Skip to content

Conversation

@FDiskas
Copy link

@FDiskas FDiskas commented Jan 15, 2026

☕️ Reasoning

In containerized environments (like Docker) or multi-tenant setups behind a reverse proxy, Request.url often reflects the internal network address (e.g., http://0.0.0.0:3000) rather than the public-facing domain.

When trustHost is enabled, the library should prioritize X-Forwarded-Host and X-Forwarded-Proto headers to reconstruct the application's base URL. Without this, callbackUrl validation fails because the incoming URL behaves as a mismatch against the detected internal base URL, leading to incorrect redirects

🧢 Checklist

  • Documentation
  • Tests
  • Ready to be merged

🎫 Affected issues

Potential issue fixes: #8154

📌 Resources

…tHost is enabled

In containerized environments (like Docker) or multitenant setups behind a reverse proxy, Request.url often reflects the internal network address (e.g., http://0.0.0.0:3000) rather than the public-facing domain.
@FDiskas FDiskas requested a review from ThangHuuVu as a code owner January 15, 2026 16:41
@vercel
Copy link

vercel bot commented Jan 15, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
auth-docs Ready Ready Preview, Comment Jan 15, 2026 4:46pm
1 Skipped Deployment
Project Deployment Review Updated (UTC)
next-auth-docs Ignored Ignored Preview Jan 15, 2026 4:46pm

Review with Vercel Agent

@vercel
Copy link

vercel bot commented Jan 15, 2026

@FDiskas is attempting to deploy a commit to the authjs Team on Vercel.

A member of the Team first needs to authorize it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

core Refers to `@auth/core`

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant