Releases: hypermodeinc/dgraph
v23.1.0
Remarks
In Badger PR #1948 we have updated and fixed certain metrics in Badger. These name changes will also be reflected in this Dgraph version.
Added
-
Core Dgraph
- perf(query): Improve IntersectCompressedWithBin for UID Pack (#8941)
- feat(query): add feature flag normalize-compatibility-mode (#8845) (#8929)
- feat(alpha): support RDF response via http query request (#8004) (#8639)
- perf(query): speed up parsing of a huge query (#8942)
- fix(live): replace panic in live loader with errors (#7798) (#8944)
-
GraphQL
Fixed
-
Core Dgraph
- docs(zero): add comments in zero and clarify naming (#8945)
- fix(cdc): skip bad events in CDC (#8076)
- fix(bulk): enable running bulk loader with only gql schema (#8903)
- chore(badger): upgrade badger to v4.2.0 (#8932) (#8925)
- doc(restore): add docs for mutations in between incremental restores (#8908)
- chore: fix compilation on 32bit (#8895)
- chore(raft): add debug logs to print all transactions (#8890)
- chore(alpha): add logs for processing entries in applyCh (#8930)
- fix(acl): allow data deletion for non-reserved predicates (#8937)
- fix(alpha): convert numbers correctly in superflags (#7712) (#8943)
- chore(raft): better logging message for cleaning banned ns pred (#7886)
-
Security
- sec(acl): convert x.Sensitive to string type for auth hash (#8931)
- chore(deps): bump google.golang.org/grpc from 1.52.0 to 1.53.0 (#8900)
- chore(deps): bump certifi from 2022.12.7 to 2023.7.22 in /contrib/config/marketplace/aws/tests (#8920)
- chore(deps): bump certifi from 2022.12.7 to 2023.7.22 in /contrib/embargo (#8921)
- chore(deps): bump pygments from 2.7.4 to 2.15.0 in /contrib/embargo (#8913)
- chore: upgrade bleve to v2.3.9 (#8948)
-
CI & Testing
- chore: update cron job frequency to reset github notifications (#8956)
- test(upgrade): add v20.11 upgrade tests in query package (#8954)
- chore(contrib) - fixes for Vault (#7739)
- chore(build): make build codename configurable (#8951)
- fix(upgrade): look for version string in logs bottom up (#8926)
- fix(upgrade): check commit SHA to find running dgraph version (#8923)
- chore(upgrade): run upgrade tests for v23.0.1 (#8918)
- chore(upgrade): ensure we run right version of Dgraph (#8910)
- chore(upgrade): add workaround for multiple groot issue in export-import (#8897)
- test(upgrade): add upgrade tests for systest/license package (#8902)
- chore(upgrade): increase the upgrade job duration limit to 12h (#8907)
- chore(upgrade): increase the duration of the CI workflow (#8906)
- ci(upgrade): break down upgrade tests CI workflow (#8904)
- test(acl): add upgrade tests for ee/acl package (#8792)
- chore: update pull request template (#8899)
v23.1.0-rc1
Added
-
Core Dgraph
-
GraphQL
Fixed
-
Core Dgraph
- fix(bulk): enable running bulk loader with only gql schema (#8903)
- chore(badger): upgrade badger to v4.2.0 (#8932) (#8925)
- doc(restore): add docs for mutations in between incremental restores (#8908)
- chore: fix compilation on 32bit (#8895)
- chore(raft): add debug logs to print all transactions (#8890)
- chore(alpha): add logs for processing entries in applyCh (#8930)
-
Security
- sec(acl): convert x.Sensitive to string type for auth hash (#8931)
- chore(deps): bump google.golang.org/grpc from 1.52.0 to 1.53.0 (#8900)
- chore(deps): bump certifi from 2022.12.7 to 2023.7.22 in /contrib/config/marketplace/aws/tests (#8920)
- chore(deps): bump certifi from 2022.12.7 to 2023.7.22 in /contrib/embargo (#8921)
- chore(deps): bump pygments from 2.7.4 to 2.15.0 in /contrib/embargo (#8913)
-
CI & Testing
- fix(upgrade): look for version string in logs bottom up (#8926)
- fix(upgrade): check commit SHA to find running dgraph version (#8923)
- chore(upgrade): run upgrade tests for v23.0.1 (#8918)
- chore(upgrade): ensure we run right version of Dgraph (#8910)
- chore(upgrade): add workaround for multiple groot issue in export-import (#8897)
- test(upgrade): add upgrade tests for systest/license package (#8902)
- chore(upgrade): increase the upgrade job duration limit to 12h (#8907)
- chore(upgrade): increase the duration of the CI workflow (#8906)
- ci(upgrade): break down upgrade tests CI workflow (#8904)
- test(acl): add upgrade tests for ee/acl package (#8792)
- chore: update pull request template (#8899)
Dgraph v23.0.1
Fixed
-
Core Dgraph
- chore(restore): add log message when restore fails (#8893)
- fix(zero): fix zero's health endpoint to return json response (#8858)
- chore(zero): improve error message while unmarshalling WAL (#8882)
- fix(multi-tenancy): check existence before banning namespace (#7887)
- fix(bulk): removed buffer max size (#8841)
- chore: fix failing oss build (#8832) Fixes #8831
- upgrade dgo to v230.0.1 (#8785)
-
CI
-
Security
- chore(deps): bump requests from 2.23.0 to 2.31.0 in /contrib/config/marketplace/aws/tests (#8836)
- chore(deps): bump requests from 2.23.0 to 2.31.0 in /contrib/embargo (#8835)
- chore(deps): bump github.com/docker/distribution from 2.8.0+incompatible to 2.8.2+incompatible (#8821)
- chore(deps): bump github.com/cloudflare/circl from 1.1.0 to 1.3.3 (#8822)
Dgraph v23.0.0
Added
-
GraphQL
- fix(GraphQL): pass on HTTP request headers for subscriptions (#8574)
-
Core Dgraph
- feat(metrics): add badger metrics (#8034) (#8737)
- feat(restore): introduce incremental restore (#7942) (#8624)
- chore(debug): add
only-summary
flag indgraph debug
to show LSM tree and namespace size (#8516) - feat(cloud): add
shared-instance
flag in limit superflag in alpha (#8625) - chore(deps): update prometheus dependency, adds new metrics (#8655)
- feat(cdc): add superflag
tls
to enable TLS without CA or certs (#8564) - feat(multitenancy): namespace aware drop data (#8511)
Fixed
-
GragphQL
- fix(GraphQL): nested Auth Rules not working properly (#8571)
-
Core Dgraph
- Fix wal replay issue during rollup (#8774)
- security(logging): fix aes implementation in audit logging (#8323)
- chore(worker): unify mapper receiver names (#8740)
- fix(dql): fix panic in parsing of regexp (#8739)
- fix(Query): Do an error check before bubbling up nil error (#8769)
- chore: replace global index with local one & fix typos (#8719)
- chore(logs): add logs to track dropped proposals (#8568)
- fix(debug): check length of wal entry before parsing (#8560)
- opt(schema): optimize populateSchema() (#8565)
- fix(zero): fix update membership to make bulk tablet proposal instead of multiple small (#8573)
- fix(groot): do not upsert groot for all namespaces on restart (#8561)
- fix(restore): set kv version to restoreTs for all keys (#8563)
- fix(probe): do not contend for lock in lazy load (#8566)
- fix(core): fixed infinite loop in CommitToDisk (#8614)
- fix(proposals): incremental proposal key for zero proposals (#8567)
- fix(zero): fix waiting for random time while rate limiting (#8656)
- chore(deps): upgrade badger (#8654, #8658)
- opt(schema): load schema and types using Stream framework (#8562)
- fix(backup): use StreamWriter instead of KVLoader during backup restore (#8510)
- fix(audit): fixing audit logs for websocket connections (#8627)
- fix(restore): consider the banned namespaces while bumping (#8559)
- fix(backup): create directory before writing backup (#8638)
-
Test
- chore(tests): add upgrade tests in query package (#8750)
- simplify test setup in query package (#8782)
- add a test for incremental restore (#8754)
- chore(tests): run tests in query package against dgraph cloud (#8726)
- fix the backup test cluster compose file (#8775)
- cleanup tests to reduce the scope of err var (#8771)
- use t.TempDir() for using a temp dir in tests (#8772)
- fix(test): clan cruft from test run (#8348)
- chore(tests): avoid calling os.Exit in TestMain (#8765)
- chore: fix linter issue on main (#8749)
- recreate the context variable for parallel test (#8748)
- fix(tests): wait for license to be applied before trying to login (#8744)
- fix(tests): sleep longer so that ACLs are updated (#8745)
- chore(test): use pointer receiver for LocalCluster methods (#8734)
- chore(linter): fix unconvert linter issues on linux (#8718)
- chore(linter): add unconvert linter and address related issues (#8685)
- chore(ci): resolve community PR goveralls failure (#8716)
- chore(test): increased iterations of the health check (#8711)
- fix(test): avoid host volume mount in minio container (#8569)
- chore(test): add tests for lex/iri.go,chunker/chunk.go (#8515)
- chore(test): add Backup/Restore test for NFS (#8551)
- chore(test): add test that after snapshot is applied, GraphQL schema is refreshed (#8619)
- chore(test): upgrade graphql tests to use go 1.19 (#8662)
- chore(test): add automated test to test multitenant --limit flag (#8646)
- chore(test): add restore test for more than 127 namespaces (#8643)
- fix(test): fix the corner case for raft entries test (#8617)
-
CD
-
Security
-
chore(deps): bump certifi from 2020.4.5.1 to 2022.12.7 in /contrib/config/marketplace/aws/tests (#8496)
-
chore(deps): bump github.com/docker/distribution from 2.7.1+incompatible to 2.8.0+incompatible (#8575)
-
chore(deps): bump werkzeug from 0.16.1 to 2.2.3 in /contrib/embargo (#8676)
-
fix(sec): upgrade networkx to (#8613)
-
CVE Fixes (31 total)
- CVE-2013-4235
- CVE-2016-20013
- CVE-2016-2781
- CVE-2017-11164
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-39537
- CVE-2021-44758
- CVE-2022-28321
- CVE-2022-29458
- CVE-2022-3219
- CVE-2022-3437
- CVE-2022-3821
- CVE-2022-41717
- CVE-2022-41721
- CVE-2022-41723
- CVE-2022-42898
- CVE-2022-4304
- CVE-2022-43552
- CVE-2022-4415
- CVE-2022-4450
- CVE-2022-44640
- CVE-2022-48303
- CVE-2023-0215
- CVE-2023-0286
- CVE-2023-0361
- CVE-2023-0464
- CVE-2023-0465
- CVE-2023-0466
- CVE-2023-23916
- CVE-2023-26604
-
Changed
-
Core Dgraph
- upgrade badger to v4.1.0 (#8783) (#8709)
- fix(multitenancy) store namespace in predicate as a hex separated by a hyphen to prevent json marshal issues (#8601)
- fix(query): handle bad timezone correctly (#8657)
- chore(ludicroud): remove ludicrous mode from the code (#8612)
- fix(backup): make the /admin/backup and /admin/export API asynchronous (#8554)
- fix(mutation): validate mutation before applying it (#8623)
-
CI Enhancements
- fix(ci): unpin curl (#8577)
- fix(ci): adjust cron schedules (#8592)
- chore(ci): Capture coverage from bulk load and LDBC tests (#8478)
- chore(linter): enable gosec linter (#8678)
- chore: apply go vet improvements (#8620)
- chore(linter): fix some of the warnings from gas linter (#8664)
- chore(linter): fix golangci config and some issues in tests (#8669)
- fix(linter): address gosimple linter reports & errors (#8628)
Dgraph v23.0.0-rc1
Added
-
GraphQL
- fix(GraphQL): pass on HTTP request headers for subscriptions (#8574)
-
Core Dgraph
- feat(metrics): add badger metrics (#8034) (#8737)
- feat(restore): introduce incremental restore (#7942) (#8624)
- chore(debug): add
only-summary
flag indgraph debug
to show LSM tree and namespace size (#8516) - feat(cloud): add
shared-instance
flag in limit superflag in alpha (#8625) - chore(deps): update prometheus dependency, adds new metrics (#8655)
- feat(cdc): add superflag
tls
to enable TLS without CA or certs (#8564) - feat(multitenancy): namespace aware drop data (#8511)
Fixed
-
GragphQL
- fix(GraphQL): nested Auth Rules not working properly (#8571)
-
Core Dgraph
- Fix wal replay issue during rollup (#8774)
- security(logging): fix aes implementation in audit logging (#8323)
- chore(worker): unify mapper receiver names (#8740)
- fix(dql): fix panic in parsing of regexp (#8739)
- fix(Query): Do an error check before bubbling up nil error (#8769)
- chore: replace global index with local one & fix typos (#8719)
- chore(logs): add logs to track dropped proposals (#8568)
- fix(debug): check length of wal entry before parsing (#8560)
- opt(schema): optimize populateSchema() (#8565)
- fix(zero): fix update membership to make bulk tablet proposal instead of multiple small (#8573)
- fix(groot): do not upsert groot for all namespaces on restart (#8561)
- fix(restore): set kv version to restoreTs for all keys (#8563)
- fix(probe): do not contend for lock in lazy load (#8566)
- fix(core): fixed infinite loop in CommitToDisk (#8614)
- fix(proposals): incremental proposal key for zero proposals (#8567)
- fix(zero): fix waiting for random time while rate limiting (#8656)
- chore(deps): upgrade badger (#8654, #8658)
- opt(schema): load schema and types using Stream framework (#8562)
- fix(backup): use StreamWriter instead of KVLoader during backup restore (#8510)
- fix(audit): fixing audit logs for websocket connections (#8627)
- fix(restore): consider the banned namespaces while bumping (#8559)
- fix(backup): create directory before writing backup (#8638)
-
Test
- chore(tests): add upgrade tests in query package (#8750)
- simplify test setup in query package (#8782)
- add a test for incremental restore (#8754)
- chore(tests): run tests in query package against dgraph cloud (#8726)
- fix the backup test cluster compose file (#8775)
- cleanup tests to reduce the scope of err var (#8771)
- use t.TempDir() for using a temp dir in tests (#8772)
- fix(test): clan cruft from test run (#8348)
- chore(tests): avoid calling os.Exit in TestMain (#8765)
- chore: fix linter issue on main (#8749)
- recreate the context variable for parallel test (#8748)
- fix(tests): wait for license to be applied before trying to login (#8744)
- fix(tests): sleep longer so that ACLs are updated (#8745)
- chore(test): use pointer receiver for LocalCluster methods (#8734)
- chore(linter): fix unconvert linter issues on linux (#8718)
- chore(linter): add unconvert linter and address related issues (#8685)
- chore(ci): resolve community PR goveralls failure (#8716)
- chore(test): increased iterations of the health check (#8711)
- fix(test): avoid host volume mount in minio container (#8569)
- chore(test): add tests for lex/iri.go,chunker/chunk.go (#8515)
- chore(test): add Backup/Restore test for NFS (#8551)
- chore(test): add test that after snapshot is applied, GraphQL schema is refreshed (#8619)
- chore(test): upgrade graphql tests to use go 1.19 (#8662)
- chore(test): add automated test to test multitenant --limit flag (#8646)
- chore(test): add restore test for more than 127 namespaces (#8643)
- fix(test): fix the corner case for raft entries test (#8617)
-
CD
-
Security
- chore(deps): bump certifi from 2020.4.5.1 to 2022.12.7 in /contrib/config/marketplace/aws/tests (#8496)
- chore(deps): bump github.com/docker/distribution from 2.7.1+incompatible to 2.8.0+incompatible (#8575)
- chore(deps): bump werkzeug from 0.16.1 to 2.2.3 in /contrib/embargo (#8676)
- fix(sec): upgrade networkx to (#8613)
- fix(sec): CVE-2022-41721 (#8633)
- fix(sec): CVE & OS Patching (#8634)
Changed
-
Core Dgraph
- upgrade badger to v4.1.0 (#8783) (#8709)
- fix(multitenancy) store namespace in predicate as a hex separated by a hyphen to prevent json marshal issues (#8601)
- fix(query): handle bad timezone correctly (#8657)
- chore(ludicroud): remove ludicrous mode from the code (#8612)
- fix(backup): make the /admin/backup and /admin/export API asynchronous (#8554)
- fix(mutation): validate mutation before applying it (#8623)
-
CI Enhancements
- fix(ci): unpin curl (#8577)
- fix(ci): adjust cron schedules (#8592)
- chore(ci): Capture coverage from bulk load and LDBC tests (#8478)
- chore(linter): enable gosec linter (#8678)
- chore: apply go vet improvements (#8620)
- chore(linter): fix some of the warnings from gas linter (#8664)
- chore(linter): fix golangci config and some issues in tests (#8669)
- fix(linter): address gosimple linter reports & errors (#8628)
Dgraph v23.0.0-beta1
Added
-
GraphQL
- fix(GraphQL): pass on HTTP request headers for subscriptions (#8574)
-
Core Dgraph
- chore(debug): add
only-summary
flag indgraph debug
to show LSM tree and namespace size (#8516) - feat(cloud): add
shared-instance
flag in limit superflag in alpha (#8625) - chore(deps): update prometheus dependency, adds new metrics (#8655)
- feat(cdc): add superflag
tls
to enable TLS without CA or certs (#8564) - chore(deps): bump badger up to v4 (#8709)
- feat(multitenancy): namespace aware drop data (#8511)
- chore(debug): add
Fixed
-
GragphQL
- fix(GraphQL): nested Auth Rules not working properly (#8571)
-
Core Dgraph
- chore(logs): add logs to track dropped proposals (#8568)
- fix(debug): check length of wal entry before parsing (#8560)
- opt(schema): optimize populateSchema() (#8565)
- fix(zero): fix update membership to make bulk tablet proposal instead of multiple small (#8573)
- fix(groot): do not upsert groot for all namespaces on restart (#8561)
- fix(restore): set kv version to restoreTs for all keys (#8563)
- fix(probe): do not contend for lock in lazy load (#8566)
- fix(core): fixed infinite loop in CommitToDisk (#8614)
- fix(proposals): incremental proposal key for zero proposals (#8567)
- fix(zero): fix waiting for random time while rate limiting (#8656)
- chore(deps): upgrade badger (#8654, #8658)
- opt(schema): load schema and types using Stream framework (#8562)
- fix(backup): use StreamWriter instead of KVLoader during backup restore (#8510)
- fix(audit): fixing audit logs for websocket connections (#8627)
- fix(restore): consider the banned namespaces while bumping (#8559)
- fix(backup): create directory before writing backup (#8638)
-
Test
- fix(test): avoid host volume mount in minio container (#8569)
- chore(test): add tests for lex/iri.go,chunker/chunk.go (#8515)
- chore(test): add Backup/Restore test for NFS (#8551)
- chore(test): add test that after snapshot is applied, GraphQL schema is refreshed (#8619)
- chore(test): upgrade graphql tests to use go 1.19 (#8662)
- chore(test): add automated test to test multitenant --limit flag (#8646)
- chore(test): add restore test for more than 127 namespaces (#8643)
- fix(test): fix the corner case for raft entries test (#8617)
-
CD
-
Security
- chore(deps): bump certifi from 2020.4.5.1 to 2022.12.7 in /contrib/config/marketplace/aws/tests (#8496)
- chore(deps): bump github.com/docker/distribution from 2.7.1+incompatible to 2.8.0+incompatible (#8575)
- chore(deps): bump werkzeug from 0.16.1 to 2.2.3 in /contrib/embargo (#8676)
- fix(sec): upgrade networkx to (#8613)
- fix(sec): CVE-2022-41721 (#8633)
- fix(sec): CVE & OS Patching (#8634)
Changed
-
Core Dgraph
- fix(multitenancy) store namespace in predicate as a hex separated by a hyphen to prevent json marshal issues (#8601)
- fix(query): handle bad timezone correctly (#8657)
- chore(ludicroud): remove ludicrous mode from the code (#8612)
- fix(backup): make the /admin/backup and /admin/export API asynchronous (#8554)
- fix(mutation): validate mutation before applying it (#8623)
-
CI Enhancements
- fix(ci): unpin curl (#8577)
- fix(ci): adjust cron schedules (#8592)
- chore(ci): Capture coverage from bulk load and LDBC tests (#8478)
- chore(linter): enable gosec linter (#8678)
- chore: apply go vet improvements (#8620)
- chore(linter): fix some of the warnings from gas linter (#8664)
- chore(linter): fix golangci config and some issues in tests (#8669)
- fix(linter): address gosimple linter reports & errors (#8628)
Dgraph v22.0.2
Added
- ARM Support - Dgraph now supports ARM64 Architecture for development (#8543 #8520 #8503 #8436 #8405 #8395)
- Additional logging and trace tags for debugging (#8490)
Fixed
-
EDgraph
- fix(ACL): Prevents permissions overrride and merges acl cache to persist permissions across different namespaces (#8506)
-
Core Dgraph
- Fix(badger): Upgrade badger version to fix manifest corruption (#8365)
- fix(pagination): Fix after for regexp, match functions (#8471)
- fix(query): Do not execute filters if there are no source uids(#8452)
- fix(admin): make config changes to pass through gog middlewares (#8442)
- fix(sort): Only filter out nodes with positive offsets (#8441)
- fix(fragment): merge the nested fragments fields (#8435)
- Fix(lsbackup): Fix profiler in lsBackup (#8432)
- fix(DQL): optimize query for has function with offset (#8431)
-
GraphQL
- Fix(GraphQL): Make mutation rewriting tests more robust (#8449)
-
Security
-
CVE Fixes (35 total)
CVE Fixes (35 total)
- CVE-2013-4235
- CVE-2016-20013
- CVE-2016-2781
- CVE-2017-11164
- CVE-2018-16886
- CVE-2019-0205
- CVE-2019-0210
- CVE-2019-11254
- CVE-2019-16167
- CVE-2020-29652
- CVE-2021-31525
- CVE-2021-33194
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-38561
- CVE-2021-39537
- CVE-2021-43565
- CVE-2021-44716
- CVE-2021-44758
- CVE-2022-21698
- CVE-2022-27191
- CVE-2022-27664
- CVE-2022-29458
- CVE-2022-29526
- CVE-2022-3219
- CVE-2022-32221
- CVE-2022-3437
- CVE-2022-35737
- CVE-2022-3715
- CVE-2022-3821
- CVE-2022-39377
- CVE-2022-41916
- CVE-2022-42800
- CVE-2022-42898
- CVE-2022-44640
-
Changed
-
CI Enhancements
-
CD Enhancements
- Enhanced our CD Pipeline to support ARM64 binaries and docker-images (#8520)
- Enhanced dgraph-lambda to support arm64 (dgraph-io/dgraph-lambda#39 dgraph-io/dgraph-lambda#38 dgraph-io/dgraph-lambda#37)
- Enhanced badger to support arm64 (hypermodeinc/badger#1838)
Dgraph v22.0.1
Fixed
- CD Release Pipeline
- Badger Binary fetch steps added to the release CD pipeline (#8425)
- Corresponding Badger artifacts will be fetched & uploaded from v22.0.1 onwards
Dgraph v22.0.0
Note
v22.0.0
release is based onv21.03.2
release.
https://discuss.dgraph.io/t/dgraph-v22-0-0-rc1-20221003-release-candidate/17839
https://discuss.dgraph.io/t/dgraph-v22-0-0-is-now-ga/17889
Warning
We are discontinuing support forv21.12.0
.
This will be a breaking change for anyone moving fromv21.12.0
tov22.0.0
.
Data files created withv21.12
are not compatible withv22.0.x
- an export-import procedure is required.
Fixed
- GraphQL
- EDgraph
- fix(query): Prevent multiple entries for same predicate in mutations (#8332)
- Posting
- fix(rollups): Fix splits in roll-up (#8297)
- Security
-
CVE Fixes (417 total)
CVE Fixes (417 total)
- CVE-2019-0210
- CVE-2019-0205
- CVE-2021-43565
- CVE-2022-27664
- CVE-2021-38561
- CVE-2021-44716
- CVE-2021-33194
- CVE-2022-27191
- CVE-2020-29652
- CVE-2018-16886
- CVE-2022-21698
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-3116
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2020-35525
- CVE-2020-35527
- CVE-2021-20223
- CVE-2020-9794
- CVE-2022-29526
- CVE-2021-31525
- CVE-2019-11254
- CVE-2022-3219
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2017-11164
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-43618
- CVE-2016-20013
- CVE-2016-2781
- CVE-2022-1587
- CVE-2022-1586
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-43618
- CVE-2016-20013
- CVE-2022-3219
- CVE-2016-2781
- CVE-2022-1587
- CVE-2022-1586
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2017-11164
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-43618
- CVE-2016-20013
- CVE-2022-3219
- CVE-2016-2781
- CVE-2021-3671
- CVE-2022-3219
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2021-3671
- CVE-2022-3219
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2022-3219
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
...
-
Dgraph v22.0.0-RC1.20221003
Note
v22.0.0
release is based ofv21.03.2
release.
https://discuss.dgraph.io/t/dgraph-v22-0-0-rc1-20221003-release-candidate/17839
Warning
We are discontinuing support forv21.12.0
.
This will be a breaking change for anyone moving fromv21.12.0
tov.22.0.0
.
Fixed
- GraphQL
- EDgraph
- fix(query): Prevent multiple entries for same predicate in mutations (#8332)
- Posting
- fix(rollups): Fix splits in roll-up (#8297)
- Bug
- fix(bug): use copy of loop variable in Go routines (#8163)
- Security
-
CVE Fixes (387 total)
CVE Fixes (387 total)
- CVE-2019-0210
- CVE-2019-0205
- CVE-2021-43565
- CVE-2022-27664
- CVE-2021-38561
- CVE-2021-44716
- CVE-2021-33194
- CVE-2022-27191
- CVE-2020-29652
- CVE-2018-16886
- CVE-2022-21698
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2022-37434
- CVE-2020-16156
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2021-37750
- CVE-2021-36222
- CVE-2020-35525
- CVE-2020-35527
- CVE-2021-20223
- CVE-2020-9794
- CVE-2022-29526
- CVE-2021-31525
- CVE-2019-11254
- CVE-2022-3219
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2022-3219
- CVE-2016-2781
- CVE-2022-3219
- CVE-2022-1587
- CVE-2022-1586
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2022-3219
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2019-16167
- CVE-2013-4235
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2013-4235
- CVE-2021-3671
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2017-11164
- CVE-2022-1587
- CVE-2022-1586
- CVE-2022-29458
- CVE-2021-39537
- CVE-2022-29458
- CVE-2021-39537
- CVE-2021-3671
- CVE-2021-43618
- CVE-2016-20013
- CVE-2021-3671
- CVE-2016-2781
- CVE-2020-9991
- CVE-2020-9849
-
GHSA Fixes (5 total)
GHSA Fixes (5 total)
-
fix(sec): fixing HIGH CVEs (#8289)
-
fix(sec): CVE High Vulnerability (#8277)
-
fix(sec): Fixing CVE-2021-31525 (#8274)
-
fix(sec): CVE-2019-11254 (#8270)
-
Changed
- CI Test Infrastructure
- Configured to run with Github Actions
- Stability Improvements to test harness
- Enabled [Unit/Integration Tests](http...