Open jwalsh opened 20 hours ago
npm config set cafile /usr/local/share/ca-certificates/mitmproxy-ca-cert.crt
# Install and validate certs with minimal tools
export JAVA_HOME=/usr/lib/jvm/java-11-openjdk-arm64
sudo keytool -importcert -alias mitmproxy -keystore $JAVA_HOME/lib/security/cacerts -file /usr/local/share/ca-certificates/mitmproxy-ca-cert.crt -storepass changeit
mkdir -p /home/computeruse/.deps.clj/1.12.0.1479/ClojureTools/
curl -k -L https://github.com/clojure/brew-install/releases/download/1.12.0.1479/clojure-tools.zip -o /home/computeruse/.deps.clj/1.12.0.1479/ClojureTools/clojure-tools.zip
bb -e '(try (babashka.http-client/get "https://github.com") (println "OK") (catch Exception e (println "Error:" (ex-message e))))'
Summary
Add built-in support for MITM proxy configuration across all computer use requests, enabling secure traffic inspection and debugging capabilities.
Background
Currently, configuring MITM proxy support requires manual certificate installation and environment configuration for each application (shell, Python, Firefox). This process should be streamlined and standardized across all computer use requests.
Motivation
Detailed Design
1. Certificate Management
~/.mitmproxy/mitmproxy-ca-cert.pem
)/usr/local/share/ca-certificates/
)2. Environment Configuration
Automatically set proxy-related environment variables:
3. Application-Specific Configuration
Firefox ESR
Python Requests
Shell Commands
Configuration Options
Implementation Steps
Proxy Detection
Certificate Installation
Environment Setup
Validation
Security Considerations
Certificate Validation
Proxy Access Control
Backwards Compatibility
Testing Requirements
Certificate Installation
Proxy Connectivity
Open Questions
Future Work
Timeline
References