Imported Translations from Zanata

For more information about this automatic import see:
https://docs.openstack.org/i18n/latest/reviewing-translation-import.html

Change-Id: I328b58d13084f4fe33e0fc355cadad6194fcca03
This commit is contained in:
OpenStack Proposal Bot 2018-08-16 07:41:11 +00:00
parent 7fdff38a2f
commit ec3fcf5c7f
2 changed files with 306 additions and 2 deletions

View File

@ -3,11 +3,11 @@ msgid ""
msgstr ""
"Project-Id-Version: magnum\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2018-04-24 11:05+0000\n"
"POT-Creation-Date: 2018-08-15 16:04+0000\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"PO-Revision-Date: 2018-02-13 12:15+0000\n"
"PO-Revision-Date: 2018-08-08 09:28+0000\n"
"Last-Translator: Andi Chandler <andi@gowling.com>\n"
"Language-Team: English (United Kingdom)\n"
"Language: en_GB\n"
@ -48,9 +48,18 @@ msgstr "5.0.0"
msgid "5.0.1"
msgstr "5.0.1"
msgid "5.0.1-20"
msgstr "5.0.1-20"
msgid "6.0.1"
msgstr "6.0.1"
msgid "6.1.0"
msgstr "6.1.0"
msgid "6.1.1"
msgstr "6.1.1"
msgid ":ref:`genindex`"
msgstr ":ref:`genindex`"
@ -163,6 +172,26 @@ msgstr ""
"`verify_ca` to `true` will result to all requests from the cluster nodes to "
"the OpenStack APIs to be verified."
msgid ""
"Add new label 'cert_manager_api' enabling the kubernetes certificate manager "
"api."
msgstr ""
"Add new label 'cert_manager_api' enabling the Kubernetes certificate manager "
"API."
msgid ""
"Add new labels 'ingress_controller' and 'ingress_controller_role' enabling "
"the deployment of a Kubernetes Ingress Controller backend for clusters. "
"Default for 'ingress_controller' is '' (meaning no controller deployed), "
"with possible values being 'traefik'. Default for 'ingress_controller_role' "
"is 'ingress'."
msgstr ""
"Add new labels 'ingress_controller' and 'ingress_controller_role' enabling "
"the deployment of a Kubernetes Ingress Controller backend for clusters. "
"Default for 'ingress_controller' is '' (meaning no controller deployed), "
"with possible values being 'traefik'. Default for 'ingress_controller_role' "
"is 'ingress'."
msgid ""
"Add support for a new OpenSUSE driver for running k8s cluster on OpenSUSE. "
"This driver is experimental for now, and operators need to get it from /"
@ -201,6 +230,13 @@ msgstr ""
"Added parameter in cluster-create to specify the keypair. If keypair is not "
"provided, the default value from the matching ClusterTemplate will be used."
msgid ""
"Adding 'calico' as network driver for Kubernetes so as to support network "
"isolation between namespace with k8s network policy."
msgstr ""
"Adding 'calico' as network driver for Kubernetes so as to support network "
"isolation between namespace with k8s network policy."
msgid ""
"All container/pod/service/replication controller operations were removed. "
"Users are recommended to use the COE's native tool (i.e. docker, kubectl) to "
@ -252,6 +288,13 @@ msgstr ""
msgid "Contents:"
msgstr "Contents:"
msgid ""
"Create admin cluster role for k8s_fedora_atomic, it is defined in the "
"configuration but it wasn't applied."
msgstr ""
"Create admin cluster role for k8s_fedora_atomic, it is defined in the "
"configuration but it wasn't applied."
msgid "Current Series Release Notes"
msgstr "Current Series Release Notes"
@ -272,6 +315,17 @@ msgstr ""
"also return HTTP status code 202 instead of 201. Microversion 1.2 is added "
"for new behaviour."
msgid ""
"Currently, the replicas of coreDNS pod is hardcoded as 1. It's not a "
"reasonable number for such a critical service. Without DNS, probably all "
"workloads running on the k8s cluster will be broken. Now Magnum is making "
"the coreDNS pod autoscaling based on the nodes and cores number."
msgstr ""
"Currently, the replicas of coreDNS pod is hardcoded as 1. It's not a "
"reasonable number for such a critical service. Without DNS, probably all "
"workloads running on the k8s cluster will be broken. Now Magnum is making "
"the coreDNS pod autoscaling based on the nodes and cores number."
msgid ""
"Currently, the swarm and the kubernetes drivers use a dedicated cinder "
"volume to store the container images. It was been observed that one cinder "
@ -369,6 +423,38 @@ msgstr ""
"parameter has been added to restrict the access to other services than "
"Magnum."
msgid ""
"Fix bug #1758672 [1] to protect kubelet in the k8s_fedora_atomic driver. "
"Before this patch kubelet was listening to 0.0.0.0 and for clusters with "
"floating IPs the kubelet was exposed. Also, even on clusters without fips "
"the kubelet was exposed inside the cluster. This patch allows access to the "
"kubelet only over https and with the appropriate roles. The apiserver and "
"heapster have the appropriate roles to access it. Finally, all read-only "
"ports have been closed to not expose any cluster data. The only remaining "
"open ports without authentication are for healthz. [1] https://bugs."
"launchpad.net/magnum/+bug/1758672"
msgstr ""
"Fix bug #1758672 [1] to protect kubelet in the k8s_fedora_atomic driver. "
"Before this patch kubelet was listening to 0.0.0.0 and for clusters with "
"floating IPs the kubelet was exposed. Also, even on clusters without fips "
"the kubelet was exposed inside the cluster. This patch allows access to the "
"kubelet only over HTTPS and with the appropriate roles. The apiserver and "
"heapster have the appropriate roles to access it. Finally, all read-only "
"ports have been closed to not expose any cluster data. The only remaining "
"open ports without authentication are for healthz. [1] https://bugs."
"launchpad.net/magnum/+bug/1758672"
msgid ""
"Fix etcd configuration in k8s_fedora_atomic driver. Explicitly enable client "
"and peer authentication and set trusted CA (ETCD_TRUSTED_CA_FILE, "
"ETCD_PEER_TRUSTED_CA_FILE, ETCD_CLIENT_CERT_AUTH, "
"ETCD_PEER_CLIENT_CERT_AUTH). Only new clusters will benefit from the fix."
msgstr ""
"Fix etcd configuration in k8s_fedora_atomic driver. Explicitly enable client "
"and peer authentication and set trusted CA (ETCD_TRUSTED_CA_FILE, "
"ETCD_PEER_TRUSTED_CA_FILE, ETCD_CLIENT_CERT_AUTH, "
"ETCD_PEER_CLIENT_CERT_AUTH). Only new clusters will benefit from the fix."
msgid ""
"Fix global stack list in periodic task. In before, magnum's periodic task "
"performs a `stack-list` operation across all tenants. This is disabled by "
@ -484,6 +570,29 @@ msgstr ""
msgid "Known Issues"
msgstr "Known Issues"
msgid ""
"Kubernetes client is incompatible with evenlet and breaks the periodic "
"tasks. After kubernetes client 4.0.0 magnum is affected by the bug below. "
"https://github.com/eventlet/eventlet/issues/147 Magnum has three periodic "
"tasks, one to sync the magnum service, one to update the cluster status and "
"one send cluster metrics The send_metrics task uses the kubernetes client "
"for kubernetes clusters and it crashes the sync_cluster_status and "
"send_cluster_metrics tasks. https://bugs.launchpad.net/magnum/+bug/1746510 "
"Additionally, the kubernetes scale manager needs to be disabled to not break "
"the scale down command completely. Note, that when magnum scales down the "
"cluster will pick the nodes to scale randomly."
msgstr ""
"Kubernetes client is incompatible with evenlet and breaks the periodic "
"tasks. After Kubernetes client 4.0.0 magnum is affected by the bug below. "
"https://github.com/eventlet/eventlet/issues/147 Magnum has three periodic "
"tasks, one to sync the magnum service, one to update the cluster status and "
"one send cluster metrics The send_metrics task uses the Kubernetes client "
"for Kubernetes clusters and it crashes the sync_cluster_status and "
"send_cluster_metrics tasks. https://bugs.launchpad.net/magnum/+bug/1746510 "
"Additionally, the Kubernetes scale manager needs to be disabled to not break "
"the scale down command completely. Note, that when magnum scales down the "
"cluster will pick the nodes to scale randomly."
msgid ""
"Kubernetes for fedora-atomic runs in system containers [1]. These containers "
"are stored in ostree in the fedora-atomic hosts and they don't require "
@ -604,6 +713,13 @@ msgstr "Mitaka Series Release Notes"
msgid "New Features"
msgstr "New Features"
msgid ""
"New clusters should be created with kube_tag=v1.9.3 or later. v1.9.3 is the "
"default version in the queens release."
msgstr ""
"New clusters should be created with kube_tag=v1.9.3 or later. v1.9.3 is the "
"default version in the Queens release."
msgid "Newton Series Release Notes"
msgstr "Newton Series Release Notes"
@ -672,6 +788,17 @@ msgstr ""
msgid "Security Issues"
msgstr "Security Issues"
msgid ""
"Strip signed certificate. Certificate (ca.crt) has to be striped for some "
"application parsers as they might require pure base64 representation of the "
"certificate itself, without empty characters at the beginning nor the end of "
"file."
msgstr ""
"Strip signed certificate. Certificate (ca.crt) has to be striped for some "
"application parsers as they might require pure base64 representation of the "
"certificate itself, without empty characters at the beginning nor the end of "
"file."
msgid ""
"Support different volume types for the drivers that support docker storage "
"in cinder volumes. swarm_fedora_atomic and k8s_fedora_atomic accept a new "
@ -731,6 +858,24 @@ msgstr ""
"containers across any COE will be removed from Magnum's API, and will be re-"
"introduced as a separate project called Zun."
msgid ""
"This is allowing no floating IP to be usable with a multimaster "
"configuration in terms of load balancers."
msgstr ""
"This allows no Floating IP to be usable with a multimaster configuration in "
"terms of load balancers."
msgid ""
"This release introduces 'federations' endpoint to Magnum API, which allows "
"an admin to create and manage federations of clusters through Magnum. As the "
"feature is still under development, the endpoints are not bound to any "
"driver yet. For more details, please refer to bp/federation-api [1]."
msgstr ""
"This release introduces 'federations' endpoint to Magnum API, which allows "
"an admin to create and manage federations of clusters through Magnum. As the "
"feature is still under development, the endpoints are not bound to any "
"driver yet. For more details, please refer to bp/federation-api [1]."
msgid ""
"This release introduces 'quota' endpoint that enable admin users to set, "
"update and show quota for a given tenant. A non-admin user can get self "
@ -765,12 +910,84 @@ msgstr ""
"Update Swarm default version to 1.2.5. It should be the last version since "
"Docker people are now working on the new Swarm mode integrated in Docker."
msgid ""
"Update k8s_fedora_atomic driver to the latest Fedora Atomic 27 release and "
"run etcd and flanneld in system containers which are removed from the base "
"OS."
msgstr ""
"Update k8s_fedora_atomic driver to the latest Fedora Atomic 27 release and "
"run etcd and flanneld in system containers which are removed from the base "
"OS."
msgid ""
"Update kubernetes dashboard to `v1.8.3` which is compatible via kubectl "
"proxy. Addionally, heapster is deployed as standalone deployemt and the user "
"can enable a grafana-influx stack with the "
"`influx_grafana_dashboard_enabled` label. See the kubernetes dashboard "
"documenation for more details. https://github.com/kubernetes/dashboard/wiki"
msgstr ""
"Update Kubernetes dashboard to `v1.8.3` which is compatible via kubectl "
"proxy. Additionally, heapster is deployed as standalone deployment and the "
"user can enable a grafana-influx stack with the "
"`influx_grafana_dashboard_enabled` label. See the Kubernetes dashboard "
"documentation for more details. https://github.com/kubernetes/dashboard/wiki"
msgid "Upgrade Notes"
msgstr "Upgrade Notes"
msgid ""
"Using the queens (>=2.9.0) python-magnumclient, when a user executes "
"openstack coe cluster config, the client certificate has admin as Common "
"Name (CN) and system:masters for Organization which are required for "
"authorization with RBAC enabled clusters. This change in the client is "
"backwards compatible, so old clusters (without RBAC enabled) can be reached "
"with certificates generated by the new client. However, old magnum clients "
"will generate certificates that will not be able to contact RBAC enabled "
"clusters. This issue affects only k8s_fedora_atomic clusters and clients "
"<=2.8.0, note that 2.8.0 is still a queens release but only 2.9.0 includes "
"the relevant patch. Finally, users can always generate and sign the "
"certificates using this [0] procedure even with old clients since only the "
"cluster config command is affected. [0] https://docs.openstack.org/magnum/"
"latest/user/index.html#interfacing-with-a-secure-cluster"
msgstr ""
"Using the queens (>=2.9.0) python-magnumclient, when a user executes "
"Openstack coe cluster config, the client certificate has admin as Common "
"Name (CN) and system:masters for Organisation which are required for "
"authorisation with RBAC enabled clusters. This change in the client is "
"backwards compatible, so old clusters (without RBAC enabled) can be reached "
"with certificates generated by the new client. However, old magnum clients "
"will generate certificates that will not be able to contact RBAC enabled "
"clusters. This issue affects only k8s_fedora_atomic clusters and clients "
"<=2.8.0, note that 2.8.0 is still a queens release but only 2.9.0 includes "
"the relevant patch. Finally, users can always generate and sign the "
"certificates using this [0] procedure even with old clients since only the "
"cluster config command is affected. [0] https://docs.openstack.org/magnum/"
"latest/user/index.html#interfacing-with-a-secure-cluster"
msgid "Welcome to Magnum Release Notes's documentation!"
msgstr "Welcome to Magnum Release Notes documentation!"
msgid ""
"When creating a multi-master cluster, all master nodes will attempt to "
"create kubernetes resources in the cluster at this same time, like coredns, "
"the dashboard, calico etc. This race conditon shouldn't be a problem when "
"doing declarative calls instead of imperative (kubectl apply instead of "
"create). However, due to [1], kubectl fails to apply the changes and the "
"deployemnt scripts fail causing cluster to creation to fail in the case of "
"Heat SoftwareDeployments. This patch passes the ResourceGroup index of every "
"master so that resource creation will be attempted only from the first "
"master node. [1] https://github.com/kubernetes/kubernetes/issues/44165"
msgstr ""
"When creating a multi-master cluster, all master nodes will attempt to "
"create Kubernetes resources in the cluster at this same time, like coredns, "
"the dashboard, calico etc. This race condition shouldn't be a problem when "
"doing declarative calls instead of imperative (kubectl apply instead of "
"create). However, due to [1], kubectl fails to apply the changes and the "
"deployment scripts fail causing cluster to creation to fail in the case of "
"Heat SoftwareDeployments. This patch passes the ResourceGroup index of every "
"master so that resource creation will be attempted only from the first "
"master node. [1] https://github.com/kubernetes/kubernetes/issues/44165"
msgid ""
"[1] https://github.com/projectatomic/atomic-system-containers [2] https://"
"hub.docker.com/r/openstackmagnum/kubernetes-kubelet/tags/ [3] https://pagure."
@ -783,6 +1000,9 @@ msgstr ""
msgid "[1] https://review.openstack.org/#/c/311476/"
msgstr "[1] https://review.openstack.org/#/c/311476/"
msgid "[1] https://review.openstack.org/#/q/topic:bp/federation-api"
msgstr "[1] https://review.openstack.org/#/q/topic:bp/federation-api"
msgid "[1]. https://blueprints.launchpad.net/magnum/+spec/policy-in-code"
msgstr "[1]. https://blueprints.launchpad.net/magnum/+spec/policy-in-code"
@ -804,3 +1024,23 @@ msgstr ""
"to disable CA validation if you have self-signed certificates for the "
"OpenStack APIs or you have your own Certificate Authority and you have not "
"installed the Certificate Authority to all nodes."
msgid ""
"k8s_fedora Remove cluster role from the kubernetes-dashboard account. When "
"accessing the dashboard and skip authentication, users login with the "
"kunernetes-dashboard service account, if that service account has the "
"cluster role, users have admin access without authentication. Create an "
"admin service account for this use case and others."
msgstr ""
"k8s_fedora Remove cluster role from the kubernetes-dashboard account. When "
"accessing the dashboard and skip authentication, users login with the "
"kunernetes-dashboard service account, if that service account has the "
"cluster role, users have admin access without authentication. Create an "
"admin service account for this use case and others."
msgid ""
"k8s_fedora_atomic clusters are deployed with RBAC support. Along with RBAC "
"Node authorization is added so the appropriate certificates are generated."
msgstr ""
"k8s_fedora_atomic clusters are deployed with RBAC support. Along with RBAC "
"Node authorization is added so the appropriate certificates are generated."

View File

@ -0,0 +1,64 @@
# Gérald LONLAS <g.lonlas@gmail.com>, 2016. #zanata
msgid ""
msgstr ""
"Project-Id-Version: magnum\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2018-08-15 16:04+0000\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"PO-Revision-Date: 2016-10-22 04:59+0000\n"
"Last-Translator: Gérald LONLAS <g.lonlas@gmail.com>\n"
"Language-Team: French\n"
"Language: fr\n"
"X-Generator: Zanata 4.3.3\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
msgid ""
"--keypair-id parameter in magnum CLI cluster-template-create has been "
"renamed to --keypair."
msgstr ""
"Le paramètre --keypair-id dans cluster-template-create du CLI magnum a été "
"renommé pour --keypair."
msgid "3.0.0"
msgstr "3.0.0"
msgid "3.1.0"
msgstr "3.1.0"
msgid ":ref:`genindex`"
msgstr ":ref:`genindex`"
msgid ":ref:`search`"
msgstr ":ref:`search`"
msgid "Contents:"
msgstr "Contenu :"
msgid "Current Series Release Notes"
msgstr "Note de la release actuelle"
msgid "Deprecation Notes"
msgstr "Notes dépréciées "
msgid "Indices and tables"
msgstr "Index et table des matières"
msgid "New Features"
msgstr "Nouvelles fonctionnalités"
msgid "Newton Series Release Notes"
msgstr "Note de release pour Newton"
msgid "Security Issues"
msgstr "Problèmes de sécurités"
msgid "Upgrade Notes"
msgstr "Notes de mises à jours"
msgid "Welcome to Magnum Release Notes's documentation!"
msgstr "Bienvenue dans la documentation de la note de Release de Magnum"
msgid "[1] https://review.openstack.org/#/c/311476/"
msgstr "[1] https://review.openstack.org/#/c/311476/"