From 6dea0851874147de245d3e47c58ade1f903b81fd Mon Sep 17 00:00:00 2001
From: Anders Kaseorg
Date: Mon, 10 Aug 2020 17:20:10 -0700
Subject: [PATCH] =?UTF-8?q?docs:=20Correct=20=E2=80=9Clogin=E2=80=9D=20as?=
=?UTF-8?q?=20a=20verb=20to=20=E2=80=9Clog=20in=E2=80=9D.?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Anders Kaseorg
---
docs/development/remote.md | 2 +-
docs/development/using.md | 2 +-
docs/overview/changelog.md | 4 ++--
docs/production/authentication-methods.md | 4 ++--
docs/production/deployment.md | 2 +-
docs/production/email-gateway.md | 2 +-
docs/production/mobile-push-notifications.md | 4 ++--
docs/production/security-model.md | 4 ++--
docs/production/upgrade-or-modify.md | 4 ++--
docs/subsystems/analytics.md | 2 +-
docs/subsystems/markdown.md | 2 +-
docs/subsystems/settings.md | 2 +-
docs/testing/testing-with-django.md | 2 +-
templates/corporate/zephyr-mirror.html | 2 +-
templates/two_factor/_wizard_forms.html | 2 +-
templates/zerver/config_error.html | 2 +-
templates/zerver/emails/followup_day1.source.html | 2 +-
templates/zerver/emails/followup_day1.txt | 2 +-
templates/zerver/help/change-organization-url.md | 2 +-
templates/zerver/help/import-from-gitter.md | 2 +-
templates/zerver/login.html | 2 +-
templates/zerver/social_auth_select_email.html | 2 +-
zerver/forms.py | 4 ++--
zerver/management/commands/export.py | 6 +++---
zerver/tests/test_auth_backends.py | 8 ++++----
zerver/tests/test_signup.py | 2 +-
zerver/views/auth.py | 4 ++--
zproject/backends.py | 2 +-
28 files changed, 40 insertions(+), 40 deletions(-)
diff --git a/docs/development/remote.md b/docs/development/remote.md
index 44c61f029e..a1f3cd714e 100644
--- a/docs/development/remote.md
+++ b/docs/development/remote.md
@@ -44,7 +44,7 @@ account.)
* You can add the user to the sudo group by running the command
`usermod -aG sudo zulipdev`.
* Finally, you can switch to the user by running the command `su -
-zulipdev` (or just login to that user using `ssh`).
+zulipdev` (or just log in to that user using `ssh`).
## Setting up the development environment
diff --git a/docs/development/using.md b/docs/development/using.md
index beaa3ec041..9fc0ca693a 100644
--- a/docs/development/using.md
+++ b/docs/development/using.md
@@ -66,7 +66,7 @@ the development environment][authentication-dev-server].
* Once the development server (`run-dev.py`) is running, you can visit
in your browser.
* By default, the development server homepage just shows a list of the
- users that exist on the server and you can login as any of them by
+ users that exist on the server and you can log in as any of them by
just clicking on a user.
* This setup saves time for the common case where you want to test
something other than the login process.
diff --git a/docs/overview/changelog.md b/docs/overview/changelog.md
index 0582b5fe70..cf50f05c69 100644
--- a/docs/overview/changelog.md
+++ b/docs/overview/changelog.md
@@ -877,7 +877,7 @@ Zulip installations; it has minimal changes for existing servers.
- Upgraded to modern versions of most of our stale dependencies.
- Updated our CSS toolchain to support hot module reloading.
- Updated numerous pages within the /help/ site.
-- We no longer require re-authing to signup after trying to login with
+- We no longer require re-authing to signup after trying to log in with
an OAuth authentication backend (GitHub or Google).
- Made major improvements to the Help Center.
- Improved system for configuring the S3 file uploads backend.
@@ -1415,7 +1415,7 @@ Zulip apps.
* Improved Markdown support for bulleted lists.
* Improved copy-to-clipboard support in various places.
* Improved subject lines of missed message emails.
-* Improved handling of users trying to login with OAuth without an account.
+* Improved handling of users trying to log in with OAuth without an account.
* Improved UI of off-the-Internet errors to not be hidden in narrow windows.
* Improved rate-limiting errors to be more easily machine-readable.
* Parallelized the backend test suite; now runs 1600 tests in <30s.
diff --git a/docs/production/authentication-methods.md b/docs/production/authentication-methods.md
index 791eb9e8b0..c73bebef8a 100644
--- a/docs/production/authentication-methods.md
+++ b/docs/production/authentication-methods.md
@@ -131,7 +131,7 @@ it as follows:
6. [Restart the Zulip server](../production/settings.md) to ensure
your settings changes take effect. The Zulip login page should now
-have a button for SAML authentication that you can use to login or
+have a button for SAML authentication that you can use to log in or
create an account (including when creating a new organization).
7. If the configuration was successful, the server's metadata can be
@@ -369,7 +369,7 @@ the Zulip server). Zulip will then treat users that are disabled via
the "Disable Account" feature in Active Directory as deactivated in
Zulip.
-Users disabled in active directory will be immediately unable to login
+Users disabled in active directory will be immediately unable to log in
to Zulip, since Zulip queries the LDAP/Active Directory server on
every login attempt. The user will be fully deactivated the next time
your `manage.py sync_ldap_user_data` cron job runs (at which point
diff --git a/docs/production/deployment.md b/docs/production/deployment.md
index 6a3306480b..f52f58474a 100644
--- a/docs/production/deployment.md
+++ b/docs/production/deployment.md
@@ -122,7 +122,7 @@ run the commands in `scripts/setup/create-db.sql` to:
* Create a database called `zulip`.
* Create a user called `zulip`.
-* Now login with the `zulip` user to create a schema called
+* Now log in with the `zulip` user to create a schema called
`zulip` in the `zulip` database. You might have to grant `create`
privileges first for the `zulip` user to do this.
diff --git a/docs/production/email-gateway.md b/docs/production/email-gateway.md
index d40dba4e2c..ba540fdb5e 100644
--- a/docs/production/email-gateway.md
+++ b/docs/production/email-gateway.md
@@ -53,7 +53,7 @@ using an [HTTP reverse proxy][reverse-proxy]).
1 hostname.example.com
```
-1. Login to your Zulip server; the remaining steps all happen there.
+1. Log in to your Zulip server; the remaining steps all happen there.
1. Add `, zulip::postfix_localmail` to `puppet_classes` in
`/etc/zulip/zulip.conf`. A typical value after this change is:
diff --git a/docs/production/mobile-push-notifications.md b/docs/production/mobile-push-notifications.md
index 1dad3d3593..d8556b92f4 100644
--- a/docs/production/mobile-push-notifications.md
+++ b/docs/production/mobile-push-notifications.md
@@ -50,10 +50,10 @@ following. Please follow the instructions carefully:
* [Configure mobile push notifications to always be sent][mobile-notifications-always]
(normally they're only sent if you're idle, which isn't ideal for
this sort of testing).
-* On an Android device, download and login to the
+* On an Android device, download and log in to the
[Zulip Android app](https://play.google.com/store/apps/details?id=com.zulipmobile).
If you were already logged in before configuring the server, you'll
-need to logout first, since the app only registers for push
+need to log out first, since the app only registers for push
notifications on login.
* Hit the home button, so Zulip is running in the background, and then
have **another user** send you a **private message** (By default,
diff --git a/docs/production/security-model.md b/docs/production/security-model.md
index 310f0a5f44..71a628930e 100644
--- a/docs/production/security-model.md
+++ b/docs/production/security-model.md
@@ -35,7 +35,7 @@ announcement).
* Zulip requires CSRF tokens in all interactions with the web API to
prevent CSRF attacks.
-* The preferred way to login to Zulip is using an SSO solution like
+* The preferred way to log in to Zulip is using an SSO solution like
Google Auth, LDAP, or similar, but Zulip also supports password
authentication. See
[the authentication methods documentation](../production/authentication-methods.md)
@@ -184,7 +184,7 @@ strength allowed is controlled by two settings in
* Incoming webhook bots can only send messages into Zulip.
* Outgoing webhook bots and Generic bots can essentially do anything a
non-administrator user can, with a few exceptions (e.g. a bot cannot
- login to the web application, register for mobile push
+ log in to the web application, register for mobile push
notifications, or create other bots).
* API super user bots can send messages that appear to have been sent by
another user. They also have the ability to see the names of all
diff --git a/docs/production/upgrade-or-modify.md b/docs/production/upgrade-or-modify.md
index 121788e086..a6e633bb34 100644
--- a/docs/production/upgrade-or-modify.md
+++ b/docs/production/upgrade-or-modify.md
@@ -36,7 +36,7 @@ to a new Zulip release:
repository](https://github.com/zulip/zulip) using
`tools/build-release-tarball`.
-1. Login to your Zulip and run as root:
+1. Log in to your Zulip and run as root:
```
/home/zulip/deployments/current/scripts/upgrade-zulip zulip-server-VERSION.tar.gz
@@ -458,7 +458,7 @@ git diff 2.0.4 acme-branch
git push origin +acme-branch
```
-* Login to your Zulip server and configure and use
+* Log in to your Zulip server and configure and use
[upgrade-zulip-from-git][] to install the changes; remember to
configure `git_repo_url` to point to your fork on GitHub and run it as
`upgrade-zulip-from-git acme-branch`.
diff --git a/docs/subsystems/analytics.md b/docs/subsystems/analytics.md
index 4662b801ca..42b05e6394 100644
--- a/docs/subsystems/analytics.md
+++ b/docs/subsystems/analytics.md
@@ -162,7 +162,7 @@ The main testing approach for the /stats page UI is manual testing.
For most UI testing, you can visit `/stats/realm/analytics` while
logged in as Iago (this is the server administrator view of stats for
a given realm). The only piece that you can't test here is the "Me"
-buttons, which won't have any data. For those, you can instead login
+buttons, which won't have any data. For those, you can instead log in
as the `shylock@analytics.ds` in the `analytics` realm and visit
`/stats` there (which is only a bit more work). Note that the
`analytics` realm is a shell with no streams, so you'll only want to
diff --git a/docs/subsystems/markdown.md b/docs/subsystems/markdown.md
index 5f2e71057a..41aac159a7 100644
--- a/docs/subsystems/markdown.md
+++ b/docs/subsystems/markdown.md
@@ -70,7 +70,7 @@ this file:
If you're going to manually test some changes in the frontend Markdown
implementation, the easiest way to do this is as follows:
-1. Login to your development server.
+1. Log in to your development server.
2. Stop your Zulip server with Ctrl-C, leaving the browser open.
3. Compose and send the messages you'd like to test. They will be
locally echoed using the frontend rendering.
diff --git a/docs/subsystems/settings.md b/docs/subsystems/settings.md
index fed4e50275..2c1e0949ed 100644
--- a/docs/subsystems/settings.md
+++ b/docs/subsystems/settings.md
@@ -152,6 +152,6 @@ replaced with realm settings:
* Which authentication methods are allowed should probably appear in
both places; in server settings indicating the capabilities of the
server, and in the realm settings indicating which methods the realm
- administrator wants to allow users to login with.
+ administrator wants to allow users to log in with.
[doc-newfeat]: ../tutorials/new-feature-tutorial.md
diff --git a/docs/testing/testing-with-django.md b/docs/testing/testing-with-django.md
index d53993b5ca..e754706626 100644
--- a/docs/testing/testing-with-django.md
+++ b/docs/testing/testing-with-django.md
@@ -317,7 +317,7 @@ endpoints support a JSON interface. Regardless of the interface, an
endpoint test generally follows this pattern:
- Set up the data.
-- Login with `self.login()` or set up an API key.
+- Log in with `self.login()` or set up an API key.
- Use a Zulip test helper to hit the endpoint.
- Assert that the result was either a success or failure.
- Check the data that comes back from the endpoint.
diff --git a/templates/corporate/zephyr-mirror.html b/templates/corporate/zephyr-mirror.html
index c5b31a520b..ea7aa2eeb1 100644
--- a/templates/corporate/zephyr-mirror.html
+++ b/templates/corporate/zephyr-mirror.html
@@ -56,7 +56,7 @@ mirror script instead of using Webathena.
session, and use `/mit/kchen/bin/cont-renew-notify` to continually
renew your Kerberos tickets for up to a week; each week, it will
send you a Zephyr/Zulip letting you know that you need to renew
- your tickets. To do so, login to the server that you setup the
+ your tickets. To do so, log in to the server that you setup the
screen session on and use the following procedure:
diff --git a/templates/two_factor/_wizard_forms.html b/templates/two_factor/_wizard_forms.html
index 534388e9a9..20917cd8a8 100644
--- a/templates/two_factor/_wizard_forms.html
+++ b/templates/two_factor/_wizard_forms.html
@@ -11,7 +11,7 @@
Use this form for entering backup tokens for logging in.
These tokens have been generated for you to print and keep safe. Please
- enter one of these backup tokens to login to your account.
+ enter one of these backup tokens to log in to your account.
{% endif %}
diff --git a/templates/zerver/config_error.html b/templates/zerver/config_error.html
index 7b2c1ab086..637679dc12 100644
--- a/templates/zerver/config_error.html
+++ b/templates/zerver/config_error.html
@@ -12,7 +12,7 @@
{% if error_name == "ldap_error_realm_is_none" %}
{% trans %}
- You are trying to login using LDAP without creating an
+ You are trying to log in using LDAP without creating an
organization first. Please use EmailAuthBackend to create
your organization and then try again.
{% endtrans %}
diff --git a/templates/zerver/emails/followup_day1.source.html b/templates/zerver/emails/followup_day1.source.html
index d5fed4c3e8..43202ad53b 100644
--- a/templates/zerver/emails/followup_day1.source.html
+++ b/templates/zerver/emails/followup_day1.source.html
@@ -22,7 +22,7 @@
{% if ldap_username %}
- {{ _('Username:') }} {{ ldap_username }}
{% else %}
- - {{ _('Use your LDAP account to login') }}
+ - {{ _('Use your LDAP account to log in') }}
{% endif %}
{% else %}
- {{ _('Email:') }} {{ email }}
diff --git a/templates/zerver/emails/followup_day1.txt b/templates/zerver/emails/followup_day1.txt
index 0751d186a7..9b3752f5d9 100644
--- a/templates/zerver/emails/followup_day1.txt
+++ b/templates/zerver/emails/followup_day1.txt
@@ -13,7 +13,7 @@
{% if ldap_username %}
* {{ _('Username:') }} {{ ldap_username }}
{% else %}
-* {{ _('Use your LDAP account to login') }}
+* {{ _('Use your LDAP account to log in') }}
{% endif %}
{% else %}
* {{ _('Email:') }} {{ email }}
diff --git a/templates/zerver/help/change-organization-url.md b/templates/zerver/help/change-organization-url.md
index f469cf04ca..c465647b98 100644
--- a/templates/zerver/help/change-organization-url.md
+++ b/templates/zerver/help/change-organization-url.md
@@ -4,7 +4,7 @@ Zulip supports changing the URL for an organization. Changing the
organization URL is a disruptive operation for users:
* Users will be logged out of existing sessions on the web, mobile and
- desktop apps and need to login again.
+ desktop apps and need to log in again.
* Any [API clients](/api) or [integrations](/integrations) will need
to be updated to point to the new organization URL.
diff --git a/templates/zerver/help/import-from-gitter.md b/templates/zerver/help/import-from-gitter.md
index 31feeab11b..63deefc696 100644
--- a/templates/zerver/help/import-from-gitter.md
+++ b/templates/zerver/help/import-from-gitter.md
@@ -101,7 +101,7 @@ to mark the appropriate users as administrators.
`{github_username}@users.noreply.github.com`.
Since one cannot receive email at those noreply email addresses,
- imported users will need to use GitHub authentication to login to
+ imported users will need to use GitHub authentication to log in to
Zulip and will be unable to receive email notifications until they
[change their Zulip email address](/help/change-your-email-address).
diff --git a/templates/zerver/login.html b/templates/zerver/login.html
index 3269d65a41..da0ca708df 100644
--- a/templates/zerver/login.html
+++ b/templates/zerver/login.html
@@ -33,7 +33,7 @@ page can be easily identified in it's respective JavaScript file. -->
{% if no_auth_enabled %}
No authentication backends are enabled on this
- server yet, so it is impossible to login!
+ server yet, so it is impossible to log in!
See the Zulip
authentication documentation to learn how to configure authentication backends.
diff --git a/templates/zerver/social_auth_select_email.html b/templates/zerver/social_auth_select_email.html
index a44dc18dd0..1a39edb39b 100644
--- a/templates/zerver/social_auth_select_email.html
+++ b/templates/zerver/social_auth_select_email.html
@@ -67,7 +67,7 @@
{% trans %}
- To use one of these to login to Zulip, you must first
+ To use one of these to log in to Zulip, you must first
verify it with GitHub.
{% endtrans %}
diff --git a/zerver/forms.py b/zerver/forms.py
index f99c6960c7..a49db22c96 100644
--- a/zerver/forms.py
+++ b/zerver/forms.py
@@ -346,7 +346,7 @@ class OurAuthenticationForm(AuthenticationForm):
try:
realm = get_realm(subdomain)
except Realm.DoesNotExist:
- logging.warning("User %s attempted to password login to nonexistent subdomain %s",
+ logging.warning("User %s attempted password login to nonexistent subdomain %s",
username, subdomain)
raise ValidationError("Realm does not exist")
@@ -368,7 +368,7 @@ class OurAuthenticationForm(AuthenticationForm):
raise ValidationError(mark_safe(DEACTIVATED_ACCOUNT_ERROR))
if return_data.get("invalid_subdomain"):
- logging.warning("User %s attempted to password login to wrong subdomain %s",
+ logging.warning("User %s attempted password login to wrong subdomain %s",
username, subdomain)
raise ValidationError(mark_safe(WRONG_SUBDOMAIN_ERROR))
diff --git a/zerver/management/commands/export.py b/zerver/management/commands/export.py
index 6a1a0305ab..0226b79e00 100644
--- a/zerver/management/commands/export.py
+++ b/zerver/management/commands/export.py
@@ -26,7 +26,7 @@ class Command(ZulipBaseCommand):
Things that are not exported:
* Confirmation and PreregistrationUser (transient tables)
- * Sessions (everyone will need to login again post-export)
+ * Sessions (everyone will need to log in again post-export)
* Users' passwords and API keys (users will need to use SSO or reset password)
* Mobile tokens for APNS/GCM (users will need to reconnect their mobile devices)
* ScheduledEmail (Not relevant on a new server)
@@ -38,7 +38,7 @@ class Command(ZulipBaseCommand):
* Passwords will not be transferred. They will all need to go
through the password reset flow to obtain a new password (unless
they intend to only use e.g. Google Auth).
- * Users will need to logout and re-login to the Zulip desktop and
+ * Users will need to log out and re-log in to the Zulip desktop and
mobile apps. The apps now all have an option on the login page
where you can specify which Zulip server to use; your users
should enter
.
@@ -65,7 +65,7 @@ class Command(ZulipBaseCommand):
* Use `./manage.py import` to import the realm
* Use `./manage.py reactivate_realm` to reactivate the realm, so
- users can login again.
+ users can log in again.
* Inform the users about the things broken above.
diff --git a/zerver/tests/test_auth_backends.py b/zerver/tests/test_auth_backends.py
index bda1b8aa0a..24d82b7a01 100644
--- a/zerver/tests/test_auth_backends.py
+++ b/zerver/tests/test_auth_backends.py
@@ -815,7 +815,7 @@ class SocialAuthBase(DesktopFlowTestingLib, ZulipTestCase):
* is_signup: Whether we're testing the social flow for
/register (True) or /login (False). This is important
because we need to verify behavior like the
- "Continue to registration" if you try to login using an
+ "Continue to registration" if you try to log in using an
account that doesn't exist but is allowed to signup.
* next: Parameter passed through in production authentication
to redirect the user to (e.g.) the specific page in the webapp
@@ -2385,7 +2385,7 @@ class GitHubAuthBackendTest(SocialAuthBase):
if expect_choose_email_screen:
# As GitHub authenticates multiple email addresses,
# we'll have an additional screen where the user selects
- # which email address to login using (this screen is a
+ # which email address to log in using (this screen is a
# "partial" state of the python-social-auth pipeline).
#
# TODO: Generalize this testing code for use with other
@@ -2795,7 +2795,7 @@ class GitHubAuthBackendTest(SocialAuthBase):
)])
def test_github_unverified_email_with_existing_account(self) -> None:
- # check if a user is denied to login if the user manages to
+ # check if a user is denied to log in if the user manages to
# send an unverified email that has an existing account in
# organisation through `email` GET parameter.
account_data_dict = self.get_account_data_dict(email='hamlet@zulip.com', name=self.name)
@@ -5036,7 +5036,7 @@ class LDAPBackendTest(ZulipTestCase):
self.assertEqual(response.status_code, 302)
self.assertEqual(response.url, reverse('config_error', kwargs={'error_category_name': 'ldap'}))
response = self.client_get(response.url)
- self.assert_in_response('You are trying to login using LDAP '
+ self.assert_in_response('You are trying to log in using LDAP '
'without creating an',
response)
self.assertEqual(warn_log.output, [
diff --git a/zerver/tests/test_signup.py b/zerver/tests/test_signup.py
index 125a7d98cb..616f81f4a7 100644
--- a/zerver/tests/test_signup.py
+++ b/zerver/tests/test_signup.py
@@ -631,7 +631,7 @@ class LoginTest(ZulipTestCase):
result = self.login_with_return(self.example_email("hamlet"), "xxx",
subdomain="invalid")
self.assertEqual(warn_log.output, [
- 'WARNING:root:User hamlet@zulip.com attempted to password login to nonexistent subdomain invalid'
+ 'WARNING:root:User hamlet@zulip.com attempted password login to nonexistent subdomain invalid'
])
self.assertEqual(result.status_code, 404)
self.assert_in_response("There is no Zulip organization hosted at this subdomain.", result)
diff --git a/zerver/views/auth.py b/zerver/views/auth.py
index 006d33f6ee..951bf49d73 100644
--- a/zerver/views/auth.py
+++ b/zerver/views/auth.py
@@ -241,13 +241,13 @@ def login_or_register_remote_user(request: HttpRequest, result: ExternalAuthResu
browser to the appropriate place:
* The logged-in app if the user already has a Zulip account and is
- trying to login, potentially to an initial narrow or page that had been
+ trying to log in, potentially to an initial narrow or page that had been
saved in the `redirect_to` parameter.
* The registration form if is_signup was set (i.e. the user is
trying to create a Zulip account)
* A special `confirm_continue_registration.html` "do you want to
register or try another account" if the user doesn't have a
- Zulip account but is_signup is False (i.e. the user tried to login
+ Zulip account but is_signup is False (i.e. the user tried to log in
and then did social authentication selecting an email address that does
not have a Zulip account in this organization).
* A zulip:// URL to send control back to the mobile or desktop apps if they
diff --git a/zproject/backends.py b/zproject/backends.py
index 1262b1dfe4..6ef1efcb4e 100644
--- a/zproject/backends.py
+++ b/zproject/backends.py
@@ -1184,7 +1184,7 @@ def social_associate_user_helper(backend: BaseAuth, return_data: Dict[str, Any],
first_name = kwargs['details'].get('first_name')
last_name = kwargs['details'].get('last_name')
if all(name is None for name in [full_name, first_name, last_name]) and backend.name != "apple":
- # Apple authentication provides the user's name only the very first time a user tries to login.
+ # Apple authentication provides the user's name only the very first time a user tries to log in.
# So if the user aborts login or otherwise is doing this the second time,
# we won't have any name data. So, this case is handled with the code below
# setting full name to empty string.