-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OIDC CodeAuthenticationMechanism does not work if the proactive authentication is disabled #12090
Comments
Hi Stuart, @stuartwdouglas, I will start investigating tomorrow, if you have some ideas what might be going wrong then let me know please |
I think it can be a simple fix, hopefully, which needs to be added somewhere around the code which deals with the disabled proactive authentication:
It is handled in the proactive auth case here: The same does not seem to work at |
You likely need to add a new RESTEasy exception mapper to handle this. |
This issue occurs when using Quarkus OIDC this way:
The flag |
@stuartwdouglas You are right, I'll need to create a PR to add |
@haraldatbmw I have reproduced a Ideally, you'd have a matching
Note we still need to resolve this issue before it will work :-) |
@stuartwdouglas hi Stuart, I'm still seeing one remaining issue related to the RP-initiated logout, Because the user is already authenticated, I'm adding:
which gives control to
Looks like it is circling, do you have some ideas why the exception mapper is not reached in this case ? Update: never mind about this circular ref, the same happens in the proactive case, but what is different with the proactive being off is that at this point, |
Cool, the generic |
Is there some easy way I can reproduce the ciruclar ref issue? |
@stuartwdouglas sure, probably the simplest would be to get this branch and disable all but Or you can do it on the master branch as well, add
to the test |
@stuartwdouglas by the way, I removed a |
@sberyozkin I just tried the fix with Quarkus-1.9.0.Final. It works for the flow and the REST endpoints but breaks my unit-tests which are using the My current workaround is |
Created a new issue #12882 |
Describe the bug
Adding
quarkus.http.auth.proactive=false
breaks the OIDC adapter code flow (ex, adding this property tointegration-tests/oidc-code-flow/..../application.properties
breaks the tests)Reported originally at https://quarkusio.zulipchat.com/#narrow/stream/187030-users/topic/OIDC.20BearerAuthenticationMechanism.20for.20unproteced.20resources
The text was updated successfully, but these errors were encountered: