Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reconcile dev after merge to main for v1.52.1 #5893

Closed
wants to merge 15 commits into from
Closed

Reconcile dev after merge to main for v1.52.1 #5893

wants to merge 15 commits into from

Conversation

abernix
Copy link
Member

@abernix abernix commented Aug 27, 2024

Follow-up to the v1.52.1 being officially released, bringing version bumps and changelog updates into the dev branch.

shorgi and others added 15 commits August 9, 2024 10:28
Co-authored-by: Maria Elisabeth Schreiber <[email protected]>
Co-authored-by: Renée <[email protected]>
…ipeline

This fixes a weakness (classified as [CWE-770]) which made it possible to
exceed the configured request payload maximums set with the
[`limits.http_max_request_bytes`] configuration option when used in
conjunction with certain configurations.

Review the Github Advisory, [GHSA-x6xq-whh3-gg32], for specific details and
impacted configurations.

After the fix:

- Request body payload limits are now enforced earlier in the pipeline, ensuring that coprocessors and user plugins respect the configured limit.
- Reading a request body beyond the configured limit will abort the request and return a [HTTP 413] (Content Too Large) response to the client rather than delgating to the code consuming the body.  To use different limits, `limits.http_max_request_bytes` must be configured to the desired value.
- Coprocessors, Rhai and Rust plugins do NOT have an opportunity to intercept aborted requests.  Use the telemetry features of the router to observe HTTP 413 events.

[CWE-770]: https://cwe.mitre.org/data/definitions/770.html
[GHSA-x6xq-whh3-gg32]: GHSA-x6xq-whh3-gg32
[HTTP 413]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/413
[`limits.http_max_request_bytes`]: https://www.apollographql.com/docs/router/configuration/overview/#http_max_request_bytes

---------

Co-authored-by: bryn <[email protected]>
Co-authored-by: Gary Pennington <[email protected]>
Co-authored-by: Jeremy Lempereur <[email protected]>
…rolled recursion

Update the version of `@apollo/query-planner` used by Router to correct an
uncontrolled recursion weakness (classified as [CWE-674]) during query
planning for complex queries on particularly complex graphs.

This weakness impacts all versions of Router.  See the associated Github
Advisory, [GHSA-fmj9-77q8-g6c4], for more information.

[CWE-674]: https://cwe.mitre.org/data/definitions/674.html
[GHSA-fmj9-77q8-g6c4]: GHSA-fmj9-77q8-g6c4
This will patch the Dockerfile to set the appropriate metadata for the
publishing repository.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants