Replies: 1 comment
-
|
Hi @Byn11! I'm Dosu and I’m helping the dify team. Running Dify behind a corporate proxy with SSL inspection and a custom CA certificate in Docker/WSL is tricky due to how some components handle certificate trust. For most Python-based services, you can inject your custom CA by mounting it into the container and setting environment variables like The main blocker is the Go-based For Docker/WSL networking, enabling If you need to use a proxy for SSRF protection, Dify provides a Squid proxy container and related environment variables ( In summary: Python-based services can be configured to trust your CA with some workarounds, but the Go-based To reply, just mention @dosu. How did I do? Good | Irrelevant | Incorrect | Verbose | Hallucination | Report 🐛 | Other |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Self Checks
1. Is this request related to a challenge you're experiencing? Tell me about your story.
Hello Dify Team,
I am trying to run Dify in a corporate environment that requires an HTTP/HTTPS proxy with SSL inspection.
I have attempted several solutions found online, including editing docker-compose.yaml and setting proxy-related environment variables, but none of them worked with the current version.
In our environment, the proxy uses a custom/internal CA certificate. It seems that the Docker containers may not trust this certificate, which could be causing the network access issues.
Additionally, I am running Dify using Docker under WSL (Windows Subsystem for Linux).
Could you please advise if there is a recommended or officially supported way to run Dify behind a corporate proxy with custom certificates in the current version?
Any guidance or example configuration would be greatly appreciated.
Thank you very much for your help.
2. Additional context or comments
No response
Beta Was this translation helpful? Give feedback.
All reactions