From 6968581e5ba7846738cb2aff51d5891c9387f7eb Mon Sep 17 00:00:00 2001 From: McMatts Date: Thu, 3 Mar 2022 14:38:27 -0500 Subject: [PATCH] i18n admin strings --- .../components/customize/auth-settings.hbs | 107 +++++++++--------- gui/public/i18n/en-US.json | 90 +++++++++++---- 2 files changed, 122 insertions(+), 75 deletions(-) diff --git a/gui/app/templates/components/customize/auth-settings.hbs b/gui/app/templates/components/customize/auth-settings.hbs index ed235616..b28b0241 100644 --- a/gui/app/templates/components/customize/auth-settings.hbs +++ b/gui/app/templates/components/customize/auth-settings.hbs @@ -37,64 +37,63 @@ {{#if isKeycloakProvider}}
- + {{focus-input id="keycloak-url" type="text" value=keycloakConfig.url class=(if KeycloakUrlError "form-control is-invalid" "form-control")}} e.g. http://localhost:8888/auth
- + {{input id="keycloak-realm" type="text" value=keycloakConfig.realm class=(if KeycloakRealmError "form-control is-invalid" "form-control")}} e.g. main
- + {{textarea id="keycloak-publicKey" type="text" value=keycloakConfig.publicKey rows=7 class=(if KeycloakPublicKeyError "form-control is-invalid" "form-control")}} - Copy the RSA Public Key from Realm Settings → Keys + {{localize 'auth_keylcloak_pk_explain'}}
- + {{input id="keycloak-clientId" type="text" value=keycloakConfig.clientId class=(if KeycloakClientIdError "form-control is-invalid" "form-control")}} e.g. account
- + {{input id="keycloak-group" type="text" value=keycloakConfig.group class="form-control"}} - If you want to sync users in a particular Group (e.g. "Documize Community Users"), provide the Group ID (e.g. 511d8b61-1ec8-45f6-bc8d-5de64d54c9d2) + {{localize 'auth_keycloak_group_explain'}}
- + {{input id="keycloak-admin-user" type="text" value=keycloakConfig.adminUser class=(if KeycloakAdminUserError "form-control is-invalid" "form-control")}} - Used to connect with Keycloak and sync users with Documize (create user under Master Realm and assign 'view-users' role - against Realm specified above) + {{localize 'auth_keycloak_username_explain'}}
- + {{input id="keycloak-admin-password" type="password" value=keycloakConfig.adminPassword class=(if KeycloakAdminPasswordError "form-control is-invalid" "form-control")}} - Used to connect with Keycloak and sync users with Documize + {{localize 'auth_keycloak_password_explain'}}
- + {{x-toggle value=keycloakConfig.disableLogout size="medium" theme="light" onToggle=(action (mut keycloakConfig.disableLogout))}}
- + {{x-toggle value=keycloakConfig.defaultPermissionAddSpace size="medium" theme="light" onToggle=(action (mut keycloakConfig.defaultPermissionAddSpace))}}
{{/if}} {{#if isLDAPProvider}}
- + {{focus-input id="ldap-host" type="text" value=ldapConfig.serverHost class=(if ldapErrorServerHost "form-control is-invalid" "form-control")}} - IP or host address, e.g. ldap.example.org, 127.0.0.1 + {{localize 'auth_ldap_server_explain'}}
- + {{input id="ldap-port" type="number" value=ldapConfig.serverPort class=(if ldapErrorServerPort "form-control is-invalid" "form-control")}} - Port number, e.g. 389 + {{localize 'auth_ldap_port_explain'}}
- +
- + {{input id="ldap-baseDN" type="text" value=ldapConfig.baseDN class="form-control"}} - Starting point for search filters, e.g. ou=users,dc=example,dc=com + {{localize 'auth_ldap_base_explain'}}
- + {{input id="ldap-bindDN" type="text" value=ldapConfig.bindDN class=(if ldapErrorBindDN "form-control is-invalid" "form-control")}} - login credentials for LDAP server + {{localize 'auth_ldap_bind_explain'}}
- + {{input id="ldap-bindPassword" type="password" value=ldapConfig.bindPassword class=(if ldapErrorBindPassword "form-control is-invalid" "form-control")}} - login credentials for LDAP server + {{localize 'auth_ldap_bind_explain'}}
- + {{input id="ldap-userFilter" type="text" value=ldapConfig.userFilter class=(if ldapErrorNoFilter "form-control is-invalid" "form-control")}} - Search filter for finding users, e.g. (|(objectClass=person)(objectClass=user)(objectClass=inetOrgPerson)) - Specify User Filter and/or Group Filter + {{localize 'auth_ldap_filter_user_explain1'}} + {{localize 'auth_ldap_filter_user_explain2'}}
- + {{input id="ldap-groupFilter" type="text" value=ldapConfig.groupFilter class=(if ldapErrorNoFilter "form-control is-invalid" "form-control")}} - Search filter for finding users via groups, e.g. (&(objectClass=group)(|(cn=ship_crew)(cn=admin_staff))) + {{localize 'auth_ldap_filter_group_explain'}}
- + {{input id="ldap-attributeUserRDN" type="text" value=ldapConfig.attributeUserRDN class=(if ldapErrorAttributeUserRDN "form-control is-invalid" "form-control")}} - Username/login attribute, e.g. uid in LDAP, sAMAccountName in Active Directory - User Attributes used to retreive data when using User Filter + {{localize 'auth_ldap_rdn_explain1'}} + {{localize 'auth_ldap_rdn_explain2'}}
- + {{input id="ldap-attributeUserFirstname" type="text" value=ldapConfig.attributeUserFirstname class=(if ldapErrorAttributeUserFirstname "form-control is-invalid" "form-control")}} - Firstname attribute, e.g. givenName + {{localize 'auth_ldap_firstname_explain'}}
- + {{input id="ldap-attributeUserLastname" type="text" value=ldapConfig.attributeUserLastname class=(if ldapErrorAttributeUserLastname "form-control is-invalid" "form-control")}} - Lastname attribute, e.g. sn + {{localize 'auth_ldap_lastname_explain'}}
- + {{input id="ldap-attributeUserEmail" type="text" value=ldapConfig.attributeUserEmail class=(if ldapErrorAttributeUserEmail "form-control is-invalid" "form-control")}} - Email attribute, e.g. mail + {{localize 'auth_ldap_email_explain'}}
- + {{input id="ldap-attributeGroupMember" type="text" value=ldapConfig.attributeGroupMember class=(if ldapErrorAttributeGroupMember "form-control is-invalid" "form-control")}} - Attribute that identifies individual group member, e.g. member or uniqueMember - Group Attributes used to retreive data when using Group Filter + {{localize 'auth_ldap_group_explain1'}} + {{localize 'auth_ldap_group_explain2'}}
- + {{x-toggle value=ldapConfig.disableLogout size="medium" theme="light" onToggle=(action (mut ldapConfig.disableLogout))}}
- + {{x-toggle value=ldapConfig.defaultPermissionAddSpace size="medium" theme="light" onToggle=(action (mut ldapConfig.defaultPermissionAddSpace))}}
- + {{x-toggle value=ldapConfig.allowFormsAuth size="medium" theme="light" onToggle=(action (mut ldapConfig.allowFormsAuth))}} - Enable login via LDAP and regular Documize email/password (useful for testing LDAP) + {{localize 'auth_dual_login_explain'}}
- {{ui/ui-button color=constants.Color.Yellow light=true label="Test →" onClick=(action "onLDAPPreview")}} + {{ui/ui-button color=constants.Color.Yellow light=true label=(localize 'test') onClick=(action "onLDAPPreview")}} {{ui/ui-button-gap}} {{/if}} {{#if isCASProvider}}
- + {{focus-input id="cas-url" type="text" value=casConfig.url class=(if casErrorUrl "form-control is-invalid" "form-control")}} - e.g. http://localhost:8888/auth + {{localize 'auth_cas_url_explain'}}
- + {{focus-input id="cas-redirect-url" type="text" value=casConfig.redirectUrl class=(if casErrorRedirectUrl "form-control is-invalid" "form-control")}} - e.g. http://DocumizeURL/auth/cas + {{localize 'auth_cas_back_url_explain'}}
{{/if}} @@ -192,19 +191,19 @@ {{#if (gt keycloakFailure.length 0)}} -

Keycloak connection failed: {{keycloakFailure}}

+

{{localize 'error'}} :: {{keycloakFailure}}

{{/if}}