ghostguild-org/server/routes/.well-known/openid-configuration.get.ts
Jennie Robinson Faber a3b4f1118c Ensure OIDC endpoints use https behind reverse proxy
Set x-forwarded-proto header on requests before passing to
oidc-provider so generated URLs use https:// in production.
2026-03-01 16:49:40 +00:00

29 lines
924 B
TypeScript

/**
* Forward /.well-known/openid-configuration to the oidc-provider.
*
* The provider generates this discovery document automatically, but since the
* catch-all route is mounted under /oidc/, requests to /.well-known/ need
* explicit forwarding.
*/
import { getOidcProvider } from "../../utils/oidc-provider.js";
export default defineEventHandler(async (event) => {
const provider = await getOidcProvider();
const { req, res } = event.node;
// The provider expects the path relative to its root
req.url = "/.well-known/openid-configuration";
// Ensure the provider sees https when behind Traefik
if (!req.headers["x-forwarded-proto"]) {
req.headers["x-forwarded-proto"] = "https";
}
const callback = provider.callback() as Function;
await new Promise<void>((resolve, reject) => {
callback(req, res, (err: unknown) => {
if (err) reject(err);
else resolve();
});
});
});