Skip to content

API Firewall Changelog

This page describes new releases of Wallarm API Firewall.

v0.8.6 (2024-12-20)

  • Dependency upgrade

  • Make the release binaries version detectable by Syft

v0.8.5 (2024-12-13)

  • Dependency upgrade

  • Bump Go version to 1.22.10

v0.8.4 (2024-11-12)

  • Fixed the DNS resolver issue in the GraphQL mode

  • Updated the Helm chart

  • Bump Go version to 1.22.9

v0.8.3 (2024-10-22)

v0.8.2 (2024-09-24)

  • Fixed DNS resolver cache issue

v0.8.1 (2024-09-13)

  • Fixed incorrect request to get API specification structure issue

  • Dependency upgrade

  • Bump Go version to 1.22.7

v0.8.0 (2024-08-19)

  • Added DNS cache update feature

    Allows making asynchronous DNS requests and cache results for a configured period of time. This could be useful when DNS load balancing is used.

  • Fixed GQL proxying configuration issue

  • Dependency upgrade

v0.7.4 (2024-07-12)

  • Added APIFW_API_SPECS_CUSTOM_HEADER_NAME and APIFW_API_SPECS_CUSTOM_HEADER_VALUE environment variables. These allow adding a custom header to requests for your OpenAPI specification URL (defined in APIFW_API_SPECS).

    For example, this can be used to specify the authentication data for API Firewall to reach the specification URL.

  • Added the APIFW_SPECIFICATION_UPDATE_PERIOD environment variable to specify the interval for updating the OpenAPI specification from the hosted URL (defined in APIFW_API_SPECS).

  • Bump Alpine version to 3.20

  • Bump Go version to 1.21.12

v0.7.3 (2024-06-06)

  • Dependency upgrade

  • Supported new interface for the api mode usage, only for internal use

  • Added the APIFW_SERVER_REQUEST_HOST_HEADER environment variable to set a custom Host header for requests forwarded to your backend after API Firewall validation

    This variable is supported in the PROXY and graphql API Firewall modes.

v0.7.2 (2024-04-16)

  • Added the demo for running the API Firewall with OWASP CoreRuleSet v4.1.0.

  • Fixed multiple entries in related_fields in the api mode.

  • Moved logging of errors caused by requests not matching the uploaded specification from the ERROR level to the DEBUG level. Now, ERROR level logs only include issues directly related to API Firewall operations. This change applies exclusively to api mode.

v0.7.1 (2024-04-15)

  • Bug fixes in the api mode

  • Updated router

  • Supported parsing of Content-Type headers with the +json, +xml, +yaml, +csv structured syntax suffixes

v0.7.0 (2024-04-03)

  • Added ModSecurity rules support (based on the Coraza project)

  • Fixed processing issues for the requests with the OPTIONS method

  • Added additional info to the log message of the Shadow API module

v0.6.17 (2024-03-28)

  • Added IP allowlisting support in the API mode

  • ​​Added support for subnets in allowlisted IP file and IP address validation during the file upload

  • Added support for a new SQLite database structure (V2) in the API mode of the API Firewall. This version adds a status field to track specifications as new (unprocessed by the firewall) or applied (processed).

    For backward compatibility, the APIFW_API_MODE_DB_VERSION environment variable has been added - it defaults to attempting to parse the database as V2; if unsuccessful, it falls back to previous format (V1).

  • Added the following default response from the API Firewall to GraphQL requests that do not match a provided API schema:

    {
      "errors": [
        {
          "message":"invalid query"
        }
      ]
    }
    
  • Introduced the new environment variable to limit the number of queries that can be batched together in a single GraphQL request, APIFW_GRAPHQL_BATCH_QUERY_LIMIT

  • Upgraded Go up to 1.21 and some other dependencies

v0.6.16 (2024-02-27)

  • Added IP allowlisting, enabling secure access to backends by allowing only requests from predefined IP addresses for both REST and GraphQL APIs. This update ensures requests from allowlisted IPs are validated against the OpenAPI specification 3.0, with non-allowlisted IP requests being rejected with a 403 error code. Thanks for PR #76 contributors. Read more

  • Fixed the processing issues of the HEAD request type in the api mode

  • Improved log messages by adding host and path parameters, providing immediate insight into request destinations. Issue #78

  • Adjusted TEXT log formatting to remove multi-line outputs. All log messages in TEXT logging mode are now formatted in a single line, enhancing readability for log parsers. For example, previously, multi-line outputs were consolidated into a single line, replacing occurrences of \r\n with spaces. Issue #79

  • Implemented a solution to generate unique request_id values, resolving conflicts caused by the incremental nature of request_id. Issue #80

  • Add tests

  • Dependency upgrade

v0.6.15 (2023-12-21)

  • Dependency upgrade

  • Bug fixes

  • Add tests

  • When operating in the api mode, the API Firewall now returns error messages in responses for requests containing parameter values that exceed the minimum and maximum limits defined in the OpenAPI specification

v0.6.14 (2023-11-23)

  • Introduced new environment variables to limit GraphQL queries: APIFW_GRAPHQL_MAX_ALIASES_NUM and APIFW_GRAPHQL_FIELD_DUPLICATION.

  • Implemented more detailed responses for requests that do not match mounted specifications in the API non-proxy mode.

v0.6.13 (2023-09-08)

v0.6.12 (2023-08-04)

  • Ability to set the general API Firewall mode using the APIFW_MODE environment variable. The default value is PROXY. When set to API, you can validate individual API requests based on a provided OpenAPI specification without further proxying.

  • Introduced the ability to allow OPTIONS requests for endpoints specified in the OpenAPI, even if the OPTIONS method is not explicitly defined. This can be achieved using the APIFW_PASS_OPTIONS variable. The default value is false.

  • Introduced a feature that allows control over whether requests should be identified as non-matching the specification if their parameters do not align with those outlined in the OpenAPI specification. It is set to true by default.

    This can be controlled through the APIFW_SHADOW_API_UNKNOWN_PARAMETERS_DETECTION variable in PROXY mode and via the APIFW_API_MODE_UNKNOWN_PARAMETERS_DETECTION variable in API mode.

  • The new logging level mode TRACE to log incoming requests and API Firewall responses, including their content. This level can be set using the APIFW_LOG_LEVEL environment variable.

  • Dependency updates

  • Bug fixes

v0.6.11 (2023-02-10)

v0.6.10 (2022-12-15)

v0.6.9 (2022-09-12)

  • Upgrade Go to 1.19

  • Upgrade other dependencies

  • Fix bugs of Shadow API detection and denylist processing

  • Delete the Apifw-Request-Id header from responses returned by API Firewall

  • Add compatibility of the Ingress object with Kubernetes 1.22

  • Terminate logging of incoming requests matching API specification at the INFO log level

v0.6.8 (2022-04-11)

New features

v0.6.7 (2022-01-25)

Wallarm API Firewall is now open source. There are the following related changes in this release:

  • API Firewall source code and related open source license are published

  • GitHub workflow for binary, Helm chart and Docker image building is implemented

v0.6.6 (2021-12-09)

New features

Bug fixes

v0.6.5 (2021-10-12)

New features

  • Configuration of the maximum number of the fasthttp clients (via the environment variable APIFW_SERVER_CLIENT_POOL_CAPACITY).

  • Health checks on the 9667 port of the API Firewall container (the port can be changed via the environment variable APIFW_HEALTH_HOST).

Instructions on running the API Firewall with new environment variables

Bug fixes

v0.6.4 (2021-08-18)

New features

  • Added monitoring for Shadow API endpoints. API Firewall operating in the LOG_ONLY mode for both the requests and responses marks all endpoints that are not included in the specification and are returning the code different from 404 as the shadow ones. You can exclude response codes indicating shadow endpoints using the environment variable APIFW_SHADOW_API_EXCLUDE_LIST.

  • Configuration of the HTTP response status code returned by API Firewall to blocked requests (via the environment variable APIFW_CUSTOM_BLOCK_STATUS_CODE).

  • Ability to return the header containing the reason for the request blocking (via the environment variable APIFW_ADD_VALIDATION_STATUS_HEADER). This feature is experimental.

  • Configuration of the API Firewall log format (via the environment variable APIFW_LOG_FORMAT).

Instructions on running the API Firewall with new environment variables

Optimizations

  • Optimized validation of the OpenAPI 3.0 specification due to added fastjson parser.

  • Added support for fasthttp.

v0.6.2 (2021-06-22)

  • The first release!