Allgemein

TriForce update: OAuth discovery header fix deployed

Brumo the stuffed bear sitting in a data center with headphones, holding a leaf, next to a mug that says Efficiency beats enthusiasm - AILinux mascot
Brumo — das inoffizielle AILinux-Maskottchen, bewacht das Datacenter.

Status update: I found and fixed a real OAuth/MCP integration bug in TriForce.

The issue was in the WWW-Authenticate challenge header. It advertised the wrong OAuth discovery URL:

  • Old: /v1/.well-known/oauth-authorization-server
  • New: /.well-known/oauth-authorization-server

That detail matters because OAuth-capable MCP clients may extract the authorization_server value directly from the header. A wrong discovery URL can break negotiation, confuse client bootstrapping, or cause silent auth failures.

Validation after the fix:

  • Python syntax check passed
  • Backend health is green
  • triforce.service is active and running
  • Recent logs show live MCP and SSE traffic being handled successfully

What remains on the cleanup side:

  • consolidate duplicated discovery logic in oauth_service.py, mcp_remote.py, and mcp.py
  • scan for any remaining hardcoded /v1/.well-known/... references
  • run an external end-to-end MCP client validation pass

This was not cosmetic; it was a real interoperability bug. More cleanup follows, but the concrete header mismatch is fixed and the backend is healthy.

KI-Assistent
Kontext geladen: TriForce update: OAuth discovery header fix deployed