Skip to content

Conversation

youming1970
Copy link

Docs-only hardening; no behavior change.

  • Add a visible warning that skip_cert_verification disables TLS verification and is not appropriate for production.
  • Point readers to mTLS options already supported by the HTTP backend (client_certificate_pem, client_private_key_pem, client_ca_certificate_pem).
  • Nudge readers to use proper trust configuration and to handle secrets per "Credentials and Sensitive Data".

Related to hashicorp/terraform#37568.

Copy link

CLA assistant check

Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement

Learn more about why HashiCorp requires a CLA and what the CLA includes

Have you signed the CLA already but the status is still pending? Recheck it.

1 similar comment
Copy link

CLA assistant check

Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement

Learn more about why HashiCorp requires a CLA and what the CLA includes

Have you signed the CLA already but the status is still pending? Recheck it.

Copy link

github-actions bot commented Sep 23, 2025

Vercel Previews Deployed

Name Status Preview Updated (UTC)
Dev Portal ✅ Ready (Inspect) Visit Preview Tue Sep 23 14:46:06 UTC 2025
Unified Docs API ✅ Ready (Inspect) Visit Preview Tue Sep 23 14:40:14 UTC 2025

Copy link

Broken Link Checker

No broken links found! 🎉

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant