Skip to content

Handle outbound traffic

Outbound handlers let you intercept and modify HTTP traffic from a container with trusted code.

Use them to:

  • Allow or deny specific origin destinations
  • Safely inject authorization headers or tokens
  • Transparently reroute traffic
  • Add custom policy on outbound traffic (such as denying specific HTTP requests)
  • Connect to Workers bindings like KV, R2, and Durable Objects

Block outbound traffic

Use enableInternet = false to block public internet access by default:

JavaScript
import { Container } from "@cloudflare/containers";
export class MyContainer extends Container {
enableInternet = false;
}

When enableInternet is false, only traffic you explicitly allow later on this page through allowedHosts or outbound handlers can leave the container. Only ports 80, 443, and DNS are available, and DNS queries use Cloudflare's DNS servers.

Block or allow traffic by host

You can filter outbound traffic with the allowedHosts and deniedHosts properties on the Container class.

When allowedHosts is set, it becomes a deny-by-default allowlist. Any host or IP not in the list is denied, and only matching destinations can reach outbound or outboundByHost handlers.

allowedHosts and deniedHosts also support simple glob patterns where * matches any sequence of characters.

By default, a Container will allow internet access, and you can set deniedHosts to disallow specific hosts or IPs:

JavaScript
import { Container, ContainerProxy } from "@cloudflare/containers";
export { ContainerProxy };
export class MyContainer extends Container {
// Make sure the container trusts /etc/cloudflare/certs/cloudflare-containers-ca.crt
interceptHttps = true;
deniedHosts = ["some-nefarious-website.com", "141.101.64.0/18"];
}

You can also disable internet access by default, but allow specific hosts and IPs:

JavaScript
import { Container, ContainerProxy } from "@cloudflare/containers";
export { ContainerProxy };
export class MyContainer extends Container {
// Make sure the container trusts /etc/cloudflare/certs/cloudflare-containers-ca.crt
interceptHttps = true;
// default internet access to off unless overridden by 'allowedHosts' or outbound proxy
enableInternet = false;
// overrides enableInternet = false
allowedHosts = ["allowed.com"];
}

Define outbound handlers

Outbound handlers are programmable egress proxies that run on the same machine as the container. They have access to all Workers bindings.

Use outbound to intercept all HTTP and HTTPS traffic:

JavaScript
import { Container, ContainerProxy } from "@cloudflare/containers";
export { ContainerProxy };
export class MyContainer extends Container {
interceptHttps = true;
}
MyContainer.outbound = async (request, env, ctx) => {
if (request.method !== "GET") {
console.log(`Blocked ${request.method} to ${request.url}`);
return new Response("Method Not Allowed", { status: 405 });
}
return fetch(request);
};

Use outboundByHost to map specific domain names or IP addresses to proxy functions:

JavaScript
import { Container, ContainerProxy } from "@cloudflare/containers";
export { ContainerProxy };
export class MyContainer extends Container {
interceptHttps = true;
}
MyContainer.outboundByHost = {
"my.worker": async (request, env, ctx) => {
// Run arbitrary Workers logic from this hostname
return await someWorkersFunction(request.body);
},
};

Calls to http://my.worker from the container invoke the handler, which runs inside the Workers runtime, outside the container sandbox.

deniedHosts and allowedHosts are evaluated before any outbound handler. If you use allowedHosts, include the hostname there for either outbound or outboundByHost to run. outboundByHost handlers take precedence over catch-all outbound handlers.

Securely inject credentials

Because outbound handlers run in the Workers runtime — outside the container sandbox — they can hold secrets that the container itself never sees. The container makes a plain HTTP request, and the handler attaches the credential before forwarding it to the upstream service.

JavaScript
export class MyContainer extends Container {
// Make sure the container trusts /etc/cloudflare/certs/cloudflare-containers-ca.crt
interceptHttps = true;
}
MyContainer.outboundByHost = {
"github.com": (request, env, ctx) => {
const requestWithAuth = new Request(request);
requestWithAuth.headers.set("x-auth-token", env.SECRET);
return fetch(requestWithAuth);
},
};

This is especially useful for agentic workloads where you cannot fully trust the code running inside the container. With this pattern:

  • No token is exposed to the container. The secret lives in the Worker's environment and is never passed into the sandbox.
  • No token rotation inside the container. Rotate the secret in your Worker's environment and every request picks it up immediately.
  • Per-host and per-instance rules. Combine outboundByHost with ctx.containerId to scope credentials or permissions to a specific container instance.

Here, ctx.containerId looks up a per-instance key from KV:

JavaScript
export class MyContainer extends Container {
// Make sure the container trusts /etc/cloudflare/certs/cloudflare-containers-ca.crt
interceptHttps = true;
}
MyContainer.outboundByHost = {
"my-internal-vcs.dev": async (request, env, ctx) => {
const authKey = await env.KEYS.get(ctx.containerId);
const requestWithAuth = new Request(request);
requestWithAuth.headers.set("x-auth-token", authKey);
return fetch(requestWithAuth);
},
};

HTTPS traffic

By default, HTTPS traffic is not intercepted by outbound handlers. To opt in you must set the interceptHttps attribute.

JavaScript
export class MyContainer extends Container {
// Make sure the container trusts /etc/cloudflare/certs/cloudflare-containers-ca.crt
interceptHttps = true;
}
MyContainer.outbound = (req, env, ctx) => {
// All HTTP(S) requests will trigger this hook.
return fetch(req);
};

This is useful for Sandbox-like services that redirect untrusted traffic from a container instance to Workers for filtering and modification.

When HTTPS interception is active, an ephemeral CA file will be created at /etc/cloudflare/certs/cloudflare-containers-ca.crt once your container starts. The CA is only injected when you both set interceptHttps = true and define an outbound or outboundByHost handler.

Trust the CA certificate

For HTTPS interception to work, you must trust the CA file. The CA is ephemeral and only exists at runtime, so do not try to bake it into your image during docker build. Instead, copy it into your distro's trust store and refresh the trust store from the container entrypoint before your application starts.

If your base image does not already include the trust-store tooling, install the distro's ca-certificates package in your image first.

JavaScript
import { Container, ContainerProxy } from "@cloudflare/containers";
export { ContainerProxy };
export class MyContainer extends Container {
interceptHttps = true;
entrypoint = [
"sh",
"-lc",
[
"cp /etc/cloudflare/certs/cloudflare-containers-ca.crt /usr/local/share/ca-certificates/cloudflare-containers-ca.crt",
"update-ca-certificates",
"exec node server.js",
].join(" && "),
];
}

Replace node server.js with the command that starts your application.

Most runtimes will then trust the CA through the system root store automatically. If your runtime uses its own CA bundle, point it at /etc/cloudflare/certs/cloudflare-containers-ca.crt directly, for example with NODE_EXTRA_CA_CERTS or REQUESTS_CA_BUNDLE.

Non-HTTP traffic

Outbound handlers only intercept HTTP and HTTPS traffic. Traffic on ports other than 80 and 443 is never routed through outbound or outboundByHost.

If you set enableInternet = false, that traffic is denied. DNS queries are the one exception, but they only go to Cloudflare's DNS servers. That prevents using arbitrary DNS destinations for data exfiltration.

Change policies at runtime

Use outboundHandlers to define named handlers, then assign them to specific hosts at runtime using setOutboundByHost(). You can also apply a handler globally with setOutboundHandler().

You can also manage runtime policy with setOutboundByHosts(), setAllowedHosts(), setDeniedHosts(), allowHost(), denyHost(), removeAllowedHost(), and removeDeniedHost().

This lets a trusted Worker hold credentials without exposing them to an untrusted container:

JavaScript
export class MyContainer extends Container {
// Make sure the container trusts /etc/cloudflare/certs/cloudflare-containers-ca.crt
interceptHttps = true;
}
MyContainer.outboundHandlers = {
authenticatedGithub: async (request, env, ctx) => {
const githubToken = env.GITHUB_TOKEN;
return authenticateGitHttpsRequest(request, githubToken, ctx.containerId);
},
};

Apply handlers to hosts programmatically from your Worker:

JavaScript
async setUpContainer(req, env) {
const container = await env.MY_CONTAINER.getByName("my-instance");
// Give the container access to github.com on a specific host during setup
await container.setOutboundByHost("github.com", "authenticatedGithub");
// do something with github.com on your container...
}
async removeAccessToGithub(req, env) {
const container = await env.MY_CONTAINER.getByName("my-instance");
// Remove access to Github
await container.removeOutboundByHost("github.com");
}

Handler precedence

Requests are evaluated in this order:

  1. deniedHosts is checked first. Matching hosts or IPs are denied immediately.
  2. allowedHosts is checked next. When it is set, any host or IP not in the list is denied. Matching hosts continue to outbound handlers, or egress to the public internet if no handler is set.
  3. Instance-level rules set with setOutboundByHost() are checked before class-level outboundByHost rules.
  4. Per-host handlers always take precedence over catch-all handlers, so outboundByHost runs before outbound.
  5. Instance-level handlers set with setOutboundHandler() are checked before the class-level outbound handler.
  6. If no handler matches, the request can still egress to the public internet when it matched allowedHosts or enableInternet = true. Otherwise, it is denied.

Low-level API

To configure outbound interception directly on ctx.container, use interceptOutboundHttp for a specific hostname glob, IP, or CIDR range, or interceptAllOutboundHttp for all traffic. Both accept a WorkerEntrypoint.

JavaScript
import { WorkerEntrypoint } from "cloudflare:workers";
export class MyOutboundWorker extends WorkerEntrypoint {
fetch(request) {
// Inspect, modify, or deny the request before passing it on
return fetch(request);
}
}
// Inside your Container DurableObject
this.ctx.container.start({ enableInternet: false });
const worker = this.ctx.exports.MyOutboundWorker({ props: {} });
await this.ctx.container.interceptAllOutboundHttp(worker);

You can call these methods before or after starting the container, and even while connections are open. In-flight TCP connections pick up the new handler automatically — no connections are dropped.

JavaScript
// Intercept a specific CIDR range
await this.ctx.container.interceptOutboundHttp("203.0.113.0/24", worker);
// Intercept by hostname
this.ctx.container.interceptOutboundHttp("foo.com", worker);
// Update the handler while the container is running
const updated = this.ctx.exports.MyOutboundWorker({
props: { phase: "post-install" },
});
await this.ctx.container.interceptOutboundHttp("203.0.113.0/24", updated);

For HTTPS, interceptOutboundHttps works the same way as interceptOutboundHttp.

JavaScript
// Intercept a specific hostname
this.ctx.container.interceptOutboundHttps("foo.com", worker);
// Intercept all traffic
this.ctx.container.interceptOutboundHttps("*", worker);

The Container class calls these methods automatically when you use the functions shown above. You can also call them directly for cases the class does not cover.

Local development

wrangler dev supports outbound interception. A sidecar process is spawned inside the container's network namespace. It applies TPROXY rules to route matching traffic to the local Workerd instance, mirroring production behavior.