Proxy Support
Overview
XTM Composer can use system proxy settings for outgoing network calls.
YAML configuration
Environment variable configuration
export OPENAEV__DAEMON__WITH_PROXY="true"
export HTTP_PROXY="http://proxy.example.com:8080"
export HTTPS_PROXY="http://proxy.example.com:8080"
export NO_PROXY="localhost,127.0.0.1,.example.com"
When enabled, the Integration Manager automatically applies the proxy settings to:
- Docker API calls
- Kubernetes image pulls
- Portainer API requests
HTTPS Proxy Certificate Support (optional)
Some environments use HTTPS proxies with TLS interception (for example, corporate proxies or debugging proxies like Burp). In these cases, additional certificate settings may be required.
Environment variables
- HTTPS_PROXY_CA — List of CA certificates (file paths or PEM blocks) used to validate the proxy’s certificate.
- HTTPS_PROXY_REJECT_UNAUTHORIZED — If set to "false", certificate validation is disabled for proxy connections (default behavior).
Important: Certificate Scope Clarification
Composer distinguishes two independent certificate configurations:
| Purpose | Keys | Description |
|---|---|---|
| OpenAEV HTTPS server certificates | app.https_cert.ca, app.https_cert.reject_unauthorized | TLS configuration for the OpenAEV web server |
| Proxy HTTPS certificates | https_proxy_ca, https_proxy_reject_unauthorized | Validation settings for HTTPS connections made through the proxy |
These settings must not be mixed.
Proxy Configuration in config.json
Example of equivalent configuration in a JSON file:
{
"http_proxy": "http://proxy.example.com:8080",
"https_proxy": "http://proxy.example.com:8080",
"no_proxy": "localhost,127.0.0.1,internal.domain",
"https_proxy_ca": ["/path/to/proxy-ca.pem"],
"https_proxy_reject_unauthorized": false
}
Certificate Separation
⚠️ Important: Proxy certificates are separate from OpenAEV server certificates.
| Purpose | Configuration Keys | Used For |
|---|---|---|
| Proxy certificates | https_proxy_cahttps_proxy_reject_unauthorized |
Validating HTTPS connections through the proxy |
| OpenAEV server certificates | app:https_cert:caapp:https_cert:reject_unauthorized |
TLS for the OpenAEV web server itself |
Do not confuse these two configurations.
Troubleshooting - Collector, executor or injector integration
Automatic Injection
When proxy is enabled, XTM Composer automatically injects these environment variables into all managed collectors, injectors and executors containers:
HTTP_PROXYHTTPS_PROXYNO_PROXYHTTPS_CA_CERTIFICATES(whenhttps_proxy_cais configured)
Verification
To verify that proxy settings are correctly injected, call the following API endpoint:
Replace {instance-id} with your connector instance ID.
See also: Private Registry Authentication