debian-mirror-gitlab/config/locales/doorkeeper.en.yml

100 lines
5.1 KiB
YAML
Raw Normal View History

2015-04-26 12:48:37 +05:30
en:
activerecord:
errors:
models:
application:
attributes:
redirect_uri:
fragment_present: 'cannot contain a fragment.'
invalid_uri: 'must be a valid URI.'
relative_uri: 'must be an absolute URI.'
mongoid:
errors:
models:
application:
attributes:
redirect_uri:
fragment_present: 'cannot contain a fragment.'
invalid_uri: 'must be a valid URI.'
relative_uri: 'must be an absolute URI.'
mongo_mapper:
errors:
models:
application:
attributes:
redirect_uri:
fragment_present: 'cannot contain a fragment.'
invalid_uri: 'must be a valid URI.'
relative_uri: 'must be an absolute URI.'
doorkeeper:
errors:
messages:
# Common error messages
invalid_request: 'The request is missing a required parameter, includes an unsupported parameter value, or is otherwise malformed.'
2015-09-11 14:41:01 +05:30
invalid_redirect_uri: 'The redirect URI included is not valid.'
2015-04-26 12:48:37 +05:30
unauthorized_client: 'The client is not authorized to perform this request using this method.'
access_denied: 'The resource owner or authorization server denied the request.'
invalid_scope: 'The requested scope is invalid, unknown, or malformed.'
server_error: 'The authorization server encountered an unexpected condition which prevented it from fulfilling the request.'
temporarily_unavailable: 'The authorization server is currently unable to handle the request due to a temporary overloading or maintenance of the server.'
#configuration error messages
credential_flow_not_configured: 'Resource Owner Password Credentials flow failed due to Doorkeeper.configure.resource_owner_from_credentials being unconfigured.'
resource_owner_authenticator_not_configured: 'Resource Owner find failed due to Doorkeeper.configure.resource_owner_authenticator being unconfiged.'
# Access grant errors
unsupported_response_type: 'The authorization server does not support this response type.'
# Access token errors
invalid_client: 'Client authentication failed due to unknown client, no client authentication included, or unsupported authentication method.'
invalid_grant: 'The provided authorization grant is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client.'
unsupported_grant_type: 'The authorization grant type is not supported by the authorization server.'
# Password Access token errors
invalid_resource_owner: 'The provided resource owner credentials are not valid, or resource owner cannot be found'
invalid_token:
revoked: "The access token was revoked"
expired: "The access token expired"
unknown: "The access token is invalid"
scopes:
2018-03-17 18:26:18 +05:30
api: Access the authenticated user's API
read_user: Read the authenticated user's personal information
2019-07-31 22:56:46 +05:30
read_repository: Allows read-only access to the repository
write_repository: Allows read-write access to the repository
2018-11-08 19:23:39 +05:30
read_registry: Grants permission to read container registry images
2017-08-17 22:00:37 +05:30
openid: Authenticate using OpenID Connect
2018-11-08 19:23:39 +05:30
sudo: Perform API actions as any user in the system
2019-03-02 22:35:43 +05:30
profile: Allows read-only access to the user's personal information using OpenID Connect
email: Allows read-only access to the user's primary email address using OpenID Connect
2018-03-17 18:26:18 +05:30
scope_desc:
api:
2018-11-08 19:23:39 +05:30
Grants complete read/write access to the API, including all groups and projects.
2018-03-17 18:26:18 +05:30
read_user:
2018-11-08 19:23:39 +05:30
Grants read-only access to the authenticated user's profile through the /user API endpoint, which includes username, public email, and full name. Also grants access to read-only API endpoints under /users.
read_repository:
Grants read-only access to repositories on private projects using Git-over-HTTP (not using the API).
2019-07-31 22:56:46 +05:30
write_repository:
Grants read-write access to repositories on private projects using Git-over-HTTP (not using the API).
2018-11-08 19:23:39 +05:30
read_registry:
Grants read-only access to container registry images on private projects.
2018-03-17 18:26:18 +05:30
openid:
2018-11-08 19:23:39 +05:30
Grants permission to authenticate with GitLab using OpenID Connect. Also gives read-only access to the user's profile and group memberships.
2018-03-17 18:26:18 +05:30
sudo:
2018-11-08 19:23:39 +05:30
Grants permission to perform API actions as any user in the system, when authenticated as an admin user.
2019-03-02 22:35:43 +05:30
profile:
Grants read-only access to the user's profile data using OpenID Connect.
email:
Grants read-only access to the user's primary email address using OpenID Connect.
2015-04-26 12:48:37 +05:30
flash:
applications:
create:
2015-09-11 14:41:01 +05:30
notice: 'The application was created successfully.'
2015-04-26 12:48:37 +05:30
destroy:
2015-09-11 14:41:01 +05:30
notice: 'The application was deleted successfully.'
2015-04-26 12:48:37 +05:30
update:
2015-09-11 14:41:01 +05:30
notice: 'The application was updated successfully.'
2015-04-26 12:48:37 +05:30
authorized_applications:
destroy:
2015-09-11 14:41:01 +05:30
notice: 'The application was revoked access.'