- Notifications
You must be signed in to change notification settings - Fork2.9k
Comparing changes
Open a pull request
base repository:modelcontextprotocol/python-sdk
Uh oh!
There was an error while loading.Please reload this page.
base:v1.22.0
head repository:modelcontextprotocol/python-sdk
Uh oh!
There was an error while loading.Please reload this page.
compare:v1.23.0
- 17commits
- 130files changed
- 12contributors
Commits on Nov 20, 2025
Add client_secret_basic authentication support (#1334)
Co-authored-by: Paul Carleton <paulc@anthropic.com>
Commits on Nov 23, 2025
Implement SEP-1577 - Sampling With Tools (#1594)
Co-authored-by: Felix Weinberger <fweinberger@anthropic.com>Co-authored-by: Claude <noreply@anthropic.com>
SEP-1330: Elicitation Enum Schema Improvements and Standards Complian…
…ce (#1246)Co-authored-by: Tapan Chugh <tapanc@cs.washington.edu>Co-authored-by: Felix Weinberger <fweinberger@anthropic.com>Co-authored-by: Felix Weinberger <3823880+felixweinberger@users.noreply.github.com>
Commits on Nov 24, 2025
[auth][conformance] add conformance auth client (#1640)
Co-authored-by: Claude <noreply@anthropic.com>Co-authored-by: Felix Weinberger <3823880+felixweinberger@users.noreply.github.com>
feat: implement SEP-991 URL-based client ID (CIMD) support (#1652)
Co-authored-by: Claude <noreply@anthropic.com>Co-authored-by: Felix Weinberger <3823880+felixweinberger@users.noreply.github.com>
Commits on Nov 25, 2025
Implement SEP-1036: URL mode elicitation for secure out-of-band inter…
…actions (#1580)Co-authored-by: Felix Weinberger <3823880+felixweinberger@users.noreply.github.com>Co-authored-by: Felix Weinberger <fweinberger@anthropic.com>
Commits on Dec 2, 2025
Support client_credentials flow with JWT and Basic auth (#1663)
Co-authored-by: Claude <noreply@anthropic.com>Co-authored-by: Felix Weinberger <3823880+felixweinberger@users.noreply.github.com>
* Auto-enable DNS rebinding protection for localhost serversWhen a FastMCP server is created with host="127.0.0.1" or "localhost"and no explicit transport_security is provided, automatically enableDNS rebinding protection. Both 127.0.0.1 and localhost are allowedas valid hosts/origins since clients may use either to connect.* Add tests for auto DNS rebinding protection on localhostTests verify that:- Protection auto-enables for host=127.0.0.1- Protection auto-enables for host=localhost- Both 127.0.0.1 and localhost are in allowed hosts/origins- Protection does NOT auto-enable for other hosts (e.g., 0.0.0.0)- Explicit transport_security settings are not overridden* Add IPv6 localhost (::1) support for DNS rebinding protectionExtend auto-enable DNS rebinding protection to also cover IPv6localhost. When host="::1", protection is now auto-enabled withappropriate allowed hosts ([::1]:*) and origins (http://[::1]:*).* Fix import ordering in test file
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:git diff v1.22.0...v1.23.0
Uh oh!
There was an error while loading.Please reload this page.