Zuplo logo

Zuplo Changelog

We release improvements, new features, and fixes daily. Follow along here to see the most important updates.

This changelog covers changes from Monday, 2025-09-29 to Sunday, 2025-10-05, focusing on new policy features, runtime improvements, and portal enhancements.

Features#

  • GraphQL Introspection Filter Policy: Added new MCP GraphQL tools with introspection filtering capabilities to help manage GraphQL schema exposure and improve security
  • Logs in AI Gateway: Enhanced AI Gateway with comprehensive logging functionality, providing better visibility into gateway operations and events

Fixes#

  • MCP Server Handler: Fixed issue with routes containing escaped colons that were not being handled correctly
  • URL Forward Handler: Enhanced support for buffering request body during redirect transmission, improving reliability of URL forwarding
  • Log Parsing: Fixed issue where log chunks were not being correctly parsed, improving log reliability and accuracy

Portal Updates#

  • Copy Path Enhancement: Improved path copying functionality with visual feedback through flash animations
  • Invite UI Improvements: Updated color scheme for invitation-related interface elements to improve visual clarity
  • Secret Management UI: Enhanced the secret management interface for better user experience and security
  • MCP Server Bug Fix: Resolved server-side issues affecting MCP functionality
  • Button UI Cleanup: Removed count display from buttons to reduce user confusion

Audit Logs are now available for Zuplo Enterprise customers. This feature provides a record of activities within your Zuplo account, including project modifications, configuration changes, team management, API key operations, and deployment activities. Each log entry includes information about the actor, affected resources, timestamp, and geographic context.

Availability#

Available now as an add-on for Enterprise customers. Current enterprise customers can trial the feature for development and testing. Contact your account manager or sales@zuplo.com to enable it.

Audit Log Features#

  • 90-day retention by default (extended retention available on request)
  • Immutable audit trails suitable for compliance requirements
  • Real-time activity logging
  • Detailed context including IP address, user agent, and location data

How to access Audit Logs#

Once enabled, Audit Logs can be found in the Zuplo Portal (Account Settings → Audit Logs). You will see the most recent activities as well as options to filter the events by date range, action type, actor or success/failure status.

Programmatic Access to Audit Logs#

Audit Log data is also available via the API using the /accounts/{accountName}/audit-logs endpoint. Query parameters are available for filtering and pagination (maximum 100 results per request, 30-day query range limit).

Note: During beta, not all events may be captured.

See the Audit Logs documentation for more information.

This changelog covers improvements to the runtime and portal from Monday, 2025-09-01 to Sunday, 2025-09-07.

Fixes#

  • Runtime: Fixed MCP (Model Context Protocol) server handlers to return proper 405 Method Not Allowed responses instead of 404 Not Found when unsupported HTTP methods are used

Portal Updates#

  • Added enhanced stack trace mapping and formatting in the log viewer for better debugging experience with loading states and improved readability

This changelog covers improvements to sourcemapping, configuration flexibility, MCP support, and Portal analytics from Monday, 2025-08-25 to Sunday, 2025-08-31.

Features#

  • Sourcemapping Improvements: Enhanced sourcemap generation and file mapping capabilities for better debugging experience
  • Configuration Flexibility: Updated zuplo.jsonc configuration shape to support additional customization options
  • Certificate Validation Control: Added environment variable to disable certificate validation when needed for specific deployment scenarios
  • MCP Prompts Support: Added support for Model Context Protocol (MCP) prompts functionality
  • MCP Error Handling: Improved error display formatting for MCP operations

Fixes#

  • CLI Template Fix: Corrected the create app readme to reference the correct template
  • Request Validator: Improved handling of invalid parameter validators in the request-validator policy to prevent runtime errors

This release focuses on improving the developer portal user interface with various enhancements to search functionality, settings pages, and AI gateway features. The changes include better environment variable search capabilities, updated settings page styles, and improvements to the AI gateway user experience.

Portal Updates#

Features#

  • Enhanced environment variable search: Improved search functionality for environment variables with better filtering and updated components for a smoother user experience
  • Settings page redesign: Updated settings pages with consistent styling, improved billing page layout, and added billing addons support
  • Compliance and trust page: Added new dedicated page for compliance and trust information

We've added new SSO security options to give Enterprise customers greater control over team authentication and access management.

What's New:

  • Require Enterprise SSO: Force all team members to authenticate through your configured enterprise identity provider, preventing fallback to Google, GitHub, or password-based logins
  • Automatic SSO User Provisioning: Automatically add users to your Zuplo account when they authenticate through your enterprise identity provider

Availability:

  • These features are available for Enterprise plan customers with SSO enabled
  • Access the new controls in Account Settings > Security > Single Sign-On (SSO)
  • Free and Pro plan users will see upgrade prompts to access these features

Default Behavior:

  • All new SSO security features are disabled by default
  • Existing SSO configurations remain unchanged
  • Customers can enable these features on demand based on their security requirements

This update provides Enterprise customers with the flexibility to implement stricter authentication policies while maintaining backward compatibility with existing setups.