Skip to content

Commit 73b2e2c

Browse files
cookiell546thestinger
authored andcommitted
remove aria-label on <span>
Despite Google's developer documentation style guide for [UI navigation](https://developers.google.com/style/accessibility#ui-navigat ion), the aria-label was probably not the right approach. Screen readers would have inconsistent support anyway. ``` perl -0777 -i -pe 's!<span\W*aria-label="and then">\W*(.)\W*<\/span>!\1!msg' static/*.html static/**/*.html ```` This resolves issues detected by a Nu Html Checker update: #1316
1 parent 5d7b773 commit 73b2e2c

File tree

6 files changed

+90
-120
lines changed

6 files changed

+90
-120
lines changed

static/faq.html

Lines changed: 18 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -636,9 +636,8 @@ <h3><a href="#clipboard">Can apps spy on the clipboard in the background or inje
636636

637637
<p>As of Android 12, the user is notified when an app reads clipboard content
638638
which was set by a different app. This notice is enabled by default and can be
639-
toggled under <b>Settings&#160;<span aria-label="and then">></span>
640-
Security &amp; privacy&#160;<span aria-label="and then">></span> Privacy controls&#160;<span
641-
aria-label="and then">></span> Show clipboard access</b>.</p>
639+
toggled under <b>Settings&#160;>
640+
Security &amp; privacy&#160;> Privacy controls&#160;> Show clipboard access</b>.</p>
642641
</article>
643642

644643
<article id="hardware-identifiers">
@@ -898,9 +897,9 @@ <h3><a href="#default-connections">What kind of connections do the OS and bundle
898897
HTTPS-based time updates in order to blend in with other devices.</p>
899898

900899
<p>Network time can be disabled with the toggle at
901-
<b>Settings&#160;<span aria-label="and then">></span>
902-
System&#160;<span aria-label="and then">></span> Date &amp;
903-
time&#160;<span aria-label="and then">></span> Set time automatically</b>.
900+
<b>Settings&#160;>
901+
System&#160;> Date &amp;
902+
time&#160;> Set time automatically</b>.
904903
Unlike AOSP or the stock OS on the supported devices, GrapheneOS stops making
905904
network time connections when using network time is disabled rather than just
906905
not setting the clock based on it. The time zone is still obtained directly
@@ -931,8 +930,8 @@ <h3><a href="#default-connections">What kind of connections do the OS and bundle
931930
portals without the user turning off their VPN.</p>
932931

933932
<p>You can change the connectivity check URLs via the
934-
<b>Settings&#160;<span aria-label="and then">></span> Network &amp;
935-
internet&#160;<span aria-label="and then">></span> Internet
933+
<b>Settings&#160;> Network &amp;
934+
internet&#160;> Internet
936935
connectivity check</b> setting. At the moment, it can be toggled between
937936
the <b>GrapheneOS server</b> (default), the <b>Standard (Google) server</b>
938937
used by billions of other Android devices or <b>Off</b>.</p>
@@ -1051,8 +1050,8 @@ <h3><a href="#default-connections">What kind of connections do the OS and bundle
10511050
reverse proxy adds to that since it's unable to decrypt the
10521051
provisioned keys.</p>
10531052

1054-
<p>A setting is added at <b>Settings&#160;<span aria-label="and then">></span>
1055-
Network &amp; internet&#160;<span aria-label="and then">></span>
1053+
<p>A setting is added at <b>Settings&#160;>
1054+
Network &amp; internet&#160;>
10561055
Attestation key provisioning</b> for switching to directly using the
10571056
Google service if you prefer.</p>
10581057

@@ -1134,8 +1133,7 @@ <h3><a href="#other-connections">Which additional connections can the OS make
11341133
as part of Widevine provisioning. This is another form of key provisioning for
11351134
per-app keys that are used when playing DRM protected media. DRM support is
11361135
enabled in the OS by default but we don't include any apps using it by default,
1137-
since it's disabled in Vanadium. A setting is added at <b>Settings&#160;<span
1138-
aria-label="and then">></span> Network &amp; Internet&#160;<span aria-label="and then">></span>
1136+
since it's disabled in Vanadium. A setting is added at <b>Settings&#160;> Network &amp; Internet&#160;>
11391137
Widevine provisioning</b> for switching to directly using the Google service if
11401138
you prefer.</p>
11411139

@@ -1162,7 +1160,7 @@ <h3><a href="#other-connections">Which additional connections can the OS make
11621160
configuration but most leave it at the default of supl.google.com. By default,
11631161
GrapheneOS overrides the carrier/fallback SUPL server and uses the
11641162
supl.grapheneos.org proxy. GrapheneOS adds a toggle for configuring SUPL in
1165-
<b>Settings&#160;<span aria-label="and then">></span> Location</b> where you
1163+
<b>Settings&#160;> Location</b> where you
11661164
can choose between the default <b>GrapheneOS proxy</b> supl.grapheneos.org,
11671165
the <b>Standard server</b> (carrier/fallback) or turning it <b>Off</b>
11681166
completely. GrapheneOS also disables sending IMSI and phone number as part of
@@ -1270,8 +1268,8 @@ <h3><a href="#custom-dns">How do I use a custom DNS server?</a></h3>
12701268

12711269
<p>It isn't possible to directly override the DNS servers provided by the
12721270
network via DHCP. Instead, use the Private DNS feature in
1273-
<b>Settings&#160;<span aria-label="and then">></span> Network &amp;
1274-
internet&#160;<span aria-label="and then">></span> Private DNS</b> to set the
1271+
<b>Settings&#160;> Network &amp;
1272+
internet&#160;> Private DNS</b> to set the
12751273
hostname of a DNS-over-TLS server. It needs to have a valid certificate such as a
12761274
free certificate from Let's Encrypt. The OS will look up the Private DNS hostname
12771275
via the network provided DNS servers and will then force all other DNS requests
@@ -1346,8 +1344,8 @@ <h3><a href="#private-dns-visited">Does DNS-over-TLS (Private DNS) hide which si
13461344
<article id="vpn-support">
13471345
<h3><a href="#vpn-support">What kind of VPN and Tor support is available?</a></h3>
13481346

1349-
<p>VPNs can be configured under <b>Settings&#160;<span aria-label="and then">></span>
1350-
Network &amp; internet&#160;<span aria-label="and then">></span> VPN</b>.
1347+
<p>VPNs can be configured under <b>Settings&#160;>
1348+
Network &amp; internet&#160;> VPN</b>.
13511349
Support for the following protocols is included: IKEv2/IPSec MSCHAPv2,
13521350
IKEv2/IPSec PSK and IKEv2/IPSec RSA. Apps can also provide userspace VPN
13531351
implementations. The only apps we can recommend are the official WireGuard
@@ -1379,8 +1377,7 @@ <h3><a href="#network-monitoring">Can apps monitor network connections or statis
13791377
VPN service by the user. Apps cannot normally access network stats and cannot
13801378
directly request access to them. However, app-based stats can be explicitly
13811379
granted by users as part of access to app usage stats in
1382-
<b>Settings&#160;<span aria-label="and then">></span> Apps&#160;<span
1383-
aria-label="and then">></span> Special app access&#160;<span aria-label="and then">></span>
1380+
<b>Settings&#160;> Apps&#160;> Special app access&#160;>
13841381
Usage access</b>.</p>
13851382

13861383
<p>This was previously part of the GrapheneOS privacy improvements, but became a
@@ -1618,7 +1615,7 @@ <h3><a href="#file-transfer">How do I transfer files to another device?</a></h3>
16181615
interfere with this use case at all. If you've changed it to a stricter value
16191616
such as completely disallowing USB-C data, it can be changed back to the default
16201617
"Charging-only when locked" value in
1621-
<b>Settings&#160;<span aria-label="and then">></span> Security&#160;<span aria-label="and then">></span> Exploit protection&#160;<span aria-label="and then">></span> USB-C port</b>.</p>
1618+
<b>Settings&#160;> Security&#160;> Exploit protection&#160;> USB-C port</b>.</p>
16221619

16231620
<p>To use an external drive, plug it into the phone and use the system file
16241621
manager to copy files to and from it.</p>
@@ -1629,8 +1626,7 @@ <h3><a href="#file-transfer">How do I transfer files to another device?</a></h3>
16291626
to transfer files between macOS and Android. After plugging in the phone to the
16301627
computer, there will be a notification showing the current USB mode with
16311628
charging as the default. Pressing the notification acts as a shortcut to
1632-
<b>Settings&#160;<span aria-label="and then">></span> Connected devices&#160;<span
1633-
aria-label="and then">></span> USB</b>. You can enable <b>File Transfer</b> (MTP)
1629+
<b>Settings&#160;> Connected devices&#160;> USB</b>. You can enable <b>File Transfer</b> (MTP)
16341630
or <b>PTP</b> with this menu. It will provide read/write access to the entire
16351631
profile home directory, i.e. the top-level directory named after the device in
16361632
the system file manager which does not include internal app data. Due to needing

static/features.html

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -642,8 +642,8 @@ <h3><a href="#sensors-permission-toggle">Sensors permission toggle</a></h3>
642642
enabled by default. When an app attempts to access sensors and receives zeroed
643643
data due to being denied, GrapheneOS creates a notification that can be
644644
easily disabled. The Sensors permission can be set to be disabled by default
645-
for user installed apps in <b>Settings&#160;<span aria-label="and then">></span>
646-
Security &amp; privacy&#160;<span aria-label="and then">></span>
645+
for user installed apps in <b>Settings&#160;>
646+
Security &amp; privacy&#160;>
647647
More security &amp; privacy</b>.</p>
648648
</section>
649649

@@ -772,8 +772,8 @@ <h3><a href="#private-screenshots">Private screenshots</a></h3>
772772

773773
<p>On Android, each screenshot includes an EXIF Software tag with detailed OS
774774
build/version information (<code>android.os.Build.DISPLAY</code>). It's the
775-
same value shown at <b>Settings&#160;<span aria-label="and then">></span>
776-
About device&#160;<span aria-label="and then">></span> Build number</b>. This
775+
same value shown at <b>Settings&#160;>
776+
About device&#160;> Build number</b>. This
777777
leaks the OS, OS version and also usually the device family/model since builds are
778778
specific to a family of devices. GrapheneOS completely disables this
779779
tag.</p>
@@ -784,8 +784,8 @@ <h3><a href="#private-screenshots">Private screenshots</a></h3>
784784
isn't visible to the user. The date and time are already included in the file
785785
name of the screenshot which is fully visible to the user and can be easily
786786
modified by them without a third-party tool. GrapheneOS includes a toggle for
787-
turning this metadata back on in <b>Settings&#160;<span aria-label="and then">></span>
788-
Security &amp; privacy&#160;<span aria-label="and then">></span>
787+
turning this metadata back on in <b>Settings&#160;>
788+
Security &amp; privacy&#160;>
789789
More security &amp; privacy</b> since some users may find it to be useful.</p>
790790
</section>
791791

@@ -958,9 +958,7 @@ <h3><a href="#duress">Duress PIN/Password</a></h3>
958958
with any such prompt in the OS).</p>
959959

960960
<p>The wipe does not require a reboot and cannot be interrupted. It can be set
961-
up at <b>Settings&#160;<span aria-label="and then">></span> Security &amp; privacy&#160;<span
962-
aria-label="and then">></span> Device unlock&#160;<span
963-
aria-label="and then">></span> Duress Password</b> in the owner profile. Duress
961+
up at <b>Settings&#160;> Security &amp; privacy&#160;> Device unlock&#160;> Duress Password</b> in the owner profile. Duress
964962
PIN is solely used for PIN entry and duress password is solely used for password
965963
entry. Both a duress PIN and password are mandatory to enable the feature to
966964
account for different profiles that may have different unlock methods. Duress
@@ -1353,11 +1351,10 @@ <h3><a href="#log-viewer-and-crash-reporting">Log viewer and user-facing crash r
13531351
search. Users can copy, share or save the currently shown logs to a file. A
13541352
description can be added to document why the logs were captured.</p>
13551353

1356-
<p>Overall system logs can be accessed at <b>Settings&#160;<span aria-label="and then">></span>
1357-
System&#160;<span aria-label="and then">></span> View logs</b>. Per-app logs can
1358-
be accessed at <b>Settings&#160;<span aria-label="and then">></span>
1359-
Apps&#160;<span aria-label="and then">></span> App name&#160;<span
1360-
aria-label="and then">></span> View logs</b>.</p>
1354+
<p>Overall system logs can be accessed at <b>Settings&#160;>
1355+
System&#160;> View logs</b>. Per-app logs can
1356+
be accessed at <b>Settings&#160;>
1357+
Apps&#160;> App name&#160;> View logs</b>.</p>
13611358

13621359
<p>We implement user-facing crash reporting tied to our log viewer for OS and
13631360
app crashes, greatly improving upon the very limited user-facing crash reporting
@@ -1376,9 +1373,9 @@ <h3><a href="#log-viewer-and-crash-reporting">Log viewer and user-facing crash r
13761373
including base OS apps, but too many user installed apps have latent memory
13771374
corruption bugs and we need to provide the option to work around them.</p>
13781375

1379-
<p>Users can enable more system crash reporting via <b>Settings&#160;<span aria-label="and then">></span>
1380-
Security &amp; privacy&#160;<span aria-label="and then">></span>
1381-
More security &amp; privacy&#160;<span aria-label="and then">></span>
1376+
<p>Users can enable more system crash reporting via <b>Settings&#160;>
1377+
Security &amp; privacy&#160;>
1378+
More security &amp; privacy&#160;>
13821379
Notify about system process crashes</b>. We don't enable reporting all kernel or
13831380
system process crashes by default since we can't manage triaging and
13841381
investigating every single Android OS bug causing a crash. We're focused on the
@@ -1438,7 +1435,7 @@ <h3><a href="#other-features">Other features</a></h3>
14381435
list of all user-created directories (this is allowed on Android). The list of
14391436
files is hidden from such apps on both Android and GrapheneOS.</li>
14401437
<li>Screenshot shutter sound is toggleable using the <b>Tap &amp; click
1441-
sounds</b> option in <b>Settings&#160;<span aria-label="and then">></span>
1438+
sounds</b> option in <b>Settings&#160;>
14421439
Sound &amp; vibration</b> while still following the standard method of
14431440
putting the device on vibration/silent mode to turn off the screenshot shutter
14441441
sound.</li>

static/install/cli.html

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -172,12 +172,11 @@ <h2><a href="#enabling-oem-unlocking">Enabling OEM unlocking</a></h2>
172172

173173
<p>OEM unlocking needs to be enabled from within the operating system.</p>
174174

175-
<p>Enable the developer options menu by going to <b>Settings&#160;<span
176-
aria-label="and then">></span> About phone/tablet</b> and repeatedly
175+
<p>Enable the developer options menu by going to <b>Settings&#160;> About phone/tablet</b> and repeatedly
177176
pressing the <b>Build number</b> menu entry until developer mode is enabled.</p>
178177

179-
<p>Next, go to <b>Settings&#160;<span aria-label="and then">></span>
180-
System&#160;<span aria-label="and then">></span> Developer options</b> and
178+
<p>Next, go to <b>Settings&#160;>
179+
System&#160;> Developer options</b> and
181180
toggle on the <b>OEM unlocking</b> setting. On device model variants (SKUs) which
182181
support being sold as locked devices by carriers, enabling <b>OEM unlocking</b>
183182
requires internet access so that the stock OS can check if the device was sold as

static/install/web.html

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -175,12 +175,11 @@ <h2><a href="#enabling-oem-unlocking">Enabling OEM unlocking</a></h2>
175175

176176
<p>OEM unlocking needs to be enabled from within the operating system.</p>
177177

178-
<p>Enable the developer options menu by going to <b>Settings&#160;<span
179-
aria-label="and then">></span> About phone/tablet</b> and repeatedly
178+
<p>Enable the developer options menu by going to <b>Settings&#160;> About phone/tablet</b> and repeatedly
180179
pressing the <b>Build number</b> menu entry until developer mode is enabled.</p>
181180

182-
<p>Next, go to <b>Settings&#160;<span aria-label="and then">></span>
183-
System&#160;<span aria-label="and then">></span> Developer options</b> and
181+
<p>Next, go to <b>Settings&#160;>
182+
System&#160;> Developer options</b> and
184183
toggle on the <b>OEM unlocking</b> setting. On device model variants (SKUs) which
185184
support being sold as locked devices by carriers, enabling <b>OEM unlocking</b>
186185
requires internet access so that the stock OS can check if the device was sold as

0 commit comments

Comments
 (0)