diff options
author | Carl Schwan <carl@carlschwan.eu> | 2022-09-19 13:16:46 +0300 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-09-19 13:16:46 +0300 |
commit | a733a77f7bce2db0b4d4c529c843781f7379c4a8 (patch) | |
tree | 4b6be389ae8b742d8913ee504f129638be33b653 /core | |
parent | 3950deb42fa9c7c5805e5047d07c988d59e57eb9 (diff) | |
parent | caac0f069d03ff1496dbb816c0d6c22486080b47 (diff) |
Merge pull request #34122 from nextcloud/Valdnet-patch-3
l10n: Change to a capital letter
Diffstat (limited to 'core')
-rw-r--r-- | core/js/setupchecks.js | 2 | ||||
-rw-r--r-- | core/js/tests/specs/setupchecksSpec.js | 8 | ||||
-rw-r--r-- | core/js/tests/specs/systemtags/systemtagsSpec.js | 6 | ||||
-rw-r--r-- | core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js | 4 | ||||
-rw-r--r-- | core/src/systemtags/systemtags.js | 4 |
5 files changed, 12 insertions, 12 deletions
diff --git a/core/js/setupchecks.js b/core/js/setupchecks.js index 2e5e5642bf2..81ed193a38b 100644 --- a/core/js/setupchecks.js +++ b/core/js/setupchecks.js @@ -655,7 +655,7 @@ var xssfields = xhr.getResponseHeader('X-XSS-Protection') ? xhr.getResponseHeader('X-XSS-Protection').split(';').map(function(item) { return item.trim(); }) : []; if (xssfields.length === 0 || xssfields.indexOf('1') === -1 || xssfields.indexOf('mode=block') === -1) { messages.push({ - msg: t('core', 'The "{header}" HTTP header doesn\'t contain "{expected}". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: t('core', 'The "{header}" HTTP header does not contain "{expected}". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', { header: 'X-XSS-Protection', expected: '1; mode=block' diff --git a/core/js/tests/specs/setupchecksSpec.js b/core/js/tests/specs/setupchecksSpec.js index 72230f0213b..3068e1e42a4 100644 --- a/core/js/tests/specs/setupchecksSpec.js +++ b/core/js/tests/specs/setupchecksSpec.js @@ -1578,7 +1578,7 @@ describe('OC.SetupChecks tests', function() { msg: 'The "X-Permitted-Cross-Domain-Policies" HTTP header is not set to "none". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "Referrer-Policy" HTTP header is not set to "no-referrer", "no-referrer-when-downgrade", "strict-origin", "strict-origin-when-cross-origin" or "same-origin". This can leak referer information. See the <a target="_blank" rel="noreferrer noopener" class="external" href="https://www.w3.org/TR/referrer-policy/">W3C Recommendation ↗</a>.', @@ -1610,7 +1610,7 @@ describe('OC.SetupChecks tests', function() { msg: 'The "X-Content-Type-Options" HTTP header is not set to "nosniff". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING, } ]); @@ -1699,7 +1699,7 @@ describe('OC.SetupChecks tests', function() { result.done(function( data, s, x ){ expect(data).toEqual([ { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); @@ -1724,7 +1724,7 @@ describe('OC.SetupChecks tests', function() { result.done(function( data, s, x ){ expect(data).toEqual([ { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); diff --git a/core/js/tests/specs/systemtags/systemtagsSpec.js b/core/js/tests/specs/systemtags/systemtagsSpec.js index 7d7987e9cb3..376a25c7d83 100644 --- a/core/js/tests/specs/systemtags/systemtagsSpec.js +++ b/core/js/tests/specs/systemtags/systemtagsSpec.js @@ -62,8 +62,8 @@ describe('OC.SystemTags tests', function() { } testScope(true, true, 'Fourty Two'); - testScope(false, true, 'Fourty Two (invisible)'); - testScope(false, false, 'Fourty Two (invisible)'); - testScope(true, false, 'Fourty Two (restricted)'); + testScope(false, true, 'Fourty Two (Invisible)'); + testScope(false, false, 'Fourty Two (Invisible)'); + testScope(true, false, 'Fourty Two (Restricted)'); }); }); diff --git a/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js b/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js index 8d3f67bfa0d..b69054e647e 100644 --- a/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js +++ b/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js @@ -301,12 +301,12 @@ describe('OC.SystemTags.SystemTagsInputField tests', function() { it('formatResult renders tag name with visibility', function() { var opts = select2Stub.getCall(0).args[0]; var $el = $(opts.formatResult({id: '1', name: 'test', userVisible: false, userAssignable: false})); - expect($el.find('.label').text()).toEqual('test (invisible)'); + expect($el.find('.label').text()).toEqual('test (Invisible)'); }); it('formatSelection renders tag name with visibility', function() { var opts = select2Stub.getCall(0).args[0]; var $el = $(opts.formatSelection({id: '1', name: 'test', userVisible: false, userAssignable: false})); - expect($el.text().trim()).toEqual('test (invisible)'); + expect($el.text().trim()).toEqual('test (Invisible)'); }); describe('initSelection', function() { var fetchStub; diff --git a/core/src/systemtags/systemtags.js b/core/src/systemtags/systemtags.js index bbb2ecac1d8..90b415d1557 100644 --- a/core/src/systemtags/systemtags.js +++ b/core/src/systemtags/systemtags.js @@ -56,11 +56,11 @@ import escapeHTML from 'escape-html' var scope if (!tag.userAssignable) { - scope = t('core', 'restricted') + scope = t('core', 'Restricted') } if (!tag.userVisible) { // invisible also implicitly means not assignable - scope = t('core', 'invisible') + scope = t('core', 'Invisible') } if (scope) { var $scope = document.createElement('em') |