Recently, I set up some deployment scripts for a Ruby app where I wanted the server to handle SSL termination.
In the "old" days, I would set up Caddy with reverse proxy the app with something like this:
# Caddyfile yourdomain.com { reverse_proxy localhost:3000 tls }
On top of this, I would usually run Caddy as one of the dependencies in a docker-compose.yml file to make it easier to install and reinstall everything.
Recently, Basecamp released a simple reverse proxy server that handles everything I would need for serving Ruby apps in a gem called Thruster.
As per the GitHub repo, here is what this server brings:
- HTTP/2 support
- Automatic TLS certificate management with Let's Encrypt
- Basic HTTP caching of public assets
- X-Sendfile support and compression, to efficiently serve static files
For 99% of the use cases out there, this fits the requirements perfectly. And best of all, I could run this in the same container as my Ruby app. This means I don't need a separate container to run Caddy.
Configuration
The gem is stated as a "no configuration" software, and this is almost true.
In reality, you still need to (at the very least) specify to Thruster which domains you want it to request SSL certificates for.
This is done via the environment variable TLS_DOMAIN.
The good thing about this is that it is possible to specify multiple domains, so Thruster can automatically request the correct Let's Encrypt certs for each of them.
For instance, if my app is serving from domain1.com and domain2.com, I could just specify it as TLD_DOMAIN=domain1.com,domain2.com and Thruster would pick this up just fine.
Running Thruster
To run Thruster, all you need to do is prefix it with the command you usually use to run your Ruby app.
For example, if you're on Rails, you'd normally type bin/rails server.
The modification for thruster would be thrust bin/rails server.
I feel this is why I like Thruster so much. With Caddy, I needed to set up a reverse proxy (oftentimes with trial and error with that darn Caddyfile). Using Thruster, I was able to get things set up in less than 3-5 minutes.
Use Cases
There are many options for serving web requests from Ruby (and Rails) apps these days in production environment.
- You can do a reverse proxy, such as with nginx or Caddy.
- You can use Kamal (which, in v2, uses Thruster).
- Or you can just use Thruster and have Docker monitor the service itself.
I think in most cases, options (1) and (2) makes the most sense if it's on servers you control.
For (3), there is a special use case: self hosted applications. In other words, Ruby apps that your customers run on their own infrastructure and where they're the ones installing the app.
The difference between the three described options is that in cases (1) and (2), it is easy for the devops person to go in and reconfigure things easily.
When providing a Docker image (likely the most often scenario) to a customer to self-host, there are a lot of things that can go wrong.
The customer may not be familiar with managing their own server, for example. Or perhaps the customer does not want to fiddle around with reverse proxies to make things work.
In these cases, it's easier to just hand over a Docker container where things "just work".
I ran into this problem while developing my self-hosted email marketing software, and luckily Thruster was available.
As I packaged everything into containers anyway and provide a docker-compose.yml file, this also dropped my container dependencies from 4 to 3, eliminating the need to run nginx or Caddy.
Conclusion
Thruster is a pretty good alternative for handling reverse proxies to your Ruby app.
Its simple "no-configuration" option makes it work very well in many scenarios.
For myself, when packaging Ruby apps that need to be run in environments I don't control (ie. self hosted apps on customers' machines), this is the way to go.
The above is the detailed content of Using Thruster web server for Ruby apps. For more information, please follow other related articles on the PHP Chinese website!

The article explains how to use the pprof tool for analyzing Go performance, including enabling profiling, collecting data, and identifying common bottlenecks like CPU and memory issues.Character count: 159

The article discusses writing unit tests in Go, covering best practices, mocking techniques, and tools for efficient test management.

This article demonstrates creating mocks and stubs in Go for unit testing. It emphasizes using interfaces, provides examples of mock implementations, and discusses best practices like keeping mocks focused and using assertion libraries. The articl

This article explores Go's custom type constraints for generics. It details how interfaces define minimum type requirements for generic functions, improving type safety and code reusability. The article also discusses limitations and best practices

This article explores using tracing tools to analyze Go application execution flow. It discusses manual and automatic instrumentation techniques, comparing tools like Jaeger, Zipkin, and OpenTelemetry, and highlighting effective data visualization

The article discusses Go's reflect package, used for runtime manipulation of code, beneficial for serialization, generic programming, and more. It warns of performance costs like slower execution and higher memory use, advising judicious use and best

The article discusses using table-driven tests in Go, a method that uses a table of test cases to test functions with multiple inputs and outcomes. It highlights benefits like improved readability, reduced duplication, scalability, consistency, and a

The article discusses managing Go module dependencies via go.mod, covering specification, updates, and conflict resolution. It emphasizes best practices like semantic versioning and regular updates.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

SublimeText3 Linux new version
SublimeText3 Linux latest version
