web/admin: fix missing SAML Provider ECDSA options (#10612)
* web/admin: fix missing SAML Provider ECDSA options Signed-off-by: Jens Langhammer <jens@goauthentik.io> * deduplicate Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
@ -1,3 +1,7 @@
|
|||||||
|
import {
|
||||||
|
digestAlgorithmOptions,
|
||||||
|
signatureAlgorithmOptions,
|
||||||
|
} from "@goauthentik/admin/applications/wizard/methods/saml/SamlProviderOptions";
|
||||||
import "@goauthentik/admin/common/ak-crypto-certificate-search";
|
import "@goauthentik/admin/common/ak-crypto-certificate-search";
|
||||||
import "@goauthentik/admin/common/ak-flow-search/ak-flow-search";
|
import "@goauthentik/admin/common/ak-flow-search/ak-flow-search";
|
||||||
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
||||||
@ -16,14 +20,12 @@ import { customElement } from "lit/decorators.js";
|
|||||||
import { ifDefined } from "lit/directives/if-defined.js";
|
import { ifDefined } from "lit/directives/if-defined.js";
|
||||||
|
|
||||||
import {
|
import {
|
||||||
DigestAlgorithmEnum,
|
|
||||||
FlowsInstancesListDesignationEnum,
|
FlowsInstancesListDesignationEnum,
|
||||||
PropertymappingsApi,
|
PropertymappingsApi,
|
||||||
PropertymappingsSamlListRequest,
|
PropertymappingsSamlListRequest,
|
||||||
ProvidersApi,
|
ProvidersApi,
|
||||||
SAMLPropertyMapping,
|
SAMLPropertyMapping,
|
||||||
SAMLProvider,
|
SAMLProvider,
|
||||||
SignatureAlgorithmEnum,
|
|
||||||
SpBindingEnum,
|
SpBindingEnum,
|
||||||
} from "@goauthentik/api";
|
} from "@goauthentik/api";
|
||||||
|
|
||||||
@ -329,25 +331,7 @@ export class SAMLProviderFormPage extends BaseProviderForm<SAMLProvider> {
|
|||||||
name="digestAlgorithm"
|
name="digestAlgorithm"
|
||||||
>
|
>
|
||||||
<ak-radio
|
<ak-radio
|
||||||
.options=${[
|
.options=${digestAlgorithmOptions}
|
||||||
{
|
|
||||||
label: "SHA1",
|
|
||||||
value: DigestAlgorithmEnum._200009Xmldsigsha1,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
label: "SHA256",
|
|
||||||
value: DigestAlgorithmEnum._200104Xmlencsha256,
|
|
||||||
default: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
label: "SHA384",
|
|
||||||
value: DigestAlgorithmEnum._200104XmldsigMoresha384,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
label: "SHA512",
|
|
||||||
value: DigestAlgorithmEnum._200104Xmlencsha512,
|
|
||||||
},
|
|
||||||
]}
|
|
||||||
.value=${this.instance?.digestAlgorithm}
|
.value=${this.instance?.digestAlgorithm}
|
||||||
>
|
>
|
||||||
</ak-radio>
|
</ak-radio>
|
||||||
@ -358,29 +342,7 @@ export class SAMLProviderFormPage extends BaseProviderForm<SAMLProvider> {
|
|||||||
name="signatureAlgorithm"
|
name="signatureAlgorithm"
|
||||||
>
|
>
|
||||||
<ak-radio
|
<ak-radio
|
||||||
.options=${[
|
.options=${signatureAlgorithmOptions}
|
||||||
{
|
|
||||||
label: "RSA-SHA1",
|
|
||||||
value: SignatureAlgorithmEnum._200009XmldsigrsaSha1,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
label: "RSA-SHA256",
|
|
||||||
value: SignatureAlgorithmEnum._200104XmldsigMorersaSha256,
|
|
||||||
default: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
label: "RSA-SHA384",
|
|
||||||
value: SignatureAlgorithmEnum._200104XmldsigMorersaSha384,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
label: "RSA-SHA512",
|
|
||||||
value: SignatureAlgorithmEnum._200104XmldsigMorersaSha512,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
label: "DSA-SHA1",
|
|
||||||
value: SignatureAlgorithmEnum._200009XmldsigdsaSha1,
|
|
||||||
},
|
|
||||||
]}
|
|
||||||
.value=${this.instance?.signatureAlgorithm}
|
.value=${this.instance?.signatureAlgorithm}
|
||||||
>
|
>
|
||||||
</ak-radio>
|
</ak-radio>
|
||||||
|
|||||||
Reference in New Issue
Block a user