Fix translation of "ssbrowser.html" Web page

Make this page message translatable as other parts of IPA framework.

Fixes: https://pagure.io/freeipa/issue/7640
Reviewed-By: Petr Vobornik <pvoborni@redhat.com>
Reviewed-By: Serhii Tsymbaliuk <stsymbal@redhat.com>
This commit is contained in:
Stanislav Levin 2018-07-12 23:19:04 +03:00 committed by Serhii Tsymbaliuk
parent 6f386f2e24
commit c66cdf0b60
2 changed files with 225 additions and 3 deletions

View File

@ -5,15 +5,53 @@
<title>IPA: Identity Policy Audit</title>
<script type="text/javascript" src="../ui/js/libs/loader.js"></script>
<script type="text/javascript">
var dojoConfig = {
baseUrl: "../ui/js",
has: {
'dojo-firebug': false,
'dojo-debug-messages': true
},
parseOnLoad: false,
async: true,
packages: [
{
name:'dojo',
location:'dojo'
},
{
name: 'freeipa',
location: 'freeipa'
}
]
};
(function() {
var styles = [
'../ui/css/patternfly.css',
'../ui/css/ipa.css'
];
var scripts = [
'../ui/js/libs/jquery.js'
'../ui/js/libs/jquery.js',
'../ui/js/dojo/dojo.js'
];
ipa_loader.scripts(scripts);
ipa_loader.scripts(scripts, function() {
require([
'dojo/dom',
'freeipa/text',
'dojo/domReady!'],
function(dom, text) {
msg = "".concat(
text.get('@i18n:ssbrowser-page.header'),
text.get('@i18n:ssbrowser-page.firefox-header'),
text.get('@i18n:ssbrowser-page.firefox-actions'),
text.get('@i18n:ssbrowser-page.chrome-header'),
text.get('@i18n:ssbrowser-page.chrome-certificate'),
text.get('@i18n:ssbrowser-page.chrome-spnego'),
text.get('@i18n:ssbrowser-page.ie-header'),
text.get('@i18n:ssbrowser-page.ie-actions'),
)
dom.byId('ssbrowser-msg').innerHTML=msg;
});
});
ipa_loader.styles(styles);
})();
</script>
@ -31,7 +69,8 @@
<div class="container-fluid">
<div class="row">
<div class="col-sm-12">
<div class="ssbrowser">
<div class="ssbrowser" id="ssbrowser-msg">
<noscript>
<h1>Browser Kerberos Setup</h1>
<h2>Firefox</h2>
@ -149,6 +188,7 @@
</ol>
</div>
</noscript>
</div>
</div>
</div>

View File

@ -972,6 +972,188 @@ class i18n_messages(Command):
"truncated": _("Query returned more results than the configured size limit. Displaying the first ${counter} results."),
"unselect_all": _("Unselect All"),
},
"ssbrowser-page": {
"header": _(
"<h1>Browser Kerberos Setup</h1>\n"
"\n"
),
"firefox-header": _(
"<h2>Firefox</h2>\n"
"\n"
"<p>\n"
" You can configure Firefox to use Kerberos for "
"Single Sign-on. The following instructions will guide you in "
"configuring your web browser to send your Kerberos "
"credentials to the appropriate Key Distribution Center which "
"enables Single Sign-on.\n"
"</p>\n"
"\n"
),
"firefox-actions": _(
"<ol>\n"
"<li>\n"
"<p>\n"
"<a href=\"ca.crt\" id=\"ca-link\" class=\"btn btn-default\">"
"Import Certificate Authority certificate</a>\n"
"</p>\n"
"<p>\n"
" Make sure you select <b>all three</b> "
"checkboxes.\n"
"</p>\n"
"</li>\n"
"<li>\n"
" In the address bar of Firefox, type <code>"
"about:config</code> to display the list of current "
"configuration options.\n"
"</li>\n"
"<li>\n"
" In the Filter field, type <code>negotiate"
"</code> to restrict the list of options.\n"
"</li>\n"
"<li>\n"
" Double-click the <code>network.negotiate-auth"
".trusted-uris</code> entry to display the Enter string value "
"dialog box.\n"
"</li>\n"
"<li>\n"
" Enter the name of the domain against which "
"you want to authenticate, for example, <code class=\""
"example-domain\">.example.com.</code>\n"
"</li>\n"
"<li><a href=\"../ui/index.html\" id=\"return-link\" class=\""
"btn btn-default\">Return to Web UI</a></li>\n"
"</ol>\n"
"\n"
),
"chrome-header": _(
"<h2>Chrome</h2>\n"
"\n"
"<p>\n"
" You can configure Chrome to use Kerberos for "
"Single Sign-on. The following instructions will guide you in "
"configuring your web browser to send your Kerberos "
"credentials to the appropriate Key Distribution Center which "
"enables Single Sign-on.\n"
"</p>\n"
"\n"
),
"chrome-certificate": _(
"<h3>Import CA Certificate</h3>\n"
"<ol>\n"
"<li>\n"
" Download the <a href=\"ca.crt\">CA "
"certificate</a>. Alternatively, if the host is also an IdM "
"client, you can find the certificate in /etc/ipa/ca.crt.\n"
"</li>\n"
"<li>\n"
" Click the menu button with the <em>Customize "
"and control Google Chrome</em> tooltip, which is by default "
"in the top right-hand corner of Chrome, and click <em>"
"Settings</em>.\n"
"</li>\n"
"<li>\n"
" Click <em>Show advanced settings</em> to "
"display more options, and then click the <em>Manage "
"certificates</em> button located under the HTTPS/SSL heading."
"\n"
"</li>\n"
"<li>\n"
" In the <em>Authorities</em> tab, click the "
"<em>Import</em> button at the bottom.\n"
"</li>\n"
"<li>Select the CA certificate file that you downloaded in the"
" first step.</li>\n"
"</ol>\n"
"\n"
),
"chrome-spnego": _(
"<h3>\n"
" Enable SPNEGO (Simple and Protected GSSAPI "
"Negotiation Mechanism) to Use Kerberos Authentication\n"
" in Chrome\n"
"</h3>\n"
"<ol>\n"
"<li>\n"
" Make sure you have the necessary directory "
"created by running:\n"
"<div><code>\n"
" [root@client]# mkdir -p /etc/opt/chrome/"
"policies/managed/\n"
"</code></div>\n"
"</li>\n"
"<li>\n"
" Create a new <code>/etc/opt/chrome/policies/"
"managed/mydomain.json</code> file with write privileges "
"limited to the system administrator or root, and include the "
"following line:\n"
"<div><code>\n"
" { \"AuthServerWhitelist\": \"*<span "
"class=\"example-domain\">.example.com.</span>\" }\n"
"</code></div>\n"
"<div>\n"
" You can do this by running:\n"
"</div>\n"
"<div><code>\n"
" [root@server]# echo \'{ \""
"AuthServerWhitelist\": \"*<span class=\"example-domain\">"
".example.com.</span>\" }' > /etc/opt/chrome/policies/managed/"
"mydomain.json\n"
"</code></div>\n"
"</li>\n"
"</ol>\n"
"<ol>\n"
"<p>\n"
"<strong>Note:</strong> If using Chromium, use <code>/etc/"
"chromium/policies/managed/</code> instead of <code>/etc/opt/"
"chrome/policies/managed/</code> for the two SPNEGO Chrome "
"configuration steps above.\n"
"</p>\n"
"</ol>\n"
"\n"
),
"ie-header": _(
"<h2>Internet Explorer</h2>\n"
"<p><strong>WARNING:</strong> Internet Explorer is no longer a"
" supported browser.</p>\n"
"<p>\n"
" Once you are able to log into the workstation "
"with your kerberos key you are now able to use that ticket in"
" Internet Explorer.\n"
"</p>\n"
"<p>\n"
),
"ie-actions": _(
"<strong>Log into the Windows machine using an account of your"
" Kerberos realm (administrative domain)</strong>\n"
"</p>\n"
"<p>\n"
"<strong>In Internet Explorer, click Tools, and then click "
"Internet Options.</strong>\n"
"</p>\n"
"<div>\n"
"<ol>\n"
"<li>Click the Security tab</li>\n"
"<li>Click Local intranet</li>\n"
"<li>Click Sites </li>\n"
"<li>Click Advanced </li>\n"
"<li>Add your domain to the list</li>\n"
"</ol>\n"
"<ol>\n"
"<li>Click the Security tab</li>\n"
"<li>Click Local intranet</li>\n"
"<li>Click Custom Level</li>\n"
"<li>Select Automatic logon only in Intranet zone</li>\n"
"</ol>\n"
"\n"
"<ol>\n"
"<li> Visit a kerberized web site using IE (You must use the "
"fully-qualified Domain Name in the URL)</li>\n"
"<li><strong> You are all set.</strong></li>\n"
"</ol>\n"
"</div>\n"
"\n"
),
},
"status": {
"disable": _("Disable"),
"disabled": _("Disabled"),