Security & best practices
- Authentication
- Ensure your GraphQL api is only accessible to provisioned users
- Cross-Origin Resource Sharing (CORS)
- Ensure that requests to your API come from a whitelist of origins
- CSRF protection
- Protect destructive actions from cross-site request forgery
- Strict HTTP method checking
- Ensure requests are GET or POST
- Recursive or complex queries
- Protecting against potentially malicious queries
You are viewing docs for silverstripe/graphql 4.x. If you are using 3.x, documentation can be found in the GitHub repository
Cross-Origin resource sharing (CORS)
By default CORS is disabled in the GraphQL Server. This can be easily enabled via YAML:
SilverStripe\GraphQL\Controller:
cors:
Enabled: true
Once you have enabled CORS you can then control four new headers in the HTTP Response.
-
Access-Control-Allow-Origin.
This lets you define which domains are allowed to access your GraphQL API. There are 4 options:
-
Blank: Deny all domains (except localhost)
Allow-Origin:
-
'*': Allow requests from all domains.
Allow-Origin: '*'
-
Single Domain: Allow requests from one specific external domain.
Allow-Origin: 'https://my.domain.com'
-
Multiple Domains: Allow requests from multiple specified external domains.
Allow-Origin: - 'https://my.domain.com' - 'https://your.domain.org'
-
-
Access-Control-Allow-Headers.
Access-Control-Allow-Headers is part of a CORS 'pre-flight' request to identify what headers a CORS request may include. By default, the GraphQL server enables the
Authorization
andContent-Type
headers. You can add extra allowed headers that your GraphQL may need by adding them here. For example:Allow-Headers: 'Authorization, Content-Type, Content-Language'
If you add extra headers to your GraphQL server, you will need to write a custom resolver function to handle the response.
-
Access-Control-Allow-Methods.
This defines the HTTP request methods that the GraphQL server will handle. By default this is set to
GET, PUT, OPTIONS
. Again, if you need to support extra methods you will need to write a custom resolver to handle this. For example:Allow-Methods: 'GET, PUT, DELETE, OPTIONS'
-
Access-Control-Max-Age.
Sets the maximum cache age (in seconds) for the CORS pre-flight response. When the client makes a successful OPTIONS request, it will cache the response headers for this specified duration. If the time expires or the required headers are different for a new CORS request, the client will send a new OPTIONS pre-flight request to ensure it still has authorisation to make the request. This is set to 86400 seconds (24 hours) by default but can be changed in YAML as in this example:
Max-Age: 600
-
Access-Control-Allow-Credentials.
When a request's credentials mode (Request.credentials) is "include", browsers will only expose the response to frontend JavaScript code if the Access-Control-Allow-Credentials value is true.
The Access-Control-Allow-Credentials header works in conjunction with the XMLHttpRequest.withCredentials property or with the credentials option in the Request() constructor of the Fetch API. For a CORS request with credentials, in order for browsers to expose the response to frontend JavaScript code, both the server (using the Access-Control-Allow-Credentials header) and the client (by setting the credentials mode for the XHR, Fetch, or Ajax request) must indicate that they’re opting in to including credentials.
This is set to empty by default but can be changed in YAML as in this example:
Allow-Credentials: 'true'
Apply a CORS config to all GraphQL endpoints
## CORS Config
SilverStripe\GraphQL\Controller:
cors:
Enabled: true
Allow-Origin: 'https://silverstripe.org'
Allow-Headers: 'Authorization, Content-Type'
Allow-Methods: 'GET, POST, OPTIONS'
Allow-Credentials: 'true'
Max-Age: 600 # 600 seconds = 10 minutes.
Apply a CORS config to a single GraphQL endpoint
## CORS Config
SilverStripe\Core\Injector\Injector:
SilverStripe\GraphQL\Controller.default:
properties:
corsConfig:
Enabled: false