Fix: Add quarkus.oidc.authentication.redirect-path=/auth/callback for OAuth callback handling

Quarkus OIDC needs explicit redirect-path configuration to handle the OAuth callback
from Keycloak at /auth/callback. Without this, the endpoint returns 404 Not Found
causing 502 Bad Gateway during authentication flow.

This fixes the OAuth callback 502 error after successful Keycloak authentication.
This commit is contained in:
dahoud
2025-12-14 00:52:37 +00:00
parent 9164f00aaa
commit d42c10d029
12 changed files with 28 additions and 244 deletions

View File

@@ -2,7 +2,7 @@
# Ce fichier est utilisé avec le profil Quarkus "prod"
# Configuration HTTP
quarkus.http.port=8086
quarkus.http.port=8080
quarkus.http.host=0.0.0.0
quarkus.http.root-path=/
quarkus.http.so-reuse-port=true
@@ -69,11 +69,12 @@ quarkus.oidc.client-id=unionflow-client
quarkus.oidc.credentials.secret=${KEYCLOAK_CLIENT_SECRET}
quarkus.oidc.application-type=web-app
quarkus.oidc.authentication.redirect-path=/auth/callback
quarkus.oidc.authentication.force-redirect-https-scheme=true
quarkus.oidc.authentication.restore-path-after-redirect=true
quarkus.oidc.authentication.scopes=openid,profile,email,roles
quarkus.oidc.token.issuer=https://security.lions.dev/realms/unionflow
quarkus.oidc.tls.verification=required
quarkus.oidc.authentication.cookie-same-site=strict
quarkus.oidc.authentication.cookie-same-site=lax
quarkus.oidc.authentication.java-script-auto-redirect=false
quarkus.oidc.discovery-enabled=true
quarkus.oidc.verify-access-token=true