Conversation
Contributor
✅ Docs preview readyThe preview is ready to be viewed. View the preview File Changes 0 new, 1 changed, 0 removedBuild ID: f79ff32ce69c2191a96857ef URL: https://www.apollographql.com/docs/deploy-preview/f79ff32ce69c2191a96857ef |
DaleSeo
approved these changes
Jan 14, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR was created by Knope. Merging it will create a new release
Features
Add 403 Forbidden
insufficient_scopesupport per MCP Auth Spec 2025-11-25 and RFC 6750 (Section 3.1) - @gocamille PR #537This adds HTTP 403 Forbidden responses with
error="insufficient_scope"per MCP Auth Spec 2025-11-25 Section 10: Error Handling and RFC 6750 Section 3.1.Changes:
www_authenticate.rs: AddedBearerError::InsufficientScopeenum and error field toWWW-Authenticateheadervalid_token.rs: Extract scope/scp claims from JWTs (handles both standard OAuth and Azure AD)auth.rs: Scope validation with fail-closed behaviour—valid tokens lacking required scopes get403headers.rs: Updated tests for newValidTokenstructBehavior:
error="insufficient_scope"in response)Add scope parameter to WWW-Authenticate header - @DaleSeo PR #523
Add support for optional
scopeparameter in theWWW-Authenticateheader per MCP Auth Spec 2025-11-25.When returning 401 Unauthorized responses, the server now includes the configured scopes to guide clients on appropriate scopes to request during authorization.
This PR extends the
WwwAuthenticate::Bearervariant with an optional scope field. When scopes are configured, they are space-separated and included in 401 responses. When no scopes are configured, the parameter is omitted.Allow opting out of audience validation - @DaleSeo PR #535
Added an explicit
allow_any_audienceconfiguration option that follows the same pattern as CORS'sallow_any_origin. When set totrue, audience validation is skipped entirely.Server adds support for incoming distributed trace context propagation - @david-castaneda PR #484
The MCP server now extracts W3C traceparent headers from incoming requests and uses this context for its own emitted traces, enabling handler spans to nest under parent traces for complete end-to-end observability.
feat: add support for custom environment variable expansion - @gocamille PR #539
Summary
This PR adds support for
${env.VAR_NAME}syntax in configuration files, allowing users to reference custom environment variables without being limited to theAPOLLO_MCP_*naming convention.Closes #454.
Changes
runtime/env_expansion.rs(new module) - parser for variable expansionruntime.rs(modified) - integrates expansion into theread_config()functionconfig-file.mdx- updated docs with syntax, escaping, and special characters handlingNote The
APOLLO_MCP_*environment variable(s) will still take precedence over expanded custom config values (no breaking change).Add outputSchema support - @DaleSeo PR #509
This PR implements support for the MCP specification's outputSchema field on tools, which allows tools to declare the expected structure of their output. This helps LLMs better understand and reason about GraphQL response data.
This feature is opt-in to avoid additional token overhead. To enable it, add the following to your config:
Add TLS configuration options for auth - @DaleSeo PR #536
Adds TLS configuration options for connecting to OAuth servers during token validation.
When the MCP server validates OAuth tokens, it connects to upstream OAuth servers to fetch JWKS keys. Previously, this required those servers to have certificates trusted by the system's default CA bundle. This change allows users to trust custom CA certificates or disable validation for development environments.
Fixes
Add server.json for MCP Registry publishing - @DaleSeo PR #540
In preparation for publishing Apollo MCP Server to the official MCP Registry at
registry.modelcontextprotocol.io, this PR addsserver.jsonconfiguration file and adds theio.modelcontextprotocol.server.namelabel Dockerfile for registry verification.