Skip to content

Add NO_PROXY support for corporate firewall environments#350

Draft
Copilot wants to merge 5 commits intomainfrom
copilot/support-no-proxy-settings
Draft

Add NO_PROXY support for corporate firewall environments#350
Copilot wants to merge 5 commits intomainfrom
copilot/support-no-proxy-settings

Conversation

Copy link
Contributor

Copilot AI commented Feb 18, 2026

HTTP_PROXY/HTTPS_PROXY were supported but NO_PROXY was not, preventing bypass of proxy for self-hosted GitLab instances.

Changes

Core Implementation

  • Added shouldBypassProxy() in gitlab-client-pool.ts with standard pattern matching:
    • Exact hostname/IP (localhost, 192.168.1.1)
    • Domain suffix (.internal.com)
    • Port-specific (example.com:443)
    • Wildcard (*)
    • Case-insensitive
  • Modified createAgentsForUrl() to skip proxy agent creation when host matches NO_PROXY patterns
  • Added noProxy parameter to GitLabClientPoolOptions interface

Configuration

  • Environment variable: NO_PROXY
  • CLI argument: --no-proxy
  • Passed through getConfig() in index.ts to GitLabClientPool constructor

Usage

{
  "env": {
    "HTTP_PROXY": "http://proxy.corp.com:8080",
    "HTTPS_PROXY": "http://proxy.corp.com:8080",
    "NO_PROXY": "localhost,127.0.0.1,.internal.com,gitlab.mycompany.com"
  }
}

Requests to gitlab.mycompany.com bypass proxy while external requests use it.

Warning

Firewall rules blocked me from connecting to one or more addresses (expand for details)

I tried to connect to the following addresses, but was blocked by firewall rules:

  • nonexistent-proxy.example.com
    • Triggering command: /home/REDACTED/work/_temp/ghcca-node/node/bin/node node /home/REDACTED/work/gitlab-mcp/gitlab-mcp/build/index.js (dns block)

If you need me to access, download, or install something from one of these locations, you can either:

Original prompt

This section details on the original issue you should resolve

<issue_title>Support NO_PROXY settings</issue_title>
<issue_description>This would allow support for those behind corporate firewalls with self-hosted gitlab instances. While there is logic for HTTP_PROXY/HTTPS_PROXY there does not see to be logic for setting NO_PROXY. </issue_description>

Comments on the Issue (you are @copilot in this section)


💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.

Copilot AI and others added 4 commits February 18, 2026 14:34
Co-authored-by: zereight <42544600+zereight@users.noreply.github.com>
Co-authored-by: zereight <42544600+zereight@users.noreply.github.com>
Co-authored-by: zereight <42544600+zereight@users.noreply.github.com>
Co-authored-by: zereight <42544600+zereight@users.noreply.github.com>
Copilot AI changed the title [WIP] Add support for NO_PROXY settings in configuration Add NO_PROXY support for corporate firewall environments Feb 18, 2026
Copilot AI requested a review from zereight February 18, 2026 14:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Support NO_PROXY settings

2 participants