fix #13660 - Replace mentions of 'oAuth', by more accurate 'OAuth'. (See https://oauth.net/) (#13664)

Signed-off-by: Fabrice Flore-Thébault <ffloreth@redhat.com>
7.20.x
Fabrice Flore-Thébault 2019-07-10 11:31:09 +02:00 committed by Sergii Kabashniuk
parent 44eff81281
commit 939dfbe016
12 changed files with 19 additions and 19 deletions

View File

@ -165,8 +165,8 @@ che.auth.access_denied_error_page=/error-oauth
# Reserved user names
che.auth.reserved_user_names=
# You can setup GitHub oAuth to automate authentication to remote repositories.
# You need to first register this application with GitHub oAuth.
# You can setup GitHub OAuth to automate authentication to remote repositories.
# You need to first register this application with GitHub OAuth.
che.oauth.github.clientid=NULL
che.oauth.github.clientsecret=NULL
che.oauth.github.authuri= https://github.com/login/oauth/authorize

View File

@ -14,7 +14,7 @@
/**
* @ngdoc controller
* @name projects.create-project.github.oauth-dialog.controller:NoGithubOauthDialogController
* @description This class is handling the controller for the no Github oAuth dialog
* @description This class is handling the controller for the no Github OAuth dialog
* @author Florent Benoit
*/
export class NoGithubOauthDialogController {

View File

@ -1,6 +1,6 @@
<che-popup title="GitHub oAuth" on-close="noGithubOauthDialogController.hide()">
<che-popup title="GitHub OAuth" on-close="noGithubOauthDialogController.hide()">
<div class="no-github-oauth-content" flax>
<div>GitHub oAuth is not configured. {{noGithubOauthDialogController.message}}</div>
<div>GitHub OAuth is not configured. {{noGithubOauthDialogController.message}}</div>
<che-button-notice che-button-title="Close"
ng-click="noGithubOauthDialogController.hide()"></che-button-notice>
</div>

View File

@ -83,7 +83,7 @@ export class CheAPI {
}
/**
* The Che oAuth Provider API
* The Che OAuth Provider API
* @returns {CheOAuthProvider}
*/
getOAuthProvider(): CheOAuthProvider {

View File

@ -12,7 +12,7 @@
'use strict';
/**
* This class is handling the registered oAuth providers.
* This class is handling the registered OAuth providers.
* @author Ann Shumilova
*/
export class CheOAuthProvider {

View File

@ -540,7 +540,7 @@ Che server debug: ${CHE_DEBUG_SERVER}
Image: ${CHE_IMAGE_REPO}
Pull policy: ${IMAGE_PULL_POLICY}
Update strategy: ${UPDATE_STRATEGY}
Setup OpenShift oAuth: ${SETUP_OCP_OAUTH}
Setup OpenShift OAuth: ${SETUP_OCP_OAUTH}
Enable Jaeger based tracing: ${CHE_TRACING_ENABLED}
Enable metrics collection: ${CHE_METRICS_ENABLED}
Environment variables:
@ -580,8 +580,8 @@ ${CHE_VAR_ARRAY}"
wait_for_keycloak
if [ "${SETUP_OCP_OAUTH}" == "true" ]; then
printInfo "Registering oAuth client in OpenShift"
# register oAuth client in OpenShift
printInfo "Registering OAuth client in OpenShift"
# register OAuth client in OpenShift
printInfo "Logging as \"system:admin\""
$OC_BINARY login -u "system:admin"
KEYCLOAK_ROUTE=$($OC_BINARY get route/keycloak --namespace=${CHE_OPENSHIFT_PROJECT} -o=jsonpath={'.spec.host'})
@ -592,7 +592,7 @@ ${CHE_VAR_ARRAY}"
-p OCP_OAUTH_CLIENT_SECRET=${OCP_OAUTH_CLIENT_SECRET} | oc apply -f -
# register OpenShift Identity Provider in Keycloak
printInfo "Registering oAuth client in Keycloak"
printInfo "Registering OAuth client in Keycloak"
printInfo "Logging as \"${OPENSHIFT_USERNAME}\""
$OC_BINARY login -u "${OPENSHIFT_USERNAME}" -p "${OPENSHIFT_PASSWORD}"
KEYCLOAK_POD_NAME=$(${OC_BINARY} get pod --namespace=${CHE_OPENSHIFT_PROJECT} -l app=keycloak --no-headers | awk '{print $1}')
@ -609,7 +609,7 @@ ${CHE_VAR_ARRAY}"
-s config.defaultScope="user:full" \
--no-config --server http://localhost:8080/auth --user ${KEYCLOAK_USER} --password ${KEYCLOAK_PASSWORD} --realm master
# setup Che variables related to oAuth identity provider
# setup Che variables related to OAuth identity provider
CHE_INFRA_OPENSHIFT_PROJECT=
CHE_INFRA_OPENSHIFT_OAUTH__IDENTITY__PROVIDER=${OCP_IDENTITY_PROVIDER_ID}
fi

View File

@ -321,11 +321,11 @@ parameters:
value: 'true'
- name: CHE_OAUTH_GITHUB_CLIENTID
displayName: GitHub Client ID
description: GitHub oAuth app client ID. Applicable to Che single user only!
description: GitHub OAuth app client ID. Applicable to Che single user only!
value: ''
- name: CHE_OAUTH_GITHUB_CLIENTSECRET
displayName: GitHub Client Secret
description: GitHub oAuth app client servet. Applicable to Che single user only!
description: GitHub OAuth app client servet. Applicable to Che single user only!
value: ''
- name: CHE_WORKSPACE_PLUGIN__REGISTRY__URL
displayName: Eclipse Che plugin registry URL

View File

@ -504,7 +504,7 @@ project.import.cloning.failed.title=Project: {0} Sources cannot be cloned
project.import.configuring.failed=Failed to configure source code of {0}.
project.already.imported=Project {0} already imported.
project.import.ssh.key.upload.failed.title=Clone failed
project.import.ssh.key.upload.failed.text=We are unable to clone your repository even though you\''ve configured oAuth access. \
project.import.ssh.key.upload.failed.text=We are unable to clone your repository even though you\''ve configured OAuth access. \
Some providers do not allow automatic upload of SSH keys. Please paste your SSH key manually in your provider account preferences.
import.config.view.name=Import From Che Config...

View File

@ -137,7 +137,7 @@ public class KeycloakServiceClient {
} catch (BadRequestException e) {
if (assotiateUserPattern.matcher(e.getMessage()).matches()) {
// If user has no link with identity provider yet,
// we should threat this as unauthorized and send to oAuth login page.
// we should threat this as unauthorized and send to OAuth login page.
throw new UnauthorizedException(e.getMessage());
}
throw e;

View File

@ -64,7 +64,7 @@ export OPENSHIFT_TOKEN=<openshift_web_console_bearer_auth_token>
export OPENSHIFT_CHE_NAMESPACE=<namespace_of_eclipse_che_deployed_on_openshift>
export OPENSHIFT_URL=<url_of_openshift_web_console>
```
where `OPENSHIFT_TOKEN` is optional and is aimed to replace username/password when OpenShift is configured with oAuth.
where `OPENSHIFT_TOKEN` is optional and is aimed to replace username/password when OpenShift is configured with OAuth.
Default values:

View File

@ -17,7 +17,7 @@ import javax.inject.Singleton;
import org.eclipse.che.api.auth.shared.dto.OAuthToken;
import org.eclipse.che.security.oauth.shared.OAuthTokenProvider;
/** Retrieves oAuth token with help of OAuthAuthenticatorProvider. */
/** Retrieves OAuth token with help of OAuthAuthenticatorProvider. */
@Singleton
public class OAuthAuthenticatorTokenProvider implements OAuthTokenProvider {
private final OAuthAuthenticatorProvider oAuthAuthenticatorProvider;

View File

@ -34,7 +34,7 @@ public interface UserDto extends User {
UserDto withId(String id);
@ApiModelProperty("User alias which is used for oAuth")
@ApiModelProperty("User alias which is used for OAuth")
List<String> getAliases();
void setAliases(List<String> aliases);