debug: log access_token format to diagnose opaque vs JWT
All checks were successful
CI / cleanup-branch (push) Has been skipped
CI / build (push) Successful in 1m18s
CI / docker (push) Successful in 1m1s
CI / deploy-feature (push) Has been skipped
CI / deploy (push) Successful in 38s

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
hsiegeln
2026-04-07 10:39:53 +02:00
parent 52f5a0414e
commit 725f826513

View File

@@ -117,6 +117,10 @@ public class OidcTokenExchanger {
// Try roles from access_token first (JWT providers like Logto, Keycloak),
// then fall back to id_token
List<String> roles = Collections.emptyList();
log.info("OIDC access_token: isJwt={}, length={}, prefix='{}'",
accessTokenStr != null && accessTokenStr.contains("."),
accessTokenStr != null ? accessTokenStr.length() : 0,
accessTokenStr != null ? accessTokenStr.substring(0, Math.min(30, accessTokenStr.length())) : "null");
if (accessTokenStr != null && accessTokenStr.contains(".")) {
try {
String audience = config.audience() != null ? config.audience() : "";