From ac58ba5a9056f4b1697af57daa257620eb5bed44 Mon Sep 17 00:00:00 2001 From: Valdnet <47037905+Valdnet@users.noreply.github.com> Date: Sat, 17 Sep 2022 19:34:25 +0200 Subject: l10n: Change to a capital letter Signed-off-by: Valdnet <47037905+Valdnet@users.noreply.github.com> --- core/src/systemtags/systemtags.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'core') diff --git a/core/src/systemtags/systemtags.js b/core/src/systemtags/systemtags.js index bbb2ecac1d8..90b415d1557 100644 --- a/core/src/systemtags/systemtags.js +++ b/core/src/systemtags/systemtags.js @@ -56,11 +56,11 @@ import escapeHTML from 'escape-html' var scope if (!tag.userAssignable) { - scope = t('core', 'restricted') + scope = t('core', 'Restricted') } if (!tag.userVisible) { // invisible also implicitly means not assignable - scope = t('core', 'invisible') + scope = t('core', 'Invisible') } if (scope) { var $scope = document.createElement('em') -- cgit v1.2.3 From a9f20b94c985b446ba70a5f3b9adb20514697292 Mon Sep 17 00:00:00 2001 From: Valdnet <47037905+Valdnet@users.noreply.github.com> Date: Sat, 17 Sep 2022 19:51:11 +0200 Subject: l10n: Spelling unification Signed-off-by: Valdnet <47037905+Valdnet@users.noreply.github.com> Signed-off-by: nextcloud-command --- core/js/setupchecks.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'core') diff --git a/core/js/setupchecks.js b/core/js/setupchecks.js index 2e5e5642bf2..81ed193a38b 100644 --- a/core/js/setupchecks.js +++ b/core/js/setupchecks.js @@ -655,7 +655,7 @@ var xssfields = xhr.getResponseHeader('X-XSS-Protection') ? xhr.getResponseHeader('X-XSS-Protection').split(';').map(function(item) { return item.trim(); }) : []; if (xssfields.length === 0 || xssfields.indexOf('1') === -1 || xssfields.indexOf('mode=block') === -1) { messages.push({ - msg: t('core', 'The "{header}" HTTP header doesn\'t contain "{expected}". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: t('core', 'The "{header}" HTTP header does not contain "{expected}". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', { header: 'X-XSS-Protection', expected: '1; mode=block' -- cgit v1.2.3 From 58d98a3085a793d0d147b42836d16a3f7c0c31bf Mon Sep 17 00:00:00 2001 From: Valdnet <47037905+Valdnet@users.noreply.github.com> Date: Mon, 19 Sep 2022 10:39:32 +0200 Subject: Fix test Signed-off-by: Valdnet <47037905+Valdnet@users.noreply.github.com> --- core/js/tests/specs/setupchecksSpec.js | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'core') diff --git a/core/js/tests/specs/setupchecksSpec.js b/core/js/tests/specs/setupchecksSpec.js index 72230f0213b..3068e1e42a4 100644 --- a/core/js/tests/specs/setupchecksSpec.js +++ b/core/js/tests/specs/setupchecksSpec.js @@ -1578,7 +1578,7 @@ describe('OC.SetupChecks tests', function() { msg: 'The "X-Permitted-Cross-Domain-Policies" HTTP header is not set to "none". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "Referrer-Policy" HTTP header is not set to "no-referrer", "no-referrer-when-downgrade", "strict-origin", "strict-origin-when-cross-origin" or "same-origin". This can leak referer information. See the W3C Recommendation ↗.', @@ -1610,7 +1610,7 @@ describe('OC.SetupChecks tests', function() { msg: 'The "X-Content-Type-Options" HTTP header is not set to "nosniff". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING, } ]); @@ -1699,7 +1699,7 @@ describe('OC.SetupChecks tests', function() { result.done(function( data, s, x ){ expect(data).toEqual([ { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); @@ -1724,7 +1724,7 @@ describe('OC.SetupChecks tests', function() { result.done(function( data, s, x ){ expect(data).toEqual([ { - msg: 'The "X-XSS-Protection" HTTP header doesn\'t contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', + msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); -- cgit v1.2.3 From 187464a70dd8ce5e30e42dab395407c3cf38ee02 Mon Sep 17 00:00:00 2001 From: Valdnet <47037905+Valdnet@users.noreply.github.com> Date: Mon, 19 Sep 2022 11:12:09 +0200 Subject: Fix test Signed-off-by: Valdnet <47037905+Valdnet@users.noreply.github.com> --- core/js/tests/specs/systemtags/systemtagsSpec.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'core') diff --git a/core/js/tests/specs/systemtags/systemtagsSpec.js b/core/js/tests/specs/systemtags/systemtagsSpec.js index 7d7987e9cb3..376a25c7d83 100644 --- a/core/js/tests/specs/systemtags/systemtagsSpec.js +++ b/core/js/tests/specs/systemtags/systemtagsSpec.js @@ -62,8 +62,8 @@ describe('OC.SystemTags tests', function() { } testScope(true, true, 'Fourty Two'); - testScope(false, true, 'Fourty Two (invisible)'); - testScope(false, false, 'Fourty Two (invisible)'); - testScope(true, false, 'Fourty Two (restricted)'); + testScope(false, true, 'Fourty Two (Invisible)'); + testScope(false, false, 'Fourty Two (Invisible)'); + testScope(true, false, 'Fourty Two (Restricted)'); }); }); -- cgit v1.2.3 From caac0f069d03ff1496dbb816c0d6c22486080b47 Mon Sep 17 00:00:00 2001 From: Valdnet <47037905+Valdnet@users.noreply.github.com> Date: Mon, 19 Sep 2022 11:13:39 +0200 Subject: Fix test Signed-off-by: Valdnet <47037905+Valdnet@users.noreply.github.com> --- core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'core') diff --git a/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js b/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js index 8d3f67bfa0d..b69054e647e 100644 --- a/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js +++ b/core/js/tests/specs/systemtags/systemtagsinputfieldSpec.js @@ -301,12 +301,12 @@ describe('OC.SystemTags.SystemTagsInputField tests', function() { it('formatResult renders tag name with visibility', function() { var opts = select2Stub.getCall(0).args[0]; var $el = $(opts.formatResult({id: '1', name: 'test', userVisible: false, userAssignable: false})); - expect($el.find('.label').text()).toEqual('test (invisible)'); + expect($el.find('.label').text()).toEqual('test (Invisible)'); }); it('formatSelection renders tag name with visibility', function() { var opts = select2Stub.getCall(0).args[0]; var $el = $(opts.formatSelection({id: '1', name: 'test', userVisible: false, userAssignable: false})); - expect($el.text().trim()).toEqual('test (invisible)'); + expect($el.text().trim()).toEqual('test (Invisible)'); }); describe('initSelection', function() { var fetchStub; -- cgit v1.2.3