graphql

chrisulloa 2019-04-25T19:31:17.010600Z

Anyone have any opinions on disabling introspection so malicious actors can't view the entire GraphQL schema you've defined?

chrisulloa 2019-04-25T19:32:41.011600Z

Have an app that runs off of a graphql backend, but we've found that anyone can go in and expose the schema. There's nothing dangerous there but it exposes a lot of information we'd rather not share.

hlship 2019-04-25T21:16:51.012100Z

I don't think there's any provision in Lacinia for that.

hlship 2019-04-25T21:17:46.013200Z

I would consider adding an option to disable introspection; you might disable introspection in production, but not in QA/staging. But no introspection ➠ no GraphIQL.

👍 1
chrisulloa 2019-04-25T21:19:23.014700Z

Oh interesting, that's what we were discussing doing, removing introspection from QA/staging but leaving it in dev. I read that GraphiQL relies heavily on introspection and won't work without it.

chrisulloa 2019-04-25T21:20:42.015700Z

I have to figure out now how to go about disabling it in Lacinia.

chrisulloa 2019-04-25T21:25:27.016400Z

Does lacinia take PRs for that sort of thing?