Skip to content

Commit

Permalink
Merge pull request #2473 from openstandia/add-v21.1.2
Browse files Browse the repository at this point in the history
Add resources for v21.1.2
  • Loading branch information
wadahiro authored Nov 13, 2023
2 parents 45ac1bc + 3eafbfe commit c6b3473
Show file tree
Hide file tree
Showing 8 changed files with 100 additions and 304 deletions.
2 changes: 1 addition & 1 deletion site/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -210,7 +210,7 @@ <h1>Keycloak 日本語ドキュメント
<a href="https://twitter.com/share" class="twitter-share-button" data-hashtags="keycloak"></a>
</h1>

<h3>21.1.1</h3>
<h3>21.1.2</h3>
<table class="tableblock frame-all grid-all spread">
<tbody>
<tr>
Expand Down
2 changes: 1 addition & 1 deletion site/preview.html
Original file line number Diff line number Diff line change
Expand Up @@ -210,7 +210,7 @@ <h1>Keycloak 日本語ドキュメント(プレビュー)
<a href="https://twitter.com/share" class="twitter-share-button" data-hashtags="keycloak"></a>
</h1>

<h3>21.1.1</h3>
<h3>21.1.2</h3>
<table class="tableblock frame-all grid-all spread">
<tbody>
<tr>
Expand Down
14 changes: 7 additions & 7 deletions src/21.1/authorization_services.po
Original file line number Diff line number Diff line change
Expand Up @@ -730,34 +730,34 @@ msgstr ""
msgid "Description"
msgstr ""

msgid "{quickstartRepo_link}/tree/latest/app-authz-jee-servlet[app-authz-jee-servlet]"
msgid "https://github.com/keycloak/keycloak-quickstarts/tree/latest/app-authz-jee-servlet[app-authz-jee-servlet]"
msgstr ""

msgid "Demonstrates how to enable fine-grained authorization to a Jakarta EE application in order to protect specific resources and build a dynamic menu based on the permissions obtained from a {Project_Name} Server."
msgstr ""

msgid "{quickstartRepo_link}/tree/latest/app-authz-jee-vanilla[app-authz-jee-vanilla]"
msgid "https://github.com/keycloak/keycloak-quickstarts/tree/latest/app-authz-jee-vanilla[app-authz-jee-vanilla]"
msgstr ""

msgid "Demonstrates how to enable fine-grained authorization to a Jakarta EE application and use the default authorization settings to protect all resources in the application."
msgstr ""

msgid "{quickstartRepo_link}/tree/latest/app-authz-rest-springboot[app-authz-rest-springboot]"
msgid "https://github.com/keycloak/keycloak-quickstarts/tree/latest/app-authz-rest-springboot[app-authz-rest-springboot]"
msgstr ""

msgid "Demonstrates how to protect a SpringBoot REST service using {Project_Name} Authorization Services."
msgstr ""

msgid "{quickstartRepo_link}/tree/latest/app-authz-springboot[app-authz-springboot]"
msgid "https://github.com/keycloak/keycloak-quickstarts/tree/latest/app-authz-springboot[app-authz-springboot]"
msgstr ""

msgid "Demonstrates how to write a SpringBoot Web application where both authentication and authorization aspects are managed by {Project_Name}."
msgstr ""

msgid "{quickstartRepo_link}/tree/latest/app-authz-uma-photoz[app-authz-uma-photoz]"
msgid "https://github.com/keycloak/keycloak-quickstarts/tree/latest/app-authz-uma-photoz[app-authz-uma-photoz]"
msgstr ""

msgid "A simple application based on HTML5+AngularJS+JAX-RS that demonstrates how to enable User-Managed Access to your application and let users manage permissions for their resources."
msgid "A simple application based on HTML5+AngularJS+JAX-RS that demonstrates how to enable User-Managed Access to your application and let users to manage permissions for their resources."
msgstr ""

msgid "Managing resource servers"
Expand Down Expand Up @@ -3426,7 +3426,7 @@ msgid ""
"}"
msgstr ""

msgid "When you enable the policy enforcer all requests sent to your application are intercepted and access to protected resources will be granted depending on the permissions granted by {project_name} to the identity making the request."
msgid "When you enable the policy enforcer all requests sent your application are intercepted and access to protected resources will be granted depending on the permissions granted by {project_name} to the identity making the request."
msgstr ""

msgid "Policy enforcement is strongly linked to your application's paths and the <<_resource_overview, resources>> you created for a resource server using the {project_name} Administration Console. By default, when you create a resource server, {project_name} creates a <<_resource_server_default_config, default configuration>> for your resource server so you can enable policy enforcement quickly."
Expand Down
68 changes: 0 additions & 68 deletions src/21.1/release_notes.po
Original file line number Diff line number Diff line change
Expand Up @@ -29,74 +29,6 @@ msgstr ""
msgid "Version *{project_version}* _{release_header_latest_link}[Click here for latest]_"
msgstr ""

msgid "{project_name_full} 21.1.0"
msgstr ""

msgid "Monorepo"
msgstr ""

msgid "In the past Keycloak was maintained across multiple GitHub repositories:"
msgstr ""

msgid "https://github.com/keycloak/keycloak-documentation[Documentation repository]"
msgstr ""

msgid "https://github.com/keycloak/keycloak-ui[UI repository]"
msgstr ""

msgid "https://github.com/keycloak/keycloak-nodejs-admin-client[Node.js admin client repository]"
msgstr ""

msgid "Having multiple repositories introduced a lot of complexity and toil. For example frequently multiple pull requests had to be sent to different repositories for a single change."
msgstr ""

msgid "To simplify things we have now migrated everything into the https://github.com/keycloak/keycloak[main repository]."
msgstr ""

msgid "FIPS 140-2 support"
msgstr ""

msgid "FIPS 140-2 support in Keycloak, which was preview in the previous release, is now promoted to be officially supported."
msgstr ""

msgid "Experimental Account Console version 3"
msgstr ""

msgid "The Account Console version 3 is now available as an experimental feature in Keycloak. This version supports custom fields created with the 'User Profile' feature. If you are looking to try it out and provide us with some early feedback you can enable it as follows:"
msgstr ""

msgid "bin/kc.sh start-dev --features=account3"
msgstr ""

msgid "Changes to Keycloak Authorization Services support in Keycloak Java-based Adapters"
msgstr ""

msgid "As part of the removal of the https://www.keycloak.org/2023/03/adapter-deprecation-update[deprecated] adapters, the Keycloak Policy Enforcer was extracted from the adapters code base into a separate dependency:"
msgstr ""

msgid ""
"<dependency>\n"
" <groupId>org.keycloak</groupId>\n"
" <artifactId>keycloak-policy-enforcer</artifactId>\n"
" <version>${version.keycloak}</version>\n"
"</dependency>"
msgstr ""

msgid "By providing this dependency, we expect making it possible to integrate the policy enforcer with the Java stack of your preference."
msgstr ""

msgid "It also provides built-in support for enabling the policy enforcer to Jakarta applications protected with https://docs.wildfly.org/26/Admin_Guide.html#Elytron_OIDC_Client[Wildfly Elytron]."
msgstr ""

msgid "For now, this dependency is not yet GA as we are still working on the quickstarts and documentation."
msgstr ""

msgid "This work should not impact existing applications using the deprecated adapters. = Javascript engine available by default"
msgstr ""

msgid "In the previous version, when Keycloak was used on Java 17 with Javascript providers it was needed to add the Nashorn javascript engine to the distribution. This is no longer needed as Nashorn javascript engine is available in Keycloak server by default."
msgstr ""

msgid "{project_name_full} 21.0.0"
msgstr ""

Expand Down
Loading

0 comments on commit c6b3473

Please sign in to comment.