStackV3 extends AuthMechanism { ->setScheme(self::SCHEME_OPENSTACK) ->setText($l->t('OpenStack v3')) ->addParameters([ - new DefinitionParameter('user', $l->t('Username')), + new DefinitionParameter('user', $l->t('Account name')), new DefinitionParameter('domain', $l->t('Domain')), (new DefinitionParameter('password', $l->t('Password'))) ->setType(DefinitionParameter::VALUE_PASSWORD), diff --git a/apps/files_external/lib/Lib/Auth/OpenStack/Rackspace.php b/apps/files_external/lib/Lib/Auth/OpenStack/Rackspace.php index 8bf3eba668d..4e0f46a2359 100644 --- a/apps/files_external/lib/Lib/Auth/OpenStack/Rackspace.php +++ b/apps/files_external/lib/Lib/Auth/OpenStack/Rackspace.php @@ -37,7 +37,7 @@ class Rackspace extends AuthMechanism { ->setScheme(self::SCHEME_OPENSTACK) ->setText($l->t('Rackspace')) ->addParameters([ - new DefinitionParameter('user', $l->t('Username')), + new DefinitionParameter('user', $l->t('Account name')), (new DefinitionParameter('key', $l->t('API key'))) ->setType(DefinitionParameter::VALUE_PASSWORD), ]) diff --git a/apps/files_external/lib/Lib/Auth/Password/Password.php b/apps/files_external/lib/Lib/Auth/Password/Password.php index 5165a61d028..6f0322b8020 100644 --- a/apps/files_external/lib/Lib/Auth/Password/Password.php +++ b/apps/files_external/lib/Lib/Auth/Password/Password.php @@ -35,9 +35,9 @@ class Password extends AuthMechanism { $this ->setIdentifier('password::password') ->setScheme(self::SCHEME_PASSWORD) - ->setText($l->t('Username and password')) + ->setText($l->t('Account name and password')) ->addParameters([ - new DefinitionParameter('user', $l->t('Username')), + new DefinitionParameter('user', $l->t('Account name')), (new DefinitionParameter('password', $l->t('Password'))) ->setType(DefinitionParameter::VALUE_PASSWORD), ]); diff --git a/apps/files_external/lib/Lib/Auth/Password/UserGlobalAuth.php b/apps/files_external/lib/Lib/Auth/Password/UserGlobalAuth.php index 6312a3d136e..d8ed217b336 100644 --- a/apps/files_external/lib/Lib/Auth/Password/UserGlobalAuth.php +++ b/apps/files_external/lib/Lib/Auth/Password/UserGlobalAuth.php @@ -52,7 +52,7 @@ class UserGlobalAuth extends AuthMechanism { ->setIdentifier('password::global::user') ->setVisibility(BackendService::VISIBILITY_DEFAULT) ->setScheme(self::SCHEME_PASSWORD) - ->setText($l->t('Global credentials, user entered')); + ->setText($l->t('Global credentials, manually entered')); } public function saveBackendOptions(IUser $user, $id, $backendOptions) { diff --git a/apps/files_external/lib/Lib/Auth/Password/UserProvided.php b/apps/files_external/lib/Lib/Auth/Password/UserProvided.php index 0c8140e3c14..933bbeb9d8b 100644 --- a/apps/files_external/lib/Lib/Auth/Password/UserProvided.php +++ b/apps/files_external/lib/Lib/Auth/Password/UserProvided.php @@ -50,9 +50,9 @@ class UserProvided extends AuthMechanism implements IUserProvided { ->setIdentifier('password::userprovided') ->setVisibility(BackendService::VISIBILITY_ADMIN) ->setScheme(self::SCHEME_PASSWORD) - ->setText($l->t('User entered, store in database')) + ->setText($l->t('Manually entered, store in database')) ->addParameters([ - (new DefinitionParameter('user', $l->t('Username'))) + (new DefinitionParameter('user', $l->t('Account name'))) ->setFlag(DefinitionParameter::FLAG_USER_PROVIDED), (new DefinitionParameter('password', $l->t('Password'))) ->setType(DefinitionParameter::VALUE_PASSWORD) diff --git a/apps/files_external/lib/Lib/Auth/PublicKey/RSA.php b/apps/files_external/lib/Lib/Auth/PublicKey/RSA.php index d45db03b2da..9aef3995f7f 100644 --- a/apps/files_external/lib/Lib/Auth/PublicKey/RSA.php +++ b/apps/files_external/lib/Lib/Auth/PublicKey/RSA.php @@ -47,7 +47,7 @@ class RSA extends AuthMechanism { ->setScheme(self::SCHEME_PUBLICKEY) ->setText($l->t('RSA public key')) ->addParameters([ - new DefinitionParameter('user', $l->t('Username')), + new DefinitionParameter('user', $l->t('Account name')), new DefinitionParameter('public_key', $l->t('Public key')), (new DefinitionParameter('private_key', 'private_key')) ->setType(DefinitionParameter::VALUE_HIDDEN), diff --git a/apps/files_external/lib/Lib/Auth/PublicKey/RSAPrivateKey.php b/apps/files_external/lib/Lib/Auth/PublicKey/RSAPrivateKey.php index 7d04aaaf057..7868594eb12 100644 --- a/apps/files_external/lib/Lib/Auth/PublicKey/RSAPrivateKey.php +++ b/apps/files_external/lib/Lib/Auth/PublicKey/RSAPrivateKey.php @@ -46,7 +46,7 @@ class RSAPrivateKey extends AuthMechanism { ->setScheme(self::SCHEME_PUBLICKEY) ->setText($l->t('RSA private key')) ->addParameters([ - new DefinitionParameter('user', $l->t('Username')), + new DefinitionParameter('user', $l->t('Account name')), (new DefinitionParameter('password', $l->t('Password'))) ->setFlag(DefinitionParameter::FLAG_OPTIONAL) ->setType(DefinitionParameter::VALUE_PASSWORD), diff --git a/apps/files_external/lib/Lib/Backend/SMB.php b/apps/files_external/lib/Lib/Backend/SMB.php index c455464c2be..9ac10025ea0 100644 --- a/apps/files_external/lib/Lib/Backend/SMB.php +++ b/apps/files_external/lib/Lib/Backend/SMB.php @@ -67,7 +67,7 @@ class SMB extends Backend { (new DefinitionParameter('check_acl', $l->t('Verify ACL access when listing files'))) ->setType(DefinitionParameter::VALUE_BOOLEAN) ->setFlag(DefinitionParameter::FLAG_OPTIONAL) - ->setTooltip($l->t("Check the ACL's of each file or folder inside a directory to filter out items where the user has no read permissions, comes with a performance penalty")), + ->setTooltip($l->t("Check the ACL's of each file or folder inside a directory to filter out items where the account has no read permissions, comes with a performance penalty")), (new DefinitionParameter('timeout', $l->t('Timeout'))) ->setType(DefinitionParameter::VALUE_HIDDEN) ->setFlag(DefinitionParameter::FLAG_OPTIONAL), diff --git a/apps/files_external/lib/Lib/Backend/SMB_OC.php b/apps/files_external/lib/Lib/Backend/SMB_OC.php index 78c266e36d1..c7bde7ce171 100644 --- a/apps/files_external/lib/Lib/Backend/SMB_OC.php +++ b/apps/files_external/lib/Lib/Backend/SMB_OC.php @@ -46,7 +46,7 @@ class SMB_OC extends Backend { ->setText($l->t('SMB/CIFS using OC login')) ->addParameters([ new DefinitionParameter('host', $l->t('Host')), - (new DefinitionParameter('username_as_share', $l->t('Username as share'))) + (new DefinitionParameter('username_as_share', $l->t('Account name as share'))) ->setType(DefinitionParameter::VALUE_BOOLEAN), (new DefinitionParameter('share', $l->t('Share'))) ->setFlag(DefinitionParameter::FLAG_OPTIONAL), diff --git a/apps/files_external/lib/Lib/Storage/Swift.php b/apps/files_external/lib/Lib/Storage/Swift.php index 19c83b29bc8..f7283631699 100644 --- a/apps/files_external/lib/Lib/Storage/Swift.php +++ b/apps/files_external/lib/Lib/Storage/Swift.php @@ -167,7 +167,7 @@ class Swift extends \OC\Files\Storage\Common { or (empty($params['user']) && empty($params['userid'])) or empty($params['bucket']) or empty($params['region']) ) { - throw new StorageBadConfigException("API Key or password, Username, Bucket and Region have to be configured."); + throw new StorageBadConfigException("API Key or password, Account name, Bucket and Region have to be configured."); } $user = $params['user']; diff --git a/apps/files_external/templates/settings.php b/apps/files_external/templates/settings.php index d2dd70410ef..d22ec50614c 100644 --- a/apps/files_external/templates/settings.php +++ b/apps/files_external/templates/settings.php @@ -108,7 +108,7 @@ function writeParameterInput($parameter, $options, $classes = []) { <form data-can-create="<?php echo $canCreateMounts?'true':'false' ?>" data-can-create-local="<?php echo $canCreateNewLocalStorage?'true':'false' ?>" id="files_external" class="section" data-encryption-enabled="<?php echo $_['encryptionEnabled']?'true': 'false'; ?>"> <h2 class="inlineblock" data-anchor-name="external-storage"><?php p($l->t('External storage')); ?></h2> <a target="_blank" rel="noreferrer" class="icon-info" title="<?php p($l->t('Open documentation'));?>" href="<?php p(link_to_docs('admin-external-storage')); ?>"></a> - <p class="settings-hint"><?php p($l->t('External storage enables you to mount external storage services and devices as secondary Nextcloud storage devices. You may also allow users to mount their own external storage services.')); ?></p> + <p class="settings-hint"><?php p($l->t('External storage enables you to mount external storage services and devices as secondary Nextcloud storage devices. You may also allow people to mount their own external storage services.')); ?></p> <?php if (isset($_['dependencies']) and ($_['dependencies'] !== '') and $canCreateMounts) { print_unescaped(''.$_['dependencies'].''); } ?> @@ -171,7 +171,7 @@ uasort($sortedBackends, function ($a, $b) { <td class="configuration"></td> <?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN): ?> <td class="applicable" align="right"> - <label><input type="checkbox" class="applicableToAllUsers" checked="" /><?php p($l->t('All users')); ?></label> + <label><input type="checkbox" class="applicableToAllUsers" checked="" /><?php p($l->t('All people')); ?></label> <div class="applicableUsersContainer"> <input type="hidden" class="applicableUsers" style="width:20em;" value="" /> </div> @@ -193,7 +193,7 @@ uasort($sortedBackends, function ($a, $b) { value="1" <?php if ($_['allowUserMounting']) { print_unescaped(' checked="checked"'); } ?> /> - <label for="allowUserMounting"><?php p($l->t('Allow users to mount external storage')); ?></label> <span id="userMountingMsg" class="msg"></span> + <label for="allowUserMounting"><?php p($l->t('Allow people to mount external storage')); ?></label> <span id="userMountingMsg" class="msg"></span> <p id="userMountingBackends"<?php if (!$_['allowUserMounting']): ?> class="hidden"<?php endif; ?>> <?php @@ -228,7 +228,7 @@ uasort($sortedBackends, function ($a, $b) { <input type="text" name="username" autocomplete="false" value="<?php p($_['globalCredentials']['user']); ?>" - placeholder="<?php p($l->t('Username')) ?>"/> + placeholder="<?php p($l->t('Account name')) ?>"/> <input type="password" name="password" autocomplete="false" value="<?php p($_['globalCredentials']['password']); ?>" diff --git a/apps/files_sharing/appinfo/info.xml b/apps/files_sharing/appinfo/info.xml index 802b8a7ca92..4892dab0757 100644 --- a/apps/files_sharing/appinfo/info.xml +++ b/apps/files_sharing/appinfo/info.xml @@ -5,7 +5,7 @@ <name>File sharing</name> <summary>File sharing</summary> <description> - This application enables users to share files within Nextcloud. If enabled, the admin can choose which groups can share files. The applicable users can then share files and folders with other users and groups within Nextcloud. In addition, if the admin enables the share link feature, an external link can be used to share files with other users outside of Nextcloud. Admins can also enforce passwords, expirations dates, and enable server to server sharing via share links, as well as sharing from mobile devices. + This application enables people to share files within Nextcloud. If enabled, the admin can choose which groups can share files. The applicable people can then share files and folders with other people and groups within Nextcloud. In addition, if the admin enables the share link feature, an external link can be used to share files with other people outside of Nextcloud. Admins can also enforce passwords, expirations dates, and enable server to server sharing via share links, as well as sharing from mobile devices. Turning the feature off removes shared files and folders on the server for all share recipients, and also on the sync clients and mobile apps. More information is available in the Nextcloud Documentation. </description> diff --git a/apps/files_sharing/lib/Controller/ShareAPIController.php b/apps/files_sharing/lib/Controller/ShareAPIController.php index aa239ae8bb6..5762aa47b3b 100644 --- a/apps/files_sharing/lib/Controller/ShareAPIController.php +++ b/apps/files_sharing/lib/Controller/ShareAPIController.php @@ -687,7 +687,7 @@ class ShareAPIController extends OCSController { if ($shareType === IShare::TYPE_USER) { // Valid user is required to share if ($shareWith === null || !$this->userManager->userExists($shareWith)) { - throw new OCSNotFoundException($this->l->t('Please specify a valid user')); + throw new OCSNotFoundException($this->l->t('Please specify a valid account to share with')); } $share->setSharedWith($shareWith); $share->setPermissions($permissions); @@ -762,7 +762,7 @@ class ShareAPIController extends OCSController { } if ($shareWith === null) { - throw new OCSNotFoundException($this->l->t('Please specify a valid federated user ID')); + throw new OCSNotFoundException($this->l->t('Please specify a valid federated account ID')); } $share->setSharedWith($shareWith); diff --git a/apps/files_sharing/src/components/PersonalSettings.vue b/apps/files_sharing/src/components/PersonalSettings.vue index 7a14b015223..e3fe603c342 100644 --- a/apps/files_sharing/src/components/PersonalSettings.vue +++ b/apps/files_sharing/src/components/PersonalSettings.vue @@ -29,7 +29,7 @@ class="checkbox" type="checkbox" @change="toggleEnabled"> - <label for="files-sharing-personal-settings-accept">{{ t('files_sharing', 'Accept user and group shares by default') }}</label> + <label for="files-sharing-personal-settings-accept">{{ t('files_sharing', 'Accept shares from other accounts and groups by default') }}</label> </p> <p v-if="allowCustomDirectory"> <SelectShareFolderDialogue /> diff --git a/apps/files_sharing/src/components/SharingEntryInternal.vue b/apps/files_sharing/src/components/SharingEntryInternal.vue index f6b900b8bf7..bc5bdd32e57 100644 --- a/apps/files_sharing/src/components/SharingEntryInternal.vue +++ b/apps/files_sharing/src/components/SharingEntryInternal.vue @@ -72,9 +72,9 @@ export default { internalLinkSubtitle() { if (this.fileInfo.type === 'dir') { - return t('files_sharing', 'Only works for users with access to this folder') + return t('files_sharing', 'Only works for people with access to this folder') } - return t('files_sharing', 'Only works for users with access to this file') + return t('files_sharing', 'Only works for people with access to this file') }, }, diff --git a/apps/files_sharing/src/views/SharingInherited.vue b/apps/files_sharing/src/views/SharingInherited.vue index b61f65ae47a..515ab8c1608 100644 --- a/apps/files_sharing/src/views/SharingInherited.vue +++ b/apps/files_sharing/src/views/SharingInherited.vue @@ -94,7 +94,7 @@ export default { }, subTitle() { return (this.showInheritedShares && this.shares.length === 0) - ? t('files_sharing', 'No other users with access found') + ? t('files_sharing', 'No other accounts with access found') : '' }, toggleTooltip() { diff --git a/apps/files_sharing/tests/Controller/ShareAPIControllerTest.php b/apps/files_sharing/tests/Controller/ShareAPIControllerTest.php index 822212ae86f..eb77cd3142b 100644 --- a/apps/files_sharing/tests/Controller/ShareAPIControllerTest.php +++ b/apps/files_sharing/tests/Controller/ShareAPIControllerTest.php @@ -1679,7 +1679,7 @@ class ShareAPIControllerTest extends TestCase { public function testCreateShareUserNoShareWith() { $this->expectException(\OCP\AppFramework\OCS\OCSNotFoundException::class); - $this->expectExceptionMessage('Please specify a valid user'); + $this->expectExceptionMessage('Please specify a valid person to share with'); $share = $this->newShare(); $this->shareManager->method('newShare')->willReturn($share); @@ -1707,7 +1707,7 @@ class ShareAPIControllerTest extends TestCase { public function testCreateShareUserNoValidShareWith() { $this->expectException(\OCP\AppFramework\OCS\OCSNotFoundException::class); - $this->expectExceptionMessage('Please specify a valid user'); + $this->expectExceptionMessage('Please specify a valid person to share with'); $share = $this->newShare(); $this->shareManager->method('newShare')->willReturn($share); diff --git a/apps/files_trashbin/appinfo/info.xml b/apps/files_trashbin/appinfo/info.xml index 0386ccdfee6..c1bab46bd69 100644 --- a/apps/files_trashbin/appinfo/info.xml +++ b/apps/files_trashbin/appinfo/info.xml @@ -3,10 +3,10 @@ xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd"> <id>files_trashbin</id> <name>Deleted files</name> - <summary>This application enables users to restore files that were deleted from the system.</summary> + <summary>This application enables people to restore files that were deleted from the system.</summary> <description> -This application enables users to restore files that were deleted from the system. It displays a list of deleted files in the web interface, and has options to restore those deleted files back to the users file directories or remove them permanently from the system. Restoring a file also restores related file versions, if the versions application is enabled. When a file is deleted from a share, it can be restored in the same manner, though it is no longer shared. By default, these files remain in the trash bin for 30 days. -To prevent a user from running out of disk space, the Deleted files app will not utilize more than 50% of the currently available free quota for deleted files. If the deleted files exceed this limit, the app deletes the oldest files until it gets below this limit. More information is available in the Deleted Files documentation. +This application enables people to restore files that were deleted from the system. It displays a list of deleted files in the web interface, and has options to restore those deleted files back to the people file directories or remove them permanently from the system. Restoring a file also restores related file versions, if the versions application is enabled. When a file is deleted from a share, it can be restored in the same manner, though it is no longer shared. By default, these files remain in the trash bin for 30 days. +To prevent an account from running out of disk space, the Deleted files app will not utilize more than 50% of the currently available free quota for deleted files. If the deleted files exceed this limit, the app deletes the oldest files until it gets below this limit. More information is available in the Deleted Files documentation. </description> <version>1.19.0</version> diff --git a/apps/files_versions/appinfo/info.xml b/apps/files_versions/appinfo/info.xml index a00f165c542..23ed3a22a02 100644 --- a/apps/files_versions/appinfo/info.xml +++ b/apps/files_versions/appinfo/info.xml @@ -5,8 +5,8 @@ <name>Versions</name> <summary>This application automatically maintains older versions of files that are changed.</summary> <description> - This application automatically maintains older versions of files that are changed. When enabled, a hidden versions folder is provisioned in every user's directory and is used to store old file versions. A user can revert to an older version through the web interface at any time, with the replaced file becoming a version. The app automatically manages the versions folder to ensure the user does not run out of Quota because of versions. - In addition to the expiry of versions, the versions app makes certain never to use more than 50% of the user's currently available free space. If stored versions exceed this limit, the app will delete the oldest versions first until it meets this limit. More information is available in the Versions documentation. + This application automatically maintains older versions of files that are changed. When enabled, a hidden versions folder is provisioned in every user's directory and is used to store old file versions. A user can revert to an older version through the web interface at any time, with the replaced file becoming a version. The app automatically manages the versions folder to ensure the account does not run out of Quota because of versions. + In addition to the expiry of versions, the versions app makes certain never to use more than 50% of the account's currently available free space. If stored versions exceed this limit, the app will delete the oldest versions first until it meets this limit. More information is available in the Versions documentation. </description> <version>1.22.0</version> <licence>agpl</licence> diff --git a/apps/files_versions/lib/Command/ExpireVersions.php b/apps/files_versions/lib/Command/ExpireVersions.php index d8e59b40dba..24cc6a896d5 100644 --- a/apps/files_versions/lib/Command/ExpireVersions.php +++ b/apps/files_versions/lib/Command/ExpireVersions.php @@ -50,7 +50,7 @@ class ExpireVersions extends Command { ->addArgument( 'user_id', InputArgument::OPTIONAL | InputArgument::IS_ARRAY, - 'expire file versions of the given user(s), if no user is given file versions for all users will be expired.' + 'expire file versions of the given account(s), if no account is given file versions for all accounts will be expired.' ); } @@ -65,7 +65,7 @@ class ExpireVersions extends Command { if (!empty($users)) { foreach ($users as $user) { if (!$this->userManager->userExists($user)) { - $output->writeln("<error>Unknown user $user</error>"); + $output->writeln("<error>Unknown account $user</error>"); return self::FAILURE; } diff --git a/apps/lookup_server_connector/appinfo/info.xml b/apps/lookup_server_connector/appinfo/info.xml index 30a7bc0aadc..7c88c6cb21b 100644 --- a/apps/lookup_server_connector/appinfo/info.xml +++ b/apps/lookup_server_connector/appinfo/info.xml @@ -3,8 +3,8 @@ xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd"> <id>lookup_server_connector</id> <name>Lookup Server Connector</name> - <summary>Sync public user information with the lookup server</summary> - <description>Sync public user information with the lookup server</description> + <summary>Sync public account information with the lookup server</summary> + <description>Sync public account information with the lookup server</description> <version>1.17.0</version> <licence>agpl</licence> <author>Bjoern Schiessle</author> diff --git a/apps/provisioning_api/appinfo/info.xml b/apps/provisioning_api/appinfo/info.xml index a38d9f20a61..da03b2b00e4 100644 --- a/apps/provisioning_api/appinfo/info.xml +++ b/apps/provisioning_api/appinfo/info.xml @@ -3,10 +3,10 @@ xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd"> <id>provisioning_api</id> <name>Provisioning API</name> - <summary>This application enables a set of APIs that external systems can use to manage users, groups and apps.</summary> + <summary>This application enables a set of APIs that external systems can use to manage accounts, groups and apps.</summary> <description> - This application enables a set of APIs that external systems can use to create, edit, delete and query user - attributes, query, set and remove groups, set quota and query total storage used in Nextcloud. Group admin users + This application enables a set of APIs that external systems can use to create, edit, delete and query account + attributes, query, set and remove groups, set quota and query total storage used in Nextcloud. Group admin accounts can also query Nextcloud and perform the same functions as an admin for groups they manage. The API also enables an admin to query for active Nextcloud applications, application info, and to enable or disable an app remotely. Once the app is enabled, HTTP requests can be used via a Basic Auth header to perform any of the functions diff --git a/apps/provisioning_api/lib/Controller/AppConfigController.php b/apps/provisioning_api/lib/Controller/AppConfigController.php index ea862550e2d..7ca5e76962f 100644 --- a/apps/provisioning_api/lib/Controller/AppConfigController.php +++ b/apps/provisioning_api/lib/Controller/AppConfigController.php @@ -133,7 +133,7 @@ class AppConfigController extends OCSController { } if (!$this->isAllowedToChangedKey($user, $app, $key)) { - throw new NotAdminException($this->l10n->t('Logged in user must be an administrator or have authorization to edit this setting.')); + throw new NotAdminException($this->l10n->t('Logged in account must be an administrator or have authorization to edit this setting.')); } try { diff --git a/apps/provisioning_api/lib/Controller/VerificationController.php b/apps/provisioning_api/lib/Controller/VerificationController.php index 6b2443796fc..e184dc13fc6 100644 --- a/apps/provisioning_api/lib/Controller/VerificationController.php +++ b/apps/provisioning_api/lib/Controller/VerificationController.php @@ -83,7 +83,7 @@ class VerificationController extends Controller { public function showVerifyMail(string $token, string $userId, string $key) { if ($this->userSession->getUser()->getUID() !== $userId) { // not a public page, hence getUser() must return an IUser - throw new InvalidArgumentException('Logged in user is not mail address owner'); + throw new InvalidArgumentException('Logged in account is not mail address owner'); } $email = $this->crypto->decrypt($key); @@ -102,7 +102,7 @@ class VerificationController extends Controller { public function verifyMail(string $token, string $userId, string $key) { try { if ($this->userSession->getUser()->getUID() !== $userId) { - throw new InvalidArgumentException('Logged in user is not mail address owner'); + throw new InvalidArgumentException('Logged in account is not mail address owner'); } $email = $this->crypto->decrypt($key); $ref = \substr(hash('sha256', $email), 0, 8); diff --git a/apps/provisioning_api/lib/Middleware/Exceptions/NotSubAdminException.php b/apps/provisioning_api/lib/Middleware/Exceptions/NotSubAdminException.php index 6f5b15628f9..2b31e2f7d1b 100644 --- a/apps/provisioning_api/lib/Middleware/Exceptions/NotSubAdminException.php +++ b/apps/provisioning_api/lib/Middleware/Exceptions/NotSubAdminException.php @@ -27,6 +27,6 @@ use OCP\AppFramework\Http; class NotSubAdminException extends \Exception { public function __construct() { - parent::__construct('Logged in user must be at least a sub admin', Http::STATUS_FORBIDDEN); + parent::__construct('Logged in account must be at least a sub admin', Http::STATUS_FORBIDDEN); } } diff --git a/apps/settings/lib/Controller/ChangePasswordController.php b/apps/settings/lib/Controller/ChangePasswordController.php index af4cf5969c9..b878d343525 100644 --- a/apps/settings/lib/Controller/ChangePasswordController.php +++ b/apps/settings/lib/Controller/ChangePasswordController.php @@ -132,7 +132,7 @@ class ChangePasswordController extends Controller { return new JSONResponse([ 'status' => 'error', 'data' => [ - 'message' => $this->l->t('No user supplied'), + 'message' => $this->l->t('No account name supplied'), ], ]); } @@ -186,7 +186,7 @@ class ChangePasswordController extends Controller { return new JSONResponse([ 'status' => 'error', 'data' => [ - 'message' => $this->l->t('Please provide an admin recovery password; otherwise, all user data will be lost.'), + 'message' => $this->l->t('Please provide an admin recovery password; otherwise, all account data will be lost.'), ] ]); } elseif ($recoveryEnabledForUser && ! $validRecoveryPassword) { @@ -212,7 +212,7 @@ class ChangePasswordController extends Controller { return new JSONResponse([ 'status' => 'error', 'data' => [ - 'message' => $this->l->t('Backend does not support password change, but the user\'s encryption key was updated.'), + 'message' => $this->l->t('Backend does not support password change, but the encryption of the account key was updated.'), ] ]); } elseif (!$result && !$recoveryEnabledForUser) { diff --git a/apps/settings/lib/Controller/MailSettingsController.php b/apps/settings/lib/Controller/MailSettingsController.php index be662ed641a..c329de3cb6a 100644 --- a/apps/settings/lib/Controller/MailSettingsController.php +++ b/apps/settings/lib/Controller/MailSettingsController.php @@ -180,6 +180,6 @@ class MailSettingsController extends Controller { } $this->config->setAppValue('core', 'emailTestSuccessful', '0'); - return new DataResponse($this->l10n->t('You need to set your user email before being able to send test emails. Go to %s for that.', [$this->urlGenerator->linkToRouteAbsolute('settings.PersonalSettings.index')]), Http::STATUS_BAD_REQUEST); + return new DataResponse($this->l10n->t('You need to set your account email before being able to send test emails. Go to %s for that.', [$this->urlGenerator->linkToRouteAbsolute('settings.PersonalSettings.index')]), Http::STATUS_BAD_REQUEST); } } diff --git a/apps/settings/lib/Controller/UsersController.php b/apps/settings/lib/Controller/UsersController.php index 3c6ee1806f0..c6abe6bff4f 100644 --- a/apps/settings/lib/Controller/UsersController.php +++ b/apps/settings/lib/Controller/UsersController.php @@ -240,7 +240,7 @@ class UsersController extends Controller { $disabledUsersGroup = [ 'id' => 'disabled', - 'name' => 'Disabled users', + 'name' => 'Disabled accounts', 'usercount' => $disabledUsers ]; @@ -388,7 +388,7 @@ class UsersController extends Controller { [ 'status' => 'error', 'data' => [ - 'message' => $this->l10n->t('Invalid user') + 'message' => $this->l10n->t('Invalid account') ] ], Http::STATUS_UNAUTHORIZED diff --git a/apps/settings/lib/Mailer/NewUserMailHelper.php b/apps/settings/lib/Mailer/NewUserMailHelper.php index 69fb9a8e6cf..598b69c0a9e 100644 --- a/apps/settings/lib/Mailer/NewUserMailHelper.php +++ b/apps/settings/lib/Mailer/NewUserMailHelper.php @@ -134,7 +134,7 @@ class NewUserMailHelper { } $emailTemplate->addBodyText($l10n->t('Welcome to your %s account, you can add, protect, and share your data.', [$this->themingDefaults->getName()])); if ($user->getBackendClassName() !== 'LDAP') { - $emailTemplate->addBodyText($l10n->t('Your username is: %s', [$userId])); + $emailTemplate->addBodyText($l10n->t('Your account name is: %s', [$userId])); } if ($generatePasswordResetToken) { $leftButtonText = $l10n->t('Set your password'); diff --git a/apps/settings/lib/Middleware/SubadminMiddleware.php b/apps/settings/lib/Middleware/SubadminMiddleware.php index 782f0155510..d29d46ea62e 100644 --- a/apps/settings/lib/Middleware/SubadminMiddleware.php +++ b/apps/settings/lib/Middleware/SubadminMiddleware.php @@ -67,7 +67,7 @@ class SubadminMiddleware extends Middleware { public function beforeController($controller, $methodName) { if (!$this->reflector->hasAnnotation('NoSubAdminRequired') && !$this->reflector->hasAnnotation('AuthorizedAdminSetting')) { if (!$this->isSubAdmin) { - throw new NotAdminException($this->l10n->t('Logged in user must be a subadmin')); + throw new NotAdminException($this->l10n->t('Logged in account must be a subadmin')); } } } diff --git a/apps/settings/lib/SetupChecks/CheckUserCertificates.php b/apps/settings/lib/SetupChecks/CheckUserCertificates.php index 8e9c0080a26..3f80b466201 100644 --- a/apps/settings/lib/SetupChecks/CheckUserCertificates.php +++ b/apps/settings/lib/SetupChecks/CheckUserCertificates.php @@ -46,7 +46,7 @@ class CheckUserCertificates implements ISetupCheck { } public function getName(): string { - return $this->l10n->t('Old user imported certificates'); + return $this->l10n->t('Old administration imported certificates'); } public function run(): SetupResult { @@ -55,8 +55,8 @@ class CheckUserCertificates implements ISetupCheck { return SetupResult::success(); } if ($this->configValue === 'not-run-yet') { - return SetupResult::info($this->l10n->t('A background job is pending that checks for user imported SSL certificates. Please check back later.')); + return SetupResult::info($this->l10n->t('A background job is pending that checks for administration imported SSL certificates. Please check back later.')); } - return SetupResult::error($this->l10n->t('There are some user imported SSL certificates present, that are not used anymore with Nextcloud 21. They can be imported on the command line via "occ security:certificates:import" command. Their paths inside the data directory are shown below.')); + return SetupResult::error($this->l10n->t('There are some administration imported SSL certificates present, that are not used anymore with Nextcloud 21. They can be imported on the command line via "occ security:certificates:import" command. Their paths inside the data directory are shown below.')); } } diff --git a/apps/settings/src/components/AdminTwoFactor.vue b/apps/settings/src/components/AdminTwoFactor.vue index aba6dc7537f..f2572be9c90 100644 --- a/apps/settings/src/components/AdminTwoFactor.vue +++ b/apps/settings/src/components/AdminTwoFactor.vue @@ -1,6 +1,6 @@ <template> <NcSettingsSection :name="t('settings', 'Two-Factor Authentication')" - :description="t('settings', 'Two-factor authentication can be enforced for all users and specific groups. If they do not have a two-factor provider configured, they will be unable to log into the system.')" + :description="t('settings', 'Two-factor authentication can be enforced for all accounts and specific groups. If they do not have a two-factor provider configured, they will be unable to log into the system.')" :doc-url="twoFactorAdminDoc"> <p v-if="loading"> <span class="icon-loading-small two-factor-loading" /> @@ -50,7 +50,7 @@ <p class="top-margin"> <em> <!-- this text is also found in the documentation. update it there as well if it ever changes --> - {{ t('settings', 'When groups are selected/excluded, they use the following logic to determine if a user has 2FA enforced: If no groups are selected, 2FA is enabled for everyone except members of the excluded groups. If groups are selected, 2FA is enabled for all members of these. If a user is both in a selected and excluded group, the selected takes precedence and 2FA is enforced.') }} + {{ t('settings', 'When groups are selected/excluded, they use the following logic to determine if an account has 2FA enforced: If no groups are selected, 2FA is enabled for everyone except members of the excluded groups. If groups are selected, 2FA is enabled for all members of these. If an account is both in a selected and excluded group, the selected takes precedence and 2FA is enforced.') }} </em> </p> </template> diff --git a/apps/settings/src/components/AppDetails.vue b/apps/settings/src/components/AppDetails.vue index 0440741f4c9..0f9969c650b 100644 --- a/apps/settings/src/components/AppDetails.vue +++ b/apps/settings/src/components/AppDetails.vue @@ -130,7 +130,7 @@ class="appslink" :href="app.documentation.user" target="_blank" - rel="noreferrer noopener">{{ t('settings', 'User documentation') }} ↗</a> + rel="noreferrer noopener">{{ t('settings', 'Usage documentation') }} ↗</a> <a v-if="app.documentation && app.documentation.admin" class="appslink" :href="app.documentation.admin" diff --git a/apps/settings/src/components/AuthTokenSetupDialog.vue b/apps/settings/src/components/AuthTokenSetupDialog.vue index f40fe722cef..71fb53a014c 100644 --- a/apps/settings/src/components/AuthTokenSetupDialog.vue +++ b/apps/settings/src/components/AuthTokenSetupDialog.vue @@ -27,7 +27,7 @@ {{ t('settings', 'Use the credentials below to configure your app or device. For security reasons this password will only be shown once.') }} </p> <div class="token-dialog__name"> - <NcTextField :label="t('settings', 'Username')" :value="loginName" readonly /> + <NcTextField :label="t('settings', 'Account name')" :value="loginName" readonly /> <NcButton type="tertiary" :title="copyLoginNameLabel" :aria-label="copyLoginNameLabel" diff --git a/apps/settings/src/components/BasicSettings/BackgroundJob.vue b/apps/settings/src/components/BasicSettings/BackgroundJob.vue index 04ef607e03b..c19eac47889 100644 --- a/apps/settings/src/components/BasicSettings/BackgroundJob.vue +++ b/apps/settings/src/components/BasicSettings/BackgroundJob.vue @@ -54,7 +54,7 @@ @update:checked="onBackgroundJobModeChanged"> {{ t('settings', 'AJAX') }} </NcCheckboxRadioSwitch> - <em>{{ t('settings', 'Execute one task with each page loaded. Use case: Single user instance.') }}</em> + <em>{{ t('settings', 'Execute one task with each page loaded. Use case: Single account instance.') }}</em> <NcCheckboxRadioSwitch type="radio" :checked.sync="backgroundJobsMode" @@ -63,7 +63,7 @@ @update:checked="onBackgroundJobModeChanged"> {{ t('settings', 'Webcron') }} </NcCheckboxRadioSwitch> - <em>{{ t('settings', 'cron.php is registered at a webcron service to call cron.php every 5 minutes over HTTP. Use case: Very small instance (1–5 users depending on the usage).') }}</em> + <em>{{ t('settings', 'cron.php is registered at a webcron service to call cron.php every 5 minutes over HTTP. Use case: Very small instance (1–5 accounts depending on the usage).') }}</em> <NcCheckboxRadioSwitch type="radio" :disabled="!cliBasedCronPossible" @@ -121,7 +121,7 @@ export default { cronLabel() { let desc = t('settings', 'Use system cron service to call the cron.php file every 5 minutes.') if (this.cliBasedCronPossible) { - desc += '<br>' + t('settings', 'The cron.php needs to be executed by the system user "{user}".', { user: this.cliBasedCronUser }) + desc += '<br>' + t('settings', 'The cron.php needs to be executed by the system account "{user}".', { user: this.cliBasedCronUser }) } else { desc += '<br>' + t('settings', 'The PHP POSIX extension is required. See {linkstart}PHP documentation{linkend} for more details.', { linkstart: '<a target="_blank" rel="noreferrer nofollow" class="external" href="https://www.php.net/manual/en/book.posix.php">', diff --git a/apps/settings/src/components/BasicSettings/ProfileSettings.vue b/apps/settings/src/components/BasicSettings/ProfileSettings.vue index 8b63940e257..40cb83d98fe 100644 --- a/apps/settings/src/components/BasicSettings/ProfileSettings.vue +++ b/apps/settings/src/components/BasicSettings/ProfileSettings.vue @@ -28,7 +28,7 @@ </h2> <p class="settings-hint"> - {{ t('settings', 'Enable or disable profile by default for new users.') }} + {{ t('settings', 'Enable or disable profile by default for new accounts.') }} </p> <NcCheckboxRadioSwitch type="switch" diff --git a/apps/settings/src/components/GroupListItem.vue b/apps/settings/src/components/GroupListItem.vue index cba0b7b3748..ca50b38b200 100644 --- a/apps/settings/src/components/GroupListItem.vue +++ b/apps/settings/src/components/GroupListItem.vue @@ -30,7 +30,7 @@ </h2> <NcNoteCard type="warning" show-alert> - {{ t('settings', 'You are about to remove the group "{group}". The users will NOT be deleted.', { group: name }) }} + {{ t('settings', 'You are about to remove the group "{group}". The accounts will NOT be deleted.', { group: name }) }} </NcNoteCard> <div class="modal__button-row"> <NcButton type="secondary" diff --git a/apps/settings/src/components/UserList.vue b/apps/settings/src/components/UserList.vue index 92c823e8bc5..73c4c3bdfec 100644 --- a/apps/settings/src/components/UserList.vue +++ b/apps/settings/src/components/UserList.vue @@ -31,10 +31,10 @@ <NcEmptyContent v-if="filteredUsers.length === 0" class="empty" - :name="isInitialLoad && loading.users ? null : t('settings', 'No users')"> + :name="isInitialLoad && loading.users ? null : t('settings', 'No accounts')"> <template #icon> <NcLoadingIcon v-if="isInitialLoad && loading.users" - :name="t('settings', 'Loading users …')" + :name="t('settings', 'Loading accounts …')" :size="64" /> <NcIconSvgWrapper v-else :svg="usersSvg" /> @@ -61,7 +61,7 @@ @scroll-end="handleScrollEnd"> <template #before> <caption class="hidden-visually"> - {{ t('settings', 'List of users. This list is not fully rendered for performance reasons. The users will be rendered as you navigate through the list.') }} + {{ t('settings', 'List of accounts. This list is not fully rendered for performance reasons. The accounts will be rendered as you navigate through the list.') }} </caption> </template> @@ -320,8 +320,8 @@ export default { } logger.debug(`${this.users.length} total user(s) loaded`) } catch (error) { - logger.error('Failed to load users', { error }) - showError('Failed to load users') + logger.error('Failed to load accounts', { error }) + showError('Failed to load accounts') } this.loading.users = false this.isInitialLoad = false @@ -368,7 +368,7 @@ export default { setNewUserDefaultGroup(value) { if (value && value.length > 0) { - // setting new user default group to the current selected one + // setting new account default group to the current selected one const currentGroup = this.groups.find(group => group.id === value) if (currentGroup) { this.newUser.groups = [currentGroup] diff --git a/apps/settings/src/components/Users/UserRow.vue b/apps/settings/src/components/Users/UserRow.vue index a27b41e11a6..179ec8956e4 100644 --- a/apps/settings/src/components/Users/UserRow.vue +++ b/apps/settings/src/components/Users/UserRow.vue @@ -28,7 +28,7 @@ :data-cy-user-row="user.id"> <td class="row__cell row__cell--avatar" data-cy-user-list-cell-avatar> <NcLoadingIcon v-if="isLoadingUser" - :name="t('settings', 'Loading user …')" + :name="t('settings', 'Loading account …')" :size="32" /> <NcAvatar v-else-if="visible" disable-menu @@ -87,7 +87,7 @@ @trailing-button-click="updatePassword" /> </template> <span v-else-if="isObfuscated"> - {{ t('settings', 'You do not have permissions to see the details of this user') }} + {{ t('settings', 'You do not have permissions to see the details of this account') }} </span> </td> @@ -130,7 +130,7 @@ :multiple="true" :append-to-body="false" :options="availableGroups" - :placeholder="t('settings', 'Add user to group')" + :placeholder="t('settings', 'Add account to group')" :taggable="settings.isAdmin" :value="userGroups" label="name" @@ -152,7 +152,7 @@ <template v-if="editing && settings.isAdmin && subAdminsGroups.length > 0"> <label class="hidden-visually" :for="'subadmins' + uniqueId"> - {{ t('settings', 'Set user as admin for') }} + {{ t('settings', 'Set account as admin for') }} </label> <NcSelect data-cy-user-list-input-subadmins :data-loading="loading.subadmins || undefined" @@ -165,7 +165,7 @@ :multiple="true" :no-wrap="true" :options="subAdminsGroups" - :placeholder="t('settings', 'Set user as admin for')" + :placeholder="t('settings', 'Set account as admin for')" :value="userSubAdminsGroups" @option:deselected="removeUserSubAdmin" @option:selected="options => addUserSubAdmin(options.at(-1))" /> @@ -180,7 +180,7 @@ <template v-if="editing"> <label class="hidden-visually" :for="'quota' + uniqueId"> - {{ t('settings', 'Select user quota') }} + {{ t('settings', 'Select account quota') }} </label> <NcSelect v-model="editedUserQuota" :close-on-select="true" @@ -193,7 +193,7 @@ :clearable="false" :input-id="'quota' + uniqueId" :options="quotaOptions" - :placeholder="t('settings', 'Select user quota')" + :placeholder="t('settings', 'Select account quota')" :taggable="true" @option:selected="setUserQuota" /> </template> @@ -398,8 +398,8 @@ export default { computed: { managerLabel() { - // TRANSLATORS This string describes a manager in the context of an organization - return t('settings', 'Set user manager') + // TRANSLATORS This string describes a person's manager in the context of an organization + return t('settings', 'Set line manager') }, isObfuscated() { @@ -469,7 +469,7 @@ export default { const actions = [ { icon: 'icon-delete', - text: t('settings', 'Delete user'), + text: t('settings', 'Delete account'), action: this.deleteUser, }, { @@ -479,7 +479,7 @@ export default { }, { icon: this.user.enabled ? 'icon-close' : 'icon-add', - text: this.user.enabled ? t('settings', 'Disable user') : t('settings', 'Enable user'), + text: this.user.enabled ? t('settings', 'Disable account') : t('settings', 'Enable account'), action: this.enableDisableUser, }, ] @@ -586,8 +586,8 @@ export default { value: this.currentManager ? this.currentManager.id : '', }) } catch (error) { - // TRANSLATORS This string describes a manager in the context of an organization - showError(t('setting', 'Failed to update user manager')) + // TRANSLATORS This string describes a line manager in the context of an organization + showError(t('setting', 'Failed to update line manager')) console.error(error) } finally { this.loading.manager = false diff --git a/apps/settings/src/components/Users/UserRowActions.vue b/apps/settings/src/components/Users/UserRowActions.vue index b135f80cf7b..a01bb868c7a 100644 --- a/apps/settings/src/components/Users/UserRowActions.vue +++ b/apps/settings/src/components/Users/UserRowActions.vue @@ -22,7 +22,7 @@ --> <template> - <NcActions :aria-label="t('settings', 'Toggle user actions menu')" + <NcActions :aria-label="t('settings', 'Toggle account actions menu')" :disabled="disabled" :inline="1"> <NcActionButton :data-cy-user-list-action-toggle-edit="`${edit}`" diff --git a/apps/settings/src/constants/AccountPropertyConstants.js b/apps/settings/src/constants/AccountPropertyConstants.js index 04367fde811..eb35482fb32 100644 --- a/apps/settings/src/constants/AccountPropertyConstants.js +++ b/apps/settings/src/constants/AccountPropertyConstants.js @@ -180,14 +180,14 @@ export const SCOPE_PROPERTY_ENUM = Object.freeze({ name: SCOPE_ENUM.FEDERATED, displayName: t('settings', 'Federated'), tooltip: t('settings', 'Only synchronize to trusted servers'), - tooltipDisabled: t('settings', 'Not available as federation has been disabled for your account, contact your system administrator if you have any questions'), + tooltipDisabled: t('settings', 'Not available as federation has been disabled for your account, contact your system administration if you have any questions'), iconClass: 'icon-contacts-dark', }, [SCOPE_ENUM.PUBLISHED]: { name: SCOPE_ENUM.PUBLISHED, displayName: t('settings', 'Published'), tooltip: t('settings', 'Synchronize to trusted servers and the global and public address book'), - tooltipDisabled: t('settings', 'Not available as publishing user specific data to the lookup server is not allowed, contact your system administrator if you have any questions'), + tooltipDisabled: t('settings', 'Not available as publishing account specific data to the lookup server is not allowed, contact your system administration if you have any questions'), iconClass: 'icon-link', }, }) diff --git a/apps/settings/src/constants/ProfileConstants.js b/apps/settings/src/constants/ProfileConstants.js index f9fd3d26fb7..f2b831bc496 100644 --- a/apps/settings/src/constants/ProfileConstants.js +++ b/apps/settings/src/constants/ProfileConstants.js @@ -41,7 +41,7 @@ export const VISIBILITY_PROPERTY_ENUM = Object.freeze({ }, [VISIBILITY_ENUM.SHOW_USERS_ONLY]: { name: VISIBILITY_ENUM.SHOW_USERS_ONLY, - label: t('settings', 'Show to logged in users only'), + label: t('settings', 'Show to logged in accounts only'), }, [VISIBILITY_ENUM.HIDE]: { name: VISIBILITY_ENUM.HIDE, diff --git a/apps/settings/src/views/Users.vue b/apps/settings/src/views/Users.vue index dc17b9f9362..1975dc9acf0 100644 --- a/apps/settings/src/views/Users.vue +++ b/apps/settings/src/views/Users.vue @@ -23,9 +23,9 @@ <template> <Fragment> <NcContent app-name="settings"> - <NcAppNavigation :aria-label="t('settings', 'User management')"> + <NcAppNavigation :aria-label="t('settings', 'Account management')"> <NcAppNavigationNew button-id="new-user-button" - :text="t('settings','New user')" + :text="t('settings','New account')" @click="showNewUserMenu" @keyup.enter="showNewUserMenu" @keyup.space="showNewUserMenu"> @@ -37,7 +37,7 @@ <template #list> <NcAppNavigationItem id="everyone" :exact="true" - :name="t('settings', 'Active users')" + :name="t('settings', 'Active accounts')" :to="{ name: 'users' }"> <template #icon> <AccountGroup :size="20" /> @@ -117,7 +117,7 @@ <template #footer> <ul class="app-navigation-entry__settings"> - <NcAppNavigationItem :name="t('settings', 'User management settings')" + <NcAppNavigationItem :name="t('settings', 'Account management settings')" @click="isDialogOpen = true"> <template #icon> <Cog :size="20" /> @@ -214,13 +214,13 @@ export default { computed: { pageHeading() { if (this.selectedGroupDecoded === null) { - return t('settings', 'Active users') + return t('settings', 'Active accounts') } const matchHeading = { admin: t('settings', 'Admins'), - disabled: t('settings', 'Disabled users'), + disabled: t('settings', 'Disabled accounts'), } - return matchHeading[this.selectedGroupDecoded] ?? t('settings', 'User group: {group}', { group: this.selectedGroupDecoded }) + return matchHeading[this.selectedGroupDecoded] ?? t('settings', 'Account group: {group}', { group: this.selectedGroupDecoded }) }, showConfig() { diff --git a/apps/settings/templates/help.php b/apps/settings/templates/help.php index 649178c15d1..1b912d3d904 100644 --- a/apps/settings/templates/help.php +++ b/apps/settings/templates/help.php @@ -12,7 +12,7 @@ } ?> href="<?php print_unescaped($_['urlUserDocs']); ?>"> <span class="help-list__text"> - <?php p($l->t('User documentation')); ?> + <?php p($l->t('Account documentation')); ?> </span> </a> </li> @@ -25,7 +25,7 @@ } ?> href="<?php print_unescaped($_['urlAdminDocs']); ?>"> <span class="help-list__text"> - <?php p($l->t('Administrator documentation')); ?> + <?php p($l->t('Administration documentation')); ?> </span> </a> </li> diff --git a/apps/settings/templates/settings/admin/additional-mail.php b/apps/settings/templates/settings/admin/additional-mail.php index 3e8b373c738..644812237f7 100644 --- a/apps/settings/templates/settings/admin/additional-mail.php +++ b/apps/settings/templates/settings/admin/additional-mail.php @@ -148,7 +148,7 @@ $mail_sendmailmode = [ print_unescaped(' class="hidden"'); } ?>> <label for="mail_smtpname"><?php p($l->t('Credentials')); ?></label> - <input type="text" name="mail_smtpname" id="mail_smtpname" placeholder="<?php p($l->t('SMTP Username'))?>" + <input type="text" name="mail_smtpname" id="mail_smtpname" placeholder="<?php p($l->t('SMTP account name'))?>" value="<?php p($_['mail_smtpname']) ?>" /> <input type="text" name="mail_smtppassword" id="mail_smtppassword" autocomplete="off" placeholder="<?php p($l->t('SMTP Password'))?>" value="<?php p($_['mail_smtppassword']) ?>" /> diff --git a/apps/settings/tests/Controller/MailSettingsControllerTest.php b/apps/settings/tests/Controller/MailSettingsControllerTest.php index bfa89fbc0b4..3918d4b5fa9 100644 --- a/apps/settings/tests/Controller/MailSettingsControllerTest.php +++ b/apps/settings/tests/Controller/MailSettingsControllerTest.php @@ -171,7 +171,7 @@ class MailSettingsControllerTest extends \Test\TestCase { // Ensure that it fails when no mail address has been specified $response = $this->mailController->sendTestMail(); $this->assertSame(Http::STATUS_BAD_REQUEST, $response->getStatus()); - $this->assertSame('You need to set your user email before being able to send test emails. Go to for that.', $response->getData()); + $this->assertSame('You need to set your account email before being able to send test emails. Go to for that.', $response->getData()); // If no exception is thrown it should work $this->config diff --git a/apps/settings/tests/Mailer/NewUserMailHelperTest.php b/apps/settings/tests/Mailer/NewUserMailHelperTest.php index 5c7d182d436..d98d558a8d3 100644 --- a/apps/settings/tests/Mailer/NewUserMailHelperTest.php +++ b/apps/settings/tests/Mailer/NewUserMailHelperTest.php @@ -262,7 +262,7 @@ class NewUserMailHelperTest extends TestCase { <table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"> <tr style="padding:0;text-align:left;vertical-align:top"> <th style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"> - <p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your username is: john</p> + <p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your account name is: john</p> </th> <th class="expander" style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th> </tr> @@ -363,7 +363,7 @@ Welcome aboard Welcome to your TestCloud account, you can add, protect, and share your data. -Your username is: john +Your account name is: john Set your password: https://example.com/resetPassword/MySuperLongSecureRandomToken @@ -498,7 +498,7 @@ EOF; <table style="border-collapse:collapse;border-spacing:0;padding:0;text-align:left;vertical-align:top;width:100%"> <tr style="padding:0;text-align:left;vertical-align:top"> <th style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0;text-align:left"> - <p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your username is: john</p> + <p style="Margin:0;Margin-bottom:10px;color:#777;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;margin-bottom:10px;padding:0;text-align:center">Your account name is: john</p> </th> <th class="expander" style="Margin:0;color:#0a0a0a;font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,Oxygen-Sans,Ubuntu,Cantarell,'Helvetica Neue',Arial,sans-serif;font-size:16px;font-weight:400;line-height:1.3;margin:0;padding:0!important;text-align:left;visibility:hidden;width:0"></th> </tr> @@ -599,7 +599,7 @@ Welcome aboard John Doe Welcome to your TestCloud account, you can add, protect, and share your data. -Your username is: john +Your account name is: john Go to TestCloud: https://example.com/ diff --git a/apps/sharebymail/lib/ShareByMailProvider.php b/apps/sharebymail/lib/ShareByMailProvider.php index 60b7f20b88d..d255b5e9b1a 100644 --- a/apps/sharebymail/lib/ShareByMailProvider.php +++ b/apps/sharebymail/lib/ShareByMailProvider.php @@ -116,8 +116,8 @@ class ShareByMailProvider implements IShareProvider { */ $alreadyShared = $this->getSharedWith($shareWith, IShare::TYPE_EMAIL, $share->getNode(), 1, 0); if (!empty($alreadyShared)) { - $message = 'Sharing %1$s failed, because this item is already shared with user %2$s'; - $message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with user %2$s', [$share->getNode()->getName(), $shareWith]); + $message = 'Sharing %1$s failed, because this item is already shared with account %2$s'; + $message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with account %2$s', [$share->getNode()->getName(), $shareWith]); $this->logger->debug(sprintf($message, $share->getNode()->getName(), $shareWith), ['app' => 'Federated File Sharing']); throw new \Exception($message_t); } diff --git a/apps/sharebymail/src/components/AdminSettings.vue b/apps/sharebymail/src/components/AdminSettings.vue index d674d024b2c..a39ecfee99c 100644 --- a/apps/sharebymail/src/components/AdminSettings.vue +++ b/apps/sharebymail/src/components/AdminSettings.vue @@ -22,7 +22,7 @@ <template> <NcSettingsSection :name="t('sharebymail', 'Share by mail')" - :description="t('sharebymail', 'Allows users to share a personalized link to a file or folder by putting in an email address.')"> + :description="t('sharebymail', 'Allows people to share a personalized link to a file or folder by putting in an email address.')"> <NcCheckboxRadioSwitch type="switch" :checked.sync="sendPasswordMail" @update:checked="update('sendpasswordmail', sendPasswordMail)"> diff --git a/apps/systemtags/appinfo/info.xml b/apps/systemtags/appinfo/info.xml index 84f38bb17d3..e6f90ec44f7 100644 --- a/apps/systemtags/appinfo/info.xml +++ b/apps/systemtags/appinfo/info.xml @@ -3,8 +3,8 @@ xsi:noNamespaceSchemaLocation="https://apps.nextcloud.com/schema/apps/info.xsd"> <id>systemtags</id> <name>Collaborative tags</name> - <summary>Collaborative tagging functionality which shares tags among users.</summary> - <description>Collaborative tagging functionality which shares tags among users. Great for teams. + <summary>Collaborative tagging functionality which shares tags among people.</summary> + <description>Collaborative tagging functionality which shares tags among people. Great for teams. (If you are a provider with a multi-tenancy installation, it is advised to deactivate this app as tags are shared.)</description> <version>1.19.0</version> <licence>agpl</licence> diff --git a/apps/updatenotification/src/components/UpdateNotification.vue b/apps/updatenotification/src/components/UpdateNotification.vue index 36e9b822b19..ad9aa175feb 100644 --- a/apps/updatenotification/src/components/UpdateNotification.vue +++ b/apps/updatenotification/src/components/UpdateNotification.vue @@ -42,7 +42,7 @@ <template v-if="!isWebUpdaterRecommended && updaterEnabled && webUpdaterEnabled"> <h3 class="warning"> - {{ t('updatenotification', 'Please note that the web updater is not recommended with more than 100 users! Please use the command line updater instead!') }} + {{ t('updatenotification', 'Please note that the web updater is not recommended with more than 100 accounts! Please use the command line updater instead!') }} </h3> </template> @@ -233,7 +233,7 @@ export default { }, noteDelayedStableString() { - return t('updatenotification', 'Note that after a new release the update only shows up after the first minor release or later. We roll out new versions spread out over time to our users and sometimes skip a version when issues are found. Learn more about updates and release channels at {link}') + return t('updatenotification', 'Note that after a new release the update only shows up after the first minor release or later. We roll out new versions spread out over time and sometimes skip a version when issues are found. Learn more about updates and release channels at {link}') .replace('{link}', '<a href="https://nextcloud.com/release-channels/">https://nextcloud.com/release-channels/</a>') }, diff --git a/apps/user_ldap/lib/SetupChecks/LdapInvalidUuids.php b/apps/user_ldap/lib/SetupChecks/LdapInvalidUuids.php index 8b6bf859142..2cf3b700b01 100644 --- a/apps/user_ldap/lib/SetupChecks/LdapInvalidUuids.php +++ b/apps/user_ldap/lib/SetupChecks/LdapInvalidUuids.php @@ -54,7 +54,7 @@ class LdapInvalidUuids implements ISetupCheck { && count($this->groupMapping->getList(0, 1, true)) === 0) { return SetupResult::success($this->l10n->t('None found')); } else { - return SetupResult::warning($this->l10n->t('Invalid UUIDs of LDAP users or groups have been found. Please review your "Override UUID detection" settings in the Expert part of the LDAP configuration and use "occ ldap:update-uuid" to update them.')); + return SetupResult::warning($this->l10n->t('Invalid UUIDs of LDAP accounts or groups have been found. Please review your "Override UUID detection" settings in the Expert part of the LDAP configuration and use "occ ldap:update-uuid" to update them.')); } } } diff --git a/apps/weather_status/appinfo/info.xml b/apps/weather_status/appinfo/info.xml index cdc28262442..0fe007dec02 100644 --- a/apps/weather_status/appinfo/info.xml +++ b/apps/weather_status/appinfo/info.xml @@ -5,7 +5,7 @@ <name>Weather status</name> <summary>Weather status in your dashboard</summary> <description><![CDATA[Weather status integrated in the Dashboard app. - User's position can be automatically determined or manually defined. A 6 hours forecast is then displayed. + The geographic location can be automatically determined or manually defined. A 6 hours forecast is then displayed. This status can also be integrated in other places like the Calendar app.]]></description> <version>1.9.0</version> <licence>agpl</licence> diff --git a/apps/workflowengine/src/components/Checks/request.js b/apps/workflowengine/src/components/Checks/request.js index 9f33bac6676..e04ed1b9c93 100644 --- a/apps/workflowengine/src/components/Checks/request.js +++ b/apps/workflowengine/src/components/Checks/request.js @@ -59,7 +59,7 @@ const RequestChecks = [ }, { class: 'OCA\\WorkflowEngine\\Check\\UserGroupMembership', - name: t('workflowengine', 'User group membership'), + name: t('workflowengine', 'Group membership'), operators: [ { operator: 'is', name: t('workflowengine', 'is member of') }, { operator: '!is', name: t('workflowengine', 'is not member of') }, diff --git a/core/Command/Maintenance/Install.php b/core/Command/Maintenance/Install.php index 84ac34528f1..cc56c28eef0 100644 --- a/core/Command/Maintenance/Install.php +++ b/core/Command/Maintenance/Install.php @@ -64,10 +64,10 @@ class Install extends Command { ->addOption('database-name', null, InputOption::VALUE_REQUIRED, 'Name of the database') ->addOption('database-host', null, InputOption::VALUE_REQUIRED, 'Hostname of the database', 'localhost') ->addOption('database-port', null, InputOption::VALUE_REQUIRED, 'Port the database is listening on') - ->addOption('database-user', null, InputOption::VALUE_REQUIRED, 'User name to connect to the database') + ->addOption('database-user', null, InputOption::VALUE_REQUIRED, 'Account name to connect to the database') ->addOption('database-pass', null, InputOption::VALUE_OPTIONAL, 'Password of the database user', null) ->addOption('database-table-space', null, InputOption::VALUE_OPTIONAL, 'Table space of the database (oci only)', null) - ->addOption('admin-user', null, InputOption::VALUE_REQUIRED, 'User name of the admin account', 'admin') + ->addOption('admin-user', null, InputOption::VALUE_REQUIRED, 'Account name of the admin account', 'admin') ->addOption('admin-pass', null, InputOption::VALUE_REQUIRED, 'Password of the admin account') ->addOption('admin-email', null, InputOption::VALUE_OPTIONAL, 'E-Mail of the admin account') ->addOption('data-dir', null, InputOption::VALUE_REQUIRED, 'Path to data directory', \OC::$SERVERROOT."/data"); @@ -150,7 +150,7 @@ class Install extends Command { if ($db !== 'sqlite') { if (is_null($dbUser)) { - throw new InvalidArgumentException("Database user not provided."); + throw new InvalidArgumentException("Database account not provided."); } if (is_null($dbName)) { throw new InvalidArgumentException("Database name not provided."); diff --git a/core/Command/User/Add.php b/core/Command/User/Add.php index 5e8ab92070d..83bc08a54ab 100644 --- a/core/Command/User/Add.php +++ b/core/Command/User/Add.php @@ -49,11 +49,11 @@ class Add extends Command { protected function configure() { $this ->setName('user:add') - ->setDescription('adds a user') + ->setDescription('adds an account') ->addArgument( 'uid', InputArgument::REQUIRED, - 'User ID used to login (must only contain a-z, A-Z, 0-9, -, _ and @)' + 'Account ID used to login (must only contain a-z, A-Z, 0-9, -, _ and @)' ) ->addOption( 'password-from-env', @@ -65,20 +65,20 @@ class Add extends Command { 'display-name', null, InputOption::VALUE_OPTIONAL, - 'User name used in the web UI (can contain any characters)' + 'Account name used in the web UI (can contain any characters)' ) ->addOption( 'group', 'g', InputOption::VALUE_OPTIONAL | InputOption::VALUE_IS_ARRAY, - 'groups the user should be added to (The group will be created if it does not exist)' + 'groups the account should be added to (The group will be created if it does not exist)' ); } protected function execute(InputInterface $input, OutputInterface $output): int { $uid = $input->getArgument('uid'); if ($this->userManager->userExists($uid)) { - $output->writeln('<error>The user "' . $uid . '" already exists.</error>'); + $output->writeln('<error>The account "' . $uid . '" already exists.</error>'); return 1; } @@ -121,9 +121,9 @@ class Add extends Command { if ($user instanceof IUser) { - $output->writeln('<info>The user "' . $user->getUID() . '" was created successfully</info>'); + $output->writeln('<info>The account "' . $user->getUID() . '" was created successfully</info>'); } else { - $output->writeln('<error>An error occurred while creating the user</error>'); + $output->writeln('<error>An error occurred while creating the account</error>'); return 1; } @@ -151,7 +151,7 @@ class Add extends Command { } if ($group instanceof IGroup) { $group->addUser($user); - $output->writeln('User "' . $user->getUID() . '" added to group "' . $group->getGID() . '"'); + $output->writeln('Account "' . $user->getUID() . '" added to group "' . $group->getGID() . '"'); } } return 0; diff --git a/core/Command/User/AuthTokens/Add.php b/core/Command/User/AuthTokens/Add.php index e067c069c79..ac18b45f176 100644 --- a/core/Command/User/AuthTokens/Add.php +++ b/core/Command/User/AuthTokens/Add.php @@ -54,11 +54,11 @@ class Add extends Command { $this ->setName('user:auth-tokens:add') ->setAliases(['user:add-app-password']) - ->setDescription('Add app password for the named user') + ->setDescription('Add app password for the named account') ->addArgument( 'user', InputArgument::REQUIRED, - 'Username to add app password for' + 'Account name to add app password for' ) ->addOption( 'password-from-env', @@ -75,7 +75,7 @@ class Add extends Command { $user = $this->userManager->get($username); if (is_null($user)) { - $output->writeln('<error>User does not exist</error>'); + $output->writeln('<error>Account does not exist</error>'); return 1; } @@ -89,7 +89,7 @@ class Add extends Command { /** @var QuestionHelper $helper */ $helper = $this->getHelper('question'); - $question = new Question('Enter the user password: '); + $question = new Question('Enter the account password: '); $question->setHidden(true); /** @var null|string $password */ $password = $helper->ask($input, $output, $question); diff --git a/core/Command/User/LastSeen.php b/core/Command/User/LastSeen.php index 90ddb6992d9..5c6d44a2245 100644 --- a/core/Command/User/LastSeen.php +++ b/core/Command/User/LastSeen.php @@ -60,7 +60,7 @@ class LastSeen extends Base { $lastLogin = $user->getLastLogin(); if ($lastLogin === 0) { - $output->writeln('User ' . $user->getUID() . + $output->writeln('Account ' . $user->getUID() . ' has never logged in, yet.'); } else { $date = new \DateTime(); diff --git a/core/Command/User/Report.php b/core/Command/User/Report.php index 74ab5c29cc1..b54ec2b0308 100644 --- a/core/Command/User/Report.php +++ b/core/Command/User/Report.php @@ -63,7 +63,7 @@ class Report extends Command { protected function execute(InputInterface $input, OutputInterface $output): int { $table = new Table($output); - $table->setHeaders(['User Report', '']); + $table->setHeaders(['Account Report', '']); $userCountArray = $this->countUsers(); $total = 0; if (!empty($userCountArray)) { diff --git a/core/Command/User/ResetPassword.php b/core/Command/User/ResetPassword.php index 6719f893be3..926b913a021 100644 --- a/core/Command/User/ResetPassword.php +++ b/core/Command/User/ResetPassword.php @@ -55,7 +55,7 @@ class ResetPassword extends Base { ->addArgument( 'user', InputArgument::REQUIRED, - 'Username to reset password' + 'Account name to reset password' ) ->addOption( 'password-from-env', diff --git a/core/Command/User/Setting.php b/core/Command/User/Setting.php index 8a8736fdaa2..9134d174418 100644 --- a/core/Command/User/Setting.php +++ b/core/Command/User/Setting.php @@ -51,7 +51,7 @@ class Setting extends Base { ->addArgument( 'uid', InputArgument::REQUIRED, - 'User ID used to login' + 'Account ID used to login' ) ->addArgument( 'app', diff --git a/core/Controller/LostController.php b/core/Controller/LostController.php index d6b13a4cb96..2a0d374b552 100644 --- a/core/Controller/LostController.php +++ b/core/Controller/LostController.php @@ -318,7 +318,7 @@ class LostController extends Controller { $user = $this->userManager->get($input); if ($user instanceof IUser) { if (!$user->isEnabled()) { - throw new ResetPasswordException('User ' . $user->getUID() . ' is disabled'); + throw new ResetPasswordException('Account ' . $user->getUID() . ' is disabled'); } return $user; diff --git a/core/Controller/OCSController.php b/core/Controller/OCSController.php index ace9875130c..b0ab867f8d8 100644 --- a/core/Controller/OCSController.php +++ b/core/Controller/OCSController.php @@ -134,6 +134,6 @@ class OCSController extends \OCP\AppFramework\OCSController { return new DataResponse($data); } - return new DataResponse(['User not found'], 404); + return new DataResponse(['Account not found'], 404); } } diff --git a/core/Controller/ProfileApiController.php b/core/Controller/ProfileApiController.php index 193102c20a7..1ffba071f2b 100644 --- a/core/Controller/ProfileApiController.php +++ b/core/Controller/ProfileApiController.php @@ -73,11 +73,11 @@ class ProfileApiController extends OCSController { $targetUser = $this->userManager->get($targetUserId); if (!$this->userManager->userExists($targetUserId)) { - throw new OCSNotFoundException('User does not exist'); + throw new OCSNotFoundException('Account does not exist'); } if ($requestingUser !== $targetUser) { - throw new OCSForbiddenException('Users can only edit their own visibility settings'); + throw new OCSForbiddenException('People can only edit their own visibility settings'); } // Ensure that a profile config is created in the database @@ -85,7 +85,7 @@ class ProfileApiController extends OCSController { $config = $this->configMapper->get($targetUserId); if (!in_array($paramId, array_keys($config->getVisibilityMap()), true)) { - throw new OCSBadRequestException('User does not have a profile parameter with ID: ' . $paramId); + throw new OCSBadRequestException('Account does not have a profile parameter with ID: ' . $paramId); } $config->setVisibility($paramId, $visibility); diff --git a/core/Notification/CoreNotifier.php b/core/Notification/CoreNotifier.php index de6182aad4c..0d10bf26954 100644 --- a/core/Notification/CoreNotifier.php +++ b/core/Notification/CoreNotifier.php @@ -77,8 +77,8 @@ class CoreNotifier implements INotifier { } if ($notification->getSubject() === 'user_limit_reached') { - $notification->setParsedSubject($l->t('The user limit of this instance is reached.')); - $notification->setParsedMessage($l->t('Enter your subscription key in the support app in order to increase the user limit. This does also grant you all additional benefits that Nextcloud Enterprise offers and is highly recommended for the operation in companies.')); + $notification->setParsedSubject($l->t('The account limit of this instance is reached.')); + $notification->setParsedMessage($l->t('Enter your subscription key in the support app in order to increase the account limit. This does also grant you all additional benefits that Nextcloud Enterprise offers and is highly recommended for the operation in companies.')); $notification->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'places/contacts.svg'))); $action = $notification->createAction(); $label = $l->t('Learn more ↗'); diff --git a/core/doc/user/index.html b/core/doc/user/index.html index 409495a42c9..d994b919c13 100644 --- a/core/doc/user/index.html +++ b/core/doc/user/index.html @@ -1,2 +1,2 @@ -Here goes the user documentation +Here goes the usage documentation In the meantime go to <a href="https://nextcloud.com/support/" target="_blank">nextcloud.com/support/</a> diff --git a/core/src/components/login/LoginForm.vue b/core/src/components/login/LoginForm.vue index 9a8689dc9cc..b00a9dde69f 100644 --- a/core/src/components/login/LoginForm.vue +++ b/core/src/components/login/LoginForm.vue @@ -176,10 +176,10 @@ export default { }, errorLabel() { if (this.invalidPassword) { - return t('core', 'Wrong username or password.') + return t('core', 'Wrong account name or password.') } if (this.userDisabled) { - return t('core', 'User disabled') + return t('core', 'This account is disabled') } if (this.throttleDelay > 5000) { return t('core', 'We have detected multiple invalid login attempts from your IP. Therefore your next login is throttled up to 30 seconds.') diff --git a/core/src/components/login/PasswordLessLoginForm.vue b/core/src/components/login/PasswordLessLoginForm.vue index dbc4fdae695..5c62760a169 100644 --- a/core/src/components/login/PasswordLessLoginForm.vue +++ b/core/src/components/login/PasswordLessLoginForm.vue @@ -10,8 +10,8 @@ :value="user" :autocomplete="autoCompleteAllowed ? 'on' : 'off'" :error="!validCredentials" - :label="t('core', 'Username or email')" - :placeholder="t('core', 'Username or email')" + :label="t('core', 'Account name or email')" + :placeholder="t('core', 'Account name or email')" :helper-text="!validCredentials ? t('core', 'Your account is not setup for passwordless login.') : ''" @update:value="changeUsername" /> diff --git a/core/strings.php b/core/strings.php index 50051936eb0..973a255c879 100644 --- a/core/strings.php +++ b/core/strings.php @@ -27,7 +27,7 @@ declare(strict_types=1); //some strings that are used in /lib but won't be translatable unless they are in /core too $l = \OCP\Util::getL10N('core'); $l->t("Personal"); -$l->t("Users"); +$l->t("Accounts"); $l->t("Apps"); $l->t("Admin"); $l->t("Help"); diff --git a/core/templates/installation.php b/core/templates/installation.php index b5487d7b985..0352e316941 100644 --- a/core/templates/installation.php +++ b/core/templates/installation.php @@ -35,7 +35,7 @@ script('core', 'install'); <fieldset id="adminaccount"> <legend><?php print_unescaped($l->t('Create an <strong>admin account</strong>')); ?></legend> <p> - <label for="adminlogin"><?php p($l->t('Username')); ?></label> + <label for="adminlogin"><?php p($l->t('Account name')); ?></label> <input type="text" name="adminlogin" id="adminlogin" value="<?php p($_['adminlogin']); ?>" autocomplete="off" autocapitalize="none" spellcheck="false" autofocus required> @@ -100,7 +100,7 @@ script('core', 'install'); <fieldset id='databaseField'> <div id="use_other_db"> <p class="grouptop"> - <label for="dbuser"><?php p($l->t('Database user')); ?></label> + <label for="dbuser"><?php p($l->t('Database account')); ?></label> <input type="text" name="dbuser" id="dbuser" value="<?php p($_['dbuser']); ?>" autocomplete="off" autocapitalize="none" spellcheck="false"> diff --git a/core/templates/loginflow/authpicker.php b/core/templates/loginflow/authpicker.php index 3a3d7d0b035..e87dc97d99b 100644 --- a/core/templates/loginflow/authpicker.php +++ b/core/templates/loginflow/authpicker.php @@ -53,8 +53,8 @@ $urlGenerator = $_['urlGenerator']; <form action="<?php p($urlGenerator->linkToRouteAbsolute('core.ClientFlowLogin.apptokenRedirect')); ?>" method="post" id="app-token-login-field" class="hidden"> <p class="grouptop"> - <input type="text" name="user" id="user" placeholder="<?php p($l->t('Username')) ?>"> - <label for="user" class="infield"><?php p($l->t('Username')) ?></label> + <input type="text" name="user" id="user" placeholder="<?php p($l->t('Account name')) ?>"> + <label for="user" class="infield"><?php p($l->t('Account name')) ?></label> </p> <p class="groupbottom"> <input type="password" name="password" id="password" placeholder="<?php p($l->t('App password')) ?>"> diff --git a/core/templates/loginflowv2/authpicker.php b/core/templates/loginflowv2/authpicker.php index 5cc6077b0c6..611e12d4472 100644 --- a/core/templates/loginflowv2/authpicker.php +++ b/core/templates/loginflowv2/authpicker.php @@ -53,8 +53,8 @@ $urlGenerator = $_['urlGenerator']; <form action="<?php p($urlGenerator->linkToRouteAbsolute('core.ClientFlowLoginV2.apptokenRedirect')); ?>" method="post" id="app-token-login-field" class="hidden"> <p class="grouptop"> - <input type="text" name="user" id="user" placeholder="<?php p($l->t('Username')) ?>"> - <label for="user" class="infield"><?php p($l->t('Username')) ?></label> + <input type="text" name="user" id="user" placeholder="<?php p($l->t('Account name')) ?>"> + <label for="user" class="infield"><?php p($l->t('Account name')) ?></label> </p> <p class="groupbottom"> <input type="password" name="password" id="password" placeholder="<?php p($l->t('App password')) ?>"> diff --git a/core/templates/update.use-cli.php b/core/templates/update.use-cli.php index ae82436d2f1..36e348568c3 100644 --- a/core/templates/update.use-cli.php +++ b/core/templates/update.use-cli.php @@ -3,7 +3,7 @@ <h2 class="title"><?php p($l->t('Update needed')) ?></h2> <div class="text-left"> <?php if ($_['tooBig']) { - p($l->t('Please use the command line updater because you have a big instance with more than 50 users.')); + p($l->t('Please use the command line updater because you have a big instance with more than 50 accounts.')); } else { p($l->t('Please use the command line updater because updating via browser is disabled in your config.php.')); } ?><br><br> diff --git a/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php b/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php index a97876fd9ab..386075bd968 100644 --- a/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php +++ b/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php @@ -180,20 +180,20 @@ class SecurityMiddleware extends Middleware { } } if (!$authorized) { - throw new NotAdminException($this->l10n->t('Logged in user must be an admin, a sub admin or gotten special right to access this setting')); + throw new NotAdminException($this->l10n->t('Logged in account must be an admin, a sub admin or gotten special right to access this setting')); } } if ($this->hasAnnotationOrAttribute($reflectionMethod, 'SubAdminRequired', SubAdminRequired::class) && !$this->isSubAdmin && !$this->isAdminUser && !$authorized) { - throw new NotAdminException($this->l10n->t('Logged in user must be an admin or sub admin')); + throw new NotAdminException($this->l10n->t('Logged in account must be an admin or sub admin')); } if (!$this->hasAnnotationOrAttribute($reflectionMethod, 'SubAdminRequired', SubAdminRequired::class) && !$this->hasAnnotationOrAttribute($reflectionMethod, 'NoAdminRequired', NoAdminRequired::class) && !$this->isAdminUser && !$authorized) { - throw new NotAdminException($this->l10n->t('Logged in user must be an admin')); + throw new NotAdminException($this->l10n->t('Logged in account must be an admin')); } } diff --git a/lib/private/Authentication/Listeners/UserDeletedFilesCleanupListener.php b/lib/private/Authentication/Listeners/UserDeletedFilesCleanupListener.php index c1075c0901e..a29a73ad8ad 100644 --- a/lib/private/Authentication/Listeners/UserDeletedFilesCleanupListener.php +++ b/lib/private/Authentication/Listeners/UserDeletedFilesCleanupListener.php @@ -56,7 +56,7 @@ class UserDeletedFilesCleanupListener implements IEventListener { $userHome = $this->mountProviderCollection->getHomeMountForUser($event->getUser()); $storage = $userHome->getStorage(); if (!$storage) { - throw new \Exception("User has no home storage"); + throw new \Exception("Account has no home storage"); } // remove all wrappers, so we do the delete directly on the home storage bypassing any wrapper diff --git a/lib/private/Avatar/AvatarManager.php b/lib/private/Avatar/AvatarManager.php index 1e137fa8715..e88feb37ecd 100644 --- a/lib/private/Avatar/AvatarManager.php +++ b/lib/private/Avatar/AvatarManager.php @@ -138,7 +138,7 @@ class AvatarManager implements IAvatarManager { } catch (NotPermittedException | StorageNotAvailableException $e) { $this->logger->error("Unable to delete user avatars for $userId. gnoring avatar deletion"); } catch (NoUserException $e) { - $this->logger->debug("User $userId not found. gnoring avatar deletion"); + $this->logger->debug("Account $userId not found. Ignoring avatar deletion"); } $this->config->deleteUserValue($userId, 'avatar', 'generated'); } diff --git a/lib/private/Files/Node/Root.php b/lib/private/Files/Node/Root.php index ee344f9be8b..9bfb610199b 100644 --- a/lib/private/Files/Node/Root.php +++ b/lib/private/Files/Node/Root.php @@ -383,7 +383,7 @@ class Root extends Folder implements IRootFolder { try { $folder = $this->get('/' . $userId . '/files'); if (!$folder instanceof \OCP\Files\Folder) { - throw new \Exception("User folder for $userId exists as a file"); + throw new \Exception("Account folder for \"$userId\" exists as a file"); } } catch (NotFoundException $e) { if (!$this->nodeExists('/' . $userId)) { diff --git a/lib/private/Server.php b/lib/private/Server.php index 0ff8e6fb717..8de4fa7d5ca 100644 --- a/lib/private/Server.php +++ b/lib/private/Server.php @@ -1155,7 +1155,7 @@ class Server extends ServerContainer implements IServerContainer { $userDisplayName = $manager->getDisplayName($id); if ($userDisplayName === null) { $l = $c->get(IFactory::class)->get('core'); - return $l->t('Unknown user'); + return $l->t('Unknown account'); } return $userDisplayName; }); diff --git a/lib/private/Setup.php b/lib/private/Setup.php index 650dca97067..5bfb64cb513 100644 --- a/lib/private/Setup.php +++ b/lib/private/Setup.php @@ -265,7 +265,7 @@ class Setup { $dbType = $options['dbtype']; if (empty($options['adminlogin'])) { - $error[] = $l->t('Set an admin username.'); + $error[] = $l->t('Set an admin account name.'); } if (empty($options['adminpass'])) { $error[] = $l->t('Set an admin password.'); @@ -311,7 +311,7 @@ class Setup { $dbType = 'sqlite3'; } - //generate a random salt that is used to salt the local user passwords + //generate a random salt that is used to salt the local passwords $salt = $this->random->generate(30); // generate a secret $secret = $this->random->generate(48); @@ -345,7 +345,7 @@ class Setup { return $error; } catch (Exception $e) { $error[] = [ - 'error' => 'Error while trying to create admin user: ' . $e->getMessage(), + 'error' => 'Error while trying to create admin account: ' . $e->getMessage(), 'exception' => $e, 'hint' => '', ]; @@ -365,13 +365,13 @@ class Setup { return $error; } - $this->outputDebug($output, 'Create admin user'); - //create the user and group - $user = null; + $this->outputDebug($output, 'Create admin account'); + //create the and group + $ = null; try { $user = Server::get(IUserManager::class)->createUser($username, $password); if (!$user) { - $error[] = "User <$username> could not be created."; + $error[] = "Account <$username> could not be created."; return $error; } } catch (Exception $exception) { @@ -428,7 +428,7 @@ class Setup { $userSession->login($username, $password); $user = $userSession->getUser(); if (!$user) { - $error[] = "No user found in session."; + $error[] = "No account found in session."; return $error; } $userSession->createSessionToken($request, $user->getUID(), $username, $password); diff --git a/lib/private/Setup/AbstractDatabase.php b/lib/private/Setup/AbstractDatabase.php index 82c00cb271a..7fb5a1363dd 100644 --- a/lib/private/Setup/AbstractDatabase.php +++ b/lib/private/Setup/AbstractDatabase.php @@ -71,9 +71,9 @@ abstract class AbstractDatabase { public function validate($config) { $errors = []; if (empty($config['dbuser']) && empty($config['dbname'])) { - $errors[] = $this->trans->t("Enter the database username and name for %s", [$this->dbprettyname]); + $errors[] = $this->trans->t("Enter the database account name and name for %s", [$this->dbprettyname]); } elseif (empty($config['dbuser'])) { - $errors[] = $this->trans->t("Enter the database username for %s", [$this->dbprettyname]); + $errors[] = $this->trans->t("Enter the database account name for %s", [$this->dbprettyname]); } elseif (empty($config['dbname'])) { $errors[] = $this->trans->t("Enter the database name for %s", [$this->dbprettyname]); } diff --git a/lib/private/Setup/MySQL.php b/lib/private/Setup/MySQL.php index 0d672f324eb..754a56a99d9 100644 --- a/lib/private/Setup/MySQL.php +++ b/lib/private/Setup/MySQL.php @@ -73,7 +73,7 @@ class MySQL extends AbstractDatabase { $this->logger->error($e->getMessage(), [ 'exception' => $e, ]); - throw new \OC\DatabaseSetupException($this->trans->t('MySQL username and/or password not valid'), + throw new \OC\DatabaseSetupException($this->trans->t('MySQL account name and/or password not valid'), $this->trans->t('You need to enter details of an existing account.'), 0, $e); } } diff --git a/lib/private/Setup/OCI.php b/lib/private/Setup/OCI.php index 477561bbe2a..25c7ce66a18 100644 --- a/lib/private/Setup/OCI.php +++ b/lib/private/Setup/OCI.php @@ -53,9 +53,9 @@ class OCI extends AbstractDatabase { public function validate($config) { $errors = []; if (empty($config['dbuser']) && empty($config['dbname'])) { - $errors[] = $this->trans->t("Enter the database username and name for %s", [$this->dbprettyname]); + $errors[] = $this->trans->t("Enter the database account name and name for %s", [$this->dbprettyname]); } elseif (empty($config['dbuser'])) { - $errors[] = $this->trans->t("Enter the database username for %s", [$this->dbprettyname]); + $errors[] = $this->trans->t("Enter the database account name for %s", [$this->dbprettyname]); } elseif (empty($config['dbname'])) { $errors[] = $this->trans->t("Enter the database name for %s", [$this->dbprettyname]); } @@ -75,7 +75,7 @@ class OCI extends AbstractDatabase { . ' NLS_LANG=' . getenv('NLS_LANG') . ' tnsnames.ora is ' . (is_readable(getenv('ORACLE_HOME') . '/network/admin/tnsnames.ora') ? '' : 'not ') . 'readable', 0, $e); } - throw new \OC\DatabaseSetupException($this->trans->t('Oracle username and/or password not valid'), + throw new \OC\DatabaseSetupException($this->trans->t('Oracle account name and/or password not valid'), 'Check environment: ORACLE_HOME=' . getenv('ORACLE_HOME') . ' ORACLE_SID=' . getenv('ORACLE_SID') . ' LD_LIBRARY_PATH=' . getenv('LD_LIBRARY_PATH') diff --git a/lib/private/Setup/PostgreSQL.php b/lib/private/Setup/PostgreSQL.php index 490cbba69a9..9b2644ea432 100644 --- a/lib/private/Setup/PostgreSQL.php +++ b/lib/private/Setup/PostgreSQL.php @@ -114,7 +114,7 @@ class PostgreSQL extends AbstractDatabase { $this->logger->error($e->getMessage(), [ 'exception' => $e, ]); - throw new \OC\DatabaseSetupException($this->trans->t('PostgreSQL username and/or password not valid'), + throw new \OC\DatabaseSetupException($this->trans->t('PostgreSQL account name and/or password not valid'), $this->trans->t('You need to enter details of an existing account.'), 0, $e); } } diff --git a/lib/private/Share20/Manager.php b/lib/private/Share20/Manager.php index 3af74789602..ca99a4299ce 100644 --- a/lib/private/Share20/Manager.php +++ b/lib/private/Share20/Manager.php @@ -578,7 +578,7 @@ class Manager implements IManager { // Identical share already exists if ($existingShare->getSharedWith() === $share->getSharedWith() && $existingShare->getShareType() === $share->getShareType()) { - $message = $this->l->t('Sharing %s failed, because this item is already shared with user %s', [$share->getNode()->getName(), $share->getSharedWithDisplayName()]); + $message = $this->l->t('Sharing %s failed, because this item is already shared with account %s', [$share->getNode()->getName(), $share->getSharedWithDisplayName()]); throw new AlreadySharedException($message, $existingShare); } @@ -589,7 +589,7 @@ class Manager implements IManager { $user = $this->userManager->get($share->getSharedWith()); if ($group->inGroup($user) && $existingShare->getShareOwner() !== $share->getShareOwner()) { - $message = $this->l->t('Sharing %s failed, because this item is already shared with user %s', [$share->getNode()->getName(), $share->getSharedWithDisplayName()]); + $message = $this->l->t('Sharing %s failed, because this item is already shared with account %s', [$share->getNode()->getName(), $share->getSharedWithDisplayName()]); throw new AlreadySharedException($message, $existingShare); } } diff --git a/lib/private/Support/Subscription/Registry.php b/lib/private/Support/Subscription/Registry.php index 008cded5dd3..f313574f96b 100644 --- a/lib/private/Support/Subscription/Registry.php +++ b/lib/private/Support/Subscription/Registry.php @@ -239,7 +239,7 @@ class Registry implements IRegistry { $notificationManager->notify($notification); } - $this->logger->warning('The user limit was reached and the new user was not created', ['app' => 'lib']); + $this->logger->warning('The account limit was reached and the new account was not created', ['app' => 'lib']); } protected function reIssue(): bool { diff --git a/lib/private/User/Manager.php b/lib/private/User/Manager.php index 705f5fbe66b..2fc3b3542c1 100644 --- a/lib/private/User/Manager.php +++ b/lib/private/User/Manager.php @@ -456,7 +456,7 @@ class Manager extends PublicEmitter implements IUserManager { // Check if user already exists if ($this->userExists($uid)) { - throw new \InvalidArgumentException($l->t('The username is already being used')); + throw new \InvalidArgumentException($l->t('The account name is already being used')); } /** @deprecated 21.0.0 use BeforeUserCreatedEvent event with the IEventDispatcher instead */ @@ -464,7 +464,7 @@ class Manager extends PublicEmitter implements IUserManager { $this->eventDispatcher->dispatchTyped(new BeforeUserCreatedEvent($uid, $password)); $state = $backend->createUser($uid, $password); if ($state === false) { - throw new \InvalidArgumentException($l->t('Could not create user')); + throw new \InvalidArgumentException($l->t('Could not create account')); } $user = $this->getUserObject($uid, $backend); if ($user instanceof IUser) { @@ -734,27 +734,27 @@ class Manager extends PublicEmitter implements IUserManager { // Check the name for bad characters // Allowed are: "a-z", "A-Z", "0-9", spaces and "_.@-'" if (preg_match('/[^a-zA-Z0-9 _.@\-\']/', $uid)) { - throw new \InvalidArgumentException($l->t('Only the following characters are allowed in a username:' + throw new \InvalidArgumentException($l->t('Only the following characters are allowed in an account name:' . ' "a-z", "A-Z", "0-9", spaces and "_.@-\'"')); } // No empty username if (trim($uid) === '') { - throw new \InvalidArgumentException($l->t('A valid username must be provided')); + throw new \InvalidArgumentException($l->t('A valid account name must be provided')); } // No whitespace at the beginning or at the end if (trim($uid) !== $uid) { - throw new \InvalidArgumentException($l->t('Username contains whitespace at the beginning or at the end')); + throw new \InvalidArgumentException($l->t('Account name contains whitespace at the beginning or at the end')); } // Username only consists of 1 or 2 dots (directory traversal) if ($uid === '.' || $uid === '..') { - throw new \InvalidArgumentException($l->t('Username must not consist of dots only')); + throw new \InvalidArgumentException($l->t('Account name must not consist of dots only')); } if (!$this->verifyUid($uid, $checkDataDirectory)) { - throw new \InvalidArgumentException($l->t('Username is invalid because files already exist for this user')); + throw new \InvalidArgumentException($l->t('Account name is invalid because files already exist for this user')); } } diff --git a/lib/private/User/Session.php b/lib/private/User/Session.php index b7f29134379..ab6ec9f38d3 100644 --- a/lib/private/User/Session.php +++ b/lib/private/User/Session.php @@ -367,7 +367,7 @@ class Session implements IUserSession, Emitter { if (!$user->isEnabled()) { // disabled users can not log in // injecting l10n does not work - there is a circular dependency between session and \OCP\L10N\IFactory - $message = \OCP\Util::getL10N('lib')->t('User disabled'); + $message = \OCP\Util::getL10N('lib')->t('Account disabled'); throw new LoginException($message); } diff --git a/lib/private/legacy/OC_User.php b/lib/private/legacy/OC_User.php index d2dc2a2389f..cefdd0ad2ee 100644 --- a/lib/private/legacy/OC_User.php +++ b/lib/private/legacy/OC_User.php @@ -178,7 +178,7 @@ class OC_User { $dispatcher = \OC::$server->get(IEventDispatcher::class); if ($userSession->getUser() && !$userSession->getUser()->isEnabled()) { - $message = \OC::$server->getL10N('lib')->t('User disabled'); + $message = \OC::$server->getL10N('lib')->t('Account disabled'); throw new LoginException($message); } $userSession->setLoginName($uid); diff --git a/lib/private/legacy/OC_Util.php b/lib/private/legacy/OC_Util.php index c008ccd63ba..3b6d9b8baec 100644 --- a/lib/private/legacy/OC_Util.php +++ b/lib/private/legacy/OC_Util.php @@ -732,8 +732,8 @@ class OC_Util { if ($perms[2] !== '0') { $l = \OC::$server->getL10N('lib'); return [[ - 'error' => $l->t('Your data directory is readable by other users.'), - 'hint' => $l->t('Please change the permissions to 0770 so that the directory cannot be listed by other users.'), + 'error' => $l->t('Your data directory is readable by other people.'), + 'hint' => $l->t('Please change the permissions to 0770 so that the directory cannot be listed by other people.'), ]]; } } diff --git a/tests/lib/Share20/ManagerTest.php b/tests/lib/Share20/ManagerTest.php index eaa26ef7e85..165b818517b 100644 --- a/tests/lib/Share20/ManagerTest.php +++ b/tests/lib/Share20/ManagerTest.php @@ -1618,7 +1618,7 @@ class ManagerTest extends \Test\TestCase { public function testUserCreateChecksIdenticalShareExists() { $this->expectException(AlreadySharedException::class); - $this->expectExceptionMessage('Sharing name.txt failed, because this item is already shared with user user'); + $this->expectExceptionMessage('Sharing name.txt failed, because this item is already shared with account user'); $share = $this->manager->newShare(); $share->setSharedWithDisplayName('user'); @@ -1647,7 +1647,7 @@ class ManagerTest extends \Test\TestCase { public function testUserCreateChecksIdenticalPathSharedViaGroup() { $this->expectException(AlreadySharedException::class); - $this->expectExceptionMessage('Sharing name2.txt failed, because this item is already shared with user userName'); + $this->expectExceptionMessage('Sharing name2.txt failed, because this item is already shared with account userName'); $share = $this->manager->newShare(); diff --git a/tests/lib/User/ManagerTest.php b/tests/lib/User/ManagerTest.php index aa597f758b0..5e8c2ed7131 100644 --- a/tests/lib/User/ManagerTest.php +++ b/tests/lib/User/ManagerTest.php @@ -434,7 +434,7 @@ class ManagerTest extends TestCase { public function testCreateUserFromBackendWithBackendError() { $this->expectException(\InvalidArgumentException::class); - $this->expectExceptionMessage('Could not create user'); + $this->expectExceptionMessage('Could not create account'); /** @var IConfig|\PHPUnit\Framework\MockObject\MockObject $config */ $config = $this->createMock(IConfig::class); |