fix: OIDC discovery trusted origins for IdP registration#3714
fix: OIDC discovery trusted origins for IdP registration#3714joeyorlando merged 2 commits intomainfrom
Conversation
|
Claude finished @joeyorlando's task in 2m 22s —— View job PR Review: OIDC discovery trusted origins for IdP registration
SummaryThe fix is correct, minimal, and well-scoped. It addresses a real edge case where Better Auth's The rename from Correctness
TestsThe new test at One small thought: you might consider adding a negative assertion for a near-miss like Nits (non-blocking)
Security considerationsThe wildcard expansion ( VerdictLGTM. Ship it once CI is green. The nits above are optional cleanup. |
🤖 I have created a release *beep* *boop* --- ## [1.2.10](platform-v1.2.9...platform-v1.2.10) (2026-04-11) ### Features * make posthog analytics configurable ([#3707](#3707)) ([7ae9101](7ae9101)) ### Bug Fixes * `/llm/costs` table scrolling ([#3722](#3722)) ([6a42ba8](6a42ba8)) * apply MCP OAuth lifetime for gateway slugs ([#3711](#3711)) ([362aaec](362aaec)) * Bedrock tool name encoding ([#3706](#3706)) ([0e2c2d1](0e2c2d1)) * costs timeframes and surface limit reset settings ([#3709](#3709)) ([6e4154b](6e4154b)) * jira oauth discovery overrides ([#3721](#3721)) ([2c4cf8f](2c4cf8f)) * OIDC discovery trusted origins for IdP registration ([#3714](#3714)) ([adb5f5e](adb5f5e)) * preserve shared chat agents on fork ([#3715](#3715)) ([252edfc](252edfc)) * reranker model dropdown labels ([#3704](#3704)) ([ebd1c8a](ebd1c8a)) * session logs loading state ([#3712](#3712)) ([ffba126](ffba126)) ### Miscellaneous Chores * **ci:** add ID-JAG MCP e2e test ([#3702](#3702)) ([1a5078a](1a5078a)) * **deps:** bump next from 16.1.7 to 16.2.3 in /platform/frontend ([#3708](#3708)) ([d47967c](d47967c)) * use neutral token prefixes with legacy support ([#3719](#3719)) ([db5929c](db5929c)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). Co-authored-by: archestra-ci[bot] <222894074+archestra-ci[bot]@users.noreply.github.com> Co-authored-by: Joey Orlando <joey@archestra.ai>
What changed
This narrows a recent Better Auth trusted-origin workaround to include the admin identity-provider create flow in addition to the existing
/sso/registerpath and internalauth.apiregistration calls.Why it changed
There was a report of
Untrusted OIDC discovery URLwhile reinstalling a Generic OIDC provider in an environment even though the Okta/Archestraconfiguration matched a working setup. The root cause is that Better Auth can evaluate OIDC discovery trust against the outer/api/identity-providersrequest during provider creation, while our existing workaround only widened trust for/sso/registerand request-less internal calls.Impact
Generic OIDC provider creation and reinstall flows now allow Better Auth's discovery validation to proceed for the admin IdP registration request without widening trusted origins for normal auth traffic.