aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorprovokateurin <kate@provokateurin.de>2024-10-14 12:09:35 +0200
committerprovokateurin <kate@provokateurin.de>2024-10-14 13:59:24 +0200
commit51d9d63a01b878b38630a5def73b08cad2d30f44 (patch)
tree4df6f48f47c04fbeb68d459e4e6c5be75fdc8fe2
parent3f75c4808d5153588c671c6a47c6aadb501f6308 (diff)
downloadnextcloud-server-51d9d63a01b878b38630a5def73b08cad2d30f44.tar.gz
nextcloud-server-51d9d63a01b878b38630a5def73b08cad2d30f44.zip
chore: Use more gender neutral language
Signed-off-by: provokateurin <kate@provokateurin.de>
-rw-r--r--apps/dav/lib/BackgroundJob/GenerateBirthdayCalendarBackgroundJob.php2
-rw-r--r--apps/dav/lib/Files/Sharing/PublicLinkCheckPlugin.php2
-rw-r--r--apps/encryption/lib/Crypto/DecryptAll.php2
-rw-r--r--apps/encryption/lib/Crypto/Encryption.php2
-rw-r--r--apps/encryption/lib/Hooks/UserHooks.php2
-rw-r--r--apps/settings/src/components/Users/NewUserDialog.vue2
-rw-r--r--apps/user_ldap/lib/Access.php2
-rw-r--r--apps/user_ldap/lib/ILDAPUserPlugin.php2
-rw-r--r--apps/user_ldap/lib/User/User.php4
-rw-r--r--apps/user_ldap/lib/UserPluginManager.php2
-rw-r--r--apps/user_ldap/lib/User_LDAP.php2
-rw-r--r--apps/user_ldap/lib/User_Proxy.php2
-rw-r--r--lib/private/DateTimeZone.php2
-rw-r--r--lib/private/Federation/CloudIdManager.php2
-rw-r--r--lib/private/FullTextSearch/Model/SearchTemplate.php2
-rw-r--r--lib/private/KnownUser/KnownUserService.php2
-rw-r--r--lib/private/Tags.php2
-rw-r--r--lib/private/User/User.php2
-rw-r--r--lib/public/Encryption/IEncryptionModule.php2
-rw-r--r--lib/public/Files/Node.php2
-rw-r--r--lib/public/FullTextSearch/Model/ISearchTemplate.php2
-rw-r--r--lib/public/ITags.php2
-rw-r--r--lib/public/IUser.php2
23 files changed, 24 insertions, 24 deletions
diff --git a/apps/dav/lib/BackgroundJob/GenerateBirthdayCalendarBackgroundJob.php b/apps/dav/lib/BackgroundJob/GenerateBirthdayCalendarBackgroundJob.php
index a6b0346908c..67e7d5bded3 100644
--- a/apps/dav/lib/BackgroundJob/GenerateBirthdayCalendarBackgroundJob.php
+++ b/apps/dav/lib/BackgroundJob/GenerateBirthdayCalendarBackgroundJob.php
@@ -34,7 +34,7 @@ class GenerateBirthdayCalendarBackgroundJob extends QueuedJob {
$userId = $argument['userId'];
$purgeBeforeGenerating = $argument['purgeBeforeGenerating'] ?? false;
- // make sure admin didn't change his mind
+ // make sure admin didn't change their mind
$isGloballyEnabled = $this->config->getAppValue('dav', 'generateBirthdayCalendar', 'yes');
if ($isGloballyEnabled !== 'yes') {
return;
diff --git a/apps/dav/lib/Files/Sharing/PublicLinkCheckPlugin.php b/apps/dav/lib/Files/Sharing/PublicLinkCheckPlugin.php
index 5f1e29e0286..38a45b3fc37 100644
--- a/apps/dav/lib/Files/Sharing/PublicLinkCheckPlugin.php
+++ b/apps/dav/lib/Files/Sharing/PublicLinkCheckPlugin.php
@@ -41,7 +41,7 @@ class PublicLinkCheckPlugin extends ServerPlugin {
}
public function beforeMethod(RequestInterface $request, ResponseInterface $response) {
- // verify that the owner didn't have his share permissions revoked
+ // verify that the owner didn't have their share permissions revoked
if ($this->fileInfo && !$this->fileInfo->isShareable()) {
throw new NotFound();
}
diff --git a/apps/encryption/lib/Crypto/DecryptAll.php b/apps/encryption/lib/Crypto/DecryptAll.php
index e153712fb99..6aa3ee9ac07 100644
--- a/apps/encryption/lib/Crypto/DecryptAll.php
+++ b/apps/encryption/lib/Crypto/DecryptAll.php
@@ -73,7 +73,7 @@ class DecryptAll {
$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
if (!empty($user)) {
$output->writeln('You can only decrypt the users files if you know');
- $output->writeln('the users password or if he activated the recovery key.');
+ $output->writeln('the users password or if they activated the recovery key.');
$output->writeln('');
$questionUseLoginPassword = new ConfirmationQuestion(
'Do you want to use the users login password to decrypt all files? (y/n) ',
diff --git a/apps/encryption/lib/Crypto/Encryption.php b/apps/encryption/lib/Crypto/Encryption.php
index f5b6a40aecc..5261fea1e19 100644
--- a/apps/encryption/lib/Crypto/Encryption.php
+++ b/apps/encryption/lib/Crypto/Encryption.php
@@ -432,7 +432,7 @@ class Encryption implements IEncryptionModule {
* e.g. if all encryption keys exists
*
* @param string $path
- * @param string $uid user for whom we want to check if he can read the file
+ * @param string $uid user for whom we want to check if they can read the file
* @return bool
* @throws DecryptionFailedException
*/
diff --git a/apps/encryption/lib/Hooks/UserHooks.php b/apps/encryption/lib/Hooks/UserHooks.php
index 2424370e47f..a17686489d4 100644
--- a/apps/encryption/lib/Hooks/UserHooks.php
+++ b/apps/encryption/lib/Hooks/UserHooks.php
@@ -175,7 +175,7 @@ class UserHooks implements IHook {
// Get existing decrypted private key
$user = $this->userSession->getUser();
- // current logged in user changes his own password
+ // current logged in user changes their own password
if ($user && $params['uid'] === $user->getUID()) {
$privateKey = $this->session->getPrivateKey();
diff --git a/apps/settings/src/components/Users/NewUserDialog.vue b/apps/settings/src/components/Users/NewUserDialog.vue
index 2240e75f1d8..bc6ba0901d9 100644
--- a/apps/settings/src/components/Users/NewUserDialog.vue
+++ b/apps/settings/src/components/Users/NewUserDialog.vue
@@ -73,7 +73,7 @@
:required="!settings.isAdmin && !settings.isDelegatedAdmin"
@input="handleGroupInput"
@option:created="createGroup" />
- <!-- If user is not admin, he is a subadmin.
+ <!-- If user is not admin, they are a subadmin.
Subadmins can't create users outside their groups
Therefore, empty select is forbidden -->
</div>
diff --git a/apps/user_ldap/lib/Access.php b/apps/user_ldap/lib/Access.php
index f1e47e90418..e0c396a2cad 100644
--- a/apps/user_ldap/lib/Access.php
+++ b/apps/user_ldap/lib/Access.php
@@ -1172,7 +1172,7 @@ class Access extends LDAPUtility {
return false;
}
// if count is bigger, then the server does not support
- // paged search. Instead, he did a normal search. We set a
+ // paged search. Instead, they did a normal search. We set a
// flag here, so the callee knows how to deal with it.
if ($foundItems <= $limit) {
$this->pagedSearchedSuccessful = true;
diff --git a/apps/user_ldap/lib/ILDAPUserPlugin.php b/apps/user_ldap/lib/ILDAPUserPlugin.php
index 4638a1a49da..3dbda1f6a99 100644
--- a/apps/user_ldap/lib/ILDAPUserPlugin.php
+++ b/apps/user_ldap/lib/ILDAPUserPlugin.php
@@ -58,7 +58,7 @@ interface ILDAPUserPlugin {
public function setDisplayName($uid, $displayName);
/**
- * checks whether the user is allowed to change his avatar in Nextcloud
+ * checks whether the user is allowed to change their avatar in Nextcloud
* @param string $uid the Nextcloud user name
* @return boolean either the user can or cannot
*/
diff --git a/apps/user_ldap/lib/User/User.php b/apps/user_ldap/lib/User/User.php
index 0688a843bd7..4a5f2442c9b 100644
--- a/apps/user_ldap/lib/User/User.php
+++ b/apps/user_ldap/lib/User/User.php
@@ -659,7 +659,7 @@ class User {
$currentValue = '';
$scope = $defaultScopes[$property];
}
- $verified = IAccountManager::VERIFIED; // trust the LDAP admin knew what he put there
+ $verified = IAccountManager::VERIFIED; // trust the LDAP admin knew what they put there
if ($currentValue !== $value) {
$account->setProperty($property, $value, $scope, $verified);
$this->logger->debug('update user profile: ' . $property . '=' . $value
@@ -854,7 +854,7 @@ class User {
exit();
}
//handle pwdReset attribute
- if (!empty($pwdReset) && $pwdReset[0] === 'TRUE') { //user must change his password
+ if (!empty($pwdReset) && $pwdReset[0] === 'TRUE') { //user must change their password
$this->config->setUserValue($uid, 'user_ldap', 'needsPasswordReset', 'true');
header('Location: ' . \OC::$server->getURLGenerator()->linkToRouteAbsolute(
'user_ldap.renewPassword.showRenewPasswordForm', ['user' => $uid]));
diff --git a/apps/user_ldap/lib/UserPluginManager.php b/apps/user_ldap/lib/UserPluginManager.php
index 4a36794bca5..7c51dc70f83 100644
--- a/apps/user_ldap/lib/UserPluginManager.php
+++ b/apps/user_ldap/lib/UserPluginManager.php
@@ -95,7 +95,7 @@ class UserPluginManager {
}
/**
- * checks whether the user is allowed to change his avatar in Nextcloud
+ * checks whether the user is allowed to change their avatar in Nextcloud
* @param string $uid the Nextcloud user name
* @return boolean either the user can or cannot
* @throws \Exception
diff --git a/apps/user_ldap/lib/User_LDAP.php b/apps/user_ldap/lib/User_LDAP.php
index e34f0fcb185..bd1a65f4d42 100644
--- a/apps/user_ldap/lib/User_LDAP.php
+++ b/apps/user_ldap/lib/User_LDAP.php
@@ -43,7 +43,7 @@ class User_LDAP extends BackendUtility implements IUserBackend, UserInterface, I
}
/**
- * checks whether the user is allowed to change his avatar in Nextcloud
+ * checks whether the user is allowed to change their avatar in Nextcloud
*
* @param string $uid the Nextcloud user name
* @return boolean either the user can or cannot
diff --git a/apps/user_ldap/lib/User_Proxy.php b/apps/user_ldap/lib/User_Proxy.php
index 0cb0e6e6cde..0c00771aa67 100644
--- a/apps/user_ldap/lib/User_Proxy.php
+++ b/apps/user_ldap/lib/User_Proxy.php
@@ -295,7 +295,7 @@ class User_Proxy extends Proxy implements IUserBackend, UserInterface, IUserLDAP
}
/**
- * checks whether the user is allowed to change his avatar in Nextcloud
+ * checks whether the user is allowed to change their avatar in Nextcloud
*
* @param string $uid the Nextcloud user name
* @return boolean either the user can or cannot
diff --git a/lib/private/DateTimeZone.php b/lib/private/DateTimeZone.php
index ca2e314fabd..c693968fa3d 100644
--- a/lib/private/DateTimeZone.php
+++ b/lib/private/DateTimeZone.php
@@ -31,7 +31,7 @@ class DateTimeZone implements IDateTimeZone {
}
/**
- * Get the timezone of the current user, based on his session information and config data
+ * Get the timezone of the current user, based on their session information and config data
*
* @param bool|int $timestamp
* @return \DateTimeZone
diff --git a/lib/private/Federation/CloudIdManager.php b/lib/private/Federation/CloudIdManager.php
index f5c0035534c..1c808c03eda 100644
--- a/lib/private/Federation/CloudIdManager.php
+++ b/lib/private/Federation/CloudIdManager.php
@@ -125,7 +125,7 @@ class CloudIdManager implements ICloudIdManager {
if (isset($entry['CLOUD'])) {
foreach ($entry['CLOUD'] as $cloudID) {
if ($cloudID === $cloudId) {
- // Warning, if user decides to make his full name local only,
+ // Warning, if user decides to make their full name local only,
// no FN is found on federated servers
if (isset($entry['FN'])) {
return $entry['FN'];
diff --git a/lib/private/FullTextSearch/Model/SearchTemplate.php b/lib/private/FullTextSearch/Model/SearchTemplate.php
index c2929bea139..6f9a04a911e 100644
--- a/lib/private/FullTextSearch/Model/SearchTemplate.php
+++ b/lib/private/FullTextSearch/Model/SearchTemplate.php
@@ -20,7 +20,7 @@ use OCP\FullTextSearch\Model\ISearchTemplate;
* when the getSearchTemplate() method is called.
*
* The object will contain templates to be displayed, and the list of the different
- * options to be available to the user when he start a new search.
+ * options to be available to the user when they start a new search.
*
* The display of the Options is generated by the FullTextSearch app and Options
* can be displayed in 2 places:
diff --git a/lib/private/KnownUser/KnownUserService.php b/lib/private/KnownUser/KnownUserService.php
index aff0c097d98..cd257cf1b12 100644
--- a/lib/private/KnownUser/KnownUserService.php
+++ b/lib/private/KnownUser/KnownUserService.php
@@ -39,7 +39,7 @@ class KnownUserService {
}
/**
- * Store a match because $knownTo has $contactUserId in his phonebook
+ * Store a match because $knownTo has $contactUserId in their phonebook
*
* @param string $knownTo User id of the owner of the phonebook
* @param string $contactUserId User id of the contact in the phonebook
diff --git a/lib/private/Tags.php b/lib/private/Tags.php
index 350c49bca2c..1f22a4c6a33 100644
--- a/lib/private/Tags.php
+++ b/lib/private/Tags.php
@@ -242,7 +242,7 @@ class Tags implements ITags {
/**
* Checks whether a tag is saved for the given user,
- * disregarding the ones shared with him or her.
+ * disregarding the ones shared with them.
*
* @param string $name The tag name to check for.
* @param string $user The user whose tags are to be checked.
diff --git a/lib/private/User/User.php b/lib/private/User/User.php
index 6e1085b4fe3..4b1ec4366d0 100644
--- a/lib/private/User/User.php
+++ b/lib/private/User/User.php
@@ -394,7 +394,7 @@ class User implements IUser {
}
/**
- * Check if the backend allows the user to change his avatar on Personal page
+ * Check if the backend allows the user to change their avatar on Personal page
*
* @return bool
*/
diff --git a/lib/public/Encryption/IEncryptionModule.php b/lib/public/Encryption/IEncryptionModule.php
index fbac291c1b9..0bf0ef3476b 100644
--- a/lib/public/Encryption/IEncryptionModule.php
+++ b/lib/public/Encryption/IEncryptionModule.php
@@ -125,7 +125,7 @@ interface IEncryptionModule {
* e.g. if all encryption keys exists
*
* @param string $path
- * @param string $uid user for whom we want to check if he can read the file
+ * @param string $uid user for whom we want to check if they can read the file
* @return boolean
* @since 8.1.0
*/
diff --git a/lib/public/Files/Node.php b/lib/public/Files/Node.php
index e3641a82df3..edef0a6157f 100644
--- a/lib/public/Files/Node.php
+++ b/lib/public/Files/Node.php
@@ -243,7 +243,7 @@ interface Node extends FileInfo {
* Check the type of an existing lock.
*
* A shared lock can be changed to an exclusive lock is there is exactly one shared lock on the file,
- * an exclusive lock can always be changed to a shared lock since there can only be one exclusive lock int he first place.
+ * an exclusive lock can always be changed to a shared lock since there can only be one exclusive lock in the first place.
*
* A locked exception will be thrown when these preconditions are not met.
* Note that this is also the case if no existing lock exists for the file.
diff --git a/lib/public/FullTextSearch/Model/ISearchTemplate.php b/lib/public/FullTextSearch/Model/ISearchTemplate.php
index 0de907bef19..89f683ca013 100644
--- a/lib/public/FullTextSearch/Model/ISearchTemplate.php
+++ b/lib/public/FullTextSearch/Model/ISearchTemplate.php
@@ -16,7 +16,7 @@ use OCP\FullTextSearch\IFullTextSearchProvider;
* when the getSearchTemplate() method is called.
*
* The object will contain templates to be displayed, and the list of the different
- * options to be available to the user when he start a new search.
+ * options to be available to the user when they start a new search.
*
* The display of the Options is generated by the FullTextSearch app and Options
* can be displayed in 2 places:
diff --git a/lib/public/ITags.php b/lib/public/ITags.php
index 1ba6abae5a2..0da4522c86c 100644
--- a/lib/public/ITags.php
+++ b/lib/public/ITags.php
@@ -104,7 +104,7 @@ interface ITags {
/**
* Checks whether a tag is saved for the given user,
- * disregarding the ones shared with him or her.
+ * disregarding the ones shared with them.
*
* @param string $name The tag name to check for.
* @param string $user The user whose tags are to be checked.
diff --git a/lib/public/IUser.php b/lib/public/IUser.php
index 4ba9a89f064..8c7d6a1283e 100644
--- a/lib/public/IUser.php
+++ b/lib/public/IUser.php
@@ -117,7 +117,7 @@ interface IUser {
public function getBackend();
/**
- * check if the backend allows the user to change his avatar on Personal page
+ * check if the backend allows the user to change their avatar on Personal page
*
* @return bool
* @since 8.0.0