Skip to content

Conversation

@SoldierSacha
Copy link

Motivation and Context

How Has This Been Tested?

Breaking Changes

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)
  • Documentation update

Checklist

  • I have read the MCP Documentation
  • My code follows the repository's style guidelines
  • New and existing tests pass locally
  • I have added appropriate error handling
  • I have added or updated documentation as needed

Additional context

…for-oauth-client-credentials

Add OAuth client credentials grant
…mplement-client-credentials-support

Fix auth registration for client credentials
…mentation-of-client-credentials-flow

Refactor auth helper methods
Fix failing tests and pyright
…eerror-in-pytest-test-case

Fix OAuth tests using async fixtures
Fix resumption token update logic
Add OAuth token exchange support
Add token exchange docs
…change-implementation-for-test-failures

Fix token exchange metadata tests
Reported-by: sachabaniassad
Fix pyright case issues in tests and example
SoldierSacha and others added 28 commits September 23, 2025 13:45
…-test-for-client-registration

Allow additional grant types during client registration
…ge-conflicts-in-sdk-fork

Resolve OAuth auth flow merge conflicts
…ionreseterror-in-stdio_client-test

Handle closed stdin in stdio client
# Conflicts:
#	src/mcp/client/auth/oauth2.py
#	src/mcp/shared/auth.py
#	tests/client/test_auth.py
#	tests/issues/test_88_random_error.py
#	tests/shared/test_streamable_http.py
…hub-merge-conflicts-for-oauth-support

Resolve upstream merge conflicts while preserving OAuth extensions
This commit resolves two critical issues that arose after merging upstream changes:

1. Export missing OAuth providers: Added ClientCredentialsProvider and
   TokenExchangeProvider to mcp.client.auth module exports. These providers
   are essential for the client credentials and token exchange grant types
   that were added in the OAuth support fork.

2. Add redirect_uris validation: Implemented validation to ensure redirect_uris
   is provided when authorization_code is in the grant_types. This field is
   required for the authorization code flow but optional for client_credentials
   and token_exchange flows which don't use redirect URIs.

These fixes ensure all tests pass while maintaining the integrity of the
OAuth extensions including client credentials and token exchange grant types.
@SoldierSacha SoldierSacha changed the title Claude/fix oauth merge conflicts 011 c un5i r64u p za lg ke1 mf7 j (Closed) Nov 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants