DEBUG: Add detailed OIDC cookie debugging for file preview issues

- Added logging for OIDC session presence and type detection
- Will help identify why OIDC cookies aren't being sent during file preview requests
- Keycloak login works but file previews fail due to missing OIDC cookie
This commit is contained in:
Matt 2025-06-15 17:06:01 +02:00
parent d45ae31f10
commit 536e544d04
1 changed files with 11 additions and 1 deletions

View File

@ -15,12 +15,19 @@ export const isAuthenticated = async (event: any): Promise<boolean> => {
// Check Directus token authentication
try {
const directusToken = getCookie(event, 'directus_token');
console.log('[auth] Checking Directus token:', directusToken ? 'present' : 'not found');
if (directusToken) {
// Validate Directus token is not expired
const directusExpiry = getCookie(event, 'directus_token_expired_at');
console.log('[auth] Directus expiry cookie:', directusExpiry ? directusExpiry : 'not found');
if (directusExpiry) {
const expiryTime = parseInt(directusExpiry);
if (Date.now() < expiryTime) {
const currentTime = Date.now();
console.log('[auth] Directus expiry check:', { currentTime, expiryTime, isValid: currentTime < expiryTime });
if (currentTime < expiryTime) {
console.log('[auth] Authenticated via Directus token');
return true;
} else {
@ -39,8 +46,11 @@ export const isAuthenticated = async (event: any): Promise<boolean> => {
// Check OIDC session authentication
try {
const oidcSession = getCookie(event, 'nuxt-oidc-auth');
console.log('[auth] Checking OIDC session:', oidcSession ? 'present' : 'not found');
if (oidcSession) {
// Note: OIDC session might be encrypted, we'll validate it properly in session endpoint
console.log('[auth] OIDC session found, type:', oidcSession.startsWith('Fe26.2**') ? 'encrypted' : 'plain');
console.log('[auth] Authenticated via OIDC session');
return true;
}