Skip to content

feat: add per-provider TLS and proxy configuration#6025

Closed
maxious wants to merge 1 commit intoanomalyco:devfrom
maxious:mtls-proxy-support
Closed

feat: add per-provider TLS and proxy configuration#6025
maxious wants to merge 1 commit intoanomalyco:devfrom
maxious:mtls-proxy-support

Conversation

@maxious
Copy link
Copy Markdown
Contributor

@maxious maxious commented Dec 23, 2025

Add support for configuring TLS options and HTTP proxy per provider, enabling use of corporate proxies, self-signed certificates, and mTLS.

New provider options:

  • tls.rejectUnauthorized: Accept self-signed certificates
  • tls.cert: Client certificate path for mTLS
  • tls.key: Client private key path for mTLS
  • tls.ca: Custom CA certificate path(s)
  • proxy: HTTP proxy URL (overrides HTTPS_PROXY env var)

The TLS config is passed to Bun's native fetch using Bun.file() for cert/key/ca paths. The proxy option uses Bun's built-in proxy support.

For system-wide certificate trust, users can set:

  • NODE_OPTIONS="--use-system-ca" or BUN_OPTIONS="--use-system-ca"
  • NODE_EXTRA_CA_CERTS=/path/to/ca.pem

Documenting this resolves #1694 - Users with corporate CAs can now either use the system trust store via --use-system-ca flag, or specify their CA cert path in the provider's tls.ca option.

Documentation added to packages/web/src/content/docs/network.mdx with examples for proxy configuration, custom CAs, and mTLS setup.

Add support for configuring TLS options and HTTP proxy per provider,
enabling use of corporate proxies, self-signed certificates, and mTLS.

New provider options:
- tls.rejectUnauthorized: Accept self-signed certificates
- tls.cert: Client certificate path for mTLS
- tls.key: Client private key path for mTLS
- tls.ca: Custom CA certificate path(s)
- proxy: HTTP proxy URL (overrides HTTPS_PROXY env var)

The TLS config is passed to Bun's native fetch using Bun.file() for
cert/key/ca paths. The proxy option uses Bun's built-in proxy support.

For system-wide certificate trust, users can set:
- NODE_OPTIONS="--use-system-ca" or BUN_OPTIONS="--use-system-ca"
- NODE_EXTRA_CA_CERTS=/path/to/ca.pem

Fixes anomalyco#1694 - Users with corporate CAs can now either use the system
trust store via --use-system-ca flag, or specify their CA cert path
in the provider's tls.ca option.

Documentation added to packages/web/src/content/docs/network.mdx with
examples for proxy configuration, custom CAs, and mTLS setup.
@github-actions
Copy link
Copy Markdown
Contributor

Closing this pull request because it has had no updates for more than 60 days. If you plan to continue working on it, feel free to reopen or open a new PR.

@github-actions github-actions bot closed this Mar 28, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Use local SSL trust store

1 participant