misc: fix spelling of OpenID Connect (#70747)

This commit is contained in:
Frédéric Péters 2022-10-26 19:19:18 +02:00
parent 4065abcdd2
commit 97c4ed3618
6 changed files with 7 additions and 7 deletions

View File

@ -126,7 +126,7 @@ def login_method_label(how):
elif how == 'saml':
return 'SAML'
elif how == 'oidc':
return 'OpenIDConnect'
return 'OpenID Connect'
elif how:
return how
else:

View File

@ -129,7 +129,7 @@ class Migration(migrations.Migration):
),
],
options={
'verbose_name': 'OpenIDConnect',
'verbose_name': 'OpenID Connect',
},
),
migrations.AddField(

View File

@ -127,7 +127,7 @@ class OIDCProvider(BaseAuthenticator):
description_fields = ['show_condition', 'issuer', 'scopes', 'strategy', 'created', 'modified']
class Meta:
verbose_name = _('OpenIDConnect')
verbose_name = _('OpenID Connect')
constraints = [
models.UniqueConstraint(
fields=['issuer'],

View File

@ -149,7 +149,7 @@ class LoginCallback(View):
try:
provider = get_provider_by_issuer(issuer)
except OIDCProvider.DoesNotExist:
messages.warning(request, _('Unknown OpenID connect issuer: "%s"') % issuer)
messages.warning(request, _('Unknown OpenID Connect issuer: "%s"') % issuer)
logger.warning('auth_oidc: unknown issuer, %s', issuer)
return self.continue_to_next_url(request)
@ -339,7 +339,7 @@ class LoginCallback(View):
'Login with %(provider_name)s failed, report %(request_id)s to an administrator (%(error)s)'
)
else:
message = _('Login with OpenIDConnect failed, report %s to an administrator. (%(error)s)')
message = _('Login with OpenID Connect failed, report %s to an administrator. (%(error)s)')
messages.warning(request, message % message_params)
return self.continue_to_next_url(request)

View File

@ -120,7 +120,7 @@ class OIDCException(Exception):
if self.show_message:
messages.error(
request,
_('OpenIDConnect Error "%(error_code)s": %(error_description)s')
_('OpenID Connect Error "%(error_code)s": %(error_description)s')
% {'error_code': self.error_code, 'error_description': self.error_description},
)

View File

@ -183,7 +183,7 @@ def test_authenticators_oidc(app, superuser, ou1, ou2):
assert 'Scopes: profile email' in resp.text
resp = app.get('/manage/authenticators/')
assert 'OpenIDConnect - Test' in resp.text
assert 'OpenID Connect - Test' in resp.text
assert 'class="section disabled"' in resp.text
assert 'OIDC provider linked to' not in resp.text