diff --git a/.travis.yml b/.travis.yml
index edf26bf..322e23f 100644
--- a/.travis.yml
+++ b/.travis.yml
@@ -38,6 +38,9 @@ cache:
matrix:
fast_finish: true
include:
+ - name: Internationalization
+ php: 7.3
+ env: WP_MODE=single WP_VERSION=5.4.* I18N=1
- name: Coding Standards
php: 7.3
env: WP_MODE=single WP_VERSION=5.4.* PHP_LINT=1 COVERAGE=1
@@ -97,6 +100,10 @@ before_script:
fi
script:
+ - |
+ if [[ "$I18N" == "1" ]]; then
+ if [[ "$WP_MODE" == "single" ]]; then WP_MULTISITE=0 npm run i18n:check; fi
+ fi
- |
if [[ "$PHP_LINT" == "1" ]]; then
if [[ "$WP_MODE" == "single" ]]; then WP_MULTISITE=0 npm run lint; fi
diff --git a/Gruntfile.js b/Gruntfile.js
index 94d559e..0744ebc 100644
--- a/Gruntfile.js
+++ b/Gruntfile.js
@@ -96,7 +96,7 @@ module.exports = function (grunt) {
options: {
updateDomains: true
},
- src: ['*.php', '**/*.php', '!node_modules/**', '!tests/**', '!scripts/**', '!wordpress/**']
+ src: ['*.php', '**/*.php', '!node_modules/**', '!tests/**', '!scripts/**', '!vendor/**', '!wordpress/**']
},
},
@@ -124,8 +124,9 @@ module.exports = function (grunt) {
mainFile: 'openid-connect-generic.php', // Main project file.
potFilename: 'openid-connect-generic.pot', // Name of the POT file.
potHeaders: {
- poedit: true, // Includes common Poedit headers.
- 'x-poedit-keywordslist': true // Include a list of all possible gettext functions.
+ poedit: true, // Includes common Poedit headers.
+ 'report-msgid-bugs-to': 'https://github.com/daggerhart/openid-connect-generic/issues',
+ 'x-poedit-keywordslist': true // Include a list of all possible gettext functions.
}, // Headers to add to the generated POT file.
type: 'wp-plugin', // Type of project (wp-plugin or wp-theme).
updateTimestamp: true, // Whether the POT-Creation-Date should be updated without other changes.
@@ -191,7 +192,7 @@ module.exports = function (grunt) {
grunt.registerTask('phpunit', ['shell:phpunit']);
grunt.registerTask('i18n', ['addtextdomain', 'makepot', 'po2mo']);
grunt.registerTask('readme', ['wp_readme_to_markdown']);
- grunt.registerTask('test', ['checktextdomain', 'phpcs']);
+ grunt.registerTask('test', ['checktextdomain']);
grunt.registerTask('build', ['gitinfo', 'test', 'clean', 'i18n', 'readme', 'copy']);
//grunt.registerTask( 'deploy', [ 'checkbranch:master', 'checkrepo', 'build' ] );
grunt.registerTask('deploy', ['checkrepo', 'build']);
diff --git a/includes/openid-connect-generic-client-wrapper.php b/includes/openid-connect-generic-client-wrapper.php
index 3993ef5..a407003 100644
--- a/includes/openid-connect-generic-client-wrapper.php
+++ b/includes/openid-connect-generic-client-wrapper.php
@@ -194,7 +194,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
wp_logout();
if ( $this->settings->redirect_on_logout ) {
- $this->error_redirect( new WP_Error( 'access-token-expired', __( 'Session expired. Please login again.' ) ) );
+ $this->error_redirect( new WP_Error( 'access-token-expired', __( 'Session expired. Please login again.', 'daggerhart-openid-connect-generic' ) ) );
}
return;
@@ -429,7 +429,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
$this->error_redirect( $user );
}
} else {
- $this->error_redirect( new WP_Error( 'identity-not-map-existing-user', __( 'User identity is not linked to an existing WordPress user' ), $user_claim ) );
+ $this->error_redirect( new WP_Error( 'identity-not-map-existing-user', __( 'User identity is not linked to an existing WordPress user.', 'daggerhart-openid-connect-generic' ), $user_claim ) );
}
} else {
// Allow plugins / themes to take action using current claims on existing user (e.g. update role).
@@ -475,7 +475,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
function validate_user( $user ) {
// Ensure the found user is a real WP_User.
if ( ! is_a( $user, 'WP_User' ) || ! $user->exists() ) {
- return new WP_Error( 'invalid-user', __( 'Invalid user' ), $user );
+ return new WP_Error( 'invalid-user', __( 'Invalid user.', 'daggerhart-openid-connect-generic' ), $user );
}
return true;
@@ -594,18 +594,18 @@ class OpenID_Connect_Generic_Client_Wrapper {
$desired_username = $tmp[0];
} else {
// Nothing to build a name from.
- return new WP_Error( 'no-username', __( 'No appropriate username found' ), $user_claim );
+ return new WP_Error( 'no-username', __( 'No appropriate username found.', 'daggerhart-openid-connect-generic' ), $user_claim );
}
// Normalize the data a bit.
// @var string $transliterated_username The username converted to ASCII from UTF-8.
$transliterated_username = iconv( 'UTF-8', 'ASCII//TRANSLIT', $desired_username );
if ( empty( $transliterated_username ) ) {
- return new WP_Error( 'username-transliteration-failed', sprintf( __( 'Username %1$s could not be transliterated' ), $desired_username ), $desired_username );
+ return new WP_Error( 'username-transliteration-failed', sprintf( __( 'Username %1$s could not be transliterated.', 'daggerhart-openid-connect-generic' ), $desired_username ), $desired_username );
}
$normalized_username = strtolower( preg_replace( '/[^a-zA-Z0-9 _.\-@]/', '', $transliterated_username ) );
if ( empty( $normalized_username ) ) {
- return new WP_Error( 'username-normalization-failed', sprintf( __( 'Username %1$s could not be normalized' ), $transliterated_username ), $transliterated_username );
+ return new WP_Error( 'username-normalization-failed', sprintf( __( 'Username %1$s could not be normalized.', 'daggerhart-openid-connect-generic' ), $transliterated_username ), $transliterated_username );
}
// Copy the username for incrementing.
@@ -638,7 +638,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
}
if ( empty( $desired_nickname ) ) {
- return new WP_Error( 'no-nickname', sprintf( __( 'No nickname found in user claim using key: %1$s.' ), $this->settings->nickname_key ), $this->settings->nickname_key );
+ return new WP_Error( 'no-nickname', sprintf( __( 'No nickname found in user claim using key: %1$s.', 'daggerhart-openid-connect-generic' ), $this->settings->nickname_key ), $this->settings->nickname_key );
}
return $desired_nickname;
@@ -665,7 +665,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
if ( $error_on_missing_key ) {
return new WP_Error(
'incomplete-user-claim',
- __( 'User claim incomplete' ),
+ __( 'User claim incomplete.', 'daggerhart-openid-connect-generic' ),
array(
'message' => 'Unable to find key: ' . $key . ' in user_claim',
'hint' => 'Verify OpenID Scope includes a scope with the attributes you need',
@@ -767,7 +767,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
// Make sure we didn't get an error.
if ( is_wp_error( $user_claim_result ) ) {
- return new WP_Error( 'bad-user-claim-result', __( 'Bad user claim result' ), $user_claim_result );
+ return new WP_Error( 'bad-user-claim-result', __( 'Bad user claim result.', 'daggerhart-openid-connect-generic' ), $user_claim_result );
}
$user_claim = json_decode( $user_claim_result['body'], true );
@@ -822,7 +822,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
$create_user = apply_filters( 'openid-connect-generic-user-creation-test', true, $user_claim );
if ( ! $create_user ) {
- return new WP_Error( 'cannot-authorize', __( 'Can not authorize.' ), $create_user );
+ return new WP_Error( 'cannot-authorize', __( 'Can not authorize.', 'daggerhart-openid-connect-generic' ), $create_user );
}
$user_data = array(
@@ -841,7 +841,7 @@ class OpenID_Connect_Generic_Client_Wrapper {
// Make sure we didn't fail in creating the user.
if ( is_wp_error( $uid ) ) {
- return new WP_Error( 'failed-user-creation', __( 'Failed user creation.' ), $uid );
+ return new WP_Error( 'failed-user-creation', __( 'Failed user creation.', 'daggerhart-openid-connect-generic' ), $uid );
}
// Retrieve our new user.
diff --git a/includes/openid-connect-generic-client.php b/includes/openid-connect-generic-client.php
index 273539b..11eceac 100644
--- a/includes/openid-connect-generic-client.php
+++ b/includes/openid-connect-generic-client.php
@@ -176,11 +176,11 @@ class OpenID_Connect_Generic_Client {
// Check the client request state.
if ( ! isset( $request['state'] ) ) {
do_action( 'openid-connect-generic-no-state-provided' );
- return new WP_Error( 'missing-state', __( 'Missing state.' ), $request );
+ return new WP_Error( 'missing-state', __( 'Missing state.', 'daggerhart-openid-connect-generic' ), $request );
}
if ( ! $this->check_state( $request['state'] ) ) {
- return new WP_Error( 'invalid-state', __( 'Invalid state.' ), $request );
+ return new WP_Error( 'invalid-state', __( 'Invalid state.', 'daggerhart-openid-connect-generic' ), $request );
}
return $request;
@@ -195,7 +195,7 @@ class OpenID_Connect_Generic_Client {
*/
function get_authentication_code( $request ) {
if ( ! isset( $request['code'] ) ) {
- return new WP_Error( 'missing-authentication-code', __( 'Missing authentication code.' ), $request );
+ return new WP_Error( 'missing-authentication-code', __( 'Missing authentication code.', 'daggerhart-openid-connect-generic' ), $request );
}
return $request['code'];
@@ -234,7 +234,7 @@ class OpenID_Connect_Generic_Client {
$response = wp_remote_post( $this->endpoint_token, $request );
if ( is_wp_error( $response ) ) {
- $response->add( 'request_authentication_token', __( 'Request for authentication token failed.' ) );
+ $response->add( 'request_authentication_token', __( 'Request for authentication token failed.', 'daggerhart-openid-connect-generic' ) );
}
return $response;
@@ -265,7 +265,7 @@ class OpenID_Connect_Generic_Client {
$response = wp_remote_post( $this->endpoint_token, $request );
if ( is_wp_error( $response ) ) {
- $response->add( 'refresh_token', __( 'Refresh token failed.' ) );
+ $response->add( 'refresh_token', __( 'Refresh token failed.', 'daggerhart-openid-connect-generic' ) );
}
return $response;
@@ -280,7 +280,7 @@ class OpenID_Connect_Generic_Client {
*/
function get_token_response( $token_result ) {
if ( ! isset( $token_result['body'] ) ) {
- return new WP_Error( 'missing-token-body', __( 'Missing token body.' ), $token_result );
+ return new WP_Error( 'missing-token-body', __( 'Missing token body.', 'daggerhart-openid-connect-generic' ), $token_result );
}
// Extract the token response from token.
@@ -288,7 +288,7 @@ class OpenID_Connect_Generic_Client {
// Check that the token response body was able to be parsed.
if ( is_null( $token_response ) ) {
- return new WP_Error( 'invalid-token', __( 'Invalid token.' ), $token_result );
+ return new WP_Error( 'invalid-token', __( 'Invalid token.', 'daggerhart-openid-connect-generic' ), $token_result );
}
if ( isset( $token_response['error'] ) ) {
@@ -339,7 +339,7 @@ class OpenID_Connect_Generic_Client {
$response = wp_remote_post( $this->endpoint_userinfo, $request );
if ( is_wp_error( $response ) ) {
- $response->add( 'request_userinfo', __( 'Request for userinfo failed.' ) );
+ $response->add( 'request_userinfo', __( 'Request for userinfo failed.', 'daggerhart-openid-connect-generic' ) );
}
return $response;
@@ -414,14 +414,14 @@ class OpenID_Connect_Generic_Client {
function get_id_token_claim( $token_response ) {
// Validate there is an id_token.
if ( ! isset( $token_response['id_token'] ) ) {
- return new WP_Error( 'no-identity-token', __( 'No identity token' ), $token_response );
+ return new WP_Error( 'no-identity-token', __( 'No identity token.', 'daggerhart-openid-connect-generic' ), $token_response );
}
// Break apart the id_token in the response for decoding.
$tmp = explode( '.', $token_response['id_token'] );
if ( ! isset( $tmp[1] ) ) {
- return new WP_Error( 'missing-identity-token', __( 'Missing identity token' ), $token_response );
+ return new WP_Error( 'missing-identity-token', __( 'Missing identity token.', 'daggerhart-openid-connect-generic' ), $token_response );
}
// Extract the id_token's claims from the token.
@@ -448,12 +448,12 @@ class OpenID_Connect_Generic_Client {
*/
function validate_id_token_claim( $id_token_claim ) {
if ( ! is_array( $id_token_claim ) ) {
- return new WP_Error( 'bad-id-token-claim', __( 'Bad ID token claim' ), $id_token_claim );
+ return new WP_Error( 'bad-id-token-claim', __( 'Bad ID token claim.', 'daggerhart-openid-connect-generic' ), $id_token_claim );
}
// Validate the identification data and it's value.
if ( ! isset( $id_token_claim['sub'] ) || empty( $id_token_claim['sub'] ) ) {
- return new WP_Error( 'no-subject-identity', __( 'No subject identity' ), $id_token_claim );
+ return new WP_Error( 'no-subject-identity', __( 'No subject identity.', 'daggerhart-openid-connect-generic' ), $id_token_claim );
}
return true;
@@ -472,7 +472,7 @@ class OpenID_Connect_Generic_Client {
// Make sure we didn't get an error, and that the response body exists.
if ( is_wp_error( $user_claim_result ) || ! isset( $user_claim_result['body'] ) ) {
- return new WP_Error( 'bad-claim', __( 'Bad user claim' ), $user_claim_result );
+ return new WP_Error( 'bad-claim', __( 'Bad user claim.', 'daggerhart-openid-connect-generic' ), $user_claim_result );
}
$user_claim = json_decode( $user_claim_result['body'], true );
@@ -492,12 +492,12 @@ class OpenID_Connect_Generic_Client {
function validate_user_claim( $user_claim, $id_token_claim ) {
// Validate the user claim.
if ( ! is_array( $user_claim ) ) {
- return new WP_Error( 'invalid-user-claim', __( 'Invalid user claim' ), $user_claim );
+ return new WP_Error( 'invalid-user-claim', __( 'Invalid user claim.', 'daggerhart-openid-connect-generic' ), $user_claim );
}
// Allow for errors from the IDP.
if ( isset( $user_claim['error'] ) ) {
- $message = __( 'Error from the IDP' );
+ $message = __( 'Error from the IDP.', 'daggerhart-openid-connect-generic' );
if ( ! empty( $user_claim['error_description'] ) ) {
$message = $user_claim['error_description'];
}
@@ -506,14 +506,14 @@ class OpenID_Connect_Generic_Client {
// Make sure the id_token sub equals the user_claim sub, according to spec.
if ( $id_token_claim['sub'] !== $user_claim['sub'] ) {
- return new WP_Error( 'incorrect-user-claim', __( 'Incorrect user claim' ), func_get_args() );
+ return new WP_Error( 'incorrect-user-claim', __( 'Incorrect user claim.', 'daggerhart-openid-connect-generic' ), func_get_args() );
}
// Allow for other plugins to alter the login success.
$login_user = apply_filters( 'openid-connect-generic-user-login-test', true, $user_claim );
if ( ! $login_user ) {
- return new WP_Error( 'unauthorized', __( 'Unauthorized access' ), $login_user );
+ return new WP_Error( 'unauthorized', __( 'Unauthorized access.', 'daggerhart-openid-connect-generic' ), $login_user );
}
return true;
diff --git a/includes/openid-connect-generic-login-form.php b/includes/openid-connect-generic-login-form.php
index 7a8c071..f416b98 100644
--- a/includes/openid-connect-generic-login-form.php
+++ b/includes/openid-connect-generic-login-form.php
@@ -153,7 +153,7 @@ class OpenID_Connect_Generic_Login_Form {
ob_start();
?>
- :
+ :
-
+
-
+
-
+
user_login : '0'; ?>
-
+
diff --git a/includes/openid-connect-generic-settings-page.php b/includes/openid-connect-generic-settings-page.php
index cd7c162..825ed2d 100644
--- a/includes/openid-connect-generic-settings-page.php
+++ b/includes/openid-connect-generic-settings-page.php
@@ -105,8 +105,8 @@ class OpenID_Connect_Generic_Settings_Page {
*/
public function admin_menu() {
add_options_page(
- __( 'OpenID Connect - Generic Client' ),
- __( 'OpenID Connect Client' ),
+ __( 'OpenID Connect - Generic Client', 'daggerhart-openid-connect-generic' ),
+ __( 'OpenID Connect Client', 'daggerhart-openid-connect-generic' ),
'manage_options',
$this->options_page_name,
array( $this, 'settings_page' )
@@ -130,28 +130,28 @@ class OpenID_Connect_Generic_Settings_Page {
add_settings_section(
'client_settings',
- __( 'Client Settings' ),
+ __( 'Client Settings', 'daggerhart-openid-connect-generic' ),
array( $this, 'client_settings_description' ),
$this->options_page_name
);
add_settings_section(
'user_settings',
- __( 'WordPress User Settings' ),
+ __( 'WordPress User Settings', 'daggerhart-openid-connect-generic' ),
array( $this, 'user_settings_description' ),
$this->options_page_name
);
add_settings_section(
'authorization_settings',
- __( 'Authorization Settings' ),
+ __( 'Authorization Settings', 'daggerhart-openid-connect-generic' ),
array( $this, 'authorization_settings_description' ),
$this->options_page_name
);
add_settings_section(
'log_settings',
- __( 'Log Settings' ),
+ __( 'Log Settings', 'daggerhart-openid-connect-generic' ),
array( $this, 'log_settings_description' ),
$this->options_page_name
);
@@ -209,167 +209,167 @@ class OpenID_Connect_Generic_Settings_Page {
*/
$fields = array(
'login_type' => array(
- 'title' => __( 'Login Type' ),
- 'description' => __( 'Select how the client (login form) should provide login options.' ),
+ 'title' => __( 'Login Type', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Select how the client (login form) should provide login options.', 'daggerhart-openid-connect-generic' ),
'type' => 'select',
'options' => array(
- 'button' => __( 'OpenID Connect button on login form' ),
- 'auto' => __( 'Auto Login - SSO' ),
+ 'button' => __( 'OpenID Connect button on login form', 'daggerhart-openid-connect-generic' ),
+ 'auto' => __( 'Auto Login - SSO', 'daggerhart-openid-connect-generic' ),
),
'section' => 'client_settings',
),
'client_id' => array(
- 'title' => __( 'Client ID' ),
- 'description' => __( 'The ID this client will be recognized as when connecting the to Identity provider server.' ),
+ 'title' => __( 'Client ID', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'The ID this client will be recognized as when connecting the to Identity provider server.', 'daggerhart-openid-connect-generic' ),
'example' => 'my-wordpress-client-id',
'type' => 'text',
'section' => 'client_settings',
),
'client_secret' => array(
- 'title' => __( 'Client Secret Key' ),
- 'description' => __( 'Arbitrary secret key the server expects from this client. Can be anything, but should be very unique.' ),
+ 'title' => __( 'Client Secret Key', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Arbitrary secret key the server expects from this client. Can be anything, but should be very unique.', 'daggerhart-openid-connect-generic' ),
'type' => 'text',
'section' => 'client_settings',
),
'scope' => array(
- 'title' => __( 'OpenID Scope' ),
- 'description' => __( 'Space separated list of scopes this client should access.' ),
+ 'title' => __( 'OpenID Scope', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Space separated list of scopes this client should access.', 'daggerhart-openid-connect-generic' ),
'example' => 'email profile openid offline_access',
'type' => 'text',
'section' => 'client_settings',
),
'endpoint_login' => array(
- 'title' => __( 'Login Endpoint URL' ),
- 'description' => __( 'Identify provider authorization endpoint.' ),
+ 'title' => __( 'Login Endpoint URL', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Identify provider authorization endpoint.', 'daggerhart-openid-connect-generic' ),
'example' => 'https://example.com/oauth2/authorize',
'type' => 'text',
'section' => 'client_settings',
),
'endpoint_userinfo' => array(
- 'title' => __( 'Userinfo Endpoint URL' ),
- 'description' => __( 'Identify provider User information endpoint.' ),
+ 'title' => __( 'Userinfo Endpoint URL', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Identify provider User information endpoint.', 'daggerhart-openid-connect-generic' ),
'example' => 'https://example.com/oauth2/UserInfo',
'type' => 'text',
'section' => 'client_settings',
),
'endpoint_token' => array(
- 'title' => __( 'Token Validation Endpoint URL' ),
- 'description' => __( 'Identify provider token endpoint.' ),
+ 'title' => __( 'Token Validation Endpoint URL', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Identify provider token endpoint.', 'daggerhart-openid-connect-generic' ),
'example' => 'https://example.com/oauth2/token',
'type' => 'text',
'section' => 'client_settings',
),
'endpoint_end_session' => array(
- 'title' => __( 'End Session Endpoint URL' ),
- 'description' => __( 'Identify provider logout endpoint.' ),
+ 'title' => __( 'End Session Endpoint URL', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Identify provider logout endpoint.', 'daggerhart-openid-connect-generic' ),
'example' => 'https://example.com/oauth2/logout',
'type' => 'text',
'section' => 'client_settings',
),
'identity_key' => array(
- 'title' => __( 'Identity Key' ),
- 'description' => __( 'Where in the user claim array to find the user\'s identification data. Possible standard values: preferred_username, name, or sub. If you\'re having trouble, use "sub".' ),
+ 'title' => __( 'Identity Key', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Where in the user claim array to find the user\'s identification data. Possible standard values: preferred_username, name, or sub. If you\'re having trouble, use "sub".', 'daggerhart-openid-connect-generic' ),
'example' => 'preferred_username',
'type' => 'text',
'section' => 'client_settings',
),
'no_sslverify' => array(
- 'title' => __( 'Disable SSL Verify' ),
- 'description' => __( 'Do not require SSL verification during authorization. The OAuth extension uses curl to make the request. By default CURL will generally verify the SSL certificate to see if its valid an issued by an accepted CA. This setting disabled that verification. Not recommended for production sites.' ),
+ 'title' => __( 'Disable SSL Verify', 'daggerhart-openid-connect-generic' ),
+ 'description' => sprintf( __( 'Do not require SSL verification during authorization. The OAuth extension uses curl to make the request. By default CURL will generally verify the SSL certificate to see if its valid an issued by an accepted CA. This setting disabled that verification.%1$sNot recommended for production sites.%2$s', 'daggerhart-openid-connect-generic' ), ' ', '' ),
'type' => 'checkbox',
'section' => 'client_settings',
),
'http_request_timeout' => array(
- 'title' => __( 'HTTP Request Timeout' ),
- 'description' => __( 'Set the timeout for requests made to the IDP. Default value is 5.' ),
+ 'title' => __( 'HTTP Request Timeout', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Set the timeout for requests made to the IDP. Default value is 5.', 'daggerhart-openid-connect-generic' ),
'example' => 30,
'type' => 'text',
'section' => 'client_settings',
),
'enforce_privacy' => array(
- 'title' => __( 'Enforce Privacy' ),
- 'description' => __( 'Require users be logged in to see the site.' ),
+ 'title' => __( 'Enforce Privacy', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Require users be logged in to see the site.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'authorization_settings',
),
'alternate_redirect_uri' => array(
- 'title' => __( 'Alternate Redirect URI' ),
- 'description' => __( 'Provide an alternative redirect route. Useful if your server is causing issues with the default admin-ajax method. You must flush rewrite rules after changing this setting. This can be done by saving the Permalinks settings page.' ),
+ 'title' => __( 'Alternate Redirect URI', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Provide an alternative redirect route. Useful if your server is causing issues with the default admin-ajax method. You must flush rewrite rules after changing this setting. This can be done by saving the Permalinks settings page.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'authorization_settings',
),
'nickname_key' => array(
- 'title' => __( 'Nickname Key' ),
- 'description' => __( 'Where in the user claim array to find the user\'s nickname. Possible standard values: preferred_username, name, or sub.' ),
+ 'title' => __( 'Nickname Key', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Where in the user claim array to find the user\'s nickname. Possible standard values: preferred_username, name, or sub.', 'daggerhart-openid-connect-generic' ),
'example' => 'preferred_username',
'type' => 'text',
'section' => 'client_settings',
),
'email_format' => array(
- 'title' => __( 'Email Formatting' ),
- 'description' => __( 'String from which the user\'s email address is built. Specify "{email}" as long as the user claim contains an email claim.' ),
+ 'title' => __( 'Email Formatting', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'String from which the user\'s email address is built. Specify "{email}" as long as the user claim contains an email claim.', 'daggerhart-openid-connect-generic' ),
'example' => '{email}',
'type' => 'text',
'section' => 'client_settings',
),
'displayname_format' => array(
- 'title' => __( 'Display Name Formatting' ),
- 'description' => __( 'String from which the user\'s display name is built.' ),
+ 'title' => __( 'Display Name Formatting', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'String from which the user\'s display name is built.', 'daggerhart-openid-connect-generic' ),
'example' => '{given_name} {family_name}',
'type' => 'text',
'section' => 'client_settings',
),
'identify_with_username' => array(
- 'title' => __( 'Identify with User Name' ),
- 'description' => __( 'If checked, the user\'s identity will be determined by the user name instead of the email address.' ),
+ 'title' => __( 'Identify with User Name', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'If checked, the user\'s identity will be determined by the user name instead of the email address.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'client_settings',
),
'state_time_limit' => array(
- 'title' => __( 'State time limit' ),
- 'description' => __( 'State valid time in seconds. Defaults to 180' ),
+ 'title' => __( 'State time limit', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'State valid time in seconds. Defaults to 180', 'daggerhart-openid-connect-generic' ),
'type' => 'number',
'section' => 'client_settings',
),
'token_refresh_enable' => array(
- 'title' => __( 'Enable Refresh Token' ),
- 'description' => __( 'If checked, support refresh tokens used to obtain access tokens from supported IDPs.' ),
+ 'title' => __( 'Enable Refresh Token', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'If checked, support refresh tokens used to obtain access tokens from supported IDPs.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'client_settings',
),
'link_existing_users' => array(
- 'title' => __( 'Link Existing Users' ),
- 'description' => __( 'If a WordPress account already exists with the same identity as a newly-authenticated user over OpenID Connect, login as that user instead of generating an error.' ),
+ 'title' => __( 'Link Existing Users', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'If a WordPress account already exists with the same identity as a newly-authenticated user over OpenID Connect, login as that user instead of generating an error.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'user_settings',
),
'create_if_does_not_exist' => array(
- 'title' => __( 'Create user if does not exist' ),
- 'description' => __( 'If the user identity is not link to an existing Wordpress user, it is created. If this setting is not enabled and if the user authenticates with an account which is not link to an existing Wordpress user then the authentication failed' ),
+ 'title' => __( 'Create user if does not exist', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'If the user identity is not link to an existing Wordpress user, it is created. If this setting is not enabled and if the user authenticates with an account which is not link to an existing Wordpress user then the authentication failed', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'user_settings',
),
'redirect_user_back' => array(
- 'title' => __( 'Redirect Back to Origin Page' ),
- 'description' => __( 'After a successful OpenID Connect authentication, this will redirect the user back to the page on which they clicked the OpenID Connect login button. This will cause the login process to proceed in a traditional WordPress fashion. For example, users logging in through the default wp-login.php page would end up on the WordPress Dashboard and users logging in through the WooCommerce "My Account" page would end up on their account page.' ),
+ 'title' => __( 'Redirect Back to Origin Page', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'After a successful OpenID Connect authentication, this will redirect the user back to the page on which they clicked the OpenID Connect login button. This will cause the login process to proceed in a traditional WordPress fashion. For example, users logging in through the default wp-login.php page would end up on the WordPress Dashboard and users logging in through the WooCommerce "My Account" page would end up on their account page.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'user_settings',
),
'redirect_on_logout' => array(
- 'title' => __( 'Redirect to the login screen session is expired' ),
- 'description' => __( 'When enabled, this will automatically redirect the user back to the WordPress login page if their access token has expired.' ),
+ 'title' => __( 'Redirect to the login screen when session is expired', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'When enabled, this will automatically redirect the user back to the WordPress login page if their access token has expired.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'user_settings',
),
'enable_logging' => array(
- 'title' => __( 'Enable Logging' ),
- 'description' => __( 'Very simple log messages for debugging purposes.' ),
+ 'title' => __( 'Enable Logging', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Very simple log messages for debugging purposes.', 'daggerhart-openid-connect-generic' ),
'type' => 'checkbox',
'section' => 'log_settings',
),
'log_limit' => array(
- 'title' => __( 'Log Limit' ),
- 'description' => __( 'Number of items to keep in the log. These logs are stored as an option in the database, so space is limited.' ),
+ 'title' => __( 'Log Limit', 'daggerhart-openid-connect-generic' ),
+ 'description' => __( 'Number of items to keep in the log. These logs are stored as an option in the database, so space is limited.', 'daggerhart-openid-connect-generic' ),
'type' => 'number',
'section' => 'log_settings',
),
@@ -429,23 +429,23 @@ class OpenID_Connect_Generic_Settings_Page {
?>
-
+
-
+
-
+
[openid_connect_generic_login_button]
-
+
[openid_connect_generic_auth_url]
settings->enable_logging ) { ?>
-
+
logger->get_logs_table(); ?>
@@ -524,7 +524,7 @@ class OpenID_Connect_Generic_Settings_Page {
- :
+ :
@@ -537,7 +537,7 @@ class OpenID_Connect_Generic_Settings_Page {
* @return void
*/
public function client_settings_description() {
- _e( 'Enter your OpenID Connect identity provider settings' );
+ _e( 'Enter your OpenID Connect identity provider settings.', 'daggerhart-openid-connect-generic' );
}
/**
@@ -546,7 +546,7 @@ class OpenID_Connect_Generic_Settings_Page {
* @return void
*/
public function user_settings_description() {
- _e( 'Modify the interaction between OpenID Connect and WordPress users' );
+ _e( 'Modify the interaction between OpenID Connect and WordPress users.', 'daggerhart-openid-connect-generic' );
}
/**
@@ -555,7 +555,7 @@ class OpenID_Connect_Generic_Settings_Page {
* @return void
*/
public function authorization_settings_description() {
- _e( 'Control the authorization mechanics of the site' );
+ _e( 'Control the authorization mechanics of the site.', 'daggerhart-openid-connect-generic' );
}
/**
@@ -564,6 +564,6 @@ class OpenID_Connect_Generic_Settings_Page {
* @return void
*/
public function log_settings_description() {
- _e( 'Log information about login attempts through OpenID Connect Generic' );
+ _e( 'Log information about login attempts through OpenID Connect Generic.', 'daggerhart-openid-connect-generic' );
}
}
diff --git a/languages/openid-connect-generic.pot b/languages/openid-connect-generic.pot
new file mode 100644
index 0000000..91a1466
--- /dev/null
+++ b/languages/openid-connect-generic.pot
@@ -0,0 +1,496 @@
+# Copyright (C) 2020 daggerhart
+# This file is distributed under the GPL-2.0+.
+msgid ""
+msgstr ""
+"Project-Id-Version: OpenID Connect Generic 3.7.1\n"
+"Report-Msgid-Bugs-To: "
+"https://github.com/daggerhart/openid-connect-generic/issues\n"
+"POT-Creation-Date: 2020-08-29 04:05:46+00:00\n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=utf-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+"PO-Revision-Date: 2020-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME \n"
+"Language-Team: LANGUAGE \n"
+"Language: en\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
+"X-Poedit-Country: United States\n"
+"X-Poedit-SourceCharset: UTF-8\n"
+"X-Poedit-KeywordsList: "
+"__;_e;_x:1,2c;_ex:1,2c;_n:1,2;_nx:1,2,4c;_n_noop:1,2;_nx_noop:1,2,3c;esc_"
+"attr__;esc_html__;esc_attr_e;esc_html_e;esc_attr_x:1,2c;esc_html_x:1,2c;\n"
+"X-Poedit-Basepath: ../\n"
+"X-Poedit-SearchPath-0: .\n"
+"X-Poedit-Bookmarks: \n"
+"X-Textdomain-Support: yes\n"
+"X-Generator: grunt-wp-i18n 1.0.3\n"
+
+#: includes/openid-connect-generic-client-wrapper.php:197
+msgid "Session expired. Please login again."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:432
+msgid "User identity is not linked to an existing WordPress user."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:478
+msgid "Invalid user."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:597
+msgid "No appropriate username found."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:604
+msgid "Username %1$s could not be transliterated."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:608
+msgid "Username %1$s could not be normalized."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:641
+msgid "No nickname found in user claim using key: %1$s."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:668
+msgid "User claim incomplete."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:770
+msgid "Bad user claim result."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:825
+msgid "Can not authorize."
+msgstr ""
+
+#: includes/openid-connect-generic-client-wrapper.php:844
+msgid "Failed user creation."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:179
+msgid "Missing state."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:183
+msgid "Invalid state."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:198
+msgid "Missing authentication code."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:237
+msgid "Request for authentication token failed."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:268
+msgid "Refresh token failed."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:283
+msgid "Missing token body."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:291
+msgid "Invalid token."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:342
+msgid "Request for userinfo failed."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:417
+msgid "No identity token."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:424
+msgid "Missing identity token."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:451
+msgid "Bad ID token claim."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:456
+msgid "No subject identity."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:475
+msgid "Bad user claim."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:495
+msgid "Invalid user claim."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:500
+msgid "Error from the IDP."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:509
+msgid "Incorrect user claim."
+msgstr ""
+
+#: includes/openid-connect-generic-client.php:516
+msgid "Unauthorized access."
+msgstr ""
+
+#: includes/openid-connect-generic-login-form.php:156
+msgid "ERROR (%1$s)"
+msgstr ""
+
+#: includes/openid-connect-generic-login-form.php:172
+msgid "Login with OpenID Connect"
+msgstr ""
+
+#: includes/openid-connect-generic-option-logger.php:265
+msgid "Type"
+msgstr ""
+
+#: includes/openid-connect-generic-option-logger.php:269
+msgid "Date"
+msgstr ""
+
+#: includes/openid-connect-generic-option-logger.php:273
+msgid "User"
+msgstr ""
+
+#: includes/openid-connect-generic-option-logger.php:277
+msgid "URI "
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:108
+msgid "OpenID Connect - Generic Client"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:109
+msgid "OpenID Connect Client"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:133
+msgid "Client Settings"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:140
+msgid "WordPress User Settings"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:147
+msgid "Authorization Settings"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:154
+msgid "Log Settings"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:212
+msgid "Login Type"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:213
+msgid "Select how the client (login form) should provide login options."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:216
+msgid "OpenID Connect button on login form"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:217
+msgid "Auto Login - SSO"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:222
+msgid "Client ID"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:223
+msgid ""
+"The ID this client will be recognized as when connecting the to Identity "
+"provider server."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:229
+msgid "Client Secret Key"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:230
+msgid ""
+"Arbitrary secret key the server expects from this client. Can be anything, "
+"but should be very unique."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:235
+msgid "OpenID Scope"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:236
+msgid "Space separated list of scopes this client should access."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:242
+msgid "Login Endpoint URL"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:243
+msgid "Identify provider authorization endpoint."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:249
+msgid "Userinfo Endpoint URL"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:250
+msgid "Identify provider User information endpoint."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:256
+msgid "Token Validation Endpoint URL"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:257
+msgid "Identify provider token endpoint."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:263
+msgid "End Session Endpoint URL"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:264
+msgid "Identify provider logout endpoint."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:270
+msgid "Identity Key"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:271
+msgid ""
+"Where in the user claim array to find the user's identification data. "
+"Possible standard values: preferred_username, name, or sub. If you're "
+"having trouble, use \"sub\"."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:277
+msgid "Disable SSL Verify"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:278
+msgid ""
+"Do not require SSL verification during authorization. The OAuth extension "
+"uses curl to make the request. By default CURL will generally verify the "
+"SSL certificate to see if its valid an issued by an accepted CA. This "
+"setting disabled that verification.%1$sNot recommended for production "
+"sites.%2$s"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:283
+msgid "HTTP Request Timeout"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:284
+msgid "Set the timeout for requests made to the IDP. Default value is 5."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:290
+msgid "Enforce Privacy"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:291
+msgid "Require users be logged in to see the site."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:296
+msgid "Alternate Redirect URI"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:297
+msgid ""
+"Provide an alternative redirect route. Useful if your server is causing "
+"issues with the default admin-ajax method. You must flush rewrite rules "
+"after changing this setting. This can be done by saving the Permalinks "
+"settings page."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:302
+msgid "Nickname Key"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:303
+msgid ""
+"Where in the user claim array to find the user's nickname. Possible "
+"standard values: preferred_username, name, or sub."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:309
+msgid "Email Formatting"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:310
+msgid ""
+"String from which the user's email address is built. Specify \"{email}\" as "
+"long as the user claim contains an email claim."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:316
+msgid "Display Name Formatting"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:317
+msgid "String from which the user's display name is built."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:323
+msgid "Identify with User Name"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:324
+msgid ""
+"If checked, the user's identity will be determined by the user name instead "
+"of the email address."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:329
+msgid "State time limit"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:330
+msgid "State valid time in seconds. Defaults to 180"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:335
+msgid "Enable Refresh Token"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:336
+msgid ""
+"If checked, support refresh tokens used to obtain access tokens from "
+"supported IDPs."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:341
+msgid "Link Existing Users"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:342
+msgid ""
+"If a WordPress account already exists with the same identity as a "
+"newly-authenticated user over OpenID Connect, login as that user instead of "
+"generating an error."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:347
+msgid "Create user if does not exist"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:348
+msgid ""
+"If the user identity is not link to an existing Wordpress user, it is "
+"created. If this setting is not enabled and if the user authenticates with "
+"an account which is not link to an existing Wordpress user then the "
+"authentication failed"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:353
+msgid "Redirect Back to Origin Page"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:354
+msgid ""
+"After a successful OpenID Connect authentication, this will redirect the "
+"user back to the page on which they clicked the OpenID Connect login "
+"button. This will cause the login process to proceed in a traditional "
+"WordPress fashion. For example, users logging in through the default "
+"wp-login.php page would end up on the WordPress Dashboard and users logging "
+"in through the WooCommerce \"My Account\" page would end up on their "
+"account page."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:359
+msgid "Redirect to the login screen when session is expired"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:360
+msgid ""
+"When enabled, this will automatically redirect the user back to the "
+"WordPress login page if their access token has expired."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:365
+msgid "Enable Logging"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:366
+msgid "Very simple log messages for debugging purposes."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:371
+msgid "Log Limit"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:372
+msgid ""
+"Number of items to keep in the log. These logs are stored as an option in "
+"the database, so space is limited."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:432
+msgid "Notes"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:435
+msgid "Redirect URI"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:439
+msgid "Login Button Shortcode"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:443
+msgid "Authentication URL Shortcode"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:448
+msgid "Logs"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:527
+msgid "Example"
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:540
+msgid "Enter your OpenID Connect identity provider settings."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:549
+msgid "Modify the interaction between OpenID Connect and WordPress users."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:558
+msgid "Control the authorization mechanics of the site."
+msgstr ""
+
+#: includes/openid-connect-generic-settings-page.php:567
+msgid "Log information about login attempts through OpenID Connect Generic."
+msgstr ""
+
+#. Plugin Name of the plugin/theme
+msgid "OpenID Connect Generic"
+msgstr ""
+
+#. Plugin URI of the plugin/theme
+msgid "https://github.com/daggerhart/openid-connect-generic"
+msgstr ""
+
+#. Description of the plugin/theme
+msgid "Connect to an OpenID Connect generic client using Authorization Code Flow."
+msgstr ""
+
+#. Author of the plugin/theme
+msgid "daggerhart"
+msgstr ""
+
+#. Author URI of the plugin/theme
+msgid "http://www.daggerhart.com"
+msgstr ""
\ No newline at end of file
diff --git a/package.json b/package.json
index 5b5b09e..8d423db 100644
--- a/package.json
+++ b/package.json
@@ -50,10 +50,12 @@
"build": "npm run grunt build",
"wp-env": "wp-env",
"wp": "wp-env run cli wp",
- "makepot": "wp-env run cli wp i18n make-pot . languages/ --slug=daggerhart-openid-connect-generic --include=openid-connect-generic.php,includes",
+ "i18n:check": "npm run grunt checktextdomain",
+ "i18n:make": "npm run grunt i18n",
+ "i18n:make:cli": "wp-env run cli wp i18n make-pot . languages/ --slug=daggerhart-openid-connect-generic --include=openid-connect-generic.php,includes",
"lint": "npm run lint:php",
"lint:php": "composer run-script phpcs .",
- "lint-fix:php": "composer run-script phpcbf .",
+ "lint:php:fix": "composer run-script phpcbf .",
"analyze": "npm run analyze:php",
"analyze:php": "composer run-script phpstan analyze ."
}