add missing translations (#24347)

This commit is contained in:
Erik Jan de Wit 2023-10-27 13:32:16 +02:00 committed by GitHub
parent 384adb9096
commit 487ecd7380
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 15 additions and 8 deletions

View file

@ -172,6 +172,7 @@
"missingAttributes": "No attributes have been defined yet. Click the below button to add attributes, key and value are required for a key pair.", "missingAttributes": "No attributes have been defined yet. Click the below button to add attributes, key and value are required for a key pair.",
"addAttribute": "Add an attribute", "addAttribute": "Add an attribute",
"removeAttribute": "Remove attribute", "removeAttribute": "Remove attribute",
"editUsernameHelp": "If enabled, the username field is editable, readonly otherwise.",
"keyPlaceholder": "Type a key", "keyPlaceholder": "Type a key",
"valuePlaceholder": "Type a value", "valuePlaceholder": "Type a value",
"keyError": "A key must be provided.", "keyError": "A key must be provided.",
@ -587,9 +588,13 @@
"frontchannelUrlInvalid": "Front-channel logout URL is not a valid URL", "frontchannelUrlInvalid": "Front-channel logout URL is not a valid URL",
"accessSettings": "Access settings", "accessSettings": "Access settings",
"rootUrl": "Root URL", "rootUrl": "Root URL",
"rootURLHelp": "Root URL appended to relative URLs",
"validRedirectUri": "Valid redirect URIs", "validRedirectUri": "Valid redirect URIs",
"validRedirectURIsHelp": "Valid URI pattern a browser can redirect to after a successful login. Simple wildcards are allowed such as 'http://example.com/*'. Relative path can be specified too such as /my/relative/path/*. Relative paths are relative to the client root URL, or if none is specified the auth server root URL is used. For SAML, you must set valid URI patterns if you are relying on the consumer service URL embedded with the login request.",
"validPostLogoutRedirectUri": "Valid post logout redirect URIs", "validPostLogoutRedirectUri": "Valid post logout redirect URIs",
"validPostLogoutRedirectURIsHelp": "Valid URI pattern a browser can redirect to after a successful logout. A value of '+' or an empty field will use the list of valid redirect uris. A value of '-' will not allow any post logout redirect uris. Simple wildcards are allowed such as 'http://example.com/*'. Relative path can be specified too such as /my/relative/path/*. Relative paths are relative to the client root URL, or if none is specified the auth server root URL is used.",
"idpInitiatedSsoUrlName": "IDP-Initiated SSO URL name", "idpInitiatedSsoUrlName": "IDP-Initiated SSO URL name",
"unsigned": "Unsigned",
"idpInitiatedSsoUrlNameHelp": "URL fragment name to reference client when you want to do IDP Initiated SSO. Leaving this empty will disable IDP Initiated SSO. The URL you will reference from your browser will be: {server-root}/realms/{realm}/protocol/saml/clients/{client-url-name}", "idpInitiatedSsoUrlNameHelp": "URL fragment name to reference client when you want to do IDP Initiated SSO. Leaving this empty will disable IDP Initiated SSO. The URL you will reference from your browser will be: {server-root}/realms/{realm}/protocol/saml/clients/{client-url-name}",
"idpInitiatedSsoRelayState": "IDP Initiated SSO Relay State", "idpInitiatedSsoRelayState": "IDP Initiated SSO Relay State",
"masterSamlProcessingUrl": "Master SAML Processing URL", "masterSamlProcessingUrl": "Master SAML Processing URL",
@ -2141,8 +2146,13 @@
"PUSHED_AUTHORIZATION_REQUEST_ERROR": { "PUSHED_AUTHORIZATION_REQUEST_ERROR": {
"name": "Pushed authorization request error", "name": "Pushed authorization request error",
"description": "Pushed authorization request error" "description": "Pushed authorization request error"
},
"USER_DISABLED_BY_PERMANENT_LOCKOUT": {
"name": "User disabled by permanent lockout",
"description": "User disabled by permanent lockout"
} }
}, },
"userEventsRegistered": "User events registered",
"eventConfigSuccessfully": "Successfully saved configuration", "eventConfigSuccessfully": "Successfully saved configuration",
"eventConfigError": "Could not save event configuration {{error}}", "eventConfigError": "Could not save event configuration {{error}}",
"deleteEvents": "Clear events", "deleteEvents": "Clear events",

View file

@ -90,10 +90,7 @@ const WebauthnSelect = ({
<FormGroup <FormGroup
label={t(label)} label={t(label)}
labelIcon={ labelIcon={
<HelpItem <HelpItem helpText={t(`${label}Help`)} fieldLabelId={label!} />
helpText={t(`${label}Help`)}
fieldLabelId={`authentication:${label}`}
/>
} }
fieldId={name} fieldId={name}
> >
@ -194,7 +191,7 @@ export const WebauthnPolicy = ({
return ( return (
<PageSection variant="light"> <PageSection variant="light">
{enabled && ( {enabled && (
<Popover bodyContent={t(`authentication-help:${namePrefix}FormHelp`)}> <Popover bodyContent={t(`${namePrefix}FormHelp`)}>
<TextContent className="keycloak__section_intro__help"> <TextContent className="keycloak__section_intro__help">
<Text> <Text>
<QuestionCircleIcon /> {t("webauthnIntro")} <QuestionCircleIcon /> {t("webauthnIntro")}

View file

@ -50,7 +50,7 @@ export const AddMapperForm = ({
<FormGroup <FormGroup
label={t("name")} label={t("name")}
labelIcon={ labelIcon={
<HelpItem helpText={t("addIdpMapperName")} fieldLabelId="name" /> <HelpItem helpText={t("addIdpMapperNameHelp")} fieldLabelId="name" />
} }
fieldId="kc-name" fieldId="kc-name"
isRequired isRequired

View file

@ -56,13 +56,13 @@ export default function NewRealmForm() {
await refreshRealms(); await refreshRealms();
navigate(toDashboard({ realm: fields.realm })); navigate(toDashboard({ realm: fields.realm }));
} catch (error) { } catch (error) {
addError("realm:saveRealmError", error); addError("saveRealmError", error);
} }
}; };
return ( return (
<> <>
<ViewHeader titleKey="realm:createRealm" subKey="realm:realmExplain" /> <ViewHeader titleKey="createRealm" subKey="realmExplain" />
<PageSection variant="light"> <PageSection variant="light">
<FormAccess <FormAccess
isHorizontal isHorizontal