ui: Splitting up the translations file into folder structure (#10093)

This commit is contained in:
Kenia 2021-04-26 11:20:29 -04:00 committed by GitHub
parent 65d73771a5
commit 48dd5dd1de
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 266 additions and 282 deletions

View File

@ -47,7 +47,7 @@ module.exports = function(/* environment */) {
* @type {Boolean}
* @default "false"
*/
wrapTranslationsWithNamespace: false,
wrapTranslationsWithNamespace: true,
/**
* Cause a build error if ICU argument mismatches are detected between translations

View File

@ -0,0 +1,63 @@
brand:
consul: Consul
terraform: Terraform
nomad: Nomad
vault: Vault
aws: AWS
kubernetes: Kubernetes
jwt: JWT
oidc: OIDC
ui:
remove: Remove {item}
filtered-by: Filtered by {item}
name: Name
creation: Creation
maxttl: Max TTL
consul:
name: Name
passing: Passing
warning: Warning
critical: Critical
registered: Registered
not-registered: Not Registered
empty: No checks
tags: Tags
service: Service
gateway: Gateway
mesh: Mesh
ingress-gateway: Ingress Gateway
terminating-gateway: Terminating Gateway
mesh-gateway: Mesh Gateway
status: Health Status
service-name: Service Name
node-name: Node Name
accessorid: AccessorID
datacenter: Datacenter
localbindaddress: Local Bind Address
localbindport: Local Bind Port
destinationname: Destination Name
sourcename: Source Name
displayname: Display Name
search:
search: Search
searchproperty: Search Across
source: Source
critical: Failing
in-mesh: In service mesh
not-in-mesh: Not in service mesh
sort:
alpha:
asc: A to Z
desc: Z to A
numeric:
asc: Ascending
desc: Descending
age:
asc: Oldest to Newest
desc: Newest to Oldest
duration:
asc: Longest to shortest
desc: Shortest to longest
status:
asc: Unhealthy to Healthy
desc: Healthy to Unhealthy

View File

@ -0,0 +1,7 @@
skip_to_content: Skip to Content
toggle_menu: Toggle Menu
# landmark aria-labels - only screen read, so potentially included with
# screenreader landmarks/phrases i.e. Main Navigation for nav elements and
# therefore potentially do not need the word 'navigation' adding to them
main: Main
complementary: Complementary

View File

@ -0,0 +1,153 @@
service:
search-bar:
kind: Service Type
in-mesh: In service mesh
not-in-mesh: Not in service mesh
upstream:
search-bar:
instance:
name: Type
service-instance:
search-bar:
sort:
name:
name: Service Name
health-check:
search-bar:
kind:
name: Kind
options:
service: Service Check
node: Node Check
check:
name: Type
options:
alias: alias
docker: docker
grpc: grpc
http: http
script: script
serf: serf
tcp: tcp
ttl: ttl
sort:
name:
name: Check Name
kind:
name: Check Type
asc: Service to Node
desc: Node to Service
acl:
search-bar:
kind:
name: Type
options:
management: Management
client: Client
token:
search-bar:
kind:
name: Type
options:
global-management: Global Management
global: Global Scope
local: Local Scope
policy:
search-bar:
kind:
name: Type
options:
global-management: Global Management
standard: Standard
auth-method:
search-bar:
kind:
name: Type
locality:
name: Source
options:
local: Creates local tokens
global: Creates global tokens
binding-list:
bind-type:
service: The bind name value is used as an ACLServiceIdentity.ServiceName field in the token that is created.
node: The bind name value is used as an ACLNodeIdentity.NodeName field in the token that is created.
role: The bind name value is used as an RoleLink.Name field in the token that is created.
kv:
search-bar:
kind:
name: Type
options:
folder: Folder
key: Key
sort:
kind:
asc: Folders to Keys
desc: Keys to Folders
intention:
search-bar:
access:
name: Permission
options:
allow: Allow
deny: Deny
app-aware: App aware
sort:
access:
name: Permission
asc: Allow to Deny
desc: Deny to Allow
source-name:
name: Source
asc: "Source: A to Z"
desc: "Source: Z to A"
destination-name:
name: Destination
asc: "Destination: A to Z"
desc: "Destination: Z to A"
precedence:
name: Precedence
asc: Ascending
desc: Descending
transparent-proxy: Transparent Proxy
topology-metrics:
source-type:
tooltip: This connection was defined in a proxy registration.
text: Defined in proxy registration
notice:
limited-access:
header: Limited Access
body: This service may have dependencies you wont see because you dont have access to them.
default-allow:
header: Intentions are set to default allow
body: Your Intention settings are currently set to default allow. This means that this view will show connections to every service in your cluster. We recommend changing your Intention settings to default deny and creating specific Intentions for upstream and downstream services for this view to be useful.
footer:
name: Edit intentions
URL: dc.services.show.intentions
not-defined-intention:
header: Connections are not explicitly defined
body: There appears to be an Intention defining traffic, but the services are unable to communicate until that connection is explicitly defined as a downstream or Transparent Proxy mode is turned on.
footer: Read the documentation
wildcard-intention:
header: Permissive Intention
body: One or more of your Intentions are set to allow traffic to and/or from all other services in a namespace. This Topology view will show all of those connections if that remains unchanged. We recommend setting more specific Intentions for upstream and downstream services to make this vizualization more useful.
footer:
name: Edit intentions
URL: dc.services.show.intentions
popover:
l7:
header: Layer 7 permissions
body: Certain HTTP request info must be identified.
action: View
deny:
header: Connection Denied
body:
isExact: Change the action of this intention to allow.
notExact: Add an intention that allows these two services to connect.
action:
isExact: Allow
notExact: Create
not-defined:
header: No traffic
body: Add the current service as an explicit upstream or turn on Transparent Proxy mode to initiate traffic.
action: Documentation

View File

@ -1,281 +0,0 @@
common:
brand:
consul: Consul
terraform: Terraform
nomad: Nomad
vault: Vault
aws: AWS
kubernetes: Kubernetes
jwt: JWT
oidc: OIDC
ui:
remove: Remove {item}
filtered-by: Filtered by {item}
name: Name
creation: Creation
maxttl: Max TTL
consul:
name: Name
passing: Passing
warning: Warning
critical: Critical
registered: Registered
not-registered: Not Registered
empty: No checks
tags: Tags
service: Service
gateway: Gateway
mesh: Mesh
ingress-gateway: Ingress Gateway
terminating-gateway: Terminating Gateway
mesh-gateway: Mesh Gateway
status: Health Status
service-name: Service Name
node-name: Node Name
accessorid: AccessorID
datacenter: Datacenter
localbindaddress: Local Bind Address
localbindport: Local Bind Port
destinationname: Destination Name
sourcename: Source Name
displayname: Display Name
search:
search: Search
searchproperty: Search Across
source: Source
critical: Failing
in-mesh: In service mesh
not-in-mesh: Not in service mesh
sort:
alpha:
asc: A to Z
desc: Z to A
numeric:
asc: Ascending
desc: Descending
age:
asc: Oldest to Newest
desc: Newest to Oldest
duration:
asc: Longest to shortest
desc: Shortest to longest
status:
asc: Unhealthy to Healthy
desc: Healthy to Unhealthy
routes:
dc:
services:
show:
upstreams:
intro: |
<p>
Upstreams are services that may receive traffic from this gateway. If you are not using Consul DNS, please make sure your <code>Host:</code> header uses the correct domain name for the gateway to correctly proxy to its upstreams. Learn more about configuring gateways in our <a href="{CONSUL_DOCS_URL}/connect/ingress-gateways" target="_blank" rel="noopener noreferrer">documentation</a>.
</p>
components:
app:
skip_to_content: Skip to Content
toggle_menu: Toggle Menu
# landmark aria-labels - only screen read, so potentially included with
# screenreader landmarks/phrases i.e. Main Navigation for nav elements and
# therefore potentially do not need the word 'navigation' adding to them
main: Main
complementary: Complementary
consul:
service:
search-bar:
kind: Service Type
in-mesh: In service mesh
not-in-mesh: Not in service mesh
upstream:
search-bar:
instance:
name: Type
service-instance:
search-bar:
sort:
name:
name: Service Name
health-check:
search-bar:
kind:
name: Kind
options:
service: Service Check
node: Node Check
check:
name: Type
options:
alias: alias
docker: docker
grpc: grpc
http: http
script: script
serf: serf
tcp: tcp
ttl: ttl
sort:
name:
name: Check Name
kind:
name: Check Type
asc: Service to Node
desc: Node to Service
acl:
search-bar:
kind:
name: Type
options:
management: Management
client: Client
token:
search-bar:
kind:
name: Type
options:
global-management: Global Management
global: Global Scope
local: Local Scope
policy:
search-bar:
kind:
name: Type
options:
global-management: Global Management
standard: Standard
auth-method:
search-bar:
kind:
name: Type
locality:
name: Source
options:
local: Creates local tokens
global: Creates global tokens
binding-list:
bind-type:
service: The bind name value is used as an ACLServiceIdentity.ServiceName field in the token that is created.
node: The bind name value is used as an ACLNodeIdentity.NodeName field in the token that is created.
role: The bind name value is used as an RoleLink.Name field in the token that is created.
kv:
search-bar:
kind:
name: Type
options:
folder: Folder
key: Key
sort:
kind:
asc: Folders to Keys
desc: Keys to Folders
intention:
search-bar:
access:
name: Permission
options:
allow: Allow
deny: Deny
app-aware: App aware
sort:
access:
name: Permission
asc: Allow to Deny
desc: Deny to Allow
source-name:
name: Source
asc: "Source: A to Z"
desc: "Source: Z to A"
destination-name:
name: Destination
asc: "Destination: A to Z"
desc: "Destination: Z to A"
precedence:
name: Precedence
asc: Ascending
desc: Descending
transparent-proxy: Transparent Proxy
topology-metrics:
source-type:
tooltip: This connection was defined in a proxy registration.
text: Defined in proxy registration
notice:
limited-access:
header: Limited Access
body: This service may have dependencies you wont see because you dont have access to them.
default-allow:
header: Intentions are set to default allow
body: Your Intention settings are currently set to default allow. This means that this view will show connections to every service in your cluster. We recommend changing your Intention settings to default deny and creating specific Intentions for upstream and downstream services for this view to be useful.
footer:
name: Edit intentions
URL: dc.services.show.intentions
not-defined-intention:
header: Connections are not explicitly defined
body: There appears to be an Intention defining traffic, but the services are unable to communicate until that connection is explicitly defined as a downstream or Transparent Proxy mode is turned on.
footer: Read the documentation
wildcard-intention:
header: Permissive Intention
body: One or more of your Intentions are set to allow traffic to and/or from all other services in a namespace. This Topology view will show all of those connections if that remains unchanged. We recommend setting more specific Intentions for upstream and downstream services to make this vizualization more useful.
footer:
name: Edit intentions
URL: dc.services.show.intentions
popover:
l7:
header: Layer 7 permissions
body: Certain HTTP request info must be identified.
action: View
deny:
header: Connection Denied
body:
isExact: Change the action of this intention to allow.
notExact: Add an intention that allows these two services to connect.
action:
isExact: Allow
notExact: Create
not-defined:
header: No traffic
body: Add the current service as an explicit upstream or turn on Transparent Proxy mode to initiate traffic.
action: Documentation
models:
auth-method:
Description: Description
DisplayName: Display name
TokenLocality: Token locality
Type: Type
MaxTokenTTL: Maximum token TTL
Selector: Selector
BindNamespace: Bind Namespace
Config:
Host: Host
CACert: CA Cert
ServiceAccountJWT: Service account JSON Web Token
JWKSURL: JWKS URL
JWKSCACert: JWKS CA Cert
JWTValidationPubKeys: JWT validation pub keys
OIDCDiscoveryURL: Discovery URL
JWTSupportedAlgs: JWT supported algorithms
BoundAudiences: Bound audiences
BoundIssuer: Bound issuer
ExpirationLeeway: Expiration leeway
NotBeforeLeeway: Not before leeway
ClockSkewLeeway: Clock skew leeway
OIDCDiscoveryCACert: OIDC discovery CA cert
OIDCClientID: Client ID
OIDCClientSecret: Client secret
AllowedRedirectURIs: Allowed redirect URIs
OIDCScopes: OIDC scopes
VerboseOIDCLogging: Verbose OIDC logging
ClaimMappings: Claim Mappings
ListClaimMappings: List Claim Mappings
binding-rule:
BindType: Type
Description: Description
Selector: Selector

View File

@ -0,0 +1,34 @@
auth-method:
Description: Description
DisplayName: Display name
TokenLocality: Token locality
Type: Type
MaxTokenTTL: Maximum token TTL
Selector: Selector
BindNamespace: Bind Namespace
Config:
Host: Host
CACert: CA Cert
ServiceAccountJWT: Service account JSON Web Token
JWKSURL: JWKS URL
JWKSCACert: JWKS CA Cert
JWTValidationPubKeys: JWT validation pub keys
OIDCDiscoveryURL: Discovery URL
JWTSupportedAlgs: JWT supported algorithms
BoundAudiences: Bound audiences
BoundIssuer: Bound issuer
ExpirationLeeway: Expiration leeway
NotBeforeLeeway: Not before leeway
ClockSkewLeeway: Clock skew leeway
OIDCDiscoveryCACert: OIDC discovery CA cert
OIDCClientID: Client ID
OIDCClientSecret: Client secret
AllowedRedirectURIs: Allowed redirect URIs
OIDCScopes: OIDC scopes
VerboseOIDCLogging: Verbose OIDC logging
ClaimMappings: Claim Mappings
ListClaimMappings: List Claim Mappings
binding-rule:
BindType: Type
Description: Description
Selector: Selector

View File

@ -0,0 +1,8 @@
dc:
services:
show:
upstreams:
intro: |
<p>
Upstreams are services that may receive traffic from this gateway. If you are not using Consul DNS, please make sure your <code>Host:</code> header uses the correct domain name for the gateway to correctly proxy to its upstreams. Learn more about configuring gateways in our <a href="{CONSUL_DOCS_URL}/connect/ingress-gateways" target="_blank" rel="noopener noreferrer">documentation</a>.
</p>