]> git.ipfire.org Git - suricata-reporter.git/commitdiff
po: Ensure all strings are being translated
authorMichael Tremer <michael.tremer@ipfire.org>
Sun, 31 Aug 2025 15:09:07 +0000 (15:09 +0000)
committerMichael Tremer <michael.tremer@ipfire.org>
Sun, 31 Aug 2025 15:09:07 +0000 (15:09 +0000)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
po/suricata-reporter.pot
src/suricata-report-generator.in
src/suricata-reporter.in

index 77a99ea55f2e3abc62eb748ce73f4ed3592c3303..3b9cf7aa1cfaae1838362dfb9bd2dfac5f19ebb8 100644 (file)
@@ -8,7 +8,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version: PACKAGE VERSION\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2025-08-31 12:36+0000\n"
+"POT-Creation-Date: 2025-08-31 15:08+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -43,6 +43,10 @@ msgstr ""
 msgid "Alerts from %s"
 msgstr ""
 
+#, c-format
+msgid "[REPORT] Intrusion Prevention System Alerts from %s"
+msgstr ""
+
 msgid "To whom it may concern,"
 msgstr ""
 
@@ -50,6 +54,22 @@ msgid ""
 "The IPFire Intrusion Preventsion System is sending you the attached report."
 msgstr ""
 
+#, c-format
+msgid "IPFire-Intrusion-Prevention-System-Report-%s.pdf"
+msgstr ""
+
+msgid "Reporter Generator for Suricata"
+msgstr ""
+
+msgid "Be more verbose"
+msgstr ""
+
+msgid "Database Path"
+msgstr ""
+
+msgid "Locale"
+msgstr ""
+
 msgid "Output Path"
 msgstr ""
 
@@ -71,6 +91,13 @@ msgstr ""
 msgid "ISO calendar week number (1-53)"
 msgstr ""
 
+#, c-format
+msgid "IPFire Intrusion Prevention System <%s>"
+msgstr ""
+
+msgid "[ALERT]"
+msgstr ""
+
 msgid "The IPFire Intrusion Preventsion System has raised the following alert:"
 msgstr ""
 
@@ -103,3 +130,9 @@ msgstr ""
 
 msgid "Informational"
 msgstr ""
+
+msgid "Reporter Service for Suricata"
+msgstr ""
+
+msgid "Configuration File"
+msgstr ""
index bb22eff41544408c15bfdf75c50238962ea30f42..fbc317bb16dca92c5e0a005623b98fbc3fc7aa61 100644 (file)
@@ -435,7 +435,7 @@ class ReportGenerator(object):
 
                # Set the Subject
                msg.add_header(
-                       "Subject", "[REPORT] Intrusion Prevention System Alerts from %s" % hostname,
+                       "Subject", _("[REPORT] Intrusion Prevention System Alerts from %s") % hostname,
                ),
 
                # Compose the content
@@ -455,7 +455,8 @@ class ReportGenerator(object):
 
                        # Attach
                        msg.add_attachment(
-                               f.read(), maintype="application", subtype="pdf", filename="report.pdf",
+                               f.read(), maintype="application", subtype="pdf",
+                               filename=_("IPFire-Intrusion-Prevention-System-Report-%s.pdf") % hostname,
                        )
 
                # Show the email
@@ -493,11 +494,11 @@ def setup_logging(loglevel=logging.INFO):
        return log
 
 def main():
-       parser = argparse.ArgumentParser(description="Reporter Generator for Suricata")
+       parser = argparse.ArgumentParser(description=_("Reporter Generator for Suricata"))
 
        # Command Line Arguments
-       parser.add_argument("--verbose", "-v", action="count", help="Be more verbose")
-       parser.add_argument("--database", help="Database",
+       parser.add_argument("--verbose", "-v", action="count", help=_("Be more verbose"))
+       parser.add_argument("--database", help=_("Database Path"),
                default="@suricatalogdir@/reporter.db")
 
        # Locale
index 737422a91edabfe4b6fea0cccef0abf3000be20e..3d0c1c328437eee42bfd2985b9a246fc2e9399e1 100644 (file)
@@ -44,9 +44,6 @@ import threading
 # Fetch the hostname
 HOSTNAME = socket.gethostname()
 
-# Email Settings
-EMAIL_FROM = "IPFire Intrusion Prevention System <%s>"
-
 log = logging.getLogger("suricata-reporter")
 log.setLevel(logging.DEBUG)
 
@@ -393,7 +390,7 @@ class Worker(threading.Thread):
                        email_from = "no-reply@%s" % HOSTNAME
 
                # Set the sender
-               msg.add_header("From", EMAIL_FROM % email_from)
+               msg.add_header("From", _("IPFire Intrusion Prevention System <%s>") % email_from)
 
                # Fetch the recipients
                email_recipients = self.config.get("email", "recipients", fallback=None)
@@ -410,7 +407,7 @@ class Worker(threading.Thread):
                )
 
                # Set the Subject
-               msg.add_header("Subject", "[ALERT][%s] %s %s - %s" % (HOSTNAME,
+               msg.add_header("Subject", "%s[%s] %s %s - %s" % (_("[ALERT]"), HOSTNAME,
                        "*" * (4 - event.alert_severity), event.alert_signature, event.alert_category))
 
                # Add the timestamp as Date: header
@@ -643,12 +640,12 @@ def setup_logging(loglevel=logging.INFO):
        return log
 
 async def main():
-       parser = argparse.ArgumentParser(description="Reporter Service for Suricata")
+       parser = argparse.ArgumentParser(description=_("Reporter Service for Suricata"))
 
        # Command Line Arguments
-       parser.add_argument("--verbose", "-v", action="count", help="Be more verbose")
-       parser.add_argument("--config", "-c",
-               help="Configuration File", default="@suricataconfdir@/reporter.conf")
+       parser.add_argument("--verbose", "-v", action="count", help=_("Be more verbose"))
+       parser.add_argument("--config", "-c", help=_("Configuration File"),
+               default="@suricataconfdir@/reporter.conf")
 
        # Parse command line arguments
        args = parser.parse_args()
@@ -664,7 +661,7 @@ async def main():
 
        setup_logging(loglevel=loglevel)
 
-       # Create the repoert
+       # Create the reporter
        reporter = Reporter(args.config)
 
        # Run!