Skip to content

Invalidate credentials preview #2

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 233 commits into
base: main
Choose a base branch
from
Draft

Conversation

geelen
Copy link
Owner

@geelen geelen commented May 30, 2025

No description provided.

formulahendry and others added 21 commits April 20, 2025 17:51
Bumps the npm_and_yarn group with 1 update in the / directory: [formidable](https://github.com/node-formidable/formidable).


Updates `formidable` from 3.5.2 to 3.5.4
- [Release notes](https://github.com/node-formidable/formidable/releases)
- [Changelog](https://github.com/node-formidable/formidable/blob/master/CHANGELOG.md)
- [Commits](https://github.com/node-formidable/formidable/commits)

---
updated-dependencies:
- dependency-name: formidable
  dependency-version: 3.5.4
  dependency-type: indirect
  dependency-group: npm_and_yarn
...

Signed-off-by: dependabot[bot] <[email protected]>
Add inline comments explaining why GET and DELETE endpoints return 405 in stateless mode:
- GET: SSE notifications not supported without session management
- DELETE: Session termination not needed in stateless mode
…e with completion or prompt completable argument registration
@geelen geelen force-pushed the invalidate-credentials-preview branch from d70a3b6 to 49c155a Compare May 30, 2025 03:47
Copy link

pkg-pr-new bot commented May 30, 2025

Open in StackBlitz

npm i https://pkg.pr.new/geelen/typescript-sdk/@modelcontextprotocol/sdk@2

commit: 877f4bf

@geelen geelen force-pushed the invalidate-credentials-preview branch from 49c155a to cdf3508 Compare June 6, 2025 08:25
sinedied and others added 2 commits June 9, 2025 14:17
…gister-completions-capabilities

fix: Ensure completions capability is registered on setCompletionRequestHandler call
ddworken and others added 26 commits June 26, 2025 16:12
Implement DNS Rebinding Protections per spec
…arser-dep

fix: add missing eventsource-parser dependency
…-default-env

fix: add windows env PROGRAMFILES, avoid some exe can not be found
…types

add overloads for registerResource method in McpServer class
fix: extra headers when they are a Headers object
…chema

fix: missing "properties" property in empty schema
…/pid-StdioClientTransport

fix: Expose the MCP child process PID as an accessible property in StdioClientTransport
…ructured-content-with-type-safety

fix: add type safety for tool output schemas in ToolCallback
…/http-doc

docs: add error handling when it fails to start HTTP server
…elcontextprotocol#717)

* Returning undefined from `discoverOAuthMetadata` for CORS errors

This behaviour was already happening for the root URL, but the new `fetchWithCorsRetry` logic differed.

The issue was if the server returns a 404 for `/.well-known/oauth-authorization-server/xyz` that didn't have the `access-control-allow-origin`, a TypeError was being thrown. There was logic there already to handle a TypeError for a _preflight_ request (cause by custom headers), but not the fallback. I refactored so all combinations return `undefined`.

* Add test for CORS error handling that should return undefined

This test covers the scenario where both the initial request with headers
and the retry without headers fail with CORS TypeErrors. The desired
behavior is to return undefined instead of throwing.

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <[email protected]>

* fix test comment

---------

Co-authored-by: Glen Maddern <[email protected]>
Co-authored-by: Paul Carleton <[email protected]>
Co-authored-by: Claude <[email protected]>
Co-authored-by: Paul Carleton <[email protected]>
@geelen geelen force-pushed the invalidate-credentials-preview branch from cdf3508 to 490cd9e Compare July 4, 2025 05:31
geelen added 2 commits July 7, 2025 10:53
This makes it possible to parse them from JSON, using OAUTH_ERRORS

Invalidating credentials & retrying when server OAuth errors occur

Updated existing tests

Added some initial test coverage

refactored to avoid recursion as recommended
@geelen geelen force-pushed the invalidate-credentials-preview branch from 490cd9e to 877f4bf Compare July 7, 2025 01:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.