Skip to content

feat: add conformance Tests for SEP-2549: TTL for List Results#275

Merged
CaitieM20 merged 12 commits into
modelcontextprotocol:mainfrom
CaitieM20:ttl-tests
May 22, 2026
Merged

feat: add conformance Tests for SEP-2549: TTL for List Results#275
CaitieM20 merged 12 commits into
modelcontextprotocol:mainfrom
CaitieM20:ttl-tests

Conversation

@CaitieM20
Copy link
Copy Markdown
Contributor

Conformance Tests for SEP-2549: TTL for List Results

Motivation and Context

Conformance tests for new feature

How Has This Been Tested?

Local tests related to this change pass, there is an existing test in main related to SEP-2164 that is failing, but unrelated to this change.

Breaking Changes

no

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)
  • Documentation update

Checklist

  • I have read the MCP Documentation
  • My code follows the repository's style guidelines
  • New and existing tests pass locally
  • I have added appropriate error handling
  • I have added or updated documentation as needed

@pkg-pr-new
Copy link
Copy Markdown

pkg-pr-new Bot commented May 14, 2026

Open in StackBlitz

npx https://pkg.pr.new/@modelcontextprotocol/conformance@275

commit: e2d49b8

@CaitieM20 CaitieM20 changed the title Conformance Tests for SEP-2549: TTL for List Results feat: add conformance Tests for SEP-2549: TTL for List Results May 14, 2026
Copy link
Copy Markdown
Collaborator

@felixweinberger felixweinberger left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM overall, just needs a rebase / CI fix I think.

Could consider adding a client scenario to specifically catch polling as a WARNING (rather than a FAILURE) to discourage SDKs from writing polling as a default which we seem to want to deliberately avoid, but wouldn't block on it.

Comment thread examples/servers/typescript/everything-server.ts Outdated
Comment thread src/seps/sep-2549.yaml Outdated
Comment thread src/seps/sep-2549.yaml Outdated
Comment thread src/scenarios/authorization-server/authorization-server-metadata.ts Outdated
Comment thread src/scenarios/server/caching.ts
Comment thread src/scenarios/server/caching.ts Outdated
Comment thread src/scenarios/server/caching.ts
Comment thread examples/servers/typescript/everything-server.ts Outdated
Comment thread examples/servers/typescript/everything-server.ts Outdated
Comment thread src/scenarios/server/caching.ts Outdated
@CaitieM20 CaitieM20 requested a review from felixweinberger May 21, 2026 02:33
@CaitieM20 CaitieM20 enabled auto-merge (squash) May 21, 2026 02:33
Copy link
Copy Markdown
Member

@pcarleton pcarleton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks!

@CaitieM20 CaitieM20 merged commit 7f1b871 into modelcontextprotocol:main May 22, 2026
4 checks passed
pcarleton added a commit that referenced this pull request May 22, 2026
* chore: refresh SEP traceability manifest (typescript-sdk@main)

Regenerated from a client+server suite run against typescript-sdk@5fc42e9be115
following the recipe in .github/workflows/traceability.yml.

New entries since the last refresh (typescript-sdk@22595b96):
- SEP-2322 (MRTR, #188): 17 tested, 0 untested, 16 excluded, 3 untracked
- SEP-2549 (TTL for list results, #275): 7 tested, 0 untested, 13 excluded
- SEP-2260: 12 excluded rows, no checks
- SEP-2207: yaml rows added since the last refresh now appear
  (1 tested, 1 untested: sep-2207-server-no-offline-access)

No previously-tested requirement regressed.

* Exclude sep-2207 server offline_access guidance until RS auth scenarios exist

sep-2207-server-no-offline-access was declared in the yaml but no scenario
emits it, so it surfaced as the only untested requirement in the refreshed
manifest. The check needs to probe the SDK server's Protected Resource
Metadata scopes_supported and WWW-Authenticate challenge scope, and the
server suite does not yet exercise the SDK server as an OAuth protected
resource at all.

Mark the requirement excluded with a pointer to #116 (server-side
authorization baseline) rather than leaving it as a permanently-untested
row; revisit when server-side authorization scenarios land.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants