Fix: Add quarkus.oidc.authentication.redirect-path=/auth/callback for OAuth callback handling
Quarkus OIDC needs explicit redirect-path configuration to handle the OAuth callback from Keycloak at /auth/callback. Without this, the endpoint returns 404 Not Found causing 502 Bad Gateway during authentication flow. This fixes the OAuth callback 502 error after successful Keycloak authentication.
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
# Ce fichier est utilisé avec le profil Quarkus "prod"
|
||||
|
||||
# Configuration HTTP
|
||||
quarkus.http.port=8086
|
||||
quarkus.http.port=8080
|
||||
quarkus.http.host=0.0.0.0
|
||||
quarkus.http.root-path=/
|
||||
quarkus.http.so-reuse-port=true
|
||||
@@ -69,11 +69,12 @@ quarkus.oidc.client-id=unionflow-client
|
||||
quarkus.oidc.credentials.secret=${KEYCLOAK_CLIENT_SECRET}
|
||||
quarkus.oidc.application-type=web-app
|
||||
quarkus.oidc.authentication.redirect-path=/auth/callback
|
||||
quarkus.oidc.authentication.force-redirect-https-scheme=true
|
||||
quarkus.oidc.authentication.restore-path-after-redirect=true
|
||||
quarkus.oidc.authentication.scopes=openid,profile,email,roles
|
||||
quarkus.oidc.token.issuer=https://security.lions.dev/realms/unionflow
|
||||
quarkus.oidc.tls.verification=required
|
||||
quarkus.oidc.authentication.cookie-same-site=strict
|
||||
quarkus.oidc.authentication.cookie-same-site=lax
|
||||
quarkus.oidc.authentication.java-script-auto-redirect=false
|
||||
quarkus.oidc.discovery-enabled=true
|
||||
quarkus.oidc.verify-access-token=true
|
||||
|
||||
Reference in New Issue
Block a user