Wafris is an open-source Web Application Firewall (WAF) that runs within Rails (and other frameworks) powered by Redis.
Paired with Wafris Hub, you can view your site traffic in real time and and create rules to block malicious traffic from hitting your application.
Rules like:
- Block IP addresses (IPv6 and IPv4) from making requests
- Block on hosts, paths, user agents, parameters, and methods
- Rate limit (throttle) requests
- Visualize inbound traffic and requests
Need a better explanation? Read the overview at: wafris.org
The Wafris Ruby client is a gem that installs a Rack middleware into your Rails/Sinatra/Rack application filtering requests based on your created rules.
- Rails 5+
- Ruby 2.5+
Go to https://wafris.org/hub to create a new account and follow the instructions to link your Redis instance.
Note: In Step 3, you'll use this same Redis URL in your app configuration.
Update your Gemfile to include the Wafris gem and run
bundle install
# Gemfile
gem 'wafris'
In your production environment, you'll need to set the WAFRIS_API_KEY
environment variable to your API key. When you sign up on Wafris Hub, you'll receive your API key along with per-platform instructions.
Version 1 of the Wafris Rails client gem is deprecated. While it will continue to work you will experience signifiant performance improvements moving to v2.
The v2 Client does not depend on a Redis instance and instead uses locally sync'd SQLite databases. If you are currently using your own Redis instance, it will continue to work, but we would recommend creating a new WAF instance on Hub and migrating your existing rules.
Update by running bundle update wafris
and then updating your configuration.
We recommend removing your existing config/initializers/wafris.rb
file and instead setting the WAFRIS_API_KEY
environment variable in your production environment.
Your Wafris API key and platform specific instructions are available in the Setup section of your Wafris Hub dashboard.
If you have Cloudflare, Expedited WAF, or another service in front of your application that modifies the x-forwarded-for
HTTP Request header, please review how to configure Trusted Proxy Ranges
- Email: [email protected]
- Twitter: @wafrisorg
- Booking: https://app.harmonizely.com/expedited/wafris
Thanks to the following people who have contributed patches or helpful suggestions: