• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In
Warning: This build has drifted.
The coverage report for this pull request build may be inaccurate because its base commit is no longer the HEAD of its target branch.
This means it includes changes from outside the original pull request, including, potentially, unrelated coverage changes.

    • Learn more: For more information on this, see Tracking coverage changes for pull request builds.
    • Fix now: For a quick fix, rebase this PR at GitHub. Your next report should be accurate.
    • Prevent going forward: To avoid this issue with future PRs, see these Recommended CI Configurations.
New Repo Setting:
INCLUDE COVERAGE % WITH WARNINGS ABOUT DRIFTED BUILDS?

Enabling this setting will include a (potentially inaccurate) coverage % with warning messages in status updates for drifted builds.

Adjust setting

supabase / auth / 18756420374
68%
master: 69%

Build:
Build:
LAST BUILD BRANCH: cemal/fix-oauth-client-redirect-uri-validation
DEFAULT BRANCH: master
Ran 29 Oct 2025 02:31PM UTC
Jobs 1
Files 166
Run time 1min
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

23 Oct 2025 05:15PM UTC coverage: 67.549% (+0.002%) from 67.547%
18756420374

Pull #2225

github

Tim Kendrick
fix: ensure correct SAML Entity ID in client SSO flow

When initiating a SAML client flow via the /sso endpoint, the service provider object Entity ID is omitted from the initialization options, causing the underlying saml library to incorrectly use the metadata URL for the SAML server as the Entity ID.

This causes some service providers (e.g. Microsoft Entra ID) to reject the SAML authentication request, as the inferred supabase auth server metadata URL does not match the provider's Entity ID.

This change ensures the service provider is correctly initialized with the provider Entity ID during the client auth flow, while retaining the existing behavior for the server metadata endpoint.
Pull Request #2225: fix: ensure correct SAML Entity ID in client SSO flow

4 of 5 new or added lines in 3 files covered. (80.0%)

7 existing lines in 1 file now uncovered.

13447 of 19907 relevant lines covered (67.55%)

67.63 hits per line

New Missed Lines in Diff

Lines Coverage ∆ File
1
3.81
0.0% internal/api/samlacs.go

Uncovered Existing Lines

Lines Coverage ∆ File
7
82.5
0.22% internal/api/saml.go
Jobs
ID Job ID Ran Files Coverage
1 18756420374.1 29 Oct 2025 02:31PM UTC 166
67.55
GitHub Action Run
Source Files on build 18756420374
  • Tree
  • List 166
  • Changed 1
  • Source Changed 0
  • Coverage Changed 1
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • Pull Request #2225
  • PR Base - master (#18655410402)
  • Delete
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc