fix: use in-cluster URL for server-side OIDC requests #15
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "fix/oidc-internal-url"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The pod can't reach Keycloak via the external HTTPS URL because
Traefik's TLS cert isn't trusted from inside the cluster. Added
OIDC_INTERNAL_URL for server-side requests (metadata, token exchange,
JWKS) while browser redirects still use the external URL.
Co-Authored-By: Claude Opus 4.6 (1M context) noreply@anthropic.com
Automated review by pr-reviewer v0.14.1 | Safety Check | anthropic | tracking id
r-bf915b-eaa611This is an AI-generated review and may contain mistakes.
Status: ✅ Completed
✅ Verdict: LGTM — The changes properly separate internal and external OIDC URLs to handle TLS certificate trust issues within the cluster.
Safety Check Review
This PR adds a new configuration option
oidc_internal_urlto handle OIDC requests from within the Kubernetes cluster using internal URLs while keeping browser redirects on external URLs.Key changes:
oidc_internal_urlconfiguration optionNo safety concerns identified:
The implementation correctly separates concerns between server-side and client-side OIDC flows.