DEBUG: Add detailed OIDC cookie debugging for file preview issues
- Added logging for OIDC session presence and type detection - Will help identify why OIDC cookies aren't being sent during file preview requests - Keycloak login works but file previews fail due to missing OIDC cookie
This commit is contained in:
parent
d45ae31f10
commit
536e544d04
|
|
@ -15,12 +15,19 @@ export const isAuthenticated = async (event: any): Promise<boolean> => {
|
||||||
// Check Directus token authentication
|
// Check Directus token authentication
|
||||||
try {
|
try {
|
||||||
const directusToken = getCookie(event, 'directus_token');
|
const directusToken = getCookie(event, 'directus_token');
|
||||||
|
console.log('[auth] Checking Directus token:', directusToken ? 'present' : 'not found');
|
||||||
|
|
||||||
if (directusToken) {
|
if (directusToken) {
|
||||||
// Validate Directus token is not expired
|
// Validate Directus token is not expired
|
||||||
const directusExpiry = getCookie(event, 'directus_token_expired_at');
|
const directusExpiry = getCookie(event, 'directus_token_expired_at');
|
||||||
|
console.log('[auth] Directus expiry cookie:', directusExpiry ? directusExpiry : 'not found');
|
||||||
|
|
||||||
if (directusExpiry) {
|
if (directusExpiry) {
|
||||||
const expiryTime = parseInt(directusExpiry);
|
const expiryTime = parseInt(directusExpiry);
|
||||||
if (Date.now() < expiryTime) {
|
const currentTime = Date.now();
|
||||||
|
console.log('[auth] Directus expiry check:', { currentTime, expiryTime, isValid: currentTime < expiryTime });
|
||||||
|
|
||||||
|
if (currentTime < expiryTime) {
|
||||||
console.log('[auth] Authenticated via Directus token');
|
console.log('[auth] Authenticated via Directus token');
|
||||||
return true;
|
return true;
|
||||||
} else {
|
} else {
|
||||||
|
|
@ -39,8 +46,11 @@ export const isAuthenticated = async (event: any): Promise<boolean> => {
|
||||||
// Check OIDC session authentication
|
// Check OIDC session authentication
|
||||||
try {
|
try {
|
||||||
const oidcSession = getCookie(event, 'nuxt-oidc-auth');
|
const oidcSession = getCookie(event, 'nuxt-oidc-auth');
|
||||||
|
console.log('[auth] Checking OIDC session:', oidcSession ? 'present' : 'not found');
|
||||||
|
|
||||||
if (oidcSession) {
|
if (oidcSession) {
|
||||||
// Note: OIDC session might be encrypted, we'll validate it properly in session endpoint
|
// Note: OIDC session might be encrypted, we'll validate it properly in session endpoint
|
||||||
|
console.log('[auth] OIDC session found, type:', oidcSession.startsWith('Fe26.2**') ? 'encrypted' : 'plain');
|
||||||
console.log('[auth] Authenticated via OIDC session');
|
console.log('[auth] Authenticated via OIDC session');
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue