fix: remove forced follow_redirects from httpx_client_factory calls#3496
fix: remove forced follow_redirects from httpx_client_factory calls#3496
Conversation
Remove the `follow_redirects=True` kwarg that was being forced onto custom httpx_client_factory calls with a type: ignore suppression. The McpHttpClientFactory protocol does not include follow_redirects, so this was a protocol violation. httpx already strips Authorization headers on cross-origin redirects via its _redirect_headers mechanism. 🤖 Co-authored-by: Claude <[email protected]>
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 317ffebfa5
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
| http_client = self.httpx_client_factory( | ||
| headers=headers, | ||
| auth=self.auth, | ||
| follow_redirects=True, # type: ignore[call-arg] | ||
| **({"timeout": timeout} if timeout else {}), |
There was a problem hiding this comment.
Preserve redirect following for custom client factories
Calling httpx_client_factory without follow_redirects=True changes runtime behavior for common factories like httpx.AsyncClient: redirects are now disabled even though the default path (create_mcp_http_client) still follows them. This can break session startup when servers canonicalize transport URLs with 307/302 redirects (for example /mcp/ → /mcp, which is covered in tests/server/test_streamable_http_no_redirect.py), but only for users who provide a custom factory for unrelated concerns (verify/proxy/timeouts).
Useful? React with 👍 / 👎.
Test Failure AnalysisSummary: One test in Root Cause: The failure is pre-existing Windows flakiness in the streamable HTTP integration tests — not caused by the removal of
Suggested Solution: This PR's code change is correct and the test failure is not related to it. No changes needed from this PR's perspective. If desired, the Windows flakiness could be addressed separately by adding Detailed AnalysisFailing job: Tests: Python 3.10 on windows-latest (Job ID 67078187040) Log excerpt: The server received and responded to a POST request (200 OK), but the client was stuck waiting for the SSE stream to terminate. The asyncio event loop thread is blocked in Why this isn't caused by the PR: The PR removes Pre-existing flakiness: The Related Files
|
…ss-origin-redirects
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 4099ee3963
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
| httpx_client_factory=tracking_factory, | ||
| ) | ||
| assert transport.httpx_client_factory is tracking_factory | ||
| assert "follow_redirects" not in received_kwargs |
There was a problem hiding this comment.
Invoke session setup before checking factory kwargs
This assertion is currently vacuous because StreamableHttpTransport does not call httpx_client_factory during construction; the factory is invoked from connect_session. In this test, received_kwargs therefore remains empty regardless of transport behavior, so the check will pass even if follow_redirects is reintroduced later and the regression this test is meant to prevent comes back.
Useful? React with 👍 / 👎.
httpx already strips Authorization headers on cross-origin redirects, so follow_redirects is safe to keep. Removing it broke redirect handling for users providing custom factories.
The test asserted on received_kwargs but never called connect_session, so the factory was never invoked and the assertion was a no-op.
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: bd432e9681
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
| client = create_mcp_http_client( | ||
| headers={"Authorization": "Bearer secret"}, | ||
| ) | ||
| client._transport = httpx.ASGITransport(app=app) |
There was a problem hiding this comment.
Use client transport injection that works with proxy mounts
Setting client._transport directly here does not reliably route requests through the ASGI app, because create_mcp_http_client() builds an httpx.AsyncClient with trust_env=True and proxy mounts are selected before _transport for matching URLs. In environments with HTTP_PROXY/HTTPS_PROXY set, this test sends traffic to the proxy instead of the in-memory app (I reproduced a 403 at this assertion), so the new test is flaky/failing rather than validating redirect header stripping.
Useful? React with 👍 / 👎.
Co-authored-by: Claude Opus 4.6 <[email protected]> Co-authored-by: Jeremiah Lowin <[email protected]> Co-authored-by: Marvin Context Protocol <41898282+Marvin Context [email protected]> Co-authored-by: voidborne-d <[email protected]> Co-authored-by: marvin-context-protocol[bot] <225465937+marvin-context-protocol[bot]@users.noreply.github.com> Co-authored-by: Claude <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: d 🔹 <[email protected]> Co-authored-by: Jeremiah Lowin <[email protected]> Co-authored-by: nightcityblade <[email protected]> Co-authored-by: Claude Opus 4.6 (1M context) <[email protected]> Co-authored-by: Claude Sonnet 4.6 <[email protected]> Co-authored-by: Bill Easton <[email protected]> Co-authored-by: Sumanshu Nankana <[email protected]> Co-authored-by: Eric Robinson <[email protected]> Co-authored-by: Martim Santos <[email protected]> Co-authored-by: d 🔹 <[email protected]> Co-authored-by: Matthieu B <[email protected]> Co-authored-by: Sascha Buehrle <[email protected]> Co-authored-by: Hakancan <[email protected]> Co-authored-by: nightcityblade <[email protected]> Co-authored-by: Matt Hallowell <[email protected]> Co-authored-by: nate nowack <[email protected]> Co-authored-by: Bill Easton <[email protected]> Co-authored-by: Marcus Shu <[email protected]> Co-authored-by: Rushabh Doshi <[email protected]> Co-authored-by: AIKAWA Shigechika <[email protected]> Co-authored-by: Jeremy Simon <[email protected]> Co-authored-by: Miguel Miranda Dias <[email protected]> Co-authored-by: Anthony James Padavano <[email protected]> Co-authored-by: Mostafa Kamal <[email protected]> Fix auto-close MRE script posting comment without closing (#3386) Fix WorkOS token scope verification bypass 🤖 Generated with Codex (#3407) Fix initialize McpError fallthrough 🤖 Generated with Codex (#3413) Fix transform arg collisions with passthrough params (#3431) Fix get_* returning None when latest version is disabled (#3439) Fix get_* returning None when latest version is disabled (#3421) Fix server lifespan overlap teardown (#3415) Fix $ref output schema object detection regression (#3420) resolved annotations (#3429) Fix async partial callables rejected by iscoroutinefunction (#3438) Fix async partial callables rejected by iscoroutinefunction (#3423) fix: add version to components (#3458) fix: use intent-based flag for OIDC scope patch in load_access_token (#3465) Fixes #3461 fix: normalize Google scope shorthands and surface valid_scopes (#3477) fix: resolve ty 0.0.23 type-checking errors and bump pin (#3481) fix: shield lifespan teardown from cancellation (#3480) fix: forward custom_route endpoints from mounted servers (#3462) fix updates _get_additional_http_routes() to traverse providers, Fixes #3457 fix: remove hardcoded version from CLI help text (#3456) fix: monty 0.0.8 compatibility, drop external_functions from constructor (#3468) fix: task test teardown hanging 5s per test (#3499) Closes #3498 fix: validate workspace path is a directory before cursor install (#3440) Fixes #3426 fix: handle re.error from malformed URI templates in build_regex (#3501) fix: reject empty/OIDC-only required_scopes in AzureProvider (#3503) fix: restrict $ref resolution to local refs only (SSRF/LFI) (#3502) fix warnings and timeouts (#3504) close upgrade check issue when build passes (#3505) Closes #3484 fix: URL-encode path params to prevent SSRF/path traversal (GHSA-vv7q-7jx5-f767) (#3507) fix: prevent path traversal in skill download (#3493) fix: prefer IdP-granted scopes over client-requested scopes in OAuthProxy (#3492) fix: remove unrelated transform and http.py changes from PR scope fix: remove forced follow_redirects from httpx_client_factory calls (#3496) fix: stop passing follow_redirects to httpx_client_factory fix: restore follow_redirects=True for custom httpx client factories Closes #3509 fix: CSRF double-submit cookie check in consent flow (#3519) fix: validate server names in install commands (#3522) fix: use raw strings for regex in pytest.raises match (#3523) fix: reject refresh tokens used as Bearer access tokens (#3524) fix: route ResourcesAsTools/PromptsAsTools through server middleware (#3495) fix: resolve Pyright "Module is not callable" on @tool, @resource, @prompt decorators (#3540) fix: filter warnings by message in KEY_PREFIX test (#3549) fix: suppress output schema for ToolResult subclass annotations (#3548) fix: increase sleep duration in proxy cache tests (#3567) fix: store absolute token expiry to prevent stale expires_in on reload (#3572) fix: preserve tool properties named 'title' during schema compression (#3582) Fix loopback redirect URI port matching per RFC 8252 §7.3 (#3589) Fix app tool routing: visibility check and middleware propagation (#3591) Fix query parameter serialization to respect OpenAPI explode/style settings (#3595) Fix dev apps form: union types, textarea support, JSON parsing (#3597) fix(google): replace deprecated /oauth2/v1/tokeninfo with /oauth2/v3/userinfo (#3603) fix: resolve EntraOBOToken dependency injection through MultiAuth (#3609) fix(docs): correct misleading stateless_http header (#3622) fix: filesystem provider import machinery (#3626) Closes #3625 (issues 2, 3, 6) fix: recover StdioTransport after subprocess exits (#3630) fix(server): preserve mounted tool task metadata (#3632) fix: scope deprecation warning filter to FastMCPDeprecationWarning (#3649) fix imports, add PrefabAppConfig (#3650) fix: resolve CurrentFastMCP/ctx.fastmcp to child server in mounted background tasks (#3651) Fix blocking docs issues: chart imports, Select API, Rx consistency (#3652) closed by default (#3657) Fix prompt caching middleware missing wrap/unwrap round-trip (#3666) fix: serialize object query params per OpenAPI style/explode rules (#3662) Fixes #2857 fix: HTTP request headers not accessible in background task workers (#3631) fix: restore HTTP headers in worker execution path for background tasks (#3681) fix: strip discriminator after dereferencing schemas (#3682) fix: remove stale ty:ignore directives for ty 0.0.26 (#3684) Fix docs gaps in app provider pages (#3690) fix: dev apps log panel UX improvements (#3698) fix dev server empty string args (#3700)
The
StreamableHttpTransport.connect_sessionwas passingfollow_redirects=Trueto customhttpx_client_factorycallables with a# type: ignore[call-arg]suppression, since theMcpHttpClientFactoryprotocol does not includefollow_redirectsas a parameter. This was a protocol violation that forced redirect-following behavior onto custom factories regardless of the caller's intent, and raised concerns about auth credential leakage to cross-origin redirect targets.The fix removes the forced
follow_redirects=Truekwarg. httpx already provides built-in protection: its_redirect_headersmethod automatically stripsAuthorizationheaders on cross-origin redirects (any redirect where scheme, host, or port differs). This means Bearer tokens, Basic auth, and other credentials in theAuthorizationheader are never forwarded to a different origin, even whenfollow_redirects=Trueis set on the client. The default path viacreate_mcp_http_clientand theverifyfactory continue to work as before.