Replace gendered language in code comments

This commit is contained in:
Tim Donohue
2022-08-17 10:41:29 -05:00
parent a74604647b
commit e6e283a1f2
14 changed files with 19 additions and 19 deletions

View File

@@ -63,7 +63,7 @@ public class RequestItemMetadataStrategy extends RequestItemSubmitterStrategy {
} else {
// Uses the basic strategy to look for the original submitter
author = super.getRequestItemAuthor(context, item);
// Is the author or his email null, so get the help desk or admin name and email
// Is the author or their email null. If so get the help desk or admin name and email
if (null == author || null == author.getEmail()) {
String email = null;
String name = null;

View File

@@ -59,7 +59,7 @@ public class LicenseUtils {
* {6} the eperson object that will be formatted using the appropriate
* LicenseArgumentFormatter plugin (if defined)<br>
* {x} any addition argument supplied wrapped in the
* LicenseArgumentFormatter based on his type (map key)
* LicenseArgumentFormatter based on its type (map key)
*
* @param locale Formatter locale
* @param collection collection to get license from

View File

@@ -718,7 +718,7 @@ public class Context implements AutoCloseable {
}
/**
* Restore the user bound to the context and his special groups
* Restore the user bound to the context and their special groups
*
* @throws IllegalStateException if no switch was performed before
*/

View File

@@ -187,7 +187,7 @@ public class DatasetTimeGenerator extends DatasetGenerator {
cal2.clear(Calendar.HOUR);
cal1.clear(Calendar.HOUR_OF_DAY);
cal2.clear(Calendar.HOUR_OF_DAY);
//yet i know calendar just won't clear his hours
//yet i know calendar just won't clear its hours
cal1.set(Calendar.HOUR_OF_DAY, 0);
cal2.set(Calendar.HOUR_OF_DAY, 0);
}

View File

@@ -100,7 +100,7 @@ public class WorkflowRequirementsServiceImpl implements WorkflowRequirementsServ
//Then remove the current user from the inProgressUsers
inProgressUserService.delete(context, inProgressUserService.findByWorkflowItemAndEPerson(context, wfi, user));
//Make sure the removed user has his custom rights removed
//Make sure the removed user has their custom rights removed
xmlWorkflowService.removeUserItemPolicies(context, wfi.getItem(), user);
Workflow workflow = workflowFactory.getWorkflow(wfi.getCollection());

View File

@@ -447,7 +447,7 @@ public class XmlWorkflowServiceImpl implements XmlWorkflowService {
enteredNewStep);
}
} else if (enteredNewStep) {
// If the user finished his/her step, we keep processing until there is a UI step action or no
// If the user finished their step, we keep processing until there is a UI step action or no
// step at all
nextStep = workflow.getNextStep(c, wfi, currentStep, currentOutcome.getResult());
c.turnOffAuthorisationSystem();
@@ -938,7 +938,7 @@ public class XmlWorkflowServiceImpl implements XmlWorkflowService {
authorizeService.removeEPersonPolicies(context, bitstream, e);
}
}
// Ensure that the submitter always retains his resource policies
// Ensure that the submitter always retains their resource policies
if (e.getID().equals(item.getSubmitter().getID())) {
grantSubmitterReadPolicies(context, item);
}

View File

@@ -92,7 +92,7 @@ public class PoolTaskServiceImpl implements PoolTaskService {
return poolTask;
} else {
//If the user has a is processing or has finished the step for a workflowitem, there is no need to look
// for pooltasks for one of his
// for pooltasks for one of their
//groups because the user already has the task claimed
if (inProgressUserService.findByWorkflowItemAndEPerson(context, workflowItem, ePerson) != null) {
return null;

View File

@@ -18,11 +18,11 @@ import org.dspace.core.Context;
import org.springframework.stereotype.Component;
/**
* The canChangePassword feature. It can be used to verify if the user can change his password.
* The canChangePassword feature. It can be used to verify if the user can change their password.
*/
@Component
@AuthorizationFeatureDocumentation(name = CanChangePasswordFeature.NAME,
description = "It can be used to verify if the user can change his password")
description = "It can be used to verify if the user can change their password")
public class CanChangePasswordFeature implements AuthorizationFeature {
public static final String NAME = "canChangePassword";

View File

@@ -29,7 +29,7 @@ public class SearchFilterToAppliedFilterConverter {
AuthorityValue authorityValue = null;
if (searchFilter.hasAuthorityOperator()) {
// FIXME this is obviously wrong as it assumes that the authorityValueService is able to retrieve the label
// for each Authority. Indeed, the AuthorityValueService regardless to his name is specific of the
// for each Authority. Indeed, the AuthorityValueService regardless of its name is specific of the
// "SOLRAuthority" implementation and should not have a prominent role.
// Moreover, it is not possible to discover which authority is responsible for the value selected in the
// facet as the authority is bind at the metadata level and so a facet could contains values from multiple

View File

@@ -34,7 +34,7 @@ import org.springframework.security.core.Authentication;
import org.springframework.stereotype.Component;
/**
* An authenticated user is allowed to view, update or delete his or her own data. This {@link RestPermissionEvaluatorPlugin}
* An authenticated user is allowed to view, update or delete their own data. This {@link RestPermissionEvaluatorPlugin}
* implements that requirement.
*/
@Component

View File

@@ -30,7 +30,7 @@ import org.springframework.security.core.Authentication;
import org.springframework.stereotype.Component;
/**
* An authenticated user is allowed to interact with a pool task only if it is in his list.
* An authenticated user is allowed to interact with a pool task only if it is in their list.
*
* @author Andrea Bollini (andrea.bollini at 4science.it)
*/

View File

@@ -29,7 +29,7 @@ import org.springframework.stereotype.Component;
/**
*
* An authenticated user is allowed to view, update or delete his or her own
* An authenticated user is allowed to view, update or delete their own
* data. This {@link RestPermissionEvaluatorPlugin} implements that requirement.
*
* @author Luca Giamminonni (luca.giamminonni at 4science.it)

View File

@@ -4165,7 +4165,7 @@ public class DiscoveryRestControllerIT extends AbstractControllerIntegrationTest
context.restoreAuthSystemState();
//** WHEN **
// each submitter, including the administrator should see only her submission
// each submitter, including the administrator should see only their submission
String submitterToken = getAuthToken(submitter.getEmail(), password);
String adminToken = getAuthToken(admin.getEmail(), password);

View File

@@ -520,7 +520,7 @@ public class ResearcherProfileRestRepositoryIT extends AbstractControllerIntegra
}
/**
* Verify that a user can delete his profile using the delete endpoint.
* Verify that a user can delete their profile using the delete endpoint.
*
* @throws Exception
*/
@@ -558,7 +558,7 @@ public class ResearcherProfileRestRepositoryIT extends AbstractControllerIntegra
}
/**
* Verify that a user can hard delete his profile using the delete endpoint.
* Verify that a user can hard delete their profile using the delete endpoint.
*
* @throws Exception
*/
@@ -667,7 +667,7 @@ public class ResearcherProfileRestRepositoryIT extends AbstractControllerIntegra
}
/**
* Verify that an user can delete his profile using the delete endpoint even if
* Verify that an user can delete their profile using the delete endpoint even if
* was created by an admin.
*
* @throws Exception
@@ -859,7 +859,7 @@ public class ResearcherProfileRestRepositoryIT extends AbstractControllerIntegra
}
/**
* Verify that an user can change the visibility of his profile using the patch
* Verify that an user can change the visibility of their profile using the patch
* endpoint even if was created by an admin.
*
* @throws Exception